WorldWideScience

Sample records for previously established protocol

  1. Decellularization of placentas: establishing a protocol

    Directory of Open Access Journals (Sweden)

    L.C.P.C. Leonel

    2017-11-01

    Full Text Available Biological biomaterials for tissue engineering purposes can be produced through tissue and/or organ decellularization. The remaining extracellular matrix (ECM must be acellular and preserve its proteins and physical features. Placentas are organs of great interest because they are discarded after birth and present large amounts of ECM. Protocols for decellularization are tissue-specific and have not been established for canine placentas yet. This study aimed at analyzing a favorable method for decellularization of maternal and fetal portions of canine placentas. Canine placentas were subjected to ten preliminary tests to analyze the efficacy of parameters such as the type of detergents, freezing temperatures and perfusion. Two protocols were chosen for further analyses using histology, scanning electron microscopy, immunofluorescence and DNA quantification. Sodium dodecyl sulfate (SDS was the most effective detergent for cell removal. Freezing placentas before decellularization required longer periods of incubation in different detergents. Both perfusion and immersion methods were capable of removing cells. Placentas decellularized using Protocol I (1% SDS, 5 mM EDTA, 50 mM TRIS, and 0.5% antibiotic preserved the ECM structure better, but Protocol I was less efficient to remove cells and DNA content from the ECM than Protocol II (1% SDS, 5 mM EDTA, 0.05% trypsin, and 0.5% antibiotic.

  2. Protocol for the establishment and operation of LTPP sections

    CSIR Research Space (South Africa)

    Jones, DJ

    2004-03-01

    Full Text Available This document describes a protocol for establishment and operation of long-term pavement performance (LTPP) sections, including those linked to HVS tests. This is detailed under the following headings: Linking LTPP to HVS data collection...

  3. Extended KCI attack against two-party key establishment protocols

    NARCIS (Netherlands)

    Tang, Qiang; Chen, Liqun

    2011-01-01

    We introduce an extended Key Compromise Impersonation (KCI) attack against two-party key establishment protocols, where an adversary has access to both long-term and ephemeral secrets of a victim. Such an attack poses serious threats to both key authentication and key confirmation properties of a

  4. A Key Establishment Protocol for RFID User in IPTV Environment

    Science.gov (United States)

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  5. Disjoint Key Establishment Protocol for Wireless Sensor and Actor Networks

    Directory of Open Access Journals (Sweden)

    AtaUllah Ghafoor

    2016-01-01

    Full Text Available Key distribution is essential for providing secure communication between commercial and sensitive applications of wireless sensor and actor networks (WSANs. It becomes more challenging when any of the intermediate sensor nodes is compromised by the adversaries as the messages carrying secure keys will be exposed and links will be unreliable. This paper presents a Disjoint Key Establishment Protocol (DKEP that does not require transmitting keys across the nodes. In DKEP, each node is preloaded with one row and one column from a matrix. After the deployment, indices for row and column are exchanged between the two nodes and values at intersection of row and column index will be used to calculate the key on each node. DKEP is verified by performing formal analysis using Rubin Logic and validated using simulations in NS-2. Simulation results demonstrate the effectiveness and efficiency of DKEP compared to contemporary schemes in terms of reducing storage and communication cost and improving resilience against node compromise attacks. Moreover, the proposed scheme is implemented in a group-based mobile application scenario for secure message exchange.

  6. Repeated mirtazapine nullifies the maintenance of previously established methamphetamine-induced conditioned place preference in rats.

    Science.gov (United States)

    Voigt, Robin M; Mickiewicz, Amanda L; Napier, T Celeste

    2011-11-20

    The atypical antidepressant mirtazapine enhances monoaminergic transmission; thus, mirtazapine therapy may counter the hypo-activation of monoamine systems associated with withdrawal from methamphetamine abuse. Human addiction therapy will likely require chronic administration that is given after brain and behavioral maladaptations are established. To emulate this scenario in rats, we ascertained if acute or repeated mirtazapine treatments could antagonize previously established consequences of repeated methamphetamine. Methamphetamine-induced conditioned place preference (CPP) was used, wherein methamphetamine (1mg/kg, i.p.) was administered in a unique environmental context once-daily for three days interposed by saline injections in an alternate context. Subsequently, mirtazapine (5mg/kg, i.p.) was administered in the home cage either as 10 once-daily injections or a single injection. The expression of CPP was determined in drug-free rats three days after the last mirtazapine injection. Expression of methamphetamine-induced CPP was inhibited by 10 home cage administrations of mirtazapine but not by a single injection of mirtazapine. These findings reveal that mirtazapine can inhibit the maintenance of methamphetamine-induced CPP and that treatment duration and/or treatment timing contributes to this effect of mirtazapine. Copyright © 2011 Elsevier B.V. All rights reserved.

  7. The relationship between cerebrovascular complications and previously established use of antiplatelet therapy in left-sided infective endocarditis

    DEFF Research Database (Denmark)

    Snygg-Martin, Ulrika; Rasmussen, Rasmus Vedby; Hassager, Christian

    2011-01-01

    Cerebrovascular complications (CVC) in infective endocarditis (IE) are common. The only established treatments to reduce the incidence of CVC in IE are antibiotics and in selected cases early cardiac surgery. Potential effects of previously established antiplatelet therapy are under debate....

  8. Changes in the dominance hierarchy of captive female Japanese macaques as a consequence of merging two previously established groups.

    Science.gov (United States)

    Anderson, Emily J; Weladji, Robert B; Paré, Patrick

    2016-11-01

    Dominance hierarchies play an important role in reducing competition and aggression in social animals. In zoos, changes in group composition are often required due to management protocols, but these changes may have long lasting effects on dominance hierarchies, and, consequently, the wellbeing of the animals. We studied the changes in the female dominance hierarchy that occurred both during and after the formation of a group of 10 adult Japanese macaques at the Zoo de Granby by combining members from two previously established groups. There was no significant correlation between individual ranks in the old groups (groups A and B) and their ranks in the new group (group AB), indicating a significant change in the hierarchy. Alliances between kin appeared to be important in determining rank; when the sister of the dominant female was removed from group AB, the hierarchy changed significantly a second time. The average standardized rank of individuals added later in the formation process of group AB was not different from those added earlier. Ranks in the group AB did correlate with age of individual at the beginning of the field season, but not at the end, after the shift in hierarchy occurred. Zoo management must be aware of the consequences small changes in a social group can have when removing and transferring individuals in both primates and in other social species. Zoo Biol. 35:505-512, 2016. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  9. Folk medicinal plant mixtures: Establishing a protocol for further studies.

    Science.gov (United States)

    Gras, Airy; Parada, Montse; Rigat, Montse; Vallès, Joan; Garnatje, Teresa

    2018-03-25

    Most ethnobotanical research bases its analyses on individual taxa catalogues and their uses, rather than on mixtures. However, mixtures constitute an important chapter of our different lines of research and they represent a large volume of information. The relevance of these data in folk medicine could be explained as a response to the cure of multicausal etiology diseases or by a possible polyvalent effect of the mixture as opposed to the effect of each taxon alone. The main goals are: i) to perform qualitative and quantitative analyses of these mixtures; ii) to carry out a comparison among the mixtures in two Catalan territories and their floristic composition; iii) to assess the worth of families association; and, iv) to evaluate whether the plants claimed to be used in mixtures have contraindications or possible negative interactions according to phytopharmaceutical literature. The ultimate goal is to test a protocol that can be implemented in similar studies. We have used data on medicinal plant mixtures obtained from two extensive ethnobotanical field studies carried out in two Catalan districts, Alt Empordà and Ripollès. The quantitative analyses by means of descriptive statistics were carried out with Excel. New contributions like the implementation of the Shannon index to quantify the diversity of families in plant combinations, the creation of a new index to calculate the taxon importance in mixtures, or the use of a social network analysis to study the connection between botanical families have been employed in this work. In total, a set of 484 mixtures from Alt Empordà and Ripollès (Catalonia, Iberian Peninsula) have been analysed: 462 for human use and 22 for veterinary. Thymus vulgaris and Rosmarinus officinalis are among the most commonly used species in mixtures. The aerial part of the plant is the most used, and the anticatarrhal usage is the most frequent in both territories. A wide diversity of families has been observed in mixtures and

  10. Liver growth factor treatment reverses emphysema previously established in a cigarette smoke exposure mouse model.

    Science.gov (United States)

    Pérez-Rial, Sandra; Del Puerto-Nevado, Laura; Girón-Martínez, Alvaro; Terrón-Expósito, Raúl; Díaz-Gil, Juan J; González-Mangado, Nicolás; Peces-Barba, Germán

    2014-11-01

    Chronic obstructive pulmonary disease (COPD) is an inflammatory lung disease largely associated with cigarette smoke exposure (CSE) and characterized by pulmonary and extrapulmonary manifestations, including systemic inflammation. Liver growth factor (LGF) is an albumin-bilirubin complex with demonstrated antifibrotic, antioxidant, and antihypertensive actions even at extrahepatic sites. We aimed to determine whether short LGF treatment (1.7 μg/mouse ip; 2 times, 2 wk), once the lung damage was established through the chronic CSE, contributes to improvement of the regeneration of damaged lung tissue, reducing systemic inflammation. We studied AKR/J mice, divided into three groups: control (air-exposed), CSE (chronic CSE), and CSE + LGF (LGF-treated CSE mice). We assessed pulmonary function, morphometric data, and levels of various systemic inflammatory markers to test the LGF regenerative capacity in this system. Our results revealed that the lungs of the CSE animals showed pulmonary emphysema and inflammation, characterized by increased lung compliance, enlargement of alveolar airspaces, systemic inflammation (circulating leukocytes and serum TNF-α level), and in vivo lung matrix metalloproteinase activity. LGF treatment was able to reverse all these parameters, decreasing total cell count in bronchoalveolar lavage fluid and T-lymphocyte infiltration in peripheral blood observed in emphysematous mice and reversing the decrease in monocytes observed in chronic CSE mice, and tends to reduce the neutrophil population and serum TNF-α level. In conclusion, LGF treatment normalizes the physiological and morphological parameters and levels of various systemic inflammatory biomarkers in a chronic CSE AKR/J model, which may have important pathophysiological and therapeutic implications for subjects with stable COPD. Copyright © 2014 the American Physiological Society.

  11. A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2010-01-01

    ZigBee is a wireless sensor network standard that defines network and application layers on top of IEEE 802.15.4's physical and medium access control layers. In the latest version of ZigBee, enhancements are prescribed for the security sublayer but we show in this paper that problems persist....... In particular, we show that the end-to-end application key establishment protocol is flawed and we propose a secure protocol instead. We do so by using formal verification techniques based on static program analysis and process algebras. We present a way of using formal methods in wireless network security......, and propose a secure key establishment protocol for ZigBee networks....

  12. A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2009-01-01

    ZigBee is a wireless sensor network standard that defines network and application layers on top of IEEE 802.15.4’s physical and medium access control layers. In the latest version of ZigBee, enhancements are prescribed for the security sublayer but we show in this paper that problems persist....... In particular we show that the End-to-End Application Key Establishment Protocol is flawed and we propose a secure protocol instead. We do so by using formal verification techniques based on static program analysis and process algebras. We present a way of using formal methods in wireless network security......, and propose a secure key establishment protocol for ZigBee networks....

  13. Alkylation induced cerebellar degeneration dependent on Aag and Parp1 does not occur via previously established cell death mechanisms.

    Science.gov (United States)

    Margulies, Carrie M; Chaim, Isaac Alexander; Mazumder, Aprotim; Criscione, June; Samson, Leona D

    2017-01-01

    Alkylating agents are ubiquitous in our internal and external environments, causing DNA damage that contributes to mutations and cell death that can result in aging, tissue degeneration and cancer. Repair of methylated DNA bases occurs primarily through the base excision repair (BER) pathway, a multi-enzyme pathway initiated by the alkyladenine DNA glycosylase (Aag, also known as Mpg). Previous work demonstrated that mice treated with the alkylating agent methyl methanesulfonate (MMS) undergo cerebellar degeneration in an Aag-dependent manner, whereby increased BER initiation by Aag causes increased tissue damage that is dependent on activation of poly (ADP-ribose) polymerase 1 (Parp1). Here, we dissect the molecular mechanism of cerebellar granule neuron (CGN) sensitivity to MMS using primary ex vivo neuronal cultures. We first established a high-throughput fluorescent imaging method to assess primary neuron sensitivity to treatment with DNA damaging agents. Next, we verified that the alkylation sensitivity of CGNs is an intrinsic phenotype that accurately recapitulates the in vivo dependency of alkylation-induced CGN cell death on Aag and Parp1 activity. Finally, we show that MMS-induced CGN toxicity is independent of all the cellular events that have previously been associated with Parp-mediated toxicity, including mitochondrial depolarization, AIF translocation, calcium fluxes, and NAD+ consumption. We therefore believe that further investigation is needed to adequately describe all varieties of Parp-mediated cell death.

  14. Alkylation induced cerebellar degeneration dependent on Aag and Parp1 does not occur via previously established cell death mechanisms.

    Directory of Open Access Journals (Sweden)

    Carrie M Margulies

    Full Text Available Alkylating agents are ubiquitous in our internal and external environments, causing DNA damage that contributes to mutations and cell death that can result in aging, tissue degeneration and cancer. Repair of methylated DNA bases occurs primarily through the base excision repair (BER pathway, a multi-enzyme pathway initiated by the alkyladenine DNA glycosylase (Aag, also known as Mpg. Previous work demonstrated that mice treated with the alkylating agent methyl methanesulfonate (MMS undergo cerebellar degeneration in an Aag-dependent manner, whereby increased BER initiation by Aag causes increased tissue damage that is dependent on activation of poly (ADP-ribose polymerase 1 (Parp1. Here, we dissect the molecular mechanism of cerebellar granule neuron (CGN sensitivity to MMS using primary ex vivo neuronal cultures. We first established a high-throughput fluorescent imaging method to assess primary neuron sensitivity to treatment with DNA damaging agents. Next, we verified that the alkylation sensitivity of CGNs is an intrinsic phenotype that accurately recapitulates the in vivo dependency of alkylation-induced CGN cell death on Aag and Parp1 activity. Finally, we show that MMS-induced CGN toxicity is independent of all the cellular events that have previously been associated with Parp-mediated toxicity, including mitochondrial depolarization, AIF translocation, calcium fluxes, and NAD+ consumption. We therefore believe that further investigation is needed to adequately describe all varieties of Parp-mediated cell death.

  15. Establishment of Protocols for Global Metabolomics by LC-MS for Biomarker Discovery.

    Directory of Open Access Journals (Sweden)

    Daisuke Saigusa

    Full Text Available Metabolomics is a promising avenue for biomarker discovery. Although the quality of metabolomic analyses, especially global metabolomics (G-Met using mass spectrometry (MS, largely depends on the instrumentation, potential bottlenecks still exist at several basic levels in the metabolomics workflow. Therefore, we established a precise protocol initially for the G-Met analyses of human blood plasma to overcome some these difficulties. In our protocol, samples are deproteinized in a 96-well plate using an automated liquid-handling system, and conducted either using a UHPLC-QTOF/MS system equipped with a reverse phase column or a LC-FTMS system equipped with a normal phase column. A normalization protocol of G-Met data was also developed to compensate for intra- and inter-batch differences, and the variations were significantly reduced along with our normalization, especially for the UHPLC-QTOF/MS data with a C18 reverse-phase column for positive ions. Secondly, we examined the changes in metabolomic profiles caused by the storage of EDTA-blood specimens to identify quality markers for the evaluation of the specimens' pre-analytical conditions. Forty quality markers, including lysophospholipids, dipeptides, fatty acids, succinic acid, amino acids, glucose, and uric acid were identified by G-Met for the evaluation of plasma sample quality and established the equation of calculating the quality score. We applied our quality markers to a small-scale study to evaluate the quality of clinical samples. The G-Met protocols and quality markers established here should prove useful for the discovery and development of biomarkers for a wider range of diseases.

  16. Beneficial Effects of Implementing Stroke Protocols Require Establishment of a Geographically Distinct Unit.

    Science.gov (United States)

    Akhtar, Naveed; Kamran, Saadat; Singh, Rajvir; Cameron, Peter; D'Souza, Atlantic; Imam, Yahya; Bourke, Paula; Joseph, Sujatha; Khan, Rabia; Santos, Mark; Deleu, Dirk; El-Zouki, Abdel; Abou-Samra, Abdul; Butt, Adeel A; Shuaib, Ashfaq

    2015-12-01

    Usefulness of multidisciplinary stroke units in acute stroke patients is well established. There is extensive western literature on usefulness of stroke units in outcome, but limited evidence from the rest of the world. We aim to evaluate the impact of establishing a stroke unit on outcome in patients presenting to a tertiary care facility. This is a retrospective study of 1003 patients with acute stroke admitted to Hamad General Hospital, Qatar, between January 2014 and February 2015. Patients directly admitted to intensive care unit (132) were excluded. We compared outcomes of pre- and poststroke ward (SW) establishment and in SW patients versus those of general medical wards. Before the establishment of the SW, 175 patients were admitted to the hospital. From April 2014 to February 2015, 696 patients were admitted (SW, 545; medical ward, 151). There was a significant reduction in length of stay from 14.7±27.7 to 6.2±20.2 days (P=0.0001) and incidence of complications (23.6% versus 6.4%, P=0.0001) after implementation of stroke-specific protocols. Prognosis at discharge (modified Rankin Scale 0-2 in 56.0% versus 70.4%, P=0.001) and at 90 days (modified Rankin Scale 0-2 in 70.6% versus 95.0%, P=0.001) also significantly improved. Compared with medical ward patients, outcome was significantly better in SW patients with fewer complications (10.9% versus 5.0%, P=0.013) and shorter length of stay (8.9±30.7 versus 5.4±16.1 days, P=0.05). Establishing a distinct SW is essential for achieving full benefits of stroke protocols implementation. SW patients have significantly fewer complications and better prognosis when compared with patients in medical wards. © 2015 American Heart Association, Inc.

  17. Establishment and intra-/inter-laboratory validation of a standard protocol of reactive oxygen species assay for chemical photosafety evaluation.

    Science.gov (United States)

    Onoue, Satomi; Hosoi, Kazuhiro; Wakuri, Shinobu; Iwase, Yumiko; Yamamoto, Toshinobu; Matsuoka, Naoko; Nakamura, Kazuichi; Toda, Tsuguto; Takagi, Hironori; Osaki, Naoto; Matsumoto, Yasuhiro; Kawakami, Satoru; Seto, Yoshiki; Kato, Masashi; Yamada, Shizuo; Ohno, Yasuo; Kojima, Hajime

    2013-11-01

    A reactive oxygen species (ROS) assay was previously developed for photosafety evaluation of pharmaceuticals, and the present multi-center study aimed to establish and validate a standard protocol for ROS assay. In three participating laboratories, two standards and 42 coded chemicals, including 23 phototoxins and 19 nonphototoxic drugs/chemicals, were assessed by the ROS assay according to the standardized protocol. Most phototoxins tended to generate singlet oxygen and/or superoxide under UV-vis exposure, but nonphototoxic chemicals were less photoreactive. In the ROS assay on quinine (200 µm), a typical phototoxic drug, the intra- and inter-day precisions (coefficient of variation; CV) were found to be 1.5-7.4% and 1.7-9.3%, respectively. The inter-laboratory CV for quinine averaged 15.4% for singlet oxygen and 17.0% for superoxide. The ROS assay on 42 coded chemicals (200 µm) provided no false negative predictions upon previously defined criteria as compared with the in vitro/in vivo phototoxicity, although several false positives appeared. Outcomes from the validation study were indicative of satisfactory transferability, intra- and inter-laboratory variability, and predictive capacity of the ROS assay. Copyright © 2012 John Wiley & Sons, Ltd.

  18. Establishment of integrated protocols for automated high throughput kinetic chlorophyll fluorescence analyses.

    Science.gov (United States)

    Tschiersch, Henning; Junker, Astrid; Meyer, Rhonda C; Altmann, Thomas

    2017-01-01

    Automated plant phenotyping has been established as a powerful new tool in studying plant growth, development and response to various types of biotic or abiotic stressors. Respective facilities mainly apply non-invasive imaging based methods, which enable the continuous quantification of the dynamics of plant growth and physiology during developmental progression. However, especially for plants of larger size, integrative, automated and high throughput measurements of complex physiological parameters such as photosystem II efficiency determined through kinetic chlorophyll fluorescence analysis remain a challenge. We present the technical installations and the establishment of experimental procedures that allow the integrated high throughput imaging of all commonly determined PSII parameters for small and large plants using kinetic chlorophyll fluorescence imaging systems (FluorCam, PSI) integrated into automated phenotyping facilities (Scanalyzer, LemnaTec). Besides determination of the maximum PSII efficiency, we focused on implementation of high throughput amenable protocols recording PSII operating efficiency (Φ PSII ). Using the presented setup, this parameter is shown to be reproducibly measured in differently sized plants despite the corresponding variation in distance between plants and light source that caused small differences in incident light intensity. Values of Φ PSII obtained with the automated chlorophyll fluorescence imaging setup correlated very well with conventionally determined data using a spot-measuring chlorophyll fluorometer. The established high throughput operating protocols enable the screening of up to 1080 small and 184 large plants per hour, respectively. The application of the implemented high throughput protocols is demonstrated in screening experiments performed with large Arabidopsis and maize populations assessing natural variation in PSII efficiency. The incorporation of imaging systems suitable for kinetic chlorophyll

  19. Establishing a protocol for element determination in human nail clippings by neutron activation analysis

    International Nuclear Information System (INIS)

    Sanches, Thalita Pinheiro; Saiki, Mitiko

    2011-01-01

    Human nail samples have been analyzed to evaluate occupational exposure, nutritional status and to diagnose certain diseases. However, sampling and washing protocols for nail analyses vary from study to study not allowing comparisons between studies. One of the difficulties in analyzing nail samples is to eliminate only surface contamination without removing elements of interest in this tissue. In the present study, a protocol was defined in order to obtain reliable results of element concentrations in human nail clippings. Nail clippings collected from all 10 fingers or toes were previously pre cleaned using an ethyl alcohol solution to eliminate microbes. Then, the clippings were cut in small pieces and submitted to different reagents for washing by shaking. Neutron activation analysis (NAA) was applied for nail samples analysis which consisted of irradiating aliquots of samples together with synthetic elemental standards in the IEA-R1 nuclear research reactor followed by gamma ray spectrometry. Comparisons made between the results obtained for nails submitted to different reagents for cleaning indicated that the procedure using acetone and Triton X100 solution is more effective than that of nitric acid solution. Analyses in triplicates of a nail sample indicated results with relative standard deviations lower than 15% for most of elements, showing the homogeneity of the prepared sample. Qualitative analyses of different nail polishes showed that the presence of elements determined in the present study is negligible in these products. Quality control of the analytical results indicated that the applied NAA procedure is adequate for human nail analysis. (author)

  20. Establishment of appropriate protocols for analysis of tree bark for use in biomonitoring atmospheric pollution

    Energy Technology Data Exchange (ETDEWEB)

    Santos, Eliane C.; Saiki, Mitiko, E-mail: mitiko@ipen.br, E-mail: eliane_csantos@yahoo.com.br [Instituto de Pesquisas Energeticas e Nucleares (IPEN/CNEN-SP), Sao Paulo, SP (Brazil)

    2013-07-01

    The aim of this study was to establish appropriate protocols for collection and processing of tree barks and multielement analysis by the method of Neutron Activation Analysis (NAA). For analysis, barks of Tipuana and Sibipiruna species were cleaned and crushed. For the procedures of the Neutron activated analysis, aliquots of samples and synthetic elementary standards were irradiated in the nuclear reactor IEA-R1 then analyzed by gamma spectrometry. The quality of the results was evaluated by analysis of certified reference materials that indicated good accuracy and precision. In the analyzes of different layers of barks was verified higher concentration or the same order of magnitude for most elements in the outer layer of the barks than in the inner. For both species studied, the concentrations of Ca and K did not show significant differences with the trunk diameter differences, but for the other elements showed variability. The Tipuana species showed higher concentration for most elements in relation to Sibipiruna. From the results obtained, a procedure for sample preparation and analysis of NAA to barks for monitoring air pollution was established.

  1. Angiotensin (1-7) re-establishes heart cell communication previously impaired by cell swelling: implications for myocardial ischemia.

    Science.gov (United States)

    De Mello, Walmor C

    2014-05-01

    The influence of hypertonic solution on dye coupling was investigated in cell pairs isolated from the left ventricle of adult Sprague Dawley rats.The hypertonic solution together with Lucifer Yellow CH, were dialyzed into one cell of the pair using the whole cell clamp tecnique, and the diffusion of dye in the dialyzed as well as in non-dialyzed cell, was followed by measuring the intensity of fluorescence in both cells as a function of time.The results indicated that: (1) Lucifer Yellow CH dialyzed into one cell of the pair diffuses easily into the nondialyzed cell through gap junctions; (2) the intracellular dialysis of an hypertonic solution into one cell of the pair, increases the area of the dialyzed cell and reduced the area of the non-dialyzed cell suggesting intercellular movement of water; (3) the hypertonic solution dialyzed into one cell of the pair abolished the dye coupling; (4) the gap junction permeability (Pj) estimated before and after administration of hypertonic solution showed an appreciably decrease of Pj; (5) angiotensin (1-7) (Ang (1-7) (10-9M) administered to the bath re-established the dye coupling abolished by hypertonic solution and reduced the cell area; (6) the effect of Ang (1-7) was related to the activation of Mas receptor and was dependent on the activation of PKA. the reestablishment of dye coupling elicited by Ang (1-7) seen in cell pairs dialyzed with hypertonic solution, might indicate that under similar conditions like that seen during myocardial ischemia, the peptide might be of benefit preventing the impairment of cell communication and impulse propagation associated with cardiac reentrant arrhytmias. Copyright © 2014 Elsevier Inc. All rights reserved.

  2. Toward establishing model organisms for marine protists: Successful transfection protocols for Parabodo caudatus (Kinetoplastida: Excavata).

    Science.gov (United States)

    Gomaa, Fatma; Garcia, Paulo A; Delaney, Jennifer; Girguis, Peter R; Buie, Cullen R; Edgcomb, Virginia P

    2017-09-01

    We developed protocols for, and demonstrated successful transfection of, the free-living kinetoplastid flagellate Parabodo caudatus with three plasmids carrying a fluorescence reporter gene (pEF-GFP with the EF1 alpha promoter, pUB-GFP with Ubiquitin C promoter, and pEYFP-Mitotrap with CMV promoter). We evaluated three electroporation approaches: (1) a square-wave electroporator designed for eukaryotes, (2) a novel microfluidic transfection system employing hydrodynamically-controlled electric field waveforms, and (3) a traditional exponential decay electroporator. We found the microfluidic device provides a simple and efficient platform to quickly test a wide range of electric field parameters to find the optimal set of conditions for electroporation of target species. It also allows for processing large sample volumes (>10 ml) within minutes, increasing throughput 100 times over cuvettes. Fluorescence signal from the reporter gene was detected a few hours after transfection and persisted for 3 days in cells transfected by pEF-GFP and pUB-GFP plasmids and for at least 5 days post-transfection for cells transfected with pEYFP-Mitotrap. Expression of the reporter genes (GFP and YFP) was also confirmed using reverse transcription-PCR (RT-PCR). This work opens the door for further efforts with this taxon and close relatives toward establishing model systems for genome editing. © 2017 Society for Applied Microbiology and John Wiley & Sons Ltd.

  3. Protocol for the establishment and operation of LTPP sections - Inception report

    CSIR Research Space (South Africa)

    Jones, DJ

    2003-02-01

    Full Text Available project specific LPTT projects have been carried out. A detailed protocol for LTPP work was devised in the USA for the SHRP programme (not related to APT) and this has been related where possible to the Australian APT programme. No other protocols were...

  4. Supporting Symmetric 128-bit AES in Networked Embedded Systems: An Elliptic Curve Key Establishment Protocol-on-Chip

    Directory of Open Access Journals (Sweden)

    Roshan Duraisamy

    2007-02-01

    Full Text Available The secure establishment of cryptographic keys for symmetric encryption via key agreement protocols enables nodes in a network of embedded systems and remote agents to communicate securely in an insecure environment. In this paper, we propose a pure hardware implementation of a key agreement protocol, which uses the elliptic curve Diffie-Hellmann and digital signature algorithms and enables two parties, a remote agent and a networked embedded system, to establish a 128-bit symmetric key for encryption of all transmitted data via the advanced encryption scheme (AES. The resulting implementation is a protocol-on-chip that supports full 128-bit equivalent security (PoC-128. The PoC-128 has been implemented in an FPGA, but it can also be used as an IP within different embedded applications. As 128-bit security is conjectured valid for the foreseeable future, the PoC-128 goes well beyond the state of art in securing networked embedded devices.

  5. Native grass hydroseed development : establishment protocols for three native Hawaiian plants on roadside areas.

    Science.gov (United States)

    2012-08-01

    The biggest mistake with using native plants on Hawaiis roadways is to assume that native plants do not require : nutrient enhancement or supplemental water to establish on these sites. The establishment of native plants will : require a detailed ...

  6. A two-hypothesis approach to establishing a life detection/biohazard protocol for planetary samples

    Science.gov (United States)

    Conley, Catharine; Steele, Andrew

    2016-07-01

    The COSPAR policy on performing a biohazard assessment on samples brought from Mars to Earth is framed in the context of a concern for false-positive results. However, as noted during the 2012 Workshop for Life Detection in Samples from Mars (ref. Kminek et al., 2014), a more significant concern for planetary samples brought to Earth is false-negative results, because an undetected biohazard could increase risk to the Earth. This is the reason that stringent contamination control must be a high priority for all Category V Restricted Earth Return missions. A useful conceptual framework for addressing these concerns involves two complementary 'null' hypotheses: testing both of them, together, would allow statistical and community confidence to be developed regarding one or the other conclusion. As noted above, false negatives are of primary concern for safety of the Earth, so the 'Earth Safety null hypothesis' -- that must be disproved to assure low risk to the Earth from samples introduced by Category V Restricted Earth Return missions -- is 'There is native life in these samples.' False positives are of primary concern for Astrobiology, so the 'Astrobiology null hypothesis' -- that must be disproved in order to demonstrate the existence of extraterrestrial life is 'There is no life in these samples.' The presence of Earth contamination would render both of these hypotheses more difficult to disprove. Both these hypotheses can be tested following a strict science protocol; analyse, interprete, test the hypotheses and repeat. The science measurements undertaken are then done in an iterative fashion that responds to discovery with both hypotheses testable from interpretation of the scientific data. This is a robust, community involved activity that ensures maximum science return with minimal sample use.

  7. Establishment of national diagnostic reference levels for breast cancer CT protocols in radiation therapy.

    Science.gov (United States)

    Connor, Sean O'; Mc Ardle, Orla; Mullaney, Laura

    2016-10-01

    To establish whether CT dose variation occurs in breast cancer localization procedures between radiation therapy (RT) centres in Ireland and to propose diagnostic reference levels (DRLs) for this procedure. All RT centres in Ireland were invited to participate in a dose audit survey, providing data on the CT dose index volume (CTDIvol), dose-length product (DLP), current-time product (mAs), tube potential, scan length, slice thickness, scanning margins, use of automated exposure control (AEC) and scanner technology for 10 patients with breast cancer who were average sized. DRLs were derived for each dose descriptor by calculation of the rounded 75th percentile of the distribution of mean doses. Data were returned for 60 patients from 6 RT centres (50% response rate). Significant variation in mean CTDIvol and mean DLP was observed between centres (p CT dose variation occurs between centres, establishing a need for optimization. DRLs for breast cancer localization have been proposed with the potential for reduction in CT dose. This article provides the first reported DRL for breast cancer CT localization procedure in RT and can be used as a benchmark for comparison for other RT centres.

  8. "It's just what we do": a qualitative study of emergency nurses working with well-established family presence protocol.

    Science.gov (United States)

    Lowry, Elinar

    2012-07-01

    ENA has supported family presence at the bedside during resuscitation of a loved one since 1993. Limited support from health care institutions has resulted in research that includes few data from hospitals with long-term family presence experience. The study objectives were to (1) describe the benefit and harm of being present during resuscitation to family members, using perceptions of nurses who work in an emergency department with a well-established family presence protocol; and (2) define family presence using perceptions of nurse participants. A descriptive qualitative study was conducted in an emergency department that has had a written family presence protocol since 1992. Fourteen emergency nurses described their experience with family presence in face-to-face interviews using an investigator-developed, open-ended tool. Transcribed interviews were evaluated using conceptual content analysis. Nurses perceived benefits to family members in that 1) the family is able to see evolving events, described as a family member's ability to see a loved one's condition change over time, and 2) is able to validate efforts to save the life of their loved one. Nurses also indicated that family members' appreciation that everything possible was done increased nurses' confidence that they did everything they could during the resuscitation event. No nurses described observing actual harm to family members who were present during resuscitation. Emergency nurses can embrace family presence and influence benefits for family members when the practice is well established. Behavior modeling rather than written protocol may affect acceptance of family presence during resuscitation efforts among emergency nurses. Copyright © 2012 Emergency Nurses Association. Published by Mosby, Inc. All rights reserved.

  9. Subjecting Acute Ischemic Stroke Patients to Continuous Tube Feeding and an Intensive Computerized Protocol Establishes Tight Glycemic Control

    NARCIS (Netherlands)

    Kruyt, N. D.; Biessels, G. J.; Vriesendorp, T. M.; DeVries, J. H.; Hoekstra, J. B. L.; Elbers, P. W.; Kappelle, L. J.; Portegies, P.; Vermeulen, M.; Roos, Y. B. W. E. M.

    2010-01-01

    Introduction Tight glycemic control (TGC) after ischemic stroke may improve clinical outcome but previous studies failed to establish TGC, principally because of postprandial glucose surges. The aim of the present study was to investigate if safe, effective and feasible TGC can be achieved with

  10. Establishing a clinical phenotype for cachexia in end stage kidney disease - study protocol.

    Science.gov (United States)

    Reid, Joanne; Noble, Helen R; Adamson, Gary; Davenport, Andrew; Farrington, Ken; Fouque, Denis; Kalantar-Zadeh, Kamyar; Mallett, John; McKeaveney, C; Porter, S; Seres, David S; Shields, Joanne; Slee, Adrian; Witham, Miles D; Maxwell, Alexander P

    2018-02-13

    Surveys using traditional measures of nutritional status indicate that muscle wasting is common among persons with end-stage kidney disease (ESKD). Up to 75% of adults undergoing maintenance dialysis show some evidence of muscle wasting. ESKD is associated with an increase in inflammatory cytokines and can result in cachexia, with the loss of muscle and fat stores. At present, only limited data are available on the classification of wasting experienced by persons with ESKD. Individuals with ESKD often exhibit symptoms of anorexia, loss of lean muscle mass and altered energy expenditure. These symptoms are consistent with the syndrome of cachexia observed in other chronic diseases, such as cancer, heart failure, and acquired immune deficiency syndrome. While definitions of cachexia have been developed for some diseases, such as cardiac failure and cancer, no specific cachexia definition has been established for chronic kidney disease. The importance of developing a definition of cachexia in a population with ESKD is underscored by the negative impact that symptoms of cachexia have on quality of life and the association of cachexia with a substantially increased risk of premature mortality. The aim of this study is to determine the clinical phenotype of cachexia specific to individuals with ESKD. A longitudinal study which will recruit adult patients with ESKD receiving haemodialysis attending a Regional Nephrology Unit within the United Kingdom. Patients will be followed 2 monthly over 12 months and measurements of weight; lean muscle mass (bioelectrical impedance, mid upper arm muscle circumference and tricep skin fold thickness); muscle strength (hand held dynamometer), fatigue, anorexia and quality of life collected. We will determine if they experience (and to what degree) the known characteristics associated with cachexia. Cachexia is a debilitating condition associated with an extremely poor outcome. Definitions of cachexia in chronic illnesses are required

  11. [The effect of corifollitropin alfa on in vitro fertilization-ICSI patients with previous failure with an FSH/HMG protocol: Preliminary report in Mexico].

    Science.gov (United States)

    Barroso-Villa, J G; Colín-Valenzuela, A; Valdespín-Fierro, C; Ávila-Lombardo, R; Estrada-Gutiérrez, G

    2016-01-01

    The daily application of drugs, often in high doses, is a factor of stress for the infertile couple. During the last decade corifollitropin alpha has allowed a friendlier scheme comparable to traditional protocols (rFSH-HMG) results. To compare the results of corifollitropin alpha in patients with a previous cycle of IVF-ICSI with traditional scheme ovarian stimulation. Observational, retrospective cohort study type that infertile couples were included. No significant differences in the dose used HFRS (2023U/ total ± 712 vs 636 U/total ± 307) and serum estradiol day shooting HGCr (1972 pg/dL vs 1107 ± 1152 pg/dL ± 775). A higher pregnancy rate was found corifollitropin alpha perhaps because it was a second attempt at in vitro fertilization. Reproductive outcomes in a cycle of ovarian stimulation with corifollitropin are comparable with the results of a traditional ovarian stimulation cycle. It is important to broaden the experience of the drug indication in Mexican patients.

  12. Differences in quantitative assessment of myocardial scar and gray zone by LGE-CMR imaging using established gray zone protocols.

    Science.gov (United States)

    Mesubi, Olurotimi; Ego-Osuala, Kelechi; Jeudy, Jean; Purtilo, James; Synowski, Stephen; Abutaleb, Ameer; Niekoop, Michelle; Abdulghani, Mohammed; Asoglu, Ramazan; See, Vincent; Saliaris, Anastasios; Shorofsky, Stephen; Dickfeld, Timm

    2015-02-01

    Late gadolinium enhancement cardiac magnetic resonance (LGE-CMR) imaging is the gold standard for myocardial scar evaluation. Heterogeneous areas of scar ('gray zone'), may serve as arrhythmogenic substrate. Various gray zone protocols have been correlated to clinical outcomes and ventricular tachycardia channels. This study assessed the quantitative differences in gray zone and scar core sizes as defined by previously validated signal intensity (SI) threshold algorithms. High quality LGE-CMR images performed in 41 cardiomyopathy patients [ischemic (33) or non-ischemic (8)] were analyzed using previously validated SI threshold methods [Full Width at Half Maximum (FWHM), n-standard deviation (NSD) and modified-FWHM]. Myocardial scar was defined as scar core and gray zone using SI thresholds based on these methods. Scar core, gray zone and total scar sizes were then computed and compared among these models. The median gray zone mass was 2-3 times larger with FWHM (15 g, IQR: 8-26 g) compared to NSD or modified-FWHM (5 g, IQR: 3-9 g; and 8 g. IQR: 6-12 g respectively, p zone extent (percentage of total scar that was gray zone) also varied significantly among the three methods, 51 % (IQR: 42-61 %), 17 % (IQR: 11-21 %) versus 38 % (IQR: 33-43 %) for FWHM, NSD and modified-FWHM respectively (p zone and scar core. Infarct core and total myocardial scar mass also differ using these methods. Further evaluation of the most accurate quantification method is needed.

  13. Bill authorizing the ratification of the protocol amending the Protocol on transitional provisions annexed to the Treaty on European Union, to the Treaty on the Functioning of the European Union and to the Treaty establishing the European Atomic Energy Community

    International Nuclear Information System (INIS)

    2010-01-01

    After an indication of the European Parliament composition, this text describes the transitional provisions adopted as the Lisbon Treaty did not come into effect before the European elections held in June 2009. The document also provides the protocol text signed by the Members States and which amended the protocol on transitional provisions annexed to the Treaty on the European Union, to the Treaty on the Functioning of the European Union and to the Treaty establishing the European Atomic Energy Community. The last part of the document discusses the administrative and legal consequences of this protocol. It also recalls the history of the negotiations and indicates the present status of signatures and ratifications

  14. An experimental protocol for the establishment of dogs with long-term cellular immune reactions to Leishmania antigens

    Directory of Open Access Journals (Sweden)

    Márcia Cristina Aquino Teixeira

    2011-03-01

    Full Text Available Domestic dogs are considered to be the main reservoirs of zoonotic visceral leishmaniasis. In this work, we evaluated a protocol to induce Leishmania infantum/Leishmania chagasi-specific cellular and humoral immune responses in dogs, which consisted of two injections of Leishmania promastigote lysate followed by a subcutaneous inoculation of viable promastigotes. The primary objective was to establish a canine experimental model to provide positive controls for testing immune responses to Leishmania in laboratory conditions. After inoculation of viable promastigotes, specific proliferative responses of peripheral blood mononuclear cells (PBMCs to either Leishmania lysate or recombinant proteins, the in vitro production of interferon-γ by antigen-stimulated PBMCs and a significant increase in circulating levels of anti-Leishmania antibodies were observed. The immunized dogs also displayed positive delayed-type hypersensitivity reactions to Leishmania crude antigens and to purified recombinant proteins. An important finding that supports the suitability of the dogs as positive controls is that they remained healthy for the entire observation period, i.e., more than seven years after infection. Following the Leishmania antigen lysate injections, the infection of dogs by the subcutaneous route appears to induce a sustained cellular immune response, leading to an asymptomatic infection. This provides a useful model for both the selection of immunogenic Leishmania antigens and for immunobiological studies on their possible immunoprotective activities.

  15. Establishing a protocol for immunocytochemical staining and chromogenic in situ hybridization of Giemsa and Diff-Quick prestained cytological smears

    Directory of Open Access Journals (Sweden)

    Elsa Beraki

    2012-01-01

    Full Text Available Background: Protocols for immunocytochemical staining (ICC and in situ hybridization (ISH of air-dried Diff-Quick or May-Grünwald Giemsa (MGG-stained smears have been difficult to establish. An increasing need to be able to use prestained slides for ICC and ISH in specific cases led to this study, aiming at finding a robust protocol for both methods. Materials and Methods: The material consisted of MGG- and Diff-Quick-stained smears. After diagnosis, one to two diagnostic smears were stored in the department. Any additional smear(s containing diagnostic material were used for this study. The majority were fine needle aspirates (FNAC from the breast, comprising materials from fibroadenomas, fibrocystic disease, and carcinomas. A few were metastatic lesions (carcinomas and malignant melanomas. There were 64 prestained smears. Ten smears were Diff-Quick stained, and 54 were MGG stained. The antibodies used for testing ICC were Ki-67, ER, and PgR, CK MNF116 (pancytokeratin and E-cadherin. HER-2 Dual SISH was used to test ISH. Citrate, TRS, and TE buffers at pH6 and pH9 were tested, as well as, different heating times, microwave powers and antibody concentrations. The ICC was done on the Dako Autostainer (Dako®, Glostrup, Denmark, and HER-2 Dual SISH was done on the Ventana XT-machine (Ventana / Roche® , Strasbourg, France. Results: Optimal results were obtained with the TE buffer at pH 9, for both ICC and ISH. Antibody concentrations generally had to be higher than in the immunohistochemistry (IHC. The optimal microwave heat treatment included an initial high power boiling followed by low power boiling. No post fixation was necessary for ICC, whereas, 20 minutes post fixation in formalin (4% was necessary for ISH. Conclusions: Microwave heat treatment, with initial boiling at high power followed by boiling at low power and TE buffer at pH 9 were the key steps in the procedure. Antibody concentrations has to be adapted for each ICC marker. Post

  16. Establishment of an efficient plant regeneration culture protocol and achievement of successful genetic transformation in Jatropha curcas L.

    Science.gov (United States)

    Liu, Ying; Liu, Guoxuan; Yang, Yali; Niu, Sufang; Yang, Fuguang; Yang, Shaoxia; Tang, Jianian; Chen, Jianping

    2017-12-01

    An efficient and reproducible protocol is described for shoot-bud regeneration and Agrobacterium tumefaciens-mediated genetic transformation of J. curcas. Treating the explants with high concentrations (5-120 mg/L) of TDZ for short durations (5-80 min) before inoculation culture increased significantly the regeneration frequency and improved the quality of the regenerated buds. The highest shoot-buds induction rate (87.35%) was achieved when petiole explants were treated with 20 mg/L TDZ solution for 20 min and inoculated on hormone-free MS medium for 30 days. Regenerated shoots of 0.5 cm or a little longer were isolated and grafted to seedling stocks of the same species, and then the grafted plantlets were planted on half-strength MS medium containing 0.1 mg/L IBA and 2 mg/L sodium nitroprusside (SNP). This grafting strategy was found to be very effective, to obtain that healthy grafted plantlets ready for acclimatization within 20 days. By the above mentioned protocol and with general Agrobacterium - mediated genetic transformation methods only 65 days were needed to obtain intact transgenic plants.

  17. Concurrent Chemoradiotherapy Followed by Consolidation Chemotherapy With Bi-Weekly Docetaxel and Carboplatin for Stage III Unresectable, Non-Small-Cell Lung Cancer: Clinical Application of a Protocol Used in a Previous Phase II Study

    International Nuclear Information System (INIS)

    Saitoh, Jun-Ichi; Saito, Yoshihiro; Kazumoto, Tomoko; Kudo, Shigehiro; Yoshida, Daisaku; Ichikawa, Akihiro; Sakai, Hiroshi; Kurimoto, Futoshi; Kato, Shingo; Shibuya, Kei

    2012-01-01

    Purpose: To assess the clinical applicability of a protocol evaluated in a previously reported phase II study of concurrent chemoradiotherapy followed by consolidation chemotherapy with bi-weekly docetaxel and carboplatin in patients with stage III, unresectable, non-small-cell lung cancer (NSCLC). Methods and Materials: Between January 2000 and March 2006, 116 previously untreated patients with histologically proven, stage III NSCLC were treated with concurrent chemoradiotherapy. Radiation therapy was administered in 2-Gy daily fractions to a total dose of 60 Gy in combination with docetaxel, 30 mg/m 2 , and carboplatin at an area under the curve value of 3 every 2 weeks during and after radiation therapy. Results: The median survival time for the entire group was 25.5 months. The actuarial 2-year and 5-year overall survival rates were 53% and 31%, respectively. The 3-year cause-specific survival rate was 60% in patients with stage IIIA disease, whereas it was 35% in patients with stage IIIB disease (p = 0.007). The actuarial 2-year and 5-year local control rates were 62% and 55%, respectively. Acute hematologic toxicities of Grade ≥3 severity were observed in 20.7% of patients, while radiation pneumonitis and esophagitis of Grade ≥3 severity were observed in 2.6% and 1.7% of patients, respectively. Conclusions: The feasibility of the protocol used in the previous phase II study was reconfirmed in this series, and excellent treatment results were achieved.

  18. Concurrent Chemoradiotherapy Followed by Consolidation Chemotherapy With Bi-Weekly Docetaxel and Carboplatin for Stage III Unresectable, Non-Small-Cell Lung Cancer: Clinical Application of a Protocol Used in a Previous Phase II Study

    Energy Technology Data Exchange (ETDEWEB)

    Saitoh, Jun-Ichi, E-mail: junsaito@sannet.ne.jp [Division of Radiation Oncology, Saitama Cancer Center, Saitama (Japan); Saito, Yoshihiro; Kazumoto, Tomoko; Kudo, Shigehiro; Yoshida, Daisaku; Ichikawa, Akihiro [Division of Radiation Oncology, Saitama Cancer Center, Saitama (Japan); Sakai, Hiroshi; Kurimoto, Futoshi [Division of Respiratory Disease, Saitama Cancer Center, Saitama (Japan); Kato, Shingo [Research Center Hospital for Charged Particle Therapy, National Institute of Radiological Sciences, Chiba (Japan); Shibuya, Kei [Department of Radiation Oncology, Gunma University Graduate School of Medicine, Gunma (Japan)

    2012-04-01

    Purpose: To assess the clinical applicability of a protocol evaluated in a previously reported phase II study of concurrent chemoradiotherapy followed by consolidation chemotherapy with bi-weekly docetaxel and carboplatin in patients with stage III, unresectable, non-small-cell lung cancer (NSCLC). Methods and Materials: Between January 2000 and March 2006, 116 previously untreated patients with histologically proven, stage III NSCLC were treated with concurrent chemoradiotherapy. Radiation therapy was administered in 2-Gy daily fractions to a total dose of 60 Gy in combination with docetaxel, 30 mg/m{sup 2}, and carboplatin at an area under the curve value of 3 every 2 weeks during and after radiation therapy. Results: The median survival time for the entire group was 25.5 months. The actuarial 2-year and 5-year overall survival rates were 53% and 31%, respectively. The 3-year cause-specific survival rate was 60% in patients with stage IIIA disease, whereas it was 35% in patients with stage IIIB disease (p = 0.007). The actuarial 2-year and 5-year local control rates were 62% and 55%, respectively. Acute hematologic toxicities of Grade {>=}3 severity were observed in 20.7% of patients, while radiation pneumonitis and esophagitis of Grade {>=}3 severity were observed in 2.6% and 1.7% of patients, respectively. Conclusions: The feasibility of the protocol used in the previous phase II study was reconfirmed in this series, and excellent treatment results were achieved.

  19. Manufacturing and use of human placenta-derived mesenchymal stromal cells for phase I clinical trials: Establishment and evaluation of a protocol

    Directory of Open Access Journals (Sweden)

    Ilić Nina

    2014-01-01

    Full Text Available Background/Aim. Mesenchymal stromal cells (MSCs have been utilised in many clinical trials as an experimental treatment in numerous clinical settings. Bone marrow remains the traditional source tissue for MSCs but is relatively hard to access in large volumes. Alternatively, MSCs may be derived from other tissues including the placenta and adipose tissue. In an initial study no obvious differences in parameters such as cell surface phenotype, chemokine receptor display, mesodermal differentiation capacity or immunosuppressive ability, were detected when we compared human marrow derived- MSCs to human placenta-derived MSCs. The aim of this study was to establish and evaluate a protocol and related processes for preparation placenta-derived MSCs for early phase clinical trials. Methods. A full-term placenta was taken after delivery of the baby as a source of MSCs. Isolation, seeding, incubation, cryopreservation of human placentaderived MSCs and used production release criteria were in accordance with the complex regulatory requirements applicable to Code of Good Manufacturing Practice manufacturing of ex vivo expanded cells. Results. We established and evaluated instructions for MSCs preparation protocol and gave an overview of the three clinical areas application. In the first trial, MSCs were co-transplanted iv to patient receiving an allogeneic cord blood transplant as therapy for treatmentrefractory acute myeloid leukemia. In the second trial, MSCs were administered iv in the treatment of idiopathic pulmonary fibrosis and without serious adverse effects. In the third trial, MSCs were injected directly into the site of tendon damage using ultrasound guidance in the treatment of chronic refractory tendinopathy. Conclusion. Clinical trials using both allogeneic and autologous cells demonstrated MSCs to be safe. A described protocol for human placenta-derived MSCs is appropriate for use in a clinical setting, relatively inexpensive and can be

  20. Standardized Outcomes in Nephrology-Peritoneal Dialysis (SONG-PD): Study Protocol for Establishing a Core Outcome Set in PD.

    Science.gov (United States)

    Manera, Karine E; Tong, Allison; Craig, Jonathan C; Brown, Edwina A; Brunier, Gillian; Dong, Jie; Dunning, Tony; Mehrotra, Rajnish; Naicker, Sarala; Pecoits-Filho, Roberto; Perl, Jeffrey; Wang, Angela Y; Wilkie, Martin; Howell, Martin; Sautenet, Benedicte; Evangelidis, Nicole; Shen, Jenny I; Johnson, David W

    2017-01-01

    Worldwide, approximately 11% of patients on dialysis receive peritoneal dialysis (PD). Whilst PD may offer more autonomy to patients compared with hemodialysis, patient and caregiver burnout, technique failure, and peritonitis remain major challenges to the success of PD. Improvements in care and outcomes are likely to be mediated by randomized trials of innovative therapies, but will be limited if the outcomes measured and reported are not important for patients and clinicians. The aim of the Standardised Outcomes in Nephrology-Peritoneal Dialysis (SONG-PD) study is to establish a set of core outcomes for trials in patients on PD based on the shared priorities of all stakeholders, so that outcomes of most relevance for decision-making can be evaluated, and that interventions can be compared reliably. The 5 phases in the SONG-PD project are: a systematic review to identify outcomes and outcome measures that have been reported in randomized trials involving patients on PD; focus groups using nominal group technique with patients and caregivers to identify, rank, and describe reasons for their choice of outcomes; semi-structured key informant interviews with health professionals; a 3-round international Delphi survey involving a multi-stakeholder panel; and a consensus workshop to review and endorse the proposed set of core outcome domains for PD trials. The establishment of 3 to 5 high-priority core outcomes, to be measured and reported consistently in all trials in PD, will enable patients and clinicians to make informed decisions about the relative effectiveness of interventions, based upon outcomes of common importance. Copyright © 2017 International Society for Peritoneal Dialysis.

  1. Convention on the establishment of a security control in the field of nuclear energy. Protocol on the tribunal established by the convention on the establishment of a security control in the field of nuclear energy

    International Nuclear Information System (INIS)

    1957-01-01

    The governments of Germany, Austria, Belgium, Denmark, France, Greece, Ireland, Iceland, Italy, Luxembourg, Norway, Netherlands, Portugal, United Kingdom, Sweden, Switzerland and Turkey, having resolved to promote the development of the production and uses of nuclear energy in the Member countries of the Organisation for European Economic Co-operation between these countries and the harmonisation of national measures; considering that the joint action undertaken to this end in the Organisation is intended to develop the European nuclear industry for purely peaceful ends and must not further any military purpose; considering that at its meeting of' 18 July, 1956, the Council of the Organisation decided to establish to this effect an international security control; considering that by a Decision dated this day the Council has established, within the Organisation, a European Nuclear Energy Agency with the task of pursuing the joint action undertaken; have agreed the present convention. The governments party to the Convention, desirous of determining in accordance with Article 12 of the Convention the organisation of the Tribunal established by the said Article and the status of its judges; have agreed upon the provisions which are annexed to the Convention

  2. Junk-food enhances conditioned food cup approach to a previously established food cue, but does not alter cue potentiated feeding; implications for the effects of palatable diets on incentive motivation.

    Science.gov (United States)

    Derman, Rifka C; Ferrario, Carrie R

    2018-03-16

    Efforts to stem the global rise in obesity have been minimally effective, perhaps in part because our understanding of the psychological and behavioral drivers of obesity is limited. It is well established that stimuli that are paired with palatable foods can powerfully influence food-seeking and feeding behaviors. However, how consumption of sugary, fatty "junk-foods" affects these motivational responses to food cues is poorly understood. Here, we determined the effects of short- and long-term "junk-food" consumption on the expression of cue potentiated feeding and conditioned food cup approach to Pavlovian conditioned stimuli (CS). Further, to determine the degree to which effects of "junk-food" were selective to Pavlovian motivational processes, we varied the predictive validity of the CS by including training groups conditioned with unique CS-US contingencies ranging from -1.0 to +1.0. "Junk-food" did not enhance cue potentiated feeding in any group, but expression of this potentiation effect varied with the CS-US contingency independent of diet. In contrast, "junk-food" consistently enhanced conditioned approach to the food cup; this effect was dependent on the previously established CS-US contingency. That is, consumption of "junk-food" following training enhanced approach to the food cup only in response to CSs with previously positive CS-US contingencies. This was accompanied by reduced motivation for the US itself. Together these data show that "junk-food" consumption selectively enhances incentive motivational responses to previously established food CSs, without altering cue potentiated feeding induced by these same CSs, and in the absence of enhanced motivation for food itself. Copyright © 2018 Elsevier Inc. All rights reserved.

  3. Establishing a dose-response relationship between acute resistance-exercise and the immune system: Protocol for a systematic review.

    Science.gov (United States)

    Szlezak, Adam Michael; Szlezak, Siri Lauluten; Keane, James; Tajouri, Lotti; Minahan, Clare

    2016-12-01

    Exercise immunology research has traditionally focussed on aerobic-exercise, however it has become apparent in more recent years that resistance-exercise can also considerably affect host immunobiology. To date however, no systematic process has been used to establish a dose-response relationship between resistance-exercise and the immune system. The present systematic review was thus conducted to determine the dose-response effects of a bout of resistance-exercise on acute leukocyte counts. In accordance with the PRISMA guidelines, a systematic literature search was conducted in the electronic databases, PubMed, Web of Science, and Google Scholar, over the date range of 1989-2016. Following the PICO elements, eligibility criteria included: i) participants: healthy humans aged 18-40; ii) intervention: a single bout of resistance-exercise; iii) comparator: at least one comparator group; iv) outcome: acute measures of circulating leukocyte counts. Specific exclusion criteria were also applied. Risk of bias and quality of evidence was assessed using the PEDro scale. Due to the individual designs of the admitted studies, a qualitative analysis (systematic narrative synthesis) was employed in the present review. The results of the present review demonstrate that a single bout of resistance-exercise induces an acute monocytosis, neutrophilia, and lymphocytosis. It became apparent that the reviewed literature either does not consistently specify, or does not describe with sufficient detail, the time-course between the onset of exercise and the collection of blood. We recommend that researchers consider addressing this in future studies, and also collect blood measures during exercise to aid with comparison of temporal effects. Regarding the determination of a dose-response relationship, an acute neutrophilia, monocytosis and lymphocytosis appears to occur more rapidly and to a greater magnitude following a single bout of high-dose vs low-dose resistance

  4. Establishing core outcome sets for phenylketonuria (PKU) and medium-chain Acyl-CoA dehydrogenase (MCAD) deficiency in children: study protocol for systematic reviews and Delphi surveys.

    Science.gov (United States)

    Potter, Beth K; Hutton, Brian; Clifford, Tammy J; Pallone, Nicole; Smith, Maureen; Stockler, Sylvia; Chakraborty, Pranesh; Barbeau, Pauline; Garritty, Chantelle M; Pugliese, Michael; Rahman, Alvi; Skidmore, Becky; Tessier, Laure; Tingley, Kylie; Coyle, Doug; Greenberg, Cheryl R; Korngut, Lawrence; MacKenzie, Alex; Mitchell, John J; Nicholls, Stuart; Offringa, Martin; Schulze, Andreas; Taljaard, Monica

    2017-12-19

    Inherited metabolic diseases (IMD) are a large group of rare single-gene disorders that are typically diagnosed early in life. There are important evidence gaps related to the comparative effectiveness of therapies for IMD, which are in part due to challenges in conducting randomized controlled trials (RCTs) for rare diseases. Registry-based RCTs present a unique opportunity to address these challenges provided the registries implement standardized collection of outcomes that are important to patients and their caregivers and to clinical providers and healthcare systems. Currently there is no core outcome set (COS) for studies evaluating interventions for paediatric IMD. This protocol outlines a study that will establish COS for each of two relatively common IMD in children, phenylketonuria (PKU) and medium-chain acyl-CoA dehydrogenase (MCAD) deficiency. This two-part study is registered with the Core Outcome Measures in Effectiveness Trials (COMET) initiative. Part 1 includes a rapid review and development of an evidence map to identify a comprehensive listing of outcomes reported in past studies of PKU and MCAD deficiency. The review follows established methods for knowledge synthesis, including a comprehensive search strategy, two stages of screening citations against inclusion/exclusion criteria by two reviewers working independently, and extraction of important data elements from eligible studies, including details of the outcomes collected and outcome measurement instruments. The review findings will inform part 2 of our study, a set of Delphi surveys to establish consensus on the highest priority outcomes for each condition. Healthcare providers, families of children with PKU or MCAD deficiency, and health system decision-makers will be invited to participate in two to three rounds of Delphi surveys. The design of the surveys will involve parents of children with IMD who are part of a family advisory forum. This protocol is a crucial step in developing the

  5. Establishment of a genome-wide and quantitative protocol for assessment of transcriptional activity at human retrotransposon L1 antisense promoters.

    Science.gov (United States)

    Ishiguro, Koichi; Higashino, Saneyuki; Hirakawa, Hideki; Sato, Shusei; Aizawa, Yasunori

    2017-04-03

    Long interspersed element 1 (L1) retrotransposon sequences are widespread in the human genome, occupying ~500,000 locations. The majority of L1s have lost their retrotransposition capability, although a significant population of human L1s maintains bidirectional transcriptional activity from the internal promoter. While the sense promoter drives transcription of the entire L1 mRNA and leads to L1 retrotransposition, the antisense promoter (ASP) transcribes L1-gene chimeric RNAs that include neighboring exon sequences. Activation mechanisms and functional impacts of L1ASP transcription are thought to vary at every L1ASP location. To explore the locus-specific regulation and function of L1ASP transcription, quantitative methodology is necessary for identifying the genomic positions of highly active L1ASPs on a genome-wide scale. Here, we employed deep-sequencing techniques and built a 3' RACE-based experimental and bioinformatics protocol, named the L1 antisense transcriptome protocol (LATRAP). In LATRAP, the PCR primer and the read mapping scheme were designed to reduce false positives and negatives, which may have been included as hits in previous cloning studies. LATRAP was here applied to the A549 human lung cancer cell line, and 313 L1ASP loci were detected to have transcriptional activity but differed in the number of mapped reads by four orders of magnitude. This indicates that transcriptional activities of the individual L1ASPs can vary greatly and that only a small population of L1ASP loci is active within a single nucleus. LATRAP is the first experimental method for ranking L1ASPs according to their transcriptional activity and will thus open a new avenue to unveiling the locus-specific biology of L1ASPs.

  6. Study protocol of a phase II clinical trial (KSCC1501A) examining oxaliplatin + S-1 for treatment of HER2-negative advanced/recurrent gastric cancer previously untreated with chemotherapy.

    Science.gov (United States)

    Saeki, Hiroshi; Emi, Yasunori; Oki, Eiji; Tokunaga, Shoji; Kakeji, Yoshihiro; Akagi, Yoshito; Baba, Hideo; Baba, Eishi; Maehara, Yoshihiko

    2018-01-08

    Oxaliplatin + S-1 is a recognized treatment regimen in Japan, but there are no Japanese clinical data on an oxaliplatin dose of 130 mg/m 2 . The current research involves a single-arm, prospective, phase II clinical trial to examine the efficacy and safety of oxaliplatin + S-1 with an oxaliplatin dose of 130 mg/m 2 to treat HER2-negative advanced/recurrent gastric cancer previously untreated with chemotherapy in Japan. The primary endpoint of this trial will be the response rate, and the secondary endpoints will be the safety profile of oxaliplatin + S-1, progression-free survival, the response rate in subjects under the age of 75, overall survival, time to treatment failure, duration of treatment, time to failure of strategy, and dose intensity. The threshold response rate is 45% and the expected response rate is 60%. Assuming that a one-tailed score test will be performed with an α of 0.05, 68 patients are needed to ensure a statistical power of 80%. Planned enrollment is 70 subjects and the total duration of this trial is expected to be 3 years. Since replacing cisplatin with oxaliplatin should provide the same level of therapeutic efficacy while limiting adverse events and simplifying treatment, oxaliplatin + S-1 may be increasingly used to treat gastric cancer in Japan. Verifying the efficacy and safety of oxaliplatin + S-1 with an oxaliplatin dose of 130 mg is an important task that the current trial has set out to achieve. The protocol was registered at the website of the University Hospital Medical Information Network (UMIN), Japan (protocol ID UMIN000017550) on May 29, 2015. The details are available at the following web address: http://www.umin.ac.jp/ctr/ .

  7. A school-based program implemented by community providers previously trained for the prevention of eating and weight-related problems in secondary-school adolescents: the MABIC study protocol

    Science.gov (United States)

    2013-01-01

    Background The prevention of eating disorders and disordered eating are increasingly recognized as public health priorities. Challenges in this field included moving from efficacy to effectiveness and developing an integrated approach to the prevention of a broad spectrum of eating and weight-related problems. A previous efficacy trial indicated that a universal disordered eating prevention program, based on the social cognitive model, media literacy educational approach and cognitive dissonance theory, reduced risk factors for disordered eating, but it is unclear whether this program has effects under more real-world conditions. The main aim of this effectiveness trial protocol is to test whether this program has effects when incorporating an integrated approach to prevention and when previously-trained community providers implement the intervention. Methods/design The research design involved a multi-center non-randomized controlled trial with baseline, post and 1-year follow-up measures. Six schools from the city of Sabadell (close to Barcelona) participated in the intervention group, and eleven schools from four towns neighboring Sabadell participated in the control group. A total of 174 girls and 180 boys in the intervention group, and 484 girls and 490 boys in the control group were registered in class lists prior to baseline. A total of 18 community providers, secondary-school class tutors, nurses from the Catalan Government’s Health and School Program, and health promotion technicians from Sabadell City Council were trained and delivered the program. Shared risk factors of eating and weight-related problems were assessed as main measures. Discussion It will be vital for progress in disordered eating prevention to conduct effectiveness trials, which test whether interventions are effective when delivered by community providers under ecologically valid conditions, as opposed to tightly controlled research trials. The MABIC project will provide new

  8. A school-based program implemented by community providers previously trained for the prevention of eating and weight-related problems in secondary-school adolescents: the MABIC study protocol.

    Science.gov (United States)

    Sánchez-Carracedo, David; López-Guimerà, Gemma; Fauquet, Jordi; Barrada, Juan Ramón; Pàmias, Montserrat; Puntí, Joaquim; Querol, Mireia; Trepat, Esther

    2013-10-12

    The prevention of eating disorders and disordered eating are increasingly recognized as public health priorities. Challenges in this field included moving from efficacy to effectiveness and developing an integrated approach to the prevention of a broad spectrum of eating and weight-related problems. A previous efficacy trial indicated that a universal disordered eating prevention program, based on the social cognitive model, media literacy educational approach and cognitive dissonance theory, reduced risk factors for disordered eating, but it is unclear whether this program has effects under more real-world conditions. The main aim of this effectiveness trial protocol is to test whether this program has effects when incorporating an integrated approach to prevention and when previously-trained community providers implement the intervention. The research design involved a multi-center non-randomized controlled trial with baseline, post and 1-year follow-up measures. Six schools from the city of Sabadell (close to Barcelona) participated in the intervention group, and eleven schools from four towns neighboring Sabadell participated in the control group. A total of 174 girls and 180 boys in the intervention group, and 484 girls and 490 boys in the control group were registered in class lists prior to baseline. A total of 18 community providers, secondary-school class tutors, nurses from the Catalan Government's Health and School Program, and health promotion technicians from Sabadell City Council were trained and delivered the program. Shared risk factors of eating and weight-related problems were assessed as main measures. It will be vital for progress in disordered eating prevention to conduct effectiveness trials, which test whether interventions are effective when delivered by community providers under ecologically valid conditions, as opposed to tightly controlled research trials. The MABIC project will provide new contributions in this transition from efficacy

  9. Establishing anchor-based minimally important differences (MID) with the EORTC quality-of-life measures: a meta-analysis protocol.

    Science.gov (United States)

    Musoro, Zebedee Jammbe; Hamel, Jean-Francois; Ediebah, Divine Ewane; Cocks, Kim; King, Madeleine T; Groenvold, Mogens; Sprangers, Mirjam A G; Brandberg, Yvonne; Velikova, Galina; Maringwa, John; Flechtner, Hans-Henning; Bottomley, Andrew; Coens, Corneel

    2018-01-10

    As patient assessment of health-related quality of life (HRQOL) in cancer clinical trials has increased over the years, so has the need to attach meaningful interpretations to differences in HRQOL scores between groups and changes within groups. Determining what represents a minimally important difference (MID) in HRQOL scores is useful to clinicians, patients and researchers, and can be used as a benchmark for assessing the success of a healthcare intervention. Our objective is to provide an evidence-based protocol to determine MIDs for the European Organisation for Research and Treatment for Cancer Quality of life Questionnaire core 30 (EORTC QLQ-C30). We will mainly focus on MID estimation for group-level comparisons. Responder thresholds for individual-level change will also be estimated. Data will be derived from published phase II and III EORTC trials that used the QLQ-C30 instrument, covering several cancer sites. We will use individual patient data to estimate MIDs for different cancer sites separately. Focus is on anchor-based methods. Anchors will be selected per disease site from available data. A disease-oriented and methodological panel will provide independent guidance on anchor selection. We aim to construct multiple clinical anchors per QLQ-C30 scale and also to compare with several anchor-based methods. The effects of covariates, for example, gender, age, disease stage and so on, will also be investigated. We will examine how our estimated MIDs compare with previously published guidelines, hence further contributing to robust MID guidelines for the EORTC QLQ-C30. All patient data originate from completed clinical trials with mandatory written informed consent, approved by local ethical committees. Our findings will be presented at scientific conferences, disseminated via peer-reviewed publications and also compiled in a MID 'blue book' which will be made available online on the EORTC Quality of Life Group website as a free guideline document.

  10. Estabelecimento de protocolo para micropropagação de Lippia gracilis Schauer Establishment of protocol for Lippia gracilis Schauer micropropagation

    Directory of Open Access Journals (Sweden)

    M.J.M Marinho

    2011-01-01

    Full Text Available A espécie Lippia gracilis SCHAUER (Verbenaceae é nativa do Nordeste brasileiro e se destaca pela capacidade de acumular nos tricomas glandulares óleos essenciais com atividade antimicrobiana. Tendo em vista que não constam trabalhos na literatura sobre o estabelecimento in vitro dessa espécie, este trabalho teve como objetivo estabelecer protocolo para micropropagação de L. gracilis. Para tanto, ramos contendo folhas foram coletados de plantas matrizes no habitat natural para a confecção de estacas. Em laboratório, os explantes provenientes do processo de estaquia foram assepticamente tratados e inoculados em meio MS, acrescido de fitorreguladores, com o intuito de se estabelecer a melhor dose para o desenvolvimento dos explantes. Em decorrência de altos níveis de contaminação, avaliou-se o efeito da cefalexina. No entanto, apesar do antibiótico ter apresentado diminuição na contaminação bacteriana, a porcentagem de oxidação foi elevada. Portanto, testou-se o carvão ativado, ácido ascórbico, ácido cítrico e metade dos sais de MS quanto a eficiência no controle da oxidação. Concluiu-se que, o antibiótico na concentração utilizada provocou a oxidação dos explantes e os fitorreguladores, bem como os métodos antioxidantes testados, não apresentaram resultados consistentes para o melhor desenvolvimento dos explantes e controle da oxidação, respectivamente.The species Lippia gracilis Schauer (Verbenaceae is native to Northeastern Brazil and has been important for its ability to accumulate essential oils with antimicrobial activity in the glandular trichomes. Since there are no reports in the literature on the micropropagation of this species, the present work aimed to establish a protocol for L. gracilis micropropagation. Thus, branches containing leaves were collected from plant matrices in their natural habitat to prepare cuttings. In the laboratory, explants from cutting were aseptically treated and inoculated

  11. Immunochemical protocols

    National Research Council Canada - National Science Library

    Pound, John D

    1998-01-01

    ... easy and important refinements often are not published. This much anticipated 2nd edition of Immunochemzcal Protocols therefore aims to provide a user-friendly up-to-date handbook of reliable techniques selected to suit the needs of molecular biologists. It covers the full breadth of the relevant established immunochemical methods, from protein blotting and immunoa...

  12. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...... of communication protocols. With it, partners can suggest a new protocol by sending its specification. After formally verifying the specification, each partner generates an implementation, which can then be used for establishing communication. We also present a practical realisation of the Protocol Implementation...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....

  13. [Nutritional risk evaluation and establishment of nutritional support in oncology patients according to the protocol of the Spanish Nutrition and Cancer Group].

    Science.gov (United States)

    Marín Caro, M M; Gómez Candela, C; Castillo Rabaneda, R; Lourenço Nogueira, T; García Huerta, M; Loria Kohen, V; Villarino Sanz, M; Zamora Auñón, P; Luengo Pérez, L; Robledo Sáenz, P; López-Portabella, C; Zarazaga Monzón, A; Espinosa Rojas, J; Nogués Boqueras, Raquel; Rodríguez Suárez, L; Celaya Pérez, S; Pardo Masferrer, J

    2008-01-01

    Cancer and its oncological treatment cause symptoms which increase the patients risk to suffer from malnutrition. This affects the patients health status negatively by increasing the number of complications, reducing the tolerance to the oncology treatment and a decrease of the patients quality of life. Motivated by this, a group of health professionals from several spanish regions met with the backing of the Sociedad Española de Nutrición Básica y Aplicada (SENBA) to address strategies to improve the quality of nutritional intervention in cancer patients. This multidisciplinary group developed a protocol describing nutritional assessment and intervention in form of algorithms based on literature and personal experience. The patients are classified in a three step process: 1. type of their oncology treatment (curative or palliative); 2. nutritional risk of the antineoplastic therapy (low, medium or high risk) and 3. depending on the Subjective Global Assessment patient-generated (SGA-pg). The patients are classified as: A. patients with adequate nutritional state, B. patients with malnutrition or risk of malnutrition and C. patients suffering from severe malnutrition. During one year, the protocol has been used for 226 randomly chosen female and male patients older than 18 years. They were treated by the Medical and Radiotherapy Oncology outpatient clinic. More than a half of the patients were suffering from malnutrition (64%) increasing up to 81% for patients undergoing palliative treatment. Most of them were treated curatively (83%) and received oncology treatment with moderate or high nutritional risk (69%). 68% of patients were affected by some feeding difficulty. The mean percentage of weight loss has been 6.64% +/- 0.87 (min 0%, max 33%). Albumin values of 32% of the patients were between 3 and 3.5 g/dl and negatively correlated with feeding difficulties (p = 0.001). The body mass index (BMI) has not found to be a significant parameter for detecting

  14. Government Decree No 30/85 approving accession to the Convention for the Establishment of a European Organization for nuclear Research and its Financial Protocol

    International Nuclear Information System (INIS)

    1985-01-01

    By this Decree of 18 July 1985 the Government has approved Portugal's accession to CERN, which now counts 14 Members. The purpose of CERN is to provide for collaboration among European states in nuclear research of a scientific and fundamental character and it has established an international laboratory to carry out research relating to high-energy physics. (NEA) [fr

  15. Optimisation of the measurement protocols of 129I and 129I/127I. Methodology establishment for the measurement in environmental matrices

    International Nuclear Information System (INIS)

    Frechou, C.

    2000-01-01

    129 I, is a natural long-lived isotope, with a half-life of 15,7 million years, also artificially produced in nuclear power plant. It is then released in the liquid and gaseous effluents of the nuclear fuel reprocessing plants. 129 I is integrated in all biological compartments at different activity levels, depending on their distance from the emission source and their ability to metabolize iodine. Performances of the different 129 I and 129 I/ 127 I measurement techniques available: Radiochemical Neutron Activation Analysis, Accelerator Mass Spectrometry, direct γ-X spectrometry and liquid scintillation were evaluated. Associated radiochemical preparation steps of the two first techniques were optimized and adapted to the characteristics of the major environmental matrices. In a first step, the radiochemical protocols were developed and validated. In a second step, intercomparison exercises have been lead on various environmental samples presenting different 129 I activity levels. They showed the good agreement between the results given by the three techniques on different environmental matrices with activities between 0,2 and 200 Bq.kg -1 dry weight. As a conclusion, a methodology for the measurement of 129 I and 129 I/ 127 I ratio in environmental samples is proposed. It includes a decisional diagram taking into account the characteristics of the matrices, the detection limits and the answer delay. A study on the losses of 129 I during the calcination of an algae was lead by direct γ-X spectrometry and application studies were made to measure 129 I levels in different biological compartments issued from various locations: 129 I activity interspecific variation in different species of seaweeds from the French channel coast under the relative influence of La Hague, 129 I levels in bovine thyroids from the Cotentin area and 129 I in vegetal samples collected around the nuclear reprocessing plant of Marcoule. (author)

  16. CONSIDER - Core Outcome Set in IAD Research: study protocol for establishing a core set of outcomes and measurements in incontinence-associated dermatitis research.

    Science.gov (United States)

    Van den Bussche, Karen; De Meyer, Dorien; Van Damme, Nele; Kottner, Jan; Beeckman, Dimitri

    2017-10-01

    This study protocol describes the methodology for the development of a core set of outcomes and a core set of measurements for incontinence-associated dermatitis. Incontinence is a widespread disorder with an important impact on quality of life. One of the most common complications is incontinence-associated dermatitis, resulting from chemical and physical irritation of the skin barrier, triggering inflammation and skin damage. Managing incontinence-associated dermatitis is an important challenge for nurses. Several interventions have been assessed in clinical trials, but heterogeneity in study outcomes complicates the comparability and standardization. To overcome this challenge, the development of a core outcome set, a minimum set of outcomes and measurements to be assessed in clinical research, is needed. A project team, International Steering Committee and panelists will be involved to guide the development of the core outcome set. The framework of the Harmonizing Outcomes Measures for Eczema roadmap endorsed by Cochrane Skin Group Core Outcomes Set Initiative, is used to inform the project design. A systematic literature review, interviews to integrate the patients' perspective and a consensus study with healthcare researchers and providers using the Delphi procedure will be performed. The project was approved by the Ethics review Committee (April 2016). This is the first project that will identify a core outcome set of outcomes and measurements for incontinence-associated dermatitis research. A core outcome set will reduce possible reporting bias, allow results comparisons and statistical pooling across trials and strengthen evidence-based practice and decision-making. This project has been registered in the Core Outcome Measures in Effectiveness Trials (COMET) database and is part of the Cochrane Skin Group Core Outcomes Set Initiative (CSG-COUSIN). © 2016 John Wiley & Sons Ltd.

  17. Northern Manhattan Hispanic Caregiver Intervention Effectiveness Study: protocol of a pragmatic randomised trial comparing the effectiveness of two established interventions for informal caregivers of persons with dementia.

    Science.gov (United States)

    Luchsinger, José A; Burgio, Louis; Mittelman, Mary; Dunner, Ilana; Levine, Jed A; Kong, Jian; Silver, Stephanie; Ramirez, Mildred; Teresi, Jeanne A

    2016-11-25

    The prevalence of dementia is increasing without a known cure, resulting in an increasing number of informal caregivers. Caring for a person with dementia results in increased stress and depressive symptoms. There are several behavioural interventions designed to alleviate stress and depressive symptoms in caregivers of persons with dementia with evidence of efficacy. Two of the best-known interventions are the New York University Caregiver Intervention (NYUCI) and the Resources for Enhancing Alzheimer's Caregivers Health (REACH). The effectiveness of the NYUCI and REACH has never been compared. There is also a paucity of data on which interventions are more effective in Hispanics in New York City. Thus, we proposed the Northern Manhattan Hispanic Caregiver intervention Effectiveness Study (NHiCE), a pragmatic clinical trial designed to compare the effectiveness of adaptations of the NYUCI and the REACH in informal Hispanic caregivers of persons with dementia in New York City. NHiCE is a 6-month randomised controlled trial comparing the effectiveness of adaptations of the NYUCI and REACH among 200 Hispanic informal adult caregivers of persons with dementia. The planned number of sessions of the NYUCI and REACH are similar. The primary outcome measures are changes from baseline to 6 months in the Zarit Caregiver Burden Scale and Geriatric Depression Scale. Our primary approach to analyses will be intent-to-treat. The primary analyses will use mixed random effects models, and a full information maximum likelihood approach, with sensitivity analyses using generalised estimating equation. NHiCE is approved by the Institutional Review Board of Columbia University Medical Center (protocol AAAM5150). A Data Safety Monitoring Board monitors the progress of the study. Dissemination will include reports of the characteristics of the study participants, as well as a report of the results of the clinical trial. NCT02092987, Pre-results. Published by the BMJ Publishing Group

  18. PREVIOUS SECOND TRIMESTER ABORTION

    African Journals Online (AJOL)

    PNLC

    PREVIOUS SECOND TRIMESTER ABORTION: A risk factor for third trimester uterine rupture in three ... for accurate diagnosis of uterine rupture. KEY WORDS: Induced second trimester abortion - Previous uterine surgery - Uterine rupture. ..... scarred uterus during second trimester misoprostol- induced labour for a missed ...

  19. A prospective multiple case study of the impact of emerging scientific evidence on established colorectal cancer screening programs: a study protocol

    Directory of Open Access Journals (Sweden)

    Geddie Hannah

    2012-06-01

    Full Text Available Abstract Background Health-policy decision making is a complex and dynamic process, for which strong evidentiary support is required. This includes scientifically produced research, as well as information that relates to the context in which the decision takes place. Unlike scientific evidence, this “contextual evidence” is highly variable and often includes information that is not scientifically produced, drawn from sources such as political judgement, program management experience and knowledge, or public values. As the policy decision-making process is variable and difficult to evaluate, it is often unclear how this heterogeneous evidence is identified and incorporated into “evidence-based policy” decisions. Population-based colorectal cancer screening poses an ideal context in which to examine these issues. In Canada, colorectal cancer screening programs have been established in several provinces over the past five years, based on the fecal occult blood test (FOBT or the fecal immunochemical test. However, as these programs develop, new scientific evidence for screening continues to emerge. Recently published randomized controlled trials suggest that the use of flexible sigmoidoscopy for population-based screening may pose a greater reduction in mortality than the FOBT. This raises the important question of how policy makers will address this evidence, given that screening programs are being established or are already in place. This study will examine these issues prospectively and will focus on how policy makers monitor emerging scientific evidence and how both scientific and contextual evidence are identified and applied for decisions about health system improvement. Methods This study will employ a prospective multiple case study design, involving participants from Ontario, Alberta, Manitoba, Nova Scotia, and Quebec. In each province, data will be collected via document analysis and key informant interviews. Documents will include

  20. A prospective multiple case study of the impact of emerging scientific evidence on established colorectal cancer screening programs: a study protocol.

    Science.gov (United States)

    Geddie, Hannah; Dobrow, Mark J; Hoch, Jeffrey S; Rabeneck, Linda

    2012-06-01

    Health-policy decision making is a complex and dynamic process, for which strong evidentiary support is required. This includes scientifically produced research, as well as information that relates to the context in which the decision takes place. Unlike scientific evidence, this "contextual evidence" is highly variable and often includes information that is not scientifically produced, drawn from sources such as political judgement, program management experience and knowledge, or public values. As the policy decision-making process is variable and difficult to evaluate, it is often unclear how this heterogeneous evidence is identified and incorporated into "evidence-based policy" decisions. Population-based colorectal cancer screening poses an ideal context in which to examine these issues. In Canada, colorectal cancer screening programs have been established in several provinces over the past five years, based on the fecal occult blood test (FOBT) or the fecal immunochemical test. However, as these programs develop, new scientific evidence for screening continues to emerge. Recently published randomized controlled trials suggest that the use of flexible sigmoidoscopy for population-based screening may pose a greater reduction in mortality than the FOBT. This raises the important question of how policy makers will address this evidence, given that screening programs are being established or are already in place. This study will examine these issues prospectively and will focus on how policy makers monitor emerging scientific evidence and how both scientific and contextual evidence are identified and applied for decisions about health system improvement. This study will employ a prospective multiple case study design, involving participants from Ontario, Alberta, Manitoba, Nova Scotia, and Quebec. In each province, data will be collected via document analysis and key informant interviews. Documents will include policy briefs, reports, meeting minutes, media

  1. Standardised Outcomes in Nephrology-Children and Adolescents (SONG-Kids): a protocol for establishing a core outcome set for children with chronic kidney disease.

    Science.gov (United States)

    Tong, Allison; Samuel, Susan; Zappitelli, Michael; Dart, Allison; Furth, Susan; Eddy, Allison; Groothoff, Jaap; Webb, Nicholas J A; Yap, Hui-Kim; Bockenhauer, Detlef; Sinha, Aditi; Alexander, Stephen I; Goldstein, Stuart L; Gipson, Debbie S; Hanson, Camilla S; Evangelidis, Nicole; Crowe, Sally; Harris, Tess; Hemmelgarn, Brenda R; Manns, Braden; Gill, John; Tugwell, Peter; Van Biesen, Wim; Wheeler, David C; Winkelmayer, Wolfgang C; Craig, Jonathan C

    2016-08-12

    Children with chronic kidney disease (CKD), requiring dialysis or kidney transplantation, have a mortality rate of up to 30-fold higher than the general aged-matched population, and severely impaired quality of life. Symptoms such as fatigue and pain are prevalent and debilitating. Children with CKD are at risk of cognitive impairment, and poorer educational, vocational, and psychosocial outcomes compared with their well peers, which have consequences through to adulthood. Treatment regimens for children with CKD are long-term, complex, and highly intrusive. While many trials have been conducted to improve outcomes in children with CKD, the outcomes measured and reported are often not relevant to patients and clinicians, and are highly variable. These problems can diminish the value of trials as a means to improve the lives of children with CKD. The Standardised Outcomes in Nephrology-Children and Adolescents (SONG-Kids) study aims to develop a core outcome set for trials in children and adolescents with any stage of CKD that is based on the shared priorities of all stakeholders. SONG-Kids involves five phases: a systematic review to identify outcomes (both domains and measures) that have been reported in randomised controlled trials involving children aged up to 21 years with CKD; focus groups (using nominal group technique) with adolescent patients and caregivers of paediatric patients (all ages) to identify outcomes that are relevant and important to patients and their family and the reasons for their choices; semistructured key informant interviews with health professionals involved in the care of children with CKD to ascertain their views on establishing core outcomes in paediatric nephrology; an international three-round online Delphi survey with patients, caregivers, clinicians, researchers, policy-makers, and members from industry to develop consensus on important outcome domains; and a stakeholder workshop to review and finalise the set of core outcome

  2. Birth after caesarean study – planned vaginal birth or planned elective repeat caesarean for women at term with a single previous caesarean birth: protocol for a patient preference study and randomised trial

    Directory of Open Access Journals (Sweden)

    Haslam Ross R

    2007-08-01

    Full Text Available Abstract Background For women who have a caesarean section in their preceding pregnancy, two care policies for birth are considered standard: planned vaginal birth and planned elective repeat caesarean. Currently available information about the benefits and harms of both forms of care are derived from retrospective and prospective cohort studies. There have been no randomised trials, and recognising the deficiencies in the literature, there have been calls for methodologically rigorous studies to assess maternal and infant health outcomes associated with both care policies. The aims of our study are to assess in women with a previous caesarean birth, who are eligible in the subsequent pregnancy for a vaginal birth, whether a policy of planned vaginal birth after caesarean compared with a policy of planned repeat caesarean affects the risk of serious complications for the woman and her infant. Methods/Design Design: Multicentred patient preference study and a randomised clinical trial. Inclusion Criteria: Women with a single prior caesarean presenting in their next pregnancy with a single, live fetus in cephalic presentation, who have reached 37 weeks gestation, and who do not have a contraindication to a planned VBAC. Trial Entry & Randomisation: Eligible women will be given an information sheet during pregnancy, and will be recruited to the study from 37 weeks gestation after an obstetrician has confirmed eligibility for a planned vaginal birth. Written informed consent will be obtained. Women who consent to the patient preference study will be allocated their preference for either planned VBAC or planned, elective repeat caesarean. Women who consent to the randomised trial will be randomly allocated to either the planned vaginal birth after caesarean or planned elective repeat caesarean group. Treatment Groups: Women in the planned vaginal birth group will await spontaneous onset of labour whilst appropriate. Women in the elective repeat

  3. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  4. Laparoscopy After Previous Laparotomy

    Directory of Open Access Journals (Sweden)

    Zulfo Godinjak

    2006-11-01

    Full Text Available Following the abdominal surgery, extensive adhesions often occur and they can cause difficulties during laparoscopic operations. However, previous laparotomy is not considered to be a contraindication for laparoscopy. The aim of this study is to present that an insertion of Veres needle in the region of umbilicus is a safe method for creating a pneumoperitoneum for laparoscopic operations after previous laparotomy. In the last three years, we have performed 144 laparoscopic operations in patients that previously underwent one or two laparotomies. Pathology of digestive system, genital organs, Cesarean Section or abdominal war injuries were the most common causes of previouslaparotomy. During those operations or during entering into abdominal cavity we have not experienced any complications, while in 7 patients we performed conversion to laparotomy following the diagnostic laparoscopy. In all patients an insertion of Veres needle and trocar insertion in the umbilical region was performed, namely a technique of closed laparoscopy. Not even in one patient adhesions in the region of umbilicus were found, and no abdominal organs were injured.

  5. A Secure RFID Authentication Protocol Adopting Error Correction Code

    Directory of Open Access Journals (Sweden)

    Chien-Ming Chen

    2014-01-01

    Full Text Available RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance.

  6. A secure RFID authentication protocol adopting error correction code.

    Science.gov (United States)

    Chen, Chien-Ming; Chen, Shuai-Min; Zheng, Xinying; Chen, Pei-Yu; Sun, Hung-Min

    2014-01-01

    RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance.

  7. Protocols for quantum binary voting

    Science.gov (United States)

    Thapliyal, Kishore; Sharma, Rishi Dutt; Pathak, Anirban

    Two new protocols for quantum binary voting are proposed. One of the proposed protocols is designed using a standard scheme for controlled deterministic secure quantum communication (CDSQC), and the other one is designed using the idea of quantum cryptographic switch, which uses a technique known as permutation of particles. A few possible alternative approaches to accomplish the same task (quantum binary voting) have also been discussed. Security of the proposed protocols is analyzed. Further, the efficiencies of the proposed protocols are computed, and are compared with that of the existing protocols. The comparison has established that the proposed protocols are more efficient than the existing protocols.

  8. SU-G-TeP2-03: Comparison of Standard Dosimetry Protocol in Japan and AAPM TG-51 Addendum in Order to Establish Optimal Dosimetry for FFF Beam

    Energy Technology Data Exchange (ETDEWEB)

    Matsunaga, T; Adachi, Y [Department of Radiology, Seirei Hamamatsu General Hospital, Hamamatsu, Shizuoka (Japan); Hayashi, N [Graduate School of Health Sciences, Fujita Health University, Tayoake, Aichi (Japan); Nozue, M [Department of Radiation Oncology, Seirei Hamamtsu General Hospital, Hamamatsu, Shizuoka (Japan)

    2016-06-15

    Purpose: Japan Standard Dosimetry of Absorbed dose to water in external beam radiotherapy (JSDP12) is widely used to measure radiation dose in radiotherapy. However, JSDP12 does not take flattening-filter-free (FFF) beam into consideration. In addition, JSDP12 applied TPR20,10 for dose quality index for photon beam. The purpose of this study is to compare JSDP12 with AAPM TG-51 addendum in order to establish optimal dosimetry procedure for FFF beam. Method: We evaluated the ion-recombination factor (ks) and the correction factor of radial beam profile (Prp) in FFF beam dosimetry. The ks was introduced by 2 voltages method and verified by Jaffe’s plot. The Prp was given by both film measurement and calculation of treatment planning system, and compared them. Next, we compared the dose quality indexes (kQ) between TPR20,10 method and PDD(10)x method. Finally we considered optimal dosimetry protocol for FFF photon beam using JSDP12 with referring TG-51 addendum protocols. The FFF photon beams of 6 MV (6X-FFF) and 10 MV (10X-FFF) from TrueBeam were investigated in this study. Results: The ks for 6X-FFF and 10X-FFF beams were 1.005 and 1.010, respectively. The Prp of 0.6 cc ionization chamber for 6X-FFF and 10X-FFF beams (Film, TPS) were (1.004, 1.008) and (1.005, 1.008), respectively. The kQ for 6X-FFF and 10X-FFF beams (JSDP12, TG-51 addendum) were (0.9950, 0.9947) and (0.9851, 0.9845), respectively. The most effective factor for uncertainty in FFF photon beam measurement was Prp for JSDP12 formalism. Total dosimetric differences between JSDP12 and TG-51 addendum for 6X-FFF and 10X-FFF were -0.47% and -0.73%, respectively. Conclusion: The total dosimetric difference between JSDP12 and TG-51 addendum was within 1%. The introduction of kQ given by JSDP is feasible for FFF photon beam dosimetry. However, we think Prp should be considered for optimal dosimetry procedure even if JSDP12 is used for FFF photon beam dosimetry.

  9. Establishing the effectiveness, cost-effectiveness and student experience of a Simulation-based education Training program On the Prevention of Falls (STOP-Falls) among hospitalised inpatients: a protocol for a randomised controlled trial.

    Science.gov (United States)

    Williams, Cylie; Bowles, Kelly-Ann; Kiegaldie, Debra; Maloney, Stephen; Nestel, Debra; Kaplonyi, Jessica; Haines, Terry

    2016-06-02

    Simulation-based education (SBE) is now commonly used across health professional disciplines to teach a range of skills. The evidence base supporting the effectiveness of this approach for improving patient health outcomes is relatively narrow, focused mainly on the development of procedural skills. However, there are other simulation approaches used to support non-procedure specific skills that are in need of further investigation. This cluster, cross-over randomised controlled trial with a concurrent economic evaluation (cost per fall prevented) trial will evaluate the effectiveness, cost-effectiveness and student experience of health professional students undertaking simulation training for the prevention of falls among hospitalised inpatients. This research will target the students within the established undergraduate student placements of Monash University medicine, nursing and allied health across Peninsula Health acute and subacute inpatient wards. The intervention will train the students in how to provide the Safe Recovery program, the only single intervention approach demonstrated to reduce falls in hospitals. This will involve redevelopment of the Safe Recovery program into a one-to-many participant SBE program, so that groups of students learn the communication skills and falls prevention knowledge necessary for delivery of the program. The primary outcome of this research will be patient falls across participating inpatient wards, with secondary outcomes including student satisfaction with the SBE and knowledge gain, ward-level practice change and cost of acute/rehabilitation care for each patient measured using clinical costing data. The Human Research Ethics Committees of Peninsula Health (LRR/15/PH/11) and Monash University (CF15/3523-2015001384) have approved this research. The participant information and consent forms provide information on privacy, storage of results and dissemination. Registration of this trial has been completed with the

  10. Placental complications after a previous cesarean section

    OpenAIRE

    Milošević Jelena; Lilić Vekoslav; Tasić Marija; Radović-Janošević Dragana; Stefanović Milan; Antić Vladimir

    2009-01-01

    Introduction The incidence of cesarean section has been rising in the past 50 years. With the increased number of cesarean sections, the number of pregnancies with the previous cesarean section rises as well. The aim of this study was to establish the influence of the previous cesarean section on the development of placental complications: placenta previa, placental abruption and placenta accreta, as well as to determine the influence of the number of previous cesarean sections on the complic...

  11. A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication

    Directory of Open Access Journals (Sweden)

    SK Hafizul Islam

    2017-01-01

    Full Text Available Recently, many identity-based two-party authenticated key agreement (ID-2PAKA protocols using elliptic curve cryptography (ECC have been proposed, however, these protocols do not provide adequate security and their computation costs are also relatively high due to bilinear pairing and map-to-point function. Moreover, they require many communication rounds for establishing the session key, and thus results in increased communication latency, which makes them unsuitable for real applications. This paper thus aims to propose a pairing-free ID-2PAKA protocol based on ECC that removes the security flaws of previous protocols. The proposed protocol helps two users to establish a common session key between them through an open network. The formal security analysis using BAN logic and the comparisons with other protocols are given, which demonstrated that our protocol is formally secure and thus, suitable for secure and efficient peer-to-peer communications.

  12. Multi-party quantum key agreement protocol secure against collusion attacks

    Science.gov (United States)

    Wang, Ping; Sun, Zhiwei; Sun, Xiaoqiang

    2017-07-01

    The fairness of a secure multi-party quantum key agreement (MQKA) protocol requires that all involved parties are entirely peer entities and can equally influence the outcome of the protocol to establish a shared key wherein no one can decide the shared key alone. However, it is found that parts of the existing MQKA protocols are sensitive to collusion attacks, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. In this paper, a multi-party QKA protocol resisting collusion attacks is proposed. Different from previous QKA protocol resisting N-1 coconspirators or resisting 1 coconspirators, we investigate the general circle-type MQKA protocol which can be secure against t dishonest participants' cooperation. Here, t < N. We hope the results of the presented paper will be helpful for further research on fair MQKA protocols.

  13. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  14. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    with a variant of the classic BGW protocol. The protocol is secure against a semi-honest adversary. In Chapter 4 we describe a new protocol for VIFF that is secure against malicious adversaries. The protocol guarantees termination if the adversary allows a preprocessing phase to terminate, in which...... systems hosted by an untrusted provider. It guarantees atomic read and write operations on the shared data when the service is correct and preserves fork-linearizability when the service is faulty. A prototype has been implemented on top of the Subversion revision control system; benchmarks show...

  15. Universal Energy Supply Protocol (UESP)

    Energy Technology Data Exchange (ETDEWEB)

    Holz, F.; Meyer, T.; Roth, W.; Benz, J. [Fraunhofer-Institut fuer Solare Energiesysteme (ISE), Freiburg im Breisgau (Germany); Mueller, M. [Steca GmbH, Solar Electronics, Memmingen (Germany)

    2004-07-01

    The idea behind the Universal Energy Supply Protocol (UESP) is to equip all components (all kinds of generators, batteries and loads) with an identical and well-defined electrical DC connection as well as with intelligence and a communication interface, speaking a defined protocol (UESP). Power flow and information flow are separated, leading to more flexibility in system sizing and standardisation. A centralised control and energy management system administers the system as a whole. Its software is able to manage the energy generation and consumption and ensures the required level of reliability while reducing the operational cost to a minimum. In contrast to existing management concepts, the central idea behind UESP is to outsource the intelligence and the knowledge on the operational behaviour of the components out of the central management system into the components themselves. The components provide information about their current status of operation, current and future operation cost and constraints to the central management system. Here, using 'virtual stock exchange' algorithms, an optimised schedule for all components is determined and fed back to the components for implementation. The central management is thus very generic and can handle any component using the UESP protocol. It automatically adapts to new or changed system configurations, as these changes impact the optimisation only by additional 'players' on the virtual stock market. Eight German companies have teamed up with Fraunhofer ISE in a challenging project (funded by the German Ministry for the Environment, Nature Conservation and Nuclear Safety, BMU) to define the previously described protocol and interfaces and to elaborate the various implementations. The applications range form village power supply systems to telecommunication stations and signalling systems. It is foreseen to establish UESP as standardised interface in the future. (orig.)

  16. A protected password change protocol

    OpenAIRE

    Wang, Ren-Chiun; Yang, Chou-Chen; Mo, Kun-Ru

    2005-01-01

    Some protected password change protocols were proposed. However, the previous protocols were easily vulnerable to several attacks such as denial of service, password guessing, stolen-verifier and impersonation atacks etc. Recently, Chang et al. proposed a simple authenticated key agreement and protected password change protocol for enhancing the security and efficiency. In this paper, authors shall show that password guessing, denial of service and known-key attacks can work in their password...

  17. A Safe Protocol for Amalgam Removal

    Science.gov (United States)

    Colson, Dana G.

    2012-01-01

    Today's environment has different impacts on our body than previous generations. Heavy metals are a growing concern in medicine. Doctors and individuals request the removal of their amalgam (silver mercury) restorations due to the high mercury content. A safe protocol to replace the silver mercury filling will ensure that there is minimal if any absorption of materials while being removed. Strong alternative white composite and lab-processed materials are available today to create a healthy and functioning mouth. Preparation of the patient prior to the procedure and after treatment is vital to establish the excretion of the mercury from the body. PMID:22315627

  18. A Safe Protocol for Amalgam Removal

    Directory of Open Access Journals (Sweden)

    Dana G. Colson

    2012-01-01

    Full Text Available Today's environment has different impacts on our body than previous generations. Heavy metals are a growing concern in medicine. Doctors and individuals request the removal of their amalgam (silver mercury restorations due to the high mercury content. A safe protocol to replace the silver mercury filling will ensure that there is minimal if any absorption of materials while being removed. Strong alternative white composite and lab-processed materials are available today to create a healthy and functioning mouth. Preparation of the patient prior to the procedure and after treatment is vital to establish the excretion of the mercury from the body.

  19. Geneva protocols

    International Nuclear Information System (INIS)

    Kimminich, O.

    1990-01-01

    The First Protocol Additional to the Geneva Conventions of 1949 and relating to the Protection of Victims of International Armed Conflicts contains provisions prohibiting indiscriminate attacks. Nuclear warfare as such is not mentioned in the Protocol. It has been asserted that the Protocol does not apply to nuclear weapons for several reasons. However, close analysis shows that the rules governing the application of means and methods of warfare cannot exempt the nuclear weapons. If nuclear weapons are applied in a manner not consistent with article 51 of Protocol I, their use is forbidden by this article even in situations in which general international law might grant an exception from the ban on nuclear weapons, as in the case of reprisal. (orig./HSCH) [de

  20. Report made on the behalf of the Foreign Affairs Commission on the bill project nr 2932 authorizing the ratification of the protocol modifying the protocol on transitory dispositions attached to the Treaty on the European Union, to the Treaty on the functioning of the European Union, and to the Treaty establishing the European Atomic Energy Community

    International Nuclear Information System (INIS)

    2011-01-01

    This report first describes and comments the consequences of the Lisbon Treaty in terms of composition for the European Parliament, and more particularly the debate about the design of an efficient and representative parliament, the election mode and the seat distribution. Then, it describes how the modification protocol has been elaborated, its content (general architecture, eighteen additional seats for twelve member States and their election modalities), and its implementation (agenda and method)

  1. Data Integrity Protocol for Sensor Networks

    OpenAIRE

    Durresi, Arjan; Paruchuri, Vamsi; Kannan, Rajgopal; Iyengar, S. S.

    2005-01-01

    In this paper, we present a novel lightweight protocol for data integrity in wireless sensor networks. Our protocol is based on a leapfrog strategy in which each cluster head verifies if its previous node has preserved the integrity of the packet using the secret key it shares with two hop uptree nodes. The proposed protocol is simple. The analysis and simulation results show that the protocol needs very few header bits, as low as three bits, thus resulting in negligible bandwidth overhead; t...

  2. Beyond protocols

    DEFF Research Database (Denmark)

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impacts...... process can be applied to better capture opinions of different experts, thereby maximizing the evidential basis. Elaborating on manageability of invasive species is further needed to fully answer all risk analysis requirements. Tackling the issue of invasive species urges better handling of the acquired...

  3. [Placental complications after a previous cesarean section].

    Science.gov (United States)

    Milosević, Jelena; Lilić, Vekoslav; Tasić, Marija; Radović-Janosević, Dragana; Stefanović, Milan; Antić, Vladimir

    2009-01-01

    The incidence of cesarean section has been rising in the past 50 years. With the increased number of cesarean sections, the number of pregnancies with the previous cesarean section rises as well. The aim of this study was to establish the influence of the previous cesarean section on the development of placental complications: placenta previa, placental abruption and placenta accreta, as well as to determine the influence of the number of previous cesarean sections on the complication development. The research was conducted at the Clinic of Gynecology and Obstetrics in Nis covering 10-year-period (from 1995 to 2005) with 32358 deliveries, 1280 deliveries after a previous cesarean section, 131 cases of placenta previa and 118 cases of placental abruption. The experimental groups was presented by the cases of placenta previa or placental abruption with prior cesarean section in obstetrics history, opposite to the control group having the same conditions but without a cesarean section in medical history. The incidence of placenta previa in the control group was 0.33%, opposite to the 1.86% incidence after one cesarean section (pcesarean sections and as high as 14.28% after three cesarean sections in obstetric history. Placental abruption was recorded as placental complication in 0.33% pregnancies in the control group, while its incidence was 1.02% after one cesarean section (pcesarean sections. The difference in the incidence of intrapartal hysterectomy between the group with prior cesarean section (0.86%) and without it (0.006%) shows a high statistical significance (pcesarean section is an important risk factor for the development of placental complications.

  4. Two-round contributory group key exchange protocol for wireless network environments

    Directory of Open Access Journals (Sweden)

    Wu Tsu-Yang

    2011-01-01

    Full Text Available Abstract With the popularity of group-oriented applications, secure group communication has recently received much attention from cryptographic researchers. A group key exchange (GKE protocol allows that participants cooperatively establish a group key that is used to encrypt and decrypt transmitted messages. Hence, GKE protocols can be used to provide secure group communication over a public network channel. However, most of the previously proposed GKE protocols deployed in wired networks are not fully suitable for wireless network environments with low-power computing devices. Subsequently, several GKE protocols suitable for mobile or wireless networks have been proposed. In this article, we will propose a more efficient group key exchange protocol with dynamic joining and leaving. Under the decision Diffie-Hellman (DDH, the computation Diffie-Hellman (CDH, and the hash function assumptions, we demonstrate that the proposed protocol is secure against passive attack and provides forward/backward secrecy for dynamic member joining/leaving. As compared with the recently proposed GKE protocols, our protocol provides better performance in terms of computational cost, round number, and communication cost.

  5. Protocol for a systematic review of the diagnostic and prognostic utility of tests currently available for the detection of aspirin resistance in patients with established cardiovascular or cerebrovascular disease.

    Science.gov (United States)

    Raichand, Smriti; Moore, David; Riley, Richard D; Lordkipanidzé, Marie; Dretzke, Janine; O'Donnell, Jennifer; Jowett, Sue; Bayliss, Sue; Fitzmaurice, David A

    2013-02-26

    The benefits of aspirin as an anti-platelet agent are well established; however, there has been much debate about the lack of uniformity in the efficacy of aspirin to inhibit platelet function. In some patients, aspirin fails to inhibit platelets even where compliance has been verified, a phenomenon which has been termed "aspirin resistance". These patients may in turn be at a higher risk of future vascular events. The proportion of "resistant" patients identified depends on the type of platelet function test. Therefore, the aim of this systematic review is to determine which, if any, platelet function test has utility in terms of identifying patients with a high risk of vascular events. The review has been registered with PROSPERO (CRD42012002151). Relevant studies will be sought from bibliographic databases. Trials registers will be searched for ongoing studies. Reference lists will be checked and subject experts contacted. There will be no date or language restrictions. Standard reviewing methodology to minimise bias will be employed. Any prospective studies in patients on aspirin therapy and assessing platelet function in relation to relevant clinical outcomes will be included, as will studies reporting prognostic models. Risk of bias assessment will be based on the Quality Assessment of Diagnostic Accuracy Studies guidelines, and suitable criteria for assessing quality of prognostic studies. Data on test accuracy measures, relative risks, odds or hazard ratios will be extracted and meta-analysed, where possible, using a random-effects model to account for between-study heterogeneity. Where appropriate, the causes of heterogeneity will be explored through meta-regression and sub-group or sensitivity analyses. If platelet function testing is demonstrated to have diagnostic/predictive utility in a specific population, the potential for a cost-effectiveness analysis will be considered and, if possible, an economic model constructed. This will be supported by a

  6. Estabelecimento de um protocolo para a propagação in vitro de rainha-do-abismo, Sinningia leucotricha (Hoehne Moore- (Gesneriaceae = Establishment of a protocol for in vitro propagation of Sinningia leucotricha (Hoehne Moore – Gesneriaceae

    Directory of Open Access Journals (Sweden)

    Adriane Marinho de Assis

    2006-10-01

    Full Text Available Sinningia leucotricha é uma planta nativa do Paraná, que está sob risco de extinção. O objetivo deste trabalho foi estabelecer um protocolo para a propagação in vitro de rainha-do-abismo. Os tratamentos foram: (T1 MS, (T2 MS 50%, (T3 MS 200%, (T4 MS + 1,0 g.L-1 de carvão ativado, (T5 MS 50% + 1,0 g.L-1 de carvão ativado, (T6 MS 200% + 1,0 g.L-1 de carvão ativado. O delineamento foi o inteiramente casualizado com 10 repetições e 5 plantas por repetição. Após 120 dias de semeadura, foram avaliados: altura da parte aérea,comprimento da maior raiz, massa fresca total e número de brotações. A porcentagem de pegamento foi avaliada 30 dias após o período de aclimatização. O tratamento que proporcionou as maiores médias para todas as características analisadas foi o MS 50% sem adição de carvão ativado (T2. A porcentagem de pegamento foi de 100% em todos ostratamentos.Sinningia leucotricha is a native plant of Paraná (Brazil, which is considered endangered. The objective of this work was to establish aprotocol for in vitro propagation of Sinningia leucotricha. The treatments were: (T1 MS, (T2 MS 50%, (T3 MS 200%, (T4 MS 100% + 1.0 gL-1 of activated charcoal, (T5 MS 50% + 1.0 gL-1 of activated charcoal and (T6 MS 200% + 1.0 gL-1 of activated charcoal. Theexperimental design was entirely casualized with 10 replications per treatment, and 5 plants per replication. Plant height, root length, total fresh weight and number of shoots were evaluated 120 days after cultivation. After thirty days of seedling acclimatization, thegermination/sticking proportion was evaluated. The higher averages for all analyzed features was the MS 50% without activated charcoal addition (T2, and the germination/ sticking proportion was 100% for all treatments.

  7. Successful development of a shed-microspore culture protocol for doubled haploid production in Indonesian hot pepper (Capsicum annuum L.)

    NARCIS (Netherlands)

    Supena, E.D.J.; Suharsono, S.; Jacobsen, E.; Custers, J.B.M.

    2006-01-01

    Various systems of anther and microspore cultures were studied to establish an efficient doubled haploid production method for Indonesian hot pepper (Capsicum annuum L.). A shed-microspore culture protocol was developed which outperformed all the previously reported methods of haploid production in

  8. Analytical protocols for characterisation of sulphur-free lignin

    NARCIS (Netherlands)

    Gosselink, R.J.A.; Abächerli, A.; Semke, H.; Malherbe, R.; Käuper, P.; Nadif, A.; Dam, van J.E.G.

    2004-01-01

    Interlaboratory tests for chemical characterisation of sulphur-free lignins were performed by five laboratories to develop useful analytical protocols, which are lacking, and identify quality-related properties. Protocols have been established for reproducible determination of the chemical

  9. MHC protocols

    National Research Council Canada - National Science Library

    Powis, Stephen H; Vaughan, Robert W

    2003-01-01

    ... because it contains genes encoding components of the complement pathway. The entire human MHC has recently been sequenced (1) and each subregion is now known to contain many other genes, a number of which have immunological functions. The study of polymorphism within the MHC is well established, because the region contains the highly polymorphic HLA genes. HLA polym...

  10. Language, Semantics, and Methods for Security Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico

    Security protocols help in establishing secure channels between communicating systems. Great care needs therefore to be taken in developing and implementing robust protocols. The complexity of security-protocol interactions can hide, however, security weaknesses that only a formal analysis can...... to a transition semantics which can easily be implemented. (An existing SPL implementation bridges the gap that often exists between abstract protocol models on which verification of security properties is carried out and the implemented protocol.) SPL-nets are a particular kind of contextual Petri...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...

  11. Analysis of a security protocol in ?CRL

    NARCIS (Netherlands)

    J. Pang

    2002-01-01

    textabstractNeedham-Schroeder public-key protocol; With the growth and commercialization of the Internet, the security of communication between computers becomes a crucial point. A variety of security protocols based on cryptographic primitives are used to establish secure communication over

  12. Optimisation of the measurement protocols of {sup 129}I and {sup 129}I/{sup 127}I. Methodology establishment for the measurement in environmental matrices; Optimisation des protocoles de mesurage de {sup 129}I et {sup 129}I/{sup 127}I. Etablissement d'une methodologie adaptee aux echantillons de l'environnement

    Energy Technology Data Exchange (ETDEWEB)

    Frechou, C

    2000-07-01

    {sup 129}I, is a natural long-lived isotope, with a half-life of 15,7 million years, also artificially produced in nuclear power plant. It is then released in the liquid and gaseous effluents of the nuclear fuel reprocessing plants. {sup 129}I is integrated in all biological compartments at different activity levels, depending on their distance from the emission source and their ability to metabolize iodine. Performances of the different {sup 129}I and {sup 129}I/{sup 127}I measurement techniques available: Radiochemical Neutron Activation Analysis, Accelerator Mass Spectrometry, direct {gamma}-X spectrometry and liquid scintillation were evaluated. Associated radiochemical preparation steps of the two first techniques were optimized and adapted to the characteristics of the major environmental matrices. In a first step, the radiochemical protocols were developed and validated. In a second step, intercomparison exercises have been lead on various environmental samples presenting different {sup 129}I activity levels. They showed the good agreement between the results given by the three techniques on different environmental matrices with activities between 0,2 and 200 Bq.kg{sup -1} dry weight. As a conclusion, a methodology for the measurement of {sup 129}I and {sup 129}I/{sup 127}I ratio in environmental samples is proposed. It includes a decisional diagram taking into account the characteristics of the matrices, the detection limits and the answer delay. A study on the losses of {sup 129}I during the calcination of an algae was lead by direct {gamma}-X spectrometry and application studies were made to measure {sup 129}I levels in different biological compartments issued from various locations: {sup 129}I activity interspecific variation in different species of seaweeds from the French channel coast under the relative influence of La Hague, {sup 129}I levels in bovine thyroids from the Cotentin area and {sup 129}I in vegetal samples collected around the nuclear

  13. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  14. Establishment of an efficient protocol for micropropagation of stem ...

    African Journals Online (AJOL)

    Jane

    2011-07-18

    . pp. 333-336. Bhojwani SS (1980). In vitro propagation of garlic by shoot proliferation. Sci. Hort., 13: 47-52. Bhojwani SS, Razdan MK (1982). Plant Tissue Culture: Theory and. Practice. Elsevier Sci. Publ. Amsterdam, 1-520.

  15. Establishment of efficient in vitro culture protocol for wheat land ...

    African Journals Online (AJOL)

    Immature embryos were cultured on Murashige and Skoog medium supplemented with 2, 4, 6 and 8 mg/L of 2,4-Dichlorophenoxyacetic acid (2,4-D) for callogenesis and MS + zeatin riboside (1.0 mg/L) medium for regeneration of these calli. All three land races produced callus on all 2,4-D concentrations; higher doses (8 ...

  16. Establishment of efficient in vitro culture protocol for wheat land ...

    African Journals Online (AJOL)

    ADNAN

    2012-02-07

    Feb 7, 2012 ... Wheat landraces are intermediaries between the wild populations .... to avoid loss of water due to evapotranspiration. The propagator ... Effect of 2,4-D on callus induction response of different wheat landraces. MS + 2,4-D (mg). Callus induction percentage. LLR-16. LLR-15. LLR-13. Control. 0.00d. 0.00e.

  17. Establishment of an efficient protocol for micropropagation of stem ...

    African Journals Online (AJOL)

    Microshoots thus formed, were cultured on indole 3-butyric acid (IBA) and half strength basal MS media for induction of roots. Regenerated plantlets with healthy shoots and roots were acclimatized in moist cotton followed by their hardening in soil : vermicompost potting mixture with 90% survival rate. Key words: Tylophora ...

  18. 20 CFR 416.1337 - Exceptions to the continuation of previously established payment level.

    Science.gov (United States)

    2010-04-01

    ... same address; (iv) The sex code for such individual is the same; and (v) The date of birth for such.... (ii) Federal supplemental security income benefit and optional supplementation, or optional supplementation only—$700 Recipients whose records indicate they were eligible for Federal supplemental security...

  19. Study protocol

    DEFF Research Database (Denmark)

    Smith, Benjamin E; Hendrick, Paul; Bateman, Marcus

    2017-01-01

    that target movements and activities patients find fearful and painful. High-quality research on exercise prescription in relation to pain mechanisms, not directed at specific tissue pathology, and dose response clearly warrants further investigation. Our primary aim is to establish the feasibility...... and acceptability of conducting a definitive RCT which will evaluate the clinical and cost-effectiveness of a loaded self-managed exercise programme for people with patellofemoral pain. METHOD: This is a single-centred, multiphase, sequential, mixed-methods trial that will evaluate the feasibility of running...... avoidance behaviours, catastrophising, self-efficacy, sport and leisure activity participation, and general quality of life. Follow-up will be 3 and 6 months. The analysis will focus on descriptive statistics and confidence intervals. The qualitative components will follow a thematic analysis approach...

  20. Previous Land Use and Invasive Species Impacts on Long-term Afforestation Success

    Directory of Open Access Journals (Sweden)

    Joshua B. Nickelson

    2015-09-01

    Full Text Available The conversion of agricultural lands to forests has increased worldwide over the past few decades for multiple reasons including increasing forest connectivity and wildlife habitat. However, previous land cover and competing vegetation often impede afforestation. We established 219 plots in 29 Quercus plantations on four previous land cover types (LCT: Clover, Soybeans, Woody Brush, and Herbaceous Weeds. Plantations were located in Illinois, USA and were sampled 15–18 years after planting. Sampling data for all trees (planted and volunteer included species, diameter, and vine presence on the main bole of the tree. Free-to-grow status was recorded for all Quercus species and estimated cover of two invasive species, Elaeagnus umbellata and Lonicera japonica, was documented on each plot. There was a strong relationship between total tree density and invasive species cover across all sites. Stocking success was lower and E. umbellata cover was higher on Woody Brush sites compared to Clover and Soybean cover types. Additionally, significantly more free-to-grow Quercus saplings occurred in Clover and Soybean cover types compared to the Woody Brush sites. The results indicate that previous land cover plays a critical role in forest afforestation. Furthermore, while historically, volunteer tree species were thought to be detrimental to the development of planted species these results suggest that with the increasing prevalence of invasive species worldwide the role of volunteer species in afforestation should be reconsidered and silvicultural protocols adjusted accordingly.

  1. Search and nonsearch protocols for radiographic consultation

    International Nuclear Information System (INIS)

    Swensson, R.G.; Theodore, G.H.

    1989-01-01

    Six radiologists, acting as film reviewers, used two different consultation protocols to differentiate among 292 ambiguous findings on chest films: 120 simulated nodules and 172 normal findings (previous readers' false-positive reports of nodules). The non-search protocol identified each finding (by location), and reviewers rated its likelihood as a nodule. The search protocol, which asked reviewers to report and rate all locations regarded as possible nodules on each film, assigned a default negative rating to any unreported finding (nodule or normal). Receiver operator characteristic analyses demonstrated a significantly higher accuracy for each reviewer's search- protocol discriminations between these nodules and confusing normal findings

  2. An abbreviated protocol for multilineage neural differentiation of murine embryonic stem cells and its perturbation by methyl mercury.

    Science.gov (United States)

    Theunissen, P T; Schulpen, S H W; van Dartel, D A M; Hermsen, S A B; van Schooten, F J; Piersma, A H

    2010-07-01

    Alternative assays are highly desirable to reduce the extensive experimental animal use in developmental toxicity testing. In the present study, we developed an improved test system for assessing neurodevelopmental toxicity using differentiating embryonic stem cells. We advanced previously established methods by merging, modifying and abbreviating the original 20-day protocol into a more efficient 13-day neural differentiation protocol. Using morphological observation, immunocytochemistry, gene expression and flow cytometry, it was shown predominantly multiple lineages of neuroectodermal cells were formed in our protocol and to a lower extent, endodermal and mesodermal differentiated cell types. This abbreviated protocol should lead to an advanced screening method using morphology in combination with selected differentiation markers aimed at predicting neurodevelopmental toxicity. Finally, the assay was shown to express differential sensitivity to a model developmental neurotoxicant, methyl mercury.

  3. Control of feed intake as affected by previous treatment | Pienaar ...

    African Journals Online (AJOL)

    An experiment was conducted with eighteen rumen cannulated sheep fed on a chopped lucerne diet. Previous level of intake significantly influenced the level at which sheep initially established voluntary feed intake. This difference had disappeared after three weeks on an ad lib. intake. Perturbation analysis of the results ...

  4. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  5. The apex of the family tree of protocols: optimal rates and resource inequalities

    International Nuclear Information System (INIS)

    Datta, Nilanjana; Hsieh, Min-Hsiu

    2011-01-01

    We establish bounds on the maximum entanglement gain and minimum quantum communication cost of the fully quantum Slepian-Wolf (FQSW) protocol in the one-shot regime, which is considered to be at the apex of the existing family tree in quantum information theory. These quantities, which are expressed in terms of smooth min- and max-entropies, reduce to the known rates of quantum communication cost and entanglement gain in the asymptotic independent and identically distributed scenario. We also provide an explicit proof of the optimality of these asymptotic rates. We introduce a resource inequality for the one-shot FQSW protocol, which in conjunction with our results yields achievable one-shot rates of its children protocols. In particular, it yields bounds on the one-shot quantum capacity of a noisy channel in terms of a single entropic quantity, unlike previous bounds. We also obtain an explicit expression for the achievable rate for one-shot state redistribution.

  6. Establishment of a plant regeneration system from callus of ...

    African Journals Online (AJOL)

    An in vitro propagation protocol was established for the Dendrobium Serdang Beauty orchid. The propagation protocol utilized calli tissues that were successfully initiated from protocorm-like bodies (PLBs) explants, while the leaf and root tip explants died. The percentage of protocorm-like bodies explants responding to ...

  7. Establishment of a plant regeneration system from callus of ...

    African Journals Online (AJOL)

    STORAGESEVER

    2008-11-19

    Nov 19, 2008 ... An in vitro propagation protocol was established for the Dendrobium Serdang Beauty orchid. The propagation protocol utilized calli tissues that were successfully initiated from protocorm-like bodies. (PLBs) explants, while the leaf and root tip explants died. The percentage of protocorm-like bodies explants ...

  8. Endodontic retreatment of maxillary incisors previously treated with a conventional apexification protocol: a case report.

    Science.gov (United States)

    Kahler, Bill

    2011-04-01

    This case reports on the treatment of an immature tooth initially treated with calcium hydroxide apexification techniques. When the patient subsequently sought treatment for aesthetic concerns, the presence of apical periodontitis required revision of the endodontic procedure. Resolution of the periapical radiolucency was evident at a 12-month review. The use of mineral trioxide aggregate as an apical filling material and restoration with chemically cured composite resin extending into the coronal third of the root may prevent further contamination of the root canal system and strengthen the tooth. © 2011 The Author. Australian Endodontic Journal © 2011 Australian Society of Endodontology.

  9. A new quantum private comparison protocol

    Science.gov (United States)

    Xu, Ling; Wang, Jing; Ahmed, Hafeez; Zhao, Zhiwen

    2017-10-01

    For two participants to compare the equality of their private information without revealing them, a new quantum private protocol with the help of semi-honest third party TP is proposed. Different from previous protocols, the four particle |Wf⟩ state and the |χ+⟩ state are utilized in this protocol as the carriers of quantum information and form the entanglement swapping as basic principle. The simple measurement of quantum states and exclusive-or operation are only required to conduct in this protocol. What's more, this protocol can compare two bits of two participants' private information in every comparison time. Meanwhile, it needs no unitary operation to fulfill this protocol. This protocol is feasible and efficient to execute through these aspects. In the end, the security of this protocol is analyzed at great length from two kinds of attacks including the outside attack and the participant attack. And the analysis result shows that this protocol can withstand various kinds of attacks and be secure to perform efficiently.

  10. Network Memory Protocol

    National Research Council Canada - National Science Library

    Wilcox, D

    1997-01-01

    This report presents initial research into the design of a new computer system local area network transport layer protocol, designated the network memory protocol, which provides clients with direct...

  11. Cryptanalysis of the arbitrated quantum signature protocols

    Energy Technology Data Exchange (ETDEWEB)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2011-08-15

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  12. Preoperative screening: value of previous tests.

    Science.gov (United States)

    Macpherson, D S; Snow, R; Lofgren, R P

    1990-12-15

    To determine the frequency of tests done in the year before elective surgery that might substitute for preoperative screening tests and to determine the frequency of test results that change from a normal value to a value likely to alter perioperative management. Retrospective cohort analysis of computerized laboratory data (complete blood count, sodium, potassium, and creatinine levels, prothrombin time, and partial thromboplastin time). Urban tertiary care Veterans Affairs Hospital. Consecutive sample of 1109 patients who had elective surgery in 1988. At admission, 7549 preoperative tests were done, 47% of which duplicated tests performed in the previous year. Of 3096 previous results that were normal as defined by hospital reference range and done closest to the time of but before admission (median interval, 2 months), 13 (0.4%; 95% CI, 0.2% to 0.7%), repeat values were outside a range considered acceptable for surgery. Most of the abnormalities were predictable from the patient's history, and most were not noted in the medical record. Of 461 previous tests that were abnormal, 78 (17%; CI, 13% to 20%) repeat values at admission were outside a range considered acceptable for surgery (P less than 0.001, frequency of clinically important abnormalities of patients with normal previous results with those with abnormal previous results). Physicians evaluating patients preoperatively could safely substitute the previous test results analyzed in this study for preoperative screening tests if the previous tests are normal and no obvious indication for retesting is present.

  13. 77 FR 36281 - Solicitation of Information and Recommendations for Revising OIG's Provider Self-Disclosure Protocol

    Science.gov (United States)

    2012-06-18

    ...] Solicitation of Information and Recommendations for Revising OIG's Provider Self-Disclosure Protocol AGENCY... Register notice informs the public that OIG: (1) Intends to update the Provider Self-Disclosure Protocol... Provider Self-Disclosure Protocol (the Protocol) to establish a process for health care providers to...

  14. Automatic electromagnetic valve for previous vacuum

    International Nuclear Information System (INIS)

    Granados, C. E.; Martin, F.

    1959-01-01

    A valve which permits the maintenance of an installation vacuum when electric current fails is described. It also lets the air in the previous vacuum bomb to prevent the oil ascending in the vacuum tubes. (Author)

  15. Sufficient Conditions for Vertical Composition of Security Protocols (Extended Version)

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Viganò, Luca

    Vertical composition of security protocols means that an application protocol (e.g., a banking service) runs over a channel established by another protocol (e.g., a secure channel provided by TLS). This naturally gives rise to a compositionality question: given a secure protocol P1 that provides...... a certain kind of channel as a goal and another secure protocol P2 that assumes this kind of channel, can we then derive that their vertical composition P2[P1] is secure? It is well known that protocol composition can lead to attacks even when the individual protocols are all secure in isolation....... In this paper, we formalize seven easy-to-check static conditions that support a large class of channels and applications and that we prove to be su_cient for vertical security protocol composition....

  16. Concomitant and previous osteoporotic vertebral fractures.

    Science.gov (United States)

    Lenski, Markus; Büser, Natalie; Scherer, Michael

    2017-04-01

    Background and purpose - Patients with osteoporosis who present with an acute onset of back pain often have multiple fractures on plain radiographs. Differentiation of an acute osteoporotic vertebral fracture (AOVF) from previous fractures is difficult. The aim of this study was to investigate the incidence of concomitant AOVFs and previous OVFs in patients with symptomatic AOVFs, and to identify risk factors for concomitant AOVFs. Patients and methods - This was a prospective epidemiological study based on the Registry of Pathological Osteoporotic Vertebral Fractures (REPAPORA) with 1,005 patients and 2,874 osteoporotic vertebral fractures, which has been running since February 1, 2006. Concomitant fractures are defined as at least 2 acute short-tau inversion recovery (STIR-) positive vertebral fractures that happen concomitantly. A previous fracture is a STIR-negative fracture at the time of initial diagnostics. Logistic regression was used to examine the influence of various variables on the incidence of concomitant fractures. Results - More than 99% of osteoporotic vertebral fractures occurred in the thoracic and lumbar spine. The incidence of concomitant fractures at the time of first patient contact was 26% and that of previous fractures was 60%. The odds ratio (OR) for concomitant fractures decreased with a higher number of previous fractures (OR =0.86; p = 0.03) and higher dual-energy X-ray absorptiometry T-score (OR =0.72; p = 0.003). Interpretation - Concomitant and previous osteoporotic vertebral fractures are common. Risk factors for concomitant fractures are a low T-score and a low number of previous vertebral fractures in cases of osteoporotic vertebral fracture. An MRI scan of the the complete thoracic and lumbar spine with STIR sequence reduces the risk of under-diagnosis and under-treatment.

  17. Establishment Registration & Device Listing

    Data.gov (United States)

    U.S. Department of Health & Human Services — This searchable database contains establishments (engaged in the manufacture, preparation, propagation, compounding, assembly, or processing of medical devices...

  18. Event sequence variability in healthy swallowing: building on previous findings.

    Science.gov (United States)

    Molfenter, Sonja M; Leigh, Chelsea; Steele, Catriona M

    2014-04-01

    This study builds on previous work by Kendall, Leonard, and McKenzie, which investigated event sequence variability for 12 paired events during swallowing by healthy volunteers. They identified four event pairs that always occurred in a stereotyped order and a most common occurring overall order of events during swallowing. In the current study, we investigated overall event sequencing and the same four paired events in a sample of swallows by healthy young (under 45 years old) volunteers. Data were collected during a 16-swallow lateral videofluoroscopy protocol, which included manipulations of bolus volume, barium density, bolus viscosity, and swallow cueing. Our results agreed with previous findings that variable event sequencing is found in healthy swallowing, and, in regard to obligatory sequencing of two paired events, movement of the arytenoids toward the base of the epiglottis begins prior to upper esophageal sphincter (UES) opening and maximum hyolaryngeal approximation occurs after UES opening. However, our data failed to replicate the previous findings that there is obligatory sequencing of maximum pharyngeal constriction after maximal UES distension and the UES opens before bolus arrival at the UES. The most common observed overall event sequence reported by Kendall et al. was observed in only 4/293 swallows in our dataset. Manipulations of bolus volume, bolus viscosity, barium concentration, swallow cueing, and swallow repetitions could not completely account for the differences observed between the two studies.

  19. Large family of quantum weak coin-flipping protocols

    International Nuclear Information System (INIS)

    Mochon, Carlos

    2005-01-01

    Each classical public-coin protocol for coin flipping is naturally associated with a quantum protocol for weak coin flipping. The quantum protocol is obtained by replacing classical randomness with quantum entanglement and by adding a cheat detection test in the last round that verifies the integrity of this entanglement. The set of such protocols defines a family which contains the protocol with bias 0.192 previously found by the author, as well as protocols with bias as low as 1/6 described herein. The family is analyzed by identifying a set of optimal protocols for every number of messages. In the end, tight lower bounds for the bias are obtained which prove that 1/6 is optimal for all protocols within the family

  20. Uterine rupture without previous caesarean delivery

    DEFF Research Database (Denmark)

    Thisted, Dorthe L. A.; H. Mortensen, Laust; Krebs, Lone

    2015-01-01

    OBJECTIVE: To determine incidence and patient characteristics of women with uterine rupture during singleton births at term without a previous caesarean delivery. STUDY DESIGN: Population based cohort study. Women with term singleton birth, no record of previous caesarean delivery and planned...... vaginal delivery (n=611,803) were identified in the Danish Medical Birth Registry (1997-2008). Medical records from women recorded with uterine rupture during labour were reviewed to ascertain events of complete uterine rupture. Relative Risk (RR) and adjusted Relative Risk Ratio (aRR) of complete uterine...... rupture with 95% confidence intervals (95% CI) were ascertained according to characteristics of the women and of the delivery. RESULTS: We identified 20 cases with complete uterine rupture. The incidence of complete uterine rupture among women without previous caesarean delivery was about 3...

  1. INTRODUCTION Previous reports have documented a high ...

    African Journals Online (AJOL)

    pregnancy if they were married, educated, had dental insurance, previously used dental services when not pregnant, or had knowledge about the possible connection between oral health and pregnancy outcome8. The purpose of this study was to explore the factors determining good oral hygiene among pregnant women ...

  2. Empowerment perceptions of educational managers from previously ...

    African Journals Online (AJOL)

    The perceptions of educational manag ers from previously disadvantaged primary and high schools in the Nelson Mandela Metropole regarding the issue of empowerment are outlined and the perceptions of educational managers in terms of various aspects of empowerment at different levels reflected. A literature study ...

  3. Management of choledocholithiasis after previous gastrectomy.

    Science.gov (United States)

    Anwer, S; Egan, R; Cross, N; Guru Naidu, S; Somasekar, K

    2017-09-01

    Common bile duct stones in patients with a previous gastrectomy can be a technical challenge because of the altered anatomy. This paper presents the successful management of two such patients using non-traditional techniques as conventional endoscopic retrograde cholangiopancreatography was not possible.

  4. Laboratory Grouping Based on Previous Courses.

    Science.gov (United States)

    Doemling, Donald B.; Bowman, Douglas C.

    1981-01-01

    In a five-year study, second-year human physiology students were grouped for laboratory according to previous physiology and laboratory experience. No significant differences in course or board examination performance were found, though correlations were found between predental grade-point averages and grouping. (MSE)

  5. Implementation of the Additional Protocol in Japan

    International Nuclear Information System (INIS)

    Ogawa, T.

    2001-01-01

    The Additional Protocol between Japan and the IAEA entered into force in December 1999. To come into force a series of implementation trials of Additional Protocol was carried out at two Japanese representative nuclear research centers, i.e. Tokai Research Establishment of Japan Atomic Energy Research Institute (JAERI) and Oarai Engineering Center of Japan Nuclear Fuel Cycle Development Institute (JNC). These trials were proposed by Japan and were conducted in cooperation with the IAEA Secretariat. In addition, Japan amended 'the Law for the Regulation of Reactors etc.', to collect adequate information to submit to the IAEA, to arrange the surrounding for the complementary access, etc. In addition, Japan Submitted the Initial Declaration of the Additional Protocol within 180 days of the entry into force of the Protocol, in the middle of June, 2000

  6. Hepatitis B immunisation in persons not previously exposed to hepatitis B or with unknown exposure status

    DEFF Research Database (Denmark)

    Mathew, Joseph L; El Dib, Regina; Mathew, Preethy J

    2008-01-01

    The benefits and harms of hepatitis B vaccination in persons not previously exposed to hepatitis B infection or with unknown exposure status have not been established.......The benefits and harms of hepatitis B vaccination in persons not previously exposed to hepatitis B infection or with unknown exposure status have not been established....

  7. Comparison of IAEA protocols for clinical electron beam dosimetry

    International Nuclear Information System (INIS)

    Novotny, J.; Soukup, M.

    2002-01-01

    In most beam calibration protocols so far used in clinical practice, the method recommended for the determination of absorbed dose to water in high-energy electron beams is based on either an exposure or an air kerma calibration factor of an ionisation chamber in a C0 60 gamma-ray or 2 MV x-ray beam. These protocols are complex and the overall uncertainty in the absorbed dose to water under reference conditions is about 3-4%. The new generation of protocols, namely IAEA TRS 398, are based on absorbed dose-to-water standards in photon beams from Co 60 and accelerator beams. The possible errors in absorbed dose determination in reference conditions in practical clinical dosimetry caused by replacement of TRS 277 and TRS 381 protocols for a new TRS 398 protocol were carefully studied for clinical electron beams in energy range 6-20 MeV. All measurements were performed on Varian CLINAC 2100 C linear accelerator. The electron beam energy ranged from 6 to 20 MeV. Basically three different detectors were used for measurements: PTW Roos plane-parallel ionization chamber, calibrated PTW 30002 Farmer type, ionization, Scanditronix electron diode detector. Measurements of central axis percentage depth doses were made by diode using Wellhoefer WP700 beam scanner in 40 cm x 40 cm x 50 cm water phantom. A reference chamber or semiconductor diode mounted on electron treatment cone was used to correct beam output variations for a chamber or diode measurements during scanning. Absolute dose measurements were carried out with Roos plane-parallel chamber connected to PTW UNIDOS electrometer always for preselected number of monitor units. In a new IAEA dosimetry protocol clinical reference dosimetry for electron beam is performed at depth of d ref = 0.6R 50 - 0.1 [cm] instead of d max as in previous ones. To check the stability of electron beams for energy and to establish d ref and standard deviation for reference depth position, the depth dose curves obtained during the quality

  8. Previously unknown organomagnesium compounds in astrochemical context

    OpenAIRE

    Ruf, Alexander

    2018-01-01

    We describe the detection of dihydroxymagnesium carboxylates (CHOMg) in astrochemical context. CHOMg was detected in meteorites via ultrahigh-resolving chemical analytics and represents a novel, previously unreported chemical class. Thus, chemical stability was probed via quantum chemical computations, in combination with experimental fragmentation techniques. Results propose the putative formation of green-chemical OH-Grignard-type molecules and triggered fundamental questions within chemica...

  9. Blood Establishment Registration Database

    Data.gov (United States)

    U.S. Department of Health & Human Services — This application provides information for active, inactive, and pre-registered firms. Query options are by FEI, Applicant Name, Establishment Name, Other Names,...

  10. Establishing software quality assurance

    International Nuclear Information System (INIS)

    Malsbury, J.

    1983-01-01

    This paper is concerned with four questions about establishing software QA: What is software QA. Why have software QA. What is the role of software QA. What is necessary to ensure the success of software QA

  11. Establishment of floor ownership

    OpenAIRE

    Robič, Gregor

    2016-01-01

    After the socioeconomic system had been changed in 1991 the right of ownership and land registry seemed to gain a much greater importance. In that time the concept of floor ownership has also started to develop, but after 25 years a significant number of multi-unit buildings without the established floor ownership still exist in Slovenia. In this thesis both theoretical background and practical solutions for establishing a floor ownership are presented, furthermore, possible causes for an ina...

  12. The vertebral biomechanic previous and after kyphoplasty.

    Science.gov (United States)

    Pesce, V; Piazzolla, Andrea; Moretti, L; Carlucci, S; Parato, C; Maxy, P; Moretti, B

    2013-10-01

    The biomechanical understanding of increasing anterior column load with progressing kyphosis leading to subsequent vertebral compression fracture (VCF) established the basic rationale for kyphoplasty. The lumbar spine can support an effort of 500 kg in the axis of the vertebral body, and a bending moment of 20 Nm in flexion. Consequently, if this effort is forward deviated of only 10 cm, the acceptable effort will be reduced to 20 kg so it is important to restore the vertebral anterior wall after a VCF: the authors describe the biomechanical modifications in the spine after kyphoplasty.

  13. UK Biobank's cardiovascular magnetic resonance protocol.

    Science.gov (United States)

    Petersen, Steffen E; Matthews, Paul M; Francis, Jane M; Robson, Matthew D; Zemrak, Filip; Boubertakh, Redha; Young, Alistair A; Hudson, Sarah; Weale, Peter; Garratt, Steve; Collins, Rory; Piechnik, Stefan; Neubauer, Stefan

    2016-02-01

    UK Biobank's ambitious aim is to perform cardiovascular magnetic resonance (CMR) in 100,000 people previously recruited into this prospective cohort study of half a million 40-69 year-olds. We describe the CMR protocol applied in UK Biobank's pilot phase, which will be extended into the main phase with three centres using the same equipment and protocols. The CMR protocol includes white blood CMR (sagittal anatomy, coronary and transverse anatomy), cine CMR (long axis cines, short axis cines of the ventricles, coronal LVOT cine), strain CMR (tagging), flow CMR (aortic valve flow) and parametric CMR (native T1 map). This report will serve as a reference to researchers intending to use the UK Biobank resource or to replicate the UK Biobank cardiovascular magnetic resonance protocol in different settings.

  14. Network Authentication Protocol Studies

    Science.gov (United States)

    2009-04-01

    This is called the “Decision Diffie-Hellman Problem” ( DDH ) [68]. For the protocols discussed in this paper, the cryptographic strength of the generated...group key is solely dependent upon the strength of the underlying two-party protocols. That said, we will not address the DDH problem further in this

  15. Recombinant gene expression protocols

    National Research Council Canada - National Science Library

    Tuan, Rocky S

    1997-01-01

    .... A fundamental requirement for successful recombinant gene expression is the design of the cloning vector and the choice of the host organism for expression. Recombinant Gene Expression Protocols grows out of the need for a laboratory manual that provides the reader the background and rationale, as well as the practical protocols for the preparation of...

  16. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    . In response, we promote linear logic as a high-level language for both specifying and implementing voting protocols. Our linear logical specifications of the single-winner first-past-the-post (SW- FPTP) and single transferable vote (STV) protocols demonstrate that this approach leads to concise...

  17. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  18. Improving active Mealy machine learning for protocol conformance testing

    NARCIS (Netherlands)

    Aarts, F.; Kuppens, H.; Tretmans, J.; Vaandrager, F.; Verwer, S.

    2014-01-01

    Using a well-known industrial case study from the verification literature, the bounded retransmission protocol, we show how active learning can be used to establish the correctness of protocol implementation I relative to a given reference implementation R. Using active learning, we learn a model M

  19. Percutaneous endoscopic gastrostomy following previous abdominal surgery.

    Science.gov (United States)

    Stellato, T A; Gauderer, M W; Ponsky, J L

    1984-01-01

    During a 36-month period, 89 patients have undergone percutaneous endoscopic gastrostomy without mortality. Of these patients, 25 (13 infants and children, 12 adults) had prior abdominal procedures that increased their risk for the endoscopic procedure. With two exceptions, all gastrostomies were performed utilizing local anesthesia. There was one major complication, a gastrocolic fistula, which was successfully managed by repeating the endoscopic gastrostomy procedure at a location more cephalad in the stomach. Twenty-two of the gastrostomies were placed for feeding purposes and all of these patients were able to leave the hospital with alimentation accomplished via the tube. Three of the endoscopically placed gastrostomies were for gastrointestinal tract decompression. A total of 255 patient months have been accumulated in these patients with the endoscopically placed gastrostomy in situ. The technique can be safely performed in patients with prior abdominal surgery and in the majority of cases is the technique of choice for establishing a tube gastrostomy. PMID:6428334

  20. Percutaneous endoscopic jejunostomy in a patient with previous esophagectomy.

    Science.gov (United States)

    de la Torre, R A; Scott, J S; Unger, S W

    1991-04-01

    Establishment of a percutaneous endoscopic jejunostomy via direct jejunal puncture was accomplished in a 45-year-old woman five years after a partial esophagectomy with cervical esophagogastrostomy for adenocarcinoma of the esophagus. The patient had recurrence of the cancer at the anastomotic site with subsequent inability to eat, necessitating a feeding tube for prolonged enteral nutrition. Although percutaneous puncture of the jejunum has been previously described, it has been limited to patients who had undergone partial or complete gastrectomies with Bilroth II anastomoses. This case report of direct endoscopic jejunal tube placement in a patient after esophagectomy further establishes this procedure as a viable alternative to surgically placed feeding tubes in patients with altered gastric anatomy.

  1. Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols

    NARCIS (Netherlands)

    Bistarelli, S.; Cervesato, I.; Lenzini, Gabriele; Martinelli, F.; Gorodetski, V.I.; Skormin, V.A.; Popyack, L.J.

    When formalizing security protocols, different specification languages support very different reasoning methodologies whose results are not directly or easily comparable. Therefore, establishing clear mappings among different frameworks is highly desirable, as it permits various methodologies to

  2. Relating Multiset Rewriting and Process Algebras for Security Protocol Analysis

    NARCIS (Netherlands)

    Bistarelli, Stefano; Cervesato, Iliano; Lenzini, Gabriele; Martinelli, Fabio

    When formalizing security protocols, different specification languages support very different reasoning methodologies, whose results are not directly or easily comparable. Therefore, establishing clear mappings among different frameworks is highly desirable, as it permits various methodologies to

  3. Relating Multiset Rewriting and Process Algebras for Security Protocol Analysis

    NARCIS (Netherlands)

    Bistarelli, Stefano; Cervesato, Iliano; Lenzini, Gabriele; Martinelli, Fabio

    2005-01-01

    When formalizing security protocols, different specification languages support very different reasoning methodologies, whose results are not directly or easily comparable. Therefore, establishing clear mappings among different frameworks is highly desirable, as it permits various methodologies to

  4. An economic and feasible Quantum Sealed-bid Auction protocol

    Science.gov (United States)

    Zhang, Rui; Shi, Run-hua; Qin, Jia-qi; Peng, Zhen-wan

    2018-02-01

    We present an economic and feasible Quantum Sealed-bid Auction protocol using quantum secure direct communication based on single photons in both the polarization and the spatial-mode degrees of freedom, where each single photon can carry two bits of classical information. Compared with previous protocols, our protocol has higher efficiency. In addition, we propose a secure post-confirmation mechanism without quantum entanglement to guarantee the security and the fairness of the auction.

  5. Desensitization protocols and their outcome.

    Science.gov (United States)

    Marfo, Kwaku; Lu, Amy; Ling, Min; Akalin, Enver

    2011-04-01

    In the last decade, transplantation across previously incompatible barriers has increasingly become popular because of organ donor shortage, availability of better methods of detecting and characterizing anti-HLA antibodies, ease of diagnosis, better understanding of antibody-mediated rejection, and the availability of effective regimens. This review summarizes all manuscripts published since the first publication in 2000 on desensitized patients and discusses clinical outcomes including acute and chronic antibody-mediated rejection rate, the new agents available, kidney paired exchange programs, and the future directions in sensitized patients. There were 21 studies published between 2000 and 2010, involving 725 patients with donor-specific anti-HLA antibodies (DSAs) who underwent kidney transplantation with different desensitization protocols. All studies were single center and retrospective. The patient and graft survival were 95% and 86%, respectively, at a 2-year median follow-up. Despite acceptable short-term patient and graft survivals, acute rejection rate was 36% and acute antibody-mediated rejection rate was 28%, which is significantly higher than in nonsensitized patients. Recent studies with longer follow-up of those patients raised concerns about long-term success of desensitization protocols. The studies utilizing protocol biopsies in desensitized patients also reported higher subclinical and chronic antibody-mediated rejection. An association between the strength of DSAs determined by median fluorescence intensity values of Luminex single-antigen beads and risk of rejection was observed. Two new agents, bortezomib, a proteasome inhibitor, and eculizumab, an anti-complement C5 antibody, were recently introduced to desensitization protocols. An alternative intervention is kidney paired exchange, which should be considered first for sensitized patients. © 2011 by the American Society of Nephrology

  6. Fulminant Pneumococcal Pericarditis in a Previously Healthy Patient.

    Science.gov (United States)

    Trpkov, Cvetan; Nath, Ermin; Moon, Michael; Windram, Jonathan; Graham, Michelle M

    2017-04-01

    Purulent pericarditis is a rare acutely life-threatening condition. Initial symptoms, signs, and investigations can be nonspecific. Echocardiography is invaluable for establishing the diagnosis and initial management. We present a case of a previously healthy patient with purulent pericarditis caused by Streptococcus pneumoniae in the absence of a primary focus of infection. The patient deteriorated rapidly with cardiac tamponade and septic shock and was managed successfully by a combined medical and surgical approach. Copyright © 2016 Canadian Cardiovascular Society. Published by Elsevier Inc. All rights reserved.

  7. Books average previous decade of economic misery.

    Science.gov (United States)

    Bentley, R Alexander; Acerbi, Alberto; Ormerod, Paul; Lampos, Vasileios

    2014-01-01

    For the 20(th) century since the Depression, we find a strong correlation between a 'literary misery index' derived from English language books and a moving average of the previous decade of the annual U.S. economic misery index, which is the sum of inflation and unemployment rates. We find a peak in the goodness of fit at 11 years for the moving average. The fit between the two misery indices holds when using different techniques to measure the literary misery index, and this fit is significantly better than other possible correlations with different emotion indices. To check the robustness of the results, we also analysed books written in German language and obtained very similar correlations with the German economic misery index. The results suggest that millions of books published every year average the authors' shared economic experiences over the past decade.

  8. Induced vaginal birth after previous caesarean section

    Directory of Open Access Journals (Sweden)

    Akylbek Tussupkaliyev

    2016-11-01

    Full Text Available Introduction The rate of operative birth by Caesarean section is constantly rising. In Kazakhstan, it reaches 27 per cent. Research data confirm that the percentage of successful vaginal births after previous Caesarean section is 50–70 per cent. How safe the induction of vaginal birth after Caesarean (VBAC remains unclear. Methodology The studied techniques of labour induction were amniotomy of the foetal bladder with the vulsellum ramus, intravaginal administration of E1 prostaglandin (Misoprostol, and intravenous infusion of Oxytocin-Richter. The assessment of rediness of parturient canals was conducted by Bishop’s score; the labour course was assessed by a partogram. The effectiveness of labour induction techniques was assessed by the number of administered doses, the time of onset of regular labour, the course of labour and the postpartum period and the presence of complications, and the course of the early neonatal period, which implied the assessment of the child’s condition, described in the newborn development record. The foetus was assessed by medical ultrasound and antenatal and intranatal cardiotocography (CTG. Obtained results were analysed with SAS statistical processing software. Results The overall percentage of successful births with intravaginal administration of Misoprostol was 93 per cent (83 of cases. This percentage was higher than in the amniotomy group (relative risk (RR 11.7 and was similar to the oxytocin group (RR 0.83. Amniotomy was effective in 54 per cent (39 of cases, when it induced regular labour. Intravenous oxytocin infusion was effective in 94 per cent (89 of cases. This percentage was higher than that with amniotomy (RR 12.5. Conclusions The success of vaginal delivery after previous Caesarean section can be achieved in almost 70 per cent of cases. At that, labour induction does not decrease this indicator and remains within population boundaries.

  9. Establishing a University Foundation.

    Science.gov (United States)

    Lemish, Donald L.

    A handbook on how to establish a university foundation is presented. It presupposes that a foundation will be used as the umbrella organization for receiving all private gifts, restricted and unrestricted, for the benefit of a public college or university; and hence it chiefly addresses readers from public colleges and universities. Information is…

  10. Secular Religious Establishment

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2013-01-01

    Secularism as a political doctrine claims that religion and politics should be separated. The compatibility question is whether secularism can accept some forms of religious establishment in the form of institutional linkages between state and organised religion. I argue that the answer to the co...

  11. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  12. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  13. An optimized DNA extraction protocol for benthic Didymosphenia geminata.

    Science.gov (United States)

    Uyua, Noelia Mariel; Manrique, Julieta Marina; Jones, Leandro Roberto

    2014-09-01

    Didymosphenia geminata mats display few cells in relation to extracellular material and contain polysaccharides and heavy metals that interfere with molecular studies. We describe an optimized DNA extraction protocol that help to overcome these difficulties. Our protocol outperformed five previously described DNA extraction techniques. Copyright © 2014 Elsevier B.V. All rights reserved.

  14. Deniable Key Establishment Resistance against eKCI Attacks

    Directory of Open Access Journals (Sweden)

    Łukasz Krzywiecki

    2017-01-01

    Full Text Available In extended Key Compromise Impersonation (eKCI attack against authenticated key establishment (AKE protocols the adversary impersonates one party, having the long term key and the ephemeral key of the other peer party. Such an attack can be mounted against variety of AKE protocols, including 3-pass HMQV. An intuitive countermeasure, based on BLS (Boneh–Lynn–Shacham signatures, for strengthening HMQV was proposed in literature. The original HMQV protocol fulfills the deniability property: a party can deny its participation in the protocol execution, as the peer party can create a fake protocol transcript indistinguishable from the real one. Unfortunately, the modified BLS based version of HMQV is not deniable. In this paper we propose a method for converting HMQV (and similar AKE protocols into a protocol resistant to eKCI attacks but without losing the original deniability property. For that purpose, instead of the undeniable BLS, we use a modification of Schnorr authentication protocol, which is deniable and immune to ephemeral key leakages.

  15. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  16. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  17. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one......, primarily based on descriptions of the protocols in the notation of CSP (Communicating Sequential Processes)....

  18. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  19. Typing DNA profiles from previously enhanced fingerprints using direct PCR.

    Science.gov (United States)

    Templeton, Jennifer E L; Taylor, Duncan; Handt, Oliva; Linacre, Adrian

    2017-07-01

    Fingermarks are a source of human identification both through the ridge patterns and DNA profiling. Typing nuclear STR DNA markers from previously enhanced fingermarks provides an alternative method of utilising the limited fingermark deposit that can be left behind during a criminal act. Dusting with fingerprint powders is a standard method used in classical fingermark enhancement and can affect DNA data. The ability to generate informative DNA profiles from powdered fingerprints using direct PCR swabs was investigated. Direct PCR was used as the opportunity to generate usable DNA profiles after performing any of the standard DNA extraction processes is minimal. Omitting the extraction step will, for many samples, be the key to success if there is limited sample DNA. DNA profiles were generated by direct PCR from 160 fingermarks after treatment with one of the following dactyloscopic fingerprint powders: white hadonite; silver aluminium; HiFi Volcano silk black; or black magnetic fingerprint powder. This was achieved by a combination of an optimised double-swabbing technique and swab media, omission of the extraction step to minimise loss of critical low-template DNA, and additional AmpliTaq Gold ® DNA polymerase to boost the PCR. Ninety eight out of 160 samples (61%) were considered 'up-loadable' to the Australian National Criminal Investigation DNA Database (NCIDD). The method described required a minimum of working steps, equipment and reagents, and was completed within 4h. Direct PCR allows the generation of DNA profiles from enhanced prints without the need to increase PCR cycle numbers beyond manufacturer's recommendations. Particular emphasis was placed on preventing contamination by applying strict protocols and avoiding the use of previously used fingerprint brushes. Based on this extensive survey, the data provided indicate minimal effects of any of these four powders on the chance of obtaining DNA profiles from enhanced fingermarks. Copyright © 2017

  20. Authentication and common key generation cryptographic protocol for vehicle tachographs

    Directory of Open Access Journals (Sweden)

    Victor S. Gorbatov

    2017-11-01

    Full Text Available We present a public key generation protocol. The key is used for subscriber authentication in tachographs installed on vehicles in order to provide traffic safety. The protocol is based on the well-known Russian cryptographic algorithms. It ensures integrity and authenticity of data transmitted through communication channel between the on-board devices and vehicle tachograph cards. The protocol was developed in accordance with the Rosstandart recommendations and complies with the development and modernization principles for data protection encryption (cryptographic means. The protocol was suggested as a national standard draft and is open for public discussion in accordance with the established procedure. The main results of our study is the formulation of certain security tasks identical to those used by potential infringers to compromise the protocol. This allows one to account for structural features that will ensure further protocol compliance to the target security characteristics, as well as to guarantee subsequent justification of feature set sufficiency.

  1. Establishment of heart teams in Portugal.

    Science.gov (United States)

    Sousa Uva, M; Leite Moreira, A; Gavina, C; Pereira, H; Lopes, M G

    2014-01-01

    Whenever several therapeutic options exist, multidisciplinary decision-making is beneficial for the patient and for society at large. The main obstacles to the establishment of heart teams in Portugal are organizational and logistical. Implementing a heart team approach entails definition of the situations requiring multidisciplinary discussion, creation of clear lines of communication, written protocols and obtaining patient informed consent. The European Society of Cardiology guidelines define the clinical scenarios where intervention of the heart team is recommended. Copyright © 2013 Sociedade Portuguesa de Cardiologia. Published by Elsevier España. All rights reserved.

  2. Designing an Exploration Atmosphere Prebreathe Protocol

    Science.gov (United States)

    Conkin, Johnny; Feiveson, A. H.; Gernhardt, M. L.; Norcross, J. R.; Wessel, J. H., III

    2015-01-01

    Extravehicular activities (EVAs) at remote locations must maximize limited resources such as oxygen (O2) and also minimize the risk of decompression sickness (DCS). A proposed remote denitrogenation (prebreathe) protocol requires astronauts to live in a mildly hypoxic atmosphere at 8.2 psia while periodically performing EVAs at 4.3 psia. Empirical data are required to confirm that the protocol meets the current accept requirements: less than or equal to 15% incidence of Type I DCS, less than or equal to 20% incidence of Grade IV venous gas emboli (VGE), both at 95% statistical confidence, with no Type II DCS symptom during the validation trial. METHODS: A repeated measures statistical design is proposed in which groups of 6 subjects with physical characteristics similar to active-duty astronauts would first become equilibrated to an 8.2 psia atmosphere in a hypobaric chamber containing 34% O2 and 66% N2, over 48 h, and then perform 4 simulated EVAs at 4.3 psia over the next 9 days. In the equilibration phase, subjects undergo a 3-h 100% O2 mask prebreathe prior to and during a 5-min ascent to 8.2 psia to prevent significant tissue N2 supersaturation on reaching 8.2 psia. Masks would be removed once 34% O2 is established at 8.2 psia, and subjects would then equilibrate to this atmosphere for 48 h. The hypoxia is equivalent to breathing air at 1,220 meters (4,000 ft) altitude, just as was experienced in the shuttle 10.2 psia - 26.5% O2 staged denitrogenation protocol and the current ISS campout denitrogenation protocol. For simulated EVAs, each subject dons a mask and breathes 85% O2 and 15% N2 during a 3-min depressurization to 6.0 psia, holds for 15 min, and then completes a 3-min depressurization to 4.3 psia. The simulated EVA period starts when 6.0 psia is reached and continues for a total of 240 min (222 min at 4.3 psia). During this time, subjects will follow a prescribed repetitive activity against loads in the upper and lower body with mean metabolic rate

  3. Elaboration of an electroporation protocol for Bacillus cereus ATCC 14579.

    Science.gov (United States)

    Turgeon, Nathalie; Laflamme, Christian; Ho, Jim; Duchaine, Caroline

    2006-12-01

    An electro-transformation procedure was established for Bacillus cereus ATCC 14579. Using early growth-stage culture and high electric field, the ectroporation efficiency was up to 2 x 10(9) cfu microg(-1) ml(-1) with pC194 plasmid DNA. The procedure was tested with three other plasmids, of various sizes, replication mechanisms and selection markers, and the transformation efficiencies ranged between 2 x 10(6) and 1 x 10(8) cfu microg(-1) ml(-)(1). The effects of two wall-weakening agents on electroporation rates were also evaluated. The transformation rate that was reached with our procedure is 10(3) times higher than that previously obtained with members of the Bacillus genus with similar plasmids, and 10(6) times superior than that achieved with available protocols for B. cereus. The proposed method is quick, simple, efficient with small rolling circle plasmids and large theta replicating plasmids with low copy number per cell, and suitable for many genetic manipulations that are not possible without high-efficiency transformation protocols.

  4. Zero-Knowledge Protocols and Multiparty Computation

    DEFF Research Database (Denmark)

    Pastro, Valerio

    This thesis presents results in two branches of cryptography. In the first part we construct two general multiparty computation protocols that can evaluate any arithmetic circuit over a finite field. Both are built in the preprocessing model and achieve active security in the setting of a dishonest....... In previous work this task was assumed to be performed by an ideal functionality. In the second part we shift our focus to a task that is related to multiparty computation in an indirect way: we propose a zero-knowledge protocol that allows a prover to show a verifier that he holds a tuple of three values...

  5. Re-establishing dignity

    DEFF Research Database (Denmark)

    Høy, Bente; Hall, E.O.C

    2012-01-01

    study with 29 nurses and nurse assistants was performed following Van Manen’s hermeneutic phenomenology. Findings show that caring mainly concerns ‘re-establishing dignity’ especially through ‘seeing the patient as a unique person’, ‘assisting in getting rid of the bed’ and ‘supporting patient...... appearance’. The study documents that caring for older people is about creating small everyday circumstances in which patient dignity can flourish. Shortcomings of a secondary analysis are discussed and suggestions for future research, such as how older hospital patients experience caring and dignity...

  6. Structured Transition Protocol for Children with Cystinosis

    Directory of Open Access Journals (Sweden)

    Rupesh Raina

    2017-08-01

    Full Text Available The transition from pediatric to adult medical services has a greater impact on the care of adolescents or young adults with chronic diseases such as cystinosis. This transition period is a time of psychosocial development and new responsibilities placing these patients at increased risk of non-adherence. This can lead to serious adverse effects such as graft loss and progression of the disease. Our transition protocol will provide patients, families, physicians, and all those involved a structured guide to transitioning cystinosis patients. This structured protocol depends on four areas of competency: Recognition, Insight, Self-reliance, and Establishment of healthy habits (RISE. This protocol has not been tested and therefore challenges not realized. With a focus on medical, social, and educational/vocational aspects, we aim to improve transition for cystinosis patients in all aspects of their lives.

  7. Fast-track protocols in devascularization for cirrhotic portal hypertension

    Directory of Open Access Journals (Sweden)

    Yang Fei

    2015-06-01

    Full Text Available Summary Introduction/objective: fast-tract surgery (FTS has been rapidly embraced by surgeons as a mechanism for improving patient care and driving down complications and costs. The aim of this study was to determine if any improvement in outcomes occurred after FTS protocol for selective double portazygous disconnection with preserving vagus (SDPDPV compared with non-FTS postoperative care. Methods: patients eligible for SDPDPV in the period January 2012-April 2014 were randomly selected for the FTS group or non-FTS group. A designed protocol was used in the FTS group with emphasis on an interdisciplinary approach. The non-FTS group was treated using previously established standard procedures. The number of postoperative complications, time of functional recovery and duration of hospital stay were recorded. Results: patients in the FTS group (n=59 and non-FTS group (n=57 did not differ in terms of preoperative data and operative details (p>0.05. The FTS procedure led to significantly better control and faster restoration of gastrointestinal functions, food tolerance, rehabilitation and hospital discharge (p<0.05. Postoperative complications, including nausea/vomiting, severe ascites, wound infection, urinary tract infection and pulmonary infection were all significantly lower in the FTS group (p<0.05. According to the postoperative morbidity classification used by Clavien, overall complications and grade I complications were both significantly lower in the FTS group compared with the non-FTS group (p<0.05. Conclusion: adopting the FTS protocol helped to recover gastrointestinal functions, to reduce frequency of postoperative complications and to reduce hospital stay. The FTS strategy is safe and effective in improving postoperative outcomes.

  8. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  9. Establishing effective working relationships.

    Science.gov (United States)

    Houghton, Trish

    2016-02-24

    This article, the second in a series of 11, provides support and offers advice to new and existing mentors and practice teachers to enable them to progress in their role and develop a portfolio of evidence. In particular, the article discusses how to establish effective working relationships and emphasises the importance of the student-mentor or student-practice teacher relationship. It examines the essential qualities, attributes and characteristics of an effective mentor or practice teacher. The article provides learning activities and suggests ways in which mentors and practice teachers can undertake various self-assessments, enabling them to gather relevant evidence to demonstrate how they can meet and maintain the requirements for these roles as stipulated by the Nursing and Midwifery Council.

  10. Establishing Political Deliberation Systems

    DEFF Research Database (Denmark)

    Rose, Jeremy; Sæbø, Øystein

    2008-01-01

    The extension and transformation of political participation is dependent on widespread deliberation supported by information and communication technologies.  The most commonly found examples of these eParticipation systems are political discussion forums.  Though much of the discussion...... of these technologies is conducted in the eGovernment and (particularly) the eDemocracy literature, political discussion forums present a distinct set of design and management challenges which relate directly to IS concerns. In this article we analyze problems in establishing political deliberation systems under five...... headings: stakeholder engagement, web platform design, web platform management, political process re-shaping and evaluation and improvement. We review the existing literature and present a longitudinal case study of a political discussion forum: the Norwegian DemokratiTorget (Democracy Square).  We define...

  11. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  12. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  13. Breaking Megrelishvili protocol using matrix diagonalization

    Science.gov (United States)

    Arzaki, Muhammad; Triantoro Murdiansyah, Danang; Adi Prabowo, Satrio

    2018-03-01

    In this article we conduct a theoretical security analysis of Megrelishvili protocol—a linear algebra-based key agreement between two participants. We study the computational complexity of Megrelishvili vector-matrix problem (MVMP) as a mathematical problem that strongly relates to the security of Megrelishvili protocol. In particular, we investigate the asymptotic upper bounds for the running time and memory requirement of the MVMP that involves diagonalizable public matrix. Specifically, we devise a diagonalization method for solving the MVMP that is asymptotically faster than all of the previously existing algorithms. We also found an important counterintuitive result: the utilization of primitive matrix in Megrelishvili protocol makes the protocol more vulnerable to attacks.

  14. Nursing Music Protocol and Postoperative Pain.

    Science.gov (United States)

    Poulsen, Michael J; Coto, Jeffrey

    2018-04-01

    Pain has always been a major concern for patients and nurses during the postoperative period. Therapies, medicines, and protocols have been developed to improve pain and anxiety but have undesirable risks to the patient. Complementary and alternative medicine therapies have been studied but have not been applied as regular protocols in the hospital setting. Music is one type of complementary and alternative medicine therapy that has been reported to have favorable results on reducing postoperative pain, anxiety, and opioid usage. However, music lacks a protocol that nurses can implement during the perioperative process. This paper is an in-depth literature review assessing a best practice recommendation and protocol that establishes a consensus in the use of music therapy. The results suggest that music therapy may consist of calming, soft tones of 60-80 beats per minute for at least 15-30 minutes at least twice daily during the pre- and postoperative periods. It is suggested that music only be used in conjunction with standards of care and not as the primary intervention of pain or anxiety. This evidence suggests that proper use of music therapy can significantly reduce surgical pain. Implementing these protocols and allowing the freedom of nursing staff to use them may lead to greater reductions in surgical pain and anxiety and a reduction in opioid use. Copyright © 2017 American Society for Pain Management Nursing. Published by Elsevier Inc. All rights reserved.

  15. Proteomics Analysis Reveals Previously Uncharacterized Virulence Factors in Vibrio proteolyticus.

    Science.gov (United States)

    Ray, Ann; Kinch, Lisa N; de Souza Santos, Marcela; Grishin, Nick V; Orth, Kim; Salomon, Dor

    2016-07-26

    Members of the genus Vibrio include many pathogens of humans and marine animals that share genetic information via horizontal gene transfer. Hence, the Vibrio pan-genome carries the potential to establish new pathogenic strains by sharing virulence determinants, many of which have yet to be characterized. Here, we investigated the virulence properties of Vibrio proteolyticus, a Gram-negative marine bacterium previously identified as part of the Vibrio consortium isolated from diseased corals. We found that V. proteolyticus causes actin cytoskeleton rearrangements followed by cell lysis in HeLa cells in a contact-independent manner. In search of the responsible virulence factor involved, we determined the V. proteolyticus secretome. This proteomics approach revealed various putative virulence factors, including active type VI secretion systems and effectors with virulence toxin domains; however, these type VI secretion systems were not responsible for the observed cytotoxic effects. Further examination of the V. proteolyticus secretome led us to hypothesize and subsequently demonstrate that a secreted hemolysin, belonging to a previously uncharacterized clan of the leukocidin superfamily, was the toxin responsible for the V. proteolyticus-mediated cytotoxicity in both HeLa cells and macrophages. Clearly, there remains an armory of yet-to-be-discovered virulence factors in the Vibrio pan-genome that will undoubtedly provide a wealth of knowledge on how a pathogen can manipulate host cells. The pan-genome of the genus Vibrio is a potential reservoir of unidentified toxins that can provide insight into how members of this genus have successfully risen as emerging pathogens worldwide. We focused on Vibrio proteolyticus, a marine bacterium that was previously implicated in virulence toward marine animals, and characterized its interaction with eukaryotic cells. We found that this bacterium causes actin cytoskeleton rearrangements and leads to cell death. Using a

  16. Rates of induced abortion in Denmark according to age, previous births and previous abortions

    Directory of Open Access Journals (Sweden)

    Marie-Louise H. Hansen

    2009-11-01

    Full Text Available Background: Whereas the effects of various socio-demographic determinants on a woman's risk of having an abortion are relatively well-documented, less attention has been given to the effect of previous abortions and births. Objective: To study the effect of previous abortions and births on Danish women's risk of an abortion, in addition to a number of demographic and personal characteristics. Data and methods: From the Fertility of Women and Couples Dataset we obtained data on the number of live births and induced abortions by year (1981-2001, age (16-39, county of residence and marital status. Logistic regression analysis was used to estimate the influence of the explanatory variables on the probability of having an abortion in a relevant year. Main findings and conclusion: A woman's risk of having an abortion increases with the number of previous births and previous abortions. Some interactions were was found in the way a woman's risk of abortion varies with calendar year, age and parity. The risk of an abortion for women with no children decreases while the risk of an abortion for women with children increases over time. Furthermore, the risk of an abortion decreases with age, but relatively more so for women with children compared to childless women. Trends for teenagers are discussed in a separate section.

  17. Newborn hearing screening protocol in tuscany region.

    Science.gov (United States)

    Berrettini, Stefano; Ghirri, Paolo; Lazzerini, Francesco; Lenzi, Giovanni; Forli, Francesca

    2017-09-20

    Newborn hearing screening has to be considered the first step of a program for the identification, diagnosis, treatment and habilitation/rehabilitation of children with hearing impairment. In Tuscany Region of Italy, the universal newborn hearing screening is mandatory since november 2007. The first guidelines for the execution of the screening have been released in June 2008; then many other Italian regions partially or totally adopted these guidelines. On the basis of the experience from 2008 and according to the recent evidences in the scientific literature, a new screening protocol was released in Tuscany region. The new protocol is an evolution of the previous one. Some issues reported in the previous protocol and in the Joint Committee on Infant Hearing statement published in 2007 were revised, such as the risk factors for auditory neuropathy and for late onset, progressive or acquired hearing loss. The new updated guidelines were submitted to the Sanitary Regional Council and then they have been approved in August 2016. The updated screening protocol is mainly aimed to identify newborns with a congenital moderate-to-profound hearing loss, but it also provides indications for the audiological follow-up of children with risk's factor for progressive or late onset hearing loss; further it provides indications for the audiological surveillance of children at risk for acquired hearing impairment. Then, in the new guidelines the role of the family paediatrician in the newborn hearing screening and audiological follow-up and surveillance is underscored. Finally the new guidelines provide indications for the treatment with hearing aids and cochlear implant, in accordance with the recent Italian Health Technology Assessment (HTA) guidelines. In the paper we report the modality of execution of the universal newborn hearing screening in the Tuscany Region, according to the recently updated protocol. The main features of the protocol and the critical issues are

  18. Protocol Coordinator | Center for Cancer Research

    Science.gov (United States)

    , NCI and NIH policies Collaborates with investigators to resolve any protocol/data issues Coordinates submission of protocols for scientific and ethical review by the Branch scientific review committees, the NCI Institutional Review Board (IRB) and the clinical trial sponsor or the FDA Monitors the review process and maintains detailed, complete and accurate records for each protocol of the approvals at the various stages of the review process, including new protocol submissions, amendments to protocols, and continuing reviews, as well as other submissions such as adverse events Attends and prepares minutes for the Branch Protocol Review Committees For protocols that are performed with other research centers: Contacts coordinators at other centers to obtain review committee approvals at these centers, maintains records of these approvals at the outside centers in the protocol files, and sends protocol amendments and other reports to the participating centers Maintains a schedule of all review committee submission deadline dates and meeting dates Assists clinical investigators in understanding and complying with the entire review process Works closely with the NCI Protocol Review Office in establishing and maintaining a paperless automated document management and tracking system for NCI protocols Converts protocols from Word format to PDF with bookmarks Maintains the PDF version of the most current approved version of each active clinical protocol on a central server This position is located in Rockville, Maryland.

  19. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  20. Information Flow in Secret Sharing Protocols

    Directory of Open Access Journals (Sweden)

    Elham Kashefi

    2009-11-01

    Full Text Available The entangled graph states have emerged as an elegant and powerful quantum resource, indeed almost all multiparty protocols can be written in terms of graph states including measurement based quantum computation (MBQC, error correction and secret sharing amongst others. In addition they are at the forefront in terms of implementations. As such they represent an excellent opportunity to move towards integrated protocols involving many of these elements. In this paper we look at expressing and extending graph state secret sharing and MBQC in a common framework and graphical language related to flow. We do so with two main contributions. First we express in entirely graphical terms which set of players can access which information in graph state secret sharing protocols. These succinct graphical descriptions of access allow us to take known results from graph theory to make statements on the generalisation of the previous schemes to present new secret sharing protocols. Second, we give a set of necessary conditions as to when a graph with flow, i.e. capable of performing a class of unitary operations, can be extended to include vertices which can be ignored, pointless measurements, and hence considered as unauthorised players in terms of secret sharing, or error qubits in terms of fault tolerance. This offers a way to extend existing MBQC patterns to secret sharing protocols. Our characterisation of pointless measurements is believed also to be a useful tool for further integrated measurement based schemes, for example in constructing fault tolerant MBQC schemes.

  1. The Establishing Operation and Teaching Verbal Behavior

    Science.gov (United States)

    Carbone, Vincent J.

    2013-01-01

    Twenty years ago Michael (1993) refined and extended the concept of the conditioned establishing operation (CEO). With this paper he updated his previous treatment of the topic (Michael, 1982) by providing terminological refinements and conceptually clear descriptions of the reflexive and transitive CEOs. In the 20 years since the publication of…

  2. Risoe Research Establishment, Denmark

    International Nuclear Information System (INIS)

    1973-01-01

    On the poetic Roskilde Fjord, 40 kilometers from Copenhagen, and near Roskilde, capital of Denmark in the 12th century, stands the Risoe Research Establishment of the Danish Atomic Energy Commission. ere 700 men and women are engaged in searching for ways in which atomic energy can be used to make the world a better and healthier place. The work at Risoe comprises fundamental research, reactor technology and other technological studies, agricultural research and health and safety studies. Nuclear power stations are scheduled to be operative in Denmark some time between 1975 and 1980, and the planning of these stations and development of the many processes this will involve has become a major task at Risoe. Special conditions have to be fulfilled in selecting the site of an atomic research station, and the barren Risoe peninsula had them all: safety, because the site was free from buildings to permit continuous control; closeness to the scientific institutions of the capital, Copenhagen; social amenities in Roskilde; finally, access to an a adequate water supply. his special series of photos covering some aspects of the work and safety conditions at Risoe was commissioned by WHO. (author)

  3. The practicalities of establishing a porcine isolated heart model.

    Science.gov (United States)

    Pavey, Warren; Raisis, Anthea; Dunne, Ben; Van Laeken, Els; Jenkinson, Charles; Vincent, Viji; Baird, Peter; Prince, Stuart; Ho, Kwok M; Merry, Christopher; Gilfillan, Ian

    2017-12-01

    The isolated heart apparatus is over 100 years old, but remains a useful research tool today. While designs of many large animal systems have been described in the literature, trouble-shooting and refining such a model to yield a stable, workable system has not been previously described. This paper outlines the issues, in tabular form, that our group encountered in developing our own porcine isolated heart rig with the aim of assisting other workers in the field planning similar work. The paper also highlights some of the modern applications of the isolated heart apparatus. Methods Landrace pigs (50-80 kg) were used in a pilot project to develop the model. The model was then used in a study examining the effects of various cardioplegic solutions on function after reanimation of porcine hearts. During the two projects, non-protocol issues were documented as well as their solutions. These were aggregated in this paper. Issues faced by the group without explicit literature solutions included pig size selection, animal acclimatisation, porcine transoesophageal echocardiography, cannulation and phlebotomy for cross-clamping, cardioplegia delivery, heart suspension and rig tuning. Prior recognition of issues and possible solutions faced by workers establishing a porcine isolated heart system will speed progress towards a useable system for research. The isolated heart apparatus remains applicable in transplant, ischaemia reperfusion, heart failure and organ preservation research.

  4. Congruency sequence effects are driven by previous-trial congruency, not previous-trial response conflict

    OpenAIRE

    Weissman, Daniel H.; Carp, Joshua

    2013-01-01

    Congruency effects in distracter interference tasks are often smaller after incongruent trials than after congruent trials. However, the sources of such congruency sequence effects (CSEs) are controversial. The conflict monitoring model of cognitive control links CSEs to the detection and resolution of response conflict. In contrast, competing theories attribute CSEs to attentional or affective processes that vary with previous-trial congruency (incongruent vs. congruent). The present study s...

  5. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one...

  6. Frameworks for Protocol Implementation

    NARCIS (Netherlands)

    de Barros Barbosa, Ciro; de barros Barbosa, C.; Ferreira Pires, Luis; Pires, L.F.; van Sinderen, Marten J.

    1998-01-01

    This paper reports on the development of a catalogue of frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be re-used in the implementation of various different concrete systems in this domain. By using frameworks we aim

  7. Critical Response Protocol

    Science.gov (United States)

    Ellingson, Charlene; Roehrig, Gillian; Bakkum, Kris; Dubinsky, Janet M.

    2016-01-01

    This article introduces the Critical Response Protocol (CRP), an arts-based technique that engages students in equitable critical discourse and aligns with the "Next Generation Science Standards" vision for providing students opportunities for language learning while advancing science learning (NGSS Lead States 2013). CRP helps teachers…

  8. Updating protocols prodigy.

    Science.gov (United States)

    Ambrose, Kate

    2005-04-01

    If you are updating protocols, why not try the Prodigy website, at www.prodigy.nhs.uk ? It is a source of clinical knowledge on a range oftopics that is based on best evidence and organised to support clinical decision making.

  9. Proteomics Analysis Reveals Previously Uncharacterized Virulence Factors in Vibrio proteolyticus

    Directory of Open Access Journals (Sweden)

    Ann Ray

    2016-07-01

    Full Text Available Members of the genus Vibrio include many pathogens of humans and marine animals that share genetic information via horizontal gene transfer. Hence, the Vibrio pan-genome carries the potential to establish new pathogenic strains by sharing virulence determinants, many of which have yet to be characterized. Here, we investigated the virulence properties of Vibrio proteolyticus, a Gram-negative marine bacterium previously identified as part of the Vibrio consortium isolated from diseased corals. We found that V. proteolyticus causes actin cytoskeleton rearrangements followed by cell lysis in HeLa cells in a contact-independent manner. In search of the responsible virulence factor involved, we determined the V. proteolyticus secretome. This proteomics approach revealed various putative virulence factors, including active type VI secretion systems and effectors with virulence toxin domains; however, these type VI secretion systems were not responsible for the observed cytotoxic effects. Further examination of the V. proteolyticus secretome led us to hypothesize and subsequently demonstrate that a secreted hemolysin, belonging to a previously uncharacterized clan of the leukocidin superfamily, was the toxin responsible for the V. proteolyticus-mediated cytotoxicity in both HeLa cells and macrophages. Clearly, there remains an armory of yet-to-be-discovered virulence factors in the Vibrio pan-genome that will undoubtedly provide a wealth of knowledge on how a pathogen can manipulate host cells.

  10. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  11. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  12. Impact of mobility models on clustering based routing protocols in mobile WSNs

    OpenAIRE

    Khan, Atta ur Rehman; Ali, Shahzad; Mustafa, Saad; Othman, Mazliza

    2013-01-01

    This paper presents comparison of different hierarchical (position and non-position based) protocols with respect to different mobility models. Previous work mainly focuses on static networks or at most a single mobility model. Using only one mobility model may not predict the behavior of routing protocol accurately. Simulation results show that mobility has large impact on the behavior of WSN routing protocols. Also, position based routing protocols performs better in terms of packet deliver...

  13. Quantum-key-distribution protocol with pseudorandom bases

    Science.gov (United States)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  14. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  15. Phototherapy Modalities and Protocols

    Directory of Open Access Journals (Sweden)

    Ayten Ferahbaş

    2010-12-01

    Full Text Available Over the past few years, the development of irradiation devices with new emission spectra has led to an expanded role for phototherapy in the treatment of skin diseases. This development is best illustrated by the increasing frequency with which 311 nm UVB phototherapy is used for the treatment of psoriasis and vitiligo, especially. Another example is UVA1 340-400 nm. UVA1 was first used to treat patients with atopic dermatitis, but it has been found to be efficacious in several other skin diseases. This is overview of the protocols for phototherapy with UV in the treatment of skin diseases as currently used according to recent literature review. There are, of course, other protocols in use that are effective.

  16. The challenges of additional protocol implementation

    International Nuclear Information System (INIS)

    Renis, Therese

    2001-01-01

    Full text: The IAEA Board of Governors approved the Model Protocol Additional to Safeguards Agreements, INFCIRC/540, (referred to as the Additional Protocol) in May 1997. The Additional Protocol provides for new mechanisms that include expanded information on State's nuclear activities to be declared to the IAEA and increased physical access to locations for IAEA inspectors. The objective is to provide the basis for gaining assurance of the absence of undeclared nuclear material and activities in a State. Although the Agency conducted field trials of various aspects of implementation of the Additional Protocol, the first actual implementation experience began with the entry into force of Australia's additional protocol in December of 1997. As of late August 2001,21 states have entered into force an additional protocol and another 35 states have signed the additional protocol but not yet entered the agreement into force. Because implementation of the Additional Protocol requires new activities to be carried out by the IAEA, new procedures, guidelines and training have been developed to support these activities. As more experience is gained these documents are being refined and additional ones developed to meet unforeseen needs. In addition, evaluation and follow-up of the expanded information and the results of increased access has required the Safeguards Department to expand and adapt its procedures and mode of operation. The challenge has been in establishing sufficient measures and the necessary infrastructure for consistent application of the additional protocol in such a way that they can be adapted as needed based on Agency experience. Initial development focused on the logistical aspects of implementing these new activities. These activities include the processing, handling and review of additional protocol declarations; planning, conducting and reporting on complementary access activities; and follow-up activities arising from information review or

  17. Diplomacy and Diplomatic Protocol

    Directory of Open Access Journals (Sweden)

    Lect. Ph.D Oana Iucu

    2008-12-01

    Full Text Available The present study aims to observe relationships and determining factors between diplomacyand diplomatic protocol as outlined by historical and contextual analyses. The approach is very dynamic,provided that concepts are able to show their richness, antiquity and polyvalence at the level of connotations,semantics, grammatical and social syntax. The fact that this information is up to date determines anattitude of appreciation and a state of positive contamination.

  18. Monoclonal antibodies technology. Protocols

    International Nuclear Information System (INIS)

    Acevado Castro, B.E.

    1997-01-01

    Full text: Immunization. The first step in preparing useful monoclonal antibodies (MAbs) is to immunize an animal (Balb/c for example) with an appropriate antigen. Methods (only for soluble antigen): Solubilize selected antigen in Phosphate buffer solution (PBS) at pH 7.2-7.4, ideally at a final concentration per animal between 10 to 50 μg/ml. It is recommended that the antigen under consideration be incorporated into the emulsion adjuvants in 1:1 volumetric relation. We commonly use Frend's adjuvant (FA) to prepared immunized solution. The first immunization should be prepared with complete FA, and the another could be prepared with incomplete FA. It is recommended to inject mice with 0.2 ml intraperitoneal (ip) or subcutaneous (sc). Our experience suggests the sc route is the preferred route. A minimum protocol for immunizing mice to generate cells for preparing hybridomas is s follows: immunize sc on day 0, boost sc on day 21, take a trial bleeding on day 26; if antibody titters are satisfactory, boost ip on day 35 with antigen only, and remove the spleen to obtain cells for fusion on day 38. Fusion protocol. The myeloma cell line we are using is X63 Ag8.653. At the moment of fusion myeloma cells need a good viability (at least a 95%). 1. Remove the spleen cells from immunized mice using sterile conditions. An immune spleen should yield between 7 a 10x10 7 nucleated cells. 2. Place the spleen in 20 ml of serum-free RPMI 1640 in a Petri dish. Using a needle and syringe, inject the spleen with medium to distend and disrupt the spleen stroma and free the nucleated cells. 3. Flush the cell suspension with a Pasteur pipet to disperse clumps of cells. 4. Centrifuge the spleen cell suspension at 250g for 10 min. Resuspend the pellet in serum-free RPMI 1640. Determine cell concentration using Neuhabuer chamber. 5. Mix the myeloma cells and spleen cells in a conical 50-ml tube in serum-free RPMI 1640, 1 x10 7 spleen cells to 1x10 6 myeloma cells (ratio 10:1). Centrifuge

  19. Protocol for counterfactually transporting an unknown qubit

    Directory of Open Access Journals (Sweden)

    Hatim eSalih

    2016-01-01

    Full Text Available Quantum teleportation circumvents the uncertainty principle using dual channels: a quantum one consisting of previously-shared entanglement, and a classical one, together allowing the disembodied transport of an unknown quantum state over distance. It has recently been shown that a classical bit can be counterfactually communicated between two parties in empty space, Alice and Bob. Here, by using our dual version of the chained quantum Zeno effect to achieve a counterfactual CNOT gate, we propose a protocol for transporting an unknown qubit counterfactually, that is without any physical particles travelling between Alice and Bob—no classical channel and no previously-shared entanglement.

  20. Establishing operations and reinforcement effects.

    Science.gov (United States)

    Vollmer, T R; Iwata, B A

    1991-01-01

    Positive reinforcement procedures have had a major impact on educational programs for the developmentally disabled; nevertheless, variation in reinforcer effectiveness both within and across individuals is a common phenomenon. This study examined one class of variables--establishing operations--that might influence the effectiveness of reinforcers. Five developmentally disabled adult males participated. Responding on one of two motor tasks--switch closure or block placement--was assessed during baseline, satiation, and deprivation conditions with respect to three classes of consequences: small food items, music, and social praise. Deprivation and satiation conditions were constructed so as not to alter significantly the normal course of events in a subject's day. For example, food deprivation entailed scheduling sessions just prior to a subject's regular lunch, and social deprivation involved limiting a subject's access to social interaction for 15 minutes, during which time the subject had access to an assortment of other activities. Results showed that each stimulus class functioned as reinforcement with different degrees of effectiveness during satiation versus deprivation conditions. These results are discussed in light of previous research on enhancement of reinforcer efficacy as well as the assessment and identification of functional reinforcers, and implications are presented for future research and client habilitation.

  1. Analytical approach to cross-layer protocol optimization in wireless sensor networks

    Science.gov (United States)

    Hortos, William S.

    2008-04-01

    terms of the concatenated protocol parameters. New source-to-destination routes are sought that optimize cross-layer interdependencies to achieve the "best available" performance in the WSN. The protocol design, modified from a known reactive protocol, adapts the achievable performance to the transient network conditions and resource levels. Control of network behavior is realized through the conditional rates of the MVPPs. Optimal cross-layer protocol parameters are determined by stochastic dynamic programming conditions derived from models of transient packetized sensor data flows. Moreover, the defining conditions for WSN configurations, grouping sensor nodes into clusters and establishing data aggregation at processing nodes within those clusters, lead to computationally tractable solutions to the stochastic differential equations that describe network dynamics. Closed-form solution characteristics provide an alternative to the "directed diffusion" methods for resource-efficient WSN protocols published previously by other researchers. Performance verification of the resulting cross-layer designs is found by embedding the optimality conditions for the protocols in actual WSN scenarios replicated in a wireless network simulation environment. Performance tradeoffs among protocol parameters remain for a sequel to the paper.

  2. Dysphonia risk screening protocol

    Science.gov (United States)

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  3. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  4. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  5. Drug Establishments Current Registration Site

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Drug Establishments Current Registration Site (DECRS) is a database of current information submitted by drug firms to register establishments (facilities) which...

  6. Establishment probability in newly founded populations

    Directory of Open Access Journals (Sweden)

    Gusset Markus

    2012-06-01

    Full Text Available Abstract Background Establishment success in newly founded populations relies on reaching the established phase, which is defined by characteristic fluctuations of the population’s state variables. Stochastic population models can be used to quantify the establishment probability of newly founded populations; however, so far no simple but robust method for doing so existed. To determine a critical initial number of individuals that need to be released to reach the established phase, we used a novel application of the “Wissel plot”, where –ln(1 – P0(t is plotted against time t. This plot is based on the equation P0t=1–c1e–ω1t, which relates the probability of extinction by time t, P0(t, to two constants: c1 describes the probability of a newly founded population to reach the established phase, whereas ω1 describes the population’s probability of extinction per short time interval once established. Results For illustration, we applied the method to a previously developed stochastic population model of the endangered African wild dog (Lycaon pictus. A newly founded population reaches the established phase if the intercept of the (extrapolated linear parts of the “Wissel plot” with the y-axis, which is –ln(c1, is negative. For wild dogs in our model, this is the case if a critical initial number of four packs, consisting of eight individuals each, are released. Conclusions The method we present to quantify the establishment probability of newly founded populations is generic and inferences thus are transferable to other systems across the field of conservation biology. In contrast to other methods, our approach disaggregates the components of a population’s viability by distinguishing establishment from persistence.

  7. The Introduction of a Protocol for the Use of Biobrane for Facial Burns in Children

    Directory of Open Access Journals (Sweden)

    A. D. Rogers

    2011-01-01

    Full Text Available Biobrane has become an indispensible dressing with three established indications in acute burns care at our institution: (1 as the definitive dressing of superficial partial thickness facial burns, (2 after tangential excision of deep burns when autograft or cadaver skin is unavailable, and (3 for graft reduction. This paper details our initial experience of Biobrane for the management of superficial partial thickness facial burns in children and the protocol that was compiled for its optimal use. A retrospective analysis of theatre records, case notes and photographs was performed to evaluate our experience with Biobrane over a one-year period. Endpoints included length of stay, analgesic requirements, time to application of Biobrane, healing times, and aesthetic results. Historical controls were used to compare the results with our previous standard of care. 87 patients with superficial partial thickness burns of the face had Biobrane applied during this period. By adhering to the protocol we were able to demonstrate significant reductions in hospital stay, healing time, analgesic requirements, nursing care, with excellent cosmetic results. The protocol is widely accepted by all involved in the optimal management of these patients, including parents, anaesthetists, and nursing staff.

  8. [Carbapenem antibiotics in hospitalised paediatric patients. Adherence to a therapeutic protocol].

    Science.gov (United States)

    Montesinos-Sanchis, Elena; Moraga-Llop, Fernando A; Soler-Palacín, Pere; Oliveras-Arenas, María; Larrosa Escartín, M Nieves; Martínez Gómez, Xavier; Figueras-Nadal, Concepción

    2014-12-01

    To describe the use of carbapenems in children hospitalised outside intensive care and onco-haematology units, and assess adherence to a therapeutic protocol. A retrospective observational study was conducted on the use of carbapenems between January 2009 and December 2010. The study included children with a community-acquired infectious disease or a health care-associated infectious disease, and who were admitted to paediatric areas of the Vall d'Hebron University Hospital (Barcelona, Spain), other than intensive care, neonatology and onco-haematology units. Clinical data were collected and antibiotic consumption data were provided by the Pharmacy Department. A total of 51 episodes fulfilled the inclusion criteria. Carbapenem as initial empirical treatment was indicated in 31.4%, and applied as rescue therapy in the remainder. The instructions of the protocol were adhered to in 70.6% of the empirical and 87.5% of the targeted prescriptions (77.6% overall). A better match was found for empirical carbapenem in patients with a previous admission or underlying condition. Factors such as diagnosis, age or antibiotic use prior to admission did not affect the empirical indication of carbapenem. The establishment of a treatment protocol with carbapenem indications in our centre since 2007 has yielded significantly better results on the appropriateness of the prescription than those obtained in other studies. Copyright © 2012 Elsevier España, S.L.U. y Sociedad Española de Enfermedades Infecciosas y Microbiología Clínica. All rights reserved.

  9. Protocols on prenatal care for pregnant women with Zika infection and children with microcephaly: nutritional approach

    Directory of Open Access Journals (Sweden)

    Rachel de Sá Barreto Luna Callou Cruz

    Full Text Available Abstract This summary aimed to synthesize the protocol guidelines of Pernambuco, the Ministry of Health and the Centers for Disease Control and Prevention which deal with health care related to Zika virus infection during pregnancy and the preliminary procedures for surveillance on microcephaly cases including nutritional care. With the increase of number of cases on this event since August, 2015, it was necessary to reorganize the prenatal care which is offered to pregnant women, including the protocols in order to reduce the chances of a possible contamination of the virus, to detect previously suspected cases as well as perform follow up on confirmed cases. The gaps in the knowledge of this morbidity, it should be noted that the information and recommendations are subject to revision due to possible incorporation of new knowledge and other evidence, as well as the need for adequacy of surveillance actions in new epidemiological scenarios. It is known that cases of nutritional deficiencies are capable of producing malformation of the Central Nervous System, including microcephaly. In the analysis of the protocols, there were no changes as to the nutritional recommendations already established for the low-risk pregnant women. The authors presented a hypothesis and conceptually, as a prevention measurement, the inclusion of prenatal care to prevent and control isolated or multiple deficiencies associated to microcephaly, such as protein, vitamin A, iodine, folate, B12, vitamin D, biotin, zinc and selenium.

  10. [A new protocol, is the spine still safe?].

    Science.gov (United States)

    Kokke, Marike C; Ham, Wietske; Leenen, Loek P H

    2015-01-01

    The latest version of the Dutch National Protocol Ambulance Care (Landelijk Protocol Ambulancezorg LPA8), introduced on 1 January 2015, contains too few guarantees of the safety of trauma patients in whom spinal immobilisation has to be performed. A number of strict indications have been removed and too much freedom is also permitted with respect to implementation. Although the previous standard method using a spinal board, collar and blocks did have disadvantages, the new operating method has been insufficiently substantiated and, in addition, is not well matched to the protocols of Accident and Emergency departments. It is vital that the agencies involved collaborate to reach a joint solution.

  11. A Calculus for Control Flow Analysis of Security Protocols

    DEFF Research Database (Denmark)

    Buchholtz, Mikael; Nielson, Hanne Riis; Nielson, Flemming

    2004-01-01

    The design of a process calculus for anaysing security protocols is governed by three factors: how to express the security protocol in a precise and faithful manner, how to accommodate the variety of attack scenarios, and how to utilise the strengths (and limit the weaknesses) of the underlying...... analysis methodology. We pursue an analysis methodology based on control flow analysis in flow logic style and we have previously shown its ability to analyse a variety of security protocols. This paper develops a calculus, LysaNS that allows for much greater control and clarity in the description...

  12. Establishment, maintenance, and re-establishment of the safe and efficient steady-following state

    International Nuclear Information System (INIS)

    Pan Deng; Zheng Ying-Ping

    2015-01-01

    We present an integrated mathematical model of vehicle-following control for the establishment, maintenance, and re-establishment of the previous or new safe and efficient steady-following state. The hyperbolic functions are introduced to establish the corresponding mathematical models, which can describe the behavioral adjustment of the following vehicle steered by a well-experienced driver under complex vehicle following situations. According to the proposed mathematical models, the control laws of the following vehicle adjusting its own behavior can be calculated for its moving in safety, efficiency, and smoothness (comfort). Simulation results show that the safe and efficient steady-following state can be well established, maintained, and re-established by its own smooth (comfortable) behavioral adjustment with the synchronous control of the following vehicle’s velocity, acceleration, and the actual following distance. (paper)

  13. Mouse cell culture - Methods and protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-12-01

    Full Text Available The mouse is, out of any doubt, the experimental animal par excellence for many many colleagues within the scientific community, notably for those working in mammalian biology (in a broad sense, from basic genetic to modeling human diseases, starting at least from 1664 Robert Hooke experiments on air’s propertyn. Not surprising then that mouse cell cultures is a well established field of research itself and that there are several handbooks devoted to this discipline. Here, Andrew Ward and David Tosh provide a necessary update of the protocols currently needed. In fact, nearly half of the book is devoted to stem cells culture protocols, mainly embryonic, from a list of several organs (kidney, lung, oesophagus and intestine, pancreas and liver to mention some........

  14. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  15. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 74683-79494

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  16. Neuro MR: protocols.

    Science.gov (United States)

    Mikulis, David J; Roberts, Timothy P L

    2007-10-01

    Clinical MRI depends on a symbiosis between MR physics and clinical requirements. The imaging solutions are based on a balance between the "palette" of available image contrasts derived from nuclear spin physics and tissue biophysics, and clinical determinants such as the anticipated pathology and efficient use of imaging time. Imaging is therefore optimized to maximize diagnostic sensitivity and specificity through the development of protocols organized along the lines of major disease categories. In the other part of this two-part review, the primary determinants of image contrast, including T1, T2, and T2*, were highlighted. The development of pulse sequences designed to optimize each of these image contrasts was discussed and the impact of technological innovation (parallel imaging and high-field systems) on the manner in which these sequences could be modified to improve clinical efficacy was further emphasized. The scope of that discussion was broadened to include the application of: 1) water diffusion imaging used primarily for detection of pathologies that restrict the free movement of water in the tissues and for defining fiber tracts in the brain; 2) the intravenous administration of exogenous contrast agents (gadolinium-diethylene triamine pentaacetic acid [GdDTPA]) for assessment of blood-brain-barrier (BBB) defects and brain blood flow; and 3) MR spectroscopy (MRS) for assessment of brain metabolites. The goal of this part is to discuss how these acquisitions are combined into specific protocols that can effectively detect and characterize, or in keeping with our artistic analogy, "paint" each of the major diseases affecting the central nervous system (CNS). This work concludes with a discussion of image artifacts and pitfalls in image interpretation, which, in spite our best efforts to minimize or eliminate them, continue to occur. Much of the ensuing discussion is based on our own institutional experience. Protocols, therefore, do not necessarily

  17. Preoperative electrocardiography: its cost-effectiveness in detecting abnormalities when a previous tracing exists.

    Science.gov (United States)

    Rabkin, S W; Horne, J M

    1979-01-01

    In 812 patients who underwent routine preoperative electrocardiography a mean of 24.6 months after undergoing electrocardiography at the same institution, the frequency of new abnormalities was estimated to evaluate the cost-effectiveness of this procedure prior to an operation. New abnormalities were judged to be either relevant or irrelevant to the assessment of operative risk, depending upon their previously demonstrated correlation with operative and postoperative morbidity and mortality. Since new abnormalities, especially new relevant abnormalities, were found to be relatively infrequent, the cost-effectiveness of routine preoperative electrocardiography was considered to be low. The evidence suggested that when a previous tracing exists preoperative electrocardiography is most clearly indicated for patients who are 60 years of age or older or whose previous tracing exhibited abnormalities. However, further research is required to develop more sensitive and specific protocols, and to evaluate the role of repeat electrocardiography in clinical decision-making. PMID:111793

  18. The protein protocols handbook

    National Research Council Canada - National Science Library

    Walker, John M

    2002-01-01

    .... The new chapters cover with many rapidly developing areas, particularly the application of mass spectrometry in protein characterization, as well as the now well-established 2-D PAGE technique in proteomics...

  19. Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User

    Directory of Open Access Journals (Sweden)

    Jongho Moon

    2017-01-01

    Full Text Available Recently many authentication protocols using an extended chaotic map were suggested for a mobile user. Many researchers demonstrated that authentication protocol needs to provide key agreement, mutual authentication, and user anonymity between mobile user and server and resilience to many possible attacks. In this paper, we cautiously analyzed chaotic-map-based authentication scheme and proved that it is still insecure to off-line identity guessing, user and server impersonation, and on-line identity guessing attacks. To address these vulnerabilities, we proposed an improved protocol based on an extended chaotic map and a fuzzy extractor. We proved the security of the proposed protocol using a random oracle and AVISPA (Automated Validation of Internet Security Protocols and Applications tool. Furthermore, we present an informal security analysis to make sure that the improved protocol is invulnerable to possible attacks. The proposed protocol is also computationally efficient when compared to other previous protocols.

  20. A comparative study of routing protocols of heterogeneous wireless sensor networks.

    Science.gov (United States)

    Han, Guangjie; Jiang, Xu; Qian, Aihua; Rodrigues, Joel J P C; Cheng, Long

    2014-01-01

    Recently, heterogeneous wireless sensor network (HWSN) routing protocols have drawn more and more attention. Various HWSN routing protocols have been proposed to improve the performance of HWSNs. Among these protocols, hierarchical HWSN routing protocols can improve the performance of the network significantly. In this paper, we will evaluate three hierarchical HWSN protocols proposed recently--EDFCM, MCR, and EEPCA--together with two previous classical routing protocols--LEACH and SEP. We mainly focus on the round of the first node dies (also called the stable period) and the number of packets sent to sink, which is an important aspect to evaluate the monitoring ability of a protocol. We conduct a lot of experiments and simulations on Matlab to analyze the performance of the five routing protocols.

  1. Development of IT-based Data Communication Protocol for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Jeong, K. I.; Kim, D. H.; Lee, J. C.

    2009-07-01

    The communication protocol, which provide overall communication rules and methods and give ways how to exchange information, is the most important part and it can affect the overall performance of communication network. Therefore, the first step of development of the communication network of an NPP is its own communication protocol design, which conforms to the requirements and characteristics of an NPP I and C. To manage the protocol development process, we establish development procedure and define detail substantive based on the procedure and we examine the adaptability of existing commercial communication protocols to the communication protocol of an NPP I and C. Existing commercial communication protocols based on Information Technology(IT) can be categorized into 3 groups: general commercial communication protocols, industrial communication protocols, military communication protocols. We analyze the design criteria and performance requirements of popular protocols in each group. And also, we examine the adaptability to the communication protocol of an NPP. Based on these results, we developed our own protocol for NPP I and C, which meet the required specifications through design overall protocol architecture and data frame format, definition of functional requirements and specifications

  2. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Michael D. Colagrosso

    2006-11-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  3. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Colagrosso Michael D

    2007-01-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  4. The Evolution of Web Protocols

    OpenAIRE

    Kelly, B

    1999-01-01

    This paper outlines the evolution of World Wide Web protocols. The paper reviews the original protocols developed for the web, in addressing, transport and data formats. A review of developments of the protocols is given, including developments of web data formats (HTML 4.0, cascading stylesheets and XML), transport (HTTP/1.1 and HTTP/NG) and addressing (URLs). The paper describes how the web initially lacked a metadata architecture and outlines the emergence of a metadata architecture for th...

  5. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  6. Host Identity Protocol Proxy

    Science.gov (United States)

    Salmela, Patrik; Melén, Jan

    The Host Identity Protocol (HIP) is one of the more recent designs that challenge the current Internet architecture. The main features of HIP are security and the identifier-locator split, which solves the problem of overloading the IP address with two separate tasks. This paper studies the possibility of providing HIP services to legacy hosts via a HIP proxy. Making a host HIP enabled requires that the IP-stack of the host is updated to support HIP. From a network administrator's perspective this can be a large obstacle. However, by providing HIP from a centralized point, a HIP proxy, the transition to begin using HIP can be made smoother. This and other arguments for a HIP proxy will be presented in this paper along with an analysis of a prototype HIP proxy and its performance.

  7. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  8. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  9. Extraction protocols for orthodontic treatment: A retrospective study

    Directory of Open Access Journals (Sweden)

    Vaishnevi N Thirunavukkarasu

    2016-01-01

    Full Text Available Background and Objectives: Various extraction protocols have been followed for successful orthodontic treatment. The purpose of this study was to evaluate the extraction protocols in patients who had previously undergone orthodontic treatment and also who had reported for continuing orthodontic treatment from other clinics. Materials and Methods: One hundred thirty eight patients who registered for orthodontic treatment at the Faculty of Dentistry were divided into 10 extraction protocols based on the Orthodontic treatment protocol given by Janson et al. and were evaluated for statistical significance. Results: The descriptive statistics of the study revealed a total of 40 (29% patients in protocol 1, 43 (31.2% in protocol 2, 18 (13% in protocol 3, 16 (11.6% in protocol 5, and 12 (8.7% in Type 3 category of protocol 9. The Type 3 category in protocol 9 was statistically significant compared to other studies. Midline shift and collapse of the arch form were noticed in these individuals. Conclusion: Extraction of permanent teeth such as canine and lateral incisors without rational reasons could have devastating consequences on the entire occlusion. The percentage of cases wherein extraction of permanent teeth in the crowded region was adopted as a treatment option instead of orthodontic treatment is still prevalent in dental practice. The shortage of orthodontists in Malaysia, the long waiting period, and lack of subjective need for orthodontic treatment at an earlier age group were the reasons for the patient's to choose extraction of the mal-aligned teeth such as the maxillary canine or maxillary lateral incisors.

  10. Small animal deworming protocols, client education, and veterinarian perception of zoonotic parasites in western Canada

    Science.gov (United States)

    Stull, Jason W.; Carr, Anthony P.; Chomel, Bruno B.; Berghaus, Roy D.; Hird, David W.

    2007-01-01

    Questionnaires were mailed to veterinarians in western Canada to determine dog and cat deworming protocols and the association between perceived zoonotic risk and perceived prevalence of endoparasites and deworming protocols. Of the responding veterinarians (545), 13% and 39% recommended deworming protocols consistent with established guidelines for puppies and kittens, respectively. Mixed animal practitioners and high-perceived prevalence of Toxocara cati were associated with increased appropriate kitten deworming (P veterinarians noted an established hospital deworming protocol, although only 78% followed the protocol. Forty-four percent of veterinarians stated they discussed with all clients the zoonotic risk of animal-derived endoparasites, whereas the remainder discussed it only under particular circumstances or not at all. Most small animal deworming protocols recommended in western Canada begin too late to inhibit endoparasite shedding. Increased educational efforts directed at veterinarians are warranted. PMID:17436903

  11. A modified three-dose protocol for colonization of the canine urinary tract with the asymptomatic bacteriuria Escherichia coli strain 83972.

    Science.gov (United States)

    Thompson, Mary F; Schembri, Mark A; Mills, Paul C; Trott, Darren J

    2012-08-17

    Establishment of asymptomatic bacteriuria is a novel alternative to antimicrobial therapy for management of recurrent bacterial urinary tract infection in humans and may also be useful for dogs if it can be shown that colonization of the canine bladder can be achieved. A three-dose protocol for Escherichia coli strain 83972 inoculation was developed to attempt induction of persistent bacteriuria in healthy dogs. A previous study using a single inoculation colonized dogs for no longer than 10 days and multi-dose protocols have been used to establish persistent bacteriuria in human patients. Three doses of approximately 10(9)E. coli 83972 bacteria were introduced into the bladder of eight healthy female dogs over 24h via an indwelling sterile urinary catheter. Three additional dogs were sham-inoculated. Duration of colonization ranged from 1 to 28 days (median 2 days) with no discernible reason for the prolonged colonization in one dog. Multi-dose inoculation of healthy dogs was not obviously superior to our previous use of single-dose inoculation apart from one dog remaining colonized for 28 days following the three-dose inoculation protocol. Crown Copyright © 2012. Published by Elsevier B.V. All rights reserved.

  12. Fast Entanglement Establishment via Local Dynamics for Quantum Repeater Networks

    Science.gov (United States)

    Gyongyosi, Laszlo; Imre, Sandor

    Quantum entanglement is a necessity for future quantum communication networks, quantum internet, and long-distance quantum key distribution. The current approaches of entanglement distribution require high-delay entanglement transmission, entanglement swapping to extend the range of entanglement, high-cost entanglement purification, and long-lived quantum memories. We introduce a fundamental protocol for establishing entanglement in quantum communication networks. The proposed scheme does not require entanglement transmission between the nodes, high-cost entanglement swapping, entanglement purification, or long-lived quantum memories. The protocol reliably establishes a maximally entangled system between the remote nodes via dynamics generated by local Hamiltonians. The method eliminates the main drawbacks of current schemes allowing fast entanglement establishment with a minimized delay. Our solution provides a fundamental method for future long-distance quantum key distribution, quantum repeater networks, quantum internet, and quantum-networking protocols. This work was partially supported by the GOP-1.1.1-11-2012-0092 project sponsored by the EU and European Structural Fund, by the Hungarian Scientific Research Fund - OTKA K-112125, and by the COST Action MP1006.

  13. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    composition, and it is truly commonplace in today’s communication with the diversity of VPNs and secure browser sessions. In fact, it is normal that we have several layers of secure channels: For instance, on top of a VPN-connection, a browser may establish another secure channel (possibly with a different...

  14. 22 CFR 40.91 - Certain aliens previously removed.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Certain aliens previously removed. 40.91... IMMIGRANTS UNDER THE IMMIGRATION AND NATIONALITY ACT, AS AMENDED Aliens Previously Removed § 40.91 Certain aliens previously removed. (a) 5-year bar. An alien who has been found inadmissible, whether as a result...

  15. Core Outcome Domains for early phase clinical trials of sound-, psychology-, and pharmacology-based interventions to manage chronic subjective tinnitus in adults: the COMIT'ID study protocol for using a Delphi process and face-to-face meetings to establish consensus.

    Science.gov (United States)

    Fackrell, Kathryn; Smith, Harriet; Colley, Veronica; Thacker, Brian; Horobin, Adele; Haider, Haúla F; Londero, Alain; Mazurek, Birgit; Hall, Deborah A

    2017-08-23

    The reporting of outcomes in clinical trials of subjective tinnitus indicates that many different tinnitus-related complaints are of interest to investigators, from perceptual attributes of the sound (e.g. loudness) to psychosocial impacts (e.g. quality of life). Even when considering one type of intervention strategy for subjective tinnitus, there is no agreement about what is critically important for deciding whether a treatment is effective. The main purpose of this observational study is, therefore to, develop Core Outcome Domain Sets for the three different intervention strategies (sound, psychological, and pharmacological) for adults with chronic subjective tinnitus that should be measured and reported in every clinical trial of these interventions. Secondary objectives are to identify the strengths and limitations of our study design for recruiting and reducing attrition of participants, and to explore uptake of the core outcomes. The 'Core Outcome Measures in Tinnitus: International Delphi' (COMIT'ID) study will use a mixed-methods approach that incorporates input from health care users at the pre-Delphi stage, a modified three-round Delphi survey and final consensus meetings (one for each intervention). The meetings will generate recommendations by stakeholder representatives on agreed Core Outcome Domain Sets specific to each intervention. A subsequent step will establish a common cross-cutting Core Outcome Domain Set by identifying the common outcome domains included in all three intervention-specific Core Outcome Domain Sets. To address the secondary objectives, we will gather feedback from participants about their experience of taking part in the Delphi process. We aspire to conduct an observational cohort study to evaluate uptake of the core outcomes in published studies at 7 years following Core Outcome Set publication. The COMIT'ID study aims to develop a Core Outcome Domain Set that is agreed as critically important for deciding whether a

  16. Testing objects in Computerized Axial Tomography. Contributions to the Spanish Protocol on quality control in radiodiagnostics

    International Nuclear Information System (INIS)

    Villaescusa, J.I.; Campayo, J.M.

    1995-01-01

    In the provisional version of the Spanish Protocol about the technical aspects of Quality Control in Radiodiagnostic,SEFM-SEPR 1993, it is dedicated a section to Computerized Axial tomography, establishing a total of eleven technical parameters of the equipment for examination. The present work describes the practical use of the Protocol using various types of Test Object. The authors also propose new tests that should be considered in the final version of the Spanish Protocol. (Author)

  17. A novel protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery under cardiopulmonary bypass.

    Science.gov (United States)

    Odaka, Mizuho; Minakata, Kenji; Toyokuni, Hideaki; Yamazaki, Kazuhiro; Yonezawa, Atsushi; Sakata, Ryuzo; Matsubara, Kazuo

    2015-08-01

    This study aimed to develop and assess the effectiveness of a protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery. We established a protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery. This novel protocol was assessed by comparing patients undergoing open heart surgery before (control group; n = 30) and after its implementation (protocol group; n = 31) at Kyoto University Hospital between July 2012 and January 2013. Surgical site infections (SSIs) were observed in 4 control group patients (13.3 %), whereas no SSIs were observed in the protocol group patients (P protocol group (P protocol significantly decreased the total antibiotic dose used in the perioperative period (P protocol group patients required this additional change in the antibiotic regimen (P protocol based on preoperative kidney function effectively prevents SSIs in patients undergoing open heart surgery.

  18. Previous Mental Disorders and Subsequent Onset of Chronic Back or Neck Pain : Findings From 19 Countries

    NARCIS (Netherlands)

    Viana, Maria Carmen; Lim, Carmen C W; Garcia Pereira, Flavia; Aguilar-Gaxiola, Sergio; Alonso, Jordi; Bruffaerts, Ronny; de Jonge, Peter; Caldas-de-Almeida, Jose Miguel; O'Neill, Siobhan; Stein, Dan J; Al-Hamzawi, Ali; Benjet, Corina; Cardoso, Graça; Florescu, Silvia; de Girolamo, Giovanni; Haro, Josep Maria; Hu, Chiyi; Kovess-Masfety, Viviane; Levinson, Daphna; Piazza, Marina; Posada-Villa, José; Rabczenko, Daniel; Kessler, Ronald C; Scott, Kate M

    Associations between depression/anxiety and pain are well established, but its directionality is not clear. We examined the associations between temporally previous mental disorders and subsequent self-reported chronic back/neck pain onset, and investigated the variation in the strength of

  19. Exploring storage protocols for yam ( Dioscorea spp.) pollen ...

    African Journals Online (AJOL)

    Implementation of pollen genebanks allows the conservation of plant genetic resources at the haploid level, pollen genetic manipulations, scheduling of hybrid seed production and improvement of breeding efficiency. To establish pollen storage protocols for various genotypes of West African yams, laboratory experiments ...

  20. Exploring storage protocols for yam (Dioscorea spp.) pollen ...

    African Journals Online (AJOL)

    Jane

    2011-08-08

    Aug 8, 2011 ... Implementation of pollen genebanks allows the conservation of plant genetic resources at the haploid level, pollen genetic manipulations, scheduling of hybrid seed production and improvement of breeding efficiency. To establish pollen storage protocols for various genotypes of West African yams, ...

  1. Determining root correspondence between previously and newly detected objects

    Science.gov (United States)

    Paglieroni, David W.; Beer, N Reginald

    2014-06-17

    A system that applies attribute and topology based change detection to networks of objects that were detected on previous scans of a structure, roadway, or area of interest. The attributes capture properties or characteristics of the previously detected objects, such as location, time of detection, size, elongation, orientation, etc. The topology of the network of previously detected objects is maintained in a constellation database that stores attributes of previously detected objects and implicitly captures the geometrical structure of the network. A change detection system detects change by comparing the attributes and topology of new objects detected on the latest scan to the constellation database of previously detected objects.

  2. Impact of Communication Protocol on Performance

    Energy Technology Data Exchange (ETDEWEB)

    Worley, P.H.

    1999-02-01

    We use the PSTSWM compact application benchmark code to characterize the performance behavior of interprocessor communication on the SGI/Cray Research Origin 2000 and T3E-900. We measure 1. single processor performance, 2. point-to-point communication performance, 3. performance variation as a function of communication protocols and transport layer for collective communication routines, and 4. performance sensitivity of full application code to choice of parallel implementation. We also compare and contrast these results with similar results for the previous generation of parallel platforms, evaluating how the relative importance of communication performance has changed.

  3. Tropical Deforestation and the Kyoto Protocol. An Editorial Essay

    Energy Technology Data Exchange (ETDEWEB)

    Santilli, M. [Instituto Socioambiental ISA., Brasilia DF (Brazil); Moutinho, P.; Nepstad, D. [Instituto de Pesquisa Ambiental da Amazonia IPAM Belem (Brazil); Schwartzman, S. [Environmental Defense, Washington, DC (United States); Nepstad, D. [Woods Hole Research Center, Woods Hole, MA (United States); Curran, L. [Yale School of Forestry and Environmental Studies, New Haven, CT (United States); Nobre, C. [Centro de Previsao de Tempo e Estudos Climaticos INPE, Cachoeira Paulista, SP (Brazil)

    2005-08-01

    The current annual rates of tropical deforestation from Brazil and Indonesia alone would equal four-fifths of the emissions reductions gained by implementing the Kyoto Protocol in its first commitment period, jeopardizing the goal of Protocol to avoid 'dangerous anthropogenic interference' with the climate system. We propose the novel concept of 'compensated reduction', whereby countries that elect to reduce national level deforestation to below a previously determined historical level would receive post facto compensation, and commit to stabilize or further reduce deforestation in the future. Such a program could create large-scale incentives to reduce tropical deforestation, as well as for broader developing country participation in the Kyoto Protocol, and leverage support for the continuity of the Protocol beyond the 2008-2012 first commitment period.

  4. Tropical deforestation and the Kyoto Protocol. An editorial essay

    Energy Technology Data Exchange (ETDEWEB)

    Santilli, M. [Instituto Socioambiental ISA., Brasilia DF (Brazil); Moutinho, P.; Nepstad, D. [Instituto de Pesquisa Ambiental da Amazonia IPAM, Belem (Brazil); Schwartzman, S. [Environmental Defense, Washington, DC (United States); Curran, L. [Yale School of Forestry and Environmental Studies, New Haven, CT (United States); Nobre, C. [Centro de Previsao de Tempo e Estudos Climaticos INPE, Cachoeira Paulista, SP (Brazil)

    2005-07-01

    The current annual rates of tropical deforestation from Brazil and Indonesia alone would equal four-fifths of the emissions reductions gained by implementing the Kyoto Protocol in its first commitment period, jeopardizing the goal of Protocol to avoid 'dangerous anthropogenic interference' with the climate system. We propose the novel concept of 'compensated reduction', whereby countries that elect to reduce national level deforestation to below a previously determined historical level would receive post facto compensation, and commit to stabilize or further reduce deforestation in the future. Such a program could create large-scale incentives to reduce tropical deforestation, as well as for broader developing country participation in the Kyoto Protocol, and leverage support for the continuity of the Protocol beyond the 2008-2012 first commitment period.

  5. Construction and validation of a nursing care protocol in anesthesia.

    Science.gov (United States)

    Lemos, Cassiane de Santana; Poveda, Vanessa de Brito; Peniche, Aparecida de Cassia Giane

    2017-12-11

    To construct and validate a nursing care protocol in anesthesia. methodological study of face and content validation, judging clarity, relevance, pertinence and comprehensiveness of a care protocol, elaborated from the integrative review of previous literature and based on the conceptual model of assistance perioperative nursing of Castellanos and Jouclas. The protocol was evaluated by five anesthesiologists and nurses from the surgical center. The results were analyzed through the content validity index. among the 119 items assessed by experts, 11 (9.2%) instrument items presented content validity index of <80% and were changed. The items with disagreement were related to the selection and availability of materials and equipment, especially before anesthetic induction. The content validity index, obtained for the different items, proposed after the amendments mentioned, ranged from 80 to 100%, in the three periods of anesthesia, indicating the proper validity of the proposed content. the nursing care protocol in anesthesia was considered valid.

  6. Resource Usage Protocols for Iterators

    NARCIS (Netherlands)

    Huisman, Marieke; Haack, C.; Müller, P.; Hurlin, C.

    We discuss usage protocols for iterator objects that prevent concurrent modifications of the underlying collection while iterators are in progress. We formalize these protocols in Java-like object interfaces, enriched with separation logic contracts. We present examples of iterator clients and

  7. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Aquino de Muro, Marilena; Rapley, Ralph

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  8. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  9. Modeling and Verification of the Bitcoin Protocol

    Directory of Open Access Journals (Sweden)

    Kaylash Chaudhary

    2015-11-01

    Full Text Available Bitcoin is a popular digital currency for online payments, realized as a decentralized peer-to-peer electronic cash system. Bitcoin keeps a ledger of all transactions; the majority of the participants decides on the correct ledger. Since there is no trusted third party to guard against double spending, and inspired by its popularity, we would like to investigate the correctness of the Bitcoin protocol. Double spending is an important threat to electronic payment systems. Double spending would happen if one user could force a majority to believe that a ledger without his previous payment is the correct one. We are interested in the probability of success of such a double spending attack, which is linked to the computational power of the attacker. This paper examines the Bitcoin protocol and provides its formalization as an UPPAAL model. The model will be used to show how double spending can be done if the parties in the Bitcoin protocol behave maliciously, and with what probability double spending occurs.

  10. Shoulder muscle endurance: the development of a standardized and reliable protocol

    Directory of Open Access Journals (Sweden)

    Roy Jean-Sébastien

    2011-01-01

    Full Text Available Abstract Background Shoulder muscle fatigue has been proposed as a possible link to explain the association between repetitive arm use and the development of rotator cuff disorders. To our knowledge, no standardized clinical endurance protocol has been developed to evaluate the effects of muscle fatigue on shoulder function. Such a test could improve clinical examination of individuals with shoulder disorders. Therefore, the purpose of this study was to establish a reliable protocol for objective assessment of shoulder muscle endurance. Methods An endurance protocol was developed on a stationary dynamometer (Biodex System 3. The endurance protocol was performed in isotonic mode with the resistance set at 50% of each subject's peak torque as measured for shoulder external (ER and internal rotation (IR. Each subject performed 60 continuous repetitions of IR/ER rotation. The endurance protocol was performed by 36 healthy individuals on two separate occasions at least two days apart. Maximal isometric shoulder strength tests were performed before and after the fatigue protocol to evaluate the effects of the endurance protocol and its reliability. Paired t-tests were used to evaluate the reduction in shoulder strength due to the protocol, while intraclass correlation coefficients (ICC and minimal detectable change (MDC were used to evaluate its reliability. Results Maximal isometric strength was significantly decreased after the endurance protocol (P 0.84. Conclusions Changes in muscular performance observed during and after the muscular endurance protocol suggests that the protocol did result in muscular fatigue. Furthermore, this study established that the resultant effects of fatigue of the proposed isotonic protocol were reproducible over time. The protocol was performed without difficulty by all volunteers and took less than 10 minutes to perform, suggesting that it might be feasible for clinical practice. This protocol could be used to induce

  11. Life-history traits in an evergreen Mediterranean oak respond differentially to previous experimental environments

    Directory of Open Access Journals (Sweden)

    J. M. Rey Benayas

    2008-06-01

    Full Text Available Living organisms respond both to current and previous environments, which can have important consequences on population dynamics. However, there is little experimental evidence based on long-term field studies of the effects of previous environments on the performance of individuals. We tested the hypothesis that trees that establish under different environmental conditions perform differently under similar post-establishment conditions. We used the slow-growing, evergreen Mediterranean oak Quercus ilex subsp. rotundifolia as target species. We analyzed the effects of previous environments, competition effects and tradeoffs among life-history traits (survival, growth, and reproduction. We enhanced seedling establishment for three years by reducing abiotic environmental harshness by means of summer irrigation and artificial shading in 12 experimental plots, while four plots remained as controls. Then these treatments were interrupted for ten years. Seedlings under ameliorated environmental conditions survived and grew faster during early establishment. During the post-management period, previous treatments 1 did not have any effect on survival, 2 experienced a slower above-ground growth, 3 decreased root biomass as indicated from reflectivity of Ground Penetration Radar, 4 increased acorn production mostly through a greater canopy volume and 5 increased acorn production effort. The trees exhibited a combination of effects related to acclimation for coping with abiotic stress and effects of intra-specific competition. In accordance with our hypothesis, tree performance overall depended on previous environmental conditions, and the response was different for different life-history traits. We recommend early management because it increased plot cover, shortened the time to attain sexual maturity and increased the amount of acorn production. Plots such as those assessed in this study may act as sources of propagules in deforested

  12. Base-line studies for DAE establishments

    International Nuclear Information System (INIS)

    Puranik, V.D.

    2012-01-01

    to ensure that the seasonal variations in parameters are considered. The data is generated for an area covering at least 30 km radium around the proposed location of the facility, in a manner, such that very dense data is generated close to the location and it becomes gradually sparce for the distant areas. Base-line data is generated with the help of local universities and institutions under constant interaction and supervision of the departmental personnel. The work is carried out as per the set protocols laid down by the department for such purposes. The protocols conform to the international practices for carrying out such work. The studies include measurement of concentrations of naturally occurring and man-made radionuclides and also heavy toxic metals and other pollutants in various environmental matrices such as air sub soil water, surface water, soil, sediment, biota and locally consumed food items including meat, fish, milk, eggs, vegetables and cereals. Studies on density and variety of flora and fauna in the region are carried out. Health status and demographic status is recorded in detail. Hydrogeological studies are carried out to establish ground water movement at the location. Based on the data so generated, a Remote Sensing and Geographic Information System is prepared to collate the data. For coastal locations, studies of the nearby marine environment are also carried out. The baseline data is a valuable set of information of the environmental status of a location prevailing before the start of the departmental activity. Its importance is two fold - firstly because, it can not be generated after the start of the activity at the given location and secondly because it is the most authentic data set which can be referred later to assess the environmental impact of the facility by way of evaluating the changes in the environmental parameters, if any. (author)

  13. Overview on establishing flax industry

    CSIR Research Space (South Africa)

    Blouw, S

    2007-02-01

    Full Text Available has bedding and fillers as end products. However the challenges that are met during the establishment of a flax industry are the development of economic viable models, human capacity development and local and overseas markets....

  14. Establishing Tools for Computing Hybrids

    National Research Council Canada - National Science Library

    Thiem, Clare; Bhat, Sunil; Blount, Thomas

    2006-01-01

    Establishing Tools for Computing hybrids (ETCH) provides a starting point from which to explore how advanced computing technology, based upon biotechnology, might enable intelligent systems and provide new capabilities to the Air Force...

  15. Protocols.io: Virtual Communities for Protocol Development and Discussion.

    Science.gov (United States)

    Teytelman, Leonid; Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L

    2016-08-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results.

  16. An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography.

    Science.gov (United States)

    Zhang, Zezhong; Qi, Qingqing

    2014-05-01

    Medication errors are very dangerous even fatal since it could cause serious even fatal harm to patients. In order to reduce medication errors, automated patient medication systems using the Radio Frequency Identification (RFID) technology have been used in many hospitals. The data transmitted in those medication systems is very important and sensitive. In the past decade, many security protocols have been proposed to ensure its secure transition attracted wide attention. Due to providing mutual authentication between the medication server and the tag, the RFID authentication protocol is considered as the most important security protocols in those systems. In this paper, we propose a RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography (ECC). The analysis shows the proposed protocol could overcome security weaknesses in previous protocols and has better performance. Therefore, the proposed protocol is very suitable for automated patient medication systems.

  17. On the security of a simple three-party key exchange protocol without server's public keys.

    Science.gov (United States)

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho

    2014-01-01

    Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  18. New Protocol Based on UHPLC-MS/MS for Quantitation of Metabolites in Xylose-Fermenting Yeasts

    Science.gov (United States)

    Campos, Christiane Gonçalves; Veras, Henrique César Teixeira; de Aquino Ribeiro, José Antônio; Costa, Patrícia Pinto Kalil Gonçalves; Araújo, Katiúscia Pereira; Rodrigues, Clenilson Martins; de Almeida, João Ricardo Moreira; Abdelnur, Patrícia Verardi

    2017-12-01

    Xylose fermentation is a bottleneck in second-generation ethanol production. As such, a comprehensive understanding of xylose metabolism in naturally xylose-fermenting yeasts is essential for prospection and construction of recombinant yeast strains. The objective of the current study was to establish a reliable metabolomics protocol for quantification of key metabolites of xylose catabolism pathways in yeast, and to apply this protocol to Spathaspora arborariae. Ultra-high performance liquid chromatography coupled to tandem mass spectrometry (UHPLC-MS/MS) was used to quantify metabolites, and afterwards, sample preparation was optimized to examine yeast intracellular metabolites. S. arborariae was cultivated using xylose as a carbon source under aerobic and oxygen-limited conditions. Ion pair chromatography (IPC) and hydrophilic interaction liquid chromatography-tandem mass spectrometry (HILIC-MS/MS) were shown to efficiently quantify 14 and 5 metabolites, respectively, in a more rapid chromatographic protocol than previously described. Thirteen and eleven metabolites were quantified in S. arborariae under aerobic and oxygen-limited conditions, respectively. This targeted metabolomics protocol is shown here to quantify a total of 19 metabolites, including sugars, phosphates, coenzymes, monosaccharides, and alcohols, from xylose catabolism pathways (glycolysis, pentose phosphate pathway, and tricarboxylic acid cycle) in yeast. Furthermore, to our knowledge, this is the first time that intracellular metabolites have been quantified in S. arborariae after xylose consumption. The results indicated that fine control of oxygen levels during fermentation is necessary to optimize ethanol production by S. arborariae. The protocol presented here may be applied to other yeast species and could support yeast genetic engineering to improve second generation ethanol production. [Figure not available: see fulltext.

  19. Verification of the safety communication protocol in train control system using colored Petri net

    International Nuclear Information System (INIS)

    Chen Lijie; Tang Tao; Zhao Xianqiong; Schnieder, Eckehard

    2012-01-01

    This paper deals with formal and simulation-based verification of the safety communication protocol in ETCS (European Train Control System). The safety communication protocol controls the establishment of safety connection between train and trackside. Because of its graphical user interface and modeling flexibility upon the changes in the system conditions, this paper proposes a composition Colored Petri Net (CPN) representation for both the logic and the timed model. The logic of the protocol is proved to be safe by means of state space analysis: the dead markings are correct; there are no dead transitions; being fair. Further analysis results have been obtained using formal and simulation-based verification approach. The timed models for the open transmit system and the application process are created for the purpose of performance analysis of the safety communication protocol. The models describe the procedure of data transmission and processing, and also provide relevant timed and stochastic factors, as well as time delay and lost packet, which may influence the time for establishment of safety connection of the protocol. Time for establishment of safety connection of the protocol in normal state is verified by formal verification, and then time for establishment of safety connection with different probability of lost packet is simulated. After verification it is found that the time for establishment of safety connection of the safety communication protocol satisfies the safety requirements.

  20. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  1. Massive transfusion protocols: current best practice

    Directory of Open Access Journals (Sweden)

    Hsu YM

    2016-03-01

    Full Text Available Yen-Michael S Hsu,1 Thorsten Haas,2 Melissa M Cushing1 1Department of Pathology and Laboratory Medicine, Weill Cornell Medical College, New York, NY, USA; 2Department of Anesthesia, University Children's Hospital Zurich, Zurich, Switzerland Abstract: Massive transfusion protocols (MTPs are established to provide rapid blood replacement in a setting of severe hemorrhage. Early optimal blood transfusion is essential to sustain organ perfusion and oxygenation. There are many variables to consider when establishing an MTP, and studies have prospectively evaluated different scenarios and patient populations to establish the best practices to attain improved patient outcomes. The establishment and utilization of an optimal MTP is challenging given the ever-changing patient status during resuscitation efforts. Much of the MTP literature comes from the trauma population, due to the fact that massive hemorrhage is the leading cause of preventable trauma-related death. As we come to further understand the positive and negative clinical impacts of transfusion-related factors, massive transfusion practice can be further refined. This article will first discuss specific MTPs targeting different patient populations and current relevant international guidelines. Then, we will examine a wide selection of therapeutic products to support MTPs, including newly available products and the most suitable of the traditional products. Lastly, we will discuss the best design for an MTP, including ratio-based MTPs and MTPs based on the use of point-of-care coagulation diagnostic tools. Keywords: hemorrhage, MTP, antifibrinolytics, coagulopathy, trauma, ratio, logistics, guidelines, hemostatic

  2. 2 CFR 1.215 - Relationship to previous issuances.

    Science.gov (United States)

    2010-01-01

    ... 2 Grants and Agreements 1 2010-01-01 2010-01-01 false Relationship to previous issuances. 1.215 Section 1.215 Grants and Agreements ABOUT TITLE 2 OF THE CODE OF FEDERAL REGULATIONS AND SUBTITLE A Introduction toSubtitle A § 1.215 Relationship to previous issuances. Although some of the guidance was...

  3. 2 CFR 230.45 - Relationship to previous issuance.

    Science.gov (United States)

    2010-01-01

    ... 2 Grants and Agreements 1 2010-01-01 2010-01-01 false Relationship to previous issuance. 230.45 Section 230.45 Grants and Agreements OFFICE OF MANAGEMENT AND BUDGET CIRCULARS AND GUIDANCE Reserved COST PRINCIPLES FOR NON-PROFIT ORGANIZATIONS (OMB CIRCULAR A-122) § 230.45 Relationship to previous issuance. (a...

  4. Research Note Effects of previous cultivation on regeneration of ...

    African Journals Online (AJOL)

    Research Note Effects of previous cultivation on regeneration of Julbernadia globiflora and Brachystegia spiciformis in grazing areas of Mupfurudzi ... Plant attributes for Julbernadia globiflora and Brachystegia spiciformis were measured in previously cultivated and uncultivated sites making up rangelands of the scheme.

  5. 49 CFR 173.23 - Previously authorized packaging.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Previously authorized packaging. 173.23 Section... REQUIREMENTS FOR SHIPMENTS AND PACKAGINGS Preparation of Hazardous Materials for Transportation § 173.23 Previously authorized packaging. (a) When the regulations specify a packaging with a specification marking...

  6. 75 FR 76056 - FEDERAL REGISTER CITATION OF PREVIOUS ANNOUNCEMENT:

    Science.gov (United States)

    2010-12-07

    ... SECURITIES AND EXCHANGE COMMISSION Sunshine Act Meeting FEDERAL REGISTER CITATION OF PREVIOUS ANNOUNCEMENT: STATUS: Closed meeting. PLACE: 100 F Street, NE., Washington, DC. DATE AND TIME OF PREVIOUSLY ANNOUNCED MEETING: Thursday, December 9, 2010 at 2 p.m. CHANGE IN THE MEETING: Time change. The closed...

  7. Triple outlet right ventricle: a previously unknown cardiac malformation.

    Science.gov (United States)

    Tingo, Jennifer E; Carroll, Sheila J; Crystal, Matthew A

    2015-03-01

    We present the case of an infant with three distinct outflow tracts from the right ventricle. Three outlets from the heart have been previously named the "Tritruncal Heart". We review the two previously reported cases of tritruncal hearts and describe the anatomy, diagnosis, surgical management, and outcome of our case. Embryologic implications are also discussed.

  8. A Comprehensive Survey on Hierarchical-Based Routing Protocols for Mobile Wireless Sensor Networks: Review, Taxonomy, and Future Directions

    Directory of Open Access Journals (Sweden)

    Nabil Sabor

    2017-01-01

    Full Text Available Introducing mobility to Wireless Sensor Networks (WSNs puts new challenges particularly in designing of routing protocols. Mobility can be applied to the sensor nodes and/or the sink node in the network. Many routing protocols have been developed to support the mobility of WSNs. These protocols are divided depending on the routing structure into hierarchical-based, flat-based, and location-based routing protocols. However, the hierarchical-based routing protocols outperform the other routing types in saving energy, scalability, and extending lifetime of Mobile WSNs (MWSNs. Selecting an appropriate hierarchical routing protocol for specific applications is an important and difficult task. Therefore, this paper focuses on reviewing some of the recently hierarchical-based routing protocols that are developed in the last five years for MWSNs. This survey divides the hierarchical-based routing protocols into two broad groups, namely, classical-based and optimized-based routing protocols. Also, we present a detailed classification of the reviewed protocols according to the routing approach, control manner, mobile element, mobility pattern, network architecture, clustering attributes, protocol operation, path establishment, communication paradigm, energy model, protocol objectives, and applications. Moreover, a comparison between the reviewed protocols is investigated in this survey depending on delay, network size, energy-efficiency, and scalability while mentioning the advantages and drawbacks of each protocol. Finally, we summarize and conclude the paper with future directions.

  9. Establishment of immortalized human erythroid progenitor cell lines able to produce enucleated red blood cells.

    Directory of Open Access Journals (Sweden)

    Ryo Kurita

    Full Text Available Transfusion of red blood cells (RBCs is a standard and indispensable therapy in current clinical practice. In vitro production of RBCs offers a potential means to overcome a shortage of transfusable RBCs in some clinical situations and also to provide a source of cells free from possible infection or contamination by microorganisms. Thus, in vitro production of RBCs may become a standard procedure in the future. We previously reported the successful establishment of immortalized mouse erythroid progenitor cell lines that were able to produce mature RBCs very efficiently. Here, we have developed a reliable protocol for establishing immortalized human erythroid progenitor cell lines that are able to produce enucleated RBCs. These immortalized cell lines produce functional hemoglobin and express erythroid-specific markers, and these markers are upregulated following induction of differentiation in vitro. Most importantly, these immortalized cell lines all produce enucleated RBCs after induction of differentiation in vitro, although the efficiency of producing enucleated RBCs remains to be improved further. To the best of our knowledge, this is the first demonstration of the feasibility of using immortalized human erythroid progenitor cell lines as an ex vivo source for production of enucleated RBCs.

  10. Establishment and maintenance of a standardized glioma tissue bank: Huashan experience.

    Science.gov (United States)

    Aibaidula, Abudumijiti; Lu, Jun-feng; Wu, Jin-song; Zou, He-jian; Chen, Hong; Wang, Yu-qian; Qin, Zhi-yong; Yao, Yu; Gong, Ye; Che, Xiao-ming; Zhong, Ping; Li, Shi-qi; Bao, Wei-min; Mao, Ying; Zhou, Liang-fu

    2015-06-01

    Cerebral glioma is the most common brain tumor as well as one of the top ten malignant tumors in human beings. In spite of the great progress on chemotherapy and radiotherapy as well as the surgery strategies during the past decades, the mortality and morbidity are still high. One of the major challenges is to explore the pathogenesis and invasion of glioma at various "omics" levels (such as proteomics or genomics) and the clinical implications of biomarkers for diagnosis, prognosis or treatment of glioma patients. Establishment of a standardized tissue bank with high quality biospecimens annotated with clinical information is pivotal to the solution of these questions as well as the drug development process and translational research on glioma. Therefore, based on previous experience of tissue banks, standardized protocols for sample collection and storage were developed. We also developed two systems for glioma patient and sample management, a local database for medical records and a local image database for medical images. For future set-up of a regional biobank network in Shanghai, we also founded a centralized database for medical records. Hence we established a standardized glioma tissue bank with sufficient clinical data and medical images in Huashan Hospital. By September, 2013, tissues samples from 1,326 cases were collected. Histological diagnosis revealed that 73 % were astrocytic tumors, 17 % were oligodendroglial tumors, 2 % were oligoastrocytic tumors, 4 % were ependymal tumors and 4 % were other central nervous system neoplasms.

  11. Establishing and managing a periodontal biobank for research: the sharing of experience.

    Science.gov (United States)

    Vaithilingam, R D; Safii, S H; Baharuddin, N A; Karen-Ng, L P; Saub, R; Ariffin, F; Ramli, H; Sharifuddin, A; Hidayat, M F H; Raman, R; Chan, Y K; Rani, N A; Rahim, R A; Shahruddin, N; Cheong, S C; Bartold, P M; Zain, R B

    2015-01-01

    Periodontal bio-repositories, which allow banking of clinically validated human data and biological samples, provide an opportunity to derive biomarkers for periodontal diagnosis, prognosis and therapeutic activities which are expected to improve patient management. This article presents the establishing of the Malaysian Periodontal Database and Biobank System (MPDBS) which was initiated in 2011 with the aim to facilitate periodontal research. Partnerships were established with collaborating centres. Policies on specimen access, authorship and acknowledgement policies were agreed upon by all participating centres before the initiation of the periodontal biobank. Ethical approval for the collection of samples and data were obtained from institutional ethics review boards. A broad-based approach for informed consent was used, which covered areas related to quality of life impacts, genetics and molecular aspects of periodontal disease. Sample collection and processing was performed using a standardized protocol. Biobanking resources such as equipment and freezers were shared with the Malaysian Oral Cancer Database and Tissue Bank System (MOCDTBS). In the development of the MPDBS, challenges that were previously faced by the MOCDTBS were considered. Future challenges in terms of ethical and legal issues will be faced when international collaborations necessitate the transportation of specimens across borders. © 2014 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  12. Implant breast reconstruction after salvage mastectomy in previously irradiated patients.

    Science.gov (United States)

    Persichetti, Paolo; Cagli, Barbara; Simone, Pierfranco; Cogliandro, Annalisa; Fortunato, Lucio; Altomare, Vittorio; Trodella, Lucio

    2009-04-01

    The most common surgical approach in case of local tumor recurrence after quadrantectomy and radiotherapy is salvage mastectomy. Breast reconstruction is the subsequent phase of the treatment and the plastic surgeon has to operate on previously irradiated and manipulated tissues. The medical literature highlights that breast reconstruction with tissue expanders is not a pursuable option, considering previous radiotherapy a contraindication. The purpose of this retrospective study is to evaluate the influence of previous radiotherapy on 2-stage breast reconstruction (tissue expander/implant). Only patients with analogous timing of radiation therapy and the same demolitive and reconstructive procedures were recruited. The results of this study prove that, after salvage mastectomy in previously irradiated patients, implant reconstruction is still possible. Further comparative studies are, of course, advisable to draw any conclusion on the possibility to perform implant reconstruction in previously irradiated patients.

  13. No discrimination against previous mates in a sexually cannibalistic spider

    Science.gov (United States)

    Fromhage, Lutz; Schneider, Jutta M.

    2005-09-01

    In several animal species, females discriminate against previous mates in subsequent mating decisions, increasing the potential for multiple paternity. In spiders, female choice may take the form of selective sexual cannibalism, which has been shown to bias paternity in favor of particular males. If cannibalistic attacks function to restrict a male's paternity, females may have little interest to remate with males having survived such an attack. We therefore studied the possibility of female discrimination against previous mates in sexually cannibalistic Argiope bruennichi, where females almost always attack their mate at the onset of copulation. We compared mating latency and copulation duration of males having experienced a previous copulation either with the same or with a different female, but found no evidence for discrimination against previous mates. However, males copulated significantly shorter when inserting into a used, compared to a previously unused, genital pore of the female.

  14. Previous Webinars about Integrated Pest Management in Schools

    Science.gov (United States)

    The EPA Center of Expertise for School IPM hosts a webinar series featuring national experts from across the country relaying educational and practical strategies for establishing and improving integrated pest management programs in schools.

  15. Establishment and use of national registries for actinide elements in humans

    International Nuclear Information System (INIS)

    1996-05-01

    This TECDOC covers all aspects of the establishment and use of registries for actinide elements in Member States. These aspects include assessing the need for such registries; defining scope of the work and developing objectives; administration; organization and staffing; policies; practices; procedures; protocols; registration and enrollment; data collection and evaluation; establishing and analytical laboratory; publication of results and application of findings. Not all aspects will be relevant to all Member States establishing such registries. 1 tab

  16. Field validation of protocols developed to evaluate in-line mastitis detection systems

    NARCIS (Netherlands)

    Kamphuis, C.; Dela Rue, B.T.; Eastwood, C.R.

    2016-01-01

    This paper reports on a field validation of previously developed protocols for evaluating the performance of in-line mastitis-detection systems. The protocols outlined 2 requirements of these systems: (1) to detect cows with clinical mastitis (CM) promptly and accurately to enable timely and

  17. Acoustic comfort in eating establishments

    DEFF Research Database (Denmark)

    Svensson, David; Jeong, Cheol-Ho; Brunskog, Jonas

    2014-01-01

    The subjective concept of acoustic comfort in eating establishments has been investigated in this study. The goal was to develop a predictive model for the acoustic comfort, by means of simple objective parameters, while also examining which other subjective acoustic parameters could help explain...... the feeling of acoustic comfort. Through several layers of anal ysis, acoustic comfort was found to be rather complex, and could not be explained entirely by common subjective parameters such as annoyance, intelligibility or privacy. A predictive model for the mean acoustic comfort for an eating establishment...

  18. Antibody engineering: methods and protocols

    National Research Council Canada - National Science Library

    Chames, Patrick

    2012-01-01

    "Antibody Engineering: Methods and Protocols, Second Edition was compiled to give complete and easy access to a variety of antibody engineering techniques, starting from the creation of antibody repertoires and efficient...

  19. Recommended protocols for sampling macrofungi

    Science.gov (United States)

    Gregory M. Mueller; John Paul Schmit; Sabine M. Hubndorf Leif Ryvarden; Thomas E. O' Dell; D. Jean Lodge; Patrick R. Leacock; Milagro Mata; Loengrin Umania; Qiuxin (Florence) Wu; Daniel L. Czederpiltz

    2004-01-01

    This chapter discusses several issues regarding reommended protocols for sampling macrofungi: Opportunistic sampling of macrofungi, sampling conspicuous macrofungi using fixed-size, sampling small Ascomycetes using microplots, and sampling a fixed number of downed logs.

  20. Automata-theoretic protocol programming

    NARCIS (Netherlands)

    Jongmans, Sung-Shik Theodorus Quirinus

    2016-01-01

    Parallel programming has become essential for writing scalable programs on general hardware. Conceptually, every parallel program consists of workers, which implement primary units of sequential computation, and protocols, which implement the rules of interaction that workers must abide by. As

  1. Blind quantum computation protocol in which Alice only makes measurements

    Science.gov (United States)

    Morimae, Tomoyuki; Fujii, Keisuke

    2013-05-01

    Blind quantum computation is a new secure quantum computing protocol which enables Alice (who does not have sufficient quantum technology) to delegate her quantum computation to Bob (who has a full-fledged quantum computer) in such a way that Bob cannot learn anything about Alice's input, output, and algorithm. In previous protocols, Alice needs to have a device which generates quantum states, such as single-photon states. Here we propose another type of blind computing protocol where Alice does only measurements, such as the polarization measurements with a threshold detector. In several experimental setups, such as optical systems, the measurement of a state is much easier than the generation of a single-qubit state. Therefore our protocols ease Alice's burden. Furthermore, the security of our protocol is based on the no-signaling principle, which is more fundamental than quantum physics. Finally, our protocols are device independent in the sense that Alice does not need to trust her measurement device in order to guarantee the security.

  2. Establishment of a protocol to extend the lifespan of human hormone-secreting pituitary adenoma cells.

    Science.gov (United States)

    Aiello, Aurora; Cassarino, Maria Francesca; Nanni, Simona; Sesta, Antonella; Ferraú, Francesco; Grassi, Claudio; Losa, Marco; Trimarchi, Francesco; Pontecorvi, Alfredo; Cannavò, Salvatore; Pecori Giraldi, Francesca; Farsetti, Antonella

    2018-01-01

    The aim of this study was to generate immortalized human anterior pituitary adenoma cells. Reliable cell models for the study of human pituitary adenomas are as yet lacking and studies performed so far used repeated passaging of freshly excised adenomas, with the attendant limitations due to limited survival in culture, early senescence, and poor reproducibility. We devised a technique based upon repeated co-transfections of two retroviral vectors, one carrying the catalytic subunit of human telomerase, hTERT, the other SV40 large T antigen. This approach extended the lifespan of cells derived from a human growth hormone-secreting adenoma up to 18 months while retaining morphology of primary cells, growth hormone synthesis and growth hormone secretion. Our attempt represents the first demonstration of successful lifespan extension of human growth hormone-secreting pituitary adenoma cells via co-transfection of hTERT and SV40T and paves the way to future attempts to obtain stable cell lines.

  3. Development and establishment of a protocol of an individual aggressiveness test in breeding does

    Directory of Open Access Journals (Sweden)

    I. Olivas

    2016-12-01

    Full Text Available The present work aims to define the optimal conditions to perform a resident-intruder test in individually housed breeding does as a measure of aggressiveness and describe the biological characteristics of aggressiveness in rabbit does: severity, frequency, duration and latency of aggressive events. Sixty-four nulliparous does at 90 d of age were used for this experiment, half (32 does as residents and the rest as intruders, testing them once a week for 14 wk. The time and duration of each aggressive behaviour was recorded and analysed to assess the aforementioned measures. According to the results, and regarding the studied effects, the origin of the animals caused no effect, whereas the level of aggressiveness seemed to be clearly increased in weeks 3-7 of the experiment, when animals were 110-140 d of age. In conclusion, a resident-intruder test lasting 1 min is enough to assess individual aggressiveness in adult breeding does, the response of which evolves with age and repetition.

  4. Establishing the Viability of End System Multicast using a Systems Approach to Protocol Design

    Science.gov (United States)

    2004-10-16

    general well-connected to each other. The Extended Set includes a machine behind ADSL , and hosts in Asia and Europe, in addition to the hosts in the primary...between ADSL and non- ADSL peers and study how much can such minimal information help. To select a good performance metric to evaluate the probing...the peers take less than 5 seconds to converge. Note that even though our low-fidelity 1-bit BNBW metric can only differentiate the 3 ADSL host from

  5. Adolescents previously involved in Satanism experiencing mental health problems

    Directory of Open Access Journals (Sweden)

    H Heathcote

    1999-09-01

    Full Text Available No research has previously been done regarding the phenomenon of adolescents who have previously been involved in Satanism and who experience obstacles in their strive for mental health. Adolescents previously involved in Satanism present behavioral problems like aggressive outbursts, depression, “ psychosis” or suicide attempts, that could lead to suicide. In the phenomenonanalysis semi-structured, phenomenological interviews were performed with the respondents and their parents. The respondents were requested to write a naïve sketch about their life. After completion of the data-control, guidelines for nursing staff were set.

  6. catering establishments of Awassa Town

    African Journals Online (AJOL)

    practices of catering business establishments in Awassa Town, Southern Ethiopia, February to. April 1996. Data were collected using standardized questionnaires, free listings, parasitological and bacteriological laboratory analyses. A total of 164 catering ..... identified include: a) Good coverage of safe water (defined as ...

  7. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security.

    Science.gov (United States)

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-12-04

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.

  8. A Novel Re-keying Function Protocol (NRFP For Wireless Sensor Network Security

    Directory of Open Access Journals (Sweden)

    Naif Alsharabi

    2008-12-01

    Full Text Available This paper describes a novel re-keying function protocol (NRFP for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs, covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.

  9. Protocols development for security and privacy of radio frequency identification systems

    Science.gov (United States)

    Sabbagha, Fatin

    There are benefits to adopting radio frequency identification (RFID) technology, although there are methods of attack that can compromise the system. This research determined how that may happen and what possible solutions can keep that from happening. Protocols were developed to implement better security. In addition, new topologies were developed to handle the problems of the key management. Previously proposed protocols focused on providing mutual authentication and privacy between readers and tags. However, those protocols are still vulnerable to be attacked. These protocols were analyzed and the disadvantages shown for each one. Previous works assumed that the channels between readers and the servers were secure. In the proposed protocols, a compromised reader is considered along with how to prevent tags from being read by that reader. The new protocols provide mutual authentication between readers and tags and, at the same time, remove the compromised reader from the system. Three protocols are proposed. In the first protocol, a mutual authentication is achieved and a compromised reader is not allowed in the network. In the second protocol, the number of times a reader contacts the server is reduced. The third protocol provides authentication and privacy between tags and readers using a trusted third party. The developed topology is implemented using python language and simulates work to check the efficiency regarding the processing time. The three protocols are implemented by writing codes in C language and then compiling them in MSP430. IAR Embedded workbench is used, which is an integrated development environment with the C/C++ compiler to generate a faster code and to debug the microcontroller. In summary, the goal of this research is to find solutions for the problems on previously proposed protocols, handle a compromised reader, and solve key management problems.

  10. Development and preliminary research on the measure properties of a perceptual and motor demands assessment protocol for virtual reality systems

    Directory of Open Access Journals (Sweden)

    Fábio Fabregas Cairolli

    2017-06-01

    Full Text Available The virtual reality has been frequently required in rehabilitation settings. However, it still lacks specificity, making it necessary to establish specific criteria to classify the most relevant aspects of electronic games to allow interventions based on virtual reality. Therefore, the purpose of this study is to develop a “Perceptual and motor demands assessment protocol for virtual reality systems” and to investigate its content validity and intra and inter observer agreement. The protocol was created through a literature review including classical studies as well as a review of recent articles about motor behavior, physical training, cognitive neuroscience and virtual reality. The previous versions were presented in study group meetings and congresses, and modified accordingly to suggestions of experts. Three examiners used the final version to analyze twice the total of 20 videos of individuals in a virtual environment and answered a questionnaire about its content validity. Most of the obtained values were classified as “good” (concordance from 80% to 89% or “excellent” (concordance from 90% to 100% by the three examiners and the protocol’s content validity was adequate. The protocol is valid, applicable and practical for analyzing different requirements of electronic games in a virtual environment.

  11. Influence of previous participation in physical activity on its ...

    African Journals Online (AJOL)

    ... participation can influence perceptions of PA among the students. Physical activity promotion programmes should consider the role of these factors which should be emphasised from childhood. Keywords: physical activity, students, perceived benefits, perceived barriers, previous participation, sedentary lifestyle, Rwanda

  12. Choice of contraception after previous operative delivery at a family ...

    African Journals Online (AJOL)

    Choice of contraception after previous operative delivery at a family planning clinic in Northern Nigeria. Amina Mohammed‑Durosinlorun, Joel Adze, Stephen Bature, Caleb Mohammed, Matthew Taingson, Amina Abubakar, Austin Ojabo, Lydia Airede ...

  13. Payload specialist Reinhard Furrer show evidence of previous blood sampling

    Science.gov (United States)

    1985-01-01

    Payload specialist Reinhard Furrer shows evidence of previous blood sampling while Wubbo J. Ockels, Dutch payload specialist (only partially visible), extends his right arm after a sample has been taken. Both men show bruises on their arms.

  14. Delivery outcomes at term after one previous cesarean section.

    Science.gov (United States)

    Yamani-Zamzami, Tarik Y

    2007-12-01

    To determine the maternal and perinatal outcomes at term in women with one previous cesarean delivery and with no history of vaginal birth. This is a case-control study conducted at King Abdul-Aziz University Hospital, Jeddah, Kingdom of Saudi Arabia, between January 1, 1999 and December 31, 2002. One hundred sixty-two women with one previous cesarean delivery and with no previous vaginal birth were compared with 324 control women. The cesarean section rate was higher in the study group 40 (24.7%) versus 23 (7.1%) in the control group and was statistically significant (phistory of vaginal delivery are considered less favorable, the vaginal birth after cesarean section success rate may be even lower if the indication for previous primary cesarean delivery was failure to progress, and may be associated with increased risk of uterine rupture. Further study is required to confirm our findings.

  15. [Influence of previous abdominopelvic surgery on gynecological laparoscopic operation].

    Science.gov (United States)

    Jin, Haoran; Shi, Wei; Zhou, Yingfang; Wu, Beisheng; Peng, Chao

    2014-09-01

    To investigate the influence of previous abdominopelvic surgery on gynecological laparoscopic operation. A retrospective analysis of 3 283 cases of gynecological diseases by laparoscopic operation patients in Peking University First Hospital from 2007 January to 2012 December, among them, 719 (21.90%) patients with previous abdominopelvic surgery history (study Group), 2 564 (78.10%)patients have no history of abdominopelvic surgery (control group). Study group 719 patients, previous operation times: one time in 525 cases, 194 cases were multiple; previous operation: 185 cases of gynecological surgery, 305 cases of obstetric surgery, 108 cases of general surgery, and 121 complex surgery (include at least two kinds of surgery); previous operative approach: 650 cases laparotomy and 69 cases laparoscopy. Compared two groups of patients with abdominopelvic adhesion and the gynecologic laparoscopic operation situation, analyzed the influence of previous abdominopelvic surgery on abdominopelvic adhesion on and gynecological laparoscopic operation. The incidence of abdominopelvic adhesion in the patients with previous abdominopelvic surgery was 51.2% (368/719), which was significantly higher than that of 8.2% (211/2 564)in patients without previous abdominopelvic surgery (P surgery (23.1%, 166/719) was significantly higher than that in the control group (3.3% , 85/2 564;P laparotomy was 0.6% (4/719) significantly more than the control groups (0.1%, 2/2 564; P = 0.023). Compared with other groups, patients with gynecological or complex surgery or multiple operation history presented more severe abdominopelvic adhesion both in the score and degree (P laparotomy showed no statistical difference between the two groups (P > 0.05). The laparoscopic operation could be carried out successfully and safely in patients with a history of various abdominopelvic operations, but the conversion rate increases, for patients with a history of multiple operation because of pelvic adhesion

  16. Modelling and Initial Validation of the DYMO Routing Protocol for Mobile Ad-Hoc Networks

    DEFF Research Database (Denmark)

    Espensen, Kristian Asbjørn Leth; Kjeldsen, Mads Keblov; Kristensen, Lars Michael

    2008-01-01

    A mobile ad-hoc network (MANET) is an infrastructureless network established by a set of mobile devices using wireless communication. The Dynamic MANET On-demand (DYMO) protocol is a routing protocol for multi-hop communication in MANETs currently under development by the Internet Engineering Task...... Force (IETF). This paper presents a Coloured Petri Net (CPN) model of the mandatory parts of the DYMO protocol, and shows how scenario-based state space exploration has been used to validate key properties of the protocol. Our CPN modelling and verification work has spanned two revisions of the DYMO...... protocol specification and have had direct impact on the most recent version of the protocol specification....

  17. Continuous-variable protocol for oblivious transfer in the noisy-storage model

    DEFF Research Database (Denmark)

    Furrer, Fabian; Gehring, Tobias; Schaffner, Christian

    2018-01-01

    for oblivious transfer for optical continuous-variable systems, and prove its security in the noisy-storage model. This model allows us to establish security by sending more quantum signals than an attacker can reliably store during the protocol. The security proof is based on uncertainty relations which we......Cryptographic protocols are the backbone of our information society. This includes two-party protocols which offer protection against distrustful players. Such protocols can be built from a basic primitive called oblivious transfer. We present and experimentally demonstrate here a quantum protocol...... derive for continuous-variable systems, that differ from the ones used in quantum key distribution. We experimentally demonstrate in a proof-of-principle experiment the proposed oblivious transfer protocol for various channel losses by using entangled two-mode squeezed states measured with balanced...

  18. A Protocol for Provably Secure Authentication of a Tiny Entity to a High Performance Computing One

    Directory of Open Access Journals (Sweden)

    Siniša Tomović

    2016-01-01

    Full Text Available The problem of developing authentication protocols dedicated to a specific scenario where an entity with limited computational capabilities should prove the identity to a computationally powerful Verifier is addressed. An authentication protocol suitable for the considered scenario which jointly employs the learning parity with noise (LPN problem and a paradigm of random selection is proposed. It is shown that the proposed protocol is secure against active attacking scenarios and so called GRS man-in-the-middle (MIM attacking scenarios. In comparison with the related previously reported authentication protocols the proposed one provides reduction of the implementation complexity and at least the same level of the cryptographic security.

  19. Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment (Extended Version)

    DEFF Research Database (Denmark)

    Almousa, Omar; Mödersheim, Sebastian Alexander; Modesti, Paolo

    We integrate, and improve upon, prior relative soundness results of two kinds. The first kind are typing results showing that if any security protocol that fulfils a number of sufficient conditions has an attack then it has a well-typed attack. The second kind considers the parallel composition...... of protocols, showing that when running two protocols in parallel allows for an attack, then at least one of the protocols has an attack in isolation. The most important generalization over previous work is the support for all security properties of the geometric fragment....

  20. Typing and compositionality for security protocols: A generalization to the geometric fragment

    DEFF Research Database (Denmark)

    Almousa, Omar; Mödersheim, Sebastian Alexander; Modesti, Paolo

    2015-01-01

    We integrate, and improve upon, prior relative soundness results of two kinds. The first kind are typing results showing that any security protocol that fulfils a number of sufficient conditions has an attack if it has a well-typed attack. The second kind considers the parallel composition...... of protocols, showing that when running two protocols in parallel allows for an attack, then at least one of the protocols has an attack in isolation. The most important generalization over previous work is the support for all security properties of the geometric fragment....

  1. An Optimized Gateway-Oriented Password-Based Authenticated Key Exchange Protocol

    Science.gov (United States)

    Yoon, Eun-Jun; Yoo, Kee-Young

    This research paper points out that the gateway-oriented password-based authenticated key exchange protocol recently developed by Shim (S-GPAKE) was inefficiently and incorrectly designed to overcome an undetectable on-line password guessing attack. To resolve the computation efficiency and security problems, an optimized GPAKE protocol (O-GPAKE), which was not only secure against various security attacks, but also had considerably lower computational cost and provided mutual authentication unlike previous related protocols including the S-GPAKE protocol was proposed.

  2. Quality Assurance Protocol for AFCI Advanced Structural Materials Testing

    International Nuclear Information System (INIS)

    Busby, Jeremy T.

    2009-01-01

    The objective of this letter is to inform you of recent progress on the development of advanced structural materials in support of advanced fast reactors and AFCI. As you know, the alloy development effort has been initiated in recent months with the procurement of adequate quantities of the NF616 and HT-UPS alloys. As the test alloys become available in the coming days, mechanical testing, evaluation of optimizing treatments, and screening of environmental effects will be possible at a larger scale. It is therefore important to establish proper quality assurance protocols for this testing effort in a timely manner to ensure high technical quality throughout testing. A properly implemented quality assurance effort will also enable preliminary data taken in this effort to be qualified as NQA-1 during any subsequent licensing discussions for an advanced design or actual prototype. The objective of this report is to describe the quality assurance protocols that will be used for this effort. An essential first step in evaluating quality protocols is assessing the end use of the data. Currently, the advanced structural materials effort is part of a long-range, basic research and development effort and not, as yet, involved in licensing discussions for a specific reactor design. After consultation with Mark Vance (an ORNL QA expert) and based on the recently-issued AFCI QA requirements, the application of NQA-1 quality requirements will follow the guidance provided in Part IV, Subpart 4.2 of the NQA-1 standard (Guidance on Graded Application of QA for Nuclear-Related Research and Development). This guidance mandates the application of sound scientific methodology and a robust peer review process in all phases, allowing for the data to be qualified for use even if the programmatic mission changes to include licensing discussions of a specific design or prototype. ORNL has previously implemented a QA program dedicated to GNEP activities and based on an appropriately graded

  3. Quality Assurance Protocol for AFCI Advanced Structural Materials Testing

    Energy Technology Data Exchange (ETDEWEB)

    Busby, Jeremy T [ORNL

    2009-05-01

    The objective of this letter is to inform you of recent progress on the development of advanced structural materials in support of advanced fast reactors and AFCI. As you know, the alloy development effort has been initiated in recent months with the procurement of adequate quantities of the NF616 and HT-UPS alloys. As the test alloys become available in the coming days, mechanical testing, evaluation of optimizing treatments, and screening of environmental effects will be possible at a larger scale. It is therefore important to establish proper quality assurance protocols for this testing effort in a timely manner to ensure high technical quality throughout testing. A properly implemented quality assurance effort will also enable preliminary data taken in this effort to be qualified as NQA-1 during any subsequent licensing discussions for an advanced design or actual prototype. The objective of this report is to describe the quality assurance protocols that will be used for this effort. An essential first step in evaluating quality protocols is assessing the end use of the data. Currently, the advanced structural materials effort is part of a long-range, basic research and development effort and not, as yet, involved in licensing discussions for a specific reactor design. After consultation with Mark Vance (an ORNL QA expert) and based on the recently-issued AFCI QA requirements, the application of NQA-1 quality requirements will follow the guidance provided in Part IV, Subpart 4.2 of the NQA-1 standard (Guidance on Graded Application of QA for Nuclear-Related Research and Development). This guidance mandates the application of sound scientific methodology and a robust peer review process in all phases, allowing for the data to be qualified for use even if the programmatic mission changes to include licensing discussions of a specific design or prototype. ORNL has previously implemented a QA program dedicated to GNEP activities and based on an appropriately graded

  4. An in vivo investigative protocol for HDR prostate brachytherapy using urethral and rectal thermoluminescence dosimetry

    International Nuclear Information System (INIS)

    Toye, Warren; Das, Ram; Kron, Tomas; Franich, Rick; Johnston, Peter; Duchesne, Gillian

    2009-01-01

    Purpose: To develop an in vivo dosimetry based investigative action level relevant for a corrective protocol for HDR brachytherapy boost treatment. Methods and materials: The dose delivered to points within the urethra and rectum was measured using TLD in vivo dosimetry in 56 patients. Comparisons between the urethral and rectal measurements and TPS calculations showed differences, which are related to the relative position of the implant and TLD trains, and allowed shifts of implant position relative to the prostate to be estimated. Results and conclusions: Analysis of rectal dose measurements is consistent with implant movement, which was previously only identified with the urethral data. Shift corrected doses were compared with results from the TPS. Comparison of peak doses to the urethra and rectum has been assessed against the proposed corrective protocol to limit overdosing these critical structures. An initial investigative level of 20% difference between measured and TPS peak dose was established, which corresponds to 1/3 of patients which was practical for the caseload. These patients were assessed resulting in corrective action being applied for one patient. Multiple triggering for selective investigative action is outlined. The use of a single in vivo measurement in the first fraction optimizes patient benefit at acceptable cost.

  5. Concrete Security for Entity Recognition: The Jane Doe Protocol

    DEFF Research Database (Denmark)

    Lucks, Stefan; Zenner, Erik; Weimerskirch, Andre

    2008-01-01

    Entity recognition does not ask whether the message is from some entity X, just whether a message is from the same entity as a previous message. This turns turns out to be very useful for low-end devices. The current paper proposes a new protocol – the “Jane Doe Protocol” –, and provides a formal...... proof of its concrete security. The protocol neither employs asymmetric cryptography, nor a trusted third party, nor any key pre-distribution. It is suitable for light-weight cryptographic devices such as sensor network motes and RFID tags....

  6. On the theoretical gap between synchronous and asynchronous MPC protocols

    DEFF Research Database (Denmark)

    Beerliová-Trubíniová, Zuzana; Hirt, Martin; Nielsen, Jesper Buus

    2010-01-01

    Multiparty computation (MPC) protocols among n parties secure against t active faults are known to exist if and only if t gap between these bounds, and show...... that in the cryptographic setting (with setup), the sole reason for it is the distribution of inputs: given an oracle for input distribution, cryptographically-secure asynchronous MPC is possible with the very same condition as synchronous MPC, namely t gaps in other security models...... (perfect, statistical) have the same cause. We stress that all previous asynchronous MPC protocols inherently require t

  7. Optimization of a Sample Processing Protocol for Recovery of ...

    Science.gov (United States)

    Journal Article Following a release of Bacillus anthracis spores into the environment, there is a potential for lasting environmental contamination in soils. There is a need for detection protocols for B. anthracis in environmental matrices. However, identification of B. anthracis within a soil is a difficult task. Processing soil samples helps to remove debris, chemical components, and biological impurities that can interfere with microbiological detection. This study aimed to optimize a previously used indirect processing protocol, which included a series of washing and centrifugation steps.

  8. On the need of improved Accelerated Degradation Protocols (ADPs)

    DEFF Research Database (Denmark)

    Pizzutilo, E.; Geiger, S.; Grote, J. P.

    2016-01-01

    dissolution and carbon corrosion are present at low rates, which is also reflected by a comparably low ECSA decrease. On the other hand, a huge increase in rate of both processes is observed during transitions from low to high potential regimes experienced by a PEMFC in operation, here studied in a third...... protocols that are commonly used in the fuel cell community to simulate load cycle and start-stop conditions in proton exchange membrane fuel cells (PEMFCs). In contrast to previous assumptions, claiming a separation between carbon corrosion and platinum dissolution, in both standard protocols platinum...

  9. Dental health in workers previously exposed to mercury vapour at a chloralkali plant.

    OpenAIRE

    Holland, R I; Ellingsen, D G; Olstad, M L; Kjuus, H

    1994-01-01

    OBJECTIVES--The dental health of 73 workers previously exposed to mercury vapour at a chloralkali plant was studied and compared with that of 51 non-exposed referents. METHODS--A record of oral, periodontal, gingival and mucosal conditions, including teeth, restorations, prostheses, and oral hygiene, was established during a 30 min examination. The participants' periodontal conditions were assessed according to the community periodontal index of treatment needs (CPITN). The results with the C...

  10. BREATHING PROTECTION EQUIPMENT CONSUMPTION: CONTRIBUTION FROM AN EXPERIMENTAL PROTOCOL

    Directory of Open Access Journals (Sweden)

    Cristiano Corrêa

    2015-12-01

    Full Text Available This article presents an experimental protocol for calculatingthe breathable air consumption on Open-Circuit Self-Contained Breathing Apparatus (SCBA used by firefighters during operations in smoke environment, especially in firefighting operations. The actual protocol is based on particularities forvaried Fire Departments. Even though the Fire Departments are similar in their activities and collaborative spirit, each institution has different equipment, works under a specific ambient temperature, and has peculiar training programs, representing a unique organism. Creating a simple protocol makes it possible to be easily repeated, establishing, that way,the air consumption during SCBAuse by any Fire Department. One case study in a significant sample of on Battalion of Recife – PE, Brazil, will be presented, creating a reference of air consumption for firefighters during low, middle and high effort during firefighting.

  11. Development of characterization protocol for mixed liquid radioactive waste classification

    Energy Technology Data Exchange (ETDEWEB)

    Zakaria, Norasalwa, E-mail: norasalwa@nuclearmalaysia.gov.my [Waste Technology Development Centre, Malaysian Nuclear Agency, 43000 Kajang, Selangor (Malaysia); Wafa, Syed Asraf [Radioisotop Technology and Innovation, Malaysian Nuclear Agency, 43000 Kajang, Selangor (Malaysia); Wo, Yii Mei [Radiochemistry and Environment, Malaysian Nuclear Agency, 43000 Kajang, Selangor (Malaysia); Mahat, Sarimah [Material Technology Group, Malaysian Nuclear Agency, 43000 Kajang, Selangor (Malaysia)

    2015-04-29

    Mixed liquid organic waste generated from health-care and research activities containing tritium, carbon-14, and other radionuclides posed specific challenges in its management. Often, these wastes become legacy waste in many nuclear facilities and being considered as ‘problematic’ waste. One of the most important recommendations made by IAEA is to perform multistage processes aiming at declassification of the waste. At this moment, approximately 3000 bottles of mixed liquid waste, with estimated volume of 6000 litres are currently stored at the National Radioactive Waste Management Centre, Malaysia and some have been stored for more than 25 years. The aim of this study is to develop a characterization protocol towards reclassification of these wastes. The characterization protocol entails waste identification, waste screening and segregation, and analytical radionuclides profiling using various analytical procedures including gross alpha/ gross beta, gamma spectrometry, and LSC method. The results obtained from the characterization protocol are used to establish criteria for speedy classification of the waste.

  12. Establishment of ITER: Relevant documents

    International Nuclear Information System (INIS)

    1988-01-01

    At the Geneva Summit Meeting in November, 1985, a proposal was made by the Soviet Union to build a next-generation tokamak experiment on a collaborative basis involving the world's four major fusion blocks. In October, 1986, after consulting with Japan and the European Community, the United States responded with a proposal on how to implement such an activity. Ensuing diplomatic and technical discussions resulted in the establishment, under the auspices of the IAEA, of the International Thermonuclear Experimental Reactor Conceptual Design Activities. This tome represents a collection of all documents relating to the establishment of ITER, beginning with the initial meeting of the ITER Quadripartite Initiative Committee in Vienna on 15-16 March, 1987, through the meeting of the Provisional ITER Council, also in Vienna, on 8-9 February, 1988

  13. Establishment for Nuclear Equipment: Overview

    International Nuclear Information System (INIS)

    Pracz, J.

    2000-01-01

    Full text: The main objective of the activity of the Establishment for Nuclear Equipment (ZdAJ) in 1999 was to obtain the ISO 9001 certificate. Work on this problem has been successfully completed. The changes introduced in agreement with requirements of ISO in supervising the construction, manufacturing and servicing eliminate possible deficiencies of our products and will pay in the future. Two new important ventures have been undertaken: design of an accelerator with two photon energies and a reconstruction of simulator directed towards better geometrical parameters. The completion of the improvements in accelerator is foreseen for the year 2002. The changes comprise almost all sub-assemblies of the device. The modernized simulator will be installed in the hospital already in the year 2000 - the ameliorations concern mainly the arm of the apparatus, collimator, driving gears and control system. Of course - apart from this, the routine production activity of the Establishment was continued in 1999. (author)

  14. Secondary recurrent miscarriage is associated with previous male birth.

    LENUS (Irish Health Repository)

    Ooi, Poh Veh

    2011-01-01

    Secondary recurrent miscarriage (RM) is defined as three or more consecutive pregnancy losses after delivery of a viable infant. Previous reports suggest that a firstborn male child is associated with less favourable subsequent reproductive potential, possibly due to maternal immunisation against male-specific minor histocompatibility antigens. In a retrospective cohort study of 85 cases of secondary RM we aimed to determine if secondary RM was associated with (i) gender of previous child, maternal age, or duration of miscarriage history, and (ii) increased risk of pregnancy complications. Fifty-three women (62.0%; 53\\/85) gave birth to a male child prior to RM compared to 32 (38.0%; 32\\/85) who gave birth to a female child (p=0.002). The majority (91.7%; 78\\/85) had uncomplicated, term deliveries and normal birth weight neonates, with one quarter of the women previously delivered by Caesarean section. All had routine RM investigations and 19.0% (16\\/85) had an abnormal result. Fifty-seven women conceived again and 33.3% (19\\/57) miscarried, but there was no significant difference in failure rates between those with a previous male or female child (13\\/32 vs. 6\\/25, p=0.2). When patients with abnormal results were excluded, or when women with only one previous child were considered, there was still no difference in these rates. A previous male birth may be associated with an increased risk of secondary RM but numbers preclude concluding whether this increases recurrence risk. The suggested association with previous male birth provides a basis for further investigations at a molecular level.

  15. Secondary recurrent miscarriage is associated with previous male birth.

    LENUS (Irish Health Repository)

    Ooi, Poh Veh

    2012-01-31

    Secondary recurrent miscarriage (RM) is defined as three or more consecutive pregnancy losses after delivery of a viable infant. Previous reports suggest that a firstborn male child is associated with less favourable subsequent reproductive potential, possibly due to maternal immunisation against male-specific minor histocompatibility antigens. In a retrospective cohort study of 85 cases of secondary RM we aimed to determine if secondary RM was associated with (i) gender of previous child, maternal age, or duration of miscarriage history, and (ii) increased risk of pregnancy complications. Fifty-three women (62.0%; 53\\/85) gave birth to a male child prior to RM compared to 32 (38.0%; 32\\/85) who gave birth to a female child (p=0.002). The majority (91.7%; 78\\/85) had uncomplicated, term deliveries and normal birth weight neonates, with one quarter of the women previously delivered by Caesarean section. All had routine RM investigations and 19.0% (16\\/85) had an abnormal result. Fifty-seven women conceived again and 33.3% (19\\/57) miscarried, but there was no significant difference in failure rates between those with a previous male or female child (13\\/32 vs. 6\\/25, p=0.2). When patients with abnormal results were excluded, or when women with only one previous child were considered, there was still no difference in these rates. A previous male birth may be associated with an increased risk of secondary RM but numbers preclude concluding whether this increases recurrence risk. The suggested association with previous male birth provides a basis for further investigations at a molecular level.

  16. The application layer protocol: Remote Sensing Communication Protocol (RSComPro)

    Energy Technology Data Exchange (ETDEWEB)

    Vasiljevic, N.; Lea, G.; Courtney, M. [Technical Univ. of Denmark. DTU Wind Energy, DTU Risoe Campus, Roskilde (Denmark); Schneemann, J.; Trabucchi, D.; Trujillo, J.-J.; Unguran, R.; Villa, J.-P. [Univ. of Oldenburg, ForWind, Oldenburg (Germany)

    2013-09-15

    The following document establishes the Remote Sensing Communication Protocol (RSComPro) to be implemented by remote sensing systems (RS system) connecting to a network coordinated by a single Master system. The implementation of the RSComPro enables a full subordination of a RS system to a Master system. The last has as main task to control and synchronize measurement activities by all RS systems in the network. In this respect the RSComPro specifies data flow rules and formal characteristics of exchanged messages. The first version of this protocol is the outcome of the collective work between DTU Wind Energy and ForWind University of Oldenburg. It has been developed in initially for application in wind measurement by means of WindScanners (synchronized multiple lidar systems). However, it could be extended to be applied on any other type of scanning remote sensing system. Its implementation has been tested initially on systems of type WLS200S from the company Leosphere at both institutes. The objective of this protocol is to define: 1) Basic details of the software running on the RS system and the Master system; 2) Basic details of the network model; 3) Specification of handshaking process; 4) Basic details of error handling; 5) Specification of message format and syntax. (Author)

  17. Cure Cycle Design Methodology for Fabricating Reactive Resin Matrix Fiber Reinforced Composites: A Protocol for Producing Void-free Quality Laminates

    Science.gov (United States)

    Hou, Tan-Hung

    2014-01-01

    For the fabrication of resin matrix fiber reinforced composite laminates, a workable cure cycle (i.e., temperature and pressure profiles as a function of processing time) is needed and is critical for achieving void-free laminate consolidation. Design of such a cure cycle is not trivial, especially when dealing with reactive matrix resins. An empirical "trial and error" approach has been used as common practice in the composite industry. Such an approach is not only costly, but also ineffective at establishing the optimal processing conditions for a specific resin/fiber composite system. In this report, a rational "processing science" based approach is established, and a universal cure cycle design protocol is proposed. Following this protocol, a workable and optimal cure cycle can be readily and rationally designed for most reactive resin systems in a cost effective way. This design protocol has been validated through experimental studies of several reactive polyimide composites for a wide spectrum of usage that has been documented in the previous publications.

  18. Establishing the isolated Standard Model

    International Nuclear Information System (INIS)

    Wells, James D.; Zhang, Zhengkang; Zhao, Yue

    2017-02-01

    The goal of this article is to initiate a discussion on what it takes to claim ''there is no new physics at the weak scale,'' namely that the Standard Model (SM) is ''isolated.'' The lack of discovery of beyond the SM (BSM) physics suggests that this may be the case. But to truly establish this statement requires proving all ''connected'' BSM theories are false, which presents a significant challenge. We propose a general approach to quantitatively assess the current status and future prospects of establishing the isolated SM (ISM), which we give a reasonable definition of. We consider broad elements of BSM theories, and show many examples where current experimental results are not sufficient to verify the ISM. In some cases, there is a clear roadmap for the future experimental program, which we outline, while in other cases, further efforts - both theoretical and experimental - are needed in order to robustly claim the establishment of the ISM in the absence of new physics discoveries.

  19. Establishing the isolated standard model

    Science.gov (United States)

    Wells, James D.; Zhang, Zhengkang; Zhao, Yue

    2017-07-01

    The goal of this article is to initiate a discussion on what it takes to claim "there is no new physics at the weak scale," namely that the Standard Model (SM) is "isolated." The lack of discovery of beyond the SM (BSM) physics suggests that this may be the case. But to truly establish this statement requires proving all "connected" BSM theories are false, which presents a significant challenge. We propose a general approach to quantitatively assess the current status and future prospects of establishing the isolated SM (ISM), which we give a reasonable definition of. We consider broad elements of BSM theories, and show many examples where current experimental results are not sufficient to verify the ISM. In some cases, there is a clear roadmap for the future experimental program, which we outline, while in other cases, further efforts—both theoretical and experimental—are needed in order to robustly claim the establishment of the ISM in the absence of new physics discoveries.

  20. The mesh network protocol evaluation and development

    OpenAIRE

    Pei, Ping; Petrenko, Y. N.

    2015-01-01

    In this paper, we introduce a Mesh network protocol evaluation and development. It has a special protocol. We could easily to understand that how different protocols are used in mesh network. In addition to our comprehension, Multi – hop routing protocol could provide robustness and load balancing to communication in wireless mesh networks.

  1. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against act...

  2. Case Report - Sudden onset methaemoglobinaemia in a previously ...

    African Journals Online (AJOL)

    ... country but we managed to get it all the way from Nairobi, Kenya. A diagnosis of Methaemoglobinaemia was made using Spectrophotometry and she was successfully treated using 2 doses of intravenous Methylene blue. The cause of Methaemoglobinaemia was established to have been nitrites from food preservatives.

  3. Vaginal misoprostol for second-trimester pregnancy termination after one previous cesarean delivery.

    Science.gov (United States)

    Naguib, Ahmad H; Morsi, Hassan M; Borg, Tamer F; Fayed, Salah T; Hemeda, Hosam M

    2010-01-01

    To determine the safety and efficacy of using misoprostol vaginally for second-trimester abortion in women with a single previous cesarean delivery. This prospective observational study was carried out at a university hospital in Egypt with 50 pregnant women with 1 previous cesarean delivery; a gestation of at least 16 weeks but less than 20 weeks (group 1) or 20 or more weeks (group 2); and a need to terminate the pregnancy. The regimen was 4 doses of 200 microg of misoprostol applied vaginally every 4 hours daily, with a 12-hour nightly rest from misoprostol applications, until contractions appeared but not for more than 72 hours. The primary outcome was the induction-to-abortion interval. There were no cases of uterine rupture. Abortion within the study protocol occurred in 45 of the 50 women, for a 90% success rate. There was no significant difference in the induction-to-abortion interval between the 2 groups. Inducing abortion with lower misoprostol doses appear to be safe and effective throughout the second trimester in women with a single previous cesarean delivery. Larger randomized trials are needed to validate these results.

  4. Lung Transplantation From Donors After Previous Cardiac Surgery: Ideal Graft in Marginal Donor?

    Science.gov (United States)

    Palleschi, A; Mendogni, P; Tosi, D; Montoli, M; Carrinola, R; Mariolo, A V; Briganti, F; Nosotti, M

    2017-05-01

    Lung transplantation is a limited by donor pool shortage. Despite the efforts to extend the graft acceptability with recurrent donor criteria reformulations, previous cardiothoracic surgery is still considered a contraindication. A donor who underwent cardiac surgery could potentially provide an ideal lung but high intraoperative risks and intrinsic technical challenges are expected during the graft harvesting. The purpose of this study is to present our dedicated protocol and four clinical cases of successful lung procurements from donors who had a previous major cardiac surgery. One donor had ascending aortic root (AAR) substitution, another had mitral valve substitution, and two had coronary artery bypass surgery. The others' eligibility criteria for organ allocation, such as ABO compatibility, PaO 2 /FiO 2 ratio, absence of aspiration, or sepsis were respected. In one of the cases with previous coronary bypass grafting, the donor had a veno-arterial extracorporeal membrane oxygenation support. Consequently, the grafts required an ex vivo lung perfusion evaluation. We report the technical details of procurement and postoperative courses of recipients. All procurements were uneventful, without lung damage or waste of abdominal organs related to catastrophic intraoperative events. All recipients had a successful clinical outcome. We believe that successful transplantation is achievable even in a complicated setting, such as cases involving donors with previous cardiac surgery frequently are. Facing lung donor shortage, we strongly support any effort to avoid the loss of possible acceptable lungs. In particular, previous major cardiac surgery does not strictly imply a poor quality of lungs as well as unsustainable graft procurement. Copyright © 2017 Elsevier Inc. All rights reserved.

  5. Predictor Variables and Screening Protocol for Depressive and Anxiety Disorders in Cancer Outpatients.

    Science.gov (United States)

    Lima, Manuela Polidoro; Longatto-Filho, Adhemar; Osório, Flávia L

    2016-01-01

    Cancer patients are at increased risk of persistent depressive and anxiety symptoms and disorders compared to the general population. However, these issues are not always identified, which may worsen the prognosis and increase morbidity and mortality. Therefore, the objectives of this study are to identify predictor variables (demographic and clinical) for the development of mood and anxiety disorders in cancer outpatients and to propose a probabilistic screening protocol considering these variables and certain standardized screening instruments. A total of 1,385 adults, of both genders, receiving outpatient cancer care were evaluated using a questionnaire and screening instruments. Thereafter, 400 of these subjects responded to the Structured Clinical Interview for the Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition (SCID-IV) by telephone to confirm or rule out the presence of a Current Major Depressive Episode (CMDE) or Anxiety Disorder (AD). Of the patients surveyed, 64% met the criteria for CMDE and 41% for AD. Female gender was found to be a risk factor for both disorders, and the presence of previous psychiatric history and marital status (divorced and widowed) were risk factors for anxiety disorders. When scoring above the recommended cutoff score, the screening instruments also indicated a risk of the studied disorders. Based on these findings, a screening protocol and nomograms were created for the quantification, combination and probabilistic estimate of risk, with accuracy indicators >0.68. The prevalence rates for the disorders under study are extremely high in cancer patients. The use of the proposed protocol and nomogram can facilitate rapid and wide screening, thus refining triage and supporting the establishment of criteria for referral to mental health professionals, so that patients can be properly diagnosed and treated.

  6. Identity Establishment and Capability Based Access Control (IECAC) Scheme for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) become discretionary part of everyday life and could befall a threat if security is not considered before deployment. Authentication and access control in IoT is equally important to establish secure communication between devices. To protect IoT from man in middle, replay...... and denial of service attacks, the concept of capability for access control is introduced. This paper presents Identity establishment and capability based access control (IECAC) protocol using ECC (Elliptical Curve Cryptography) for IoT along with protocol evaluation, which protect against the aforementioned...

  7. Chest magnetic resonance imaging: a protocol suggestion

    Directory of Open Access Journals (Sweden)

    Bruno Hochhegger

    2015-12-01

    Full Text Available Abstract In the recent years, with the development of ultrafast sequences, magnetic resonance imaging (MRI has been established as a valuable diagnostic modality in body imaging. Because of improvements in speed and image quality, MRI is now ready for routine clinical use also in the study of pulmonary diseases. The main advantage of MRI of the lungs is its unique combination of morphological and functional assessment in a single imaging session. In this article, the authors review most technical aspects and suggest a protocol for performing chest MRI. The authors also describe the three major clinical indications for MRI of the lungs: staging of lung tumors; evaluation of pulmonary vascular diseases; and investigation of pulmonary abnormalities in patients who should not be exposed to radiation.

  8. Chest magnetic resonance imaging: a protocol suggestion*

    Science.gov (United States)

    Hochhegger, Bruno; de Souza, Vinícius Valério Silveira; Marchiori, Edson; Irion, Klaus Loureiro; Souza Jr., Arthur Soares; Elias Junior, Jorge; Rodrigues, Rosana Souza; Barreto, Miriam Menna; Escuissato, Dante Luiz; Mançano, Alexandre Dias; Araujo Neto, César Augusto; Guimarães, Marcos Duarte; Nin, Carlos Schuler; Santos, Marcel Koenigkam; Silva, Jorge Luiz Pereira e

    2015-01-01

    In the recent years, with the development of ultrafast sequences, magnetic resonance imaging (MRI) has been established as a valuable diagnostic modality in body imaging. Because of improvements in speed and image quality, MRI is now ready for routine clinical use also in the study of pulmonary diseases. The main advantage of MRI of the lungs is its unique combination of morphological and functional assessment in a single imaging session. In this article, the authors review most technical aspects and suggest a protocol for performing chest MRI. The authors also describe the three major clinical indications for MRI of the lungs: staging of lung tumors; evaluation of pulmonary vascular diseases; and investigation of pulmonary abnormalities in patients who should not be exposed to radiation. PMID:26811555

  9. A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.

    Science.gov (United States)

    Mohit, Prerna; Amin, Ruhul; Karati, Arijit; Biswas, G P; Khan, Muhammad Khurram

    2017-04-01

    Telecare Medical Information System (TMIS) supports a standard platform to the patient for getting necessary medical treatment from the doctor(s) via Internet communication. Security protection is important for medical records (data) of the patients because of very sensitive information. Besides, patient anonymity is another most important property, which must be protected. Most recently, Chiou et al. suggested an authentication protocol for TMIS by utilizing the concept of cloud environment. They claimed that their protocol is patient anonymous and well security protected. We reviewed their protocol and found that it is completely insecure against patient anonymity. Further, the same protocol is not protected against mobile device stolen attack. In order to improve security level and complexity, we design a light weight authentication protocol for the same environment. Our security analysis ensures resilience of all possible security attacks. The performance of our protocol is relatively standard in comparison with the related previous research.

  10. A protocol for a systematic review for perioperative pregabalin use

    Directory of Open Access Journals (Sweden)

    Eipe Naveen

    2012-09-01

    Full Text Available Abstract Background Perioperative pain management has recently been revolutionized with the recognition of novel mechanisms and introduction of newer drugs. Many randomized trials have studied the use of the gabapentinoid anti-epileptic, pregabalin, in acute pain. Published systematic reviews suggest that using pregabalin for perioperative pain management may decrease analgesic requirements and pain scores, at the expense of troublesome side effects. A major limitation of the extant reviews is the lack of rigorous investigation of clinical characteristics that would maximize the benefit harms ratio in favor of surgical patients. We posit that effects of pregabalin for perioperative pain management vary by the type of surgical pain model and propose this systematic review protocol to update previous systematic reviews and investigate the heterogeneity in findings across subgroups of surgical pain models. Methods/Design Using a peer-reviewed search strategy, we will search key databases for clinical trials on perioperative pregabalin use in adults. The electronic searches will be supplemented by scanning the reference lists of included studies. No limits of language, country or year will be imposed. Outcomes will include pain; use of co-analgesia, particularly opioids; enhanced recovery; and drug-related harms. We will focus on the identification of surgical models and patient characteristics that have shown benefit and adverse effects from pregabalin. Two clinical experts will independently screen the studies for inclusion using eligibility criteria established a priori. Data extracted by the reviewers will then be verified. Publication bias will be assessed, as will risk of bias using the Cochrane Risk of Bias tool. Meta-analysis and meta-regression are planned if the studies are deemed statistically, methodologically and clinically homogenous. Evidence will be graded for its strength for a select number of outcomes. Discussion We will explore

  11. Submission to the British Columbia government on the Kyoto Protocol

    International Nuclear Information System (INIS)

    2002-09-01

    The Business Council provided its comments concerning the Kyoto Protocol and climate change to the government of British Columbia, recommending that a clear position be established quickly on the matter. The adopted position should also be disseminated broadly to allow stake holders sufficient time to prepare for the upcoming meetings of the Joint Ministers and First Ministers. The federal government has announced that the decision on whether to ratify the Kyoto Protocol will be made before the end of 2002, and this decision will have numerous effects on the people of British Columbia, businesses, workers, and consumers alike. The Business Council of British Columbia believes that the unique interests of the province can best be protected by a proactive approach. Actions plans are being prepared by several of the other provinces and territories, who have already stated their position concerning the Kyoto Protocol. The long-term risks of climate change for British Columbia have not been determined nor have the elements of a provincial approach. The following elements should be included in British Columbia's position on the Kyoto Protocol, according to the Business Council of British Columbia: (1) a credible and cost-effective implementation plan that does not unduly burden the province and other jurisdictions must be developed before Canada decides to ratify the Protocol. British Columbia should go on the record stating it does not support the ratification of the Kyoto Protocol in its present form. (2) the province should advocate for a national approach to climate change that can be achieved within a reasonable time frame, reflects the long-term nature of the problem, and is in agreement with the economic development objectives of British Columbia, (3) a plan detailing how the province intends to deal with the growth of greenhouse gas emissions should supplement and support the position of the province on the Kyoto Protocol. Consumers and business should be engaged

  12. Developing of the protocol for electron beam food irradiation facility

    International Nuclear Information System (INIS)

    Petreska, Svetlana

    2012-01-01

    By establishing the needs for institution of new technologies in the process of food processing, in this case a randomized choice of electron beam accelerator facility, arises the need for designing a protocol for safe and secure performance of the facility. The protocol encompasses safety and security measures for protection from ionizing radiation of the individuals who work at the facility, as well as, the population and the environment in the immediate neighborhood of the facility. Thus, the adopted approach is the establishment of appropriate systems responding to the protocol. Dosimetry system, which includes appropriate procedures for accurate measure and recording of the absorbed dose values, according to the provisions for protection from ionizing radiation. Ionizing radiation protection system and providing the safety and security of the facility for food processing by means of ionizing radiation. System for providing quality and safety control of the facility for food processing by means of ionizing radiation. Pursuant to the designed a protocol for safe and secure performance of the facility for electron beam food processing, contributes to protection against ionizing radiation as occupationally exposed persons as well the population. (Author)

  13. Secret Public Key Protocols Revisited

    Science.gov (United States)

    Lim, Hoon Wei; Paterson, Kenneth G.

    Password-based protocols are important and popular means of providing human-to-machine authentication. The concept of secret public keys was proposed more than a decade ago as a means of securing password-based authentication protocols against off-line password guessing attacks, but was later found vulnerable to various attacks. In this paper, we revisit the concept and introduce the notion of identity-based secret public keys. Our new identity-based approach allows secret public keys to be constructed in a very natural way using arbitrary random strings, eliminating the structure found in, for example, RSA or ElGamal keys. We examine identity-based secret public key protocols and give informal security analyses, indicating that they are secure against off-line password guessing and other attacks.

  14. Separation of Mesenchymal Stem Cells Through a Strategic Centrifugation Protocol.

    Science.gov (United States)

    Ferlin, Kimberly M; Kaplan, David S; Fisher, John P

    2016-04-01

    Despite great promise surrounding mesenchymal stem cells (MSCs), their implementation for tissue engineering strategies remains in the development phases. Many of the concerns regarding the clinical use of MSCs originate from population heterogeneity, during both isolation and differentiation. In this study, we utilize our previously developed centrifugation cell adhesion protocol for the separation of MSCs. Our findings reveal that MSCs can be isolated from whole bone marrow using a 200 g (700 pN) centrifugal force after 24 h of culture on polystyrene with cell surface marker expression equivalent to positive controls. During differentiation, a centrifugation protocol with identical force parameters could be applied 14 days into chondrogenic differentiation to isolate differentiated chondrocytes, which exhibited increased expression of chondrogenic markers compared to controls. In summary, the use of our developed centrifugation cell adhesion protocol has proven to be an effective means to separate MSC populations, decreasing the heterogeneity of subsequent cell therapy products.

  15. Sponge-Like: A New Protocol for Preparing Bacterial Ghosts

    Science.gov (United States)

    Amara, Amro A.; Salem-Bekhit, Mounir M.; Alanazi, Fars K.

    2013-01-01

    Bacterial Ghosts (BGs) received an increasing interest in the recent years for their promising medicinal and pharmaceutical applications. In this study, for the first time we introduce a new protocol for BGs production. E. coli BL21 (DE3) pLysS (Promega) was used as a model to establish a general protocol for BGs preparation. The protocol is based on using active chemical compounds in concentrations less than the Minimum Inhibition Concentration (MIC). Those chemical compounds are SDS, NaOH, and H2O2. Plackett-Burman experimental design was used to map the best conditions for BGs production. Normal and electronic microscopes were used to evaluate the BGs quality (BGQ). Spectrophotometer was used to evaluate the amount of the released protein and DNA. Agarose gel electrophoresis was used to determine the existence of any residue of DNA after each BGs preparation. Viable cells, which existed after running this protocol, were subjected to lysis by inducing the lysozyme gene carried on pLysS plasmid. This protocol is able to produce BGs that can be used in different biotechnological applications. PMID:23576904

  16. Sponge-Like: A New Protocol for Preparing Bacterial Ghosts

    Directory of Open Access Journals (Sweden)

    Amro A. Amara

    2013-01-01

    Full Text Available Bacterial Ghosts (BGs received an increasing interest in the recent years for their promising medicinal and pharmaceutical applications. In this study, for the first time we introduce a new protocol for BGs production. E. coli BL21 (DE3 pLysS (Promega was used as a model to establish a general protocol for BGs preparation. The protocol is based on using active chemical compounds in concentrations less than the Minimum Inhibition Concentration (MIC. Those chemical compounds are SDS, NaOH, and H2O2. Plackett-Burman experimental design was used to map the best conditions for BGs production. Normal and electronic microscopes were used to evaluate the BGs quality (BGQ. Spectrophotometer was used to evaluate the amount of the released protein and DNA. Agarose gel electrophoresis was used to determine the existence of any residue of DNA after each BGs preparation. Viable cells, which existed after running this protocol, were subjected to lysis by inducing the lysozyme gene carried on pLysS plasmid. This protocol is able to produce BGs that can be used in different biotechnological applications.

  17. Sponge-like: a new protocol for preparing bacterial ghosts.

    Science.gov (United States)

    Amara, Amro A; Salem-Bekhit, Mounir M; Alanazi, Fars K

    2013-01-01

    Bacterial Ghosts (BGs) received an increasing interest in the recent years for their promising medicinal and pharmaceutical applications. In this study, for the first time we introduce a new protocol for BGs production. E. coli BL21 (DE3) pLysS (Promega) was used as a model to establish a general protocol for BGs preparation. The protocol is based on using active chemical compounds in concentrations less than the Minimum Inhibition Concentration (MIC). Those chemical compounds are SDS, NaOH, and H2O2. Plackett-Burman experimental design was used to map the best conditions for BGs production. Normal and electronic microscopes were used to evaluate the BGs quality (BGQ). Spectrophotometer was used to evaluate the amount of the released protein and DNA. Agarose gel electrophoresis was used to determine the existence of any residue of DNA after each BGs preparation. Viable cells, which existed after running this protocol, were subjected to lysis by inducing the lysozyme gene carried on pLysS plasmid. This protocol is able to produce BGs that can be used in different biotechnological applications.

  18. Using the modified Delphi method to establish a new Chinese clinical consensus of the treatments for cervical radiculopathy.

    Science.gov (United States)

    Zang, Lei; Fan, Ning; Hai, Yong; Lu, S B; Su, Q J; Yang, J C; Du, Peng; Gao, Y J

    2015-06-01

    Although cervical radiculopathy is very common, there is no standard treatment for this condition, with little high-level evidence available to guide the treatment choice. Thus, this study aimed to review the current data on the management of cervical radiculopathy; and, further, to establish a new Chinese clinical consensus of the treatments for cervical radiculopathy using the Delphi method. First, a systematic review of the previously established treatment guidelines and of articles related to cervical radiculopathy was conducted to establish a protocol for the clinical consensus of the treatment for cervical radiculopathy. Second, from February 2012 to June 2014, we performed a modified Delphi survey in which the current professional opinions from 30 experienced experts, representing almost all of the Chinese provinces, were gathered. Three rounds were performed, and consensus was defined as ≥70% agreement. Consensus of the treatments for cervical radiculopathy was reached on seven aspects, including the proportion of patients requiring only non-surgical therapies; the effectiveness of neck immobilization, physiotherapy, pharmacologic treatment; surgical indications; contraindications; surgery. The modified Delphi study conducted herein reached a consensus concerning several treatment issues for cervical radiculopathy. In the absence of high-level evidence, at present, these expert opinion findings will help guide health care providers to define the appropriate treatment in their regions. Items with no consensus provide excellent areas for future research.

  19. Establishment of Filipino standard man

    International Nuclear Information System (INIS)

    Natera, E.; San Jose, V.; Napenas, D.

    1984-01-01

    The initial data gathered on measurements of total body weight and weights of specific organs from autopsy cases of normal Filipinos are reported. Comparison of the above data with the Reference Man data of ICRP which was based primarily on Caucasians suggests some differences in the average weight and height of whole body and in the weights of some organs. Hence there appears to be a need for the establishment of Filipino standard man which can be used in the estimation of internal dose commitment of the Filipinos. (author)

  20. A well-established profession

    DEFF Research Database (Denmark)

    Braae, Ellen Marie; Hare, Richard Andrew

    2011-01-01

    It was during the economic boom of the 1960s that the demand for landscape architects began to explode in Denmark as the expanding welfare state brought about rapid physical changes. At this time the country’s first specific education for landscape architects was established and 2010 marked the 5......th anniversary of landscape architecture teaching, at the Faculty of Life Science – the University of Copenhagen(KU-Life). It’s origins can be traced further back but, then as now, the essence of the education is that of creating a dynamic synergy of the sciences and the arts....

  1. 2 CFR 225.45 - Relationship to previous issuance.

    Science.gov (United States)

    2010-01-01

    ... 2 Grants and Agreements 1 2010-01-01 2010-01-01 false Relationship to previous issuance. 225.45 Section 225.45 Grants and Agreements OFFICE OF MANAGEMENT AND BUDGET CIRCULARS AND GUIDANCE Reserved COST PRINCIPLES FOR STATE, LOCAL, AND INDIAN TRIBAL GOVERNMENTS (OMB CIRCULAR A-87) § 225.45 Relationship to...

  2. Cryptococcal meningitis in a previously healthy child | Chimowa ...

    African Journals Online (AJOL)

    An 8-year-old previously healthy female presented with a 3 weeks history of headache, neck stiffness, deafness, fever and vomiting and was diagnosed with cryptococcal meningitis. She had documented hearing loss and was referred to tertiary-level care after treatment with fluconazole did not improve her neurological ...

  3. Rapid fish stock depletion in previously unexploited seamounts: the ...

    African Journals Online (AJOL)

    Rapid fish stock depletion in previously unexploited seamounts: the case of Beryx splendens from the Sierra Leone Rise (Gulf of Guinea) ... A spectral analysis and red-noise spectra procedure (REDFIT) algorithm was used to identify the red-noise spectrum from the gaps in the observed time-series of catch per unit effort by ...

  4. Obstructive pulmonary disease in patients with previous tuberculosis ...

    African Journals Online (AJOL)

    Obstructive pulmonary disease in patients with previous tuberculosis: Pathophysiology of a community-based cohort. B.W. Allwood, R Gillespie, M Galperin-Aizenberg, M Bateman, H Olckers, L Taborda-Barata, G.L. Calligaro, Q Said-Hartley, R van Zyl-Smit, C.B. Cooper, E van Rikxoort, J Goldin, N Beyers, E.D. Bateman ...

  5. Balance and bilateral skills of selected previously disadvantaged ...

    African Journals Online (AJOL)

    Balance and bilateral skills of selected previously disadvantaged children aged 9 to 12 years. Eileen K Africa, Karel J Van Deventer. Abstract. The main aim of the study was to design an appropriate motor skills development programme that could be implemented in any primary school to improve the fundamental motor ...

  6. Outcome Of Pregnancy Following A Previous Lower Segment ...

    African Journals Online (AJOL)

    Background: A previous ceasarean section is an important variable that influences patient management in subsequent pregnancies. A trial of vaginal delivery in such patients is a feasible alternative to a secondary section, thus aiding to reduce the ceasarean section rate and its associated co-morbidities. Objective: To ...

  7. Suburethral sling procedures after previous surgery for urinary ...

    African Journals Online (AJOL)

    Objective. To compare the outcome of suburethral sling procedures (tension-free vaginal tape (TVT), obturator tape (Ob-tape)) for stress urinary incontinence (SUI) in women with previous surgery for SUI or pelvic organ prolapse (POP). Methods. A comparative, descriptive, retrospective study was done using information ...

  8. 5 CFR 532.405 - Use of highest previous rate.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Use of highest previous rate. 532.405 Section 532.405 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS... rate may be based upon a rate of pay received during a temporary promotion, so long as the temporary...

  9. 24 CFR 1710.552 - Previously accepted state filings.

    Science.gov (United States)

    2010-04-01

    ... of Substantially Equivalent State Law § 1710.552 Previously accepted state filings. (a) Materials... and contracts or agreements contain notice of purchaser's revocation rights. In addition see § 1715.15..., unless the developer is obligated to do so in the contract. (b) If any such filing becomes inactive or...

  10. 5 CFR 9701.352 - Use of highest previous rate.

    Science.gov (United States)

    2010-01-01

    ... HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Pay Administration § 9701.352 Use of... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Use of highest previous rate. 9701.352 Section 9701.352 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT...

  11. Bilateral orbital infarction and retinal detachment in a previously ...

    African Journals Online (AJOL)

    In this report, we present a case of an 11‑year‑old previously undiagnosed sickle cell disease Nigerian girl with severe acute bilateral orbital infarction and retinal detachment to highlight that hemoglobinopathy induced orbital infarction should be considered in African children with acute onset proptosis with or without ...

  12. Response to health insurance by previously uninsured rural children.

    Science.gov (United States)

    Tilford, J M; Robbins, J M; Shema, S J; Farmer, F L

    1999-08-01

    To examine the healthcare utilization and costs of previously uninsured rural children. Four years of claims data from a school-based health insurance program located in the Mississippi Delta. All children who were not Medicaid-eligible or were uninsured, were eligible for limited benefits under the program. The 1987 National Medical Expenditure Survey (NMES) was used to compare utilization of services. The study represents a natural experiment in the provision of insurance benefits to a previously uninsured population. Premiums for the claims cost were set with little or no information on expected use of services. Claims from the insurer were used to form a panel data set. Mixed model logistic and linear regressions were estimated to determine the response to insurance for several categories of health services. The use of services increased over time and approached the level of utilization in the NMES. Conditional medical expenditures also increased over time. Actuarial estimates of claims cost greatly exceeded actual claims cost. The provision of a limited medical, dental, and optical benefit package cost approximately $20-$24 per member per month in claims paid. An important uncertainty in providing health insurance to previously uninsured populations is whether a pent-up demand exists for health services. Evidence of a pent-up demand for medical services was not supported in this study of rural school-age children. States considering partnerships with private insurers to implement the State Children's Health Insurance Program could lower premium costs by assembling basic data on previously uninsured children.

  13. The effect of previous traumatic injury on homicide risk.

    Science.gov (United States)

    Griffin, Russell L; Davis, Gregory G; Levitan, Emily B; MacLennan, Paul A; Redden, David T; McGwin, Gerald

    2014-07-01

    Research has reported that a strong risk factor for traumatic injury is having a previous injury (i.e., recidivism). To date, the only study examining the relationship between recidivism and homicide reported strong associations, but was limited by possible selection bias. The current matched case-control study utilized coroner's data from 2004 to 2008. Subjects were linked to trauma registry data to determine whether the person had a previous traumatic injury. Conditional logistic regression was used to estimate odds ratios (ORs) and 95% confidence intervals (95% CIs) for the association between homicide and recidivism. Homicide risk was increased for those having a previous traumatic injury (OR 1.81, 95% CI 1.09-2.99) or a previous intentional injury (OR 2.53, 95% CI 1.24-5.17). These results suggest an association between homicide and injury recidivism, and that trauma centers may be an effective setting for screening individuals for secondary prevention efforts of homicide through violence prevention programs. © 2014 American Academy of Forensic Sciences.

  14. "Battered Women" and Previous Victimization: Is the Question Relevant?

    Science.gov (United States)

    Gudim, Laurie, Comp.; And Others

    This report discusses battered women and the role of their previous victimization. After a literature review on family violence in general, these topics are discussed: (1) family violence and the patriarchy; (2) the historical background of family violence; (3) intergenerational cycle of violence; and (4) psychological literature's four ways…

  15. Choice of contraception after previous operative delivery at a family ...

    African Journals Online (AJOL)

    Age, education, religion, parity, prior contraception, and interval from the last delivery were significantly associated with the current choice of contraception (P 0.05). Overall, when comparing the pattern among those with a previous operative delivery and those without, ...

  16. Process cells dismantling of EUREX pant: previous activities

    International Nuclear Information System (INIS)

    Gili, M.

    1998-01-01

    In the '98-'99 period some process cells of the EUREX pant will be dismantled, in order to place there the liquid wastes conditioning plant 'CORA'. This report resumes the previous activities (plant rinsing campaigns and inactive Cell 014 dismantling), run in the past three years and the drawn experience [it

  17. The job satisfaction of principals of previously disadvantaged schools

    African Journals Online (AJOL)

    The aim of this study was to identify influences on the job satisfaction of previously disadvantaged school principals in North-West Province. Evans's theory of job satisfaction, morale and motivation was useful as a conceptual framework. A mixedmethods explanatory research design was important in discovering issues with ...

  18. Previous utilization of service does not improve timely booking in ...

    African Journals Online (AJOL)

    Previous utilization of service does not improve timely booking in antenatal care: Cross sectional study on timing of antenatal care booking at public health facilities in ... Methods: A cross sectional study was conducted to collect data from 630 pregnant women who were attending antenatal care service at 10 governmental ...

  19. Research Note Effects of previous cultivation on regeneration of ...

    African Journals Online (AJOL)

    We investigated the effects of previous cultivation on regeneration potential under miombo woodlands in a resettlement area, a spatial product of Zimbabwe's land reforms. We predicted that cultivation would affect population structure, regeneration, recruitment and potential grazing capacity of rangelands. Plant attributes ...

  20. Mondor's Disease of the Breast in a Nigerian Woman Previously ...

    African Journals Online (AJOL)

    2017-09-14

    Sep 14, 2017 ... Case Report. How to cite this article: Olarinoye-Akorede SA, Silas BT. Mondor's disease of the breast in a Nigerian woman previously treated for invasive ductal carcinoma in the ... and the new creations are licensed under the identical terms. For reprints .... malignancy. Financial support and sponsorship.

  1. 44 CFR 402.5 - Forwarding commodities previously shipped.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Forwarding commodities... commodities previously shipped. Order T-1 applies to transportation on or discharge from ships documented... ship or aircraft, before the issuance of Order T-1, had transported restricted commodities manifested...

  2. The Kyoto protocol development; La viabilite du protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)

    2002-04-01

    From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)

  3. Systematic approach to establishing criticality biases

    International Nuclear Information System (INIS)

    Larson, S.L.

    1995-09-01

    A systematic approach has been developed to determine benchmark biases and apply those biases to code results to meet the requirements of DOE Order 5480.24 regarding documenting criticality safety margins. Previously, validation of the code against experimental benchmarks to prove reasonable agreement was sufficient. However, DOE Order 5480.24 requires contractors to adhere to the requirements of ANSI/ANS-8.1 and establish subcritical margins. A method was developed to incorporate biases and uncertainties from benchmark calculations into a k eff value with quantifiable uncertainty. The method produces a 95% confidence level in both the k eff value of the scenario modeled and the distribution of the k eff S calculated by the Monte Carlo code. Application of the method to a group of benchmarks modeled using the KENO-Va code and the SCALE 27 group cross sections is also presented

  4. Reoperative sentinel lymph node biopsy after previous mastectomy.

    Science.gov (United States)

    Karam, Amer; Stempel, Michelle; Cody, Hiram S; Port, Elisa R

    2008-10-01

    Sentinel lymph node (SLN) biopsy is the standard of care for axillary staging in breast cancer, but many clinical scenarios questioning the validity of SLN biopsy remain. Here we describe our experience with reoperative-SLN (re-SLN) biopsy after previous mastectomy. Review of the SLN database from September 1996 to December 2007 yielded 20 procedures done in the setting of previous mastectomy. SLN biopsy was performed using radioisotope with or without blue dye injection superior to the mastectomy incision, in the skin flap in all patients. In 17 of 20 patients (85%), re-SLN biopsy was performed for local or regional recurrence after mastectomy. Re-SLN biopsy was successful in 13 of 20 patients (65%) after previous mastectomy. Of the 13 patients, 2 had positive re-SLN, and completion axillary dissection was performed, with 1 having additional positive nodes. In the 11 patients with negative re-SLN, 2 patients underwent completion axillary dissection demonstrating additional negative nodes. One patient with a negative re-SLN experienced chest wall recurrence combined with axillary recurrence 11 months after re-SLN biopsy. All others remained free of local or axillary recurrence. Re-SLN biopsy was unsuccessful in 7 of 20 patients (35%). In three of seven patients, axillary dissection was performed, yielding positive nodes in two of the three. The remaining four of seven patients all had previous modified radical mastectomy, so underwent no additional axillary surgery. In this small series, re-SLN was successful after previous mastectomy, and this procedure may play some role when axillary staging is warranted after mastectomy.

  5. On Protocol Security in the Cryptographic Model

    DEFF Research Database (Denmark)

    Nielsen, Jesper Buus

    the channels by which they communicate. A general solution to the secure multiparty computation problem is a compiler which given any feasible function describes an efficient protocol which allows the parties to compute the function securely on their local inputs over an open network. Over the past twenty...... previous approaches to the problem. Starting from an open point-to-point network there is a long way to general secure multiparty computation. The dissertation contains contributions at several points along the way. In particular we investigate how to realize secure channels. We also show how threshold...... you as possible. This is the general problem of secure multiparty computation. The usual way of formalizing the problem is to say that a number of parties who do not trust each other wish to compute some function of their local inputs, while keeping their inputs as secret as possible and guaranteeing...

  6. Validity of the modified back-saver sit-and-reach test: a comparison with other protocols.

    Science.gov (United States)

    Hui, S S; Yuen, P Y

    2000-09-01

    Studies have shown that the classical sit-and-reach (CSR) test, the modified sit-and-reach (MSR), and the newly developed back-saver sit-and-reach (BS) test have poor criterion-related validity in estimating low-back flexibility but yielded moderate criterion-related validity in hamstring flexibility. The V sit-and-reach (VSR) test was found to be practical but the validity has not been established. The purpose of this study was to propose a modified back-saver sit-and-reach (MBS) test, which incorporated all advantages of the various protocols, and to compare the criterion-related validity and reliability of all these tests. 158 college students (F = 96, and M = 62; age = 20.77 +/- 2.51) performed CSR, VSR, BS (left and right leg), and MBS (left and right leg) tests in a randomized order. Scores from each test were then correlated with the criterion measures. For all sit-reach tests, intraclass reliability (single trial) was very high (r = 0.89-0.98). MBS yielded significant and highest r with low-back and hamstring criterion for men (r = 0.47-0.67) and women (r = 0.23-0.54). The low-back and right hamstring validity of MBS for men were significantly (P sit-and-reach protocols were significantly different (P test as compared with other protocols. The MBS test is not only a reliable test for hamstring and low-back flexibility, it is also a more practical with improved validity for hamstring and low-back flexibility in men than previous protocols.

  7. Protocol on the constipation in an oncology palliative care unit

    Directory of Open Access Journals (Sweden)

    Montserrat Cordero Ponce

    2008-07-01

    Full Text Available Constipation is a problem relatively common even in healthy people, mainly in the western world, influenced mainly by the nutritional diets and the diminution of the physical activity. It is a symptom of difficult valuation by its subjective nature and the difficulty to establish a normality pattern.The incidence is high. It is observed in a 70 - 80% of the patients in terminal situation, the 40 - 50% of the patients with disease outpost and in 90% of the patients dealing with opiate.As nurses in of a palliative care unit we detected the high number of patients which they present/display the symptom and the time that takes in its diagnose and treatment, increasing the incidence-appearance of fecal impactación and intestinal obstruction. It is one of the symptoms that worry to our patients more.We take too frequently the “rectal measures,” being more painful and a little shameful for these patients, instead of using preventive measures, precocious oral treatment and continuous evaluation of the symptom. The knowledge that these patients have of the constipation is in many deficient cases. In order to be able to educate and to take care of to the oncology terminal patient in terminal state with constipation it is essential that we know its physiopathology, causes and complications. Also we will deepen in the most suitable treatment according to the consistency, the effort that the patient must make when defecating and the symptoms that presents/displays, trying that the treatment is customized and individual, although starting off of a previous protocol of performance decided by the health professionals who are going to treat the patient.

  8. Establishment for Nuclear Equipment -Overview

    International Nuclear Information System (INIS)

    Pracz, J.

    2006-01-01

    Research and development works conducted in the Establishment for Nuclear Equipment (ZdAJ) were focused around 3 subject areas: an accelerator for cancer treatment, therapeutical tables, systems and methods for controlling objects that cross international borders. The new, medium energy accelerator for cancer therapy cases is being designed in the Establishment for several years. In 2005 progress was achieved. A physical part, containing an electron beam has been completed and the parameters of that beam make it useful for therapeutical purposes. Consequently, the work on designing and testing of beam control systems, ensuring its high stability, repetition of irradiation parameters and accuracy of dosage have been started. Results of these tests make it very probable that 2006 will be the final year of scientific works and in 2007 the new apparatus will be ready for sales. Therapeutical tables have become a leading product of ZdAJ IPJ. Their technical parameters, reliability and universality in uses are appreciated by many customers of ZdAJ. In 2005, the table Polkam 16 was registered by the national Office for Registration of Medical Equipment as the first product of ZdAJ that meets all technical and formal requirements of the safety mark CE. This allows sales of the product on the market of the European Union. The research and development part of designing a therapeutical table for uses in the total body irradiation technique was also concluded in 2005. After the September 11 terrorist attacks on WTC a matter of controlling international borders have become a priority for many countries. In 2005 in ZdAJ IPJ, we conducted many preliminary calculations and experiments analyzing systems of irradiation sources, both photon and neutron as well as systems of detection and designing of signals triggered by controlling objects crossing the border. The results so far have enabled us to formulate a research project which has been positively evaluated by experts and found

  9. Low-dose computed tomography image restoration using previous normal-dose scan

    Science.gov (United States)

    Ma, Jianhua; Huang, Jing; Feng, Qianjin; Zhang, Hua; Lu, Hongbing; Liang, Zhengrong; Chen, Wufan

    2011-01-01

    Purpose: In current computed tomography (CT) examinations, the associated x-ray radiation dose is of a significant concern to patients and operators. A simple and cost-effective means to perform the examinations is to lower the milliampere-seconds (mAs) or kVp parameter (or delivering less x-ray energy to the body) as low as reasonably achievable in data acquisition. However, lowering the mAs parameter will unavoidably increase data noise and the noise would propagate into the CT image if no adequate noise control is applied during image reconstruction. Since a normal-dose high diagnostic CT image scanned previously may be available in some clinical applications, such as CT perfusion imaging and CT angiography (CTA), this paper presents an innovative way to utilize the normal-dose scan as a priori information to induce signal restoration of the current low-dose CT image series.Methods: Unlike conventional local operations on neighboring image voxels, nonlocal means (NLM) algorithm utilizes the redundancy of information across the whole image. This paper adapts the NLM to utilize the redundancy of information in the previous normal-dose scan and further exploits ways to optimize the nonlocal weights for low-dose image restoration in the NLM framework. The resulting algorithm is called the previous normal-dose scan induced nonlocal means (ndiNLM). Because of the optimized nature of nonlocal weights calculation, the ndiNLM algorithm does not depend heavily on image registration between the current low-dose and the previous normal-dose CT scans. Furthermore, the smoothing parameter involved in the ndiNLM algorithm can be adaptively estimated based on the image noise relationship between the current low-dose and the previous normal-dose scanning protocols.Results: Qualitative and quantitative evaluations were carried out on a physical phantom as well as clinical abdominal and brain perfusion CT scans in terms of accuracy and resolution properties. The gain by the use of

  10. Previously unreported abnormalities in Wolfram Syndrome Type 2.

    Science.gov (United States)

    Akturk, Halis Kaan; Yasa, Seda

    2017-01-01

    Wolfram syndrome (WFS) is a rare autosomal recessive disease with non-autoimmune childhood onset insulin dependent diabetes and optic atrophy. WFS type 2 (WFS2) differs from WFS type 1 (WFS1) with upper intestinal ulcers, bleeding tendency and the lack ofdiabetes insipidus. Li-fespan is short due to related comorbidities. Only a few familieshave been reported with this syndrome with the CISD2 mutation. Here we report two siblings with a clinical diagnosis of WFS2, previously misdiagnosed with type 1 diabetes mellitus and diabetic retinopathy-related blindness. We report possible additional clinical and laboratory findings that have not been pre-viously reported, such as asymptomatic hypoparathyroidism, osteomalacia, growth hormone (GH) deficiency and hepatomegaly. Even though not a requirement for the diagnosis of WFS2 currently, our case series confirm hypogonadotropic hypogonadism to be also a feature of this syndrome, as reported before. © Polish Society for Pediatric Endocrinology and Diabetology.

  11. Nicotine Elicits Methamphetamine-Seeking in Rats Previously Administered Nicotine

    OpenAIRE

    Neugebauer, N. M.; Harrod, S. B.; Bardo, M. T.

    2009-01-01

    Research has indicated a high correlation between psychostimulant use and tobacco cigarette smoking in human substance abusers. The objective of the current study was to examine the effects of acute and repeated nicotine administration on responding for intravenous methamphetamine (0.03 mg/kg/infusion) in a rodent model of self-administration, as well as the potential of nicotine to induce reinstatement of previously extinguished drug-taking behavior in male Sprague-Dawley rats. In addition, ...

  12. Influence of previous knowledge in Torrance tests of creative thinking

    OpenAIRE

    Aranguren, María; Consejo Nacional de Investigaciones Científicas y Técnicas CONICET

    2015-01-01

    The aim of this work is to analyze the influence of study field, expertise and recreational activities participation in Torrance Tests of Creative Thinking (TTCT, 1974) performance. Several hypotheses were postulated to explore the possible effects of previous knowledge in TTCT verbal and TTCT figural university students’ outcomes. Participants in this study included 418 students from five study fields: Psychology;Philosophy and Literature, Music; Engineering; and Journalism and Advertisin...

  13. Previous climatic alterations are caused by the sun

    International Nuclear Information System (INIS)

    Groenaas, Sigbjoern

    2003-01-01

    The article surveys the scientific results of previous research into the contribution of the sun to climatic alterations. The author concludes that there is evidence of eight cold periods after the last ice age and that the alterations largely were due to climate effects from the sun. However, these effects are only causing a fraction of the registered global warming. It is assumed that the human activities are contributing to the rest of the greenhouse effect

  14. Event Sequence Variability in Healthy Swallowing: Building on Previous Findings

    OpenAIRE

    Molfenter, Sonja M.; Leigh, Chelsea; Steele, Catriona M.

    2014-01-01

    This study builds on previous work by Kendall, Leonard and McKenzie, which investigated event sequence variability for 12 paired-events during swallowing by healthy volunteers. They identified four event pairs, which always occurred in a stereotyped order as well as a most-common occurring overall order of events during swallowing. In the current study, we investigate overall event sequencing and the same four paired-events in a sample of swallows by healthy, young (under 45 years old) volunt...

  15. Prevalence and significance of previously undiagnosed rheumatic diseases in pregnancy.

    Science.gov (United States)

    Spinillo, Arsenio; Beneventi, Fausta; Ramoni, Véronique; Caporali, Roberto; Locatelli, Elena; Simonetta, Margherita; Cavagnoli, Chiara; Alpini, Claudia; Albonico, Giulia; Prisco, Elena; Montecucco, Carlomaurizio

    2012-06-01

    The objective of this study was to evaluate the rates of previously undiagnosed rheumatic diseases during the first trimester of pregnancy and their impact on the pregnancy outcome. Pregnant women in their first trimester were screened using a two-step approach using a self-administered 10-item questionnaire and subsequent testing for rheumatic autoantibodies (antinuclear antibody, anti-double-stranded DNA, anti-extractable nuclear antigen, anticardiolipin antibodies, anti-β2-glycoprotein I antibodies and lupus anticoagulant) and evaluation by a rheumatologist. Overall, the complications of pregnancy evaluated included fetal loss, pre-eclampsia, gestational diabetes, fetal growth restriction, delivery at less than 34 weeks, neonatal resuscitation and admission to the neonatal intensive care unit. Out of the 2458 women screened, the authors identified 62 (2.5%) women with previously undiagnosed undifferentiated connective tissue disease (UCTD) and 24 (0.98%) women with previously undiagnosed definite systemic rheumatic disease. The prevalences were seven (0.28%) for systemic lupus erythematosus and Sjogren's syndrome, six (0.24%) for rheumatoid arthritis, three (0.12%) for antiphospholipid syndrome and one (0.04%) for systemic sclerosis. In multiple exact logistic regression, after adjustment for potential confounders, the OR of overall complications of pregnancy were 2.81 (95% CI 1.29 to 6.18) in women with UCTD and 4.57 (95% CI 1.57 to 13.57) in those with definite diseases, respectively, compared with asymptomatic controls. In our population approximately 2.5% and 1% of first trimester pregnant women had a previously undiagnosed UCTD and definite systemic rheumatic disease, respectively. These conditions were associated with significant negative effects on the outcome of pregnancy.

  16. Previously infertile couples and the newborn intensive care unit.

    Science.gov (United States)

    Lind, R F; Pruitt, R L; Greenfeld, D

    1989-05-01

    Having a newborn child admitted to a newborn intensive care unit can be a traumatic experience for parents; however, parents who previously have been infertile face unique problems in coping with this situation. The authors discuss the difficulties parents must overcome in resolving their crises and in developing a good relationship with their child, or, in some cases, coming to terms with the child's death or ongoing disability. In addition, the authors offer suggestions for effective social work intervention.

  17. Antenatal diagnosis of Patau syndrome with previous anomalous baby

    OpenAIRE

    Keerthi Kocherla; Vasantha Kocherla

    2014-01-01

    Patau syndrome is the least common and most severe of the viable autosomal trisomies with median survival of fewer than 3 days was first identified as a cytogenetic syndrome in 1960. Patau syndrome is caused by an extra copy of chromosome 13. In this case report, we present antenatal imaging findings and gross foetal specimen correlation of foetus with Patau syndrome confirmed by karyotyping in third gravida who had significant previous obstetric history of gastrochisis in monochorionic and...

  18. Bundle Security Protocol for ION

    Science.gov (United States)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  19. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based...

  20. Recursive Ping-Pong Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2004-01-01

    This paper introduces a process calculus with recursion which allows us to express an unbounded number of runs of the ping-pong protocols introduced by Dolev and Yao. We study the decidability issues associated with two common approaches to checking security properties, namely reachability analysis...

  1. Affinity biosensors: techniques and protocols

    National Research Council Canada - National Science Library

    Rogers, Kim R; Mulchandani, Ashok

    1998-01-01

    ..., and government to begin or expand their biosensors research. This volume, Methods in Biotechnology vol. 7: Affinity Biosensors: Techniques and Protocols, describes a variety of classical and emerging transduction technologies that have been interfaced to bioaffinity elements (e.g., antibodies and receptors). Some of the reas...

  2. Implementation of postoperative handoff protocol

    African Journals Online (AJOL)

    Despite its importance, the practice of a structured postoperative ... the handoff protocol; limited nurse checklist to six items; added ... anticipatory guidance for the ICU team. Once the ICU team clarified any questions from the anaesthesiologist, the surgeon. (and then the theatre nursing staff) proceeded to report on the.

  3. Art. 1 Eerste Protocol EVRM

    NARCIS (Netherlands)

    Poelmann, E.

    2014-01-01

    Het recht op bezit is niet in het Europees Verdrag ter bescherming van de rechten van de mens en de fundamentele vrijheden (hierna: EVRM) neergelegd, maar in het Eerste Protocol daarbij (hierna: EP), dat in 1954 in werking is getreden. Het is van belang voor ogen te houden dat de Tweede Wereldoorlog

  4. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of...

  5. Establishment of the International Power Institute

    Energy Technology Data Exchange (ETDEWEB)

    Coles, Julius E.

    2000-04-29

    Building on the two previous trips to Central America last year, International Power Institute (IPI) and its partner Tennessee Valley Infrastructure Group (TVIG) have focused their attention this quarter on project sites in Honduras. TVIG's unit--an Integrated Infrastructure Platform or IIP--combines water and electricity production in a single integrated unit, thereby providing both products at a lower cost than could be attained for each one separately. Because of the unmet demand for clean drinking water and electricity in remote towns throughout the developing world, the need for such units is widespread. Previous visits to Honduras have resulted in strong in-country commercial interest, support in the form of memorandums of understanding by key government agencies, and identification of four prospective project sites for IIP installations. From March 5 to March 15 and with IPI support and participation, representatives from the TVIG, Tennessee Valley Authority (TVA), IPI, and market research firm International Business Initiatives (IBI) conducted an intensive survey of project opportunities in the four communities, to establish how IIPs might help these four communities enhance their economic development, A key aspect of the projects examined is the need to make them economically self-supporting so that they will be viable in the private sector. Summary of specific project site studies follow here, and feasibility studies for the four sites are included as attachments.

  6. AWRE: Atomic Weapons Research Establishment

    International Nuclear Information System (INIS)

    1983-01-01

    This reviews the work of AWRE at Aldermaston and Foulness. The main programme is nuclear and is concerned with the design and development of warheads for strategic and tactical nuclear weapons for the British nuclear deterrent, including those for the Royal Navy's missile carrying submarine fleet. The work is described grouped as design physics, development and materials. Services to these groups and to the whole establishment are provided by Engineering, Safety and Administration. The work ranges from long-term fundamental research, the development of technology, design, prototype development to the environmental testing of engineered products. In materials research the emphasis is on plutonium, uranium and beryllium, on high explosives and a wide range of inorganic and organic materials. The physics of the earth's crust is studied to aid detection of underground nuclear explosions. Reactor research facilities include the two reactors, Herald and Viper. (U.K.)

  7. Prevalence of Infraumbilical Adhesions in Women With Previous Laparoscopy

    Science.gov (United States)

    Ku, Lowell; Wong, Herb; Liu, C. Y.; Phelps, John Y.

    2007-01-01

    Background and Objectives: The aim of this study is to evaluate the prevalence of intraabdominal adhesions to the umbilicus following gynecologic laparoscopy through an umbilical incision. Methods: A retrospective review was performed of all gynecologic laparoscopic procedures in a private practice setting to identify patients with a repeat laparoscopy who had a history of a previous laparoscopy through an umbilical incision. Patients with a history of other surgeries were excluded. All repeat laparoscopies used a left upper quadrant entry technique where the abdominal cavity was surveyed for adhesions. We also reviewed adverse events attributable to the left upper quadrant entry approach. Results: We identified 151 patients who underwent a second laparoscopy and had a previous umbilical scar. Thirty-two of the 151 (21.2%) patients with a history of a laparoscopy had evidence of adhesions to the umbilical undersurface. No adverse events or injuries were attributed to the left upper quadrant entry technique. Conclusions: Adhesions to the umbilical undersurface occur in 21.2% of patients who have undergone a prior laparoscopy through an umbilical incision. For this reason, we recommend an alternate location for entry in patients with an umbilical scar from a previous laparoscopy. PMID:17651555

  8. Establishment and Characterization of a Newly Established Diabetic Gerbil Line.

    Directory of Open Access Journals (Sweden)

    Xiaohong Li

    Full Text Available We aimed to selectively breed a spontaneous diabetic gerbil when a sub-line of inbred gerbil showed increased blood glucose levels was found recently. Then we investigated the characteristics including the serum insulin, triglyceride, cholesterol, leptin, adiponectin and explored the underlying molecular mechanism for the diabetic phenotype.The spontaneous diabetic line of gerbils was selectively inbreed the sub-line of gerbil by monitoring blood glucose of each animal. The serum insulin, adiponectin, and leptin levels were tested using an ELISA kit. The expression levels of GLUT4, Akt, leptin, adiponectin, and calpain 10 (CAPN10 were tested by western blot and Quantitative Real-time PCR (qPCR in liver, skeletal muscle, and white adipose.Our results show that the percentages of animals with FPG≥5.2 (mmol/l, PG2h≥6.8 (mmol/l and both FPG≥5.2 and PG2h≥6.8 (mmol/l were increased with the number of breeding generations from F0 (21.33% to F6 (38.46%. These diabetic gerbils exhibited insulin resistance and leptin resistance as well as decreased adiponectin level in the serum. We also observed decreased expression of adiponectin and increased expression of leptin in the skeletal muscle, respectively.These results indicate that we have primarily established a spontaneous diabetic gerbil line, and the diabetic phenotypes may have been accounted for by altered expression of leptin and adiponectin.

  9. Efficient identity-based authenticated multiple key exchange protocol - doi: 10.4025/actascitechnol.v35i4.16434

    Directory of Open Access Journals (Sweden)

    Yitao Chen

    2013-10-01

    Full Text Available Authenticated multiple key exchange (AMKE protocols not only allow participants to warrant multiple session keys within one run of the protocol but also ensure the authenticity of the other party. Many AMKE protocols using bilinear pairings have been proposed. However, the relative computation cost of the pairing is approximately twenty times higher than that of the scalar multiplication over elliptic curve group. In order to improve the performance, an ID-based AMKE protocol without bilinear pairing is proposed. Since the running time is largely saved, suggested protocol is more practical than the previous related protocols for practical applications.   

  10. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    Science.gov (United States)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-03-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  11. Group covariant protocols for quantum string commitment

    International Nuclear Information System (INIS)

    Tsurumaru, Toyohiro

    2006-01-01

    We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next using this result, we prove that for every irreducible representation of a finite group, there always exists a corresponding nontrivial QSC protocol which reaches a level of security impossible to achieve classically

  12. Cross-layer protocol design for QoS optimization in real-time wireless sensor networks

    Science.gov (United States)

    Hortos, William S.

    2010-04-01

    The metrics of quality of service (QoS) for each sensor type in a wireless sensor network can be associated with metrics for multimedia that describe the quality of fused information, e.g., throughput, delay, jitter, packet error rate, information correlation, etc. These QoS metrics are typically set at the highest, or application, layer of the protocol stack to ensure that performance requirements for each type of sensor data are satisfied. Application-layer metrics, in turn, depend on the support of the lower protocol layers: session, transport, network, data link (MAC), and physical. The dependencies of the QoS metrics on the performance of the higher layers of the Open System Interconnection (OSI) reference model of the WSN protocol, together with that of the lower three layers, are the basis for a comprehensive approach to QoS optimization for multiple sensor types in a general WSN model. The cross-layer design accounts for the distributed power consumption along energy-constrained routes and their constituent nodes. Following the author's previous work, the cross-layer interactions in the WSN protocol are represented by a set of concatenated protocol parameters and enabling resource levels. The "best" cross-layer designs to achieve optimal QoS are established by applying the general theory of martingale representations to the parameterized multivariate point processes (MVPPs) for discrete random events occurring in the WSN. Adaptive control of network behavior through the cross-layer design is realized through the parametric factorization of the stochastic conditional rates of the MVPPs. The cross-layer protocol parameters for optimal QoS are determined in terms of solutions to stochastic dynamic programming conditions derived from models of transient flows for heterogeneous sensor data and aggregate information over a finite time horizon. Markov state processes, embedded within the complex combinatorial history of WSN events, are more computationally

  13. Suicide Risk Protocols: Addressing the Needs of High Risk Youths Identified through Suicide Prevention Efforts and in Clinical Settings

    Science.gov (United States)

    Heilbron, Nicole; Goldston, David; Walrath, Christine; Rodi, Michael; McKeon, Richard

    2013-01-01

    Several agencies have emphasized the importance of establishing clear protocols or procedures to address the needs of youths who are identified as suicidal through suicide prevention programs or in emergency department settings. What constitutes optimal guidelines for developing and implementing such protocols, however, is unclear. At the request…

  14. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  15. The feasibility of a second lumpectomy and breast brachytherapy for localized cancer in a breast previously treated with lumpectomy and radiation therapy for breast cancer.

    Science.gov (United States)

    Chadha, Manjeet; Feldman, Sheldon; Boolbol, Susan; Wang, Lin; Harrison, Louis B

    2008-01-01

    With accumulating evidence supporting partial-breast irradiation, we conducted a Phase I/II study to evaluate the role of a second conservative surgery and brachytherapy for patients presenting with a local recurrence/new primary in a breast who has previously undergone a lumpectomy and external radiation therapy for breast cancer. Fifteen patients with a localized lesion in the breast have undergone a second lumpectomy and received low-dose-rate brachytherapy on protocol. The first 6 patients received a dose of 30Gy. With no unacceptable acute toxicity observed, the brachytherapy dose was increased to 45Gy. Three patients received adjuvant chemotherapy and 8 patients are on antiestrogen therapy. The median time interval between the primary breast cancer diagnosis and the second cancer event in the ipsilateral breast is 94 months (range, 28-211). With a median followup of 36 months after brachytherapy, the 3-year Kaplan-Meier overall survival, local disease-free survival and mastectomy-free survival are 100% and 89%, respectively. There was no Grade 3/4 fibrosis or necrosis observed. All patients had baseline asymmetry due to the breast volume deficit from the second lumpectomy. With breast asymmetry as a given, the cosmetic result observed in all patients has been good to excellent. Early results suggest low-complication rates, high rate of local control and freedom from mastectomy. Additional studies are needed to establish whether a second lumpectomy and breast brachytherapy are an acceptable alternative to mastectomy for patients presenting with a localized cancer in a previously irradiated breast.

  16. Optimization of hydraulic machinery by exploiting previous successful designs

    Energy Technology Data Exchange (ETDEWEB)

    Kyriacou, S A; Giannakoglou, K C [National Technical University of Athens, Parallel CFD and Optimization Unit, PO Box 64069, Athens 15710 (Greece); Weissenberger, S; Grafenberger, P, E-mail: stelios.Kyriacou@gmail.co [Andritz HYDRO, RD, Lunzerstrasse 78, 4031 Linz (Austria)

    2010-08-15

    A design-optimization method for hydraulic machinery is proposed. Optimal designs are obtained using the appropriate CFD evaluation software driven by an evolutionary algorithm which is also assisted by artificial neural networks used as surrogate evaluation models or metamodels. As shown in a previous IAHR paper by the same authors, such an optimization method substantially reduces the CPU cost, since the metamodels can discard numerous non-promising candidate solutions generated during the evolution, at almost negligible CPU cost, without evaluating them by means of the costly CFD tool. The present paper extends the optimization method of the previous paper by making it capable to accommodate and exploit pieces of useful information archived during previous relevant successful designs. So, instead of parameterizing the geometry of the hydraulic machine components, which inevitably leads to many design variables, enough to slow down the design procedure, in the proposed method all new designs are expressed as weighted combinations of the archived ones. The archived designs act as the design space bases. The role of the optimization algorithms is to find the set (or sets, for more than one objectives, where the Pareto front of non-dominated solutions is sought) of weight values, corresponding to the hydraulic machine configuration(s) with optimal performance. Since the number of weights is much less that the number of design variables of the conventional shape parameterization, the design space dimension reduces and the CPU cost of the metamodel-assisted evolutionary algorithm is much lower. The design of a Francis runner is used to demonstrate the capabilities of the proposed method.

  17. Treatment of pediatric patients and young adults with particle therapy at the Heidelberg Ion Therapy Center (HIT): establishment of workflow and initial clinical data

    International Nuclear Information System (INIS)

    Combs, Stephanie E; Witt, Olaf; Jäkel, Oliver; Kulozik, Andreas E; Debus, Jürgen; Kessel, Kerstin A; Herfarth, Klaus; Jensen, Alexandra; Oertel, Susanne; Blattmann, Claudia; Ecker, Swantje; Hoess, Angelika; Martin, Eike

    2012-01-01

    To report on establishment of workflow and clinical results of particle therapy at the Heidelberg Ion Therapy Center. We treated 36 pediatric patients (aged 21 or younger) with particle therapy at HIT. Median age was 12 years (range 2-21 years), five patients (14%) were younger than 5 years of age. Indications included pilocytic astrocytoma, parameningeal and orbital rhabdomyosarcoma, skull base and cervical chordoma, osteosarcoma and adenoid-cystic carcinoma (ACC), as well as one patient with an angiofibroma of the nasopharynx. For the treatment of small children, an anesthesia unit at HIT was established in cooperation with the Department of Anesthesiology. Treatment concepts depended on tumor type, staging, age of the patient, as well as availability of specific study protocols. In all patients, particle radiotherapy was well tolerated and no interruptions due to toxicity had to be undertaken. During follow-up, only mild toxicites were observed. Only one patient died of tumor progression: Carbon ion radiotherapy was performed as an individual treatment approach in a child with a skull base recurrence of the previously irradiated rhabdomyosarcoma. Besides this patient, tumor recurrence was observed in two additional patients. Clinical protocols have been generated to evaluate the real potential of particle therapy, also with respect to carbon ions in distinct pediatric patient populations. The strong cooperation between the pediatric department and the department of radiation oncology enable an interdisciplinary treatment and stream-lined workflow and acceptance of the treatment for the patients and their parents

  18. Haemophilus influenzae type f meningitis in a previously healthy boy

    DEFF Research Database (Denmark)

    Ronit, Andreas; Berg, Ronan M G; Bruunsgaard, Helle

    2013-01-01

    Non-serotype b strains of Haemophilus influenzae are extremely rare causes of acute bacterial meningitis in immunocompetent individuals. We report a case of acute bacterial meningitis in a 14-year-old boy, who was previously healthy and had been immunised against H influenzae serotype b (Hib......). The causative pathogen was identified as H influenzae serotype f (Hif), and was successfully treated with ceftriaxone. An immunological evaluation revealed transient low levels of immunoglobulins but no apparent immunodeficiency was found 2 years after the clinical insult....

  19. The long-term consequences of previous hyperthyroidism

    DEFF Research Database (Denmark)

    Hjelm Brandt Kristensen, Frans

    2015-01-01

    vascular state. While it is biologically plausible that these changes may induce long-term consequences, the insight into morbidity as well as mortality in patients with previous hyperthyroidism is limited. The reasons for this are a combination of inadequately powered studies, varying definitions......,400 non-hyperthyroid control individuals (matched for age and sex), all identified from a random 5% sample of the Danish background population (n=339,481). In the second study population, 625 same-sex twin pairs, discordant for hyperthyroidism, were included. For each individual, the degree of co...

  20. Cutaneous protothecosis in a patient with previously undiagnosed HIV infection.

    Science.gov (United States)

    Fong, Kenneth; Tee, Shang-Ian; Ho, Madeline S L; Pan, Jiun Yit

    2015-08-01

    Protothecosis is an uncommon condition resulting from infection by achlorophyllous algae of the Prototheca species. Immunocompromised individuals are generally most susceptible to protothecal infection and tend to develop severe and disseminated disease. However, the association between protothecosis and HIV-induced immunosuppression is not clear, with only a handful of cases having been described to date. Here we report a case of cutaneous protothecosis in a Chinese man with previously undiagnosed HIV infection that responded well to oral itraconazole. © 2014 The Australasian College of Dermatologists.

  1. HEART TRANSPLANTATION IN PATIENTS WITH PREVIOUS OPEN HEART SURGERY

    Directory of Open Access Journals (Sweden)

    R. Sh. Saitgareev

    2016-01-01

    Full Text Available Heart Transplantation (HTx to date remains the most effective and radical method of treatment of patients with end-stage heart failure. The defi cit of donor hearts is forcing to resort increasingly to the use of different longterm mechanical circulatory support systems, including as a «bridge» to the follow-up HTx. According to the ISHLT Registry the number of recipients underwent cardiopulmonary bypass surgery increased from 40% in the period from 2004 to 2008 to 49.6% for the period from 2009 to 2015. HTx performed in repeated patients, on the one hand, involves considerable technical diffi culties and high risks; on the other hand, there is often no alternative medical intervention to HTx, and if not dictated by absolute contradictions the denial of the surgery is equivalent to 100% mortality. This review summarizes the results of a number of published studies aimed at understanding the immediate and late results of HTx in patients, previously underwent open heart surgery. The effect of resternotomy during HTx and that of the specifi c features associated with its implementation in recipients previously operated on open heart, and its effects on the immediate and long-term survival were considered in this review. Results of studies analyzing the risk factors for perioperative complications in repeated recipients were also demonstrated. Separately, HTx risks after implantation of prolonged mechanical circulatory support systems were examined. The literature does not allow to clearly defi ning the impact factor of earlier performed open heart surgery on the course of perioperative period and on the prognosis of survival in recipients who underwent HTx. On the other hand, subject to the regular fl ow of HTx and the perioperative period the risks in this clinical situation are justifi ed as a long-term prognosis of recipients previously conducted open heart surgery and are comparable to those of patients who underwent primary HTx. Studies

  2. Is the prefrontal cortex necessary for establishing cognitive sets?

    DEFF Research Database (Denmark)

    Rowe, James B; Sakai, Katsuyuki; Lund, Torben E

    2007-01-01

    first instructed as to whether to perform a spatial or a verbal working memory task and then given spatial and verbal items after a delay of 4-12 s. The patients showed an increase in switch costs, making more errors by repeating what they had done on the previous trial. They were able to establish...

  3. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  4. Petten establishment. Annual report 1978

    International Nuclear Information System (INIS)

    1979-01-01

    1978 was the second year in the Joint Research Centre's 1977-1980 multiannual research programme. Since the following exercise is intended to run from 1980 to 1983 with a one year overlap, new proposals will be placed before the Council of Ministers in 1979. To this end, a considerable part of the programme and project management staff activities has been devoted to the peliminary preparation of future plans. In general it is expected that the Establishment's three research activities will continue along the lines already proceeding successfully in the present programme in the materials testing reactor (HFR), high temperature materials and organic chemistry spheres with some updating and refocussing where necessary. Consultation with the appropriate Advisory Committees for Programme Management has been contributed to these processes. Another important development has been the question of site security, following decisions of the European Commission and the Dutch Government to apply International Atomic Agency regulations. The work to apply the necessary measures has had to be executed in the shortest possible time. We have endeavoured to maintain and increase for all three programmes the already intensive contacts with research institutes and industry in the Member States. Important in this connection are the international conferences, 'Alloy 800' held in March and 'Ramping and Load following Behaviour of Reactor Fuel' in December, as well as an international meeting of the 'irradiation Devices Working Party' which took place in May

  5. On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2014-01-01

    Full Text Available Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010: (1 the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2 the protocol cannot protect clients’ passwords against an offline dictionary attack; and (3 the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  6. Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources.

    Science.gov (United States)

    Song, Ting-Ting; Qin, Su-Juan; Wen, Qiao-Yan; Wang, Yu-Kun; Jia, Heng-Yue

    2015-10-16

    In quantum communication, passive decoy-state QKD protocols can eliminate many side channels, but the protocols without any finite-key analyses are not suitable for in practice. The finite-key securities of passive decoy-state (PDS) QKD protocols with two different unstable sources, type-II parametric down-convention (PDC) and phase randomized weak coherent pulses (WCPs), are analyzed in our paper. According to the PDS QKD protocols, we establish an optimizing programming respectively and obtain the lower bounds of finite-key rates. Under some reasonable values of quantum setup parameters, the lower bounds of finite-key rates are simulated. The simulation results show that at different transmission distances, the affections of different fluctuations on key rates are different. Moreover, the PDS QKD protocol with an unstable PDC source can resist more intensity fluctuations and more statistical fluctuation.

  7. Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources

    Science.gov (United States)

    Song, Ting-Ting; Qin, Su-Juan; Wen, Qiao-Yan; Wang, Yu-Kun; Jia, Heng-Yue

    2015-01-01

    In quantum communication, passive decoy-state QKD protocols can eliminate many side channels, but the protocols without any finite-key analyses are not suitable for in practice. The finite-key securities of passive decoy-state (PDS) QKD protocols with two different unstable sources, type-II parametric down-convention (PDC) and phase randomized weak coherent pulses (WCPs), are analyzed in our paper. According to the PDS QKD protocols, we establish an optimizing programming respectively and obtain the lower bounds of finite-key rates. Under some reasonable values of quantum setup parameters, the lower bounds of finite-key rates are simulated. The simulation results show that at different transmission distances, the affections of different fluctuations on key rates are different. Moreover, the PDS QKD protocol with an unstable PDC source can resist more intensity fluctuations and more statistical fluctuation. PMID:26471947

  8. Relationship of deer and moose populations to previous winters' snow

    Science.gov (United States)

    Mech, L.D.; McRoberts, R.E.; Peterson, R.O.; Page, R.E.

    1987-01-01

    (1) Linear regression was used to relate snow accumulation during single and consecutive winters with white-tailed deer (Odocoileus virginianus) fawn:doe ratios, mosse (Alces alces) twinning rates and calf:cow ratios, and annual changes in deer and moose populations. Significant relationships were found between snow accumulation during individual winters and these dependent variables during the following year. However, the strongest relationships were between the dependent variables and the sums of the snow accumulations over the previous three winters. The percentage of the variability explained was 36 to 51. (2) Significant relationships were also found between winter vulnerability of moose calves and the sum of the snow accumulations in the current, and up to seven previous, winters, with about 49% of the variability explained. (3) No relationship was found between wolf numbers and the above dependent variables. (4) These relationships imply that winter influences on maternal nutrition can accumulate for several years and that this cumulative effect strongly determines fecundity and/or calf and fawn survivability. Although wolf (Canis lupus L.) predation is the main direct mortality agent on fawns and calves, wolf density itself appears to be secondary to winter weather in influencing the deer and moose populations.

  9. Incidence of Acneform Lesions in Previously Chemically Damaged Persons-2004

    Directory of Open Access Journals (Sweden)

    N Dabiri

    2008-04-01

    Full Text Available ABSTRACT: Introduction & Objective: Chemical gas weapons especially nitrogen mustard which was used in Iraq-Iran war against Iranian troops have several harmful effects on skin. Some other chemical agents also can cause acne form lesions on skin. The purpose of this study was to compare the incidence of acneform in previously chemically damaged soldiers and non chemically damaged persons. Materials & Methods: In this descriptive and analytical study, 180 chemically damaged soldiers, who have been referred to dermatology clinic between 2000 – 2004, and forty non-chemically damaged people, were chosen randomly and examined for acneform lesions. SPSS software was used for statistic analysis of the data. Results: The mean age of the experimental group was 37.5 ± 5.2 and that of the control group was 38.7 ± 5.9 years. The mean percentage of chemical damage in cases was 31 percent and the time after the chemical damage was 15.2 ± 1.1 years. Ninety seven cases (53.9 percent of the subjects and 19 people (47.5 percent of the control group had some degree of acne. No significant correlation was found in incidence, degree of lesions, site of lesions and age of subjects between two groups. No significant correlation was noted between percentage of chemical damage and incidence and degree of lesions in case group. Conclusion: Incidence of acneform lesions among previously chemically injured peoples was not higher than the normal cases.

  10. Intravitreal ranibizumab for diabetic macular oedema in previously vitrectomized eyes

    DEFF Research Database (Denmark)

    Laugesen, Caroline Schmidt; Ostri, Christoffer; Brynskov, Troels

    2017-01-01

    PURPOSE: There is little information about the efficacy of intravitreal vascular endothelial growth factor (VEGF) inhibition in vitrectomized eyes. This study aimed to evaluate the efficacy of anti-VEGF (ranibizumab) on diabetic macular oedema in previously vitrectomized eyes. METHODS: A nationwide...... retrospective review of medical records from 2010 to 2013. RESULTS: We identified 33 previously vitrectomized eyes in 28 patients treated with ranibizumab injections for diabetic macular oedema. Median follow-up was 323 days (interquartile range 72-1404 days). Baseline mean visual acuity was 0.57 logMAR (95% CI...... 0.13-1.01) before injections. After an average of 4.7 injections (range 1-15), mean visual acuity remained stable at 0.54 logMAR (95% CI 0.13-0.95) with a mean improvement of 0.03 (p = 0. 45, 95% CI -0.12 to 0.06). In 12 eyes (36%), visual acuity improved 0.1 logMAR or more, in 12 eyes (36%), vision...

  11. Kidnapping Detection and Recognition in Previous Unknown Environment

    Directory of Open Access Journals (Sweden)

    Yang Tian

    2017-01-01

    Full Text Available An unaware event referred to as kidnapping makes the estimation result of localization incorrect. In a previous unknown environment, incorrect localization result causes incorrect mapping result in Simultaneous Localization and Mapping (SLAM by kidnapping. In this situation, the explored area and unexplored area are divided to make the kidnapping recovery difficult. To provide sufficient information on kidnapping, a framework to judge whether kidnapping has occurred and to identify the type of kidnapping with filter-based SLAM is proposed. The framework is called double kidnapping detection and recognition (DKDR by performing two checks before and after the “update” process with different metrics in real time. To explain one of the principles of DKDR, we describe a property of filter-based SLAM that corrects the mapping result of the environment using the current observations after the “update” process. Two classical filter-based SLAM algorithms, Extend Kalman Filter (EKF SLAM and Particle Filter (PF SLAM, are modified to show that DKDR can be simply and widely applied in existing filter-based SLAM algorithms. Furthermore, a technique to determine the adapted thresholds of metrics in real time without previous data is presented. Both simulated and experimental results demonstrate the validity and accuracy of the proposed method.

  12. Efforts to promote vaginal delivery after a previous cesarean section.

    Science.gov (United States)

    Hamai, Yoko; Imanishi, Yukio

    2012-01-01

    The aim of this study was to examine the results of vaginal delivery in patients with a past history of cesarean section. The type of delivery, interventions during delivery, and the prognoses of the mothers and babies were examined in 145 women with a history of cesarean section over the 10-year period from January 2000 to December 2009. A scheduled cesarean section was performed in 27 cases. Vaginal delivery was recommended in 118 cases and the success rate was 94.9% (112/118). Uterine rupture was observed in one patient who experienced a natural rupture at home and whose previous cesarean section was an inverse T incision. No cases required a blood transfusion or hysterectomy. The prognoses of both mothers and babies were good and the vaginal delivery success rate was 94.9%. Uterine rupture was observed in one case. Vaginal delivery with previous cesarean section should be considered in cases with expectation and informed consent. © 2011 The Authors. Journal of Obstetrics and Gynaecology Research © 2011 Japan Society of Obstetrics and Gynecology.

  13. A Lightweight Continuous Authentication Protocol for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Yo-Hsuan Chuang

    2018-04-01

    Full Text Available Modern societies are moving toward an information-oriented environment. To gather and utilize information around people’s modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs. Within this kind of Internet of Things (IoT environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.

  14. A Lightweight Continuous Authentication Protocol for the Internet of Things.

    Science.gov (United States)

    Chuang, Yo-Hsuan; Lo, Nai-Wei; Yang, Cheng-Ying; Tang, Ssu-Wei

    2018-04-05

    Modern societies are moving toward an information-oriented environment. To gather and utilize information around people's modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.

  15. Tooth extractions in intravenous bisphosphonate-treated patients: a refined protocol.

    Science.gov (United States)

    Scoletta, Matteo; Arata, Valentina; Arduino, Paolo G; Lerda, Ennio; Chiecchio, Andrea; Gallesio, Giorgia; Scully, Crispian; Mozzati, Marco

    2013-06-01

    The aim of this prospective hospital-based study was to refine a surgical protocol for tooth extractions in patients with a history of intravenous use of a potent bisphosphonate by modifying a previously reported protocol to produce a significantly shortened operating time. Prospective patients with a follow-up of at least 4 months were included. Tooth extractions were performed without a vestibular split-thickness flap; healing was stimulated by filling the extraction site with autologous plasma rich in growth factors (PRGF System, BTI Biotechnology Institute, Vitoria, Spain). Local and systemic infection control was obtained with dental hygiene and antibiotic therapy. Sixty-three patients participated in the study. Two hundred two tooth extractions were performed. Differences between the present and previous protocols (the previous protocol used a vestibular flap) were analyzed and the surgical time proved significantly shorter for the present approach (P = .00). The proposed surgical protocol appears to be a better choice for patients treated with intravenous bisphosphonates who need tooth extraction, because it seems to be faster and simpler than the previously reported successful protocol. Copyright © 2013 American Association of Oral and Maxillofacial Surgeons. Published by Elsevier Inc. All rights reserved.

  16. Secure Multi-Player Protocols

    DEFF Research Database (Denmark)

    Fehr, Serge

    While classically cryptography is concerned with the problem of private communication among two entities, say players, in modern cryptography multi-player protocols play an important role. And among these, it is probably fair to say that secret sharing, and its stronger version verifiable secret......, MPC can be based on arbitrary finite rings. This is in sharp contrast to the literature where essentially all MPC protocols require a much stronger mathematical structure, namely a field. Apart from its theoretical value, this can lead to efficiency improvements since it allows a greater freedom...... of all known schemes follows as corollaries whose proofs are pure linear algebra arguments, in contrast to some hybrid arguments used in the literature. (4) We construct a new unconditionally secure VSS scheme with minimized reconstruction complexity in the setting of a dishonest minority. This improves...

  17. From protocol to published report

    DEFF Research Database (Denmark)

    Berendt, Louise; Callréus, Torbjörn; Petersen, Lene Grejs

    2016-01-01

    ), primary objective, primary endpoint, and--for confirmatory trials only--hypothesis and sample size calculation. We used logistic regression, χ(2), and Fisher's exact test. RESULTS: A total of 282 applications of academic clinical drug trials were submitted to the Danish Health and Medicines Authority......BACKGROUND: Unacknowledged inconsistencies in the reporting of clinical trials undermine the validity of the results of the trials. Little is known about inconsistency in the reporting of academic clinical drug trials. Therefore, we investigated the prevalence of consistency between protocols...... and published reports of academic clinical drug trials. METHODS: A comparison was made between study protocols and their corresponding published reports. We assessed the overall consistency, which was defined as the absence of discrepancy regarding study type (categorized as either exploratory or confirmatory...

  18. Enterprise Considerations for Ports and Protocols

    Science.gov (United States)

    2016-10-21

    Internet and similar networks . The Internet model is commonly known as TCP/IP, because of its most important protocols, the Transmission Control...according to the scope of the networking involved. IETF documents RFC 1122 [25] and RFC 1123 [26] describe the Internet Protocol suite and model ...An alternative model , the Open Systems Interconnection ( OSI ) model [27], is often used to describe protocols. The OSI model defines protocols in

  19. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...... trying to circumvent the intended steps. The results of our analysis confirm the effectiveness of the cryptofraglets framework for the model and analysis of security properties and eventually show its potential to identify and uncover protocol flaws....

  20. Approaches to Formal Verification of Security Protocols

    OpenAIRE

    Lal, Suvansh; Jain, Mohit; Chaplot, Vikrant

    2011-01-01

    In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional correctness before they are used in practice. Application of formal methods for verification of security protocols would enhance their reliability thereby, increasing the usability of systems that employ them. Thus, formal verification of security protocols has become a key issue in computer and communications security. In...

  1. Quantum bit commitment protocol without quantum memory

    OpenAIRE

    Ramos, Rubens Viana; Mendonca, Fabio Alencar

    2008-01-01

    Quantum protocols for bit commitment have been proposed and it is largely accepted that unconditionally secure quantum bit commitment is not possible; however, it can be more secure than classical bit commitment. In despite of its usefulness, quantum bit commitment protocols have not been experimentally implemented. The main reason is the fact that all proposed quantum bit commitment protocols require quantum memory. In this work, we show a quantum bit commitment protocol that does not requir...

  2. A lower-cost protocol for sickle cell disease neonatal screening in Tunisia.

    Science.gov (United States)

    Hajer, Siala; Neila, Taboubi; Sondess, Hadj Fradj; Fekria, Ouenniche; Nabila, Aoun; Mahbouba, Khedhri; Melika, Douiri; Faida, Ouali; Amina, Bibi; Raja, Belhadj; Hedi, Rezigua; Sadok, Meriah; Naima, Krouf; Slaheddine, Fattoum; Taieb, Messaoud

    2012-01-01

    Sickle cell disease (SCD) is a group of hereditary chronic anemias that manifest essentially as painful crisis and susceptibility to infection. Neonatal screening is a preventive action that reduces the rates of mortality due to complications arising from infections by encouraging early prophylactic penicillin use and pneumococcal vaccination. The purpose of this pilot study was to set up a neonatal screening protocol at a lower cost than one that uses commercially available screening kits. Pilot study conducted over 1 year in two Tunis maternity hospitals. Samples from 9148 newborns were collected using paper printed using a common office printer to collect blood spots from the newborns. A lab-prepared agarose gel for isoelectrofocusing (IEF) was used to test the dried blood samples from these newborns. The IEF on lab-prepared agarose gels was efficient since it was able to detect the main abnormal Hbs previously identified in the Tunisian population (HbS, HbC, HbO, and HbG). Furthermore, when data collected in this screening program were compared with the previously established national data, no statistically significant differences were found. After analysis, results were given back to the families of the patients, and the major Hb cases were directed to one of the hemoglobinopathies specialized centers, where at-risk couples benefited from genetic counselling and were informed about the possibility of prenatal diagnosis. This pilot experiment demonstrated the feasibility of SCD neonatal detection using a lower cost method as well as detection of other main structural Hb variants.

  3. Oral breathing: new early treatment protocol

    Directory of Open Access Journals (Sweden)

    Gloria Denotti

    2014-01-01

    Full Text Available Oral breathing is a respiratory dysfunction that affects approximately 10-15% of child population. It is responsable of local effects and systemic effects, both immediate and long-term. They affect the growth of the subject and his physical health in many ways: pediatric, psycho-behavioral and cognitive. The etiology is multifactorial. It’s important the establishment of a vicious circle involving more areas and it is essential to stop it as soon as possible. In order to correct this anomaly, the pediatric dentist must be able to make a correct diagnosis to treat early the disfunction and to avoid the onset of cascade mechanisms. Who plays a central role is the pediatrician who first and frequently come into contact with little patients. He can identify the anomalies, and therefore collaborate with other specialists, including the dentist. The key aspect that guides us in the diagnosis, and allows us to identify the oral respirator, is the “adenoid facies”. The purpose of the study is to highlight the importance and benefits of an early and multidisciplinary intervention (pediatric, orthopedic-orthodontic-functional. A sample of 20 patients was selected with the following inclusion criteria: mouth breathing, transverse discrepancy > 4 mm, early mixed dentition, central and lateral permenent incisors, overjet increased, lip and nasal incompetence, snoring and/or sleep apnea episodes. The protocol of intervention includes the use of the following devices and procedures: a maxillary rapid expander (to correct the transverse discrepancy, to increase the amplitude of the upper respiratory airway and to reduce nasal resistances tract in association with myo-functional devices (nasal stimulator and oral obturator. They allow the reconstruction of a physiological balance between the perioral musculature and tongue, the acquisition of nasal and lips competence and the reduction of overjet. This protocol speeds up and stabilizes the results. The

  4. Feasible quantum communication complexity protocol

    International Nuclear Information System (INIS)

    Galvao, Ernesto F.

    2002-01-01

    I show that a simple multiparty communication task can be performed more efficiently with quantum communication than with classical communication, even with low detection efficiency η. The task is a communication complexity problem in which distant parties need to compute a function of the distributed inputs, while minimizing the amount of communication between them. A realistic quantum optical setup is suggested that can demonstrate a five-party quantum protocol with higher-than-classical performance, provided η>0.33

  5. Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, Robert [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht, Cheryn [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  6. Petri Nets in Cryptographic Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Winskel, Glynn

    2001-01-01

    A process language for security protocols is presented together with a semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. By means of an example we illustrate...... how the Petri-net semantics can be used to prove security properties....

  7. Heuristic Methods for Security Protocols

    Directory of Open Access Journals (Sweden)

    Qurat ul Ain Nizamani

    2009-10-01

    Full Text Available Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security property-dependent heuristic. The heuristic weights the state space by exploiting the security formulae; the weights may then be used to explore the state space when searching for attacks.

  8. Cost estimation of Kyoto Protocol

    International Nuclear Information System (INIS)

    Di Giulio, Enzo

    2005-01-01

    This article proposes a reflection on important aspects in the costs determination performance of Kyoto Protocol. The evaluation of the main models evidence possible impacts on the economies. A key role in the determination of the cost is represented by the relative hypothesis to emission trading and the projects CDM-JI and from the political capacity at the cost negative or equal to zero [it

  9. Behavior Protocols for Software Components

    Czech Academy of Sciences Publication Activity Database

    Plášil, František; Višňovský, Stanislav

    2002-01-01

    Roč. 28, č. 11 (2002), s. 1056-1076 ISSN 0098-5589 R&D Projects: GA AV ČR IAA2030902; GA ČR GA201/99/0244 Grant - others:Eureka(XE) Pepita project no.2033 Institutional research plan: AV0Z1030915 Keywords : behavior protocols * component-based programming * software architecture Subject RIV: JC - Computer Hardware ; Software Impact factor: 1.170, year: 2002

  10. Ecthyma gangrenosum in the periorbital region in a previously healthy immunocompetent woman without bacteremia

    Directory of Open Access Journals (Sweden)

    Somenath Sarkar

    2016-01-01

    Full Text Available Ecthyma gangrenosum (EG is a cutaneous lesion classically associated with potentially fatal Pseudomonas septicemia in immunocompromised patients. Other bacterial and fungal pathogens have also been implicated. Although EG typically occurs in immunocompromised or neutropenic patients, it may occasionally affect a previously healthy person. The cutaneous findings are characteristic with small indurated papulovesicles progressing rapidly to necrotic ulcers with surrounding erythema and a central black Eschar. While lesions can occur at any site, most are commonly found over the buttocks, perineum, limbs, and axillae. We describe a case of EG in periorbital region in a previously healthy woman who responded to appropriate antibiotic treatment for Pseudomonas. It is very important to establish the diagnosis early so that appropriate systemic antibiotic therapy can be initiated to reduce morbidity and potential mortality.

  11. A New Laser Preheat Protocol For Maglif

    Science.gov (United States)

    Weis, M. R.; Harvey-Thompson, A. J.; Geissel, M.; Jennings, C. A.; Peterson, K. J.; Glinsky, M. E.; Awe, T. J.; Bliss, D. E.; Gomez, M. R.; Harding, E. C.; Hansen, S. B.; Kimmel, M. W.; Knapp, P. F.; Lewis, S. M.; Porter, J. L.; Rochau, G. A.; Schollmeier, M.; Schwarz, J.; Shores, J. E.; Slutz, S. A.; Sinars, D. B.; Smith, I. C.; Speas, C. S.

    2017-10-01

    Previous Magnetized Liner Inertial Fusion experiments at Sandia National Labs have preheated the fuel with the unsmoothed 2 ω Z-Beamlet Laser. A new low intensity laser configuration, using phase plate smoothing and a low-power pulse shape, improved laser propagation and reduced stimulated Brillouin scattering in offline laser experiments. This allows for more efficient use of laser energy and better spot reproducibility. The new laser protocol is estimated to couple at least 650 J to the fuel, sufficient to produce comparable neutron yields with the previous unsmoothed configuration. Mid-Z dopants were also fielded on the underside of the window. Observation of these dopants provided evidence of window material mixing into the fuel with both the unsmoothed and smoothed beam, consistent with MHD simulation predictions. Sandia National Laboratories is a multi-mission laboratory managed and operated by NTESS, LLC, a wholly owned subsidiary of Honeywell International, Inc., for the U.S. DOE's NNSA under contract DE-NA0003525.

  12. Incidence of previously undetected disease in routine paediatric otolaryngology admissions.

    Science.gov (United States)

    Zeitoun, H; Robinson, P

    1996-06-01

    The process of clerking routine pre-operative admissions involves the house officer taking a full medical history and performing a full physical examination. The diagnostic yield is thought to be low, and the educational value to the house officer is also small. This study addresses the question as to whether routine physical examination is always indicated. One hundred and nine children admitted for routine Otolaryngology procedures were prospectively studied to identify the importance of examination in the pre-operative assessment of patients. The results showed that 51 per cent of the children admitted had risk factors. The medical history was sufficient to identify these risk factors in all patients with the exception of one cardiac condition. This study concludes that a suitable alternative to the current process of clerking such as a standardized nurse history could be safely and efficiently undertaken. Eliminating the tiny percentage of previously unrecognized disease would be a prerequisite for such a change.

  13. Deepwater Gulf of Mexico more profitable than previously thought

    International Nuclear Information System (INIS)

    Craig, M.J.K.; Hyde, S.T.

    1997-01-01

    Economic evaluations and recent experience show that the deepwater Gulf of Mexico (GOM) is much more profitable than previously thought. Four factors contributing to the changed viewpoint are: First, deepwater reservoirs have proved to have excellent productive capacity, distribution, and continuity when compared to correlative-age shelf deltaic sands. Second, improved technologies and lower perceived risks have lowered the cost of floating production systems (FPSs). Third, projects now get on-line quicker. Fourth, a collection of other important factors are: Reduced geologic risk and associated high success rates for deepwater GOM wells due primarily to improved seismic imaging and processing tools (3D, AVO, etc.); absence of any political risk in the deepwater GOM (common overseas, and very significant in some international areas); and positive impact of deepwater federal royalty relief. This article uses hypothetical reserve distributions and price forecasts to illustrate indicative economics of deepwater prospects. Economics of Shell Oil Co.'s three deepwater projects are also discussed

  14. Surgical treatment of breast cancer in previously augmented patients.

    Science.gov (United States)

    Karanas, Yvonne L; Leong, Darren S; Da Lio, Andrew; Waldron, Kathleen; Watson, James P; Chang, Helena; Shaw, William W

    2003-03-01

    The incidence of breast cancer is increasing each year. Concomitantly, cosmetic breast augmentation has become the second most often performed cosmetic surgical procedure. As the augmented patient population ages, an increasing number of breast cancer cases among previously augmented women can be anticipated. The surgical treatment of these patients is controversial, with several questions remaining unanswered. Is breast conservation therapy feasible in this patient population and can these patients retain their implants? A retrospective review of all breast cancer patients with a history of previous augmentation mammaplasty who were treated at the Revlon/UCLA Breast Center between 1991 and 2001 was performed. During the study period, 58 patients were treated. Thirty patients (52 percent) were treated with a modified radical mastectomy with implant removal. Twenty-eight patients (48 percent) underwent breast conservation therapy, which consisted of lumpectomy, axillary lymph node dissection, and radiotherapy. Twenty-two of the patients who underwent breast conservation therapy initially retained their implants. Eleven of those 22 patients (50 percent) ultimately required completion mastectomies with implant removal because of implant complications (two patients), local recurrences (five patients), or the inability to obtain negative margins (four patients). Nine additional patients experienced complications resulting from their implants, including contracture, erosion, pain, and rupture. The data illustrate that breast conservation therapy with maintenance of the implant is not ideal for the majority of augmented patients. Breast conservation therapy with explantation and mastopexy might be appropriate for rare patients with large volumes of native breast tissue. Mastectomy with immediate reconstruction might be a more suitable choice for these patients.

  15. Effect of previous induced abortions on postabortion contraception selection.

    Science.gov (United States)

    Keene, Melissa; Roston, Alicia; Keith, Louis; Patel, Ashlesha

    2015-05-01

    The objective was to compare contraceptive method selection in women undergoing their first pregnancy termination versus women undergoing repeat pregnancy termination in an urban abortion clinic. We hypothesized that women undergoing repeat abortions will select highly effective contraceptives (intrauterine device, subdermal implant, tubal ligation) more often than patients undergoing their first abortion. We conducted a retrospective analysis of all women undergoing first-trimester surgical abortion at John H. Stroger, Jr., Hospital of Cook County from October 1, 2009, to October 31, 2011. We compared contraceptive method selection in the postabortion period after receipt of contraceptive counseling for 7466 women, stratifying women by history of no prior abortion versus one or more abortions. Of the 7466 women, 48.6% (3625) had no history of previous abortion. After controlling for age, race and number of living children, women with a history of abortion were more likely to select a highly effective method [odds ratio (OR) 1.19, 95% confidence interval (CI) 1.06-1.33]. Most significantly, having living children was the strongest predictor of a highly effective method with an OR of 3.17 (95% CI 2.69-3.75). In women having a first-trimester abortion, the factors most predictive of selecting a highly effective method for postabortion contraception include history of previous abortion and having living children. The latter holds true independent of abortion history. This paper is unique in its ability to demonstrate the high interest in highly effective contraceptive selection in high-risk, low-income women with prior abortion history. Efforts to integrate provision of highly effective methods of contraception for postabortion care are essential for the reduction of future unintended pregnancies. Copyright © 2015 Elsevier Inc. All rights reserved.

  16. Is Previous Respiratory Disease a Risk Factor for Lung Cancer?

    Science.gov (United States)

    Denholm, Rachel; Schüz, Joachim; Straif, Kurt; Stücker, Isabelle; Jöckel, Karl-Heinz; Brenner, Darren R.; De Matteis, Sara; Boffetta, Paolo; Guida, Florence; Brüske, Irene; Wichmann, Heinz-Erich; Landi, Maria Teresa; Caporaso, Neil; Siemiatycki, Jack; Ahrens, Wolfgang; Pohlabeln, Hermann; Zaridze, David; Field, John K.; McLaughlin, John; Demers, Paul; Szeszenia-Dabrowska, Neonila; Lissowska, Jolanta; Rudnai, Peter; Fabianova, Eleonora; Dumitru, Rodica Stanescu; Bencko, Vladimir; Foretova, Lenka; Janout, Vladimir; Kendzia, Benjamin; Peters, Susan; Behrens, Thomas; Vermeulen, Roel; Brüning, Thomas; Kromhout, Hans

    2014-01-01

    Rationale: Previous respiratory diseases have been associated with increased risk of lung cancer. Respiratory conditions often co-occur and few studies have investigated multiple conditions simultaneously. Objectives: Investigate lung cancer risk associated with chronic bronchitis, emphysema, tuberculosis, pneumonia, and asthma. Methods: The SYNERGY project pooled information on previous respiratory diseases from 12,739 case subjects and 14,945 control subjects from 7 case–control studies conducted in Europe and Canada. Multivariate logistic regression models were used to investigate the relationship between individual diseases adjusting for co-occurring conditions, and patterns of respiratory disease diagnoses and lung cancer. Analyses were stratified by sex, and adjusted for age, center, ever-employed in a high-risk occupation, education, smoking status, cigarette pack-years, and time since quitting smoking. Measurements and Main Results: Chronic bronchitis and emphysema were positively associated with lung cancer, after accounting for other respiratory diseases and smoking (e.g., in men: odds ratio [OR], 1.33; 95% confidence interval [CI], 1.20–1.48 and OR, 1.50; 95% CI, 1.21–1.87, respectively). A positive relationship was observed between lung cancer and pneumonia diagnosed 2 years or less before lung cancer (OR, 3.31; 95% CI, 2.33–4.70 for men), but not longer. Co-occurrence of chronic bronchitis and emphysema and/or pneumonia had a stronger positive association with lung cancer than chronic bronchitis “only.” Asthma had an inverse association with lung cancer, the association being stronger with an asthma diagnosis 5 years or more before lung cancer compared with shorter. Conclusions: Findings from this large international case–control consortium indicate that after accounting for co-occurring respiratory diseases, chronic bronchitis and emphysema continue to have a positive association with lung cancer. PMID:25054566

  17. Advanced dementia pain management protocols.

    Science.gov (United States)

    Montoro-Lorite, Mercedes; Canalias-Reverter, Montserrat

    2017-08-04

    Pain management in advanced dementia is complex because of neurological deficits present in these patients, and nurses are directly responsible for providing interventions for the evaluation, management and relief of pain for people suffering from this health problem. In order to facilitate and help decision-makers, pain experts recommend the use of standardized protocols to guide pain management, but in Spain, comprehensive pain management protocols have not yet been developed for advanced dementia. This article reflects the need for an integrated management of pain in advanced dementia. From the review and analysis of the most current and relevant studies in the literature, we performed an approximation of the scales for the determination of pain in these patients, with the observational scale PAINAD being the most recommended for the hospital setting. In addition, we provide an overview for comprehensive management of pain in advanced dementia through the conceptual framework «a hierarchy of pain assessment techniques by McCaffery and Pasero» for the development and implementation of standardized protocols, including a four-phase cyclical process (evaluation, planning/performance, revaluation and recording), which can facilitate the correct management of pain in these patients. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.

  18. Static Validation of a Voting Protocol

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde; Andersen, Esben Heltoft; Nielson, Hanne Riis

    2005-01-01

    The desired security properties of electronic voting protocols include verifiability, accuracy, democracy and fairness. In this paper we use a static program analysis tool to validate these properties for one of the classical voting protocols under appropriate assumptions. The protocol is formali...

  19. PCR protocols: current methods and applications

    National Research Council Canada - National Science Library

    White, Bruce Alan

    1993-01-01

    ..." between "small" and "big" labs, since its use makes certain projects, especially those related to molecular cloning, now far more feasible for the small lab with a modest budget. This new volume on PCR Protocols does not attempt the impossible task of representing all PCR-based protocols. Rather, it presents a range of protocols, both analytical ...

  20. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    internet. 2. New Features in IPv6. Harsha Srinath. IPv4, the workhorse protocol of the currently popular TePI. IP protocol suite, is fast becoming obsolete. The exponen- ... designers of this Internet Protocol (lPv4) never envisioned the scale of the ..... using multiple access providers across the same interface to have separate ...

  1. Timed Model Checking of Security Protocols

    NARCIS (Netherlands)

    Corin, R.J.; Etalle, Sandro; Hartel, Pieter H.; Mader, Angelika H.

    We propose a method for engineering security protocols that are aware of timing aspects. We study a simplified version of the well-known Needham Schroeder protocol and the complete Yahalom protocol. Timing information allows the study of different attack scenarios. We illustrate the attacks by model

  2. 21 CFR 1301.18 - Research protocols.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol... have such submission approved by, the Food and Drug Administration as required in 21 U.S.C. 355(i) and...

  3. Crypto-Verifying Protocol Implementations in ML

    NARCIS (Netherlands)

    Bhargavan, K.; Corin, R.J.; Fournet, C.

    2007-01-01

    We intend to narrow the gap between concrete implementations and verified models of cryptographic protocols. We consider protocols implemented in F#, a variant of ML, and verified using CryptoVerif, Blanchet's protocol verifier for computational cryptography. We experiment with compilers from F#

  4. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi; Dimitrakos, Theo; Martinelli, Fabio

    We formally specify a payment protocol described by Vogt et al. This protocol is intended for fair exchange of time-sensitive data. Here the mCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free mu-calculus. These properties are then

  5. An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments

    Directory of Open Access Journals (Sweden)

    S.K. Hafizul Islam

    2017-07-01

    Full Text Available In the literature, many three-party authenticated key exchange (3PAKE protocols are put forwarded to established a secure session key between two users with the help of trusted server. The computed session key will ensure secure message exchange between the users over any insecure communication networks. In this paper, we identified some deficiencies in Tan’s 3PAKE protocol and then devised an improved 3PAKE protocol without symmetric key en/decryption technique for mobile-commerce environments. The proposed protocol is based on the elliptic curve cryptography and one-way cryptographic hash function. In order to prove security validation of the proposed 3PAKE protocol we have used widely accepted AVISPA software whose results confirm that the proposed protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The proposed protocol is not only secure in the AVISPA software, but it also secure against relevant numerous security attacks such as man-in-the-middle attack, impersonation attack, parallel attack, key-compromise impersonation attack, etc. In addition, our protocol is designed with lower computation cost than other relevant protocols. Therefore, the proposed protocol is more efficient and suitable for practical use than other protocols in mobile-commerce environments.

  6. Do attitudes of families concerned influence features of children who claim to remember previous lives?

    Science.gov (United States)

    Pasricha, Satwant K

    2011-01-01

    Reported cases of nearly 2600 children (subjects) who claim to remember previous lives have been investigated in cultures with and without belief in reincarnation. The authenticity in most cases has been established. To study the influence of attitudes of parents of the subjects, families of the deceased person with whom they are identified and attention paid by others on the features of the cases. The study is based on field investigations. Data is derived from analysis of a larger series of an ongoing project. Information on initial and subsequent attitudes of subjects' mothers was available for 292 and 136 cases, respectively; attitudes of 227 families of deceased person (previous personality) with whom he is identified, and the extent of attention received from outsiders for 252 cases. Observations and interviews with multiple firsthand informants on both sides of the case as well as some neutral informants supplemented by examination of objective data were the chief methods of investigation. The initial attitude of mothers varied from encouragement (21%) to neutral or tolerance (51%) to discouragement (28%). However, it changed significantly from neutrality to taking measures to induce amnesia in their children for previous life memories due to various psychosocial pressures and prevalent beliefs. Families of the previous personalities, once convinced, showed complete acceptance in a majority of cases. Outside attention was received in 58% cases. The positive attitude of parents might facilitate expression of memories but subsequently attitudes of persons concerned do not seem to alter features of the cases.

  7. Important biological information uncovered in previously unaligned reads from chromatin immunoprecipitation experiments (ChIP-Seq)

    Science.gov (United States)

    Ouma, Wilberforce Zachary; Mejia-Guerra, Maria Katherine; Yilmaz, Alper; Pareja-Tobes, Pablo; Li, Wei; Doseff, Andrea I.; Grotewold, Erich

    2015-01-01

    Establishing the architecture of gene regulatory networks (GRNs) relies on chromatin immunoprecipitation followed by massively parallel sequencing (ChIP-Seq) methods that provide genome-wide transcription factor binding sites (TFBSs). ChIP-Seq furnishes millions of short reads that, after alignment, describe the genome-wide binding sites of a particular TF. However, in all organisms investigated an average of 40% of reads fail to align to the corresponding genome, with some datasets having as much as 80% of reads failing to align. We describe here the provenance of previously unaligned reads in ChIP-Seq experiments from animals and plants. We show that a substantial portion corresponds to sequences of bacterial and metazoan origin, irrespective of the ChIP-Seq chromatin source. Unforeseen was the finding that 30%–40% of unaligned reads were actually alignable. To validate these observations, we investigated the characteristics of the previously unaligned reads corresponding to TAL1, a human TF involved in lineage specification of hemopoietic cells. We show that, while unmapped ChIP-Seq read datasets contain foreign DNA sequences, additional TFBSs can be identified from the previously unaligned ChIP-Seq reads. Our results indicate that the re-evaluation of previously unaligned reads from ChIP-Seq experiments will significantly contribute to TF target identification and determination of emerging properties of GRNs. PMID:25727450

  8. The Use Of Spikes Protocol In Cancer: An Integrative Review

    Directory of Open Access Journals (Sweden)

    Fernando Henrique de Sousa

    2017-03-01

    Full Text Available This is an integrative review which aimed to evaluate the use of the SPIKES protocol in Oncology. We selected articles published in Medline and CINAHL databases between 2005-2015, in English, with the descriptors defined by the Medical Subject Headings (MeSH:cancer, neoplasms, plus the uncontrolled descriptor: protocol spikes.  Six articles met the inclusion criteria and were analyzed in full, three thematic categories were established: aspects inherent to the health care professional; Aspects related to the patient and aspects related to the protocol. The main effects of the steps of SPIKES protocol can provide the strengthening of ties between health professionals and patients, and ensure the maintenance and quality of this relationship.  The results indicate an important limiting factor for effective doctor-patient relationship, the little training provided to medical professionals communication of bad news, verified by the difficulty reported in this moment through interviews in the analyzed studies.

  9. A Forward-secure Grouping-proof Protocol for Multiple RFID Tags

    Directory of Open Access Journals (Sweden)

    Liu Ya-li

    2012-09-01

    Full Text Available Designing secure and robust grouping-proof protocols based on RFID characteristics becomes a hotspot in the research of security in Internet of Things (IOT. The proposed grouping-proof protocols recently have security and/or privacy omission and these schemes afford order-dependence by relaying message among tags through an RFID reader. In consequence, aiming at enhancing the robustness, improving scalability, reducing the computation costs on resource-constrained devices, and meanwhile combing Computational Intelligence (CI with Secure Multi-party Communication (SMC, a Forward-Secure Grouping-Proof Protocol (FSGP for multiple RFID tags based on Shamir's (, secret sharing is proposed. In comparison with the previous grouping-proof protocols, FSGP has the characteristics of forward-security and order-independence addressing the scalability issue by avoiding relaying message. Our protocol provides security enhancement, performance improvement, and meanwhile controls the computation cost, which equilibrates both security and low cost requirements for RFID tags.

  10. Diagnosis of Beta-thalassaemia major in previously transfused patients

    International Nuclear Information System (INIS)

    Ahmed, S.; Rehman, Z.; Karamat, K.A.

    2003-01-01

    Objective: The study was conducted to evaluate the effects of blood transfusion(s) on the haematological picture of beta-thalassaemia major. Results: Out of the 280 patients 109 (39%) had received one or more blood transfusions (cases). The remaining 171 patients who did not receive any transfusion served as controls. The mean MCV, MCH and Hb-F in cases were significantly higher than in the controls (p 4 transfusions (17%) (p=0.016). In the occasionally transfused patients Hb-F level was directly related to the time since last transfusion. In 44/109 (40%) transfused patients (Hb-F>30%) the diagnosis of thalassaemia was not difficult. In 54/109 (50%) patients (Hb-:5-30%) the diagnosis was aided by parent's study, while PCR for thalassaemia mutation was required in 11/109 (10%) patients (Hb-F <5%). Conclusion: In most transfused patients of thalassaemia major MCV and MCH were significantly higher while Hb-F was lower than in the un-transfused patients. There was a linear correlation between Hb-F level and time since last transfusion in the occasionally transfused patients. However, the reduction in Hb-F level was more marked and sustained in multipally transfused patients. Parent's study and PCR are useful aids in establishing the correct diagnosis in these patients. (author)

  11. Nuclear Physics in High School: what are the previous knowledge?

    Science.gov (United States)

    Pombo, F. de O.

    2017-11-01

    Nuclear physics is a branch of physics that about a century occupies an important space in the theoretical, experimental and scientific fields. Currently, its relevance in application is concentrated in several areas such as energy production, diagnostic processes and medical treatment and nuclear bombs, high destructive power. Whereas, according to legal regulations, the teaching of physics must make the student competent in the understanding of the world and assuming the perspective of Paulo Freire (2011) that education is not done on the subject, but together with him, in dialogue with his point of departure, his prior knowledge, we established the general objective of raising students prior knowledge of the third year of high School at Nair Ferreira Neves school, in São Sebastião-SP, about nuclear physics. We concluded that the school has not fulfilled its role in relation to nuclear physics, because students have information from other means of information and these knowledge are stereotyped and mistaken, damaging the world's reading and exercising full citizenship.

  12. Intraoperative radiation therapy (IORT) for previously untreated malignant gliomas

    International Nuclear Information System (INIS)

    Nemoto, Kenji; Ogawa, Yoshihiro; Matsushita, Haruo; Takeda, Ken; Takai, Yoshihiro; Yamada, Shogo; Kumabe, Toshihiro

    2002-01-01

    Intraoperative radiation therapy (IORT) is one of the methods used to deliver a large single dose to the tumor tissue while reducing the exposure of normal surrounding tissue. However, the usefulness of intraoperative electron therapy for malignant gliomas has not been established. During the period from 1987 to 1997, 32 patients with malignant gliomas were treated with IORT. The histological diagnoses were anaplastic astrocytoma in 11 patients and glioblastoma in 21 patients. Therapy consisted of surgical resection and intraoperative electron therapy using a dose of 12–15 Gy (median, 15 Gy). The patients later underwent postoperative external radiation therapy (EXRT) with a median total dose of 60 Gy. Each of the 32 patients treated with IORT was randomly matched with patients who had been treated with postoperative EXRT alone (control). Patients were matched according to histological grade, age, extent of tumor removal, and tumor location. In the anaplastic astrocytoma group, the one-, two- and five-year survival rates were 81%, 51% and 15%, respectively in the IORT patients and 54%, 43% and 21%, respectively in the control patients. In the glioblastoma group, one-, two- and five-year survival rates were 63%, 26% and 0%, respectively in the IORT patients and 70%, 18% and 6%, respectively in the control patients. There was no significant difference between survival rates in the IORT patients and control patients in either the anaplastic astrocytoma group or glioblastoma group. IORT dose not improve survival of patients with malignant gliomas compared to that of patients who have received EXRT alone

  13. Microinstability of the hip: a previously unrecognized pathology

    Science.gov (United States)

    Bolia, Ioanna; Chahla, Jorge; Locks, Renato; Briggs, Karen; Philippon, Marc J.

    2016-01-01

    Summary Background Hip microinstability is an established diagnosis; however, its occurrence is still debated by many physicians. Diagnosis of hip microinstability is often challenging, due to a lack of specific signs or symptoms, and patients may remain undiagnosed for long periods. This may lead to early manifestation of degenerative joint disease. Consequently, careful patient and family history must be obtained and diagnostic imaging should follow. After a thorough clinical evaluation of the patient with suspected hip microinstability, the physician should focus on how to improve symptoms and functionality in daily and sports activities. Purpose The purpose of this review article was to give a current update regarding this diagnosis and to provide a complete diagnostic approach in order to effectively treat hip microinstability. Methods We reviewed the literature on the diagnosis, the non-operative and operative indications for the treatment of this complex and often misdiagnosed pathology. Conclusion Conservative treatment is considered the best initial approach, though, surgical intervention should be considered if symptoms persist or other hip pathology exists. Successful surgical intervention, such as hip arthroscopy, should focus on restoring the normal anatomy of the hip joint in order to regain its functionality. The role of the hip joint capsule has gained particular research interest during the last years, and its repair or reconstruction during hip arthroscopy is considered necessary in order to avoid iatrogenic hip microinstability. Various capsular closure/plication techniques have been developed towards this direction with encouraging results. Level of evidence V. PMID:28066740

  14. Assessing persistence: Experiences documenting savings persistence under the California protocols

    Energy Technology Data Exchange (ETDEWEB)

    O' Drain, M.; Caulfield, T.O.

    1998-07-01

    As California enters the final stages of DSM evaluation and verification under regulation, documentation of energy savings persistence (persistence) takes center stage with respect to earnings claims. The California Protocols both simplify and complicate the process of measuring persistence. This paper discusses the California Protocols and the interaction between individual utility studies and cooperative statewide studies in fulfilling the requirements of the Protocols. It addresses measure effective useful life and measure technical degradation. The paper describes how California utilities are grappling with the practical issues of projecting effective useful life based on limited attrition data and speculative survival functions. Specifically, the paper discusses the difficulty of establishing meaningful survival functions for the breadth of measures represented in California DSM programs. Similarly, California utilities as a whole are attempting to establish exactly what measure technical degradation means, and whether it actually exists. The paper recounts the process, documents the approaches taken, and documents publicly available information on both retention based effective useful life and study based measure technical degradation. Finally, the authors propose improvements in the approach to persistence assessment.

  15. Establishing an International Soil Modelling Consortium

    Science.gov (United States)

    Vereecken, Harry; Schnepf, Andrea; Vanderborght, Jan

    2015-04-01

    -change-feedback processes, bridge basic soil science research and management, and facilitate the communication between science and society . To meet these challenges an international community effort is required, similar to initiatives in systems biology, hydrology, and climate and crop research. We therefore propose to establish an international soil modelling consortium with the aims of 1) bringing together leading experts in modelling soil processes within all major soil disciplines, 2) addressing major scientific gaps in describing key processes and their long term impacts with respect to the different functions and ecosystem services provided by soil, 3) intercomparing soil model performance based on standardized and harmonized data sets, 4) identifying interactions with other relevant platforms related to common data formats, protocols and ontologies, 5) developing new approaches to inverse modelling, calibration, and validation of soil models, 6) integrating soil modelling expertise and state of the art knowledge on soil processes in climate, land surface, ecological, crop and contaminant models, and 7) linking process models with new observation, measurement and data evaluation technologies for mapping and characterizing soil properties across scales. Our consortium will bring together modelers and experimental soil scientists at the forefront of new technologies and approaches to characterize soils. By addressing these aims, the consortium will contribute to improve the role of soil modeling as a knowledge dissemination instrument in addressing key global issues and stimulate the development of translational research activities. This presentation will provide a compelling case for this much-needed effort, with a focus on tangible benefits to the scientific and food security communities.

  16. Reactive broadcasting protocol for video on demand

    Science.gov (United States)

    Paris, Jehan-Francois; Carter, Steven W.; Long, Darrell D. E.

    1999-12-01

    We propose a reactive broadcasting protocol that addresses the problem of distributing moderately popular videos in a more efficient fashion. Like all efficient broadcasting protocols, reactive broadcasting assumes that the customer set-top box has enough local storage to store at least one half of each video being watched. Unlike other broadcasting protocols, reactive broadcasting only broadcasts the later portions of each video. the initial segment of each video is distributed on demand using a stream tapping protocol. Our simulations show that reactive broadcasting outperforms both conventional broadcasting protocols and pure stream tapping for a wide range of video request rates.

  17. Radon anomalies prior to earthquakes (1). Review of previous studies

    International Nuclear Information System (INIS)

    Ishikawa, Tetsuo; Tokonami, Shinji; Yasuoka, Yumi; Shinogi, Masaki; Nagahama, Hiroyuki; Omori, Yasutaka; Kawada, Yusuke

    2008-01-01

    The relationship between radon anomalies and earthquakes has been studied for more than 30 years. However, most of the studies dealt with radon in soil gas or in groundwater. Before the 1995 Hyogoken-Nanbu earthquake, an anomalous increase of atmospheric radon was observed at Kobe Pharmaceutical University. The increase was well fitted with a mathematical model related to earthquake fault dynamics. This paper reports the significance of this observation, reviewing previous studies on radon anomaly before earthquakes. Groundwater/soil radon measurements for earthquake prediction began in 1970's in Japan as well as foreign countries. One of the most famous studies in Japan is groundwater radon anomaly before the 1978 Izu-Oshima-kinkai earthquake. We have recognized the significance of radon in earthquake prediction research, but recently its limitation was also pointed out. Some researchers are looking for a better indicator for precursors; simultaneous measurements of radon and other gases are new trials in recent studies. Contrary to soil/groundwater radon, we have not paid much attention to atmospheric radon before earthquakes. However, it might be possible to detect precursors in atmospheric radon before a large earthquake. In the next issues, we will discuss the details of the anomalous atmospheric radon data observed before the Hyogoken-Nanbu earthquake. (author)

  18. Cerebral Metastasis from a Previously Undiagnosed Appendiceal Adenocarcinoma

    Directory of Open Access Journals (Sweden)

    Antonio Biroli

    2012-01-01

    Full Text Available Brain metastases arise in 10%–40% of all cancer patients. Up to one third of the patients do not have previous cancer history. We report a case of a 67-years-old male patient who presented with confusion, tremor, and apraxia. A brain MRI revealed an isolated right temporal lobe lesion. A thorax-abdomen-pelvis CT scan showed no primary lesion. The patient underwent a craniotomy with gross-total resection. Histopathology revealed an intestinal-type adenocarcinoma. A colonoscopy found no primary lesion, but a PET-CT scan showed elevated FDG uptake in the appendiceal nodule. A right hemicolectomy was performed, and the specimen showed a moderately differentiated mucinous appendiceal adenocarcinoma. Whole brain radiotherapy was administrated. A subsequent thorax-abdomen CT scan revealed multiple lung and hepatic metastasis. Seven months later, the patient died of disease progression. In cases of undiagnosed primary lesions, patients present in better general condition, but overall survival does not change. Eventual identification of the primary tumor does not affect survival. PET/CT might be a helpful tool in detecting lesions of the appendiceal region. To the best of our knowledge, such a case was never reported in the literature, and an appendiceal malignancy should be suspected in patients with brain metastasis from an undiagnosed primary tumor.

  19. Influence of Previous Knowledge in Torrance Tests of Creative Thinking

    Directory of Open Access Journals (Sweden)

    María Aranguren

    2015-07-01

    Full Text Available The aim of this work is to analyze the influence of study field, expertise and recreational activities participation in Torrance Tests of Creative Thinking (TTCT, 1974 performance. Several hypotheses were postulated to explore the possible effects of previous knowledge in TTCT verbal and TTCT figural university students’ outcomes. Participants in this study included 418 students from five study fields: Psychology;Philosophy and Literature, Music; Engineering; and Journalism and Advertising (Communication Sciences. Results found in this research seem to indicate that there in none influence of the study field, expertise and recreational activities participation in neither of the TTCT tests. Instead, the findings seem to suggest some kind of interaction between certain skills needed to succeed in specific studies fields and performance on creativity tests, such as the TTCT. These results imply that TTCT is a useful and valid instrument to measure creativity and that some cognitive process involved in innovative thinking can be promoted using different intervention programs in schools and universities regardless the students study field.

  20. New Strategies for Cultivation and Detection of Previously Uncultured Microbes

    Science.gov (United States)

    Stevenson, Bradley S.; Eichorst, Stephanie A.; Wertz, John T.; Schmidt, Thomas M.; Breznak, John A.

    2004-01-01

    An integrative approach was used to obtain pure cultures of previously uncultivated members of the divisions Acidobacteria and Verrucomicrobia from agricultural soil and from the guts of wood-feeding termites. Some elements of the cultivation procedure included the following: the use of agar media with little or no added nutrients; relatively long periods of incubation (more than 30 days); protection of cells from exogenous peroxides; and inclusion of humic acids or a humic acid analogue (anthraquinone disulfonate) and quorum-signaling compounds (acyl homoserine lactones) in growth media. The bacteria were incubated in the presence of air and in hypoxic (1 to 2% O2 [vol/vol]) and anoxic atmospheres. Some bacteria were incubated with elevated concentrations of CO2 (5% [vol/vol]). Significantly more Acidobacteria were found on isolation plates that had been incubated with 5% CO2. A simple, high-throughput, PCR-based surveillance method (plate wash PCR) was developed. This method greatly facilitated detection and ultimate isolation of target bacteria from as many as 1,000 colonies of nontarget microbes growing on the same agar plates. Results illustrate the power of integrating culture methods with molecular techniques to isolate bacteria from phylogenetic groups underrepresented in culture. PMID:15294811

  1. Measles Outbreak among Previously Immunized Adult Healthcare Workers, China, 2015

    Directory of Open Access Journals (Sweden)

    Zhengyi Zhang

    2016-01-01

    Full Text Available Measles is caused by measles virus belonging to genus Morbillivirus of the family Paramyxoviridae. Vaccination has played a critical role in controlling measles infection worldwide. However, in the recent years, outbreaks of measles infection still occur in many developing countries. Here, we report an outbreak of measles among healthcare workers and among the 60 measles infected patients 50 were healthcare workers including doctors, nurses, staff, and medics. Fifty-one patients (85% tested positive for IgM antibodies against the measles virus and 50 patients (83.3% tested positive for measles virus RNA. Surprisingly, 73.3% of the infected individuals had been previously immunized against measles. Since there is no infection division in our hospital, the fever clinics are located in the Emergency Division. In addition, the fever and rash were not recognized as measles symptoms at the beginning of the outbreak. These factors result in delay in isolation and early confirmation of the suspected patients and eventually a measles outbreak in the hospital. Our report highlights the importance of following a two-dose measles vaccine program in people including the healthcare workers. In addition, vigilant attention should be paid to medical staff with clinical fever and rash symptoms to avoid a possible nosocomial transmission of measles infection.

  2. Multispecies Coevolution Particle Swarm Optimization Based on Previous Search History

    Directory of Open Access Journals (Sweden)

    Danping Wang

    2017-01-01

    Full Text Available A hybrid coevolution particle swarm optimization algorithm with dynamic multispecies strategy based on K-means clustering and nonrevisit strategy based on Binary Space Partitioning fitness tree (called MCPSO-PSH is proposed. Previous search history memorized into the Binary Space Partitioning fitness tree can effectively restrain the individuals’ revisit phenomenon. The whole population is partitioned into several subspecies and cooperative coevolution is realized by an information communication mechanism between subspecies, which can enhance the global search ability of particles and avoid premature convergence to local optimum. To demonstrate the power of the method, comparisons between the proposed algorithm and state-of-the-art algorithms are grouped into two categories: 10 basic benchmark functions (10-dimensional and 30-dimensional, 10 CEC2005 benchmark functions (30-dimensional, and a real-world problem (multilevel image segmentation problems. Experimental results show that MCPSO-PSH displays a competitive performance compared to the other swarm-based or evolutionary algorithms in terms of solution accuracy and statistical tests.

  3. High-Grade Leiomyosarcoma Arising in a Previously Replanted Limb

    Directory of Open Access Journals (Sweden)

    Tiffany J. Pan

    2015-01-01

    Full Text Available Sarcoma development has been associated with genetics, irradiation, viral infections, and immunodeficiency. Reports of sarcomas arising in the setting of prior trauma, as in burn scars or fracture sites, are rare. We report a case of a leiomyosarcoma arising in an arm that had previously been replanted at the level of the elbow joint following traumatic amputation when the patient was eight years old. He presented twenty-four years later with a 10.8 cm mass in the replanted arm located on the volar forearm. The tumor was completely resected and pathology examination showed a high-grade, subfascial spindle cell sarcoma diagnosed as a grade 3 leiomyosarcoma with stage pT2bNxMx. The patient underwent treatment with brachytherapy, reconstruction with a free flap, and subsequently chemotherapy. To the best of our knowledge, this is the first case report of leiomyosarcoma developing in a replanted extremity. Development of leiomyosarcoma in this case could be related to revascularization, scar formation, or chronic injury after replantation. The patient remains healthy without signs of recurrence at three-year follow-up.

  4. Coronary collateral vessels in patients with previous myocardial infarction

    International Nuclear Information System (INIS)

    Nakatsuka, M.; Matsuda, Y.; Ozaki, M.

    1987-01-01

    To assess the degree of collateral vessels after myocardial infarction, coronary angiograms, left ventriculograms, and exercise thallium-201 myocardial scintigrams of 36 patients with previous myocardial infarction were reviewed. All 36 patients had total occlusion of infarct-related coronary artery and no more than 70% stenosis in other coronary arteries. In 19 of 36 patients with transient reduction of thallium-201 uptake in the infarcted area during exercise (Group A), good collaterals were observed in 10 patients, intermediate collaterals in 7 patients, and poor collaterals in 2 patients. In 17 of 36 patients without transient reduction of thallium-201 uptake in the infarcted area during exercise (Group B), good collaterals were seen in 2 patients, intermediate collaterals in 7 patients, and poor collaterals in 8 patients (p less than 0.025). Left ventricular contractions in the infarcted area were normal or hypokinetic in 10 patients and akinetic or dyskinetic in 9 patients in Group A. In Group B, 1 patient had hypokinetic contraction and 16 patients had akinetic or dyskinetic contraction (p less than 0.005). Thus, patients with transient reduction of thallium-201 uptake in the infarcted area during exercise had well developed collaterals and preserved left ventricular contraction, compared to those in patients without transient reduction of thallium-201 uptake in the infarcted area during exercise. These results suggest that the presence of viable myocardium in the infarcted area might be related to the degree of collateral vessels

  5. Motivational activities based on previous knowledge of students

    Science.gov (United States)

    García, J. A.; Gómez-Robledo, L.; Huertas, R.; Perales, F. J.

    2014-07-01

    Academic results depend strongly on the individual circumstances of students: background, motivation and aptitude. We think that academic activities conducted to increase motivation must be tuned to the special situation of the students. Main goal of this work is analyze the students in the first year of the Degree in Optics and Optometry in the University of Granada and the suitability of an activity designed for those students. Initial data were obtained from a survey inquiring about the reasons to choose this degree, their knowledge of it, and previous academic backgrounds. Results show that: 1) the group is quite heterogeneous, since students have very different background. 2) Reasons to choose the Degree in Optics and Optometry are also very different, and in many cases were selected as a second option. 3) Knowledge and motivations about the Degree are in general quite low. Trying to increase the motivation of the students we designed an academic activity in which we show different topics studied in the Degree. Results show that students that have been involved in this activity are the most motivated and most satisfied with their election of the degree.

  6. Pertussis-associated persistent cough in previously vaccinated children.

    Science.gov (United States)

    Principi, Nicola; Litt, David; Terranova, Leonardo; Picca, Marina; Malvaso, Concetta; Vitale, Cettina; Fry, Norman K; Esposito, Susanna

    2017-11-01

    To evaluate the role of Bordetella pertussis infection, 96 otherwise healthy 7- to 17-year-old subjects who were suffering from a cough lasting from 2 to 8 weeks were prospectively recruited. At enrolment, a nasopharyngeal swab and an oral fluid sample were obtained to search for pertussis infection by the detection of B. pertussis DNA and/or an elevated titre of anti-pertussis toxin IgG. Evidence of pertussis infection was found in 18 (18.7 %; 95 % confidence interval, 11.5-28.0) cases. In 15 cases, the disease occurred despite booster administration. In two cases, pertussis was diagnosed less than 2 years after the booster injection, whereas in the other cases it was diagnosed between 2 and 9 years after the booster dose. This study used non-invasive testing to show that pertussis is one of the most important causes of long-lasting cough in school-age subjects. Moreover, the protection offered by acellular pertussis vaccines currently wanes more rapidly than previously thought.

  7. Optimal temperature for malaria transmission is dramaticallylower than previously predicted

    Science.gov (United States)

    Mordecai, Eerin A.; Paaijmans, Krijin P.; Johnson, Leah R.; Balzer, Christian; Ben-Horin, Tal; de Moor, Emily; McNally, Amy; Pawar, Samraat; Ryan, Sadie J.; Smith, Thomas C.; Lafferty, Kevin D.

    2013-01-01

    The ecology of mosquito vectors and malaria parasites affect the incidence, seasonal transmission and geographical range of malaria. Most malaria models to date assume constant or linear responses of mosquito and parasite life-history traits to temperature, predicting optimal transmission at 31 °C. These models are at odds with field observations of transmission dating back nearly a century. We build a model with more realistic ecological assumptions about the thermal physiology of insects. Our model, which includes empirically derived nonlinear thermal responses, predicts optimal malaria transmission at 25 °C (6 °C lower than previous models). Moreover, the model predicts that transmission decreases dramatically at temperatures > 28 °C, altering predictions about how climate change will affect malaria. A large data set on malaria transmission risk in Africa validates both the 25 °C optimum and the decline above 28 °C. Using these more accurate nonlinear thermal-response models will aid in understanding the effects of current and future temperature regimes on disease transmission.

  8. Improved outcomes following implementation of an acute gastrointestinal bleeding multidisciplinary protocol.

    Science.gov (United States)

    Loftus, Tyler J; Go, Kristina L; Hughes, Steven J; Croft, Chasen A; Smith, Robert Stephen; Efron, Philip A; Moore, Frederick A; Brakenridge, Scott C; Mohr, Alicia M; Jordan, Janeen R

    2017-07-01

    Effective multidisciplinary management of gastrointestinal bleeding (GIB) requires effective communication. We instituted a protocol to standardize communication practices with the hypothesis that outcomes would improve following protocol initiation. We performed a retrospective cohort analysis of 442 patients who required procedural management of acute GIB at our institution during a 50-month period spanning 25 months before and 25 months after implementation of a multidisciplinary communication protocol. The protocol stipulates that when a patient with severe GIB is identified, a conference call is coordinated among the gastroenterology, interventional radiology, and acute care surgery teams. A consensus plan is generated and then reassessed following procedural interventions and changes in patients' status. Patients' characteristics, management strategies, and outcomes were compared before and after protocol initiation. Patient populations before and after protocol initiation were similar in age, comorbidities, outpatient use of antiplatelet/anticoagulant medications, admission vital signs, and admission laboratory values. The median interval between admission and the first procedure was significantly shorter in the protocol group (40 vs 47 hours, p = 0.046). The proportion of patients who received packed red blood cell transfusions decreased following protocol initiation (41% vs 50%, p = 0.018). Median hospital length of stay was significantly shorter in the protocol group (5.0 vs 6.0 days, p = 0.014). Readmissions with GIB were decreased after protocol implementation (8% vs. 15%, p = 0.023). Implementation of a multidisciplinary protocol for management of acute GIB was associated with earlier intervention, fewer packed red blood cell transfusions, shorter hospital length of stay, and fewer readmissions with GIB. Future research should seek to establish causal relationships between communication practices and outcomes. Therapeutic study, level III.

  9. Analysis of authentication protocols in agent-based systems using labeled tableaux.

    Science.gov (United States)

    Ma, Ji; Orgun, Mehmet A; Sattar, Abdul

    2009-08-01

    The study of multiagent systems (MASs) focuses on systems in which many intelligent agents interact with each other using communication protocols. For example, an authentication protocol is used to verify and authorize agents acting on behalf of users to protect restricted data and information. After authentication, two agents should be entitled to believe that they are communicating with each other and not with intruders. For specifying and reasoning about the security properties of authentication protocols, many researchers have proposed the use of belief logics. Since authentication protocols are designed to operate in dynamic environments, it is important to model the evolution of authentication systems through time in a systematic way. We advocate the systematic combinations of logics of beliefs and time for modeling and reasoning about evolving agent beliefs in MASs. In particular, we use a temporal belief logic called TML (+) for establishing trust theories for authentication systems and also propose a labeled tableau system for this logic. To illustrate the capabilities of TML (+), we present trust theories for several well-known authentication protocols, namely, the Lowe modified wide-mouthed frog protocol, the amended Needham-Schroeder symmetric key protocol, and Kerberos. We also show how to verify certain security properties of those protocols. With the logic TML (+) and its associated modal tableaux, we are able to reason about and verify authentication systems operating in dynamic environments.

  10. Performance Analysis of On-Demand Routing Protocols in Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Arafatur RAHMAN

    2009-01-01

    Full Text Available Wireless Mesh Networks (WMNs have recently gained a lot of popularity due to their rapid deployment and instant communication capabilities. WMNs are dynamically self-organizing, self-configuring and self-healing with the nodes in the network automatically establishing an adiej hoc network and preserving the mesh connectivity. Designing a routing protocol for WMNs requires several aspects to consider, such as wireless networks, fixed applications, mobile applications, scalability, better performance metrics, efficient routing within infrastructure, load balancing, throughput enhancement, interference, robustness etc. To support communication, various routing protocols are designed for various networks (e.g. ad hoc, sensor, wired etc.. However, all these protocols are not suitable for WMNs, because of the architectural differences among the networks. In this paper, a detailed simulation based performance study and analysis is performed on the reactive routing protocols to verify the suitability of these protocols over such kind of networks. Ad Hoc On-Demand Distance Vector (AODV, Dynamic Source Routing (DSR and Dynamic MANET On-demand (DYMO routing protocol are considered as the representative of reactive routing protocols. The performance differentials are investigated using varying traffic load and number of source. Based on the simulation results, how the performance of each protocol can be improved is also recommended.

  11. An efficient three-party password-based key agreement protocol using extended chaotic maps

    International Nuclear Information System (INIS)

    Shu Jian

    2015-01-01

    Three-party password-based key agreement protocols allow two users to authenticate each other via a public channel and establish a session key with the aid of a trusted server. Recently, Farash et al. [Farash M S, Attari M A 2014 “An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps”, Nonlinear Dynamics 77(7): 399–411] proposed a three-party key agreement protocol by using the extended chaotic maps. They claimed that their protocol could achieve strong security. In the present paper, we analyze Farash et al.’s protocol and point out that this protocol is vulnerable to off-line password guessing attack and suffers communication burden. To handle the issue, we propose an efficient three-party password-based key agreement protocol using extended chaotic maps, which uses neither symmetric cryptosystems nor the server’s public key. Compared with the relevant schemes, our protocol provides better performance in terms of computation and communication. Therefore, it is suitable for practical applications. (paper)

  12. Validation of IT-based Data Communication Protocol for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Jeong, K. I.; Kim, D. H.; Lee, J. C.

    2009-12-01

    The communication network designed to transmit control and processing signals in digital Instrument and Control (I and C) systems in Nuclear Power Plant (NPP), should provide a high level of safety and reliability. There are different features between the communication networks of NPPs and other commercial communication networks. Safety and reliability are the most important factors in the communication networks of an NPP rather than efficiency which are important factors of a commercial communication network design. To develop Data Communication Protocol for Nuclear Power Plant, We analyze the design criteria and performance requirements of existing commercial communication protocols based on Information Technology(IT). And also, we examine the adaptability to the communication protocol of an NPP. Based on these results, we developed our own protocol(Nuclear power plant Safety Communication Protocol : NSCP) for NPP I and C, which meet the required specifications through design overall protocol architecture and data frame format, definition of functional requirements and specifications. NSCP is the communication protocol designed for a safety-grade control network in the nuclear power plant. In this report, we had specified NSCP protocol by FDT(Formal Description Technique) and established validation procedures based on the validation methodology. It was confirmed specification error, major function's validity and reachability of NSCP by performing simulation and the validation process using Telelogic Tau tool

  13. Occurrence of endophytic fungi causing recalcitrance of olive cultivar ‘Istrska belica’ during shoot culture establishment

    Directory of Open Access Journals (Sweden)

    Oražem Petra

    2016-01-01

    Full Text Available The primary aim of this study was to establish a micropropagation procedure for the Slovenian frost-tolerant olive cultivar ‘Istrska belica’. Establishing an in vitro culture was very difficult due to constant contaminations, tissue browning and stunted shoot growth. A sterile shoot culture was finally achieved by washing with running tap water, immersing in a mixture of ascorbic and citric acid and sterilizing with 70% ethanol and dichloroisocyanuric acid. Shoot growth was optimal on DKW medium supplemented with 4 mg/L of 2iP. Even in optimized conditions, sporadic fungal outbursts occurred. Fungi were isolated and their taxonomic origin was determined by morphological observation and molecular identification. Based on BLAST queries in the NCBI database, five genera of fungi were identified: Cladosporium, Chaetomium, Preussia, Biscogniauxia and Sistotrema, the last three genera being isolated from olives for the first time. A detailed literature search was performed to provide data on previous reports of these genera in relation to their putative endophytic presence and their possible pathogenic status. This is the first study reporting the presence of endophytic fungi in olive tissue culture. The information provided in this work can be very useful for the optimization of micropropagation protocols of recalcitrant olive cultivars and can potentially improve field performance of nursery plants.

  14. Effective Protocols for Mobile Communications and Networking

    Energy Technology Data Exchange (ETDEWEB)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  15. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  16. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...... of formal protocol verification. Verification, however, is usually carried out on an abstract model not at all related with a protocol’s implementation. Experience shows that security breaches introduced in implementations of successfully verified models are rather common. The χ-Spaces framework...... is an implementation of SPL (Security Protocol Language), a formal model for studying security protocols. In this paper we discuss the use of χ-Spaces as a tool for developing robust security protocol implementations. To make the case, we take a family of key-translation protocols due to Woo and Lam and show how χ...

  17. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...... called SPS (Security Protocol Specification) language, that enables users, without requiring deep expertise in formal models from them, to specify a wide range of real-world protocols in a simple and intuitive way. Thus, SPS allows users to verify their protocols using different tools, and generate...

  18. A Secure and Effective Anonymous Integrity Checking Protocol for Data Storage in Multicloud

    Directory of Open Access Journals (Sweden)

    Lingwei Song

    2015-01-01

    Full Text Available How to verify the integrity of outsourced data is an important problem in cloud storage. Most of previous work focuses on three aspects, which are providing data dynamics, public verifiability, and privacy against verifiers with the help of a third party auditor. In this paper, we propose an identity-based data storage and integrity verification protocol on untrusted cloud. And the proposed protocol can guarantee fair results without any third verifying auditor. The theoretical analysis and simulation results show that our protocols are secure and efficient.

  19. Repeat immigration: A previously unobserved source of heterogeneity?

    Science.gov (United States)

    Aradhya, Siddartha; Scott, Kirk; Smith, Christopher D

    2017-07-01

    Register data allow for nuanced analyses of heterogeneities between sub-groups which are not observable in other data sources. One heterogeneity for which register data is particularly useful is in identifying unique migration histories of immigrant populations, a group of interest across disciplines. Years since migration is a commonly used measure of integration in studies seeking to understand the outcomes of immigrants. This study constructs detailed migration histories to test whether misclassified migrations may mask important heterogeneities. In doing so, we identify a previously understudied group of migrants called repeat immigrants, and show that they differ systematically from permanent immigrants. In addition, we quantify the degree to which migration information is misreported in the registers. The analysis is carried out in two steps. First, we estimate income trajectories for repeat immigrants and permanent immigrants to understand the degree to which they differ. Second, we test data validity by cross-referencing migration information with changes in income to determine whether there are inconsistencies indicating misreporting. From the first part of the analysis, the results indicate that repeat immigrants systematically differ from permanent immigrants in terms of income trajectories. Furthermore, income trajectories differ based on the way in which years since migration is calculated. The second part of the analysis suggests that misreported migration events, while present, are negligible. Repeat immigrants differ in terms of income trajectories, and may differ in terms of other outcomes as well. Furthermore, this study underlines that Swedish registers provide a reliable data source to analyze groups which are unidentifiable in other data sources.

  20. Serratia liquefaciens Infection of a Previously Excluded Popliteal Artery Aneurysm

    Directory of Open Access Journals (Sweden)

    A. Coelho

    Full Text Available : Introduction: Popliteal artery aneurysms (PAAs are rare in the general population, but they account for nearly 70% of peripheral arterial aneurysms. There are several possible surgical approaches including exclusion of the aneurysm and bypass grafting, or endoaneurysmorrhaphy and interposition of a prosthetic conduit. The outcomes following the first approach are favorable, but persistent blood flow in the aneurysm sac has been documented in up to one third of patients in the early post-operative setting. Complications from incompletely excluded aneurysms include aneurysm enlargement, local compression symptoms, and sac rupture. Notably infection of a previously excluded and bypassed PAA is rare. This is the third reported case of PAA infection after exclusion and bypass grafting and the first due to Serratia liquefaciens. Methods: Relevant medical data were collected from the hospital database. Results: This case report describes a 54 year old male patient, diagnosed with acute limb ischaemia due to a thrombosed PAA, submitted to emergency surgery with exclusion and venous bypass. A below the knee amputation was necessary 3 months later. Patient follow-up was lost until 7 years following surgical repair, when he was diagnosed with aneurysm sac infection with skin fistulisation. He had recently been diagnosed with alcoholic hepatic cirrhosis Child–Pugh Class B. The patient was successfully treated by aneurysm resection, soft tissue debridement and systemic antibiotics. Conclusion: PAA infection is a rare complication after exclusion and bypass procedures but should be considered in any patient with evidence of local or systemic infection. When a PAA infection is diagnosed, aneurysmectomy, local debridement, and intravenous antibiotic therapy are recommended. The “gold standard” method of PAA repair remains controversial. PAA excision or endoaneurysmorrhaphy avoids complications from incompletely excluded aneurysms, but is associated with

  1. Human stool contains a previously unrecognized diversity of novel astroviruses

    Directory of Open Access Journals (Sweden)

    Zhao Guoyan

    2009-10-01

    Full Text Available Abstract Human astroviruses are a leading cause of gastrointestinal disease. Since their discovery in 1975, 8 closely related serotypes have been described in humans, and more recently, two new astrovirus species, astrovirus MLB1 and astrovirus VA1, were identified in diarrhea patients. In this study, we used consensus astrovirus primers targeting the RNA polymerase to define the diversity of astroviruses present in pediatric patients with diarrhea on two continents. From 416 stool specimens comprising two different cohorts from Vellore, India, 35 samples were positive. These positive samples were analyzed further by either sequencing of the ~400 bp amplicon generated by the consensus PCR or by performing additional RT-PCR specific for individual astroviruses. 19 samples contained the classic human astrovirus serotypes 1-8 while 7 samples were positive for the recently described astrovirus MLB1. Strikingly, from samples that were positive in the consensus PCR screen but negative in the specific PCR assays, five samples contained sequences that were highly divergent from all previously described astroviruses. Sequence analysis suggested that three novel astroviruses, tentatively named astroviruses VA2, MLB2 and VA3, were present in these five patient specimens (AstV-VA2 in 2 patients, AstV-MLB2 in 2 patients and AstV-VA3 in one patient. Using the same RT-PCR screening strategy, 13 samples out of 466 tested stool specimens collected in St. Louis, USA were positive. Nine samples were positive for the classic human astroviruses. One sample was positive for AstV-VA2, and 3 samples were positive for AstV-MLB2 demonstrating that these two viruses are globally widespread. Collectively, these findings underscore the tremendous diversity of astroviruses present in fecal specimens from diarrhea patients. Given that a significant fraction of diarrhea etiologies is currently unknown, it is plausible that these or other yet unrecognized astroviruses may be

  2. Sacrococcygeal pilonidal disease: analysis of previously proposed risk factors

    Directory of Open Access Journals (Sweden)

    Ali Harlak

    2010-01-01

    Full Text Available PURPOSE: Sacrococcygeal pilonidal disease is a source of one of the most common surgical problems among young adults. While male gender, obesity, occupations requiring sitting, deep natal clefts, excessive body hair, poor body hygiene and excessive sweating are described as the main risk factors for this disease, most of these need to be verified with a clinical trial. The present study aimed to evaluate the value and effect of these factors on pilonidal disease. METHOD: Previously proposed main risk factors were evaluated in a prospective case control study that included 587 patients with pilonidal disease and 2,780 healthy control patients. RESULTS: Stiffness of body hair, number of baths and time spent seated per day were the three most predictive risk factors. Adjusted odds ratios were 9.23, 6.33 and 4.03, respectively (p<0.001. With an adjusted odds ratio of 1.3 (p<.001, body mass index was another risk factor. Family history was not statistically different between the groups and there was no specific occupation associated with the disease. CONCLUSIONS: Hairy people who sit down for more than six hours a day and those who take a bath two or less times per week are at a 219-fold increased risk for sacrococcygeal pilonidal disease than those without these risk factors. For people with a great deal of hair, there is a greater need for them to clean their intergluteal sulcus. People who engage in work that requires sitting in a seat for long periods of time should choose more comfortable seats and should also try to stand whenever possible.

  3. Gastrointestinal tolerability with ibandronate after previous weekly bisphosphonate treatment

    Directory of Open Access Journals (Sweden)

    Richard Derman

    2009-09-01

    Full Text Available Richard Derman1, Joseph D Kohles2, Ann Babbitt31Department of Obstetrics and Gynecology, Christiana Hospital, Newark, DE, USA; 2Roche, Nutley, NJ, USA; 3Greater Portland Bone and Joint Specialists, Portland, ME, USAAbstract: Data from two open-label trials (PRIOR and CURRENT of women with postmenopausal osteoporosis or osteopenia were evaluated to assess whether monthly oral and quarterly intravenous (IV ibandronate dosing improved self-reported gastrointestinal (GI tolerability for patients who had previously experienced GI irritation with bisphosphonate (BP use. In PRIOR, women who had discontinued daily or weekly BP treatment due to GI intolerance received monthly oral or quarterly IV ibandronate for 12 months. The CURRENT subanalysis included women receiving weekly BP treatment who switched to monthly oral ibandronate for six months. GI symptom severity and frequency were assessed using the Osteoporosis Patient Satisfaction Questionnaire™. In PRIOR, mean GI tolerability scores increased significantly at month 1 from screening for both treatment groups (oral: 79.3 versus 54.1; IV: 84.4 versus 51.0; p < 0.001 for both. Most patients reported improvement in GI symptom severity and frequency from baseline at all post-screening assessments (>90% at Month 10. In the CURRENT subanalysis >60% of patients reported improvements in heartburn or acid reflux and >70% indicated improvement in other stomach upset at month 6. Postmenopausal women with GI irritability with daily or weekly BPs experienced improvement in symptoms with extended dosing monthly or quarterly ibandronate compared with baseline.Keywords: ibandronate, osteoporosis, bisphosphonate, gastrointestinal

  4. Cardiopulmonary transplantation service establishment in the 1990s: Australia--a developing country?

    Science.gov (United States)

    Esmore, D; Williams, T; Bergin, P; Rosenfeldt, F; Cochrane, A; Griffiths, A; Federman, J

    1992-10-01

    1. A National Transplantation Service has been established at the Alfred Hospital performing more than 50 transplants per year. 2. Increased access to transplantation technology has facilitated an improvement in national population servicing from 2.7 to 6.2 transplants per million population per year. National funding of A$4.062 million per year has been secured. 3. Basic research into organ preservation has facilitated transcontinental organ procurement. 4. An active lung transplantation program has been established synchronous with the cardiac transplant service activities. 5. MCS program establishment has paralleled clinical transplantation activities. 6. Budget management and cost containment has been achieved through rationalisation of management protocols.

  5. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  6. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  7. INEEL AIR MODELING PROTOCOL ext

    Energy Technology Data Exchange (ETDEWEB)

    C. S. Staley; M. L. Abbott; P. D. Ritter

    2004-12-01

    Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

  8. An Experimental Protocol for Maternal Pulmonary Exposure in Developmental Toxicology

    DEFF Research Database (Denmark)

    Jackson, Petra; Lund, Søren P.; Kristiansen, Gitte

    2011-01-01

    BL/6BomTac) were anaesthetized with isoflurane and intratracheally instilled with saline containing 10% bronchoalveolar lavage (BAL) on gestation days 8, 11, 15 and 18. In addition, the early effects of the procedure were assessed in naive female mice. Control animals were not handled. Dams were......To establish a protocol for studying effects of pulmonary exposure in developmental toxicity studies, the effects of intratracheal sham instillation under short-term isoflurane anaesthesia were evaluated with a protocol including multiple instillations during gestation. Twelve time-mated mice (C57...... instillation under isoflurane anaesthesia did not induce observable effects in pregnant mice or their offspring. We suggest that this procedure can be used as a means of exposure through the airways in studies of developmental toxicity....

  9. Report on July 2015 Additional Protocol Coordinators Best Practices Workshop

    Energy Technology Data Exchange (ETDEWEB)

    Gitau, Ernest T.N. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Burbank, Roberta L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Finch, Valerie A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-07-31

    After 10 years of implementation experience, the Office of Nonproliferation and Arms Control (NPAC) within the Department of Energy/National Nuclear Security Administration (DOE/NNSA) conducted the Additional Protocol (AP) Coordinators Best Practices Workshop at Oak Ridge National Laboratory from July 29-30, 2015. The goal of this workshop was to identify implementation best practices, lessons learned, and compliance challenges from the various Additional Protocol Coordinators (APCs) at each laboratory in the DOE/NNSA complex and associated sites. The workshop provided the opportunity for participants to share their insights and establish networks that APCs can utilize to continue to discuss challenges (new and old), identify best practices, and enhance communication and coordination for reporting multi-lab research projects during review activities. Workshop participants included DOE/NNSA HQ, laboratory and site APCs, seasoned experts, members of the original implementation outreach team, and Field Element and site security representatives.

  10. Outcome of trial of scar in patients with previous caesarean section

    International Nuclear Information System (INIS)

    Khan, B.; Bashir, R.; Khan, W.

    2016-01-01

    Medical evidence indicates that 60-80% of women can achieve vaginal delivery after a previous lower segment caesarean section. Proper selection of patients for trial of scar and vigilant monitoring during labour will achieve successful maternal and perinatal outcome. The objective of our study is to establish the fact that vaginal delivery after one caesarean section has a high success rate in patients with previous one caesarean section for non-recurrent cause. Methods: The study was conducted in Ayub Teaching Abbottabad, Gynae-B Unit. All labouring patients, during the study period of five years, with previous one caesarean section and between 37 weeks to 41 weeks of gestation for a non-recurrent cause were included in the study. Data was recorded on special proforma designed for the purpose. Patients who had previous classical caesarean section, more than one caesarean section, and previous caesarean section with severe wound infection, transverse lie and placenta previa in present pregnancy were excluded. Foetal macrosomia (wt>4 kg) and severe IUGR with compromised blood flow on Doppler in present pregnancy were also not considered suitable for the study. Patients who had any absolute contraindication for vaginal delivery were also excluded. Results: There were 12505 deliveries during the study period. Total vaginal deliveries were 8790 and total caesarean sections were 3715. Caesarean section rate was 29.7%. Out of these 8790 patients, 764 patients were given a trial of scar and 535 patients delivered successfully vaginally (70%). Women who presented with spontaneous onset of labour were more likely to deliver vaginally (74.8%) as compared to induction group (27.1%). Conclusion: Trial of vaginal birth after caesarean (VBAC) in selected cases has great importance in the present era of the rising rate of primary caesarean section. (author)

  11. Reproductive compatibility between mite populations previously identified as Euseius concordis (Acari: Phytoseiidae).

    Science.gov (United States)

    Noronha, Aloyséia Cristina da Silva; de Moraes, Gilberto José

    2004-01-01

    The objective of the present research is to study the reproductive compatibility between populations of predatory mites previously identified as Euseius concordis (Chant) based on morphological characteristics. Colonies of these mite populations were established in the lab with specimens collected from different localities and host plants. Reproductive compatibility was evaluated through crosses and backcrosses within and between populations and the subsequent observation of females' oviposition, over a period of 10 days. The levels of oviposition obtained in the crosses between individuals from the same population were higher than those obtained in the crosses between individuals from different populations. Results indicate the occurrence of post-mating reproductive incompatibility between the mite population from Petrolina and the other populations studied. Crosses and backcrosses between populations involving female mites from Petrolina did not produce offspring, although endospermatophores were present inside the spermathecas of those females. Oviposition was reduced, and only sons were obtained, in crosses between populations with males from Petrolina. Crosses of females from Pontes e Lacerda and males from Jaguariúna and vice versa produced only male progeny. Our results established that the populations originating from Arroio do Meio, Pontes e Lacerda, Jaguarúna and Viçosa, are reproductively compatible. However, the latter populations and the population from Petrolina are genetically isolated. Based on these results we suggest that more cytological and genetic studies are needed to establish if this reproductive isolation represents a species barrier.

  12. EMS Adherence to a Pre-hospital Cervical Spine Clearance Protocol

    Directory of Open Access Journals (Sweden)

    Johnson, David

    2001-10-01

    Full Text Available Purpose: To determine the degree of adherence to a cervical spine (c-spine clearance protocol by pre-hospital Emergency Medical Services (EMS personnel by both self-assessment and receiving hospital assessment, to describe deviations from the protocol, and to determine if the rate of compliance by paramedic self-assessment differed from receiving hospital assessment. Methods: A retrospective sample of pre-hospital (consecutive series and receiving hospital (convenience sample assessments of the compliance with and appropriateness of c-spine immobilization. The c-spine clearance protocol was implemented for Orange County EMS just prior to the April-November 1999 data collection period. Results: We collected 396 pre-hospital and 162 receiving hospital data forms. From the pre-hospital data sheet. the percentage deviation from the protocol was 4.096 (16/396. Only one out of 16 cases that did not comply with the protocol was due to over immobilization (0.2%. The remaining 15 cases were under immobilized, according to protocol. Nine of the under immobilized cases (66% that should have been placed in c-spine precautions met physical assessment criteria in the protocol, while the other five cases met mechanism of injury criteria. The rate of deviations from protocol did not differ over time. The receiving hospital identified 8.0% (13/162; 6/16 over immobilized, 7/16 under immobilized of patients with deviations from the protocol; none was determined to have actual c-spine injury. Conclusion: The implementation of a pre-hospital c-spine clearance protocol in Orange County was associated with a moderate overall adherence rate (96% from the pre-hospital perspective, and 92% from the hospital perspective, p=.08 for the two evaluation methods. Most patients who deviated from protocol were under immobilized, but no c-spine injuries were missed. The rate of over immobilization was better than previously reported, implying a saving of resources.

  13. Optical protocols for terabit networks

    Science.gov (United States)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  14. A Modern Approach to Water Management: The UNECE Protocol on Water and Health

    Directory of Open Access Journals (Sweden)

    Francesca Bernardini

    2007-09-01

    Full Text Available The Protocol on Water and Health to the Convention on the Protection and Use of Transboundary Watercourses and International Lakes entered into force in August 2005. It is jointly serviced by the Regional Office for Europe of the World Health Organisation and the United Nations Economic Commission for Europe. The main aim of the Protocol is to protect human health and well-being by better water management, including the protection of water ecosystems, and by preventing, controlling and reducing water-related diseases. The Protocol recognises that engaging in intersectoral partnerships and increased coordination greatly enhances sustainable development. It is closely linked to the Millenium Development Goals (MDGs, more particularly, the Protocol offers a platform to go beyond MDG target 10, since its final objective is to grant access to drinking water and sanitation to everybody. The Protocol takes into account differences in health, environmental and economic conditions in the region, and gives State Parties the freedom to establish their priorities tailored to their specific situations. Moreover the Protocol displays innovative features of modern environmental law: It provides for the establishment of a mechanism for review of compliance of a non-confrontational, non-judicial and consultative nature which will significantly increase its effectiveness; It includes provisions for international cooperation and international support for national action to support its implementation. This article reviews the decisions taken by the Protocol's Parties at their first meeting in January 2007 which set the future direction of work and establish the institutional architecture of the Protocol.

  15. An Energy-Efficient Link Layer Protocol for Reliable Transmission over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Iqbal Adnan

    2009-01-01

    Full Text Available In multihop wireless networks, hop-by-hop reliability is generally achieved through positive acknowledgments at the MAC layer. However, positive acknowledgments introduce significant energy inefficiencies on battery-constrained devices. This inefficiency becomes particularly significant on high error rate channels. We propose to reduce the energy consumption during retransmissions using a novel protocol that localizes bit-errors at the MAC layer. The proposed protocol, referred to as Selective Retransmission using Virtual Fragmentation (SRVF, requires simple modifications to the positive-ACK-based reliability mechanism but provides substantial improvements in energy efficiency. The main premise of the protocol is to localize bit-errors by performing partial checksums on disjoint parts or virtual fragments of a packet. In case of error, only the corrupted virtual fragments are retransmitted. We develop stochastic models of the Simple Positive-ACK-based reliability, the previously-proposed Packet Length Optimization (PLO protocol, and the SRVF protocol operating over an arbitrary-order Markov wireless channel. Our analytical models show that SRVF provides significant theoretical improvements in energy efficiency over existing protocols. We then use bit-error traces collected over different real networks to empirically compare the proposed and existing protocols. These experimental results further substantiate that SRVF provides considerably better energy efficiency than Simple Positive-ACK and Packet Length Optimization protocols.

  16. Tubal anastomosis after previous sterilization: a systematic review.

    Science.gov (United States)

    van Seeters, Jacoba A H; Chua, Su Jen; Mol, Ben W J; Koks, Carolien A M

    2017-05-01

    Female sterilization is one of the most common contraceptive methods. A small number of women, however, opt for reversal of sterilization procedures after they experience regret. Procedures can be performed by laparotomy or laparoscopy, with or without robotic assistance. Another commonly utilized alternative is IVF. The choice between surgery and IVF is often influenced by reimbursement politics for that particular geographic location. We evaluated the fertility outcomes of different surgical methods available for the reversal of female sterilization, compared these to IVF and assessed the prognostic factors for success. Two search strategies were employed. Firstly, we searched for randomized and non-randomized clinical studies presenting fertility outcomes of sterilization reversal up to July 2016. Data on the following outcomes were collected: pregnancy rate, ectopic pregnancy rate, cost of the procedure and operative time. Eligible study designs included prospective or retrospective studies, randomized controlled trials, cohort studies, case-control studies and case series. No age restriction was applied. Exclusion criteria were patients suffering from tubal infertility from any other reason (e.g. infection, endometriosis and adhesions from previous surgery) and studies including sterilization reversal procedures were then evaluated: female age, BMI and duration and method of sterilization. Secondly, we searched for randomized and non-randomized clinical studies that compared reversal of sterilization to IVF and evaluated them for pregnancy outcomes and cost effectiveness. We included 37 studies that investigated a total of 10 689 women. No randomized controlled trials were found. Most studies were retrospective cohort studies of a moderate quality. The pooled pregnancy rate after sterilization reversal was 42-69%, with heterogeneity seen from the different methods utilized. The reported ectopic pregnancy rate was 4-8%. The only prognostic factor affecting the

  17. Implant Rehabilitation Planning Protocol for the Edentulous Patient According to Denture Space, Lip Support, and Smile Line.

    Science.gov (United States)

    Lago, Laura; Rilo, Benito; Fernández-Formoso, Noelia; DaSilva, Luis

    2017-08-01

    Rehabilitation with implants is a challenge. Having previous evaluation criteria is key to establishing the best treatment for the patient. In addition to clinical and radiological aspects, the prosthetic parameters must be taken into account in the initial workup, since they allow discrimination between fixed and removable rehabilitation. We present a study protocol that analyzes three basic prosthetic aspects. First, denture space defines the need to replace teeth, tissue, or both. Second, lip support focuses on whether or not to include a flange. Third, the smile line warns of potential risks in esthetic rehabilitation. Combining these parameters allows us to make a decision as to the most suitable type of prosthesis. The proposed protocol is useful for assessing the prosthetic parameters that influence decision making as to the best-suited type of restoration. From this point of view, we think it is appropriate for the initial approach to the patient. In any case, other considerations of study may amend the proposal. © 2016 by the American College of Prosthodontists.

  18. Estimation of radiation exposure for brain perfusion CT: standard protocol compared with deviations in protocol.

    Science.gov (United States)

    Hoang, Jenny K; Wang, Chu; Frush, Donald P; Enterline, David S; Samei, Ehsan; Toncheva, Greta; Lowry, Carolyn; Yoshizumi, Terry T

    2013-11-01

    The purpose of this study was to measure the organ doses and estimate the effective dose for the standard brain perfusion CT protocol and erroneous protocols. An anthropomorphic phantom with metal oxide semiconductor field effect transistor (MOSFET) detectors was scanned on a 64-MDCT scanner. Protocol 1 used a standard brain perfusion protocol with 80 kVp and fixed tube current of 200 mA. Protocol 2 used 120 kVp and fixed tube current of 200 mA. Protocol 3 used 120 kVp with automatic tube current modulation (noise index, 2.4; minimum, 100 mA; maximum, 520 mA). Compared with protocol 1, the effective dose was 2.8 times higher with protocol 2 and 7.8 times higher with protocol 3. For all protocols, the peak dose was highest in the skin, followed by the brain and calvarial marrow. Compared with protocol 1, the peak skin dose was 2.6 times higher with protocol 2 and 6.7 times higher with protocol 3. The peak skin dose for protocol 3 exceeded 3 Gy. The ocular lens received significant scatter radiation: 177 mGy for protocol 2 and 435 mGy for protocol 3, which were 4.6 and 11.3 times the dose for protocol 1, respectively. Compared with the standard protocol, erroneous protocols of increasing the tube potential from 80 kVp to 120 kVp will lead to a three- to fivefold increase in organ doses, and concurrent use of high peak kilovoltage with incorrectly programmed tube current modulation can increase dose to organs by 7- to 11-fold. Tube current modulation with a low noise index can lead to doses to the skin and ocular lens that are close to thresholds for tissue reactions.

  19. Protocol for the quantification of greenhouse gas emissions from waste management activities

    International Nuclear Information System (INIS)

    2013-10-01

    The Waste Sector GHG Protocol is intended to provide guidelines for calculating and reporting greenhouse gas (GHG) emissions associated with a waste management service, over a specific time period (usually one year) and based on simple operational data. The Protocol itself has evolved with time, going through 4 version updates. The different versions correspond to evolutions initiated by the original Entreprises pour l'Environnement Working Group (Seche Environnement, Suez Environnement and Veolia Environnement) but also to the suggestions and feedback provided by several waste associations that have reviewed and commented on the Protocol. As a result, several worldwide associations have validated and used the Protocol for their own greenhouse gas inventories. The version 5 of the Waste Sector GHG Protocol has received the 'Built on the GHG Protocol' label. With such label, the Waste Sector Protocol reinforces its desire to be the reference tool for the waste sector by ensuring its users of a total and transparent coherence and conformity with the GHG Protocol Corporate Standard's requirements. The Protocol is also available on the following web page: http://www.ghgprotocol.org/Tools-Built-on-GHG-Protocol. The Waste Sector GHG Protocol aims at: Providing a consistent and transparent approach to quantify, report and verify GHG direct (scope 1), indirect (scope 2) and avoided emissions of waste management actors; Establishing best practice across the waste sector for the implementation of coherent and homogeneous GHG emissions inventories; Explaining waste sector's particularities in terms of GHG emissions (diffuse emission from landfills, GHG avoided emissions, carbon sequestration); Helping companies to take proper commitments and stakeholders to understand and verify those commitments. The Protocol consists of a manual with two additional documents: A 'Frequently Asked Questions' document; A 'Follow-up of modifications

  20. [Neonatal circumcision with local anesthesia. Results of a standardized protocol].

    Science.gov (United States)

    Ovalle, Alejandra; López, Pedro-Jose; Guelfand, Miguel; Zubieta, Ricardo

    2016-01-01

    Neonatal circumcision is a common procedure in the US and other countries, with low rates of complications in trained hands. However, it has recently been incorporated into the clinical environment in Chile. Our goal was to establish a local standardised protocol for neonatal circumcision under local anaesthesia, and evaluate the results and possible complications. A standardised prospective protocol was used on patients who underwent neonatal circumcision. The inclusion criteria were: children local anaesthesia and penile block, attrition of redundant prepuce and mucosa with Mogen® clamp, and section with scalpel. The protocol was used and evaluated from November 2005 to October 2014 by a paediatric surgeon and/or paediatric urologist trained in the technique. Complications and conditions until final discharge were analysed. The protocol was applied to 108 patients over a 9year period. The mean age at procedure was 9days (1-52). One patient (0.9%) had immediate bleeding, requiring further surgery. All patients were discharged from further medical checks at 1 month, without any other complications. The reason for the procedure was by parental request in 100% of the cases, and always for sociocultural reasons. Neonatal circumcision under local anaesthesia is a simple procedure, and has excellent results in selected patients, and with no major complications. With proper training, and adapting the initial protocol, it can be performed on an outpatient basis, without putting the neonates through the risks of general anaesthesia. Copyright © 2015 Sociedad Chilena de Pediatría. Publicado por Elsevier España, S.L.U. All rights reserved.