WorldWideScience

Sample records for previously proposed protocols

  1. The HPA photon protocol and proposed electron protocol

    International Nuclear Information System (INIS)

    Pitchford, W.G.

    1985-01-01

    The Hospital Physicists Association (HPA) photon dosimetry protocol has been produced and was published in 1983. Revised values of some components of Csub(lambda) and refinements introduced into the theory in the last few years have enabled new Csub(lambda) values to be produced. The proposed HPA electron protocol is at present in draft form and will be published shortly. Both protocels are discussed. (Auth.)

  2. Sacrococcygeal pilonidal disease: analysis of previously proposed risk factors

    Directory of Open Access Journals (Sweden)

    Ali Harlak

    2010-01-01

    Full Text Available PURPOSE: Sacrococcygeal pilonidal disease is a source of one of the most common surgical problems among young adults. While male gender, obesity, occupations requiring sitting, deep natal clefts, excessive body hair, poor body hygiene and excessive sweating are described as the main risk factors for this disease, most of these need to be verified with a clinical trial. The present study aimed to evaluate the value and effect of these factors on pilonidal disease. METHOD: Previously proposed main risk factors were evaluated in a prospective case control study that included 587 patients with pilonidal disease and 2,780 healthy control patients. RESULTS: Stiffness of body hair, number of baths and time spent seated per day were the three most predictive risk factors. Adjusted odds ratios were 9.23, 6.33 and 4.03, respectively (p<0.001. With an adjusted odds ratio of 1.3 (p<.001, body mass index was another risk factor. Family history was not statistically different between the groups and there was no specific occupation associated with the disease. CONCLUSIONS: Hairy people who sit down for more than six hours a day and those who take a bath two or less times per week are at a 219-fold increased risk for sacrococcygeal pilonidal disease than those without these risk factors. For people with a great deal of hair, there is a greater need for them to clean their intergluteal sulcus. People who engage in work that requires sitting in a seat for long periods of time should choose more comfortable seats and should also try to stand whenever possible.

  3. Proposed protocols for peripheral and renal Doppler

    International Nuclear Information System (INIS)

    Fonseca Portuguez, Adriana

    2009-01-01

    A literature review was performed in order to prepare a summary of the important concepts of Doppler and applications in peripheral vascular evaluation and renal. The normal characteristics are summarized and explained in each vascular system and diagnostic criteria of the disorders frequently encountered in practice. Requested more studies have been identified and proposed protocols and report sheets have been developed to standardize the methodology of realization of several Doppler studies. The variability between operators has been treated to reduce as much as possible and follow-up studies have provided in patients who need. (author) [es

  4. A PROPOSED MAPPING ARCHITECTURE BETWEEN IAX AND JINGLE PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Hadeel Saleh Haj Aliwi

    2016-03-01

    Full Text Available Nowadays, multimedia communication has improved rapidly to allow people to communicate via the Internet. However, Internet users cannot communicate with each other unless they use the same chatting applications since each chatting application uses a certain signaling protocol to make the media call. The mapping architecture is a very critical issue since it solves the communication problems between any two protocols, as well as it enables people around the world to make a voice/video call even if they use different chatting applications. Providing the interoperability between different signaling protocols and multimedia applications takes the advantages of more than one protocol. Many mapping architectures have been proposed to ease exchanging the media between at least two users without facing any difficulties such as SIP-Jingle, IAX-RSW, H.323-MGCP, etc. However, the design of any of the existing mapping architectures has some weaknesses related to larger delay, time consuming, and security matters. The only way to overcome these problems is to propose an efficient mapping architecture. This paper proposed a new mapping architecture between Inter-Asterisk eXchange Protocol and Jingle Protocol. The proposed mapping architecture consists of IAX domain (IAX client, IAX server, IAX-to-Jingle gateway, and Jingle domain (Jingle client, Jingle server, Jingle-to-IAX gateway. The tasks of the translation gateways are represented by the URI conversion, media capability exchange, translator of call setup and teardown signals, and real time media transmission.

  5. The studsvik BNCT project: structure and the proposed protocols

    International Nuclear Information System (INIS)

    Capala, J.; Stenstam, B.H.; Skoeld, K.; Henriksson, R.; Salford, L.; Carlsson, J.

    2000-01-01

    The BNCT facility at Studsvik is now ready for clinical trials. Scientific operations of the Studsvik BNCT project are overseen by the Scientific Advisory Board comprised of representatives of all major universities in Sweden. Furthermore, special task groups for clinical and preclinical studies have been formed to facilitate collaboration with academia and to assure the quality of the research. Proposed clinical Phase II trials for glioblastoma are sponsored by the Swedish National Neuro-Oncology Group and, initially, will involve two protocols: Protocol no.1. BNCT for glioblastoma patients who have not received any therapy other than surgery (including stereotactic biopsy only). Protocol no.2. BNCT as a palliative treatment for patients with recurrent glioblastoma following conventional therapies or BNCT. In both protocols, BPA, administered by a 6 hour i.v. infusion, will be used as the boron delivery agent. (author)

  6. Quantum Strategies: Proposal to Experimentally Test a Quantum Economics Protocol

    Science.gov (United States)

    2009-04-09

    protocols can add security to competitive situations; and analyzing the feasibility of running multi-party quantum games over metro-distance optical... games of complete informa- tion. Physics Letters A, 272:291-303, August 2000. [21] D. A. Meyer. Quantum Communication in Games . In S. M. Barnett, E ...feasibility of quantum games , we proposed to implement a proof-of-principle quantum public goods game , and to experimentally demonstrate that the quantum

  7. A proposed protocol for remote control of automated assessment devices

    International Nuclear Information System (INIS)

    Kissock, P.S.; Pritchard, D.A.

    1996-01-01

    Systems and devices that are controlled remotely are becoming more common in security systems in the US Air Force and other government agencies to provide protection of valuable assets. These systems reduce the number of needed personnel while still providing a high level of protection. However, each remotely controlled device usually has its own communication protocol. This limits the ability to change devices without changing the system that provides the communications control to the device. Sandia is pursuing a standard protocol that can be used to communicate with the different devices currently in use, or may be used in the future, in the US Air Force and other government agencies throughout the security community. Devices to be controlled include intelligent pan/tilt mounts, day/night video cameras, thermal imaging cameras, and remote data processors. Important features of this protocol include the ability to send messages of varying length, identify the sender, and more importantly, control remote data processors. This paper describes the proposed public domain protocol, features, and examples of use. The authors hope to elicit comments from security technology developers regarding format and use of remotely controlled automated assessment devices

  8. [Comparison of the present and previously used protocol of risk stratification in children with acute lymphoblastic leukemia].

    Science.gov (United States)

    Glodkowska, Eliza; Bialas, Agnieszka; Jackowska, Teresa

    2007-01-01

    Acute lymphoblastic leukaemia (ALL) is one of the most common cancers in children. In Poland, since November 2002 a new protocol of risk stratification has been recommended for assessment of risk factors and for choosing therapy regimens. assessment of accuracy of protocol ALL-IC 2002 in comparison to previously used risk stratification protocols. ALL was diagnosed in 100 children (44 girls, 56 boys; 1-18 years of age) in the Department of Pediatric Hematology and Oncology, Warsaw Medical University, over the period from November 2002 to November 2006. According to the ALL-IC 2002 protocol the patients were divided into three risk groups: SR-standard, IR-intermediate and HR-high. The stratification was by age, leukocyte count, cytogenetic changes, early response to prednisone therapy and bone marrow remission. In the previously used risk stratification protocols-BFM-90, only hepatosplenomegaly and the number of blasts in peripheral blood (PB) were considered, and the patients were divided into three risk groups: low (LRG1.2). out of the 100 patients qualified for treatment regimens according to the ALL-IC 2002 protocol, 97 entered remission, 11 died and 3 had a relapse. Under the ALL-IC 2002 protocol these children were stratified into the following groups: SR-31%, IR-44% and HR-25%. In the previously used stratification, there would be 26% children in low, 46% in the medium and 28% in the high risk group. According to the BFM-90 protocol 18/31 (58%) and 16/44 (36%) patients from the SR and IR groups respectively would be given more intensive treatment. On the other hand 11/44 (25%) and 14/25 (56%) patients from the IR and HR groups respectively would be given less intensive treatment. 1. ALL-IC 2002 protocol in comparison with the previously used protocol BFM-90, changes the qualification of children with ALL for the SR, IR and HR risk groups. This is linked to basic change of treatment protocol, adequate to severity of disease. 2. Children with ALL qualified

  9. PROPOSAL OF GUIDELINE FOR CLINICAL TRIAL PROTOCOLS WITH HERBAL DRUGS

    Directory of Open Access Journals (Sweden)

    Migdacelys Arboláez Estrada.

    2007-04-01

    Full Text Available SUMMARYCuba has extensive experience about herbal drugs, however only a few products get to the clinical phase of drug development. Our objective was to design new guidelines for clinical trials with herbal drugs.A detailed bibliographic search about regulatory aspects about clinical trials in Cuba and the world was done for development of the guideline. The guideline's proposed format includes: 1 Index, including the classification of the content. 2 Summary, 3 Fifteen chapters, related to the clinical trials. The guideline also propose the inclusion of annexes.A new guideline containing 15 chapters allows for writing more clear and detailed clinical trial protocols. The guideline contains the information required to guide the research staff who is interested in the validation of herbal drugs pharmacological activations from the perspective of clinical trials. RESUMEN Cuba tiene experiencia extensa sobre plantas medicinales, aunque solo algunos productos llegan a una fase clínica del desarrollo. Nuestro objetivo fué diseñar una nueva guía para ensayos clínicos con plantas medicinales.Hemos realizado una detallada búsqueda bibliográfica sobre aspectos reguladores de ensayos clínicos en Cuba y el resto del mundo para el desarrollo de la guía. El formato propuesto de la guia incluye: 1 Índice, incluyendo la clasificación de los contenidos. 2 Resumen, 3 Quince capítulos, relacionados con los ensayos clínicos. La guía también propone la inclusión de anexos.La nueva guía que contiene 15 capítulos que orientan la redacción de protocolos de ensayos clínicos más claros y más detallados. La guía contiene la información requerida para orientar al personal investigador interesado en la validación de la actividad farmacológica de las plantas medicinales desde la perspectiva de los ensayos clínicos.

  10. A PROPOSED MAPPING ARCHITECTURE BETWEEN IAX AND JINGLE PROTOCOLS

    OpenAIRE

    Hadeel Saleh Haj Aliwi; Putra Sumari

    2016-01-01

    Nowadays, multimedia communication has improved rapidly to allow people to communicate via the Internet. However, Internet users cannot communicate with each other unless they use the same chatting applications since each chatting application uses a certain signaling protocol to make the media call. The mapping architecture is a very critical issue since it solves the communication problems between any two protocols, as well as it enables people around the world to make a voice/video call eve...

  11. Conduct of a personal radiofrequency electromagnetic field measurement study: proposed study protocol.

    Science.gov (United States)

    Röösli, Martin; Frei, Patrizia; Bolte, John; Neubauer, Georg; Cardis, Elisabeth; Feychting, Maria; Gajsek, Peter; Heinrich, Sabine; Joseph, Wout; Mann, Simon; Martens, Luc; Mohler, Evelyn; Parslow, Roger C; Poulsen, Aslak Harbo; Radon, Katja; Schüz, Joachim; Thuroczy, György; Viel, Jean-François; Vrijheid, Martine

    2010-05-20

    The development of new wireless communication technologies that emit radio frequency electromagnetic fields (RF-EMF) is ongoing, but little is known about the RF-EMF exposure distribution in the general population. Previous attempts to measure personal exposure to RF-EMF have used different measurement protocols and analysis methods making comparisons between exposure situations across different study populations very difficult. As a result, observed differences in exposure levels between study populations may not reflect real exposure differences but may be in part, or wholly due to methodological differences. The aim of this paper is to develop a study protocol for future personal RF-EMF exposure studies based on experience drawn from previous research. Using the current knowledge base, we propose procedures for the measurement of personal exposure to RF-EMF, data collection, data management and analysis, and methods for the selection and instruction of study participants. We have identified two basic types of personal RF-EMF measurement studies: population surveys and microenvironmental measurements. In the case of a population survey, the unit of observation is the individual and a randomly selected representative sample of the population is needed to obtain reliable results. For microenvironmental measurements, study participants are selected in order to represent typical behaviours in different microenvironments. These two study types require different methods and procedures. Applying our proposed common core procedures in future personal measurement studies will allow direct comparisons of personal RF-EMF exposures in different populations and study areas.

  12. Proposed quality control protocol of a dual energy bone densitometer from Spanish protocol for quality control of radiology

    International Nuclear Information System (INIS)

    Saez, F.; Benito, M. A.; Collado, P.; Saez, M.

    2011-01-01

    In this paper we propose additional testing to complete the tests by the Spanish Protocol for Quality Control of Diagnostic Radiology, taking into account the particular characteristics of these units, and including these tests in the estimation of patient dose dose assessment area. There is also the possibility to independently verify the quality control tests that are done automatically.

  13. A review of imaging protocols for suspected skeletal dysplasia and a proposal for standardisation

    International Nuclear Information System (INIS)

    Watson, Sarah G.; Calder, Alistair D.; Offiah, Amaka C.; Negus, Samantha

    2015-01-01

    Expert radiology opinions are often requested to aid diagnosis of skeletal dysplasias or dysostoses, but due to variability in the imaging protocols used at different centres the views presented may be considered inadequate or incomplete resulting in diagnostic delays and increased patient and family anxiety. We propose the introduction of a standardised protocol that may be adapted in certain specific situations. (orig.)

  14. A review of imaging protocols for suspected skeletal dysplasia and a proposal for standardisation

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Sarah G. [Royal Surrey County Hospital, Department of Radiology, Surrey (United Kingdom); Calder, Alistair D. [Great Ormond Street Hospital for Children, NHS Foundation Trust, Department of Radiology, London (United Kingdom); Offiah, Amaka C. [Sheffield Children' s NHS Foundation Trust, The University of Sheffield Academic Unit of Child Health, Sheffield (United Kingdom); Negus, Samantha [St George' s Hospital, Department of Radiology, London (United Kingdom)

    2015-11-15

    Expert radiology opinions are often requested to aid diagnosis of skeletal dysplasias or dysostoses, but due to variability in the imaging protocols used at different centres the views presented may be considered inadequate or incomplete resulting in diagnostic delays and increased patient and family anxiety. We propose the introduction of a standardised protocol that may be adapted in certain specific situations. (orig.)

  15. Conduct of a personal radiofrequency electromagnetic field measurement study: proposed study protocol

    Directory of Open Access Journals (Sweden)

    Radon Katja

    2010-05-01

    Full Text Available Abstract Background The development of new wireless communication technologies that emit radio frequency electromagnetic fields (RF-EMF is ongoing, but little is known about the RF-EMF exposure distribution in the general population. Previous attempts to measure personal exposure to RF-EMF have used different measurement protocols and analysis methods making comparisons between exposure situations across different study populations very difficult. As a result, observed differences in exposure levels between study populations may not reflect real exposure differences but may be in part, or wholly due to methodological differences. Methods The aim of this paper is to develop a study protocol for future personal RF-EMF exposure studies based on experience drawn from previous research. Using the current knowledge base, we propose procedures for the measurement of personal exposure to RF-EMF, data collection, data management and analysis, and methods for the selection and instruction of study participants. Results We have identified two basic types of personal RF-EMF measurement studies: population surveys and microenvironmental measurements. In the case of a population survey, the unit of observation is the individual and a randomly selected representative sample of the population is needed to obtain reliable results. For microenvironmental measurements, study participants are selected in order to represent typical behaviours in different microenvironments. These two study types require different methods and procedures. Conclusion Applying our proposed common core procedures in future personal measurement studies will allow direct comparisons of personal RF-EMF exposures in different populations and study areas.

  16. Interventional management of low-flow priapism: A protocol proposal

    Directory of Open Access Journals (Sweden)

    Herney Andrés García-Perdomo

    2018-01-01

    Full Text Available Priapism is an involuntary prolonged erection that lasts for more than 4 h. Although several interventions have been proposed to manage the condition, these strategies are based on expert panel opinions, and little evidence exists regarding prognosis and outcomes. To synthetize information about interventions to treat priapism and to make evidence-based recommendations, we performed a literature search of Medline via Ovid, Scopus (including Embase and Lilacs from 1980 to the current day with the following keywords: ischemic priapism, erectile function, drainage, and shunt. The length of the ischemic priapism is an important variable for the prognosis because of the pathophysiology of this condition. Here, we propose a step-by-step approach based on the time and invasiveness of the intervention. However, it is important to note that we could not find any clinical trial that supports this approach, and more research is needed for the future statements.

  17. Comment on a proposed draft protocol for the European Convention on Biomedicine relating to research on the human embryo and fetus.

    Science.gov (United States)

    Lebech, M M

    1998-01-01

    Judge Christian Byk renders service to the Steering Committee on Bioethics of the Council of Europe (CDBI) by proposing a draft of the protocol destined to fill in a gap in international law on the status of the human embryo. This proposal, printed in a previous issue of the Journal of Medical Ethics deserves nevertheless to be questioned on important points. Is Christian Byk proposing to legalise research on human embryos not only in vitro but also in utero? PMID:9800592

  18. Comment on a proposed draft protocol for the European Convention on Biomedicine relating to research on the human embryo and fetus.

    OpenAIRE

    Lebech, M M

    1998-01-01

    Judge Christian Byk renders service to the Steering Committee on Bioethics of the Council of Europe (CDBI) by proposing a draft of the protocol destined to fill in a gap in international law on the status of the human embryo. This proposal, printed in a previous issue of the Journal of Medical Ethics deserves nevertheless to be questioned on important points. Is Christian Byk proposing to legalise research on human embryos not only in vitro but also in utero?

  19. Comment on a proposed draft protocol for the European Convention on Biomedicine relating to research on the human embryo and foetus

    OpenAIRE

    Lebech, Mette

    1998-01-01

    Judge Christian Byk renders service to the Steering Committee on Bioethics of the Council ofEurope (CDBI) by proposing a draft of the protocol destined to fill in a gap in international law on the status of the human embryo. This proposal, printed in a previous issue of the Journal of Medical Ethics' deserves nevertheless to be questioned on important points. Is Christian Byk proposing to legalise research on human embryos not only in vitro but also in utero?

  20. [Professional divers: analysis of critical issues and proposal of a health protocol for work fitness].

    Science.gov (United States)

    Pedata, Paola; Corvino, Anna Rita; Napolitano, Raffaele Carmine; Garzillo, Elpidio Maria; Furfaro, Ciro; Lamberti, Monica

    2016-01-20

    From many years now, thanks to the development of modern diving techniques, there has been a rapid spread of diving activities everywhere. In fact, divers are ever more numerous both among the Armed Forces and civilians who dive for work, like fishing, biological research and archeology. The aim of the study was to propose a health protocol for work fitness of professional divers keeping in mind the peculiar work activity, existing Italian legislation that is almost out of date and the technical and scientific evolution in this occupational field. We performed an analysis of the most frequently occurring diseases among professional divers and of the clinical investigation and imaging techniques used for work fitness assessment of professional divers. From analysis of the health protocol recommended by D.M. 13 January 1979 (Ministerial Decree), that is most used by occupational health physician, several critical issues emerged. Very often the clinical investigation and imaging techniques still used are almost obsolete, ignoring the execution of simple and inexpensive investigations that are more useful for work fitness assessment. Considering the out-dated legislation concerning diving disciplines, it is necessary to draw up a common health protocol that takes into account clinical and scientific knowledge and skills acquired in this area. This protocol's aim is to propose a useful tool for occupational health physicians who work in this sector.

  1. New Regional and Global HFC Projections and Effects of National Regulations and Montreal Protocol Amendment Proposals

    Science.gov (United States)

    Velders, G. J. M.

    2015-12-01

    Hydrofluorocarbons (HFCs) are used as substitutes for ozone-depleting substances that are being phased out globally under Montreal Protocol regulations. New global scenarios of HFC emissions reach 4.0-5.3 GtCO2-eq yr-1 in 2050, which corresponds to a projected growth from 2015 to 2050 which is 9% to 29% of that for CO2 over the same time period. New baseline scenarios are formulated for 10 HFC compounds, 11 geographic regions, and 13 use categories. These projections are the first to comprehensively assess production and consumption of individual HFCs in multiple use sectors and geographic regions with emission estimates constrained by atmospheric observations. In 2050, in percent of global HFC emissions, China (~30%), India and the rest of Asia (~25%), Middle East and northern Africa (~10%), and USA (~10%) are the principal source regions; and refrigeration and stationary air conditioning are the major use sectors. National regulations to limit HFC use have been adopted recently in the European Union, Japan and USA, and four proposals have been submitted in 2015 to amend the Montreal Protocol to substantially reduce growth in HFC use. Calculated baseline emissions are reduced by 90% in 2050 by implementing the North America Montreal Protocol amendment proposal. Global adoption of technologies required to meet national regulations would be sufficient to reduce 2050 baseline HFC consumption by more than 50% of that achieved with the North America proposal for most developed and developing countries. The new HFC scenarios and effects of national regulations and Montreal Protocol amendment proposals will be presented.

  2. Treatment of peri-implant diseases: a review of the literature and protocol proposal.

    Science.gov (United States)

    Armas, Joshé; Culshaw, Shauna; Savarrio, Lee

    2013-01-01

    Over 100,000 implants were placed in the UK in 2010. As the numbers of patients with implant-retained prostheses increases, operators are encountering an increasing number of biological implant complications, most commonly peri-implant mucositis and peri-implantitis. The effective management of these complications is crucial to maintain patients' oral health. In particular, in contrast to common periodontal infections, some peri-implant infections may benefit from surgical intervention as a first line approach. This article reviews the literature on the treatment options for peri-implant mucositis and peri-implantitis and proposes a protocol for their treatment.

  3. Neuroimaging for non-accidental head injury in childhood: A proposed protocol

    International Nuclear Information System (INIS)

    Jaspan, T.; Griffiths, P.D.; McConachie, N.S.; Punt, J.A.G.

    2003-01-01

    Non-accidental head injury (NAHI) is a major cause of neurological disability and death during infancy. Radiological imaging plays a crucial role in evaluating craniospinal injury, both for guiding medical management and the forensic aspects of abusive trauma. The damage sustained is varied, complex and may be accompanied by an evolving pattern of brain injury secondary to a cascade of metabolic and physiological derangements. Regrettably, many cases are poorly or incompletely evaluated leading to diagnostic errors and difficulties in executing subsequent child care or criminal proceedings. It is evident, from cases referred to the authors, that imaging protocols for NAHI are lacking (or only loosely adhered to, if present) in many centres throughout the U.K. Future research in this field will also be hampered if there is a lack of consistent and reliable radiological data. There is no nationally agreed protocol for imaging NAHI. We propose such a protocol, based upon a wide experience in the medical management of child abuse and extensive involvement in the medicolegal aspects of NAHI. Jaspan, T., et al. (2003). Clinical Radiology58, 44--53

  4. Neuroimaging for non-accidental head injury in childhood: A proposed protocol

    Energy Technology Data Exchange (ETDEWEB)

    Jaspan, T.; Griffiths, P.D.; McConachie, N.S.; Punt, J.A.G

    2003-01-01

    Non-accidental head injury (NAHI) is a major cause of neurological disability and death during infancy. Radiological imaging plays a crucial role in evaluating craniospinal injury, both for guiding medical management and the forensic aspects of abusive trauma. The damage sustained is varied, complex and may be accompanied by an evolving pattern of brain injury secondary to a cascade of metabolic and physiological derangements. Regrettably, many cases are poorly or incompletely evaluated leading to diagnostic errors and difficulties in executing subsequent child care or criminal proceedings. It is evident, from cases referred to the authors, that imaging protocols for NAHI are lacking (or only loosely adhered to, if present) in many centres throughout the U.K. Future research in this field will also be hampered if there is a lack of consistent and reliable radiological data. There is no nationally agreed protocol for imaging NAHI. We propose such a protocol, based upon a wide experience in the medical management of child abuse and extensive involvement in the medicolegal aspects of NAHI. Jaspan, T., et al. (2003). Clinical Radiology58, 44--53.

  5. A proposed protocol for hand and table sanitizing in chiropractic clinics and education institutions

    Science.gov (United States)

    Evans, Marion Willard; Ramcharan, Michael; Floyd, Rod; Globe, Gary; Ndetan, Harrison; Williams, Ronald; Ivie, Ronald

    2009-01-01

    Abstract Objective By nature, chiropractic is a hands-on profession using manipulation applied to the joints with direct skin-to-skin contacts. Chiropractic tables are designed with a face piece to accommodate the prone patient's head in a neutral position and hand rests to allow for relaxed shoulders and upper spine so treatment is facilitated. The purpose of this article is to present a proposed guideline for hand and treatment table surface sanitizing for the chiropractic profession that is evidence-based and can easily be adopted by teaching institutions and doctors in the field. Methods A review of the chiropractic literature demonstrated that pathogenic microbes are present on treatment tables in teaching clinics at multiple facilities, yet no standardized protocols exist in the United States regarding table sanitizing and hand hygiene in chiropractic clinics or education institutions. This article reviews the scientific literature on the subject by using several search engines, databases, and specific reviews of documents pertaining to the topic including existing general guidelines. Results The literature has several existing guidelines that the authors used to develop a proposed protocol for hand and table sanitizing specific to the chiropractic profession. Recommendations were developed and are presented on hand hygiene and table sanitizing procedures that could lower the risk of infection for both clinical personnel and patients in chiropractic facilities. Conclusion This article offers a protocol for hand and table sanitizing in chiropractic clinics and education institutions. The chiropractic profession should consider adoption of these or similar measures and disseminate them to teaching clinics, institutions, and private practitioners. PMID:19646384

  6. Proposed protocol for imaging breast carcinoma patients treated with lumpectomy and radiation therapy

    International Nuclear Information System (INIS)

    Mendelson, E.B.; Bhagwanani, D.G.; Bohm-Velez, M.; Rishi, U.S.

    1989-01-01

    Alterations in conservatively treated breasts have been described and include masses (hematomas, seromas), spiculated densities, architectural distortion, increased breast density and edema, skin thickening, and calcifications. Misinterpretations of these findings might result in unnecessary biopsy or delayed diagnosis of tumor recurrence. Changes after lumpectomy and radiation therapy must be evaluated within a temporal context, best defined from a careful review of sequential follow-up studies. From a review of interval studies of 110 cases of conservatively treated breast cancer during a 4-year period, the chronology of findings after lumpectomy and radiation therapy was determined. Of particular importance is the evolution of changes at the lumpectomy site, which was the location of the six recurrences in our series, all developing 36--48 months after surgery. Based on the sequential findings that the authors observed as well s the reported frequency of tumor recurrence over time, the authors propose a protocol for follow-up mammography and offer indications for supplemental sonography in managing patients with conservatively treated breast cancer

  7. Proposed Fuzzy-NN Algorithm with LoRaCommunication Protocol for Clustered Irrigation Systems

    Directory of Open Access Journals (Sweden)

    Sotirios Kontogiannis

    2017-11-01

    Full Text Available Modern irrigation systems utilize sensors and actuators, interconnected together as a single entity. In such entities, A.I. algorithms are implemented, which are responsible for the irrigation process. In this paper, the authors present an irrigation Open Watering System (OWS architecture that spatially clusters the irrigation process into autonomous irrigation sections. Authors’ OWS implementation includes a Neuro-Fuzzy decision algorithm called FITRA, which originates from the Greek word for seed. In this paper, the FITRA algorithm is described in detail, as are experimentation results that indicate significant water conservations from the use of the FITRA algorithm. Furthermore, the authors propose a new communication protocol over LoRa radio as an alternative low-energy and long-range OWS clusters communication mechanism. The experimental scenarios confirm that the FITRA algorithm provides more efficient irrigation on clustered areas than existing non-clustered, time scheduled or threshold adaptive algorithms. This is due to the FITRA algorithm’s frequent monitoring of environmental conditions, fuzzy and neural network adaptation as well as adherence to past irrigation preferences.

  8. Reliability of diagnostic imaging techniques in suspected acute appendicitis: proposed diagnostic protocol

    International Nuclear Information System (INIS)

    Cura del, J. L.; Oleaga, L.; Grande, D.; Vela, A. C.; Ibanez, A. M.

    2001-01-01

    To study the utility of ultrasound and computed tomography (CT) in case of suspected appendicitis. To determine the diagnostic yield in terms of different clinical contexts and patient characteristics. to assess the costs and benefits of introducing these techniques and propose a protocol for their use. Negative appendectomies, complications and length of hospital stay in a group of 152 patients with suspected appendicitis who underwent ultrasound and CT were compared with those of 180 patients who underwent appendectomy during the same time period, but had not been selected for the first group: these patients costs for each group were calculated. In the first group, the diagnostic value of the clinical signs was also evaluated. The reliability of the clinical signs was limited, while the results with ultrasound and CT were excellent. The incidence of negative appendectomy was 9.6% in the study group and 12.2% in the control group. Moreover, there were fewer complications and a shorter hospital stay in the first group. Among men, however, the rate of negative appendectomy was lower in the control group. The cost of using ultrasound and CT in the management of appendicitis was only slightly higher than that of the control group. Although ultrasound and CT are not necessary in cases in which the probability of appendicitis is low or in men presenting clear clinical evidence, the use of these techniques is indicated in the remaining cases in which appendicitis is suspected. In children, ultrasound is the technique of choice. In all other patients, if negative results are obtained with one of the two techniques, the other should be performed. (Author) 49 refs

  9. Counter-proposal: A Multi-Agent Negotiation Protocol for Resolving Resource Contention in Open Control Systems

    DEFF Research Database (Denmark)

    Sørensen, Jan Corfixen; Jørgensen, Bo Nørregaard

    2010-01-01

    The resource contention problem in control systems based on software agents occurs when agents with different goals compete with each other, to control a shared resource. In this paper we propose the counter-proposal protocol, a negotiation protocol that resolves the resource contention problem...

  10. Pediatric Renal Transplantation: Focus on Current Transition Care and Proposal of the "RISE to Transition" Protocol.

    Science.gov (United States)

    Raina, Rupesh; Wang, Joseph; Krishnappa, Vinod; Ferris, Maria

    2018-01-16

    The transition from pediatric to adult medical services is an important time in the life of an adolescent or young adult with a renal transplant. Failure of proper transition can lead to medical non-adherence and subsequent loss of graft and/or return to dialysis. The aim of this study was to conduct a systematic review and survey to assess the challenges and existing practices in transition of renal transplant recipient children to adult services, and to develop a transition protocol. We conducted a literature review and performed a survey of pediatric nephrologists across the United States to examine the current state of transition care. A structured transition protocol was developed based on these results. Our literature review revealed that a transition program has a positive impact on decline in renal function and acute rejection episodes, and may improve long-term graft outcomes in pediatric kidney transplant patients. With a response rate of 40% (60/150) from nephrologists in 56% (49/87) of centers, our survey shows inconsistent use of validated tools despite their availability, inefficient communication between teams, and lack of use of dedicated clinics. To address these issues, we developed the "RISE to Transition" protocol, which relies on 4 competency areas: Recognition, Insight, Self-reliance, and Establishment of healthy habits. The transition program decreases acute graft rejection episodes, and the main challenges in transition care are the communication gap between health care providers and inconsistent use of transition tools. Our RISE to transition protocol incorporates transition tools, defines personnel, and aims to improve communication between teams.

  11. Control protocol: the proposed new CERN standard access procedure to accelerator equipment

    International Nuclear Information System (INIS)

    Baribaud, G.; Barnett, I.; Benincasa, G.

    1992-01-01

    Control protocol provides a normalized access procedure for equipment of the same kind from a control system. Modelisation and the subsequent identification of functionalities with their parameters, variables and attributes have now been carried out at CERN for representative families of devices. ISO specifications, such as the ASN.1 metalanguage for data structure representation and MMS definitions and services have, to some extent, been introduced in the design for generality and compatibility with external world. The final product of this design is totally independent of the control systems and permits object oriented implementations in any controls frame. The present paper describes the different phases of the project with a short overview of the various implementations under development at CERN. (author)

  12. Proposal to utilize simplified Swensen protocol in diagnosis of isolated pulmonary nodule

    Energy Technology Data Exchange (ETDEWEB)

    Ribeiro, Sergio Marrone [Dept. of Tropical Diseases and Diagnostic Imaging, Botucatu Medical School, Univ. Estadual Paulista, Botucatu, Sao Paulo (Brazil)], e-mail: sribeiro@fmb.unesp.br; Ruiz, Raul Lopes; Cataneo, Daniele Cristina; Cataneo, Antonio Jose Maria [Dept. of Surgery, Botucatu Medical School, Univ. Estadual Paulista, Botucatu, Sao Paulo (Brazil); Yoo, Hugo Hyung Bok [Dept. of Internal Medicine, Botucatu Medical School, Univ. Estadual Paulista, Botucatu, Sao Paulo (Brazil)

    2013-09-15

    Background: The problem of diagnosing whether a solitary pulmonary nodule is benign or malignant is even greater in developing countries due to a higher prevalence of infectious diseases. These infections generate a large number of patients who are generally asymptomatic and with a pulmonary nodule that cannot be accurately defined as having benign or malignant etiology. Purpose: To verify the percentages of benign versus malignant non-calcified nodules, the length of time after contrast agent injection is spiral computed tomography (CT) most sensitive and specific, and whether three postcontrast phases are necessary. Material and Methods: We studied 23 patients with solitary pulmonary nodules identified on chest radiographs or CT. Spiral scans were obtained with Swensen protocol, but at 3, 4, and 5 min after contrast injection onset. Nodules were classified as benign or malignant by histopathological examination or by an absence or presence of growth after 2 years of follow-up CT. Results: Of the 23 patients studied, 18 (78.2%) showed a final diagnosis of benign and five (21.7%) malignant nodules. Despite the small sample size, we obtained results similar to those of Swensen et al., with 80.0% sensitivity, 55.5% specificity, and 60.8% accuracy. Four minutes gave the greatest mean enhancement in both malignant and benign lesions. Conclusion: Small non-calcified benign nodules were much more frequent than malignant nodules. The best time for dynamic contrast-enhanced CT density analysis was 4 min postcontrast. As well as saving time and money, this simplified Swensen protocol with only precontrast and 4 min postcontrast phases also reduces patient exposure to ionizing radiation.

  13. Proposal to utilize simplified Swensen protocol in diagnosis of isolated pulmonary nodule

    International Nuclear Information System (INIS)

    Ribeiro, Sergio Marrone; Ruiz, Raul Lopes; Cataneo, Daniele Cristina; Cataneo, Antonio Jose Maria; Yoo, Hugo Hyung Bok

    2013-01-01

    Background: The problem of diagnosing whether a solitary pulmonary nodule is benign or malignant is even greater in developing countries due to a higher prevalence of infectious diseases. These infections generate a large number of patients who are generally asymptomatic and with a pulmonary nodule that cannot be accurately defined as having benign or malignant etiology. Purpose: To verify the percentages of benign versus malignant non-calcified nodules, the length of time after contrast agent injection is spiral computed tomography (CT) most sensitive and specific, and whether three postcontrast phases are necessary. Material and Methods: We studied 23 patients with solitary pulmonary nodules identified on chest radiographs or CT. Spiral scans were obtained with Swensen protocol, but at 3, 4, and 5 min after contrast injection onset. Nodules were classified as benign or malignant by histopathological examination or by an absence or presence of growth after 2 years of follow-up CT. Results: Of the 23 patients studied, 18 (78.2%) showed a final diagnosis of benign and five (21.7%) malignant nodules. Despite the small sample size, we obtained results similar to those of Swensen et al., with 80.0% sensitivity, 55.5% specificity, and 60.8% accuracy. Four minutes gave the greatest mean enhancement in both malignant and benign lesions. Conclusion: Small non-calcified benign nodules were much more frequent than malignant nodules. The best time for dynamic contrast-enhanced CT density analysis was 4 min postcontrast. As well as saving time and money, this simplified Swensen protocol with only precontrast and 4 min postcontrast phases also reduces patient exposure to ionizing radiation

  14. Halitose: proposta de um protocolo de avaliação Halitosis: an assessment protocol proposal

    Directory of Open Access Journals (Sweden)

    Ana Cristina Coelho Dal Rio

    2007-12-01

    Full Text Available A Halitose é um sintoma constrangedor com significativo impacto social. Ela afeta milhões de pessoas ao redor do mundo e muitos recursos são investidos em produtos para a melhora do hálito, sem sucesso. O estudo da halitose com uma abordagem científica se justifica, uma vez que a halitose é causa de restrição social, diminui a qualidade de vida e pode ser indicativo da presença de doenças mais graves. OBJETIVO: Elaborar um protocolo de avaliação da halitose com o objetivo de minimizar custos, evitar exames desnecessários e orientar o diagnóstico causal. MÉTODO: O protocolo foi elaborado baseado na literatura e na experiência pessoal dos autores, adotando uma anamnese baseada em evidências. RESULTADO: Existem muitas causas da halitose e a maioria delas está relacionada com a cavidade oral, outras estão relacionadas com doenças otorrinolaringológicas e respiratórias. Doenças gastrointestinais, alterações das funções renais e hepáticas e outras síndromes metabólicas são causas menos freqüentes, porém importantes de halitose. CONCLUSÃO: Existem custos importantes envolvidos no diagnóstico e tratamento da halitose, incluindo consultas ambulatoriais, avaliação de especialistas e exames complementares. Estes custos poderiam ser minimizados adotando uma anamnese baseada em evidências e um organograma para uma investigação clínica racional.Halitosis is an embarrassing symptom with a significant social impact. Halitosis affects millions of people worldwide and many resources are spent annually in products to improve halitus, unsuccessfully. The study of halitosis in a scientific basis is justified once halitosis causes social restriction, decreases life quality and may be an indication of serious diseases. AIM: To elaborate a protocol for halitosis assessment in order to minimize costs, avoid unnecessary tests and provide a guideline for diagnosis. METHODS: The protocol was created based on the literature and on

  15. Protocol proposal for radon concentration mensuration from granitic rocks in marble factory

    International Nuclear Information System (INIS)

    Del Claro, Flavia

    2016-01-01

    Naturally occurring radionuclides such as radon ( 222 Rn), its decay products and other elements from the radioactive series of uranium ( 238 U and 235 U) and thorium ( 232 Th) are an important source of human exposure to natural radioactivity. The worldwide evaluation of health radiobiological effects and risks from population exposure to natural radionuclides is a growing concern. Radionuclides such as radon ( 222 Rn), the thoron ( 220 Rn), radio ( 2 '2'6Ra), thorium ( 23 '2Th) and potassium ( 40 K) may occur in materials commonly used in construction of dwellings and buildings. Thus, the radioactivity from marbles and granites is of importance, so that under certain conditions these materials radioactivity levels can be hazardous requiring the implementation of mitigation measurements. This research presents a technical protocol marble factories for the control human exposure to natural radioactivity exhaled from granitic rocks. The protocol was based on measurements of the 222 Rn and 220 Rn concentration in Brazilian granite rocks commonly nationally and exported. The 222 Rn and 220 Rn measurements were done using the AlphaGUARD (Saphymo GmbH) and RAD7 (Durridge Company) apparatus, respectively. The samples of granite were sealed in glass jars for 40 days in to achieve secular equilibrium between 226 Ra and 222 Rn radionuclides. The measurements were performed on Applied Nuclear Physics Laboratory at the Federal Technological University of Parana. Also, solid-state nuclear track detectors CR-39 were installed in a marble factory environments located in Curitiba - Parana for the evaluation of 222 Rn concentrations in workplaces. The CR-39 detectors were exposed for about 90 days and submitted to etching process. The alpha particle tracks were observed using an optical microscope. Some granite samples analyzed presented 222 Rn concentrations of attention, since the average values ranged from 3 ± 1 Bq/m 3 to 2087 ± 19 Bq/m 3 . The results obtained

  16. A proposal for a standard communication protocol for pacemaker/ICD programmers

    NARCIS (Netherlands)

    Dijk, WA; Hooijschuur, CAM; van der Velde, W; Dassen, WRM

    2005-01-01

    The information generated by pacemakers and ICD's to support the cardiologist and technician for installing the optimal settings for the patient is increasing rapidly. In this paper a proposal is described for electronic data exchange between the pacemaker/ICD programmers and electronic information

  17. Risks to the fetus from diagnostic imaging during pregnancy: review and proposal of a clinical protocol

    International Nuclear Information System (INIS)

    Gomes, Mafalda; Matias, Alexandra; Macedo, Filipe

    2015-01-01

    Every day, medical practitioners face the dilemma of exposing pregnant or possibly pregnant patients to radiation from diagnostic examinations. Both doctors and patients often have questions about the risks of radiation. The most vulnerable period is between the 8th and 15th weeks of gestation. Deterministic effects like pregnancy loss, congenital malformations, growth retardation and neurobehavioral abnormalities have threshold doses above 100-200 mGy. The risk is considered negligible at 50 mGy and in reality no diagnostic examination exceeds this limit. The risk of carcinogenesis is slightly higher than in the general population. Intravenous iodinated contrast is discouraged, except in highly selected patients. Considering all the possible noxious effects of radiation exposure, measures to diminish radiation are essential and affect the fetal outcome. Nonionizing procedures should be considered whenever possible and every radiology center should have its own data analysis on fetal radiation exposure. In this review, we analyze existing literature on fetal risks due to radiation exposure, producing a clinical protocol to guide safe radiation use in a clinical setting. (orig.)

  18. Risks to the fetus from diagnostic imaging during pregnancy: review and proposal of a clinical protocol.

    Science.gov (United States)

    Gomes, Mafalda; Matias, Alexandra; Macedo, Filipe

    2015-12-01

    Every day, medical practitioners face the dilemma of exposing pregnant or possibly pregnant patients to radiation from diagnostic examinations. Both doctors and patients often have questions about the risks of radiation. The most vulnerable period is between the 8th and 15th weeks of gestation. Deterministic effects like pregnancy loss, congenital malformations, growth retardation and neurobehavioral abnormalities have threshold doses above 100-200 mGy. The risk is considered negligible at 50 mGy and in reality no diagnostic examination exceeds this limit. The risk of carcinogenesis is slightly higher than in the general population. Intravenous iodinated contrast is discouraged, except in highly selected patients. Considering all the possible noxious effects of radiation exposure, measures to diminish radiation are essential and affect the fetal outcome. Nonionizing procedures should be considered whenever possible and every radiology center should have its own data analysis on fetal radiation exposure. In this review, we analyze existing literature on fetal risks due to radiation exposure, producing a clinical protocol to guide safe radiation use in a clinical setting.

  19. Tinnitus in patients with temporo-mandibular joint disorder: Proposal for a new treatment protocol.

    Science.gov (United States)

    Attanasio, Giuseppe; Leonardi, Alessandra; Arangio, Paolo; Minni, Antonio; Covelli, Edoardo; Pucci, Resi; Russo, Francesca Yoshie; De Seta, Elio; Di Paolo, Carlo; Cascone, Piero

    2015-06-01

    The present study was designed to verify the correlation between tinnitus and temporomandibular joint dysfunction.86 consecutive patients were enrolled in the study, all affected by subjective tinnitus without hearing impairment, from both genders, age between 18 and 60 years old. The final number of patients included in the study was 55. All patients received a temporo-mandibular joint examination. All the patients were asked to rate the severity of their symptoms before and after treatment using a VAS scale and the Tinnitus Handicap Inventory (THI) and they followed a standardized protocol for the investigation of tinnitus. All the subjects were monitored by the same researcher and they underwent the same splint treatment. The comparison between pre- and posttreatment phase scores showed in patients with predisposition of TMD and with TMD a statistically significant decrease of THI and VAS values. The characteristics of tinnitus and the degree of response to treatment confirmed the relationship between tinnitus and TMD. The authors believe that, when the most common causes of tinnitus, such as otologic disorders and neurological diseases are excluded, it is correct to evaluate the functionality of the temporo-mandibular joint and eventually treat its pathology to obtain tinnitus improvement or even resolution. Copyright © 2015 European Association for Cranio-Maxillo-Facial Surgery. Published by Elsevier Ltd. All rights reserved.

  20. Evaluation with stabilometric platform of balance disorders in osteoporosis patients. A proposal for a diagnostic protocol.

    Science.gov (United States)

    Cultrera, Pina; Pratelli, Elisa; Petrai, Veronica; Postiglione, Marco; Zambelan, Giulia; Pasquetti, Pietro

    2010-05-01

    Osteoporosis is a systemic disease with reduced bone mass and qualitative alterations of the bone, associated to increased risk of fracture. Pathogenesis of osteoporosis fractures is multifactorial. Main risk factor is falls (except for vertebral fragility fractures which occurs often in absence of trauma). Aging by itself produces physiological changes: muscular hypotrophy with asthenia, deficit of visus and hearing together with associated pathologies and multi-drug therapies. In osteoporosis patients with vertebral fractures posture change occurs which reduces balance. After clinical postural evaluation it is possible to carry out instrumental evaluation of posture with computerized methods such as stabilometry, baropodometry, dynanometry and gait analysis. Examination carried out with use of stabilometric computerized platform allows stabilometric (body sway assessment) as well as posturometric examination (center of pressure assessment during quiet standing). Fundamental parameters obtained are: position of the body center of gravity, area and shape of sway density curve and velocity variables. Protocol of evaluation includes assessment of examination in standard condition and in condition of temporary sensorial deprivation (to investigate the influence of various afferent systems on the maintenance of posture and balance). Accurate evaluation of postural control in osteoporosis patients constitutes a fundamental tool in fracture risk evaluation due to fall and in identification and correction of modifiable factors responsible for balance defect. This approach, together with adequate drug therapy, may lead to significant reduction of fractures in osteoporosis patients with subsequent reduction of hospitalization and residual consequent disabilities.

  1. Evaluation with stabilometric platform of balance disorders in osteoporosis patients. A proposal for a diagnostic protocol

    Science.gov (United States)

    Cultrera, Pina; Pratelli, Elisa; Petrai, Veronica; Postiglione, Marco; Zambelan, Giulia; Pasquetti, Pietro

    2010-01-01

    Osteoporosis is a systemic disease with reduced bone mass and qualitative alterations of the bone, associated to increased risk of fracture. Pathogenesis of osteoporosis fractures is multifactorial. Main risk factor is falls (except for vertebral fragility fractures which occurs often in absence of trauma). Aging by itself produces physiological changes: muscular hypotrophy with asthenia, deficit of visus and hearing together with associated pathologies and multi-drug therapies. In osteoporosis patients with vertebral fractures posture change occurs which reduces balance. After clinical postural evaluation it is possible to carry out instrumental evaluation of posture with computerized methods such as stabilometry, baropodometry, dynanometry and gait analysis. Examination carried out with use of stabilometric computerized platform allows stabilometric (body sway assessment) as well as posturometric examination (center of pressure assessment during quiet standing). Fundamental parameters obtained are: position of the body center of gravity, area and shape of sway density curve and velocity variables. Protocol of evaluation includes assessment of examination in standard condition and in condition of temporary sensorial deprivation (to investigate the influence of various afferent systems on the maintenance of posture and balance). Accurate evaluation of postural control in osteoporosis patients constitutes a fundamental tool in fracture risk evaluation due to fall and in identification and correction of modifiable factors responsible for balance defect. This approach, together with adequate drug therapy, may lead to significant reduction of fractures in osteoporosis patients with subsequent reduction of hospitalization and residual consequent disabilities. PMID:22460016

  2. Risks to the fetus from diagnostic imaging during pregnancy: review and proposal of a clinical protocol

    Energy Technology Data Exchange (ETDEWEB)

    Gomes, Mafalda; Matias, Alexandra [University of Porto, Faculty of Medicine, Porto (Portugal); Macedo, Filipe [SMIC, Porto (Portugal)

    2015-12-15

    Every day, medical practitioners face the dilemma of exposing pregnant or possibly pregnant patients to radiation from diagnostic examinations. Both doctors and patients often have questions about the risks of radiation. The most vulnerable period is between the 8th and 15th weeks of gestation. Deterministic effects like pregnancy loss, congenital malformations, growth retardation and neurobehavioral abnormalities have threshold doses above 100-200 mGy. The risk is considered negligible at 50 mGy and in reality no diagnostic examination exceeds this limit. The risk of carcinogenesis is slightly higher than in the general population. Intravenous iodinated contrast is discouraged, except in highly selected patients. Considering all the possible noxious effects of radiation exposure, measures to diminish radiation are essential and affect the fetal outcome. Nonionizing procedures should be considered whenever possible and every radiology center should have its own data analysis on fetal radiation exposure. In this review, we analyze existing literature on fetal risks due to radiation exposure, producing a clinical protocol to guide safe radiation use in a clinical setting. (orig.)

  3. Proposal of a calibration protocol of gamma chambers for estimation of the radionuclides incorporation in emergency situations

    International Nuclear Information System (INIS)

    Dantas, B.M.; Lucena, E.; Dantas, A.L.A.; Araujo, F.; Melo, D.; Teran, M.; Paolino, A.; Hermida, J.C.; Rojo, A.; Puerta, J.A.; Morales, J.; Lopez B, G.M.; Alfaro, M.; Ruiz, M.A.; Videla, R.; Pinones, O.; Gonzalez, S.; Navarro, T.; Cruz S, R.

    2006-01-01

    In the last years in several countries has come increasing the concern with the possibility of accidents related to the transport and manipulation of open sources used in nuclear medicine. This carried out to the search of alternative methods for the monitoring of workers and individuals of the public exposed to the radionuclides incorporation like 131 I, 201 Tl, 153 Sm among others. One of the options to assist the demand for monitoring of the radionuclides incorporation is the use of gamma chambers that are medical diagnostic equipment available in the own centers of nuclear medicine. The gamma chambers are used to obtain images of patient to which are administered a radionuclide of well-known activity with diagnostic purposes. These equipment have among its components elements that spectrometric systems like those used in the evaluation of the internal incorporation for direct measurements, reason why besides its use for diagnosis by image they can be gauged with anthropomorphic simulators and also with punctual sources for the quantification of the radionuclides activity, distributed homogeneously in the human body or located in specific organs. This work presents the development of a calibration protocol of gamma chambers for the in vivo determination of radionuclides and it proposes the implementation of the protocol in centers of nuclear medicine of the 9 countries participants of the project OAS-ARCAL-RLA/9/049-LXXVIII - Harmonization of procedures of internal dosimetry (Argentina, Brazil, Colombia, Cuba, Chile, Mexico, Peru, Uruguay and Spain). The protocol is the base to establish an integrated net to attend in the response to emergencies using nuclear medicine centers of public hospitals of the region. The proposal is an additional alternative for the monitoring of people in emergency situations where it is possible and feasible the use of the gamma chambers. This would avoid the person's transport with incorporation suspicion for a conventional whole

  4. Concurrent Chemoradiotherapy Followed by Consolidation Chemotherapy With Bi-Weekly Docetaxel and Carboplatin for Stage III Unresectable, Non-Small-Cell Lung Cancer: Clinical Application of a Protocol Used in a Previous Phase II Study

    Energy Technology Data Exchange (ETDEWEB)

    Saitoh, Jun-Ichi, E-mail: junsaito@sannet.ne.jp [Division of Radiation Oncology, Saitama Cancer Center, Saitama (Japan); Saito, Yoshihiro; Kazumoto, Tomoko; Kudo, Shigehiro; Yoshida, Daisaku; Ichikawa, Akihiro [Division of Radiation Oncology, Saitama Cancer Center, Saitama (Japan); Sakai, Hiroshi; Kurimoto, Futoshi [Division of Respiratory Disease, Saitama Cancer Center, Saitama (Japan); Kato, Shingo [Research Center Hospital for Charged Particle Therapy, National Institute of Radiological Sciences, Chiba (Japan); Shibuya, Kei [Department of Radiation Oncology, Gunma University Graduate School of Medicine, Gunma (Japan)

    2012-04-01

    Purpose: To assess the clinical applicability of a protocol evaluated in a previously reported phase II study of concurrent chemoradiotherapy followed by consolidation chemotherapy with bi-weekly docetaxel and carboplatin in patients with stage III, unresectable, non-small-cell lung cancer (NSCLC). Methods and Materials: Between January 2000 and March 2006, 116 previously untreated patients with histologically proven, stage III NSCLC were treated with concurrent chemoradiotherapy. Radiation therapy was administered in 2-Gy daily fractions to a total dose of 60 Gy in combination with docetaxel, 30 mg/m{sup 2}, and carboplatin at an area under the curve value of 3 every 2 weeks during and after radiation therapy. Results: The median survival time for the entire group was 25.5 months. The actuarial 2-year and 5-year overall survival rates were 53% and 31%, respectively. The 3-year cause-specific survival rate was 60% in patients with stage IIIA disease, whereas it was 35% in patients with stage IIIB disease (p = 0.007). The actuarial 2-year and 5-year local control rates were 62% and 55%, respectively. Acute hematologic toxicities of Grade {>=}3 severity were observed in 20.7% of patients, while radiation pneumonitis and esophagitis of Grade {>=}3 severity were observed in 2.6% and 1.7% of patients, respectively. Conclusions: The feasibility of the protocol used in the previous phase II study was reconfirmed in this series, and excellent treatment results were achieved.

  5. Concurrent Chemoradiotherapy Followed by Consolidation Chemotherapy With Bi-Weekly Docetaxel and Carboplatin for Stage III Unresectable, Non-Small-Cell Lung Cancer: Clinical Application of a Protocol Used in a Previous Phase II Study

    International Nuclear Information System (INIS)

    Saitoh, Jun-Ichi; Saito, Yoshihiro; Kazumoto, Tomoko; Kudo, Shigehiro; Yoshida, Daisaku; Ichikawa, Akihiro; Sakai, Hiroshi; Kurimoto, Futoshi; Kato, Shingo; Shibuya, Kei

    2012-01-01

    Purpose: To assess the clinical applicability of a protocol evaluated in a previously reported phase II study of concurrent chemoradiotherapy followed by consolidation chemotherapy with bi-weekly docetaxel and carboplatin in patients with stage III, unresectable, non-small-cell lung cancer (NSCLC). Methods and Materials: Between January 2000 and March 2006, 116 previously untreated patients with histologically proven, stage III NSCLC were treated with concurrent chemoradiotherapy. Radiation therapy was administered in 2-Gy daily fractions to a total dose of 60 Gy in combination with docetaxel, 30 mg/m 2 , and carboplatin at an area under the curve value of 3 every 2 weeks during and after radiation therapy. Results: The median survival time for the entire group was 25.5 months. The actuarial 2-year and 5-year overall survival rates were 53% and 31%, respectively. The 3-year cause-specific survival rate was 60% in patients with stage IIIA disease, whereas it was 35% in patients with stage IIIB disease (p = 0.007). The actuarial 2-year and 5-year local control rates were 62% and 55%, respectively. Acute hematologic toxicities of Grade ≥3 severity were observed in 20.7% of patients, while radiation pneumonitis and esophagitis of Grade ≥3 severity were observed in 2.6% and 1.7% of patients, respectively. Conclusions: The feasibility of the protocol used in the previous phase II study was reconfirmed in this series, and excellent treatment results were achieved.

  6. Bomb-Pulse Chlorine-36 At The Proposed Yucca Mountain Repository Horizon: An Investigation Of Previous Conflicting Results And Collection Of New Data

    International Nuclear Information System (INIS)

    J. Cizdziel

    2006-01-01

    Previous studies by scientists at Los Alamos National Laboratory (LANL) found elevated ratios of chlorine-36 to total chloride ( 36 Cl/Cl) in samples of rock collected from the Exploratory Studies Facility (ESF) and the Enhanced Characterization of the Repository Block (ECRB) at Yucca Mountain as the tunnels were excavated. The data were interpreted as an indication that fluids containing 'bomb-pulse' 36 Cl reached the repository horizon in the ∼50 years since the peak period of above-ground nuclear testing. Moreover, the data support the concept that so-called fast pathways for infiltration not only exist but are active, possibly through a combination of porous media, faults and/or other geologic features. Due to the significance of 36 Cl data to conceptual models of unsaturated zone flow and transport, the United States Geological Survey (USGS) was requested by the Department of Energy (DOE) to design and implement a study to validate the LANL findings. The USGS chose to drill new boreholes at select locations across zones where bomb-pulse ratios had previously been identified. The drill cores were analyzed at Lawrence Livermore National Laboratory (LLNL) for 36 Cl/Cl using both active and passive leaches, with the USGS/LLNL concluding that the active leach extracted too much rock-Cl and the passive leach did not show bomb-pulse ratios. Because consensus was not reached between the USGS/LLNL and LANL on several fundamental points, including the conceptual strategy for sampling, interpretation and use of tritium ( 3 H) data, and the importance and interpretation of blanks, in addition to the presence or absence of bomb-pulse 36 Cl, an evaluation by an independent entity, the University of Nevada, Las Vegas (UNLV), using new samples was initiated. This report is the result of that study. The overall objectives of the UNLV study were to investigate the source or sources of the conflicting results from the previous validation study, and to obtain additional data to

  7. Proposal for a protocol on environmental impact assessment in the context of incineration with energy recovery from municipal solid waste in Costa Rica

    International Nuclear Information System (INIS)

    Montero Salas, Alvaro Enrique

    2015-01-01

    A proposal for a protocol is performed for the evaluation of environmental impact in the context of incineration with energy recovery from municipal solid waste (MSW). An analysis of the related and current regulations is done at national and international level. The methodology of the Secretaria Tecnica Nacional Ambiental (SETENA) for environmental impact assessment has been exposed. Susceptible environmental factors and elements of the heat treatment of RSU that generate environmental impacts are identified. The air has been the environmental factor extensively addressed in the investigation. The aspects included in the protocol proposal are defined in order to generate conclusions and determinants recommendations on environmental viability of any work, activity or project [es

  8. A proposed draft protocol for the European Convention on Biomedicine relating to research on the human embryo and fetus.

    Science.gov (United States)

    Byk, J C

    1997-02-01

    The objective of this paper is to stimulate academic debate on embryo and fetal research from the perspective of the drafting of a protocol to the European Convention on Biomedicine. The Steering Committee on Bioethics of the Council of Europe was mandated to draw up such a protocol and for this purpose organised an important symposium on reproductive technologies and embryo research, in Strasbourg from the 16th to the 18th of December 1996.

  9. Oral hygiene in patients with oral cancer undergoing chemotherapy and/or radiotherapy after prosthesis rehabilitation: protocol proposal.

    Science.gov (United States)

    Rapone, B; Nardi, G M; DI Venere, D; Pettini, F; Grassi, F R; Corsalini, M

    2016-01-01

    This study was aimed at assessing the effectiveness and the importance of an oral hygiene (OH) protocol in patients undergoing radiation therapy and chemotherapy after prosthesis rehabilitation, in order to reduce or minimize oral complications. This study was carried out at the Department of Dental Science, at the University of Bari-Italy from December 2012 to December 2015 on 34 selected patients with primary oral cancer undergoing chemotherapy and radiotherapy after prosthesis rehabilitation. They were divided into 2 groups according to their age, sex and cancer therapy. Seventeen patients were assigned to the control group and seventeen in the experimental one. In the experimental group (Table 1), patients underwent an oral hygiene protocol whereas in the control group (Table 2) patients received the usual care provided within the clinical setting. All the patients gave written informed consent. It has been asked and obtained the authorisation from the Ethics Committee of the Dental Science and Surgery Department. Results show that in patients undergoing the oral hygiene protocol, the complications and the risks of infection and permanent dental problems have been minimized. Indeed, of the seventeen patients undergoing the OH protocol, 70% obtained positive results and were satisfied with the program outcome. The role of the health care providers is essential to educate patients to adhere to the prescribed treatments and reinforce their motivation in oral hygiene. The oral hygiene procedures prevent and ameliorate oral complications due to the radiation therapy and chemotherapy.

  10. Proposed protocol for realization of abdominal CT in patients admitted to the emergency room for trauma in HSJD

    International Nuclear Information System (INIS)

    Quesada Cascante, Lizbeth

    2013-01-01

    A protocol is established for computed tomography in trauma patients treated in emergency of Hospital San Juan de Dios. A literature review is conducted on abdominal CT protocols in specialized databases. The criteria, scanning, parameters and delay time are established for realization of abdominal CT in patients with traumatic emergencies in HSJD. Taking the thickness of the sections, the thickness of the sections in reconstruction, the quantities of contrast and the speed of injection in patients, have been standardized for the realization of abdominal CT in HSJD. Computed tomography should be preferably performed of routine in portal phase and the late from 5 minutes in patients with abdominal trauma, contributing in this phase as much information regarding the extent of abdominal injury [es

  11. Dental erosion in archaeological human remains: A critical review of literature and proposal of a differential diagnosis protocol.

    Science.gov (United States)

    Coupal, Isabelle; Sołtysiak, Arkadiusz

    2017-12-01

    Although studies of dental wear on archaeological human remains have largely focused on mechanical wear (attrition and abrasion) in the past, chemical wear (erosion) is being increasingly identified as a separate form of wear. This paper aims to review the current state of research and to develop a protocol that may be universally used by biorchaeologists to specifically identify dental erosion. A critical review of literature has been done in order to highlight the issues related to diagnosis of dental erosion in archaeological human remains. The bodies of work based on the analysis of both modern and archaeological dentitions raise their separate problems. In addition to a need to re-evaluate symptoms of dental erosion, notably dentin 'cupping', it is apparent that no specific protocol is adapted from medical to archaeological sciences. Authors rather rely on tooth wear indices and photographs of modern clinical cases for diagnosis. Furthermore, the diagenetic chemical alternation has rarely been considered as a bias. Here we suggest a three-step protocol: the primary method is the microscopic identification of dental erosion by SEM, followed by the exclusion of taphonomic aetiology on surrounding bone and soil pH analysis. Archaeologists should also explore possible causative agents of wear using archaeological and historic knowledge about the population being analyzed. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. Comment on a proposed draft protocol for the European Convention on Biomedicine relating to research on the human embryo and fetus

    OpenAIRE

    Lebech, Mette

    1998-01-01

    Judge Christian Byk renders service to the Steering Committee on Bioethics of the Council of Europe (CDBI) by proposing a draft of the protocal destined to fill a gap in international law on the status of the human embryo. This proposal, printed in a previous issue of the Journal of Medical Ethics deserves nevertheless to be questioned on important points. Is Christian Byk proposing to legalise research on human embryos not only in vitro but also in utero?

  13. New Acquisition Protocol of 18F-Choline PET/CT in Prostate Cancer Patients: Review of the Literature about Methodology and Proposal of Standardization

    Directory of Open Access Journals (Sweden)

    Sotirios Chondrogiannis

    2014-01-01

    Full Text Available Purpose. (1 To evaluate a new acquisition protocol of 18F-choline (FCH PET/CT for prostate cancer patients (PC, (2 to review acquisition 18F-choline PET/CT methodology, and (3 to propose a standardized acquisition protocol on FCH PET/CT in PC patients. Materials. 100 consecutive PC patients (mean age 70.5 years, mean PSA 21.35 ng/mL were prospectively evaluated. New protocol consisted of an early scan of the pelvis immediately after the injection of the tracer (1 bed position of 4 min followed by a whole body scan at one 1 hour. Early and 1 hour images were compared for interfering activity and pathologic findings. Results. The overall detection rate of FCH PET/CT was 64%. The early static images of the pelvis showed absence of radioactive urine in ureters, bladder, or urethra which allowed a clean evaluation of the prostatic fossae. Uptake in the prostatic region was better visualized in the early phase in 26% (7/30 of cases. Other pelvic pathologic findings (bone and lymph nodes were visualized in both early and late images. Conclusion. Early 18F-choline images improve visualization of abnormal uptake in prostate fossae. All pathologic pelvic deposits (prostate, lymph nodes, and bone were visualized in both early and late images.

  14. Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET

    Directory of Open Access Journals (Sweden)

    Parul Tyagi

    2017-07-01

    Full Text Available Next-generation communication networks have become widely popular as ad-hoc networks, broadly categorized as the mobile nodes based on mobile ad-hoc networks (MANET and the vehicular nodes based vehicular ad-hoc networks (VANET. VANET is aimed at maintaining safety to vehicle drivers by begin autonomous communication with the nearby vehicles. Each vehicle in the ad-hoc network performs as an intelligent mobile node characterized by high mobility and formation of dynamic networks. The ad-hoc networks are decentralized dynamic networks that need efficient and secure communication requirements due to the vehicles being persistently in motion. These networks are more susceptible to various attacks like Warm Hole attacks, denial of service attacks and Black Hole Attacks. The paper is a novel attempt to examine and investigate the security features of the routing protocols in VANET, applicability of AODV (Ad hoc On Demand protocol to detect and tackle a particular category of network attacks, known as the Black Hole Attacks. A new algorithm is proposed to enhance the security mechanism of AODV protocol and to introduce a mechanism to detect Black Hole Attacks and to prevent the network from such attacks in which source node stores all route replies in a look up table. This table stores the sequences of all route reply, arranged in ascending order using PUSH and POP operations. The priority is calculated based on sequence number and discard the RREP having presumably very high destination sequence number. The result show that proposed algorithm for detection and prevention of Black Hole Attack increases security in Intelligent Transportation System (ITS and reduces the effect of malicious node in the VANET. NCTUNs simulator is used in this research work.

  15. Proposed Treatment Protocol for Frostbite: A Retrospective Analysis of 17 Cases Based on a 3-Year Single-Institution Experience

    Directory of Open Access Journals (Sweden)

    Eun-Kyung Woo

    2013-09-01

    Full Text Available Background This paper discusses the treatment protocol for patients with frostbite.Methods We performed a retrospective analysis of a series of 17 patients with second- andhigher-degree frostbite who had been treated at our medical institution between 2010 and2012.Results Our clinical series of patients (n=17 included 13 men and four women, whosemean age was 42.4±11.6 years (range, 22-67 years. The sites of injury include the foot in sixpatients (35.3%, the hand in six patients (35.3% and the facial region in five patients (29.4%.Seven patients with second-degree frostbite were completely cured with only conservativetreatment during a mean period of 12.7±3.3 days (range, 8-16 days. Of the five patients withthird-degree frostbite, two underwent skin grafting following debridement, and the remainingthree achieved a complete cure with conservative treatment during a mean period of 35±4.3days (range, 29-39 days. Five patients with fourth-degree frostbite were treated with surgicalprocedures including amputation.Conclusions With the appropriate conservative management in the early stage of onset,surgeons should decide on surgery after waiting for a sufficient period of time until thedemarcation of the wound. Continuous management of patients is also needed to achievefunctional recovery after a complete cure has been achieved. This should also be accompaniedby patient education for the avoidance of re-exposure to cold environments.

  16. Proposed Treatment Protocol for Frostbite: A Retrospective Analysis of 17 Cases Based on a 3-Year Single-Institution Experience

    Directory of Open Access Journals (Sweden)

    Eun-Kyung Woo

    2013-09-01

    Full Text Available BackgroundThis paper discusses the treatment protocol for patients with frostbite.MethodsWe performed a retrospective analysis of a series of 17 patients with second- and higher-degree frostbite who had been treated at our medical institution between 2010 and 2012.ResultsOur clinical series of patients (n=17 included 13 men and four women, whose mean age was 42.4±11.6 years (range, 22-67 years. The sites of injury include the foot in six patients (35.3%, the hand in six patients (35.3% and the facial region in five patients (29.4%. Seven patients with second-degree frostbite were completely cured with only conservative treatment during a mean period of 12.7±3.3 days (range, 8-16 days. Of the five patients with third-degree frostbite, two underwent skin grafting following debridement, and the remaining three achieved a complete cure with conservative treatment during a mean period of 35±4.3 days (range, 29-39 days. Five patients with fourth-degree frostbite were treated with surgical procedures including amputation.ConclusionsWith the appropriate conservative management in the early stage of onset, surgeons should decide on surgery after waiting for a sufficient period of time until the demarcation of the wound. Continuous management of patients is also needed to achieve functional recovery after a complete cure has been achieved. This should also be accompanied by patient education for the avoidance of re-exposure to cold environments.

  17. Soil examination for a forensic trace evidence laboratory-Part 3: A proposed protocol for the effective triage and management of soil examinations.

    Science.gov (United States)

    Woods, Brenda; Lennard, Chris; Kirkbride, K Paul; Robertson, James

    2016-05-01

    In the past, forensic soil examination was a routine aspect of forensic trace evidence examinations. The apparent need for soil examinations then went through a period of decline and with it the capability of many forensic laboratories to carry out soil examinations. In more recent years, interest in soil examinations has been renewed due-at least in part-to soil examinations contributing to some high profile investigations. However, much of this renewed interest has been in organisations with a primary interest in soil and geology rather than forensic science. We argue the need to reinstate soil examinations as a trace evidence sub-discipline within forensic science laboratories and present a pathway to support this aim. An examination procedure is proposed that includes: (i) appropriate sample collection and storage by qualified crime scene examiners; (ii) exclusionary soil examinations by trace evidence scientists within a forensic science laboratory; (iii) inclusionary soil examinations by trace evidence scientists within a forensic science laboratory; and (iv) higher-level examination of soils by specialist soil scientists and palynologists. Soil examinations conducted by trace evidence scientists will be facilitated if the examinations are conducted using the instrumentation routinely used by these examiners. Hence, the proposed examination protocol incorporates instrumentation in routine use in a forensic trace evidence laboratory. Finally, we report on an Australian soil scene variability study and a blind trial that demonstrate the utility of the proposed protocol for the effective triage and management of soil samples by forensic laboratories. Crown Copyright © 2016. Published by Elsevier Ireland Ltd. All rights reserved.

  18. Pulmonary evaluation and prevalence of non-invasive ventilation in patients with amyotrophic lateral sclerosis: a multicenter survey and proposal of a pulmonary protocol.

    Science.gov (United States)

    Melo, J; Homma, A; Iturriaga, E; Frierson, L; Amato, A; Anzueto, A; Jackson, C

    1999-10-31

    In order to evaluate the current standard of care for the management of respiratory failure in patients with amyotrophic lateral sclerosis (ALS), a questionaire was mailed to the Medical Directors of 48 multidisciplinary ALS centers in the United States. Twenty centers reported information on 2357 patients, mean of 124 patients per center. Pulmonary function tests were performed at each visit in 17/20 institutions. Arterial blood gases, maximal expiratory pressures and maximal inspiratory pressures were followed in three centers and serum chloride was monitored in only four centers. The use of non-invasive ventilation (NIV) was extremely variable (range 0-50%) and included 360 patients (15%). The majority of centers used symptoms/signs of hypoventilation and worsening forced vital capacity (FVC) to initiate NIV with no established protocol. A FVC between 20 and 40% was used by most centers to initiate NIV. Due to great variability in the approach to monitoring pulmonary function among ALS centers and the modest effects of current medications to slow disease progression, we propose the use of a structured protocol which can prospectively study the role of NIV in prolonging survival and improving quality of life.

  19. MLVA Typing of Streptococcus pneumoniae Isolates with Emphasis on Serotypes 14, 9N and 9V: Comparison of Previously Described Panels and Proposal of a Novel 7 VNTR Loci-Based Simplified Scheme.

    Science.gov (United States)

    Costa, Natália S; Pinto, Tatiana C A; Merquior, Vânia L C; Castro, Luciana F S; da Rocha, Filomena S P; Morais, Jaqueline M; Peralta, José M; Teixeira, Lúcia M

    2016-01-01

    Streptococcus pneumoniae remains as an important cause of community-acquired bacterial infections, and the nasopharynx of asymptomatic carriers is the major reservoir of this microorganism. Pneumococcal strains of serotype 14 and serogroup 9 are among the most frequently isolated from both asymptomatic carriers and patients with invasive disease living in Brazil. Internationally disseminated clones belonging to such serotypes have been associated with the emergence and spread of antimicrobial resistance in our setting, highlighting the need for epidemiological tracking of these isolates. In this scenario, Multiple Loci VNTR Analysis (MLVA) has emerged as an alternative tool for the molecular characterization of pneumococci, in addition to more traditional techniques such as Multi-Locus Sequence Typing (MLST) and Pulsed-Field Gel Electrophoresis (PFGE). In the present study, 18 VNTR loci, as well as other previously described reduced MLVA panels (7 VNTR loci), were evaluated as tools to characterize pneumococcal strains of serotypes 14, 9N and 9V belonging to international and regional clones isolated in Brazil. The 18 VNTR loci panel was highly congruent with MLST and PFGE, being also useful for indicating the genetic relationship with international clones and for discriminating among strains with indistinguishable STs and PFGE profiles. Analysis of the results also allowed deducing a novel shorter 7 VNTR loci panel, keeping a high discriminatory power for isolates of the serotypes investigated and a high congruence level with MLST and PFGE. The newly proposed simplified panel was then evaluated for typing pneumococcal strains of other commonly isolated serotypes. The results indicate that MLVA is a faster and easier to perform, reliable approach for the molecular characterization of S. pneumoniae isolates, with potential for cost-effective application, especially in resource-limited countries.

  20. Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User

    Directory of Open Access Journals (Sweden)

    Jongho Moon

    2017-01-01

    Full Text Available Recently many authentication protocols using an extended chaotic map were suggested for a mobile user. Many researchers demonstrated that authentication protocol needs to provide key agreement, mutual authentication, and user anonymity between mobile user and server and resilience to many possible attacks. In this paper, we cautiously analyzed chaotic-map-based authentication scheme and proved that it is still insecure to off-line identity guessing, user and server impersonation, and on-line identity guessing attacks. To address these vulnerabilities, we proposed an improved protocol based on an extended chaotic map and a fuzzy extractor. We proved the security of the proposed protocol using a random oracle and AVISPA (Automated Validation of Internet Security Protocols and Applications tool. Furthermore, we present an informal security analysis to make sure that the improved protocol is invulnerable to possible attacks. The proposed protocol is also computationally efficient when compared to other previous protocols.

  1. An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography.

    Science.gov (United States)

    Zhang, Zezhong; Qi, Qingqing

    2014-05-01

    Medication errors are very dangerous even fatal since it could cause serious even fatal harm to patients. In order to reduce medication errors, automated patient medication systems using the Radio Frequency Identification (RFID) technology have been used in many hospitals. The data transmitted in those medication systems is very important and sensitive. In the past decade, many security protocols have been proposed to ensure its secure transition attracted wide attention. Due to providing mutual authentication between the medication server and the tag, the RFID authentication protocol is considered as the most important security protocols in those systems. In this paper, we propose a RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography (ECC). The analysis shows the proposed protocol could overcome security weaknesses in previous protocols and has better performance. Therefore, the proposed protocol is very suitable for automated patient medication systems.

  2. A new quantum sealed-bid auction protocol with secret order in post-confirmation

    Science.gov (United States)

    Wang, Jing-Tao; Chen, Xiu-Bo; Xu, Gang; Meng, Xiang-Hua; Yang, Yi-Xian

    2015-10-01

    A new security protocol for quantum sealed-bid auction is proposed to resist the collusion attack from some malicious bidders. The most significant feature of this protocol is that bidders prepare their particles with secret order in post-confirmation for encoding bids. In addition, a new theorem and its proof are given based on the theory of combinatorial mathematics, which can be used as evaluation criteria for the collusion attack. It is shown that the new protocol is immune to the collusion attack and meets the demand for a secure auction. Compared with those previous protocols, the security, efficiency and availability of the proposed protocol are largely improved.

  3. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  4. Laparoscopy After Previous Laparotomy

    Directory of Open Access Journals (Sweden)

    Zulfo Godinjak

    2006-11-01

    Full Text Available Following the abdominal surgery, extensive adhesions often occur and they can cause difficulties during laparoscopic operations. However, previous laparotomy is not considered to be a contraindication for laparoscopy. The aim of this study is to present that an insertion of Veres needle in the region of umbilicus is a safe method for creating a pneumoperitoneum for laparoscopic operations after previous laparotomy. In the last three years, we have performed 144 laparoscopic operations in patients that previously underwent one or two laparotomies. Pathology of digestive system, genital organs, Cesarean Section or abdominal war injuries were the most common causes of previouslaparotomy. During those operations or during entering into abdominal cavity we have not experienced any complications, while in 7 patients we performed conversion to laparotomy following the diagnostic laparoscopy. In all patients an insertion of Veres needle and trocar insertion in the umbilical region was performed, namely a technique of closed laparoscopy. Not even in one patient adhesions in the region of umbilicus were found, and no abdominal organs were injured.

  5. A Protocol for Provably Secure Authentication of a Tiny Entity to a High Performance Computing One

    Directory of Open Access Journals (Sweden)

    Siniša Tomović

    2016-01-01

    Full Text Available The problem of developing authentication protocols dedicated to a specific scenario where an entity with limited computational capabilities should prove the identity to a computationally powerful Verifier is addressed. An authentication protocol suitable for the considered scenario which jointly employs the learning parity with noise (LPN problem and a paradigm of random selection is proposed. It is shown that the proposed protocol is secure against active attacking scenarios and so called GRS man-in-the-middle (MIM attacking scenarios. In comparison with the related previously reported authentication protocols the proposed one provides reduction of the implementation complexity and at least the same level of the cryptographic security.

  6. Implementation of a protocol proposed by the Brazilian National Health Surveillance Agency for antibiotic use in very low birth weight infants

    Directory of Open Access Journals (Sweden)

    Maria Cristina F. Guedes Pinto

    2013-09-01

    Conclusion: : The implementation of the protocol allowed improvement of sepsis diagnosis by reducing the diagnosis of probable early-onset sepsis, thus promoting efficient antimicrobial use in this population.

  7. Conventional radiotherapy treatments (direct planning) of head and neck with photon X10 planning system (cms) and Siemens Primus accelerator: proposed protocol planning, difficulties encountered, tricks practical and possible amendments to the class solution

    International Nuclear Information System (INIS)

    Saez, F.; Benito, M. A.; Saez, M.

    2011-01-01

    In this paper we propose a protocol for the systematic planning process for a planner and an Accelerator XiO Primus. This protocol includes the creation of ancillary volumes for better dosimetric evaluation and design fields. Are some practical tips and cases arise in which you can change the Class Solution home. We compare this treatment with 10 turns without turning table with other tables. Finally, we show the advantages of this method from the radiobiological point of view to the bone, the main body of this type of risk treatments.

  8. Quantum multi-signature protocol based on teleportation

    International Nuclear Information System (INIS)

    Wen Xiao-jun; Liu Yun; Sun Yu

    2007-01-01

    In this paper, a protocol which can be used in multi-user quantum signature is proposed. The scheme of signature and verification is based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states and the controlled quantum teleportation. Different from the digital signatures, which are based on computational complexity, the proposed protocol has perfect security in the noiseless quantum channels. Compared to previous quantum signature schemes, this protocol can verify the signature independent of an arbitrator as well as realize multi-user signature together. (orig.)

  9. Study protocol

    DEFF Research Database (Denmark)

    Smith, Benjamin E; Hendrick, Paul; Bateman, Marcus

    2017-01-01

    avoidance behaviours, catastrophising, self-efficacy, sport and leisure activity participation, and general quality of life. Follow-up will be 3 and 6 months. The analysis will focus on descriptive statistics and confidence intervals. The qualitative components will follow a thematic analysis approach....... DISCUSSION: This study will evaluate the feasibility of running a definitive large-scale trial on patients with patellofemoral pain, within the NHS in the UK. We will identify strengths and weaknesses of the proposed protocol and the utility and characteristics of the outcome measures. The results from...... this study will inform the design of a multicentre trial. TRIAL REGISTRATION: ISRCTN35272486....

  10. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  11. Dynamic microbubble contrast-enhanced US to measure tumor response to targeted therapy: a proposed clinical protocol with results from renal cell carcinoma patients receiving antiangiogenic therapy.

    Science.gov (United States)

    Williams, Ross; Hudson, John M; Lloyd, Brendan A; Sureshkumar, Ahthavan R; Lueck, Gordon; Milot, Laurent; Atri, Mostafa; Bjarnason, Georg A; Burns, Peter N

    2011-08-01

    To develop and implement an evidence-based protocol for characterizing vascular response of renal cell carcinoma (RCC) to targeted therapy by using dynamic contrast material-enhanced (DCE) ultrasonography (US). The study was approved by the institutional research ethics board; written informed consent was obtained from all patients. Seventeen patients (four women; median age, 58 years; range, 42-72 years; 13 men, median age, 62 years; range, 45-81 years) with metastatic RCC were examined by using DCE US before and after 2 weeks of treatment with sunitinib (May 2007 to October 2009). Two contrast agent techniques--bolus injection and disruption-replenishment infusion of microbubbles--were compared. Changes in tumor blood velocity and fractional blood volume were measured with both methods, together with reproducibility and effect of compensation for respiratory motion. Tumor changes were assessed with computed tomography, by using the best response with the Response Evaluation Criteria in Solid Tumors (RECIST) and progression-free survival (PFS). Follow-up RECIST measurements were performed at 6-week intervals until progressive disease was detected. In response to treatment, median tumor fractional blood volume measured with the disruption-replenishment infusion method decreased by 73.2% (interquartile range, 46%-87%) (P protocol is a flexible method suitable for many tumor types, but further studies are needed to assess whether this protocol may be predictive of patient outcome. © RSNA, 2011.

  12. Protocols development for security and privacy of radio frequency identification systems

    Science.gov (United States)

    Sabbagha, Fatin

    There are benefits to adopting radio frequency identification (RFID) technology, although there are methods of attack that can compromise the system. This research determined how that may happen and what possible solutions can keep that from happening. Protocols were developed to implement better security. In addition, new topologies were developed to handle the problems of the key management. Previously proposed protocols focused on providing mutual authentication and privacy between readers and tags. However, those protocols are still vulnerable to be attacked. These protocols were analyzed and the disadvantages shown for each one. Previous works assumed that the channels between readers and the servers were secure. In the proposed protocols, a compromised reader is considered along with how to prevent tags from being read by that reader. The new protocols provide mutual authentication between readers and tags and, at the same time, remove the compromised reader from the system. Three protocols are proposed. In the first protocol, a mutual authentication is achieved and a compromised reader is not allowed in the network. In the second protocol, the number of times a reader contacts the server is reduced. The third protocol provides authentication and privacy between tags and readers using a trusted third party. The developed topology is implemented using python language and simulates work to check the efficiency regarding the processing time. The three protocols are implemented by writing codes in C language and then compiling them in MSP430. IAR Embedded workbench is used, which is an integrated development environment with the C/C++ compiler to generate a faster code and to debug the microcontroller. In summary, the goal of this research is to find solutions for the problems on previously proposed protocols, handle a compromised reader, and solve key management problems.

  13. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    -logic) and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols.

  14. Apicectomía quirúrgica: propuesta de un protocolo basado en la evidencia Surgical apicoectomy: proposed evidence-based protocol

    Directory of Open Access Journals (Sweden)

    Víctor Gómez-Carrillo

    2011-06-01

    Full Text Available Diversos refinamientos de la técnica quirúrgica de apicectomía han propiciado que su tasa de éxito haya aumentado de modo considerable. Se revisa la bibliografía científica para determinar cuáles de estos procedimientos son superiores. Se realiza un protocolo que aúna racionalmente esas técnicas, con lo que así se optimiza el resultado final de la intervención.Diverse refinements of the apicoectomy surgical technique have considerably increased the success rate of the procedure. The scientific literature was reviewed to identify the most relevant procedures for the final outcome of surgery. A protocol was prepared to facilitate the rational selection of technique, thus optimizing the surgical outcome.

  15. High dose phenobarbitone coma in pediatric refractory status epilepticus; a retrospective case record analysis, a proposed protocol and review of literature.

    Science.gov (United States)

    Gulati, Sheffali; Sondhi, Vishal; Chakrabarty, Biswaroop; Jauhari, Prashant; Lodha, Rakesh; Sankar, Jhuma

    2018-04-01

    Ongoing refractory status epilepticus is associated with significant morbidity and mortality. Therapeutic coma induction with midazolam, thiopentone, phenobarbitone or propofol is indicated when conventional antiepileptics fail to abort seizure. Of these, the most extensively studied is midazolam. Amongst the remaining three, phenobarbitone has the most favourable pharmacological profile, but has not been studied adequately, more so in the pediatric age group. The current retrospective case records analysis is an attempt to describe use of phenobarbitone coma in pediatric refractory status epilepticus. Case records of patients, admitted with status epilepticus to the pediatric inpatient services of a tertiary care teaching hospital of North India between January 2014 and December 2016 were reviewed. Those with refractory status epilepticus who failed to respond to midaolam infusion and phenobarbitone coma was used were included for analysis. Overall, 108 children presented in status, of which 34 developed refractory status epilepticus. Of these 34, 21 responded to midazolam infusion and in 13 high dose phenobarbitone coma following a standardised protocol was used. Amongst these 13 (8 males and 5 females, median age 6 years, IQR: 2.5-9.5), 12 responded and 1 succumbed. The median time to clinical seizure resolution and desired electroencephalographic changes post phenobarbitone initiation were 16 (IQR: 12-25) and 72 h (IQR: 48-120) respectively. High dose phenobarbitone appears to be an effective therapeutic modality in pediatric refractory status epilepticus. The current study provides a protocol for its use which can be validated in future studies with larger sample size. Copyright © 2018 The Japanese Society of Child Neurology. Published by Elsevier B.V. All rights reserved.

  16. Security of the arbitrated quantum signature protocols revisited

    International Nuclear Information System (INIS)

    Kejia, Zhang; Dan, Li; Qi, Su

    2014-01-01

    Recently, much attention has been paid to the study of arbitrated quantum signature (AQS). Among these studies, the cryptanalysis of some AQS protocols and a series of improved ideas have been proposed. Compared with the previous analysis, we present a security criterion, which can judge whether an AQS protocol is able to prevent the receiver (i.e. one participant in the signature protocol) from forging a legal signature. According to our results, it can be seen that most AQS protocols which are based on the Zeng and Keitel (ZK) model are susceptible to a forgery attack. Furthermore, we present an improved idea of the ZK protocol. Finally, some supplement discussions and several interesting topics are provided. (paper)

  17. Cryptographic protocol security analysis based on bounded constructing algorithm

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    An efficient approach to analyzing cryptographic protocols is to develop automatic analysis tools based on formal methods. However, the approach has encountered the high computational complexity problem due to reasons that participants of protocols are arbitrary, their message structures are complex and their executions are concurrent. We propose an efficient automatic verifying algorithm for analyzing cryptographic protocols based on the Cryptographic Protocol Algebra (CPA) model proposed recently, in which algebraic techniques are used to simplify the description of cryptographic protocols and their executions. Redundant states generated in the analysis processes are much reduced by introducing a new algebraic technique called Universal Polynomial Equation and the algorithm can be used to verify the correctness of protocols in the infinite states space. We have implemented an efficient automatic analysis tool for cryptographic protocols, called ACT-SPA, based on this algorithm, and used the tool to check more than 20 cryptographic protocols. The analysis results show that this tool is more efficient, and an attack instance not offered previously is checked by using this tool.

  18. Concrete Security for Entity Recognition: The Jane Doe Protocol

    DEFF Research Database (Denmark)

    Lucks, Stefan; Zenner, Erik; Weimerskirch, Andre

    2008-01-01

    Entity recognition does not ask whether the message is from some entity X, just whether a message is from the same entity as a previous message. This turns turns out to be very useful for low-end devices. The current paper proposes a new protocol – the “Jane Doe Protocol” –, and provides a formal...

  19. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  20. Protocol proposal for radon concentration mensuration from granitic rocks in marble factory; Proposta de protocolo para medicao de concentracoes de radonio proveniente de rochas graniticas em marmorarias

    Energy Technology Data Exchange (ETDEWEB)

    Del Claro, Flavia

    2016-11-01

    Naturally occurring radionuclides such as radon ({sup 222}Rn), its decay products and other elements from the radioactive series of uranium ({sup 238}U and {sup 235}U) and thorium ({sup 232}Th) are an important source of human exposure to natural radioactivity. The worldwide evaluation of health radiobiological effects and risks from population exposure to natural radionuclides is a growing concern. Radionuclides such as radon ({sup 222}Rn), the thoron ({sup 220}Rn), radio ({sup 2}'2'6Ra), thorium ({sup 23}'2Th) and potassium ({sup 40}K) may occur in materials commonly used in construction of dwellings and buildings. Thus, the radioactivity from marbles and granites is of importance, so that under certain conditions these materials radioactivity levels can be hazardous requiring the implementation of mitigation measurements. This research presents a technical protocol marble factories for the control human exposure to natural radioactivity exhaled from granitic rocks. The protocol was based on measurements of the {sup 222}Rn and {sup 220}Rn concentration in Brazilian granite rocks commonly nationally and exported. The {sup 222}Rn and {sup 220}Rn measurements were done using the AlphaGUARD (Saphymo GmbH) and RAD7 (Durridge Company) apparatus, respectively. The samples of granite were sealed in glass jars for 40 days in to achieve secular equilibrium between {sup 226}Ra and {sup 222}Rn radionuclides. The measurements were performed on Applied Nuclear Physics Laboratory at the Federal Technological University of Parana. Also, solid-state nuclear track detectors CR-39 were installed in a marble factory environments located in Curitiba - Parana for the evaluation of {sup 222}Rn concentrations in workplaces. The CR-39 detectors were exposed for about 90 days and submitted to etching process. The alpha particle tracks were observed using an optical microscope. Some granite samples analyzed presented {sup 222}Rn concentrations of attention, since the average

  1. Multi-party quantum key agreement protocol secure against collusion attacks

    Science.gov (United States)

    Wang, Ping; Sun, Zhiwei; Sun, Xiaoqiang

    2017-07-01

    The fairness of a secure multi-party quantum key agreement (MQKA) protocol requires that all involved parties are entirely peer entities and can equally influence the outcome of the protocol to establish a shared key wherein no one can decide the shared key alone. However, it is found that parts of the existing MQKA protocols are sensitive to collusion attacks, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. In this paper, a multi-party QKA protocol resisting collusion attacks is proposed. Different from previous QKA protocol resisting N-1 coconspirators or resisting 1 coconspirators, we investigate the general circle-type MQKA protocol which can be secure against t dishonest participants' cooperation. Here, t < N. We hope the results of the presented paper will be helpful for further research on fair MQKA protocols.

  2. Protocol for counterfactually transporting an unknown qubit

    Directory of Open Access Journals (Sweden)

    Hatim eSalih

    2016-01-01

    Full Text Available Quantum teleportation circumvents the uncertainty principle using dual channels: a quantum one consisting of previously-shared entanglement, and a classical one, together allowing the disembodied transport of an unknown quantum state over distance. It has recently been shown that a classical bit can be counterfactually communicated between two parties in empty space, Alice and Bob. Here, by using our dual version of the chained quantum Zeno effect to achieve a counterfactual CNOT gate, we propose a protocol for transporting an unknown qubit counterfactually, that is without any physical particles travelling between Alice and Bob—no classical channel and no previously-shared entanglement.

  3. The efficacy and safety of a proposed herbal moisturising cream for dry skin and itch relief: a randomised, double-blind, placebo-controlled trial--study protocol.

    Science.gov (United States)

    Lee, Dong-Hyo; Seo, Eun-Sung; Hong, Jin-Tae; Lee, Gang-Tai; You, Young-Kyoung; Lee, Kun-Kook; Jo, Ga-Won; Kim, Nam-Kwen

    2013-11-25

    Moisturisers prevent and treat dry skin. They can also protect sensitive skin, improve skin tone and texture, and mask imperfections. Herbal medicines or their extracts have been available as topical formulations and cosmetics. Arctium lappa L. (Asteraceae) has been used to treat inflammatory disorders and various skin problems. It could be a candidate herbal medicine for treating dry skin condition.This study aims to establish the efficacy and safety of a proposed herbal moisturising cream containing Arctium lappa L. seed extract, which has been approved by the Korean Ministry of Food and Drug Safety for use in cosmetics. This study is a randomised, double-blind, placebo-controlled study with two parallel groups (proposed herbal moisturising cream vs. placebo cream). We will recruit 66 healthy male and female participants, aged 20 to 65 years, who have been diagnosed with dry skin conditions. Participants will be randomly allocated to receive either the proposed herbal moisturising cream or a placebo cream for four weeks. Each participant will be examined for signs and symptoms before and after using the cream. Skin hydration, sebum (oily secretion) levels and transepidermal water loss (TEWL; constitutive loss of water from the skin surface) will be assessed. Participants will also be asked to fill out a health-related quality of life questionnaire. Safety will be assessed using blood tests, urine analysis, a pregnancy test, and the assessment of vital signs. This trial will utilise high-quality methodologies in accordance with both consolidated standards for reporting trials guidelines and the guidelines for clinical trials of cosmetics products that are aimed at expressions and advertisement approval in Korea. It will evaluate the clinical efficacy and safety of a proposed herbal moisturising cream containing Arctium lappa L. seed extract to treat dry skin conditions and provide itch relief. Moreover, we will also employ health-related quality of life

  4. The efficacy and safety of a proposed herbal moisturising cream for dry skin and itch relief: a randomised, double-blind, placebo-controlled trial- study protocol

    Science.gov (United States)

    2013-01-01

    Background Moisturisers prevent and treat dry skin. They can also protect sensitive skin, improve skin tone and texture, and mask imperfections. Herbal medicines or their extracts have been available as topical formulations and cosmetics. Arctium lappa L. (Asteraceae) has been used to treat inflammatory disorders and various skin problems. It could be a candidate herbal medicine for treating dry skin condition. This study aims to establish the efficacy and safety of a proposed herbal moisturising cream containing Arctium lappa L. seed extract, which has been approved by the Korean Ministry of Food and Drug Safety for use in cosmetics. Methods/Designs This study is a randomised, double-blind, placebo-controlled study with two parallel groups (proposed herbal moisturising cream vs. placebo cream). We will recruit 66 healthy male and female participants, aged 20 to 65 years, who have been diagnosed with dry skin conditions. Participants will be randomly allocated to receive either the proposed herbal moisturising cream or a placebo cream for four weeks. Each participant will be examined for signs and symptoms before and after using the cream. Skin hydration, sebum (oily secretion) levels and transepidermal water loss (TEWL; constitutive loss of water from the skin surface) will be assessed. Participants will also be asked to fill out a health-related quality of life questionnaire. Safety will be assessed using blood tests, urine analysis, a pregnancy test, and the assessment of vital signs. Discussion This trial will utilise high-quality methodologies in accordance with both consolidated standards for reporting trials guidelines and the guidelines for clinical trials of cosmetics products that are aimed at expressions and advertisement approval in Korea. It will evaluate the clinical efficacy and safety of a proposed herbal moisturising cream containing Arctium lappa L. seed extract to treat dry skin conditions and provide itch relief. Moreover, we will also employ

  5. A Secure and Effective Anonymous Integrity Checking Protocol for Data Storage in Multicloud

    Directory of Open Access Journals (Sweden)

    Lingwei Song

    2015-01-01

    Full Text Available How to verify the integrity of outsourced data is an important problem in cloud storage. Most of previous work focuses on three aspects, which are providing data dynamics, public verifiability, and privacy against verifiers with the help of a third party auditor. In this paper, we propose an identity-based data storage and integrity verification protocol on untrusted cloud. And the proposed protocol can guarantee fair results without any third verifying auditor. The theoretical analysis and simulation results show that our protocols are secure and efficient.

  6. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  7. [Sampling, storage and transport of biological materials collected from living and deceased subjects for determination of concentration levels of ethyl alcohol and similarly acting substances. A proposal of updating the blood and urine sampling protocol].

    Science.gov (United States)

    Wiergowski, Marek; Reguła, Krystyna; Pieśniak, Dorota; Galer-Tatarowicz, Katarzyna; Szpiech, Beata; Jankowski, Zbigniew

    2007-01-01

    The present paper emphasizes the most common mistakes committed at the beginning of an analytical procedure. To shorten the time and decrease the cost of determinations of substances with similar to alcohol activity, it is postulated to introduce mass-scale screening analysis of saliva collected from a living subject at the site of the event, with all positive results confirmed in blood or urine samples. If no saliva sample is collected for toxicology, a urine sample, allowing for a stat fast screening analysis, and a blood sample, to confirm the result, should be ensured. Inappropriate storage of a blood sample in the tube without a preservative can cause sample spilling and its irretrievable loss. The authors propose updating the "Blood/urine sampling protocol", with the updated version to be introduced into practice following consultations and revisions.

  8. Proposal of a calibration protocol of gamma chambers for estimation of the radionuclides incorporation in emergency situations; Propuesta de un protocolo de calibracion de camaras gamma para estimacion de la incorporacion de radionucleidos en situaciones de emergencia

    Energy Technology Data Exchange (ETDEWEB)

    Dantas, B.M.; Lucena, E.; Dantas, A.L.A.; Araujo, F.; Melo, D. [Instituto de Radioprotecao e Dosimetria, Rio de Janeiro Brasil (Brazil); Teran, M.; Paolino, A. [Facultad de Quimica, Montevideo (Uruguay); Hermida, J.C. [Hospital de Clinicas, Facultad de Medicina, Montevideo (Uruguay); Rojo, A. [Autoridad Regulatoria Nuclear, Buenos Aires (Argentina); Puerta, J.A.; Morales, J. [Universidad Nacional de Colombia, Medellin (Colombia); Lopez B, G.M. [Centro de Proteccion e Higiene de las Radiaciones, Ciudad de la Habana (Cuba); Alfaro, M.; Ruiz, M.A. [Instituto Nacional de Investigaciones Nucleares (Mexico); Videla, R.; Pinones, O. [Comision Chilena de Energia Nuclear, Santiago (Chile); Gonzalez, S. [Instituto Peruano de Energia Nuclear, Lima (Peru); Navarro, T. [Centro de Investigaciones Energeticas, Medioambientales y Tecnologicas, Madrid (Spain); Cruz S, R. [International Atomic Energy Agency, Vienna (Australia)

    2006-07-01

    In the last years in several countries has come increasing the concern with the possibility of accidents related to the transport and manipulation of open sources used in nuclear medicine. This carried out to the search of alternative methods for the monitoring of workers and individuals of the public exposed to the radionuclides incorporation like {sup 131} I, {sup 201} Tl, {sup 153} Sm among others. One of the options to assist the demand for monitoring of the radionuclides incorporation is the use of gamma chambers that are medical diagnostic equipment available in the own centers of nuclear medicine. The gamma chambers are used to obtain images of patient to which are administered a radionuclide of well-known activity with diagnostic purposes. These equipment have among its components elements that spectrometric systems like those used in the evaluation of the internal incorporation for direct measurements, reason why besides its use for diagnosis by image they can be gauged with anthropomorphic simulators and also with punctual sources for the quantification of the radionuclides activity, distributed homogeneously in the human body or located in specific organs. This work presents the development of a calibration protocol of gamma chambers for the in vivo determination of radionuclides and it proposes the implementation of the protocol in centers of nuclear medicine of the 9 countries participants of the project OAS-ARCAL-RLA/9/049-LXXVIII - Harmonization of procedures of internal dosimetry (Argentina, Brazil, Colombia, Cuba, Chile, Mexico, Peru, Uruguay and Spain). The protocol is the base to establish an integrated net to attend in the response to emergencies using nuclear medicine centers of public hospitals of the region. The proposal is an additional alternative for the monitoring of people in emergency situations where it is possible and feasible the use of the gamma chambers. This would avoid the person's transport with incorporation suspicion for

  9. Low-level laser therapy/photobiomodulation in the management of side effects of chemoradiation therapy in head and neck cancer: part 2: proposed applications and treatment protocols

    Science.gov (United States)

    Zecha, Judith A. E. M.; Raber-Durlacher, Judith E.; Nair, Raj G.; Epstein, Joel B.; Elad, Sharon; Hamblin, Michael R.; Barasch, Andrei; Migliorati, Cesar A.; Milstein, Dan M. J.; Genot, Marie-Thérèse; Lansaat, Liset; van der Brink, Ron; Arnabat-Dominguez, Josep; van der Molen, Lisette; Jacobi, Irene; van Diessen, Judi; de Lange, Jan; Smeele, Ludi E.; Schubert, Mark M.

    2016-01-01

    Purpose There is a large body of evidence supporting the efficacy of low-level laser therapy (LLLT), more recently termed photobiomodulation (PBM) for the management of oral mucositis (OM) in patients undergoing radiotherapy for head and neck cancer (HNC). Recent advances in PBM technology, together with a better understanding of mechanisms involved and dosimetric parameters may lead to the management of a broader range of complications associated with HNC treatment. This could enhance patient adherence to cancer therapy, and improve quality of life and treatment outcomes. The mechanisms of action, dosimetric, and safety considerations for PBM have been reviewed in part 1. Part 2 discusses the head and neck treatment side effects for which PBM may prove to be effective. In addition, PBM parameters for each of these complications are suggested and future research directions are discussed. Methods Narrative review and presentation of PBM parameters are based on current evidence and expert opinion. Results PBM may have potential applications in the management of a broad range of side effects of (chemo)radiation therapy (CRT) in patients being treated for HNC. For OM management, optimal PBM parameters identified were as follows: wavelength, typically between 633 and 685 nm or 780–830 nm; energy density, laser or light-emitting diode (LED) output between 10 and 150 mW; dose, 2–3 J (J/cm2), and no more than 6 J/cm2 on the tissue surface treated; treatment schedule, two to three times a week up to daily; emission type, pulsed (<100 Hz); and route of delivery, intraorally and/or transcutaneously. To facilitate further studies, we propose potentially effective PBM parameters for prophylactic and therapeutic use in supportive care for dermatitis, dysphagia, dry mouth, dysgeusia, trismus, necrosis, lymphedema, and voice/speech alterations. Conclusion PBM may have a role in supportive care for a broad range of complications associated with the treatment of HNC with CRT

  10. An Energy-Efficient Link Layer Protocol for Reliable Transmission over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Iqbal Adnan

    2009-01-01

    Full Text Available In multihop wireless networks, hop-by-hop reliability is generally achieved through positive acknowledgments at the MAC layer. However, positive acknowledgments introduce significant energy inefficiencies on battery-constrained devices. This inefficiency becomes particularly significant on high error rate channels. We propose to reduce the energy consumption during retransmissions using a novel protocol that localizes bit-errors at the MAC layer. The proposed protocol, referred to as Selective Retransmission using Virtual Fragmentation (SRVF, requires simple modifications to the positive-ACK-based reliability mechanism but provides substantial improvements in energy efficiency. The main premise of the protocol is to localize bit-errors by performing partial checksums on disjoint parts or virtual fragments of a packet. In case of error, only the corrupted virtual fragments are retransmitted. We develop stochastic models of the Simple Positive-ACK-based reliability, the previously-proposed Packet Length Optimization (PLO protocol, and the SRVF protocol operating over an arbitrary-order Markov wireless channel. Our analytical models show that SRVF provides significant theoretical improvements in energy efficiency over existing protocols. We then use bit-error traces collected over different real networks to empirically compare the proposed and existing protocols. These experimental results further substantiate that SRVF provides considerably better energy efficiency than Simple Positive-ACK and Packet Length Optimization protocols.

  11. A Forward-secure Grouping-proof Protocol for Multiple RFID Tags

    Directory of Open Access Journals (Sweden)

    Liu Ya-li

    2012-09-01

    Full Text Available Designing secure and robust grouping-proof protocols based on RFID characteristics becomes a hotspot in the research of security in Internet of Things (IOT. The proposed grouping-proof protocols recently have security and/or privacy omission and these schemes afford order-dependence by relaying message among tags through an RFID reader. In consequence, aiming at enhancing the robustness, improving scalability, reducing the computation costs on resource-constrained devices, and meanwhile combing Computational Intelligence (CI with Secure Multi-party Communication (SMC, a Forward-Secure Grouping-Proof Protocol (FSGP for multiple RFID tags based on Shamir's (, secret sharing is proposed. In comparison with the previous grouping-proof protocols, FSGP has the characteristics of forward-security and order-independence addressing the scalability issue by avoiding relaying message. Our protocol provides security enhancement, performance improvement, and meanwhile controls the computation cost, which equilibrates both security and low cost requirements for RFID tags.

  12. On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2014-01-01

    Full Text Available Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010: (1 the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2 the protocol cannot protect clients’ passwords against an offline dictionary attack; and (3 the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  13. Abordagem fisioterapêutica no pré-parto: proposta de protocolo e avaliação da dor Physiotherapeutic approach in the pre-partum: proposed protocol and evaluate pain

    Directory of Open Access Journals (Sweden)

    Amanda de Souza Castro

    2012-09-01

    Full Text Available O objetivo deste estudo foi avaliar os efeitos da abordagem fisioterapêutica no pré-parto e propor um protocolo de intervenção baseado na escala visual analógica (EVA de dor. Dez parturientes, na primeira fase do trabalho de parto, foram questionadas quanto à dor através da EVA e, com base nas respostas, foi proposto um protocolo, EVA 1-3: cinesioterapia, técnicas respiratórias, relaxamento e estímulo à deambulação; EVA 4-7: massoterapia, técnicas respiratórias, relaxamento e estímulo à deambulação; EVA 8-10: técnicas respiratórias, relaxamento e eletroestimulação nervosa transcutânea. Após as intervenções, as voluntárias foram questionadas novamente através da EVA. Os dados da EVA pré- e pós-intervenção foram submetidos ao teste t pareado, atingindo valor médio de 8,8 pré-intervenção e 8,2 pós-intervenção, sem diferença estatística. Os resultados obtidos por meio da análise quantitativa de dor demonstraram que não houve aumento da mesma até uma hora após a intervenção, fato considerado positivo, uma vez que em função da crescente dilatação é esperado um aumento da dor. O protocolo fisioterapêutico proposto mostrou ser de fácil aplicabilidade, podendo auxiliar o fisioterapeuta na escolha da conduta mais adequada à realidade da sala de pré-parto. A abordagem fisioterapêutica no pré-parto parece interferir positivamente sobre a dor e o desconforto materno no grupo estudado.The aim of this study was to evaluate the effects of physical therapy approach in the antepartum and to propose an intervention protocol based on the visual analogue scale (VAS of pain. Ten parturients in the first stage of labor were questioned about the pain by VAS. Based on the responses, we proposed a protocol VAS 1-3: kinesiotherapy, breathing techniques, relaxation and stimulation of walking; VAS 4-7: massage therapy, breathing techniques, relaxation and stimulation of walking; VAS 8-10: breathing techniques

  14. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  15. Deployment Strategies and Clustering Protocols Efficiency

    Directory of Open Access Journals (Sweden)

    Chérif Diallo

    2017-06-01

    Full Text Available Wireless sensor networks face significant design challenges due to limited computing and storage capacities and, most importantly, dependence on limited battery power. Energy is a critical resource and is often an important issue to the deployment of sensor applications that claim to be omnipresent in the world of future. Thus optimizing the deployment of sensors becomes a major constraint in the design and implementation of a WSN in order to ensure better network operations. In wireless networking, clustering techniques add scalability, reduce the computation complexity of routing protocols, allow data aggregation and then enhance the network performance. The well-known MaxMin clustering algorithm was previously generalized, corrected and validated. Then, in a previous work we have improved MaxMin by proposing a Single- node Cluster Reduction (SNCR mechanism which eliminates single-node clusters and then improve energy efficiency. In this paper, we show that MaxMin, because of its original pathological case, does not support the grid deployment topology, which is frequently used in WSN architectures. The unreliability feature of the wireless links could have negative impacts on Link Quality Indicator (LQI based clustering protocols. So, in the second part of this paper we show how our distributed Link Quality based d- Clustering Protocol (LQI-DCP has good performance in both stable and high unreliable link environments. Finally, performance evaluation results also show that LQI-DCP fully supports the grid deployment topology and is more energy efficient than MaxMin.

  16. Previously unknown species of Aspergillus.

    Science.gov (United States)

    Gautier, M; Normand, A-C; Ranque, S

    2016-08-01

    The use of multi-locus DNA sequence analysis has led to the description of previously unknown 'cryptic' Aspergillus species, whereas classical morphology-based identification of Aspergillus remains limited to the section or species-complex level. The current literature highlights two main features concerning these 'cryptic' Aspergillus species. First, the prevalence of such species in clinical samples is relatively high compared with emergent filamentous fungal taxa such as Mucorales, Scedosporium or Fusarium. Second, it is clearly important to identify these species in the clinical laboratory because of the high frequency of antifungal drug-resistant isolates of such Aspergillus species. Matrix-assisted laser desorption/ionization-time of flight mass spectrometry (MALDI-TOF MS) has recently been shown to enable the identification of filamentous fungi with an accuracy similar to that of DNA sequence-based methods. As MALDI-TOF MS is well suited to the routine clinical laboratory workflow, it facilitates the identification of these 'cryptic' Aspergillus species at the routine mycology bench. The rapid establishment of enhanced filamentous fungi identification facilities will lead to a better understanding of the epidemiology and clinical importance of these emerging Aspergillus species. Based on routine MALDI-TOF MS-based identification results, we provide original insights into the key interpretation issues of a positive Aspergillus culture from a clinical sample. Which ubiquitous species that are frequently isolated from air samples are rarely involved in human invasive disease? Can both the species and the type of biological sample indicate Aspergillus carriage, colonization or infection in a patient? Highly accurate routine filamentous fungi identification is central to enhance the understanding of these previously unknown Aspergillus species, with a vital impact on further improved patient care. Copyright © 2016 European Society of Clinical Microbiology and

  17. Immunochemical protocols

    National Research Council Canada - National Science Library

    Pound, John D

    1998-01-01

    ... easy and important refinements often are not published. This much anticipated 2nd edition of Immunochemzcal Protocols therefore aims to provide a user-friendly up-to-date handbook of reliable techniques selected to suit the needs of molecular biologists. It covers the full breadth of the relevant established immunochemical methods, from protein blotting and immunoa...

  18. Proposta de roteiro para coleta de dados visando diagnóstico da drenagem urbana em planos diretores municipais / Protocol proposal for data collection seeking the urban drainage diagnostic in municipal urban plans

    Directory of Open Access Journals (Sweden)

    Rodrigo Braga Moruzzi

    2009-12-01

    mistakes while dealing with urban drainage and, from this stance, urban drainage is an indispensable theme that must be included in Urban Plans. Therefore, the identification of problems that are pertinent to urban drainage is an important aspect for the proposition of solutions. This paper focuses on a protocol proposal for data collection seeking the drainage diagnostic in urban planning. The 369/2006 guideline by CONAMA (Brazilian Agency of the Environment and other instruments cited by it were used. The protocol made the data collection and systematization easier and it appears as an alternative for information compilation routine and for the inventory of urban impacts, while also providing help in the listing of problems and in the proposition of guidelines regarding the urban drainage system. The experiment was limited to the case study, but the attributes were applied according to legal recommendations. We believe that the proposal has a potential to be extended to additional applications. We strongly recommend, however, continuous upgrade in the data collection process, information storage and actualization. Furthermore, we believe that the proposal may be improved for an analysis based upon risk classification.

  19. Review of Project Permits under the London Protocol - An Assessment of the Proposed P18-4 CO2 Storage Site: 13th International Conference on Greenhouse Gas Control Technologies, GHGT 2016. 14 November 2016 through 18 November

    NARCIS (Netherlands)

    Mikunda, T.; Dixon, T.

    2017-01-01

    The London Protocol (1996) is a global agreement to promote the protection of the marine environment by prohibiting the dumping of wastes and other matter into the sea. Under the Protocol all dumping is prohibited, with the exception of a limited number of selected wastes on the so-called "reverse

  20. Blind quantum computation protocol in which Alice only makes measurements

    Science.gov (United States)

    Morimae, Tomoyuki; Fujii, Keisuke

    2013-05-01

    Blind quantum computation is a new secure quantum computing protocol which enables Alice (who does not have sufficient quantum technology) to delegate her quantum computation to Bob (who has a full-fledged quantum computer) in such a way that Bob cannot learn anything about Alice's input, output, and algorithm. In previous protocols, Alice needs to have a device which generates quantum states, such as single-photon states. Here we propose another type of blind computing protocol where Alice does only measurements, such as the polarization measurements with a threshold detector. In several experimental setups, such as optical systems, the measurement of a state is much easier than the generation of a single-qubit state. Therefore our protocols ease Alice's burden. Furthermore, the security of our protocol is based on the no-signaling principle, which is more fundamental than quantum physics. Finally, our protocols are device independent in the sense that Alice does not need to trust her measurement device in order to guarantee the security.

  1. Reliability of diagnostic imaging techniques in suspected acute appendicitis: proposed diagnostic protocol; Indicacion de las tecnicas de diagnostico por la imagen en la sospecha de apendicitis aguda: propuesta de protocolo diagnostico

    Energy Technology Data Exchange (ETDEWEB)

    Cura del, J. L.; Oleaga, L.; Grande, D.; Vela, A. C.; Ibanez, A. M. [Hospital de Basureto. Bilbao (Spain)

    2001-07-01

    To study the utility of ultrasound and computed tomography (CT) in case of suspected appendicitis. To determine the diagnostic yield in terms of different clinical contexts and patient characteristics. to assess the costs and benefits of introducing these techniques and propose a protocol for their use. Negative appendectomies, complications and length of hospital stay in a group of 152 patients with suspected appendicitis who underwent ultrasound and CT were compared with those of 180 patients who underwent appendectomy during the same time period, but had not been selected for the first group: these patients costs for each group were calculated. In the first group, the diagnostic value of the clinical signs was also evaluated. The reliability of the clinical signs was limited, while the results with ultrasound and CT were excellent. The incidence of negative appendectomy was 9.6% in the study group and 12.2% in the control group. Moreover, there were fewer complications and a shorter hospital stay in the first group. Among men, however, the rate of negative appendectomy was lower in the control group. The cost of using ultrasound and CT in the management of appendicitis was only slightly higher than that of the control group. Although ultrasound and CT are not necessary in cases in which the probability of appendicitis is low or in men presenting clear clinical evidence, the use of these techniques is indicated in the remaining cases in which appendicitis is suspected. In children, ultrasound is the technique of choice. In all other patients, if negative results are obtained with one of the two techniques, the other should be performed. (Author) 49 refs.

  2. Review of Project Permits under the London Protocol - An Assessment of the Proposed P18-4 CO2 Storage Site: 13th International Conference on Greenhouse Gas Control Technologies, GHGT 2016. 14 November 2016 through 18 November

    OpenAIRE

    Mikunda, T.; Dixon, T.

    2017-01-01

    The London Protocol (1996) is a global agreement to promote the protection of the marine environment by prohibiting the dumping of wastes and other matter into the sea. Under the Protocol all dumping is prohibited, with the exception of a limited number of selected wastes on the so-called "reverse list", which can be considered for dumping. In 2007, an amendment entered into force which permitted CO2 streams to be considered for dumping under the London Protocol. The amendment was shortly fol...

  3. Protocol for the management of rheumatic diseases in the insured population of the CCSS, attached to the Hospital Mexico, presentation of a proposal for the management and monitoring of the most prevalent rheumatic diseases: rheumatoid arthritis

    International Nuclear Information System (INIS)

    Molina Guevara, Erick

    2013-01-01

    The protocols for the care of rheumatic diseases are designed to disseminate guidelines for early diagnosis and timely referral, for application in networks and for patient access to early treatment. A protocol of clinical practice is presented following the institutional guidelines, based on bibliography that could be implemented in the Costa Rican social security, these documents were discussed and validated locally by the Rheumatology service of the Hospital Mexico allowing protocolarizing the attention of the Rheumatoid Arthritis. For the construction of a clinical care protocol, the methodological manual of the DDSS code M.GM.DDSS.007 Version 01 CCSS, 2013 was used. The evidence was searched and selected from the following places: Medline, Tripdatabase, GIN network; This selection was made based on critical reading under the methodology of the Caspe Group, and the best available evidence was used, after discussing it in the sessions of the rheumatology service [es

  4. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  5. Beyond protocols

    DEFF Research Database (Denmark)

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impact...... information on risk and the exploration of improved methods for decision making on biodiversity management. This is crucial for efficient conservation resource allocation and uptake by stakeholders and the public......., transparency and repeatability of assessments as well as the incorporation of uncertainty should all be explicitly considered. We recommend improved quality control of risk assessments through formalized peer review with clear feedback between assessors and reviewers. Alternatively, a consensus building...

  6. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  7. Two-Layer Hierarchy Optimization Model for Communication Protocol in Railway Wireless Monitoring Networks

    Directory of Open Access Journals (Sweden)

    Xiaoping Ma

    2018-01-01

    Full Text Available The wireless monitoring system is always destroyed by the insufficient energy of the sensors in railway. Hence, how to optimize the communication protocol and extend the system lifetime is crucial to ensure the stability of system. However, the existing studies focused primarily on cluster-based or multihop protocols individually, which are ineffective in coping with the complex communication scenarios in the railway wireless monitoring system (RWMS. This study proposes a hybrid protocol which combines the cluster-based and multihop protocols (CMCP to minimize and balance the energy consumption in different sections of the RWMS. In the first hierarchy, the total energy consumption is minimized by optimizing the cluster quantities in the cluster-based protocol and the number of hops and the corresponding hop distances in the multihop protocol. In the second hierarchy, the energy consumption is balanced through rotating the cluster head (CH in the subnetworks and further optimizing the hops and the corresponding hop distances in the backbone network. On this basis, the system lifetime is maximized with the minimum and balance energy consumption among the sensors. Furthermore, the hybrid particle swarm optimization and genetic algorithm (PSO-GA are adopted to optimize the energy consumption from the two-layer hierarchy. Finally, the effectiveness of the proposed CMCP is verified in the simulation. The performances of the proposed CMCP in system lifetime, residual energy, and the corresponding variance are all superior to the LEACH protocol widely applied in the previous research. The effective protocol proposed in this study can facilitate the application of the wireless monitoring network in the railway system and enhance safety operation of the railway.

  8. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  9. Dysphonia risk screening protocol

    Science.gov (United States)

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  10. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  11. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  12. The Kyoto protocol development; La viabilite du protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)

    2002-04-01

    From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)

  13. An Optimal Non-Interactive Message Authentication Protocol

    OpenAIRE

    Pasini, Sylvain; Vaudenay, Serge

    2006-01-01

    Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SAS-based non-interactive message authentication protocols (NIMAP). We start by the analysis of two popular non-interactive message authentication protocols. The first one is based on a collision-resistant hash function and was presented by Balfanz et al. The second protocol is based on a universal hash function family and was proposed by Gehrmann, Mi...

  14. Cognitive Communications Protocols for SATCOM

    Science.gov (United States)

    2017-10-20

    communications protocols for satellite and space communications with possible broad applications in defense, homeland-security as well as consumer ...communications with possible broad applications in defense, homeland-security, and civilian as well as consumer telecommunications. Such cognitive...vulnerable against smart jammers that may attempt to learn the cognitive radios own behavior . In response, our second class of proposed algorithms

  15. A Cryptographic Moving-Knife Cake-Cutting Protocol

    Directory of Open Access Journals (Sweden)

    Yoshifumi Manabe

    2012-02-01

    Full Text Available This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum.

  16. Insecurity of position-based quantum-cryptography protocols against entanglement attacks

    International Nuclear Information System (INIS)

    Lau, Hoi-Kwan; Lo, Hoi-Kwong

    2011-01-01

    Recently, position-based quantum cryptography has been claimed to be unconditionally secure. On the contrary, here we show that the existing proposals for position-based quantum cryptography are, in fact, insecure if entanglement is shared among two adversaries. Specifically, we demonstrate how the adversaries can incorporate ideas of quantum teleportation and quantum secret sharing to compromise the security with certainty. The common flaw to all current protocols is that the Pauli operators always map a codeword to a codeword (up to an irrelevant overall phase). We propose a modified scheme lacking this property in which the same cheating strategy used to undermine the previous protocols can succeed with a rate of at most 85%. We prove the modified protocol is secure when the shared quantum resource between the adversaries is a two- or three-level system.

  17. Model checking the HAVi leader election protocol

    NARCIS (Netherlands)

    J.M.T. Romijn (Judi)

    1999-01-01

    textabstractThe HAVi specification proposes an architecture for audio/video interoperability in home networks. Part of the HAVi specification is a distributed leader election protocol. We have modelled this leader election protocol in Promela and Lotos and have checked several properties with the

  18. Network Coding Protocols for Smart Grid Communications

    DEFF Research Database (Denmark)

    Prior, Rui; Roetter, Daniel Enrique Lucani; Phulpin, Yannick

    2014-01-01

    We propose a robust network coding protocol for enhancing the reliability and speed of data gathering in smart grids. At the heart of our protocol lies the idea of tunable sparse network coding, which adopts the transmission of sparsely coded packets at the beginning of the transmission process b...

  19. Underestimation of Severity of Previous Whiplash Injuries

    Science.gov (United States)

    Naqui, SZH; Lovell, SJ; Lovell, ME

    2008-01-01

    INTRODUCTION We noted a report that more significant symptoms may be expressed after second whiplash injuries by a suggested cumulative effect, including degeneration. We wondered if patients were underestimating the severity of their earlier injury. PATIENTS AND METHODS We studied recent medicolegal reports, to assess subjects with a second whiplash injury. They had been asked whether their earlier injury was worse, the same or lesser in severity. RESULTS From the study cohort, 101 patients (87%) felt that they had fully recovered from their first injury and 15 (13%) had not. Seventy-six subjects considered their first injury of lesser severity, 24 worse and 16 the same. Of the 24 that felt the violence of their first accident was worse, only 8 had worse symptoms, and 16 felt their symptoms were mainly the same or less than their symptoms from their second injury. Statistical analysis of the data revealed that the proportion of those claiming a difference who said the previous injury was lesser was 76% (95% CI 66–84%). The observed proportion with a lesser injury was considerably higher than the 50% anticipated. CONCLUSIONS We feel that subjects may underestimate the severity of an earlier injury and associated symptoms. Reasons for this may include secondary gain rather than any proposed cumulative effect. PMID:18201501

  20. Protocol of image guided off-line using cone beam CT megavoltage; Protocolo de imagen guiada off-line mediante Cone Beam CT de megavoltaje

    Energy Technology Data Exchange (ETDEWEB)

    Garcia Ruiz-Zorrilla, J.; Fernandez Leton, J. P.; Perez Moreno, J. M.; Zucca Aparicio, D.; Minambres Moro, A.

    2013-07-01

    The goal of image guided protocols offline is to reduce systematic errors in positioning of the patient in the treatment unit, being more important than the random errors, since the systematic have one contribution in the margin of the CTV to the PTV. This paper proposes a protocol for image guided offline with the different actions to take with their threshold values evaluated previously by anatomic location in a sample of 474 patients and 4821Cone beam Megavoltaje CT (CBCT). (Author)

  1. The Pelindaba text and its previous

    International Nuclear Information System (INIS)

    Adeniji, O.

    1996-01-01

    The main body of the Treaty, the preamble, articles 1-22, and the map are reproduced in this issue in the section ''Documentation Relating to Disarmament and International Security''. The complete text, including annexes and protocols, is contained in document A/50/426

  2. Search and nonsearch protocols for radiographic consultation

    International Nuclear Information System (INIS)

    Swensson, R.G.; Theodore, G.H.

    1989-01-01

    Six radiologists, acting as film reviewers, used two different consultation protocols to differentiate among 292 ambiguous findings on chest films: 120 simulated nodules and 172 normal findings (previous readers' false-positive reports of nodules). The non-search protocol identified each finding (by location), and reviewers rated its likelihood as a nodule. The search protocol, which asked reviewers to report and rate all locations regarded as possible nodules on each film, assigned a default negative rating to any unreported finding (nodule or normal). Receiver operator characteristic analyses demonstrated a significantly higher accuracy for each reviewer's search- protocol discriminations between these nodules and confusing normal findings

  3. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  4. Distributed synchronization of networked drive-response systems: A nonlinear fixed-time protocol.

    Science.gov (United States)

    Zhao, Wen; Liu, Gang; Ma, Xi; He, Bing; Dong, Yunfeng

    2017-11-01

    The distributed synchronization of networked drive-response systems is investigated in this paper. A novel nonlinear protocol is proposed to ensure that the tracking errors converge to zeros in a fixed-time. By comparison with previous synchronization methods, the present method considers more practical conditions and the synchronization time is not dependent of arbitrary initial conditions but can be offline pre-assign according to the task assignment. Finally, the feasibility and validity of the presented protocol have been illustrated by a numerical simulation. Copyright © 2017. Published by Elsevier Ltd.

  5. Families of quantum fingerprinting protocols

    Science.gov (United States)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  6. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  7. Linear transceiver design for nonorthogonal amplify-and-forward protocol using a bit error rate criterion

    KAUST Repository

    Ahmed, Qasim Zeeshan

    2014-04-01

    The ever growing demand of higher data rates can now be addressed by exploiting cooperative diversity. This form of diversity has become a fundamental technique for achieving spatial diversity by exploiting the presence of idle users in the network. This has led to new challenges in terms of designing new protocols and detectors for cooperative communications. Among various amplify-and-forward (AF) protocols, the half duplex non-orthogonal amplify-and-forward (NAF) protocol is superior to other AF schemes in terms of error performance and capacity. However, this superiority is achieved at the cost of higher receiver complexity. Furthermore, in order to exploit the full diversity of the system an optimal precoder is required. In this paper, an optimal joint linear transceiver is proposed for the NAF protocol. This transceiver operates on the principles of minimum bit error rate (BER), and is referred as joint bit error rate (JBER) detector. The BER performance of JBER detector is superior to all the proposed linear detectors such as channel inversion, the maximal ratio combining, the biased maximum likelihood detectors, and the minimum mean square error. The proposed transceiver also outperforms previous precoders designed for the NAF protocol. © 2002-2012 IEEE.

  8. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... active and adaptive corruptions in the random oracle model. Due to its simplicity, the protocol is extremely efficient and it allows to perform m 1-out-of-n OTs using only: - Computation: (n+1)m+2 exponentiations (mn for the receiver, mn+2 for the sender) and - Communication: 32(m+1) bytes (for the group...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  9. Password Authenticated Key Exchange and Protected Password Change Protocols

    Directory of Open Access Journals (Sweden)

    Ting-Yi Chang

    2017-07-01

    Full Text Available In this paper, we propose new password authenticated key exchange (PAKE and protected password change (PPC protocols without any symmetric or public-key cryptosystems. The security of the proposed protocols is based on the computational Diffie-Hellman assumption in the random oracle model. The proposed scheme can resist both forgery server and denial of service attacks.

  10. Biometrics based authentication scheme for session initiation protocol

    OpenAIRE

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when co...

  11. Benchmarking the ERG valve tip and MRI Interventions Smart Flow neurocatheter convection-enhanced delivery system's performance in a gel model of the brain: employing infusion protocols proposed for gene therapy for Parkinson's disease

    Science.gov (United States)

    Sillay, Karl; Schomberg, Dominic; Hinchman, Angelica; Kumbier, Lauren; Ross, Chris; Kubota, Ken; Brodsky, Ethan; Miranpuri, Gurwattan

    2012-04-01

    Convection-enhanced delivery (CED) is an advanced infusion technique used to deliver therapeutic agents into the brain. CED has shown promise in recent clinical trials. Independent verification of published parameters is warranted with benchmark testing of published parameters in applicable models such as gel phantoms, ex vivo tissue and in vivo non-human animal models to effectively inform planned and future clinical therapies. In the current study, specific performance characteristics of two CED infusion catheter systems, such as backflow, infusion cloud morphology, volume of distribution (mm3) versus the infused volume (mm3) (Vd/Vi) ratios, rate of infusion (µl min-1) and pressure (mmHg), were examined to ensure published performance standards for the ERG valve-tip (VT) catheter. We tested the hypothesis that the ERG VT catheter with an infusion protocol of a steady 1 µl min-1 functionality is comparable to the newly FDA approved MRI Interventions Smart Flow (SF) catheter with the UCSF infusion protocol in an agarose gel model. In the gel phantom models, no significant difference was found in performance parameters between the VT and SF catheter. We report, for the first time, such benchmark characteristics in CED between these two otherwise similar single-end port VT with stylet and end-port non-stylet infusion systems. Results of the current study in agarose gel models suggest that the performance of the VT catheter is comparable to the SF catheter and warrants further investigation as a tool in the armamentarium of CED techniques for eventual clinical use and application.

  12. Sincalide - the final protocol

    International Nuclear Information System (INIS)

    Clarke, E.A.; Notghi, A.; Hesslewood, S.R.; Harding, L.K.

    2002-01-01

    Full text: HIDA biliary studies examine the gallbladder (GB) to give a percentage ejection fraction (EF). Porcine CCK was an accepted agent for stimulating the GB prior to being withdrawn in the UK from 1998. Sincalide (a synthetic CCK) was the suggested replacement. We have tried many administration regimes in an attempt to get results comparable with our established CCK protocols. Dose concentration and length of infusion times have been studied. Initially a dose of 10 ngm/kg/min given over 2 minutes (manufacturer's recommended dose) was used. This gave falsely low ejection fractions. The dose was reduced to 3 ngm/kg/min over 3 minutes as it was felt the higher dose may be causing constriction of the sphincter of Oddi. This gave a slight improvement with 22 % of patients having normal EF (>35 %). The length of infusion was extended to 15 minutes and the dose concentration reduced again to 0.6 ngm/kg/min. 62 % of patients had a normal EF. However, on many of the curves the gallbladder was still contracting on completion of the 15 minute infusion and began to refill immediately after stopping Sincalide. A further change of protocol was indicated. The infusion time was extended to 30 minutes and the dose concentration per minute kept the same. Imaging began at 30 minutes post HIDA injection and continued for a total of 50 minutes. Sincalide infusion began at 35 minutes if a GB was visualized. This protocol has been performed on 17 patients. 53 % of these had a normal result (comparable with a normal rate of 40 % previously established with CCK) with a mean EF of 60 %. The mean EF of patients with abnormal studies was 15 %. Curves showed a plateau by 30 minutes in 94 % of patients indicating that gallbladder contraction was complete. No normal range is available so results were compared with ultrasound (US). All patients who had an abnormal US scan also had abnormal HIDA results. Three patients had a normal US scan and abnormal HIDA study. These are currently

  13. Using semantics for representing experimental protocols.

    Science.gov (United States)

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  14. An entanglement concentration protocol for cluster states using ...

    Indian Academy of Sciences (India)

    Permanent link: http://www.ias.ac.in/article/fulltext/pram/086/05/0973-0983 ... The purpose of this paper is a proposal on entanglement concentration protocol forcluster states. The protocol ... We also make a comparative numerical study of the residual entanglement left out after the execution of each step of the protocol.

  15. An improved AODV routing protocol based on tower structure

    Directory of Open Access Journals (Sweden)

    Li Yong Qiang

    2016-01-01

    Full Text Available The paper proposed a new routing protocol(IAODV based on tower structure in the Ad Hoc network for the problem which Location Routing Protocol need hardware and Complex algorithm. By the simulation, The complexity of the new routing protocol is reduced without reducing the performance of the network.

  16. A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS

    Directory of Open Access Journals (Sweden)

    U. Latha

    2013-08-01

    Full Text Available The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints information. The proposed system comprised of three phases namely, fingerprint reconstruction, feature extraction and development of trigon based security protocol. In fingerprint reconstruction, the different crack variance level finger prints images are reconstructed by the M-band Dual Tree Complex Wavelet Transform (DTCWT. After that features are extracted by binarization. A set of finger print images are utilized to evaluate the performance of security protocol and the result from this process guarantees the healthiness of the proposed trigon based security protocol. The implementation results show the effectiveness of proposed trigon based security protocol in protecting the finger print information and the achieved improvement in image reconstruction and the security process.

  17. Authentication Protocol using Quantum Superposition States

    Energy Technology Data Exchange (ETDEWEB)

    Kanamori, Yoshito [University of Alaska; Yoo, Seong-Moo [University of Alabama, Huntsville; Gregory, Don A. [University of Alabama, Huntsville; Sheldon, Frederick T [ORNL

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  18. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  19. Symbolic Model Checking and Analysis for E-Commerce Protocol

    Institute of Scientific and Technical Information of China (English)

    WEN Jing-Hua; ZHANG Mei; LI Xiang

    2005-01-01

    A new approach is proposed for analyzing non-repudiation and fairness of e-commerce protocols. The authentication e-mail protocol CMP1 is modeled as finite state machine and analyzed in two vital aspects - non-repudiation and fairness using SMV. As a result, the CMP1 protocol is not fair and we have improved it. This result shows that it is effective to analyze and check the new features of e-commerce protocols using SMV model checker

  20. Re-examining the security of blind quantum signature protocols

    International Nuclear Information System (INIS)

    Wang Mingming; Chen Xiubo; Niu Xinxin; Yang Yixian

    2012-01-01

    Recently, blind quantum signature (BQS) protocols have been proposed with the help of a third-party verifier. However, our research shows that some of the BQS protocols are unable to complete the blind signature task fairly if the verifier is dishonest. Indeed, these protocols can be viewed as variants of the classical digital signature scheme of symmetric-key cryptography. If nobody is trusted in such protocols, digital signature cannot be implemented since disagreements cannot be solved fairly.

  1. Optimized UAV Communication Protocol Based on Prior Locations

    OpenAIRE

    Sboui, Lokman; Rabah, Abdullatif

    2015-01-01

    In this paper, we adopt a new communication protocol between the UAV and fixed on-ground nodes. This protocol tends to reduce communication power consumption by stopping communication if the channel is not good to communicate (i.e. far nodes, obstacles, etc.) The communication is performed using the XBee 868M standard and Libelium wapsmotes. Our designed protocol is based on a new communication model that we propose in this paper. The protocole decides wether to communicate or not after compu...

  2. CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network

    OpenAIRE

    Rashed, M. G.; Kabir, M. Hasnat; Rahim, M. Sajjadur; Ullah, Sk. Enayet

    2012-01-01

    A new two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol (CBHRP) is proposed in this paper. It is an extension of LEACH routing protocol. We introduce cluster head-set idea for cluster-based routing where several clusters are formed with the deployed sensors to collect information from target field. On rotation basis, a head-set member receives data from the neighbor nodes and transmits the aggregated results to the distance base station. This protocol ...

  3. A model based security testing method for protocol implementation.

    Science.gov (United States)

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  4. Preoperative screening: value of previous tests.

    Science.gov (United States)

    Macpherson, D S; Snow, R; Lofgren, R P

    1990-12-15

    To determine the frequency of tests done in the year before elective surgery that might substitute for preoperative screening tests and to determine the frequency of test results that change from a normal value to a value likely to alter perioperative management. Retrospective cohort analysis of computerized laboratory data (complete blood count, sodium, potassium, and creatinine levels, prothrombin time, and partial thromboplastin time). Urban tertiary care Veterans Affairs Hospital. Consecutive sample of 1109 patients who had elective surgery in 1988. At admission, 7549 preoperative tests were done, 47% of which duplicated tests performed in the previous year. Of 3096 previous results that were normal as defined by hospital reference range and done closest to the time of but before admission (median interval, 2 months), 13 (0.4%; 95% CI, 0.2% to 0.7%), repeat values were outside a range considered acceptable for surgery. Most of the abnormalities were predictable from the patient's history, and most were not noted in the medical record. Of 461 previous tests that were abnormal, 78 (17%; CI, 13% to 20%) repeat values at admission were outside a range considered acceptable for surgery (P less than 0.001, frequency of clinically important abnormalities of patients with normal previous results with those with abnormal previous results). Physicians evaluating patients preoperatively could safely substitute the previous test results analyzed in this study for preoperative screening tests if the previous tests are normal and no obvious indication for retesting is present.

  5. Cost estimation of Kyoto Protocol

    International Nuclear Information System (INIS)

    Di Giulio, Enzo

    2005-01-01

    This article proposes a reflection on important aspects in the costs determination performance of Kyoto Protocol. The evaluation of the main models evidence possible impacts on the economies. A key role in the determination of the cost is represented by the relative hypothesis to emission trading and the projects CDM-JI and from the political capacity at the cost negative or equal to zero [it

  6. Attacks on quantum key distribution protocols that employ non-ITS authentication

    Science.gov (United States)

    Pacher, C.; Abidin, A.; Lorünser, T.; Peev, M.; Ursin, R.; Zeilinger, A.; Larsson, J.-Å.

    2016-01-01

    We demonstrate how adversaries with large computing resources can break quantum key distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not information-theoretically secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced, it was shown to prevent straightforward man-in-the-middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact, we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols, we describe every single action taken by the adversary. For all protocols, the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD post-processing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.

  7. Automatic electromagnetic valve for previous vacuum

    International Nuclear Information System (INIS)

    Granados, C. E.; Martin, F.

    1959-01-01

    A valve which permits the maintenance of an installation vacuum when electric current fails is described. It also lets the air in the previous vacuum bomb to prevent the oil ascending in the vacuum tubes. (Author)

  8. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  9. Biometrics based authentication scheme for session initiation protocol.

    Science.gov (United States)

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  10. Proposed modifications of Environmental Protection Agency Method 1601 for detection of coliphages in drinking water, with same-day fluorescence-based detection and evaluation by the performance-based measurement system and alternative test protocol validation approaches.

    Science.gov (United States)

    Salter, Robert S; Durbin, Gregory W; Conklin, Ernestine; Rosen, Jeff; Clancy, Jennifer

    2010-12-01

    Coliphages are microbial indicators specified in the Ground Water Rule that can be used to monitor for potential fecal contamination of drinking water. The Total Coliform Rule specifies coliform and Escherichia coli indicators for municipal water quality testing; thus, coliphage indicator use is less common and advances in detection methodology are less frequent. Coliphages are viral structures and, compared to bacterial indicators, are more resistant to disinfection and diffuse further distances from pollution sources. Therefore, coliphage presence may serve as a better predictor of groundwater quality. This study describes Fast Phage, a 16- to 24-h presence/absence modification of U.S. Environmental Protection Agency (EPA) Method 1601 for detection of coliphages in 100 ml water. The objective of the study is to demonstrate that the somatic and male-specific coliphage modifications provide results equivalent to those of Method 1601. Five laboratories compared the modifications, featuring same-day fluorescence-based prediction, to Method 1601 by using the performance-based measurement system (PBMS) criterion. This requires a minimum 50% positive response in 10 replicates of 100-ml water samples at coliphage contamination levels of 1.3 to 1.5 PFU/100 ml. The laboratories showed that Fast Phage meets PBMS criteria with 83.5 to 92.1% correlation of the same-day rapid fluorescence-based prediction with the next-day result. Somatic coliphage PBMS data are compared to manufacturer development data that followed the EPA alternative test protocol (ATP) validation approach. Statistical analysis of the data sets indicates that PBMS utilizes fewer samples than does the ATP approach but with similar conclusions. Results support testing the coliphage modifications by using an EPA-approved national PBMS approach with collaboratively shared samples.

  11. Conventional radiotherapy treatments (direct planning) of head and neck with photon XLO planning system (cms) and Siemens Primus accelerator: proposed protocol planning, difficulties encountered, tricks practical and possible amendments to the class solution; Tratamiento de radioterapia convencional (planificacion directa) de cabeza y cuello con fotones para sistema de planificacion XI0 (cms) y acelerador Siemens Primus: propuesta de protocolo de planificacion, dificultades encontradas, trucos practicos y posibles modificaciones de la calss solution

    Energy Technology Data Exchange (ETDEWEB)

    Saez, F.; Benito, M. A.; Saez, M.

    2011-07-01

    In this paper we propose a protocol for the systematic planning process for a planner and an Accelerator XiO Primus. This protocol includes the creation of ancillary volumes for better dosimetric evaluation and design fields. Are some practical tips and cases arise in which you can change the Class Solution home. We compare this treatment with 10 turns without turning table with other tables. Finally, we show the advantages of this method from the radiobiological point of view to the bone, the main body of this type of risk treatments.

  12. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  13. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  14. A Selective-Awakening MAC Protocol for Energy-Efficient Data Forwarding in Linear Sensor Networks

    Directory of Open Access Journals (Sweden)

    Iclia Villordo-Jimenez

    2018-01-01

    Full Text Available We introduce the Selective-Awakening MAC (SA-MAC protocol which is a synchronized duty-cycled protocol with pipelined scheduling for Linear Sensor Networks (LSNs. In the proposed protocol, nodes selectively awake depending on node density and traffic load conditions and on the state of the buffers of the receiving nodes. In order to characterize the performance of the proposed protocol, we present a Discrete-Time Markov Chain-based analysis that is validated through extensive discrete-event simulations. Our results show that SA-MAC significantly outperforms previous proposals in terms of energy consumption, throughput, and packet loss probability. This is particularly true under high node density and high traffic load conditions, which are expected to be common scenarios in the context of IoT applications. We also present an analysis by grade (i.e., the number of hops to the sink, which is located at one end of the LSN that reveals that LSNs exhibit heterogeneous performance depending on the nodes’ grade. Such results can be used as a design guideline for future LSN implementations.

  15. Broadening and Simplifying the First SETI Protocol

    Science.gov (United States)

    Michaud, M. A. G.

    The Declaration of Principles Concerning Activities Following the Detection of Extraterrestrial Intelligence, known informally as the First SETI Protocol, is the primary existing international guidance on this subject. During the fifteen years since the document was issued, several people have suggested revisions or additional protocols. This article proposes a broadened and simplified text that would apply to the detection of alien technology in our solar system as well as to electromagnetic signals from more remote sources.

  16. Hybrid Long-Distance Entanglement Distribution Protocol

    DEFF Research Database (Denmark)

    Brask, J.B.; Rigas, I.; Polzik, E.S.

    2010-01-01

    We propose a hybrid (continuous-discrete variable) quantum repeater protocol for long-distance entanglement distribution. Starting from states created by single-photon detection, we show how entangled coherent state superpositions can be generated by means of homodyne detection. We show that near......-deterministic entanglement swapping with such states is possible using only linear optics and homodyne detectors, and we evaluate the performance of our protocol combining these elements....

  17. Dynamic Aggregation Protocol for Wireless Sensor Networks

    OpenAIRE

    Mounir Said , Adel; William Ibrahim , Ashraf; Soua , Ahmed; Afifi , Hossam

    2013-01-01

    International audience; Sensor networks suffer from limited capabilities such as bandwidth, low processing power, and memory size. There is therefore a need for protocols that deliver sensor data in an energy-efficient way to the sink. One of those techniques, it gathers sensors' data in a small size packet suitable for transmission. In this paper, we propose a new Effective Data Aggregation Protocol (DAP) to reduce the energy consumption in Wireless Sensor Networks (WSNs), which prolongs the...

  18. A New MAC Protocol with Pseudo-TDMA Behavior for Supporting Quality of Service in 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available A new medium access control (MAC protocol is proposed for quality-of-service (QoS support in wireless local area networks (WLAN. The protocol is an alternative to the recent enhancement 802.11e. A new priority policy provides the system with better performance by simulating time division multiple access (TDMA functionality. Collisions are reduced and starvation of low-priority classes is prevented by a distributed admission control algorithm. The model performance is found analytically extending previous work on this matter. The results show that a better organization of resources is achieved through this scheme. Throughput analysis is verified with OPNET simulations.

  19. A secure key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Luan Da-Peng

    2013-01-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol

  20. Large family of quantum weak coin-flipping protocols

    International Nuclear Information System (INIS)

    Mochon, Carlos

    2005-01-01

    Each classical public-coin protocol for coin flipping is naturally associated with a quantum protocol for weak coin flipping. The quantum protocol is obtained by replacing classical randomness with quantum entanglement and by adding a cheat detection test in the last round that verifies the integrity of this entanglement. The set of such protocols defines a family which contains the protocol with bias 0.192 previously found by the author, as well as protocols with bias as low as 1/6 described herein. The family is analyzed by identifying a set of optimal protocols for every number of messages. In the end, tight lower bounds for the bias are obtained which prove that 1/6 is optimal for all protocols within the family

  1. 77 FR 70176 - Previous Participation Certification

    Science.gov (United States)

    2012-11-23

    ... participants' previous participation in government programs and ensure that the past record is acceptable prior... information is designed to be 100 percent automated and digital submission of all data and certifications is... government programs and ensure that the past record is acceptable prior to granting approval to participate...

  2. On the Tengiz petroleum deposit previous study

    International Nuclear Information System (INIS)

    Nysangaliev, A.N.; Kuspangaliev, T.K.

    1997-01-01

    Tengiz petroleum deposit previous study is described. Some consideration about structure of productive formation, specific characteristic properties of petroleum-bearing collectors are presented. Recommendation on their detail study and using of experience on exploration and development of petroleum deposit which have analogy on most important geological and industrial parameters are given. (author)

  3. Subsequent pregnancy outcome after previous foetal death

    NARCIS (Netherlands)

    Nijkamp, J. W.; Korteweg, F. J.; Holm, J. P.; Timmer, A.; Erwich, J. J. H. M.; van Pampus, M. G.

    Objective: A history of foetal death is a risk factor for complications and foetal death in subsequent pregnancies as most previous risk factors remain present and an underlying cause of death may recur. The purpose of this study was to evaluate subsequent pregnancy outcome after foetal death and to

  4. Field validation of protocols developed to evaluate in-line mastitis detection systems.

    Science.gov (United States)

    Kamphuis, C; Dela Rue, B T; Eastwood, C R

    2016-02-01

    This paper reports on a field validation of previously developed protocols for evaluating the performance of in-line mastitis-detection systems. The protocols outlined 2 requirements of these systems: (1) to detect cows with clinical mastitis (CM) promptly and accurately to enable timely and appropriate treatment and (2) to identify cows with high somatic cell count (SCC) to manage bulk milk SCC levels. Gold standard measures, evaluation tests, performance measures, and performance targets were proposed. The current study validated the protocols on commercial dairy farms with automated in-line mastitis-detection systems using both electrical conductivity (EC) and SCC sensor systems that both monitor at whole-udder level. The protocol for requirement 1 was applied on 3 commercial farms. For requirement 2, the protocol was applied on 6 farms; 3 of them had low bulk milk SCC (128×10(3) cells/mL) and were the same farms as used for field evaluation of requirement 1. Three farms with high bulk milk SCC (270×10(3) cells/mL) were additionally enrolled. The field evaluation methodology and results were presented at a workshop including representation from 7 international suppliers of in-line mastitis-detection systems. Feedback was sought on the acceptance of standardized performance evaluation protocols and recommended refinements to the protocols. Although the methodology for requirement 1 was relatively labor intensive and required organizational skills over an extended period, no major issues were encountered during the field validation of both protocols. The validation, thus, proved the protocols to be practical. Also, no changes to the data collection process were recommended by the technology supplier representatives. However, 4 recommendations were made to refine the protocols: inclusion of an additional analysis that ignores small (low-density) clot observations in the definition of CM, extension of the time window from 4 to 5 milkings for timely alerts for CM

  5. Maximally efficient protocols for direct secure quantum communication

    Energy Technology Data Exchange (ETDEWEB)

    Banerjee, Anindita [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); Department of Physics and Center for Astroparticle Physics and Space Science, Bose Institute, Block EN, Sector V, Kolkata 700091 (India); Pathak, Anirban, E-mail: anirban.pathak@jiit.ac.in [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); RCPTM, Joint Laboratory of Optics of Palacky University and Institute of Physics of Academy of Science of the Czech Republic, Faculty of Science, Palacky University, 17. Listopadu 12, 77146 Olomouc (Czech Republic)

    2012-10-01

    Two protocols for deterministic secure quantum communication (DSQC) using GHZ-like states have been proposed. It is shown that one of these protocols is maximally efficient and that can be modified to an equivalent protocol of quantum secure direct communication (QSDC). Security and efficiency of the proposed protocols are analyzed and compared. It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. Maximally efficient QSDC protocols are shown to be more efficient than their DSQC counterparts. This additional efficiency arises at the cost of message transmission rate. -- Highlights: ► Two protocols for deterministic secure quantum communication (DSQC) are proposed. ► One of the above protocols is maximally efficient. ► It is modified to an equivalent protocol of quantum secure direct communication (QSDC). ► It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. ► Efficient QSDC protocols are always more efficient than their DSQC counterparts.

  6. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  7. Routing protocol extension for resilient GMPLS multi-domain networks

    DEFF Research Database (Denmark)

    Manolova, Anna Vasileva; Ruepp, Sarah Renée; Romeral, Ricardo

    2010-01-01

    This paper evaluates the performance of multi-domain networks under the Generalized Multi-Protocol Label Switching control framework in case of a single inter-domain link failure. We propose and evaluate a routing protocol extension for the Border Gateway Protocol, which allows domains to obtain...... two Autonomous System disjoint paths and use them efficiently under failure conditions. Three main applications for the protocol extension are illustrated: reducing traffic loss on existing connections by xploiting pre-selected backup paths derived with our proposal, applying multi-domain restoration...... as survivability mechanism in case of single link failure, and employing proper failure notification mechanisms for routing of future connection requests under routing protocol re-convergence. Via simulations we illustrate the benefits of utilizing the proposed routing protocol extension for networks employing...

  8. Weaknesses of a dynamic identity based authentication protocol for multi-server architecture

    OpenAIRE

    Han, Weiwei

    2012-01-01

    Recently, Li et al. proposed a dynamic identity based authentication protocol for multi-server architecture. They claimed their protocol is secure and can withstand various attacks. But we found some security loopholes in the protocol. Accordingly, the current paper demonstrates that Li et al.'s protocol is vulnerable to the replay attack, the password guessing attack and the masquerade attack.

  9. Conversion of a general quantum stabilizer code to an entanglement distillation protocol

    Energy Technology Data Exchange (ETDEWEB)

    Matsumoto, Ryutaroh [Department of Communications and Integrated Systems, Tokyo Institute of Technology, Tokyo 152-8552 (Japan)

    2003-07-25

    We show how to convert a quantum stabilizer code to a one- or two-way entanglement distillation protocol. The proposed conversion method is a generalization of those of Shor-Preskill and Nielsen-Chuang. The recurrence protocol and the quantum privacy amplification protocol are equivalent to the protocols converted from [[2, 1

  10. Conversion of a general quantum stabilizer code to an entanglement distillation protocol

    International Nuclear Information System (INIS)

    Matsumoto, Ryutaroh

    2003-01-01

    We show how to convert a quantum stabilizer code to a one- or two-way entanglement distillation protocol. The proposed conversion method is a generalization of those of Shor-Preskill and Nielsen-Chuang. The recurrence protocol and the quantum privacy amplification protocol are equivalent to the protocols converted from [[2, 1

  11. Subsequent childbirth after a previous traumatic birth.

    Science.gov (United States)

    Beck, Cheryl Tatano; Watson, Sue

    2010-01-01

    Nine percent of new mothers in the United States who participated in the Listening to Mothers II Postpartum Survey screened positive for meeting the Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition criteria for posttraumatic stress disorder after childbirth. Women who have had a traumatic birth experience report fewer subsequent children and a longer length of time before their second baby. Childbirth-related posttraumatic stress disorder impacts couples' physical relationship, communication, conflict, emotions, and bonding with their children. The purpose of this study was to describe the meaning of women's experiences of a subsequent childbirth after a previous traumatic birth. Phenomenology was the research design used. An international sample of 35 women participated in this Internet study. Women were asked, "Please describe in as much detail as you can remember your subsequent pregnancy, labor, and delivery following your previous traumatic birth." Colaizzi's phenomenological data analysis approach was used to analyze the stories of the 35 women. Data analysis yielded four themes: (a) riding the turbulent wave of panic during pregnancy; (b) strategizing: attempts to reclaim their body and complete the journey to motherhood; (c) bringing reverence to the birthing process and empowering women; and (d) still elusive: the longed-for healing birth experience. Subsequent childbirth after a previous birth trauma has the potential to either heal or retraumatize women. During pregnancy, women need permission and encouragement to grieve their prior traumatic births to help remove the burden of their invisible pain.

  12. Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    Woo-Yong Choi

    2009-01-01

    Full Text Available We propose the efficient reliable multicast MAC protocol based on the connectivity information among the recipients. Enhancing the BMMM (Batch Mode Multicast MAC protocol, the reliable multicast MAC protocol significantly reduces the RAK (Request for ACK frame transmissions in a reasonable computational time and enhances the MAC performance. By the analytical performance analysis, the throughputs of the BMMM protocol and our proposed MAC protocol are derived. Numerical examples show that our proposed MAC protocol increases the reliable multicast MAC performance for IEEE 802.11 wireless LANs.

  13. Previous Experience a Model of Practice UNAE

    OpenAIRE

    Ormary Barberi Ruiz; María Dolores Pesántez Palacios

    2017-01-01

    The statements presented in this article represents a preliminary version of the proposed model of pre-professional practices (PPP) of the National University of Education (UNAE) of Ecuador, an urgent institutional necessity is revealed in the descriptive analyzes conducted from technical support - administrative (reports, interviews, testimonials), pedagogical foundations of UNAE (curricular directionality, transverse axes in practice, career plan, approach and diagnostic examination as subj...

  14. 77 FR 36286 - Notice of Proposed Information Collection: Comment Request; Previous Participation Certification

    Science.gov (United States)

    2012-06-18

    ... 7th Street SW., Washington, DC 20410, Room 9120 or the number for the Federal Information Relay...., permitting electronic submission of responses. This Notice also lists the following information: Title of... provide for both electronic and paper submissions until it publishes revised regulations. Agency form...

  15. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  16. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  17. Quantum deterministic key distribution protocols based on the authenticated entanglement channel

    International Nuclear Information System (INIS)

    Zhou Nanrun; Wang Lijun; Ding Jie; Gong Lihua

    2010-01-01

    Based on the quantum entanglement channel, two secure quantum deterministic key distribution (QDKD) protocols are proposed. Unlike quantum random key distribution (QRKD) protocols, the proposed QDKD protocols can distribute the deterministic key securely, which is of significant importance in the field of key management. The security of the proposed QDKD protocols is analyzed in detail using information theory. It is shown that the proposed QDKD protocols can safely and effectively hand over the deterministic key to the specific receiver and their physical implementation is feasible with current technology.

  18. Quantum deterministic key distribution protocols based on the authenticated entanglement channel

    Energy Technology Data Exchange (ETDEWEB)

    Zhou Nanrun; Wang Lijun; Ding Jie; Gong Lihua [Department of Electronic Information Engineering, Nanchang University, Nanchang 330031 (China)], E-mail: znr21@163.com, E-mail: znr21@hotmail.com

    2010-04-15

    Based on the quantum entanglement channel, two secure quantum deterministic key distribution (QDKD) protocols are proposed. Unlike quantum random key distribution (QRKD) protocols, the proposed QDKD protocols can distribute the deterministic key securely, which is of significant importance in the field of key management. The security of the proposed QDKD protocols is analyzed in detail using information theory. It is shown that the proposed QDKD protocols can safely and effectively hand over the deterministic key to the specific receiver and their physical implementation is feasible with current technology.

  19. Books average previous decade of economic misery.

    Science.gov (United States)

    Bentley, R Alexander; Acerbi, Alberto; Ormerod, Paul; Lampos, Vasileios

    2014-01-01

    For the 20(th) century since the Depression, we find a strong correlation between a 'literary misery index' derived from English language books and a moving average of the previous decade of the annual U.S. economic misery index, which is the sum of inflation and unemployment rates. We find a peak in the goodness of fit at 11 years for the moving average. The fit between the two misery indices holds when using different techniques to measure the literary misery index, and this fit is significantly better than other possible correlations with different emotion indices. To check the robustness of the results, we also analysed books written in German language and obtained very similar correlations with the German economic misery index. The results suggest that millions of books published every year average the authors' shared economic experiences over the past decade.

  20. Books Average Previous Decade of Economic Misery

    Science.gov (United States)

    Bentley, R. Alexander; Acerbi, Alberto; Ormerod, Paul; Lampos, Vasileios

    2014-01-01

    For the 20th century since the Depression, we find a strong correlation between a ‘literary misery index’ derived from English language books and a moving average of the previous decade of the annual U.S. economic misery index, which is the sum of inflation and unemployment rates. We find a peak in the goodness of fit at 11 years for the moving average. The fit between the two misery indices holds when using different techniques to measure the literary misery index, and this fit is significantly better than other possible correlations with different emotion indices. To check the robustness of the results, we also analysed books written in German language and obtained very similar correlations with the German economic misery index. The results suggest that millions of books published every year average the authors' shared economic experiences over the past decade. PMID:24416159

  1. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... results. The most important generalization is the support for all security properties of the geometric fragment proposed by [Gut14]....... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...

  2. Implementation of the Additional Protocol in Japan

    International Nuclear Information System (INIS)

    Ogawa, T.

    2001-01-01

    The Additional Protocol between Japan and the IAEA entered into force in December 1999. To come into force a series of implementation trials of Additional Protocol was carried out at two Japanese representative nuclear research centers, i.e. Tokai Research Establishment of Japan Atomic Energy Research Institute (JAERI) and Oarai Engineering Center of Japan Nuclear Fuel Cycle Development Institute (JNC). These trials were proposed by Japan and were conducted in cooperation with the IAEA Secretariat. In addition, Japan amended 'the Law for the Regulation of Reactors etc.', to collect adequate information to submit to the IAEA, to arrange the surrounding for the complementary access, etc. In addition, Japan Submitted the Initial Declaration of the Additional Protocol within 180 days of the entry into force of the Protocol, in the middle of June, 2000

  3. A model-guided symbolic execution approach for network protocol implementations and vulnerability detection.

    Science.gov (United States)

    Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing

    2017-01-01

    Formal techniques have been devoted to analyzing whether network protocol specifications violate security policies; however, these methods cannot detect vulnerabilities in the implementations of the network protocols themselves. Symbolic execution can be used to analyze the paths of the network protocol implementations, but for stateful network protocols, it is difficult to reach the deep states of the protocol. This paper proposes a novel model-guided approach to detect vulnerabilities in network protocol implementations. Our method first abstracts a finite state machine (FSM) model, then utilizes the model to guide the symbolic execution. This approach achieves high coverage of both the code and the protocol states. The proposed method is implemented and applied to test numerous real-world network protocol implementations. The experimental results indicate that the proposed method is more effective than traditional fuzzing methods such as SPIKE at detecting vulnerabilities in the deep states of network protocol implementations.

  4. A model-guided symbolic execution approach for network protocol implementations and vulnerability detection.

    Directory of Open Access Journals (Sweden)

    Shameng Wen

    Full Text Available Formal techniques have been devoted to analyzing whether network protocol specifications violate security policies; however, these methods cannot detect vulnerabilities in the implementations of the network protocols themselves. Symbolic execution can be used to analyze the paths of the network protocol implementations, but for stateful network protocols, it is difficult to reach the deep states of the protocol. This paper proposes a novel model-guided approach to detect vulnerabilities in network protocol implementations. Our method first abstracts a finite state machine (FSM model, then utilizes the model to guide the symbolic execution. This approach achieves high coverage of both the code and the protocol states. The proposed method is implemented and applied to test numerous real-world network protocol implementations. The experimental results indicate that the proposed method is more effective than traditional fuzzing methods such as SPIKE at detecting vulnerabilities in the deep states of network protocol implementations.

  5. Summary and synthesis: How to present a research proposal

    Directory of Open Access Journals (Sweden)

    Maninder Singh Setia

    2017-01-01

    Full Text Available This concluding module attempts to synthesize the key learning points discussed during the course of the previous ten sets of modules on methodology and biostatistics. The objective of this module is to discuss how to present a model research proposal, based on whatever was discussed in the preceding modules. The lynchpin of a research proposal is the protocol, and the key component of a protocol is the study design. However, one must not neglect the other areas, be it the project summary through which one catches the eyes of the reviewer of the proposal, or the background and the literature review, or the aims and objectives of the study. Two critical areas in the “methods” section that cannot be emphasized more are the sampling strategy and a formal estimation of sample size. Without a legitimate sample size, none of the conclusions based on the statistical analysis would be valid. Finally, the ethical parameters of the study should be well understood by the researchers, and that should get reflected in the proposal.

  6. Summary and Synthesis: How to Present a Research Proposal.

    Science.gov (United States)

    Setia, Maninder Singh; Panda, Saumya

    2017-01-01

    This concluding module attempts to synthesize the key learning points discussed during the course of the previous ten sets of modules on methodology and biostatistics. The objective of this module is to discuss how to present a model research proposal, based on whatever was discussed in the preceding modules. The lynchpin of a research proposal is the protocol, and the key component of a protocol is the study design. However, one must not neglect the other areas, be it the project summary through which one catches the eyes of the reviewer of the proposal, or the background and the literature review, or the aims and objectives of the study. Two critical areas in the "methods" section that cannot be emphasized more are the sampling strategy and a formal estimation of sample size. Without a legitimate sample size, none of the conclusions based on the statistical analysis would be valid. Finally, the ethical parameters of the study should be well understood by the researchers, and that should get reflected in the proposal.

  7. The Kyoto Protocol. An economic appraisal

    International Nuclear Information System (INIS)

    Grubb, M.

    2000-05-01

    This paper examines the overall economics of the Kyoto Protocol on climate change, in three main parts. The first part explores the structure of the Protocol and how this matches against classical economic criteria of an 'optimal' climate change agreement. This discussion also considers the nature of and reasons for shortcomings, and the prospects for its evolution. Given the various flexibilities in the agreement, the Kyoto Protocol is far more economically efficient in its structure than any previous global environmental agreement. The central conclusion is that, from an economic perspective, the Protocol's structure for industrialised country commitments is as good as could reasonably be expected. The second part of the paper explores more closely the economics of the commitments themselves and how they combine with the various flexibilities, briefly reviewing the available literature and using a simple spreadsheet model of how the commitments might combine with trading mechanisms under a range of assumptions. Flexibility is intrinsic and necessary, but it is argued that the allocations to Russia and Ukraine in particular mean that unlimited flexibility could render the Protocol's commitments weaker in their impacts than is economically desirable to address climate change. It is argued that, should this prove to be the case, access to the large surplus in the transition economies could be used as a control valve to limit the costs of the Protocol to within acceptable limits. Finally, the paper considers the issues of developing country involvement in the Kyoto Protocol, and the Protocol's longer-term impact and evolution, including its impact on technological evolution and dissemination and the evolution of future commitments. It is argued that taking account of such issues critically affects views of the Protocol

  8. Desensitization protocols and their outcome.

    Science.gov (United States)

    Marfo, Kwaku; Lu, Amy; Ling, Min; Akalin, Enver

    2011-04-01

    In the last decade, transplantation across previously incompatible barriers has increasingly become popular because of organ donor shortage, availability of better methods of detecting and characterizing anti-HLA antibodies, ease of diagnosis, better understanding of antibody-mediated rejection, and the availability of effective regimens. This review summarizes all manuscripts published since the first publication in 2000 on desensitized patients and discusses clinical outcomes including acute and chronic antibody-mediated rejection rate, the new agents available, kidney paired exchange programs, and the future directions in sensitized patients. There were 21 studies published between 2000 and 2010, involving 725 patients with donor-specific anti-HLA antibodies (DSAs) who underwent kidney transplantation with different desensitization protocols. All studies were single center and retrospective. The patient and graft survival were 95% and 86%, respectively, at a 2-year median follow-up. Despite acceptable short-term patient and graft survivals, acute rejection rate was 36% and acute antibody-mediated rejection rate was 28%, which is significantly higher than in nonsensitized patients. Recent studies with longer follow-up of those patients raised concerns about long-term success of desensitization protocols. The studies utilizing protocol biopsies in desensitized patients also reported higher subclinical and chronic antibody-mediated rejection. An association between the strength of DSAs determined by median fluorescence intensity values of Luminex single-antigen beads and risk of rejection was observed. Two new agents, bortezomib, a proteasome inhibitor, and eculizumab, an anti-complement C5 antibody, were recently introduced to desensitization protocols. An alternative intervention is kidney paired exchange, which should be considered first for sensitized patients. © 2011 by the American Society of Nephrology

  9. Quantum bit string commitment protocol using polarization of mesoscopic coherent states

    International Nuclear Information System (INIS)

    Mendonca, Fabio Alencar; Ramos, Rubens Viana

    2008-01-01

    In this work, we propose a quantum bit string commitment protocol using polarization of mesoscopic coherent states. The protocol is described and its security against brute force and quantum cloning machine attack is analyzed

  10. Quantum bit string commitment protocol using polarization of mesoscopic coherent states

    Science.gov (United States)

    Mendonça, Fábio Alencar; Ramos, Rubens Viana

    2008-02-01

    In this work, we propose a quantum bit string commitment protocol using polarization of mesoscopic coherent states. The protocol is described and its security against brute force and quantum cloning machine attack is analyzed.

  11. Towards designing energy-efficient routing protocol for wireless mesh networks

    CSIR Research Space (South Africa)

    Dludla, AG

    2009-08-01

    Full Text Available Different studies have proposed number of routing protocols to overcome data transmission challenges. Very few of these protocols consider node energy. In this study, the state of art work from various studies is reviewed and compared based...

  12. On the security of an anonymous roaming protocol in UMTS mobile networks

    Directory of Open Access Journals (Sweden)

    Shuhua Wu

    2012-02-01

    Full Text Available In this communication, we first show that the privacy-preserving roaming protocol recently proposed for mobile networks cannot achieve the claimed security level. Then we suggest an improved protocol to remedy its security problems.

  13. [Electronic cigarettes - effects on health. Previous reports].

    Science.gov (United States)

    Napierała, Marta; Kulza, Maksymilian; Wachowiak, Anna; Jabłecka, Katarzyna; Florek, Ewa

    2014-01-01

    Currently very popular in the market of tobacco products have gained electronic cigarettes (ang. E-cigarettes). These products are considered to be potentially less harmful in compared to traditional tobacco products. However, current reports indicate that the statements of the producers regarding to the composition of the e- liquids not always are sufficient, and consumers often do not have reliable information on the quality of the product used by them. This paper contain a review of previous reports on the composition of e-cigarettes and their impact on health. Most of the observed health effects was related to symptoms of the respiratory tract, mouth, throat, neurological complications and sensory organs. Particularly hazardous effects of the e-cigarettes were: pneumonia, congestive heart failure, confusion, convulsions, hypotension, aspiration pneumonia, face second-degree burns, blindness, chest pain and rapid heartbeat. In the literature there is no information relating to passive exposure by the aerosols released during e-cigarette smoking. Furthermore, the information regarding to the use of these products in the long term are not also available.

  14. Thesis Proposal

    DEFF Research Database (Denmark)

    Sloth, Erik

    2010-01-01

    Strukturen i Thesis proposal er følgende: Først præsenteres mine konkrete empiriske forskningsprojekter som skal munde ud i afhandlingens artikler. Jeg præsenterer herefter de teoretiske overvejelser omkring oplevelsesbegrebet og forbrugerkulturteori som danner baggrund for at jeg er nået frem til...

  15. Previous Experience a Model of Practice UNAE

    Directory of Open Access Journals (Sweden)

    Ormary Barberi Ruiz

    2017-02-01

    Full Text Available The statements presented in this article represents a preliminary version of the proposed model of pre-professional practices (PPP of the National University of Education (UNAE of Ecuador, an urgent institutional necessity is revealed in the descriptive analyzes conducted from technical support - administrative (reports, interviews, testimonials, pedagogical foundations of UNAE (curricular directionality, transverse axes in practice, career plan, approach and diagnostic examination as subject nature of the pre professional practice and the demand of socio educational contexts where the practices have been emerging to resize them. By relating these elements allowed conceiving the modeling of the processes of the pre-professional practices for the development of professional skills of future teachers through four components: contextual projective, implementation (tutoring, accompaniment (teaching couple and monitoring (meetings at the beginning, during and end of practice. The initial training of teachers is inherent to teaching (academic and professional training, research and links with the community, these are fundamental pillars of Ecuadorian higher education.

  16. 77 FR 32069 - Airworthiness Directives; Gulfstream Aerospace LP (Type Certificate Previously Held by Israel...

    Science.gov (United States)

    2012-05-31

    ... Aerospace LP (Type Certificate Previously Held by Israel Aircraft Industries, Ltd.) Airplanes AGENCY... previously held by Israel Aircraft Industries, Ltd.) Model Galaxy and Gulfstream 200 airplanes. This proposed... receive about this proposed AD. Discussion The Civil Aviation Authority of Israel (CAAI), which is the...

  17. Static Validation of a Voting Protocol

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde; Andersen, Esben Heltoft; Nielson, Hanne Riis

    2005-01-01

    is formalised in an extension of the LySa process calculus with blinding signatures. The analysis, which is fully automatic, pinpoints previously undiscovered flaws related to verifiability and accuracy and we suggest modifications of the protocol needed for validating these properties....

  18. Advanced flooding-based routing protocols for underwater sensor networks

    OpenAIRE

    Isufi, E.; Dol, H.; Leus, G.J.T.

    2016-01-01

    Flooding-based protocols are a reliable solution to deliver packets in underwater sensor networks. However, these protocols potentially involve all the nodes in the forwarding process. Thus, the performance and energy efficiency are not optimal. In this work, we propose some advances of a flooding-based protocol with the goal to improve the performance and the energy efficiency. The first idea considers the node position information in order to reduce the number of relays that may apply flood...

  19. Quantum secret sharing protocol using modulated doubly entangled photons

    International Nuclear Information System (INIS)

    Chuan, Wang; Yong, Zhang

    2009-01-01

    In this paper, we propose a quantum secret sharing protocol utilizing polarization modulated doubly entangled photon pairs. The measurement devices are constructed. By modulating the polarizations of entangled photons, the boss could encode secret information on the initial state and share the photons with different members to realize the secret sharing process. This protocol shows the security against intercept-resend attack and dishonest member cheating. The generalized quantum secret sharing protocol is also discussed. (general)

  20. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  1. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  2. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  3. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  4. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  5. A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography

    Science.gov (United States)

    Chen, Tien-Ho; Yeh, Hsiu-Lien; Liu, Pin-Chuan; Hsiang, Han-Chen; Shih, Wei-Kuan

    Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.

  6. An optimized DNA extraction protocol for benthic Didymosphenia geminata.

    Science.gov (United States)

    Uyua, Noelia Mariel; Manrique, Julieta Marina; Jones, Leandro Roberto

    2014-09-01

    Didymosphenia geminata mats display few cells in relation to extracellular material and contain polysaccharides and heavy metals that interfere with molecular studies. We describe an optimized DNA extraction protocol that help to overcome these difficulties. Our protocol outperformed five previously described DNA extraction techniques. Copyright © 2014 Elsevier B.V. All rights reserved.

  7. Comparison of protocols for genomic DNA extraction from 'velame ...

    African Journals Online (AJOL)

    usuario

    2013-07-24

    Jul 24, 2013 ... involving C. linearifolius, we compared the efficiency of six protocols for genomic DNA extraction previously ... phytic, with diverse aspect and floristics, average rainfall between ..... The variation observed for DNA concentrations estimated with .... performed with protocol 1 (data not shown), or still, bands.

  8. Equilibria of Generalized Cut and Choose Protocols

    DEFF Research Database (Denmark)

    Branzei, Simina; Caragiannis, Ioannis; Kurokawa, David

    Classic cake cutting protocols — which fairly allocate a divisible good among agents with heterogeneous preferences — are susceptible to manipulation. Do their strategic outcomes still guarantee fairness? To answer this question we adopt a novel algo rithmic approach, proposing a concrete computa...

  9. Proposal for a Test Protocol for Genetically Modified Plants

    DEFF Research Database (Denmark)

    Strandberg, B.; Kjær, C.

    1999-01-01

    The report contains the proceedings from the conference Genetically Modified Organisms in Nordic Habitats - Sustainable Use or Loss of Diversity? in Helsinki, 1998......The report contains the proceedings from the conference Genetically Modified Organisms in Nordic Habitats - Sustainable Use or Loss of Diversity? in Helsinki, 1998...

  10. Essentials of protocol development in human research proposals ...

    African Journals Online (AJOL)

    No Abstract. Annals of Ibadan Postgraduate Medicine Vol. 1 (1) 2003: pp. 31-36. Full Text: EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · http://dx.doi.org/10.4314/aipm.v1i1.39098 · AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for ...

  11. Radioiodine treatment of recurrent hyperthyroidism in patients previously treated for Graves' disease by subtotal thyroidectomy

    DEFF Research Database (Denmark)

    Vestergaard, H; Laurberg, P

    1992-01-01

    showed a higher sensitivity to radioiodine, with more cases of early hypothyroidism, than non-operated patients. However, after 50 months of follow-up the outcome was identical. The results indicate that frequent assessment is necessary after radioiodine treatment of previously operated patients, since......Radioiodine therapy is often employed for treatment of patients with relapse of hyperthyroidism due to Graves' disease, after previous thyroid surgery. Little is known about the outcome of this treatment compared to patients with no previous surgery. A total of 20 patients who had received surgical...... treatment for Graves' hyperthyroidism 1-46 years previously and with relapse of the hyperthyroidism, and 25 patients with hyperthyroidism due to Graves' disease and no previous thyroid surgery were treated with radioiodine, following the same protocol. Early after treatment the previously operated patients...

  12. Typing DNA profiles from previously enhanced fingerprints using direct PCR.

    Science.gov (United States)

    Templeton, Jennifer E L; Taylor, Duncan; Handt, Oliva; Linacre, Adrian

    2017-07-01

    Fingermarks are a source of human identification both through the ridge patterns and DNA profiling. Typing nuclear STR DNA markers from previously enhanced fingermarks provides an alternative method of utilising the limited fingermark deposit that can be left behind during a criminal act. Dusting with fingerprint powders is a standard method used in classical fingermark enhancement and can affect DNA data. The ability to generate informative DNA profiles from powdered fingerprints using direct PCR swabs was investigated. Direct PCR was used as the opportunity to generate usable DNA profiles after performing any of the standard DNA extraction processes is minimal. Omitting the extraction step will, for many samples, be the key to success if there is limited sample DNA. DNA profiles were generated by direct PCR from 160 fingermarks after treatment with one of the following dactyloscopic fingerprint powders: white hadonite; silver aluminium; HiFi Volcano silk black; or black magnetic fingerprint powder. This was achieved by a combination of an optimised double-swabbing technique and swab media, omission of the extraction step to minimise loss of critical low-template DNA, and additional AmpliTaq Gold ® DNA polymerase to boost the PCR. Ninety eight out of 160 samples (61%) were considered 'up-loadable' to the Australian National Criminal Investigation DNA Database (NCIDD). The method described required a minimum of working steps, equipment and reagents, and was completed within 4h. Direct PCR allows the generation of DNA profiles from enhanced prints without the need to increase PCR cycle numbers beyond manufacturer's recommendations. Particular emphasis was placed on preventing contamination by applying strict protocols and avoiding the use of previously used fingerprint brushes. Based on this extensive survey, the data provided indicate minimal effects of any of these four powders on the chance of obtaining DNA profiles from enhanced fingermarks. Copyright © 2017

  13. Latest approaches of Kyoto protocol

    International Nuclear Information System (INIS)

    Matei, M.; Matei, L.

    2005-01-01

    Recently EURELECTRIC welcome the proposal of new EC Directive concerning the inclusion in the EU Emissions Trading Scheme (ETS) of credits from the project mechanisms - Joint Implementation (JI) and Clean Development Mechanism (CDM). The proposed Directive is an amendment to the EU Emissions Trading Directive adopted in June 2003. EURELECTRIC calls for unlimited use of credits in ETS. The draft Directive provides for the application of these mechanisms to begin as of 2008, on condition that the Kyoto Protocol does actually enter into force, an event which is still dependent on Russia's ratification. Such ratification has been subject to contradictory statements from the Russian Government, and the question of whether their signature to the Protocol is forthcoming is still fraught with uncertainty. Although it is not anticipated that significant quantities of JI or CDM certified credits will be available in the period 2005-2007, those that do become available would provide some additional liquidity in the emissions trading market. There is a direct relation between the coming ETS and electricity pricing: environmental policy is the driver, based on the need to switch to a low-carbon future and manage the necessary investments in a rational manner - and emissions trading is the best solution available. Romania has good opportunities to be involved in the greenhouse gases market, both in ETS and JI mechanisms. Some JI projects between Romanian and The Netherlands are already done or underway. (author)

  14. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  15. Energy-efficient TDMA medium access control protocol scheduling

    NARCIS (Netherlands)

    Havinga, Paul J.M.; Smit, Gerard J.M.

    2000-01-01

    In this paper we study the energy efficiency and channel efficiency of TDMA MAC protocol scheduling mechanisms. Most MAC protocols are based on phase grouping that basically has three phases in a frame: uplink, downlink and reservation. We propose a new mechanism in which we have multiple uplink and

  16. Constant round group key agreement protocols: A comparative study

    NARCIS (Netherlands)

    Makri, E.; Konstantinou, Elisavet

    2011-01-01

    The scope of this paper is to review and evaluate all constant round Group Key Agreement (GKA) protocols proposed so far in the literature. We have gathered all GKA protocols that require 1,2,3,4 and 5 rounds and examined their efficiency. In particular, we calculated each protocol’s computation and

  17. A Dialogue Game Protocol for Agent Purchase Negotiations

    NARCIS (Netherlands)

    McBurney, P.; Eijk, R.M. van; Parsons, S.; Amgoud, L.

    2003-01-01

    We propose a dialogue game protocol for purchase negotiation dialogues which identifies appropriate speech acts, defines constraints on their utterances, and specifies the different sub-tasks agents need to perform in order to engage in dialogues according to this protocol. Our formalism combines

  18. On the Security of the Ping-Pong Protocol

    OpenAIRE

    Bostroem, Kim; Felbinger, Timo

    2007-01-01

    We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous.

  19. On the security of the ping-pong protocol

    International Nuclear Information System (INIS)

    Bostroem, Kim; Felbinger, Timo

    2008-01-01

    We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous

  20. On the security of the ping-pong protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bostroem, Kim [Psychologisches Institut II, Universitaet Muenster, 48149 Muenster (Germany); Felbinger, Timo [Institut fuer Physik, Universitaet Potsdam, 14469 Potsdam (Germany)], E-mail: tjf@qipc.org

    2008-05-26

    We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous.

  1. User-friendly matching protocol for online social networks

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    In this paper, we outline a privacy-preserving matching protocol for OSN (online social network) users to find their potential friends. With the proposed protocol, a logged-in user can match her profile with that of an off-line stranger, while both profiles are maximally protected. Our solution

  2. Cost-optimization of the IPv4 zeroconf protocol

    NARCIS (Netherlands)

    Bohnenkamp, H.C.; van der Stok, Peter; Hermanns, H.; Vaandrager, Frits

    2003-01-01

    This paper investigates the tradeoff between reliability and effectiveness for the IPv4 Zeroconf protocol, proposed by Cheshire/Adoba/Guttman in 2002, dedicated to the selfconfiguration of IP network interfaces. We develop a simple stochastic cost model of the protocol, where reliability is measured

  3. An Agent-Based Auction Protocol on Mobile Devices

    Directory of Open Access Journals (Sweden)

    Yu-Fang Chung

    2014-01-01

    Full Text Available This paper proposes an English auction protocol to preserve a secure, fair, and effective online auction environment, where the operations are integrated with mobile agent technology for bidders participating in online auctions. The protocol consists of four participants, namely, registration manager, agent house, auction house, and bidder.

  4. Asymptotic performance modelling of DCF protocol with prioritized channel access

    Science.gov (United States)

    Choi, Woo-Yong

    2017-11-01

    Recently, the modification of the DCF (Distributed Coordination Function) protocol by the prioritized channel access was proposed to resolve the problem that the DCF performance worsens exponentially as more nodes exist in IEEE 802.11 wireless LANs. In this paper, an asymptotic analytical performance model is presented to analyze the MAC performance of the DCF protocol with the prioritized channel access.

  5. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  6. WDM Network and Multicasting Protocol Strategies

    Directory of Open Access Journals (Sweden)

    Pinar Kirci

    2014-01-01

    Full Text Available Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM, it is easier to take the advantage of optical networks and optical burst switching (OBS and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET and Just In Time (JIT reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes.

  7. Supporting Adaptation of Wireless Communication Protocols

    International Nuclear Information System (INIS)

    Dhomeja, L.D.; Soomro, I.A.; Malkani, Y.A.

    2016-01-01

    Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants) come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity), Bluetooth, IrDA (Infrared), etc. In order for pervasive devices to interact with each other, they need to have matching (alike) communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth) from what the server has (e.g. WiFi), connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange), L2CAP (Logical Link Control and Adaptation Protocol), RFCOM (Radio Frequency Communication) and WiFi protocol and can run on (J2MW (Java 2 Micro Edition) enabled mobile phones which support both Bluetooth and WiFi capabilities. (author)

  8. Optical code-division multiple-access protocol with selective retransmission

    Science.gov (United States)

    Mohamed, Mohamed A. A.; Shalaby, Hossam M. H.; El-Badawy, El-Sayed A.

    2006-05-01

    An optical code-division multiple-access (OCDMA) protocol based on selective retransmission technique is proposed. The protocol is modeled using a detailed state diagram and is analyzed using equilibrium point analysis (EPA). Both traditional throughput and average delay are used to examine its performance for several network parameters. In addition, the performance of the proposed protocol is compared to that of the R3T protocol, which is based on a go-back-n technique. Our results show that a higher performance is achieved by the proposed protocol at the expense of system complexity.

  9. Kidnapping Detection and Recognition in Previous Unknown Environment

    Directory of Open Access Journals (Sweden)

    Yang Tian

    2017-01-01

    Full Text Available An unaware event referred to as kidnapping makes the estimation result of localization incorrect. In a previous unknown environment, incorrect localization result causes incorrect mapping result in Simultaneous Localization and Mapping (SLAM by kidnapping. In this situation, the explored area and unexplored area are divided to make the kidnapping recovery difficult. To provide sufficient information on kidnapping, a framework to judge whether kidnapping has occurred and to identify the type of kidnapping with filter-based SLAM is proposed. The framework is called double kidnapping detection and recognition (DKDR by performing two checks before and after the “update” process with different metrics in real time. To explain one of the principles of DKDR, we describe a property of filter-based SLAM that corrects the mapping result of the environment using the current observations after the “update” process. Two classical filter-based SLAM algorithms, Extend Kalman Filter (EKF SLAM and Particle Filter (PF SLAM, are modified to show that DKDR can be simply and widely applied in existing filter-based SLAM algorithms. Furthermore, a technique to determine the adapted thresholds of metrics in real time without previous data is presented. Both simulated and experimental results demonstrate the validity and accuracy of the proposed method.

  10. Eavesdropping on the "ping-pong" quantum communication protocol

    OpenAIRE

    Wojcik, Antoni

    2002-01-01

    The proposed eavesdropping scheme reveals that the quantum communication protocol recently presented by Bostrom and Felbinger [Phys. Rev. Lett. 89, 187902 (2002)] is not secure as far as quantum channel losses are taken into account.

  11. Efficient and secure authentication protocol for roaming user in ...

    Indian Academy of Sciences (India)

    BALU L PARNE

    2018-05-29

    May 29, 2018 ... 1 Department of Computer Science and Engineering, Visvesvaraya National Institute of Technology (VNIT), ... proposed protocol is presented by BAN logic and the security ..... with session key Sk of the HLR to protect from.

  12. A Weak Value Based QKD Protocol Robust Against Detector Attacks

    Science.gov (United States)

    Troupe, James

    2015-03-01

    We propose a variation of the BB84 quantum key distribution protocol that utilizes the properties of weak values to insure the validity of the quantum bit error rate estimates used to detect an eavesdropper. The protocol is shown theoretically to be secure against recently demonstrated attacks utilizing detector blinding and control and should also be robust against all detector based hacking. Importantly, the new protocol promises to achieve this additional security without negatively impacting the secure key generation rate as compared to that originally promised by the standard BB84 scheme. Implementation of the weak measurements needed by the protocol should be very feasible using standard quantum optical techniques.

  13. Bidirectional Quantum Secure Direct Communication Network Protocol with Hyperentanglement

    International Nuclear Information System (INIS)

    Gu Bin; Chen Yulin; Huang Yugai; Fang Xia

    2011-01-01

    We propose a bidirectional quantum secure direct communication (QSDC) network protocol with the hyperentanglment in both the spatial-mode ad the polarization degrees of freedom of photon pairs which can in principle be produced with a beta barium borate crystal. The secret message can be encoded on the photon pairs with unitary operations in these two degrees of freedom independently. Compared with other QSDC network protocols, our QSDC network protocol has a higher capacity as each photon pair can carry 4 bits of information. Also, we discuss the security of our QSDC network protocol and its feasibility with current techniques. (general)

  14. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  15. Protocol for generating multiphoton entangled states from quantum dots in the presence of nuclear spin fluctuations

    DEFF Research Database (Denmark)

    Denning, Emil Vosmar; Iles-Smith, Jake; McCutcheon, Dara P. S.

    2017-01-01

    Multiphoton entangled states are a crucial resource for many applications inquantum information science. Semiconductor quantum dots offer a promising route to generate such states by mediating photon-photon correlations via a confinedelectron spin, but dephasing caused by the host nuclear spin...... environment typically limits coherence (and hence entanglement) between photons to the spin T2* time of a few nanoseconds. We propose a protocol for the deterministic generation of multiphoton entangled states that is inherently robust against the dominating slow nuclear spin environment fluctuations, meaning...... that coherence and entanglement is instead limited only by the much longer spin T2 time of microseconds. Unlike previous protocols, the present schemeallows for the generation of very low error probability polarisation encoded three-photon GHZ states and larger entangled states, without the need for spin echo...

  16. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  17. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  18. Mac protocols for wireless sensor network (wsn): a comparative study

    International Nuclear Information System (INIS)

    Arshad, J.; Akram, Q.; Saleem, Y.

    2014-01-01

    Data communication between nodes is carried out under Medium Access Control (MAC) protocol which is defined at data link layer. The MAC protocols are responsible to communicate and coordinate between nodes according to the defined standards in WSN (Wireless Sensor Networks). The design of a MAC protocol should also address the issues of energy efficiency and transmission efficiency. There are number of MAC protocols that exist in the literature proposed for WSN. In this paper, nine MAC protocols which includes S-MAC, T-MAC, Wise-MAC, Mu-MAC, Z-MAC, A-MAC, D-MAC, B-MAC and B-MAC+ for WSN have been explored, studied and analyzed. These nine protocols are classified in contention based and hybrid (combination of contention and schedule based) MAC protocols. The goal of this comparative study is to provide a basis for MAC protocols and to highlight different mechanisms used with respect to parameters for the evaluation of energy and transmission efficiency in WSN. This study also aims to give reader a better understanding of the concepts, processes and flow of information used in these MAC protocols for WSN. A comparison with respect to energy reservation scheme, idle listening avoidance, latency, fairness, data synchronization, and throughput maximization has been presented. It was analyzed that contention based MAC protocols are less energy efficient as compared to hybrid MAC protocols. From the analysis of contention based MAC protocols in term of energy consumption, it was being observed that protocols based on preamble sampling consume lesser energy than protocols based on static or dynamic sleep schedule. (author)

  19. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  20. Breaking Megrelishvili protocol using matrix diagonalization

    Science.gov (United States)

    Arzaki, Muhammad; Triantoro Murdiansyah, Danang; Adi Prabowo, Satrio

    2018-03-01

    In this article we conduct a theoretical security analysis of Megrelishvili protocol—a linear algebra-based key agreement between two participants. We study the computational complexity of Megrelishvili vector-matrix problem (MVMP) as a mathematical problem that strongly relates to the security of Megrelishvili protocol. In particular, we investigate the asymptotic upper bounds for the running time and memory requirement of the MVMP that involves diagonalizable public matrix. Specifically, we devise a diagonalization method for solving the MVMP that is asymptotically faster than all of the previously existing algorithms. We also found an important counterintuitive result: the utilization of primitive matrix in Megrelishvili protocol makes the protocol more vulnerable to attacks.

  1. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  2. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  3. Cheating and Anti-Cheating in Gossip-Based Protocol: An Experimental Investigation

    Science.gov (United States)

    Xiao, Xin; Shi, Yuanchun; Tang, Yun; Zhang, Nan

    During recent years, there has been a rapid growth in deployment of gossip-based protocol in many multicast applications. In a typical gossip-based protocol, each node acts as dual roles of receiver and sender, independently exchanging data with its neighbors to facilitate scalability and resilience. However, most of previous work in this literature seldom considered cheating issue of end users, which is also very important in face of the fact that the mutual cooperation inherently determines overall system performance. In this paper, we investigate the dishonest behaviors in decentralized gossip-based protocol through extensive experimental study. Our original contributions come in two-fold: In the first part of cheating study, we analytically discuss two typical cheating strategies, that is, intentionally increasing subscription requests and untruthfully calculating forwarding probability, and further evaluate their negative impacts. The results indicate that more attention should be paid to defending cheating behaviors in gossip-based protocol. In the second part of anti-cheating study, we propose a receiver-driven measurement mechanism, which evaluates individual forwarding traffic from the perspective of receivers and thus identifies cheating nodes with high incoming/outgoing ratio. Furthermore, we extend our mechanism by introducing reliable factor to further improve its accuracy. The experiments under various conditions show that it performs quite well in case of serious cheating and achieves considerable performance in other cases.

  4. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  5. Emergency Handling for MAC Protocol in Human Body Communication

    Directory of Open Access Journals (Sweden)

    Kwon Youngmi

    2011-01-01

    Full Text Available The human body communication (HBC is a technology that enables short range data communication using the human body as a medium, like an electrical wire. Thus it removes the need for a traditional antenna. HBC may be used as a type of data communication in body area network (BAN, while the devices are being in contact with body. One of important issues in BAN is an emergency alarm because it may be closely related to human life. For emergency data communication, the most critical factor is the time constraint. IEEE 802.15.6 specifies that the emergency alarm for the BAN must be notified in less than 1 sec and must provide prioritization mechanisms for emergency traffic and notification. As one type of BAN, the HBC must follow this recommendation, too. Existing emergency handling methods in BAN are based on the carrier sensing capability on radio frequencies to detect the status of channels. However, PHY protocol in HBC does not provide the carrier sensing. So the previous methods are not well suitable for HBC directly. Additionally, in the environment that the emergency rate is very low, the allocation of dedicated slot(s for emergency in each superframe is very wasteful. In this work, we proposed specific emergency handling operation for human body communication's medium access control (HBC-MAC protocol to meet the emergency requirements for BAN. We also showed the optimal number of emergency slots for the various combinations of beacon intervals and emergency rates.

  6. Will OPEC lose from the Kyoto Protocol?

    International Nuclear Information System (INIS)

    Barnett, Jon; Dessai, Suraje; Webber, Michael

    2004-01-01

    A range of energy-economy models forecast losses to members of the Organisation of Petroleum Exporting Countries (OPEC) should the Kyoto Protocol come into force. These forecasts are a powerful influence in the United Nations Framework Convention on Climate Change negotiations. They are used by OPEC to advance the agenda on the impacts of response measures, covertly arguing for compensation for lost oil revenues arising from implementation of the Protocol. This paper discusses this issue, and explores the key assumptions of these models and their uncertainties. Assumptions about carbon leakage, future availability of oil reserves, substitution, innovation, and capital turnover are considered. The paper suggests that losses will not affect OPEC countries equally, and that these losses are not likely to be as substantial as the models forecast. A range of policy measures are proposed to lessen any impact the Protocol may have on OPEC

  7. Newborn hearing screening protocol in tuscany region.

    Science.gov (United States)

    Berrettini, Stefano; Ghirri, Paolo; Lazzerini, Francesco; Lenzi, Giovanni; Forli, Francesca

    2017-09-20

    Newborn hearing screening has to be considered the first step of a program for the identification, diagnosis, treatment and habilitation/rehabilitation of children with hearing impairment. In Tuscany Region of Italy, the universal newborn hearing screening is mandatory since november 2007. The first guidelines for the execution of the screening have been released in June 2008; then many other Italian regions partially or totally adopted these guidelines. On the basis of the experience from 2008 and according to the recent evidences in the scientific literature, a new screening protocol was released in Tuscany region. The new protocol is an evolution of the previous one. Some issues reported in the previous protocol and in the Joint Committee on Infant Hearing statement published in 2007 were revised, such as the risk factors for auditory neuropathy and for late onset, progressive or acquired hearing loss. The new updated guidelines were submitted to the Sanitary Regional Council and then they have been approved in August 2016. The updated screening protocol is mainly aimed to identify newborns with a congenital moderate-to-profound hearing loss, but it also provides indications for the audiological follow-up of children with risk's factor for progressive or late onset hearing loss; further it provides indications for the audiological surveillance of children at risk for acquired hearing impairment. Then, in the new guidelines the role of the family paediatrician in the newborn hearing screening and audiological follow-up and surveillance is underscored. Finally the new guidelines provide indications for the treatment with hearing aids and cochlear implant, in accordance with the recent Italian Health Technology Assessment (HTA) guidelines. In the paper we report the modality of execution of the universal newborn hearing screening in the Tuscany Region, according to the recently updated protocol. The main features of the protocol and the critical issues are

  8. Protocol Monitoring Energy Conservation; Protocol Monitoring Energiebesparing

    Energy Technology Data Exchange (ETDEWEB)

    Boonekamp, P.G.M. [ECN Beleidsstudies, Petten (Netherlands); Mannaerts, H. [Centraal Planburea CPB, Den Haag (Netherlands); Tinbergen, W. [Centraal Bureau voor de Statistiek CBS, Den Haag (Netherlands); Vreuls, H.H.J. [Nederlandse onderneming voor energie en milieu Novem, Utrecht (Netherlands); Wesselink, B. [Rijksinstituut voor Volksgezondheid en Milieuhygiene RIVM, Bilthoven (Netherlands)

    2001-12-01

    On request of the Dutch ministry of Economic Affairs five institutes have collaborated to create a 'Protocol Monitoring Energy Conservation', a common method and database to calculate the amount of energy savings realised in past years. The institutes concerned are the Central Bureau of Statistics (CBS), the Netherlands Bureau for Economic Policy Analysis (CPB), the Energy research Centre of the Netherlands (ECN), the National Agency for Energy and Environment (Novem) and the Netherlands Institute of Public Health and the Environment (RIVM). The institutes have agreed upon a clear definition of energy use and energy savings. The demarcation with renewable energy, the saving effects of substitution between energy carriers and the role of import and export of energy have been elaborated. A decomposition method is used to split up the observed change in energy use in a number of effects, on a national and sectoral level. This method includes an analysis of growth effects, effects of structural changes in production and consumption activities and savings on end use or with more efficient conversion processes. To calculate these effects the total energy use is desegregated as much as possible. For each segment a reference energy use is calculated according to the trend in a variable which is supposed to be representative for the use without savings. The difference with the actual energy use is taken as the savings realised. Results are given for the sectors households, industry, agriculture, services and government, transportation and the energy sector; as well as a national figure. A special feature of the protocol method is the application of primary energy use figures in the determination of savings for end users. This means that the use of each energy carrier is increased with a certain amount, according to the conversion losses caused elsewhere in the energy system. The losses concern the base year energy sector and losses abroad for imports of secondary

  9. Terrorist fraud resistance of distance bounding protocols employing physical unclonable functions

    NARCIS (Netherlands)

    Kleber, Stephan; van der Heijden, Rens W.; Kopp, Henning; Kargl, Frank

    Distance bounding protocols (DBPs) are security protocols that aim to limit the maximum possible distance between two partners in a wireless communication. This enables to ensure locality of interaction between two devices. Despite numerous proposed protocols, recent analyses of DBPs have shown the

  10. A Lightweight Protocol for Secure Video Streaming.

    Science.gov (United States)

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  11. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  12. Service-Oriented Synthesis of Distributed and Concurrent Protocol Specifications

    Directory of Open Access Journals (Sweden)

    Jehad Al Dallal

    2008-01-01

    Full Text Available Several methods have been proposed for synthesizing computer communication protocol specifications from service specifications. Some protocol synthesis methods based on the finite state machine (FSM model assume that primitives in the service specifications cannot be executed simultaneously. Others either handle only controlled primitive concurrency or have tight restrictions on the applicable FSM topologies. As a result, these synthesis methods are not applicable to an interesting variety of inherently concurrent applications, such as the Internet and mobile communication systems. This paper proposes a concurrent-based protocol synthesis method that eliminates the restrictions imposed by the earlier methods. The proposed method uses a synthesis method to obtain a sequential protocol specification (P-SPEC from a given service specification (S-SPEC. The resulting P-SPEC is then remodeled to consider the concurrency behavior specified in the S-SPEC, while guaranteeing that P-SPEC provides the specified service.

  13. Immunocytochemical methods and protocols

    National Research Council Canada - National Science Library

    Javois, Lorette C

    1999-01-01

    ... monoclonal antibodies to study cell differentiation during embryonic development. For a select few disciplines volumes have been published focusing on the specific application of immunocytochemical techniques to that discipline. What distinguished Immunocytochemical Methods and Protocols from earlier books when it was first published four years ago was i...

  14. Critical Response Protocol

    Science.gov (United States)

    Ellingson, Charlene; Roehrig, Gillian; Bakkum, Kris; Dubinsky, Janet M.

    2016-01-01

    This article introduces the Critical Response Protocol (CRP), an arts-based technique that engages students in equitable critical discourse and aligns with the "Next Generation Science Standards" vision for providing students opportunities for language learning while advancing science learning (NGSS Lead States 2013). CRP helps teachers…

  15. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification. In r...

  16. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one...

  17. A Geographical Heuristic Routing Protocol for VANETs

    Science.gov (United States)

    Urquiza-Aguiar, Luis; Tripp-Barba, Carolina; Aguilar Igartua, Mónica

    2016-01-01

    Vehicular ad hoc networks (VANETs) leverage the communication system of Intelligent Transportation Systems (ITS). Recently, Delay-Tolerant Network (DTN) routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR) protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation). PMID:27669254

  18. Multispecies Coevolution Particle Swarm Optimization Based on Previous Search History

    Directory of Open Access Journals (Sweden)

    Danping Wang

    2017-01-01

    Full Text Available A hybrid coevolution particle swarm optimization algorithm with dynamic multispecies strategy based on K-means clustering and nonrevisit strategy based on Binary Space Partitioning fitness tree (called MCPSO-PSH is proposed. Previous search history memorized into the Binary Space Partitioning fitness tree can effectively restrain the individuals’ revisit phenomenon. The whole population is partitioned into several subspecies and cooperative coevolution is realized by an information communication mechanism between subspecies, which can enhance the global search ability of particles and avoid premature convergence to local optimum. To demonstrate the power of the method, comparisons between the proposed algorithm and state-of-the-art algorithms are grouped into two categories: 10 basic benchmark functions (10-dimensional and 30-dimensional, 10 CEC2005 benchmark functions (30-dimensional, and a real-world problem (multilevel image segmentation problems. Experimental results show that MCPSO-PSH displays a competitive performance compared to the other swarm-based or evolutionary algorithms in terms of solution accuracy and statistical tests.

  19. Two-party quantum key agreement protocols under collective noise channel

    Science.gov (United States)

    Gao, Hao; Chen, Xiao-Guang; Qian, Song-Rong

    2018-06-01

    Recently, quantum communication has become a very popular research field. The quantum key agreement (QKA) plays an important role in the field of quantum communication, based on its unconditional security in terms of theory. Among all kinds of QKA protocols, QKA protocols resisting collective noise are widely being studied. In this paper, we propose improved two-party QKA protocols resisting collective noise and present a feasible plan for information reconciliation. Our protocols' qubit efficiency has achieved 26.67%, which is the best among all the two-party QKA protocols against collective noise, thus showing that our protocol can improve the transmission efficiency of quantum key agreement.

  20. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  1. A Composed Protocol of Quantum Identity Authentication Plus Quantum Key Distribution Based on Squeezed States

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chaojing; Zhang Quan

    2011-01-01

    It is established that a single quantum cryptography protocol usually cooperates with other cryptographic systems, such as an authentication system, in the real world. However, few protocols have been proposed on how to combine two or more quantum protocols. To fill this gap, we propose a composed quantum protocol, containing both quantum identity authentication and quantum key distribution, using squeezed states. Hence, not only the identity can be verified, but also a new private key can be generated by our new protocol. We also analyze the security under an optimal attack, and the efficiency, which is defined by the threshold of the tolerant error rate, using Gaussian error function. (general)

  2. PROTOCOL FOR EXAMINATION OF THE INNER CAN CLOSURE WELD REGION FOR 3013 DE CONTAINERS

    Energy Technology Data Exchange (ETDEWEB)

    Mickalonis, J.

    2014-09-16

    The protocol for the examination of the inner can closure weld region (ICCWR) for 3013 DE containers is presented within this report. The protocol includes sectioning of the inner can lid section, documenting the surface condition, measuring corrosion parameters, and storing of samples. This protocol may change as the investigation develops since findings may necessitate additional steps be taken. Details of the previous analyses, which formed the basis for this protocol, are also presented.

  3. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    International Nuclear Information System (INIS)

    Soares, M. R.; Maia, A. F.; Batista, W. O. G.; Lara, P. A.

    2014-08-01

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  4. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    Energy Technology Data Exchange (ETDEWEB)

    Soares, M. R.; Maia, A. F. [Universidade Federal de Sergipe, Departamento de Fisica, Cidade Universitaria Prof. Jose Aloisio de Campos, Marechal Rondon s/n, Jardim Rosa Elze, 49-100000 Sao Cristovao, Sergipe (Brazil); Batista, W. O. G. [Instituto Federal da Bahia, Rua Emidio dos Santos s/n, Barbalho, Salvador, 40301015 Bahia (Brazil); Lara, P. A., E-mail: wilsonottobatista@gmail.com [Instituto de Pesquisas Energeticas e Nucleares / CNEN, Av. Lineu Prestes 2242, Cidade Universitaria, 05508-000 Sao Paulo (Brazil)

    2014-08-15

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  5. Authentication Test-Based the RFID Authentication Protocol with Security Analysis

    Directory of Open Access Journals (Sweden)

    Minghui Wang

    2014-08-01

    Full Text Available To the problem of many recently proposed RFID authentication protocol was soon find security holes, we analyzed the main reason, which is that protocol design is not rigorous, and the correctness of the protocol cannot be guaranteed. To this end, authentication test method was adopted in the process of the formal analysis and strict proof to the proposed RFID protocol in this paper. Authentication Test is a new type of analysis and design method of security protocols based on Strand space model, and it can be used for most types of the security protocols. After analysis the security, the proposed protocol can meet the RFID security demand: information confidentiality, data integrity and identity authentication.

  6. Fault-tolerant quantum cryptographic protocols with collective detection over the collective amplitude damping channel

    International Nuclear Information System (INIS)

    Huang, Wei; Su, Qi; Li, Yan-Bing; Sun, Ying

    2014-01-01

    In this paper, a quantum key distribution (QKD) protocol, which can be immune to collective amplitude damping noise, is proposed with collective detection strategy. Then a multi-party quantum secret sharing (MQSS) protocol and a quantum private comparison (QPC) protocol are introduced as two applications of the proposed QKD protocol. Except for one participant who is responsible for preparing and measuring quantum states, the rest of the users in each of these protocols only need to perform certain unitary operations due to the utilization of collective detection. Therefore, in addition to the advantage of being secure against collective amplitude damping noise, the proposed protocols still have the advantages of higher qubit efficiency and lower cost for implementation. Moreover, the security of these protocols is guaranteed by theorems on quantum operation discrimination. (papers)

  7. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol\\'s perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain\\'s fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  8. Wind power agreement protocol; Protocole d'accord eolien

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-10-01

    The aim of this protocol of agreement is to propose to wind turbine fitters some models of contracts allowing the setting up of wind turbines on agricultural lots. These documents, which make an indissociable ensemble, apply to both phases of development of a wind power project: the feasibility study phase, for a duration comprised between 2 and 5 years (studies, administrative procedures, precise definition of the project), and the construction, exploitation and dismantling phase. These documents will serve as common guidelines for both the farmers and the wind turbine designers. Both parties agree to meet together in the future to propose some modifications of these texts if necessary. The four models of contracts are attached to the document: contract for the feasibility study phase, first contract between the landlord and the farmer for the cancellation of the rural lease, second contract between the landlord and the wind power exploitation company for the common right lease, and the third contract between the farmer and the wind power company for the indemnification convention. (J.S.)

  9. 77 FR 58323 - Airworthiness Directives; Gulfstream Aerospace LP (Type Certificate Previously Held by Israel...

    Science.gov (United States)

    2012-09-20

    ... Aerospace LP (Type Certificate Previously Held by Israel Aircraft Industries, Ltd.) Airplanes AGENCY... Previously Held by Israel Aircraft Industries, Ltd.) Model Gulfstream G150 airplanes. This proposed AD was.... Discussion The Civil Aviation Authority of Israel (CAAI), which is the aviation authority for Israel, has...

  10. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  11. Internet of Things: Architectures, Protocols, and Applications

    OpenAIRE

    Sethi, Pallavi; Sarangi, Smruti R.

    2017-01-01

    The Internet of Things (IoT) is defined as a paradigm in which objects equipped with sensors, actuators, and processors communicate with each other to serve a meaningful purpose. In this paper, we survey state-of-the-art methods, protocols, and applications in this new emerging area. This survey paper proposes a novel taxonomy for IoT technologies, highlights some of the most important technologies, and profiles some applications that have the potential to make a striking difference in human ...

  12. A method for acetylcholinesterase staining of brain sections previously processed for receptor autoradiography.

    Science.gov (United States)

    Lim, M M; Hammock, E A D; Young, L J

    2004-02-01

    Receptor autoradiography using selective radiolabeled ligands allows visualization of brain receptor distribution and density on film. The resolution of specific brain regions on the film often can be difficult to discern owing to the general spread of the radioactive label and the lack of neuroanatomical landmarks on film. Receptor binding is a chemically harsh protocol that can render the tissue virtually unstainable by Nissl and other conventional stains used to delineate neuroanatomical boundaries of brain regions. We describe a method for acetylcholinesterase (AChE) staining of slides previously processed for receptor binding. AChE staining is a useful tool for delineating major brain nuclei and tracts. AChE staining on sections that have been processed for receptor autoradiography provides a direct comparison of brain regions for more precise neuroanatomical description. We report a detailed thiocholine protocol that is a modification of the Koelle-Friedenwald method to amplify the AChE signal in brain sections previously processed for autoradiography. We also describe several temporal and experimental factors that can affect the density and clarity of the AChE signal when using this protocol.

  13. Epistemic Protocols for Distributed Gossiping

    Directory of Open Access Journals (Sweden)

    Krzysztof R. Apt

    2016-06-01

    Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.

  14. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  15. Diplomacy and Diplomatic Protocol

    Directory of Open Access Journals (Sweden)

    Lect. Ph.D Oana Iucu

    2008-12-01

    Full Text Available The present study aims to observe relationships and determining factors between diplomacyand diplomatic protocol as outlined by historical and contextual analyses. The approach is very dynamic,provided that concepts are able to show their richness, antiquity and polyvalence at the level of connotations,semantics, grammatical and social syntax. The fact that this information is up to date determines anattitude of appreciation and a state of positive contamination.

  16. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  17. Secure and Efficient Protocol for Vehicular Ad Hoc Network with Privacy Preservation

    Directory of Open Access Journals (Sweden)

    Choi Hyoung-Kee

    2011-01-01

    Full Text Available Security is a fundamental issue for promising applications in a VANET. Designing a secure protocol for a VANET that accommodates efficiency, privacy, and traceability is difficult because of the contradictions between these qualities. In this paper, we present a secure yet efficient protocol for a VANET that satisfies these security requirements. Although much research has attempted to address similar issues, we contend that our proposed protocol outperforms other proposals that have been advanced. This claim is based on observations that show that the proposed protocol has such strengths as light computational load, efficient storage management, and dependability.

  18. Authentication Protocols for Internet of Things: A Comprehensive Survey

    Directory of Open Access Journals (Sweden)

    Mohamed Amine Ferrag

    2017-01-01

    Full Text Available In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail. These protocols are categorized based on the target environment: (1 Machine to Machine Communications (M2M, (2 Internet of Vehicles (IoV, (3 Internet of Energy (IoE, and (4 Internet of Sensors (IoS. Threat models, countermeasures, and formal security verification techniques used in authentication protocols for the IoT are presented. In addition a taxonomy and comparison of authentication protocols that are developed for the IoT in terms of network model, specific security goals, main processes, computation complexity, and communication overhead are provided. Based on the current survey, open issues are identified and future research directions are proposed.

  19. Estimation of the Thurstonian model for the 2-AC protocol

    DEFF Research Database (Denmark)

    Christensen, Rune Haubo Bojesen; Lee, Hye-Seong; Brockhoff, Per B.

    2012-01-01

    . This relationship makes it possible to extract estimates and standard errors of δ and τ from general statistical software, and furthermore, it makes it possible to combine standard regression modelling with the Thurstonian model for the 2-AC protocol. A model for replicated 2-AC data is proposed using cumulative......The 2-AC protocol is a 2-AFC protocol with a “no-difference” option and is technically identical to the paired preference test with a “no-preference” option. The Thurstonian model for the 2-AC protocol is parameterized by δ and a decision parameter τ, the estimates of which can be obtained...... by fairly simple well-known methods. In this paper we describe how standard errors of the parameters can be obtained and how exact power computations can be performed. We also show how the Thurstonian model for the 2-AC protocol is closely related to a statistical model known as a cumulative probit model...

  20. Cluster protocols in Underwater Sensor Networks: a Research Review

    Directory of Open Access Journals (Sweden)

    K. Ovaliadis

    2014-07-01

    Full Text Available Underwater Wireless Sensor Networks (UWSN have different characteristics in relation to terrestrial wireless sensor networks; such as limited bandwidth capacity, high propagation delays and limited battery power. Although there has been much work completed in developing protocols and models for terrestrial networks, these are rarely applicable for underwater sensor networks. Up to today major efforts have been made for designing efficient protocols while considering the underwater communication characteristics. An important issue on this research area is the construction of an efficient clustering algorithm. Clustering in the context of UWSN is important as it contributes a great deal towards the efficient use of energy resources. This paper reviews the most significant cluster based protocols proposed for UWSN. Major performance issues of these protocols with respect to the network conditions such as packet delivery ratio, average packet delay, node mobility effect and energy consumption are examined. The advantages and disadvantages of each protocol are also pointed out.

  1. Auto-configuration protocols in mobile ad hoc networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  2. Cryptanalysis and improvement of quantum secure communication network protocol with entangled photons for mobile communications

    International Nuclear Information System (INIS)

    Gao, Gan

    2014-01-01

    Recently, a communication protocol called controlled bidirectional quantum secret direct communication for mobile networks was proposed by Chou et al (2014 Mobile Netw. Appl. 19 121). We study the security of the proposed communication protocol and find that it is not secure. The controller, Telecom Company, may eavesdrop secret messages from mobile devices without being detected. Finally, we give a possible improvement of the communication protocol. (paper)

  3. 78 FR 3431 - Proposed Information Collection Activity; Comment Request

    Science.gov (United States)

    2013-01-16

    ... protocols to collect further qualitative information through interviews and/or focus groups with program... Readiness Goals and Head Start Program Functioning'' research project. The purpose of this study is to... functioning. ACF is proposing to use a semi-structured telephone interview protocol to collect information...

  4. Electronic Voting Protocol Using Identity-Based Cryptography

    Directory of Open Access Journals (Sweden)

    Gina Gallegos-Garcia

    2015-01-01

    Full Text Available Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC, which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE. With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI. Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  5. Electronic Voting Protocol Using Identity-Based Cryptography.

    Science.gov (United States)

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  6. New Heterogeneous Clustering Protocol for Prolonging Wireless Sensor Networks Lifetime

    Directory of Open Access Journals (Sweden)

    Md. Golam Rashed

    2014-06-01

    Full Text Available Clustering in wireless sensor networks is one of the crucial methods for increasing of network lifetime. The network characteristics of existing classical clustering protocols for wireless sensor network are homogeneous. Clustering protocols fail to maintain the stability of the system, especially when nodes are heterogeneous. We have seen that the behavior of Heterogeneous-Hierarchical Energy Aware Routing Protocol (H-HEARP becomes very unstable once the first node dies, especially in the presence of node heterogeneity. In this paper we assume a new clustering protocol whose network characteristics is heterogeneous for prolonging of network lifetime. The computer simulation results demonstrate that the proposed clustering algorithm outperforms than other clustering algorithms in terms of the time interval before the death of the first node (we refer to as stability period. The simulation results also show the high performance of the proposed clustering algorithm for higher values of extra energy brought by more powerful nodes.

  7. Knowledge-Based Multiple Access Protocol in Broadband Wireless ATM Networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    1999-01-01

    In this paper, we propose a knowledge-based multiple access protocol for the extension of wireline ATM to wireless networks. The objective is to enable effecient transmission of all kinds of ATM traffic in the wireless channel with guaranteed QoS.The proposed protocol utilixes knowledge of the main...... guaranteed QoS requirements to a variety of ATM applications....

  8. A Calculus for Control Flow Analysis of Security Protocols

    DEFF Research Database (Denmark)

    Buchholtz, Mikael; Nielson, Hanne Riis; Nielson, Flemming

    2004-01-01

    The design of a process calculus for anaysing security protocols is governed by three factors: how to express the security protocol in a precise and faithful manner, how to accommodate the variety of attack scenarios, and how to utilise the strengths (and limit the weaknesses) of the underlying...... analysis methodology. We pursue an analysis methodology based on control flow analysis in flow logic style and we have previously shown its ability to analyse a variety of security protocols. This paper develops a calculus, LysaNS that allows for much greater control and clarity in the description...

  9. An efficient multi-carrier position-based packet forwarding protocol for wireless sensor networks

    KAUST Repository

    Bader, Ahmed

    2012-01-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. However, as the node density grows, the overhead incurred in the process of relay selection grows significantly. As such, end-to-end performance in terms of energy and latency is adversely impacted. With the motivation of developing a packet forwarding mechanism that is tolerant to variation in node density, an alternative position-based protocol is proposed in this paper. In contrast to existing beaconless protocols, the proposed protocol is designed such that it eliminates the need for potential relays to undergo a relay selection process. Rather, any eligible relay may decide to forward the packet ahead, thus significantly reducing the underlying overhead. The operation of the proposed protocol is empowered by exploiting favorable features of orthogonal frequency division multiplexing (OFDM) at the physical layer. The end-to-end performance of the proposed protocol is evaluated against existing beaconless position-based protocols analytically and as well by means of simulations. The proposed protocol is demonstrated in this paper to be more efficient. In particular, it is shown that for the same amount of energy the proposed protocol transports one bit from source to destination much quicker. © 2012 IEEE.

  10. International protocol on volatile organic compounds

    International Nuclear Information System (INIS)

    Gauthier, J.-P.

    1992-01-01

    In August 1991, negotiations between Canada, the USA, and 33 European countries led to an international protocol on reducing the emissions of volatile organic compounds (VOC), which are responsible for serious ozone pollution problems. This was the third transborder pollution agreement developed under the auspices of the United Nations Economic Commission for Europe. Certain aspects of negotiations related to an earlier protocol developed for SO 2 and nitrogen oxide emissions had reappeared during the VOC negotiations, and these aspects are discussed. The VOC protocol proposes three approaches to satisfy basic obligations: reducing VOC emissions of a country by 30%, reducing VOC emissions by 30% in certain regions, and ensuring a freeze in VOC emissions in a country starting on a specified date. The protocol also introduces a new concept, that of zones of tropospheric ozone management. In Canada, plans for management of nitrogen oxides and VOC have been adapted to the ozone problem, and the management plan has been developed by a consultation process involving all sectors of society including industry, environmental groups, and governments. In Canada, it will be sufficient to reduce total VOC emissions by 16% during a first phase and to increase these reductions slightly in the second phase. Special ozone management zones in the Quebec City/Windsor corridor and the Fraser River valley have been established

  11. Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus

    OpenAIRE

    Abraham, Ittai; Malkhi, Dahlia; Nayak, Kartik; Ren, Ling; Spiegelman, Alexander

    2018-01-01

    The decentralized cryptocurrency Bitcoin has experienced great success but also encountered many challenges. One of the challenges has been the long confirmation time. Another chal- lenge is the lack of incentives at certain steps of the protocol, raising concerns for transaction withholding, selfish mining, etc. To address these challenges, we propose Solida, a decentralized blockchain protocol based on reconfigurable Byzantine consensus augmented by proof-of-work. Solida improves on Bitcoin...

  12. Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus

    OpenAIRE

    Abraham, Ittai; Malkhi, Dahlia; Nayak, Kartik; Ren, Ling; Spiegelman, Alexander

    2016-01-01

    The decentralized cryptocurrency Bitcoin has experienced great success but also encountered many challenges. One of the challenges has been the long confirmation time. Another challenge is the lack of incentives at certain steps of the protocol, raising concerns for transaction withholding, selfish mining, etc. To address these challenges, we propose Solida, a decentralized blockchain protocol based on reconfigurable Byzantine consensus augmented by proof-of-work. Solida improves on Bitcoin i...

  13. IP- -: A Reduced Internet Protocol for Optical Packet Networking

    Science.gov (United States)

    Ohta, Masataka; Fujikawa, Kenji

    IP- - is proposed as an Internet Protocol suitable for optical packet networking. As optical routers require much faster control than electric ones and lack of optical buffers other than those by fiber delay lines requires fixed time control, Internet Protocols must be at least as simple as IPv4 and much simpler than IPv6. IP- - also addresses issues of IP address space exhaustion and IP routing table explosion.

  14. Cluster Based Hierarchical Routing Protocol for Wireless Sensor Network

    OpenAIRE

    Rashed, Md. Golam; Kabir, M. Hasnat; Rahim, Muhammad Sajjadur; Ullah, Shaikh Enayet

    2012-01-01

    The efficient use of energy source in a sensor node is most desirable criteria for prolong the life time of wireless sensor network. In this paper, we propose a two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol (CBHRP). We introduce a new concept called head-set, consists of one active cluster head and some other associate cluster heads within a cluster. The head-set members are responsible for control and management of the network. Results show that t...

  15. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  16. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Human Resources Division

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  17. Distributed Network Protocols

    Science.gov (United States)

    1980-07-01

    MONITORING AGENCY NAME & ADDRESS(II different from Controlting Office) IS. SECURITY CLASS. (of this report) S Office of Naval Research Unclassified...All protocols are extended to networks with changing. topology. S80 8 4 246 DD0I iA 1473 EDITION OF INOV 65 IS OBSOLETE 8 0 24 SECURITY CLASSIFICATION...to the netowrk . f) Each node knows its adjacent links, but not necessarily the identity of its neighbors, i.e. the nodes at the other end of the links

  18. Removing Ambiguities of IP Telephony Traffic Using Protocol Scrubbers

    Directory of Open Access Journals (Sweden)

    Bazara I. A. Barry

    2012-10-01

    Full Text Available Network intrusion detection systems (NIDSs face the serious challenge of attacks such as insertion and evasion attacks that are caused by ambiguous network traffic. Such ambiguity comes as a result of the nature of network traffic which includes protocol implementation variations and errors alongside legitimate network traffic. Moreover, attackers can intentionally introduce further ambiguities in the traffic. Consequently, NIDSs need to be aware of these ambiguities when detection is performed and make sure to differentiate between true attacks and protocol implementation variations or errors; otherwise, detection accuracy can be affected negatively. In this paper we present the design and implementation of tools that are called protocol scrubbers whose main functionality is to remove ambiguities from network traffic before it is presented to the NIDS. The proposed protocol scrubbers are designed for session initiation and data transfer protocols in IP telephony systems. They guarantee that the traffic presented to NIDSs is unambiguous by eliminating ambiguous behaviors of protocols using well-designed protocol state machines, and walking through packet headers of protocols to make sure packets will be interpreted in the desired way by the NIDS. The experimental results shown in this paper demonstrate the good quality and applicability of the introduced scrubbers.

  19. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung; Kazandjieva, Maria A.; Jain, Mayank; Levis, Philip

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol's perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain's fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  20. A Passive Testing Approach for Protocols in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xiaoping Che

    2015-11-01

    Full Text Available Smart systems are today increasingly developed with the number of wireless sensor devices drastically increasing. They are implemented within several contexts throughout our environment. Thus, sensed data transported in ubiquitous systems are important, and the way to carry them must be efficient and reliable. For that purpose, several routing protocols have been proposed for wireless sensor networks (WSN. However, one stage that is often neglected before their deployment is the conformance testing process, a crucial and challenging step. Compared to active testing techniques commonly used in wired networks, passive approaches are more suitable to the WSN environment. While some works propose to specify the protocol with state models or to analyze them with simulators and emulators, we here propose a logic-based approach for formally specifying some functional requirements of a novel WSN routing protocol. We provide an algorithm to evaluate these properties on collected protocol execution traces. Further, we demonstrate the efficiency and suitability of our approach by its application into common WSN functional properties, as well as specific ones designed from our own routing protocol. We provide relevant testing verdicts through a real indoor testbed and the implementation of our protocol. Furthermore, the flexibility, genericity and practicability of our approach have been proven by the experimental results.

  1. A slotted access control protocol for metropolitan WDM ring networks

    Science.gov (United States)

    Baziana, P. A.; Pountourakis, I. E.

    2009-03-01

    In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.

  2. Analysis of Security Protocols for Mobile Healthcare.

    Science.gov (United States)

    Wazid, Mohammad; Zeadally, Sherali; Das, Ashok Kumar; Odelu, Vanga

    2016-11-01

    Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient's health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems.

  3. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Directory of Open Access Journals (Sweden)

    Alavalapati Goutham Reddy

    Full Text Available Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  4. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography

    Science.gov (United States)

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786

  5. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Science.gov (United States)

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  6. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  7. A Hierarchical Energy Efficient Reliable Transport Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Prabhudutta Mohanty

    2014-12-01

    Full Text Available The two important requirements for many Wireless Senor Networks (WSNs are prolonged network lifetime and end-to-end reliability. The sensor nodes consume more energy during data transmission than the data sensing. In WSN, the redundant data increase the energy consumption, latency and reduce reliability during data transmission. Therefore, it is important to support energy efficient reliable data transport in WSNs. In this paper, we present a Hierarchical Energy Efficient Reliable Transport Protocol (HEERTP for the data transmission within the WSN. This protocol maximises the network lifetime by controlling the redundant data transmission with the co-ordination of Base Station (BS. The proposed protocol also achieves end-to-end reliability using a hop-by-hop acknowledgement scheme. We evaluate the performance of the proposed protocol through simulation. The simulation results reveal that our proposed protocol achieves better performance in terms of energy efficiency, latency and reliability than the existing protocols.

  8. Joint estimation and contention-resolution protocol for wireless random access

    DEFF Research Database (Denmark)

    Stefanovic, Cedomir; Trillingsgaard, Kasper Fløe; Kiilerich Pratas, Nuno

    2013-01-01

    We propose a contention-based random-access protocol, designed for wireless networks where the number of users is not a priori known. The protocol operates in rounds divided into equal-duration slots, performing at the same time estimation of the number of users and resolution of their transmissi......We propose a contention-based random-access protocol, designed for wireless networks where the number of users is not a priori known. The protocol operates in rounds divided into equal-duration slots, performing at the same time estimation of the number of users and resolution...... successive interference cancellation which, coupled with the use of the optimized access probabilities, enables throughputs that are substantially higher than the traditional slotted ALOHA-like protocols. The key feature of the proposed protocol is that the round durations are not a priori set...

  9. Adaptive enhancement of learning protocol in hippocampal cultured networks grown on multielectrode arrays

    Science.gov (United States)

    Pimashkin, Alexey; Gladkov, Arseniy; Mukhina, Irina; Kazantsev, Victor

    2013-01-01

    Learning in neuronal networks can be investigated using dissociated cultures on multielectrode arrays supplied with appropriate closed-loop stimulation. It was shown in previous studies that weakly respondent neurons on the electrodes can be trained to increase their evoked spiking rate within a predefined time window after the stimulus. Such neurons can be associated with weak synaptic connections in nearby culture network. The stimulation leads to the increase in the connectivity and in the response. However, it was not possible to perform the learning protocol for the neurons on electrodes with relatively strong synaptic inputs and responding at higher rates. We proposed an adaptive closed-loop stimulation protocol capable to achieve learning even for the highly respondent electrodes. It means that the culture network can reorganize appropriately its synaptic connectivity to generate a desired response. We introduced an adaptive reinforcement condition accounting for the response variability in control stimulation. It significantly enhanced the learning protocol to a large number of responding electrodes independently on its base response level. We also found that learning effect preserved after 4–6 h after training. PMID:23745105

  10. A Novel Quantum Video Steganography Protocol with Large Payload Based on MCQI Quantum Video

    Science.gov (United States)

    Qu, Zhiguo; Chen, Siyi; Ji, Sai

    2017-11-01

    As one of important multimedia forms in quantum network, quantum video attracts more and more attention of experts and scholars in the world. A secure quantum video steganography protocol with large payload based on the video strip encoding method called as MCQI (Multi-Channel Quantum Images) is proposed in this paper. The new protocol randomly embeds the secret information with the form of quantum video into quantum carrier video on the basis of unique features of video frames. It exploits to embed quantum video as secret information for covert communication. As a result, its capacity are greatly expanded compared with the previous quantum steganography achievements. Meanwhile, the new protocol also achieves good security and imperceptibility by virtue of the randomization of embedding positions and efficient use of redundant frames. Furthermore, the receiver enables to extract secret information from stego video without retaining the original carrier video, and restore the original quantum video as a follow. The simulation and experiment results prove that the algorithm not only has good imperceptibility, high security, but also has large payload.

  11. An improved machine learning protocol for the identification of correct Sequest search results

    Directory of Open Access Journals (Sweden)

    Lu Hui

    2010-12-01

    Full Text Available Abstract Background Mass spectrometry has become a standard method by which the proteomic profile of cell or tissue samples is characterized. To fully take advantage of tandem mass spectrometry (MS/MS techniques in large scale protein characterization studies robust and consistent data analysis procedures are crucial. In this work we present a machine learning based protocol for the identification of correct peptide-spectrum matches from Sequest database search results, improving on previously published protocols. Results The developed model improves on published machine learning classification procedures by 6% as measured by the area under the ROC curve. Further, we show how the developed model can be presented as an interpretable tree of additive rules, thereby effectively removing the 'black-box' notion often associated with machine learning classifiers, allowing for comparison with expert rule-of-thumb. Finally, a method for extending the developed peptide identification protocol to give probabilistic estimates of the presence of a given protein is proposed and tested. Conclusions We demonstrate the construction of a high accuracy classification model for Sequest search results from MS/MS spectra obtained by using the MALDI ionization. The developed model performs well in identifying correct peptide-spectrum matches and is easily extendable to the protein identification problem. The relative ease with which additional experimental parameters can be incorporated into the classification framework, to give additional discriminatory power, allows for future tailoring of the model to take advantage of information from specific instrument set-ups.

  12. Impact of previously disadvantaged land-users on sustainable ...

    African Journals Online (AJOL)

    Impact of previously disadvantaged land-users on sustainable agricultural ... about previously disadvantaged land users involved in communal farming systems ... of input, capital, marketing, information and land use planning, with effect on ...

  13. Bayesian adaptive survey protocols for resource management

    Science.gov (United States)

    Halstead, Brian J.; Wylie, Glenn D.; Coates, Peter S.; Casazza, Michael L.

    2011-01-01

    Transparency in resource management decisions requires a proper accounting of uncertainty at multiple stages of the decision-making process. As information becomes available, periodic review and updating of resource management protocols reduces uncertainty and improves management decisions. One of the most basic steps to mitigating anthropogenic effects on populations is determining if a population of a species occurs in an area that will be affected by human activity. Species are rarely detected with certainty, however, and falsely declaring a species absent can cause improper conservation decisions or even extirpation of populations. We propose a method to design survey protocols for imperfectly detected species that accounts for multiple sources of uncertainty in the detection process, is capable of quantitatively incorporating expert opinion into the decision-making process, allows periodic updates to the protocol, and permits resource managers to weigh the severity of consequences if the species is falsely declared absent. We developed our method using the giant gartersnake (Thamnophis gigas), a threatened species precinctive to the Central Valley of California, as a case study. Survey date was negatively related to the probability of detecting the giant gartersnake, and water temperature was positively related to the probability of detecting the giant gartersnake at a sampled location. Reporting sampling effort, timing and duration of surveys, and water temperatures would allow resource managers to evaluate the probability that the giant gartersnake occurs at sampled sites where it is not detected. This information would also allow periodic updates and quantitative evaluation of changes to the giant gartersnake survey protocol. Because it naturally allows multiple sources of information and is predicated upon the idea of updating information, Bayesian analysis is well-suited to solving the problem of developing efficient sampling protocols for species of

  14. A Concurrent Multiple Negotiation Protocol Based on Colored Petri Nets.

    Science.gov (United States)

    Niu, Lei; Ren, Fenghui; Zhang, Minjie; Bai, Quan

    2017-11-01

    Concurrent multiple negotiation (CMN) provides a mechanism for an agent to simultaneously conduct more than one negotiation. There may exist different interdependency relationships among these negotiations and these interdependency relationships can impact the outcomes of these negotiations. The outcomes of these concurrent negotiations contribute together for the agent to achieve an overall negotiation goal. Handling a CMN while considering interdependency relationships among multiple negotiations is a challenging research problem. This paper: 1) comprehensively highlights research problems of negotiations at concurrent negotiation level; 2) provides a graph-based CMN model with consideration of the interdependency relationships; and 3) proposes a colored Petri net-based negotiation protocol for conducting CMNs. With the proposed protocol, a CMN can be efficiently and concurrently processed and negotiation agreements can be efficiently achieved. Experimental results indicate the effectiveness and efficiency of the proposed protocol in terms of the negotiation success rate, the negotiation time and the negotiation outcome.

  15. An Anonymous Surveying Protocol via Greenberger-Horne-Zeilinger States

    Science.gov (United States)

    Naseri, Mosayeb; Gong, Li-Hua; Houshmand, Monireh; Matin, Laleh Farhang

    2016-10-01

    A new experimentally feasible anonymous survey protocol with authentication using Greenberger-Horne-Zeilinger (GHZ) entangled states is proposed. In this protocol, a chief executive officer (CEO) of a firm or company is trying to find out the effect of a possible action. In order to prepare a fair voting, the CEO would like to make an anonymous survey and is also interested in the total action for the whole company and he doesn't want to have a partial estimate for each department. In our proposal, there are two voters, Alice and Bob, voting on a question with a response of either "yes" or "no" and a tallyman, whose responsibility is to determine whether they have cast the same vote or not. In the proposed protocol the total response of the voters is calculated without revealing the actual votes of the voters.

  16. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Michael D. Colagrosso

    2006-11-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  17. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Colagrosso Michael D

    2007-01-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  18. Security of modified Ping-Pong protocol in noisy and lossy channel

    OpenAIRE

    Han, Yun-Guang; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Guo, Guang-Can; Han, Zheng-Fu

    2014-01-01

    The “Ping-Pong” (PP) protocol is a two-way quantum key protocol based on entanglement. In this protocol, Bob prepares one maximally entangled pair of qubits, and sends one qubit to Alice. Then, Alice performs some necessary operations on this qubit and sends it back to Bob. Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven. In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove ...

  19. 22 CFR 40.91 - Certain aliens previously removed.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Certain aliens previously removed. 40.91... IMMIGRANTS UNDER THE IMMIGRATION AND NATIONALITY ACT, AS AMENDED Aliens Previously Removed § 40.91 Certain aliens previously removed. (a) 5-year bar. An alien who has been found inadmissible, whether as a result...

  20. [Computerized clinical protocol for occlusion].

    Science.gov (United States)

    Salsench, J; Ferrer, J; Nogueras, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself. In this work we all data collected in the protocol and we give the explanations of each concept.

  1. Information required from States, including 'small quantities protocol' status, under the Protocol Additional to Safeguards Agreements

    International Nuclear Information System (INIS)

    Tuley, N.

    1999-01-01

    The Model, or Additional, Protocol to the Model Safeguards Agreement, INFCIRC/153, contains, inter alia, provisions for expanded declarations from Member States to the IAEA. These provisions include earlier design information declarations and information on fuel cycles activities, such a mining and milling, that were not previously part of safeguards. The session discusses the extent of the expanded declarations and provides examples of the forms that will be used to provide the information to the Agency. (author)

  2. Extraction protocols for orthodontic treatment: A retrospective study

    Directory of Open Access Journals (Sweden)

    Vaishnevi N Thirunavukkarasu

    2016-01-01

    Full Text Available Background and Objectives: Various extraction protocols have been followed for successful orthodontic treatment. The purpose of this study was to evaluate the extraction protocols in patients who had previously undergone orthodontic treatment and also who had reported for continuing orthodontic treatment from other clinics. Materials and Methods: One hundred thirty eight patients who registered for orthodontic treatment at the Faculty of Dentistry were divided into 10 extraction protocols based on the Orthodontic treatment protocol given by Janson et al. and were evaluated for statistical significance. Results: The descriptive statistics of the study revealed a total of 40 (29% patients in protocol 1, 43 (31.2% in protocol 2, 18 (13% in protocol 3, 16 (11.6% in protocol 5, and 12 (8.7% in Type 3 category of protocol 9. The Type 3 category in protocol 9 was statistically significant compared to other studies. Midline shift and collapse of the arch form were noticed in these individuals. Conclusion: Extraction of permanent teeth such as canine and lateral incisors without rational reasons could have devastating consequences on the entire occlusion. The percentage of cases wherein extraction of permanent teeth in the crowded region was adopted as a treatment option instead of orthodontic treatment is still prevalent in dental practice. The shortage of orthodontists in Malaysia, the long waiting period, and lack of subjective need for orthodontic treatment at an earlier age group were the reasons for the patient's to choose extraction of the mal-aligned teeth such as the maxillary canine or maxillary lateral incisors.

  3. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  4. Determining root correspondence between previously and newly detected objects

    Science.gov (United States)

    Paglieroni, David W.; Beer, N Reginald

    2014-06-17

    A system that applies attribute and topology based change detection to networks of objects that were detected on previous scans of a structure, roadway, or area of interest. The attributes capture properties or characteristics of the previously detected objects, such as location, time of detection, size, elongation, orientation, etc. The topology of the network of previously detected objects is maintained in a constellation database that stores attributes of previously detected objects and implicitly captures the geometrical structure of the network. A change detection system detects change by comparing the attributes and topology of new objects detected on the latest scan to the constellation database of previously detected objects.

  5. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  6. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  7. Network Authentication Protocol Studies

    Science.gov (United States)

    2009-04-01

    usually require compliance with development standards such as ISO 12207 or IEEE / IEC 12207 . Those standards mandate traceability as a property of a...standards have been proposed to deal with non-repudiation. ISO /IEC 10181-4 [19] and ISO /IEC 13888 [20, 22, 21]. While ISO /IEC 10181-4 provides a...framework for developing and employing these services, ISO /IEC 13888 consists of three parts. They propose a general model of non-repudiation and a set of

  8. Proposed Amendments to the Nuclear Liability

    International Nuclear Information System (INIS)

    1981-01-01

    This Memorandum issued by the Swedish Ministry of Justice contains proposed amendments to the 1968 Nuclear Liability Act which can be divided into two categories. Those in the first category are required to enable Sweden to ratify the draft Protocols to amend the Paris Convention and the Brussels Supplementary Convention. The second category of amendments propose that the nuclear operator's liability be raised from the present sum of 50 million Kroner to 500 million Kroner, to be covered by insurance; it is also proposed that a State liability be introduced over and above the compensation available, the aggregate amount being limited to 300 million Kroner. State indemnification would apply to the Nordic countries. The Annexes to the Memorandum contain the English and French texts of the draft Protocols to amend both above-mentioned Conventions (NEA) [fr

  9. A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem.

    Science.gov (United States)

    Zhao, Zhenguo

    2014-05-01

    With the fast advancement of the wireless communication technology and the widespread use of medical systems, the radio frequency identification (RFID) technology has been widely used in healthcare environments. As the first important protocol for ensuring secure communication in healthcare environment, the RFID authentication protocols derive more and more attentions. Most of RFID authentication protocols are based on hash function or symmetric cryptography. To get more security properties, elliptic curve cryptosystem (ECC) has been used in the design of RFID authentication protocol. Recently, Liao and Hsiao proposed a new RFID authentication protocol using ECC and claimed their protocol could withstand various attacks. In this paper, we will show that their protocol suffers from the key compromise problem, i.e. an adversary could get the private key stored in the tag. To enhance the security, we propose a new RFID authentication protocol using ECC. Detailed analysis shows the proposed protocol not only could overcome weaknesses in Liao and Hsiao's protocol but also has the same performance. Therefore, it is more suitable for healthcare environments.

  10. Proposal of 'Modular Heliotron'

    International Nuclear Information System (INIS)

    Yamazaki, Kozo

    1994-01-01

    A new modular helical system named 'Modular Heliotron' with clean and efficient helical magnetic divertor is proposed as an extension of the present conventional design of the continuous helical coil system. The sectored helical coils on one plane of the torus and the sectored returning vertical field coils on the other plane are combined. This coil system produces magnetic surfaces nearly equivalent to those of the l=2 helical system with one-pair poloidal coils, and overcomes the defects of construction and maintenance difficulties of the continuous coil systems. This concept satisfies the compatibility between the coil modularity and the sufficient divertor-space utilization, different from previous modular coil designs. The allowable length of the gap between each modular coil is clarified to keep good magnetic surfaces. Typical examples of the reactor coil configuration are described as an extension of the LHD (Large Helical Device) configuration. (author)

  11. Proposal of 'modular heliotron'

    International Nuclear Information System (INIS)

    Yamazaki, Kozo.

    1993-11-01

    A new modular helical configuration named 'Modular Heliotron' with clean and efficient helical magnetic divertor is proposed as an extension of the present conventional design of the continuous helical coil system. The sectored helical coils on one plane of the torus and the sectored returning vertical field coils on the other plane are combined. This coil system produces magnetic surfaces nearly equivalent to those of the l=2 helical system with one-pair poloidal coils, and overcomes the defects of construction and maintenance difficulties of the continuous coil systems. This concept satisfies the compatibility between the coil modularity and the sufficient divertor-space utilization, different from previous modular coil designs. The allowable length of the gap between each modular coil is clarified to keep good magnetic surfaces. Typical examples of the reactor coil configuration are described as an extension of the LHD (Large Helical Device) configuration. (author)

  12. [Study protocol of a prevention of recurrent suicidal behaviour program based on case management (PSyMAC)].

    Science.gov (United States)

    Sáiz, Pilar A; Rodríguez-Revuelta, Julia; González-Blanco, Leticia; Burón, Patricia; Al-Halabí, Susana; Garrido, Marlen; García-Alvarez, Leticia; García-Portilla, Paz; Bobes, Julio

    2014-01-01

    Prevention of suicidal behaviour is a public health priority in the European Union. A previous suicide attempt is the best risk predictor for future attempts, as well as completed suicides. The primary aim of this article is to describe a controlled study protocol designed for prevention of recurrent suicidal behaviour that proposes case management, and includes a psychoeducation program, as compared with the standard intervention (PSyMAC). Patients admitted from January 2011 to June 2013 to the emergency room of the Hospital Universitario Central de Asturias were evaluated using a protocol including sociodemographic, psychiatric, and psychosocial assessment. Patients were randomly assigned to either a group receiving continuous case management including participation in a psychoeducation program (experimental group), or a control group receiving standard care. The primary objective is to examine whether or not the period of time until recurrent suicidal behaviour in the experimental group is significantly different from that of the control group. PSyMAC proposes low cost and easily adaptable interventions to the usual clinical setting that can help to compensate the shortcoming of specific action protocols and suicidal behaviour prevention programs in our country. The evaluation of PSyMAC results will determine their real effectivity as a case-magament program to reduce suicidal risk. Copyright © 2013 SEP y SEPB. Published by Elsevier España. All rights reserved.

  13. A Safe Protocol for Amalgam Removal

    Directory of Open Access Journals (Sweden)

    Dana G. Colson

    2012-01-01

    Full Text Available Today's environment has different impacts on our body than previous generations. Heavy metals are a growing concern in medicine. Doctors and individuals request the removal of their amalgam (silver mercury restorations due to the high mercury content. A safe protocol to replace the silver mercury filling will ensure that there is minimal if any absorption of materials while being removed. Strong alternative white composite and lab-processed materials are available today to create a healthy and functioning mouth. Preparation of the patient prior to the procedure and after treatment is vital to establish the excretion of the mercury from the body.

  14. Security Property Validation of the Sensor Network Encryption Protocol (SNEP

    Directory of Open Access Journals (Sweden)

    Salekul Islam

    2015-07-01

    Full Text Available Since wireless sensor networks (WSNs have been designed to be deployed in an unsecured, public environment, secured communication is really vital for their wide-spread use. Among all of the communication protocols developed for WSN, the Security Protocols for Sensor Networks (SPINS is exceptional, as it has been designed with security as a goal. SPINS is composed of two building blocks: Secure Network Encryption Protocol (SNEP and the “micro” version of the Timed Efficient Streaming Loss-tolerant Authentication (TESLA, named μTESLA. From the inception of SPINS, a number of efforts have been made to validate its security properties. In this paper, we have validated the security properties of SNEP by using an automated security protocol validation tool, named AVISPA. Using the protocol specification language, HLPSL, we model two combined scenarios—node to node key agreement and counter exchange protocols—followed by data transmission. Next, we validate the security properties of these combined protocols, using different AVISPA back-ends. AVISPA reports the models we have developed free from attacks. However, by analyzing the key distribution sub-protocol, we find one threat of a potential DoS attack that we have demonstrated by modeling in AVISPA. Finally, we propose a modification, and AVISPA reports this modified version free from the potential DoS attack.

  15. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Aquino de Muro, Marilena; Rapley, Ralph

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  16. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  17. Hopping control channel MAC protocol for opportunistic spectrum access networks

    Institute of Scientific and Technical Information of China (English)

    FU Jing-tuan; JI Hong; MAO Xu

    2010-01-01

    Opportunistic spectrum access (OSA) is considered as a promising approach to mitigate spectrum scarcity by allowing unlicensed users to exploit spectrum opportunities in licensed frequency bands. Derived from the existing channel-hopping multiple access (CHMA) protocol,we introduce a hopping control channel medium access control (MAC) protocol in the context of OSA networks. In our proposed protocol,all nodes in the network follow a common channel-hopping sequence; every frequency channel can be used as control channel and data channel. Considering primary users' occupancy of the channel,we use a primary user (PU) detection model to calculate the channel availability for unlicensed users' access. Then,a discrete Markov chain analytical model is applied to describe the channel states and deduce the system throughput. Through simulation,we present numerical results to demonstrate the throughput performance of our protocol and thus validate our work.

  18. An Accurate Link Correlation Estimator for Improving Wireless Protocol Performance

    Science.gov (United States)

    Zhao, Zhiwei; Xu, Xianghua; Dong, Wei; Bu, Jiajun

    2015-01-01

    Wireless link correlation has shown significant impact on the performance of various sensor network protocols. Many works have been devoted to exploiting link correlation for protocol improvements. However, the effectiveness of these designs heavily relies on the accuracy of link correlation measurement. In this paper, we investigate state-of-the-art link correlation measurement and analyze the limitations of existing works. We then propose a novel lightweight and accurate link correlation estimation (LACE) approach based on the reasoning of link correlation formation. LACE combines both long-term and short-term link behaviors for link correlation estimation. We implement LACE as a stand-alone interface in TinyOS and incorporate it into both routing and flooding protocols. Simulation and testbed results show that LACE: (1) achieves more accurate and lightweight link correlation measurements than the state-of-the-art work; and (2) greatly improves the performance of protocols exploiting link correlation. PMID:25686314

  19. Colon cleansing protocol in children: research conditions vs. clinical practice.

    Science.gov (United States)

    Elitsur, Yoram; Balfaqih, Yaslam; Preston, Deborah

    2018-04-01

     Colon preparation rates are the limiting factor for a successful diagnostic colonoscopy in children. Different colon cleansing protocols have been published for use in children. Unfortunately, the applicability of those published research protocols has not been formally evaluated in routine clinical practice. We investigated the success rate of our previously published colon cleansing protocol as utilized in our clinical practice.  This was a retrospective study. In the clinical practice, the colon cleansing protocol included PEG-3350 at a dose of 2 g/kg/day plus Dulcolax (Bisacodyl, Boehringer Ingelheim, TX USA) 5 mg/day for 2 days. Adequate colon preparation was graded between 1 - 5, as previously described, and grade ≥ 4.0 was considered an adequate preparation. Patients were instructed to complete a questionnaire that included PEG-3350 dose, number of stools per day, consistency of each stool, and side effects (vomiting, abdominal pain). Clinical and endoscopic results were compared between the protocol under research conditions and routine practice.  The success rate of the colon preparation in our clinical practice was similar to the results observed under our research protocol (75 % vs. 73.6 %). Moreover, the total number of stools, stool consistency, and the intubation rate of the terminal ileum were also similar. We concluded, that in our experience, the colon cleansing protocol used under research conditions was effective and appropriate for use in routine clinical practice.  We recommend testing each new protocol under the routine conditions of clinical practice to confirm its applicability for general practitioners.

  20. Modeling and Verification of the Bitcoin Protocol

    Directory of Open Access Journals (Sweden)

    Kaylash Chaudhary

    2015-11-01

    Full Text Available Bitcoin is a popular digital currency for online payments, realized as a decentralized peer-to-peer electronic cash system. Bitcoin keeps a ledger of all transactions; the majority of the participants decides on the correct ledger. Since there is no trusted third party to guard against double spending, and inspired by its popularity, we would like to investigate the correctness of the Bitcoin protocol. Double spending is an important threat to electronic payment systems. Double spending would happen if one user could force a majority to believe that a ledger without his previous payment is the correct one. We are interested in the probability of success of such a double spending attack, which is linked to the computational power of the attacker. This paper examines the Bitcoin protocol and provides its formalization as an UPPAAL model. The model will be used to show how double spending can be done if the parties in the Bitcoin protocol behave maliciously, and with what probability double spending occurs.

  1. Cognitive Radio MAC Protocol for WLAN

    DEFF Research Database (Denmark)

    Zhang, Qi; Fitzek, Frank H.P.; Iversen, Villy Bæk

    2008-01-01

    hole; moreover, it designs dual inband sensing scheme to detect primary user appearance. Additionally, C-CSMA/CA has the advantage to effectively solve the cognitive radio self-coexistence issues in the overlapping CR BSSs scenario. It also realizes station-based dynamic resource selection......To solve the performance degradation issue in current WLAN caused by the crowded unlicensed spectrum, we propose a cognitive radio (CR) media access protocol, C-CSMA/CA. The basic idea is that with cognitive radio techniques the WLAN devices can not only access the legacy WLAN unlicensed spectrum...

  2. The Groningen Protocol - the Jewish perspective.

    Science.gov (United States)

    Gesundheit, Benjamin; Steinberg, Avraham; Blazer, Shraga; Jotkowitz, Alan

    2009-01-01

    Despite significant advances in neonatology, there will always be newborns with serious life-threatening conditions creating most difficult bioethical dilemmas. Active euthanasia for adult patients is one of the most controversial bioethical questions; for severely ill neonates, the issue is even more complex, due to their inability to take part in any decision concerning their future. The Groningen Protocol introduced in 2005 by P.J. Sauer proposes criteria allowing active euthanasia for severely ill, not necessarily terminal, newborns with incurable conditions and poor quality of life in order to spare them unbearable suffering. We discuss the ethical dilemma and ideological foundations of the protocol, the opinions of its defenders and critics, and the dangers involved. The Jewish perspective relating to the subject is presented based on classical Jewish sources, which we trust may enrich modern bioethical debates. In Jewish law, the fetus acquires full legal status only after birth. However, while the lives of terminally ill neonates must in no way be actively destroyed or shortened, there is no obligation to make extraordinary efforts to prolong their lives. Accurate preimplantation or prenatal diagnosis might significantly reduce the incidence of nonviable births, but active killing of infants violates the basic foundations of Jewish law, and opens the 'slippery slope' for uncontrolled abuse. Therefore, we call upon the international medical and bioethical community to reject the Groningen Protocol that permits euthanization and to develop ethical guidelines for the optimal care of severely compromised neonates. Copyright 2009 S. Karger AG, Basel.

  3. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy.

    Science.gov (United States)

    Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.

  4. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy

    Science.gov (United States)

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619

  5. Quorum system and random based asynchronous rendezvous protocol for cognitive radio ad hoc networks

    Directory of Open Access Journals (Sweden)

    Sylwia Romaszko

    2013-12-01

    Full Text Available This paper proposes a rendezvous protocol for cognitive radio ad hoc networks, RAC2E-gQS, which utilizes (1 the asynchronous and randomness properties of the RAC2E protocol, and (2 channel mapping protocol, based on a grid Quorum System (gQS, and taking into account channel heterogeneity and asymmetric channel views. We show that the combination of the RAC2E protocol with the grid-quorum based channel mapping can yield a powerful RAC2E-gQS rendezvous protocol for asynchronous operation in a distributed environment assuring a rapid rendezvous between the cognitive radio nodes having available both symmetric and asymmetric channel views. We also propose an enhancement of the protocol, which uses a torus QS for a slot allocation, dealing with the worst case scenario, a large number of channels with opposite ranking lists.

  6. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Science.gov (United States)

    Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing

    2017-01-01

    Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  7. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Directory of Open Access Journals (Sweden)

    Shameng Wen

    Full Text Available Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  8. Improvement of "Novel Multiparty Quantum Key Agreement Protocol with GHZ States"

    Science.gov (United States)

    Gu, Jun; Hwang, Tzonelih

    2017-10-01

    Quantum key agreement (QKA) protocol is a method for negotiating a fair and secure key among mutually untrusted participants. Recently, Xu et al. (Quantum Inf. Process. 13:2587-2594, 2014) proposed a multi-party QKA protocol based on Greenberger-Horne-Zeilinger (GHZ) states. However, this study points out that Xu et al.'s protocol cannot provide the fairness property. That is, the last involved participant in the protocol can manipulate the final shared secret key without being detected by the other participants. Moreover, according to Yu et al.'s research (2015), Xu et al.'s protocol cannot avoid the public discussion attack too. To avoid these weaknesses, an improved QKA protocol is proposed.

  9. Protocols for Scholarly Communication

    Science.gov (United States)

    Pepe, A.; Yeomans, J.

    2007-10-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should guide authors naturally towards OA publication, and CERN wants to help reach a full open access publishing environment for the particle physics community and related sciences in the next few years.

  10. Development of a protocol that allows safe consumption of the hypoallergenic apple cultivar Santana

    OpenAIRE

    Maas, van der, M.P.; Schenk, M.F.

    2009-01-01

    The apple (Malus ×domestica) cultivar Santana was shown to have a low allergenicity in a previously reported clinical trial. A protocol was developed to validate these results outside a clinical setting and to market the Santana as a hypoallergenic apple for large-scale consumption. This protocol was designed to ensure safe consumption of the Santana by consumers suffering from apple allergy. We tested the protocol in a pilot in 100 supermarket stores and evaluated in an internet-based survey...

  11. e-SCP-ECG+ Protocol: An Expansion on SCP-ECG Protocol for Health Telemonitoring—Pilot Implementation

    Directory of Open Access Journals (Sweden)

    George J. Mandellos

    2010-01-01

    Full Text Available Standard Communication Protocol for Computer-assisted Electrocardiography (SCP-ECG provides standardized communication among different ECG devices and medical information systems. This paper extends the use of this protocol in order to be included in health monitoring systems. It introduces new sections into SCP-ECG structure for transferring data for positioning, allergies, and five additional biosignals: noninvasive blood pressure (NiBP, body temperature (Temp, Carbon dioxide (CO2, blood oxygen saturation (SPO2, and pulse rate. It also introduces new tags in existing sections for transferring comprehensive demographic data. The proposed enhanced version is referred to as e-SCP-ECG+ protocol. This paper also considers the pilot implementation of the new protocol as a software component in a Health Telemonitoring System.

  12. 49 CFR 173.23 - Previously authorized packaging.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Previously authorized packaging. 173.23 Section... REQUIREMENTS FOR SHIPMENTS AND PACKAGINGS Preparation of Hazardous Materials for Transportation § 173.23 Previously authorized packaging. (a) When the regulations specify a packaging with a specification marking...

  13. 28 CFR 10.5 - Incorporation of papers previously filed.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Incorporation of papers previously filed... CARRYING ON ACTIVITIES WITHIN THE UNITED STATES Registration Statement § 10.5 Incorporation of papers previously filed. Papers and documents already filed with the Attorney General pursuant to the said act and...

  14. 75 FR 76056 - FEDERAL REGISTER CITATION OF PREVIOUS ANNOUNCEMENT:

    Science.gov (United States)

    2010-12-07

    ... SECURITIES AND EXCHANGE COMMISSION Sunshine Act Meeting FEDERAL REGISTER CITATION OF PREVIOUS ANNOUNCEMENT: STATUS: Closed meeting. PLACE: 100 F Street, NE., Washington, DC. DATE AND TIME OF PREVIOUSLY ANNOUNCED MEETING: Thursday, December 9, 2010 at 2 p.m. CHANGE IN THE MEETING: Time change. The closed...

  15. Security of modified Ping-Pong protocol in noisy and lossy channel.

    Science.gov (United States)

    Han, Yun-Guang; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Guo, Guang-Can; Han, Zheng-Fu

    2014-05-12

    The "Ping-Pong" (PP) protocol is a two-way quantum key protocol based on entanglement. In this protocol, Bob prepares one maximally entangled pair of qubits, and sends one qubit to Alice. Then, Alice performs some necessary operations on this qubit and sends it back to Bob. Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven. In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove the security of this modified PP protocol against collective attacks when the noisy and lossy channel is taken into account. Simulation results show that our protocol is practical.

  16. Impersonation attack on a quantum secure direct communication and authentication protocol with improvement

    Science.gov (United States)

    Amerimehr, Ali; Hadain Dehkordi, Massoud

    2018-03-01

    We analyze the security of a quantum secure direct communication and authentication protocol based on single photons. We first give an impersonation attack on the protocol. The cryptanalysis shows that there is a gap in the authentication procedure of the protocol so that an opponent can reveal the secret information by an undetectable attempt. We then propose an improvement for the protocol and show it closes the gap by applying a mutual authentication procedure. In the improved protocol single photons are transmitted once in a session, so it is easy to implement as the primary protocol. Furthermore, we use a novel technique for secret order rearrangement of photons by which not only quantum storage is eliminated also a secret key can be reused securely. So the new protocol is applicable in practical approaches like embedded system devices.

  17. A software defined RTU multi-protocol automatic adaptation data transmission method

    Science.gov (United States)

    Jin, Huiying; Xu, Xingwu; Wang, Zhanfeng; Ma, Weijun; Li, Sheng; Su, Yong; Pan, Yunpeng

    2018-02-01

    Remote terminal unit (RTU) is the core device of the monitor system in hydrology and water resources. Different devices often have different communication protocols in the application layer, which results in the difficulty in information analysis and communication networking. Therefore, we introduced the idea of software defined hardware, and abstracted the common feature of mainstream communication protocols of RTU application layer, and proposed a uniformed common protocol model. Then, various communication protocol algorithms of application layer are modularized according to the model. The executable codes of these algorithms are labeled by the virtual functions and stored in the flash chips of embedded CPU to form the protocol stack. According to the configuration commands to initialize the RTU communication systems, it is able to achieve dynamic assembling and loading of various application layer communication protocols of RTU and complete the efficient transport of sensor data from RTU to central station when the data acquisition protocol of sensors and various external communication terminals remain unchanged.

  18. No discrimination against previous mates in a sexually cannibalistic spider

    Science.gov (United States)

    Fromhage, Lutz; Schneider, Jutta M.

    2005-09-01

    In several animal species, females discriminate against previous mates in subsequent mating decisions, increasing the potential for multiple paternity. In spiders, female choice may take the form of selective sexual cannibalism, which has been shown to bias paternity in favor of particular males. If cannibalistic attacks function to restrict a male's paternity, females may have little interest to remate with males having survived such an attack. We therefore studied the possibility of female discrimination against previous mates in sexually cannibalistic Argiope bruennichi, where females almost always attack their mate at the onset of copulation. We compared mating latency and copulation duration of males having experienced a previous copulation either with the same or with a different female, but found no evidence for discrimination against previous mates. However, males copulated significantly shorter when inserting into a used, compared to a previously unused, genital pore of the female.

  19. Implant breast reconstruction after salvage mastectomy in previously irradiated patients.

    Science.gov (United States)

    Persichetti, Paolo; Cagli, Barbara; Simone, Pierfranco; Cogliandro, Annalisa; Fortunato, Lucio; Altomare, Vittorio; Trodella, Lucio

    2009-04-01

    The most common surgical approach in case of local tumor recurrence after quadrantectomy and radiotherapy is salvage mastectomy. Breast reconstruction is the subsequent phase of the treatment and the plastic surgeon has to operate on previously irradiated and manipulated tissues. The medical literature highlights that breast reconstruction with tissue expanders is not a pursuable option, considering previous radiotherapy a contraindication. The purpose of this retrospective study is to evaluate the influence of previous radiotherapy on 2-stage breast reconstruction (tissue expander/implant). Only patients with analogous timing of radiation therapy and the same demolitive and reconstructive procedures were recruited. The results of this study prove that, after salvage mastectomy in previously irradiated patients, implant reconstruction is still possible. Further comparative studies are, of course, advisable to draw any conclusion on the possibility to perform implant reconstruction in previously irradiated patients.

  20. Evaluation of Protocol Uniformity Concerning Laparoscopic Cholecystectomy in The Netherlands

    Science.gov (United States)

    Goossens, Richard H. M.; van Eijk, Daan J.; Lange, Johan F.

    2008-01-01

    Background Iatrogenic bile duct injury remains a current complication of laparoscopic cholecystectomy. One uniform and standardized protocol, based on the “critical view of safety” concept of Strasberg, should reduce the incidence of this complication. Furthermore, owing to the rapid development of minimally invasive surgery, technicians are becoming more frequently involved. To improve communication between the operating team and technicians, standardized actions should also be defined. The aim of this study was to compare existing protocols for laparoscopic cholecystectomy from various Dutch hospitals. Methods Fifteen Dutch hospitals were contacted for evaluation of their protocols for laparoscopic cholecystectomy. All evaluated protocols were divided into six steps and were compared accordingly. Results In total, 13 hospitals responded—5 academic hospitals, 5 teaching hospitals, 3 community hospitals—of which 10 protocols were usable for comparison. Concerning the trocar positions, only minor differences were found. The concept of “critical view of safety” was represented in just one protocol. Furthermore, the order of clipping and cutting the cystic artery and duct differed. Descriptions of instruments and apparatus were also inconsistent. Conclusions Present protocols differ too much to define a universal procedure among surgeons in The Netherlands. The authors propose one (inter)national standardized protocol, including standardized actions. This uniform standardized protocol has to be officially released and recommended by national scientific associations (e.g., the Dutch Society of Surgery) or international societies (e.g., European Association for Endoscopic Surgery and Society of American Gastrointestinal and Endoscopic Surgeons). The aim is to improve patient safety and professional communication, which are necessary for new developments. PMID:18224485

  1. 77 FR 15980 - Airworthiness Directives; Alpha Aviation Concept Limited (Type Certificate Previously Held by...

    Science.gov (United States)

    2012-03-19

    ... Concept Limited (Type Certificate Previously Held by Alpha Aviation Design Limited) Airplanes AGENCY... rulemaking (NPRM). SUMMARY: We propose to adopt a new airworthiness directive (AD) for Alpha Aviation Concept... condition on an aviation product. The MCAI describes the unsafe condition as oil lines fitted to affected...

  2. Predicting fruit consumption: the role of habits, previous behavior and mediation effects

    NARCIS (Netherlands)

    de Vries, H.; Eggers, S.M.; Lechner, L.; van Osch, L.; van Stralen, M.M.

    2014-01-01

    Background: This study assessed the role of habits and previous behavior in predicting fruit consumption as well as their additional predictive contribution besides socio-demographic and motivational factors. In the literature, habits are proposed as a stable construct that needs to be controlled

  3. 77 FR 5998 - Airworthiness Directives; EADS CASA (Type Certificate Previously Held by Construcciones...

    Science.gov (United States)

    2012-02-07

    ... Airworthiness Directives; EADS CASA (Type Certificate Previously Held by Construcciones Aeronauticas, S.A... proposed to correct an unsafe condition for the specified products. The MCAI states: EADS-CASA received... address this condition, EADS-CASA has developed an engine condition control cable P/N 35-56382-0005 with...

  4. 76 FR 41432 - Airworthiness Directives; Gulfstream Aerospace LP (Type Certificate Previously Held by Israel...

    Science.gov (United States)

    2011-07-14

    ... Aerospace LP (Type Certificate Previously Held by Israel Aircraft Industries, Ltd.) Model Galaxy, Gulfstream... proposed AD. Discussion The Civil Aviation Authority (CAA), which is the aviation authority for Israel, has... Held by Israel Aircraft Industries, Ltd.): Docket No. FAA-2011-0716; Directorate Identifier 2011-NM-013...

  5. 75 FR 36296 - Airworthiness Directives; Gulfstream Aerospace LP (Type Certificate Previously Held by Israel...

    Science.gov (United States)

    2010-06-25

    ... Airworthiness Directives; Gulfstream Aerospace LP (Type Certificate Previously Held by Israel Aircraft... contact we receive about this proposed AD. Discussion The Civil Aviation Authority of Israel (CAAI), which is the aviation authority for Israel, has issued Israeli Airworthiness Directive 01-10-01-07R1, dated...

  6. A RFID grouping proof protocol for medication safety of inpatient.

    Science.gov (United States)

    Huang, Hsieh-Hong; Ku, Cheng-Yuan

    2009-12-01

    In order to provide enhanced medication safety for inpatients, the medical mechanism which adopts the modified grouping proof protocol is proposed in this paper. By using the grouping proof protocol, the medical staffs could confirm the authentication and integrity of a group of Radio-Frequency Identification (RFID) tags which are embedded on inpatient bracelets and the containers of drugs. This mechanism is designed to be compatible with EPCglobal Class-1 Generation-2 standard which is the most popular specification of RFID tags. Due to the light-weight computational capacity of passive tags, only the pseudo-random number generator (PRNG) and cyclic redundancy code (CRC) are allowed to be used in the communication protocol. Furthermore, a practical scenario of using this proposed mechanism in hospital to examine the medication safety is also presented.

  7. Type-Based Automated Verification of Authenticity in Asymmetric Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten; Kobayashi, Naoki; Sun, Yunde

    2011-01-01

    Gordon and Jeffrey developed a type system for verification of asymmetric and symmetric cryptographic protocols. We propose a modified version of Gordon and Jeffrey's type system and develop a type inference algorithm for it, so that protocols can be verified automatically as they are, without any...... type annotations or explicit type casts. We have implemented a protocol verifier SpiCa based on the algorithm, and confirmed its effectiveness....

  8. Comment on 'Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair'

    International Nuclear Information System (INIS)

    Qin Sujuan; Gao Fei; Wen Qiaoyan; Guo Fenzhuo

    2010-01-01

    Three protocols of quantum cryptography with a nonmaximally entangled qubit pair [Phys. Rev. A 80, 022323 (2009)] were recently proposed by Shimizu, Tamaki, and Fukasaka. The security of these protocols is based on the quantum-mechanical constraint for a state transformation between nonmaximally entangled states. However, we find that the second protocol is vulnerable under the correlation-elicitation attack. An eavesdropper can obtain the encoded bit M although she has no knowledge about the random bit R.

  9. Testing objects in Computerized Axial Tomography. Contributions to the Spanish Protocol on quality control in radiodiagnostics

    International Nuclear Information System (INIS)

    Villaescusa, J.I.; Campayo, J.M.

    1995-01-01

    In the provisional version of the Spanish Protocol about the technical aspects of Quality Control in Radiodiagnostic,SEFM-SEPR 1993, it is dedicated a section to Computerized Axial tomography, establishing a total of eleven technical parameters of the equipment for examination. The present work describes the practical use of the Protocol using various types of Test Object. The authors also propose new tests that should be considered in the final version of the Spanish Protocol. (Author)

  10. A Protocol for Bidirectional Quantum Secure Communication Based on Genuine Four-Particle Entangled States

    International Nuclear Information System (INIS)

    Gao Gan; Wang Liping

    2010-01-01

    By swapping the entanglement of genuine four-particle entangled states, we propose a bidirectional quantum secure communication protocol. The biggest merit of this protocol is that the information leakage does not exist. In addition, the ideas of the 'two-step' transmission and the block transmission are employed in this protocol. In order to analyze the security of the second sequence transmission, decoy states are used. (general)

  11. A Multicast Protocol Utilizing On-demand Routing Strategy for MPRN

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    This paper proposes a multicast protocol utilizing ondemand routing strategy for mobile packet radio network. It does not maintain permanent route tables with full topological views. Instead, multicast senders apply on-demand procedures to dynamically discover routes and build forwarding group in this protocol. The data packets are propagated by each forwarding group member via scoped flooding, so the protocol can reduce network bandwidth overhead and avoid the propagation of potentially large routing updates throughout the network.

  12. Evaluation of an adult insulin infusion protocol at an academic medical center.

    Science.gov (United States)

    Petrov, Katerina I; Burns, Tammy L; Drincic, Andjela

    2012-05-01

    Acknowledging evidence of possible detrimental effects of tightly controlled blood glucose levels, the American Association of Clinical Endocrinologists and the American Diabetes Association published a consensus statement recommending less strict control for most diabetic patients. As a result of these recommendations, our academic center at Creighton University Medical Center revised its adult insulin infusion protocol to target blood glucose levels ranging from 120 to 180 mg/dL for regular (standard) glycemic control and 80 to 120 mg/dL for tight control; previous targets had ranged from 80 to 180 mg/dL and 70 to 110 mg/dL, respectively. The primary objective was to evaluate the time that blood glucose values were within the target range for patients receiving the new protocol, compared with patients receiving the previous protocol. Our study was designed to evaluate the effectiveness and safety of the revised protocol. Using a retrospective chart review, we collected data for 4 months from patients on the old insulin protocol (May to August 2009) and for 4 months from patients on the new protocol (September to December 2009). Secondary endpoints included the number of hypoglycemic episodes (blood glucose below 70 mg/dL) and severe hypoglycemic episodes (blood glucose 40 mg/dL or lower) experienced by patients receiving the new insulin protocol compared with those receiving the former protocol. Patient characteristics were similar at baseline. Blood glucose values stayed within the target range for a significantly shorter time with the new protocol than with the former protocol (44.6% vs. 56.8%, respectively; P protocol. No statistically significant differences in hypoglycemia were observed after the protocol was changed. Hypoglycemia occurred in 31% of the former-protocol patients compared with 18% of the revised-protocol patients. Severe hypoglycemia was experienced by 2.1% of patients on the old protocol and by 3.1% of patients on the new protocol. Rates of

  13. Effectiveness of oxaliplatin desensitization protocols.

    Science.gov (United States)

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  14. Reactive GTS Allocation Protocol for Sporadic Events Using the IEEE 802.15.4

    Directory of Open Access Journals (Sweden)

    Mukhtar Azeem

    2014-01-01

    by the IEEE 802.15.4 standard. The proposed control protocol ensures that a given offline sporadic schedule can be adapted online in a timely manner such that the static periodic schedule has not been disturbed and the IEEE 802.15.4 standard compliance remains intact. The proposed protocol is simulated in OPNET. The simulation results are analyzed and presented in this paper to prove the correctness of the proposed protocol regarding the efficient real-time sporadic event delivery along with the periodic event propagation.

  15. Privacy preserving protocol for detecting genetic relatives using rare variants.

    Science.gov (United States)

    Hormozdiari, Farhad; Joo, Jong Wha J; Wadia, Akshay; Guan, Feng; Ostrosky, Rafail; Sahai, Amit; Eskin, Eleazar

    2014-06-15

    High-throughput sequencing technologies have impacted many areas of genetic research. One such area is the identification of relatives from genetic data. The standard approach for the identification of genetic relatives collects the genomic data of all individuals and stores it in a database. Then, each pair of individuals is compared to detect the set of genetic relatives, and the matched individuals are informed. The main drawback of this approach is the requirement of sharing your genetic data with a trusted third party to perform the relatedness test. In this work, we propose a secure protocol to detect the genetic relatives from sequencing data while not exposing any information about their genomes. We assume that individuals have access to their genome sequences but do not want to share their genomes with anyone else. Unlike previous approaches, our approach uses both common and rare variants which provide the ability to detect much more distant relationships securely. We use a simulated data generated from the 1000 genomes data and illustrate that we can easily detect up to fifth degree cousins which was not possible using the existing methods. We also show in the 1000 genomes data with cryptic relationships that our method can detect these individuals. The software is freely available for download at http://genetics.cs.ucla.edu/crypto/. © The Author 2014. Published by Oxford University Press.

  16. Shoulder muscle endurance: the development of a standardized and reliable protocol

    Directory of Open Access Journals (Sweden)

    Roy Jean-Sébastien

    2011-01-01

    Full Text Available Abstract Background Shoulder muscle fatigue has been proposed as a possible link to explain the association between repetitive arm use and the development of rotator cuff disorders. To our knowledge, no standardized clinical endurance protocol has been developed to evaluate the effects of muscle fatigue on shoulder function. Such a test could improve clinical examination of individuals with shoulder disorders. Therefore, the purpose of this study was to establish a reliable protocol for objective assessment of shoulder muscle endurance. Methods An endurance protocol was developed on a stationary dynamometer (Biodex System 3. The endurance protocol was performed in isotonic mode with the resistance set at 50% of each subject's peak torque as measured for shoulder external (ER and internal rotation (IR. Each subject performed 60 continuous repetitions of IR/ER rotation. The endurance protocol was performed by 36 healthy individuals on two separate occasions at least two days apart. Maximal isometric shoulder strength tests were performed before and after the fatigue protocol to evaluate the effects of the endurance protocol and its reliability. Paired t-tests were used to evaluate the reduction in shoulder strength due to the protocol, while intraclass correlation coefficients (ICC and minimal detectable change (MDC were used to evaluate its reliability. Results Maximal isometric strength was significantly decreased after the endurance protocol (P 0.84. Conclusions Changes in muscular performance observed during and after the muscular endurance protocol suggests that the protocol did result in muscular fatigue. Furthermore, this study established that the resultant effects of fatigue of the proposed isotonic protocol were reproducible over time. The protocol was performed without difficulty by all volunteers and took less than 10 minutes to perform, suggesting that it might be feasible for clinical practice. This protocol could be used to induce

  17. Deterministic secure communication protocol without using entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

  18. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  19. A Lightweight Continuous Authentication Protocol for the Internet of Things

    Science.gov (United States)

    Chuang, Yo-Hsuan; Yang, Cheng-Ying; Tang, Ssu-Wei

    2018-01-01

    Modern societies are moving toward an information-oriented environment. To gather and utilize information around people’s modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments. PMID:29621168

  20. A Lightweight Continuous Authentication Protocol for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Yo-Hsuan Chuang

    2018-04-01

    Full Text Available Modern societies are moving toward an information-oriented environment. To gather and utilize information around people’s modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs. Within this kind of Internet of Things (IoT environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.

  1. A Lightweight Continuous Authentication Protocol for the Internet of Things.

    Science.gov (United States)

    Chuang, Yo-Hsuan; Lo, Nai-Wei; Yang, Cheng-Ying; Tang, Ssu-Wei

    2018-04-05

    Modern societies are moving toward an information-oriented environment. To gather and utilize information around people's modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.

  2. Energy neutral protocol based on hierarchical routing techniques for energy harvesting wireless sensor network

    Science.gov (United States)

    Muhammad, Umar B.; Ezugwu, Absalom E.; Ofem, Paulinus O.; Rajamäki, Jyri; Aderemi, Adewumi O.

    2017-06-01

    Recently, researchers in the field of wireless sensor networks have resorted to energy harvesting techniques that allows energy to be harvested from the ambient environment to power sensor nodes. Using such Energy harvesting techniques together with proper routing protocols, an Energy Neutral state can be achieved so that sensor nodes can run perpetually. In this paper, we propose an Energy Neutral LEACH routing protocol which is an extension to the traditional LEACH protocol. The goal of the proposed protocol is to use Gateway node in each cluster so as to reduce the data transmission ranges of cluster head nodes. Simulation results show that the proposed routing protocol achieves a higher throughput and ensure the energy neutral status of the entire network.

  3. Dynamic Channel Slot Allocation Scheme and Performance Analysis of Cyclic Quorum Multichannel MAC Protocol

    Directory of Open Access Journals (Sweden)

    Xing Hu

    2017-01-01

    Full Text Available In high diversity node situation, multichannel MAC protocol can improve the frequency efficiency, owing to fewer collisions compared with single-channel MAC protocol. And the performance of cyclic quorum-based multichannel (CQM MAC protocol is outstanding. Based on cyclic quorum system and channel slot allocation, it can avoid the bottleneck that others suffered from and can be easily realized with only one transceiver. To obtain the accurate performance of CQM MAC protocol, a Markov chain model, which combines the channel-hopping strategy of CQM protocol and IEEE 802.11 distributed coordination function (DCF, is proposed. The results of numerical analysis show that the optimal performance of CQM protocol can be obtained in saturation bound situation. And then we obtain the saturation bound of CQM system by bird swarm algorithm. In addition, to improve the performance of CQM protocol in unsaturation situation, a dynamic channel slot allocation of CQM (DCQM protocol is proposed, based on wavelet neural network. Finally, the performance of CQM protocol and DCQM protocol is simulated by Qualnet platform. And the simulation results show that the analytic and simulation results match very well; the DCQM performs better in unsaturation situation.

  4. PREMEDICATION PROTOCOLS IN DENTAL PRACTICE IN ALLERGIC PATIENTS.

    OpenAIRE

    Angelina Kisselova; Adriana Krasteva; Assya Krasteva

    2011-01-01

    The problem with choosing a suitable pre-medication protocols before local anesthesia in dentistry in allergic patients is always discussed, as in the dental practice different schemes are already proven (3,5). The propose of this communication is to share the experience on those pre-medication schemes in allergic patients during and outside pollen season.

  5. Interaction protocols for cooperative merging and lane reduction scenarios

    NARCIS (Netherlands)

    Semsar-Kazerooni, E.; Ploeg, J.

    2015-01-01

    This paper presents the interaction protocols developed for execution of two common scenarios in daily traffic using cooperative automated vehicles. The first proposed scenario addresses merging of a (semi-)automated car on a highway within a platoon of (semi-)automated vehicles. The second scenario

  6. Formal Security Analysis of the MaCAN Protocol

    DEFF Research Database (Denmark)

    Bruni, Alessandro; Sojka, Michal; Nielson, Flemming

    2014-01-01

    analysis identifies two flaws in the original protocol: one creates unavailability concerns during key establishment, and the other allows re-using authenticated signals for different purposes. We propose and analyse a modification that improves its behaviour while fitting the constraints of CAN bus...

  7. Backpressure-based control protocols: design and computational aspects

    NARCIS (Netherlands)

    Miretskiy, D.I.; Scheinhardt, Willem R.W.; Mandjes, M.R.H.

    2009-01-01

    Congestion control in packet-based networks is often realized by feedback protocols. In this paper we assess their performance under a back-pressure mechanism that has been proposed and standardized for Ethernet metropolitan networks. In such a mechanism the service rate of an upstream queue is

  8. Backpressure-based control protocols: Design and computational aspects

    NARCIS (Netherlands)

    Miretskiy, D.I.; Scheinhardt, W.R.W.; Mandjes, M.R.H.

    2009-01-01

    Congestion control in packet-based networks is often realized by feedback protocols. In this paper we assess their performance under a back-pressure mechanism that has been proposed and standardized for Ethernet metropolitan networks. In such a mechanism the service rate of an upstream queue is

  9. Quantitative methods for studying design protocols

    CERN Document Server

    Kan, Jeff WT

    2017-01-01

    This book is aimed at researchers and students who would like to engage in and deepen their understanding of design cognition research. The book presents new approaches for analyzing design thinking and proposes methods of measuring design processes. These methods seek to quantify design issues and design processes that are defined based on notions from the Function-Behavior-Structure (FBS) design ontology and from linkography. A linkograph is a network of linked design moves or segments. FBS ontology concepts have been used in both design theory and design thinking research and have yielded numerous results. Linkography is one of the most influential and elegant design cognition research methods. In this book Kan and Gero provide novel and state-of-the-art methods of analyzing design protocols that offer insights into design cognition by integrating segmentation with linkography by assigning FBS-based codes to design moves or segments and treating links as FBS transformation processes. They propose and test ...

  10. Personality disorders in previously detained adolescent females: a prospective study

    NARCIS (Netherlands)

    Krabbendam, A.; Colins, O.F.; Doreleijers, T.A.H.; van der Molen, E.; Beekman, A.T.F.; Vermeiren, R.R.J.M.

    2015-01-01

    This longitudinal study investigated the predictive value of trauma and mental health problems for the development of antisocial personality disorder (ASPD) and borderline personality disorder (BPD) in previously detained women. The participants were 229 detained adolescent females who were assessed

  11. Payload specialist Reinhard Furrer show evidence of previous blood sampling

    Science.gov (United States)

    1985-01-01

    Payload specialist Reinhard Furrer shows evidence of previous blood sampling while Wubbo J. Ockels, Dutch payload specialist (only partially visible), extends his right arm after a sample has been taken. Both men show bruises on their arms.

  12. Choice of contraception after previous operative delivery at a family ...

    African Journals Online (AJOL)

    Choice of contraception after previous operative delivery at a family planning clinic in Northern Nigeria. Amina Mohammed‑Durosinlorun, Joel Adze, Stephen Bature, Caleb Mohammed, Matthew Taingson, Amina Abubakar, Austin Ojabo, Lydia Airede ...

  13. Previous utilization of service does not improve timely booking in ...

    African Journals Online (AJOL)

    Previous utilization of service does not improve timely booking in antenatal care: Cross sectional study ... Journal Home > Vol 24, No 3 (2010) > ... Results: Past experience on antenatal care service utilization did not come out as a predictor for ...

  14. A previous hamstring injury affects kicking mechanics in soccer players.

    Science.gov (United States)

    Navandar, Archit; Veiga, Santiago; Torres, Gonzalo; Chorro, David; Navarro, Enrique

    2018-01-10

    Although the kicking skill is influenced by limb dominance and sex, how a previous hamstring injury affects kicking has not been studied in detail. Thus, the objective of this study was to evaluate the effect of sex and limb dominance on kicking in limbs with and without a previous hamstring injury. 45 professional players (males: n=19, previously injured players=4, age=21.16 ± 2.00 years; females: n=19, previously injured players=10, age=22.15 ± 4.50 years) performed 5 kicks each with their preferred and non-preferred limb at a target 7m away, which were recorded with a three-dimensional motion capture system. Kinematic and kinetic variables were extracted for the backswing, leg cocking, leg acceleration and follow through phases. A shorter backswing (20.20 ± 3.49% vs 25.64 ± 4.57%), and differences in knee flexion angle (58 ± 10o vs 72 ± 14o) and hip flexion velocity (8 ± 0rad/s vs 10 ± 2rad/s) were observed in previously injured, non-preferred limb kicks for females. A lower peak hip linear velocity (3.50 ± 0.84m/s vs 4.10 ± 0.45m/s) was observed in previously injured, preferred limb kicks of females. These differences occurred in the backswing and leg-cocking phases where the hamstring muscles were the most active. A variation in the functioning of the hamstring muscles and that of the gluteus maximus and iliopsoas in the case of a previous injury could account for the differences observed in the kicking pattern. Therefore, the effects of a previous hamstring injury must be considered while designing rehabilitation programs to re-educate kicking movement.

  15. Relaying Strategies and Protocols for Efficient Wireless Networks

    KAUST Repository

    Zafar, Ammar

    2014-10-01

    Next generation wireless networks are expected to provide high data rate and satisfy the Quality-of-Service (QoS) constraints of the users. A significant component of achieving these goals is to increase the effi ciency of wireless networks by either optimizing current architectures or exploring new technologies which achieve that. The latter includes revisiting technologies which were previously proposed, but due to a multitude of reasons were ignored at that time. One such technology is relaying which was initially proposed in the latter half of the 1960s and then was revived in the early 2000s. In this dissertation, we study relaying in conjunction with resource allocation to increase the effi ciency of wireless networks. In this regard, we differentiate between conventional relaying and relaying with buffers. Conventional relaying is traditional relaying where the relay forwards the signal it received immediately. On the other hand, in relaying with buffers or buffer-aided relaying as it is called, the relay can store received data in its buffer and forward it later on. This gives the benefit of taking advantage of good channel conditions as the relay can only transmit when the channel conditions are good. The dissertation starts with conventional relaying and considers the problem of minimizing the total consumed power while maintaining system QoS. After upper bounding the system performance, more practical algorithms which require reduced feedback overhead are explored. Buffer-aided relaying is then considered and the joint user-and-hop scheduler is introduced which exploits multi-user diversity (MUD) and 5 multi-hop diversity (MHD) gains together in dual-hop broadcast channels. Next joint user-and-hop scheduling is extended to the shared relay channel where two source-destination pairs share a single relay. The benefits of buffer-aided relaying in the bidirectional relay channel utilizing network coding are then explored. Finally, a new transmission protocol

  16. Antibody engineering: methods and protocols

    National Research Council Canada - National Science Library

    Chames, Patrick

    2012-01-01

    "Antibody Engineering: Methods and Protocols, Second Edition was compiled to give complete and easy access to a variety of antibody engineering techniques, starting from the creation of antibody repertoires and efficient...

  17. Implementation of postoperative handoff protocol

    African Journals Online (AJOL)

    Background: Standardised handoff protocols have become necessary patient ... improve the perioperative handoff communications from the cardiac operating theatres to the ICU. ..... as you can imagine, there was push-back to the change.

  18. Performance Evaluation of a Cluster-Based Service Discovery Protocol for Heterogeneous Wireless Sensor Networks

    NARCIS (Netherlands)

    Marin Perianu, Raluca; Scholten, Johan; Havinga, Paul J.M.; Hartel, Pieter H.

    2006-01-01

    Abstract—This paper evaluates the performance in terms of resource consumption of a service discovery protocol proposed for heterogeneous Wireless Sensor Networks (WSNs). The protocol is based on a clustering structure, which facilitates the construction of a distributed directory. Nodes with higher

  19. An efficient multi-carrier position-based packet forwarding protocol for wireless sensor networks

    KAUST Repository

    Bader, Ahmed; Abed-Meraim, Karim; Alouini, Mohamed-Slim

    2012-01-01

    in this paper. In contrast to existing beaconless protocols, the proposed protocol is designed such that it eliminates the need for potential relays to undergo a relay selection process. Rather, any eligible relay may decide to forward the packet ahead, thus

  20. Data Exchange Protocol in Repsail

    Directory of Open Access Journals (Sweden)

    Gucma Maciej

    2017-12-01

    Full Text Available Article presents implantation and theoretical considerations of data exchange protocol developed for the RepSail project, where main objective was design and building innovative hybrid yacht. One of problems during the design process was improper functioning of data exchange protocols that were available in the commercially available devices to mention navigation purpose NMEA183 or 2000 as well as automation dedicated ones (CAN and similar. Author shows the basis of the dedicated format of exchange for in board devices.

  1. The Groningen protocol: another perspective

    OpenAIRE

    Jotkowitz, A B; Glick, S

    2006-01-01

    The Groningen protocol allows for the euthanasia of severely ill newborns with a hopeless prognosis and unbearable suffering. We understand the impetus for such a protocol but have moral and ethical concerns with it. Advocates for euthanasia in adults have relied on the concept of human autonomy, which is lacking in the case of infants. In addition, biases can potentially influence the decision making of both parents and physicians. It is also very difficult to weigh the element of quality of...

  2. Energy-Aware RFID Anti-Collision Protocol.

    Science.gov (United States)

    Arjona, Laura; Simon, Hugo Landaluce; Ruiz, Asier Perallos

    2018-06-11

    The growing interest in mobile devices is transforming wireless identification technologies. Mobile and battery-powered Radio Frequency Identification (RFID) readers, such as hand readers and smart phones, are are becoming increasingly attractive. These RFID readers require energy-efficient anti-collision protocols to minimize the tag collisions and to expand the reader's battery life. Furthermore, there is an increasing interest in RFID sensor networks with a growing number of RFID sensor tags. Thus, RFID application developers must be mindful of tag anti-collision protocols. Energy-efficient protocols involve a low reader energy consumption per tag. This work presents a thorough study of the reader energy consumption per tag and analyzes the main factor that affects this metric: the frame size update strategy. Using the conclusion of this analysis, the anti-collision protocol Energy-Aware Slotted Aloha (EASA) is presented to decrease the energy consumption per tag. The frame size update strategy of EASA is configured to minimize the energy consumption per tag. As a result, EASA presents an energy-aware frame. The performance of the proposed protocol is evaluated and compared with several state of the art Aloha-based anti-collision protocols based on the current RFID standard. Simulation results show that EASA, with an average of 15 mJ consumed per tag identified, achieves a 6% average improvement in the energy consumption per tag in relation to the strategies of the comparison.

  3. Dual watermarking scheme for secure buyer-seller watermarking protocol

    Science.gov (United States)

    Mehra, Neelesh; Shandilya, Madhu

    2012-04-01

    A buyer-seller watermarking protocol utilize watermarking along with cryptography for copyright and copy protection for the seller and meanwhile it also preserve buyers rights for privacy. It enables a seller to successfully identify a malicious seller from a pirated copy, while preventing the seller from framing an innocent buyer and provide anonymity to buyer. Up to now many buyer-seller watermarking protocols have been proposed which utilize more and more cryptographic scheme to solve many common problems such as customer's rights, unbinding problem, buyer's anonymity problem and buyer's participation in the dispute resolution. But most of them are infeasible since the buyer may not have knowledge of cryptography. Another issue is the number of steps to complete the protocols are large, a buyer needs to interact with different parties many times in these protocols, which is very inconvenient for buyer. To overcome these drawbacks, in this paper we proposed dual watermarking scheme in encrypted domain. Since neither of watermark has been generated by buyer so a general layman buyer can use the protocol.

  4. Study on Cloud Security Based on Trust Spanning Tree Protocol

    Science.gov (United States)

    Lai, Yingxu; Liu, Zenghui; Pan, Qiuyue; Liu, Jing

    2015-09-01

    Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.

  5. Secondary recurrent miscarriage is associated with previous male birth.

    LENUS (Irish Health Repository)

    Ooi, Poh Veh

    2012-01-31

    Secondary recurrent miscarriage (RM) is defined as three or more consecutive pregnancy losses after delivery of a viable infant. Previous reports suggest that a firstborn male child is associated with less favourable subsequent reproductive potential, possibly due to maternal immunisation against male-specific minor histocompatibility antigens. In a retrospective cohort study of 85 cases of secondary RM we aimed to determine if secondary RM was associated with (i) gender of previous child, maternal age, or duration of miscarriage history, and (ii) increased risk of pregnancy complications. Fifty-three women (62.0%; 53\\/85) gave birth to a male child prior to RM compared to 32 (38.0%; 32\\/85) who gave birth to a female child (p=0.002). The majority (91.7%; 78\\/85) had uncomplicated, term deliveries and normal birth weight neonates, with one quarter of the women previously delivered by Caesarean section. All had routine RM investigations and 19.0% (16\\/85) had an abnormal result. Fifty-seven women conceived again and 33.3% (19\\/57) miscarried, but there was no significant difference in failure rates between those with a previous male or female child (13\\/32 vs. 6\\/25, p=0.2). When patients with abnormal results were excluded, or when women with only one previous child were considered, there was still no difference in these rates. A previous male birth may be associated with an increased risk of secondary RM but numbers preclude concluding whether this increases recurrence risk. The suggested association with previous male birth provides a basis for further investigations at a molecular level.

  6. Secondary recurrent miscarriage is associated with previous male birth.

    LENUS (Irish Health Repository)

    Ooi, Poh Veh

    2011-01-01

    Secondary recurrent miscarriage (RM) is defined as three or more consecutive pregnancy losses after delivery of a viable infant. Previous reports suggest that a firstborn male child is associated with less favourable subsequent reproductive potential, possibly due to maternal immunisation against male-specific minor histocompatibility antigens. In a retrospective cohort study of 85 cases of secondary RM we aimed to determine if secondary RM was associated with (i) gender of previous child, maternal age, or duration of miscarriage history, and (ii) increased risk of pregnancy complications. Fifty-three women (62.0%; 53\\/85) gave birth to a male child prior to RM compared to 32 (38.0%; 32\\/85) who gave birth to a female child (p=0.002). The majority (91.7%; 78\\/85) had uncomplicated, term deliveries and normal birth weight neonates, with one quarter of the women previously delivered by Caesarean section. All had routine RM investigations and 19.0% (16\\/85) had an abnormal result. Fifty-seven women conceived again and 33.3% (19\\/57) miscarried, but there was no significant difference in failure rates between those with a previous male or female child (13\\/32 vs. 6\\/25, p=0.2). When patients with abnormal results were excluded, or when women with only one previous child were considered, there was still no difference in these rates. A previous male birth may be associated with an increased risk of secondary RM but numbers preclude concluding whether this increases recurrence risk. The suggested association with previous male birth provides a basis for further investigations at a molecular level.

  7. Effectiveness of sound therapy in patients with tinnitus resistant to previous treatments: importance of adjustments

    Directory of Open Access Journals (Sweden)

    Flavia Alencar de Barros Suzuki

    Full Text Available ABSTRACT INTRODUCTION: The difficulty in choosing the appropriate therapy for chronic tinnitus relates to the variable impact on the quality of life of affected patients and, thus, requires individualization of treatment. OBJECTIVE: To evaluate the effectiveness of using sound generators with individual adjustments to relieve tinnitus in patients unresponsive to previous treatments. METHODS: A prospective study of 10 patients with chronic tinnitus who were unresponsive to previous drug treatments, five males and five females, with ages ranging from 41 to 78 years. Bilateral sound generators (Reach 62 or Mind 9 models were used daily for at least 6 h during 18 months. The patients were evaluated at the beginning, after 1 month and at each 3 months until 18 months through acuphenometry, minimum masking level, the Tinnitus Handicap Inventory, visual analog scale, and the Hospital Anxiety and Depression Scale. The sound generators were adjusted at each visit. RESULTS: There was a reduction of Tinnitus Handicap Inventory in nine patients using a protocol with a customized approach, independent of psychoacoustic characteristics of tinnitus. The best response to treatment occurred in those with whistle-type tinnitus. A correlation among the adjustments and tinnitus loudness and minimum masking level was found. Only one patient, who had indication of depression by Hospital Anxiety and Depression Scale, did not respond to sound therapy. CONCLUSION: There was improvement in quality of life (Tinnitus Handicap Inventory, with good response to sound therapy using customized settings in patients who did not respond to previous treatments for tinnitus.

  8. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis.

    Science.gov (United States)

    Alanazi, Adwan; Elleithy, Khaled

    2015-09-02

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol.

  9. Erlotinib-induced rash spares previously irradiated skin

    International Nuclear Information System (INIS)

    Lips, Irene M.; Vonk, Ernest J.A.; Koster, Mariska E.Y.; Houwing, Ronald H.

    2011-01-01

    Erlotinib is an epidermal growth factor receptor inhibitor prescribed to patients with locally advanced or metastasized non-small cell lung carcinoma after failure of at least one earlier chemotherapy treatment. Approximately 75% of the patients treated with erlotinib develop acneiform skin rashes. A patient treated with erlotinib 3 months after finishing concomitant treatment with chemotherapy and radiotherapy for non-small cell lung cancer is presented. Unexpectedly, the part of the skin that had been included in his previously radiotherapy field was completely spared from the erlotinib-induced acneiform skin rash. The exact mechanism of erlotinib-induced rash sparing in previously irradiated skin is unclear. The underlying mechanism of this phenomenon needs to be explored further, because the number of patients being treated with a combination of both therapeutic modalities is increasing. The therapeutic effect of erlotinib in the area of the previously irradiated lesion should be assessed. (orig.)

  10. Reasoning with Previous Decisions: Beyond the Doctrine of Precedent

    DEFF Research Database (Denmark)

    Komárek, Jan

    2013-01-01

    in different jurisdictions use previous judicial decisions in their argument, we need to move beyond the concept of precedent to a wider notion, which would embrace practices and theories in legal systems outside the Common law tradition. This article presents the concept of ‘reasoning with previous decisions...... law method’, but they are no less rational and intellectually sophisticated. The reason for the rather conceited attitude of some comparatists is in the dominance of the common law paradigm of precedent and the accompanying ‘case law method’. If we want to understand how courts and lawyers......’ as such an alternative and develops its basic models. The article first points out several shortcomings inherent in limiting the inquiry into reasoning with previous decisions by the common law paradigm (1). On the basis of numerous examples provided in section (1), I will present two basic models of reasoning...

  11. [Prevalence of previously diagnosed diabetes mellitus in Mexico.

    Science.gov (United States)

    Rojas-Martínez, Rosalba; Basto-Abreu, Ana; Aguilar-Salinas, Carlos A; Zárate-Rojas, Emiliano; Villalpando, Salvador; Barrientos-Gutiérrez, Tonatiuh

    2018-01-01

    To compare the prevalence of previously diagnosed diabetes in 2016 with previous national surveys and to describe treatment and its complications. Mexico's national surveys Ensa 2000, Ensanut 2006, 2012 and 2016 were used. For 2016, logistic regression models and measures of central tendency and dispersion were obtained. The prevalence of previously diagnosed diabetes in 2016 was 9.4%. The increase of 2.2% relative to 2012 was not significant and only observed in patients older than 60 years. While preventive measures have increased, the access to medical treatment and lifestyle has not changed. The treatment has been modified, with an increase in insulin and decrease in hypoglycaemic agents. Population aging, lack of screening actions and the increase in diabetes complications will lead to an increase on the burden of disease. Policy measures targeting primary and secondary prevention of diabetes are crucial.

  12. Monoclonal antibodies technology. Protocols

    International Nuclear Information System (INIS)

    Acevado Castro, B.E.

    1997-01-01

    Full text: Immunization. The first step in preparing useful monoclonal antibodies (MAbs) is to immunize an animal (Balb/c for example) with an appropriate antigen. Methods (only for soluble antigen): Solubilize selected antigen in Phosphate buffer solution (PBS) at pH 7.2-7.4, ideally at a final concentration per animal between 10 to 50 μg/ml. It is recommended that the antigen under consideration be incorporated into the emulsion adjuvants in 1:1 volumetric relation. We commonly use Frend's adjuvant (FA) to prepared immunized solution. The first immunization should be prepared with complete FA, and the another could be prepared with incomplete FA. It is recommended to inject mice with 0.2 ml intraperitoneal (ip) or subcutaneous (sc). Our experience suggests the sc route is the preferred route. A minimum protocol for immunizing mice to generate cells for preparing hybridomas is s follows: immunize sc on day 0, boost sc on day 21, take a trial bleeding on day 26; if antibody titters are satisfactory, boost ip on day 35 with antigen only, and remove the spleen to obtain cells for fusion on day 38. Fusion protocol. The myeloma cell line we are using is X63 Ag8.653. At the moment of fusion myeloma cells need a good viability (at least a 95%). 1. Remove the spleen cells from immunized mice using sterile conditions. An immune spleen should yield between 7 a 10x10 7 nucleated cells. 2. Place the spleen in 20 ml of serum-free RPMI 1640 in a Petri dish. Using a needle and syringe, inject the spleen with medium to distend and disrupt the spleen stroma and free the nucleated cells. 3. Flush the cell suspension with a Pasteur pipet to disperse clumps of cells. 4. Centrifuge the spleen cell suspension at 250g for 10 min. Resuspend the pellet in serum-free RPMI 1640. Determine cell concentration using Neuhabuer chamber. 5. Mix the myeloma cells and spleen cells in a conical 50-ml tube in serum-free RPMI 1640, 1 x10 7 spleen cells to 1x10 6 myeloma cells (ratio 10:1). Centrifuge

  13. International Veterinary Epilepsy Task Force consensus proposal

    DEFF Research Database (Denmark)

    Bhatti, Sofie F M; De Risio, Luisa; Muñana, Karen

    2015-01-01

    with the initial drug is unsatisfactory, and 4) when treatment changes should be considered. In this consensus proposal, an overview is given on the aim of AED treatment, when to start long-term treatment in canine epilepsy and which veterinary AEDs are currently in use for dogs. The consensus proposal for drug...... treatment protocols, 1) is based on current published evidence-based literature, 2) considers the current legal framework of the cascade regulation for the prescription of veterinary drugs in Europe, and 3) reflects the authors' experience. With this paper it is aimed to provide a consensus...

  14. Shared access protocol (SAP) in femtocell channel resources for cellular coverage enhancement

    KAUST Repository

    Magableh, Amer M.; Radaydeh, Redha Mahmoud Mesleh; Alouini, Mohamed-Slim

    2012-01-01

    protocol (SAP), that enables the unlicensed macro-cell user equipments (MC-UE) to communicate with partially closed access femtocell base stations and hence, improves and enhances the overall system performance in closed environments. For the proposed

  15. Provable Fair Document Exchange Protocol with Transaction Privacy for E-Commerce

    Directory of Open Access Journals (Sweden)

    Ren-Junn Hwang

    2015-04-01

    Full Text Available Transaction privacy has attracted a lot of attention in the e-commerce. This study proposes an efficient and provable fair document exchange protocol with transaction privacy. Using the proposed protocol, any untrusted parties can fairly exchange documents without the assistance of online, trusted third parties. Moreover, a notary only notarizes each document once. The authorized document owner can exchange a notarized document with different parties repeatedly without disclosing the origin of the document or the identities of transaction participants. Security and performance analyses indicate that the proposed protocol not only provides strong fairness, non-repudiation of origin, non-repudiation of receipt, and message confidentiality, but also enhances forward secrecy, transaction privacy, and authorized exchange. The proposed protocol is more efficient than other works.

  16. A new architecture and MAC protocol for fully flexible hybrid WDM/TDM PON

    NARCIS (Netherlands)

    Das, G.; Lannoo, B.; Jung, H.D.; Koonen, A.M.J.; Colle, D.; Pickavet, M.; Demeester, P.

    2009-01-01

    In this paper we propose a novel architecture and MAC protocol for a scalable, cost effective WDM / TDM PON providing fully flexible dynamic bandwidth allocation for upstream and downstream data transmission.

  17. Efficient one-out-of-two quantum oblivious transfer based on four-coherent-state postselection protocol

    International Nuclear Information System (INIS)

    Chen, I-C; Hwang Tzonelih; Li C-M

    2008-01-01

    On the basis of the modified four-coherent-state post-selection quantum key distribution protocol (Namiki and Hirano 2006 Preprint quant-ph/0608144v1), two 1-out-of-2 quantum oblivious transfer (QOT 2 1 ) protocols are proposed. The first proposed protocol (called the receiver-based QOT 2 1 protocol) requires the coherent states to be prepared by the receiver, whereas the second protocol (called the sender-based QOT 2 1 protocol) allows the coherent states to be generated by the sender. The main advantages of the proposed protocols are that (i) no quantum bit commitment schemes and the assumption of quantum memory are needed; (ii) less communication cost between participants is required, i.e. the receiver-based QOT 2 1 protocol requires only one quantum communication and one classical communication and the sender-based QOT 2 1 protocol requires only one quantum communication between participants during protocol execution; and (iii) the utilization of quantum states is very efficient, wherein the receiver-based and the sender-based QOT 2 1 protocols use only two coherent pulses and one coherent pulse respectively for sending the sender's two messages

  18. Cardiovascular magnetic resonance in adults with previous cardiovascular surgery.

    Science.gov (United States)

    von Knobelsdorff-Brenkenhoff, Florian; Trauzeddel, Ralf Felix; Schulz-Menger, Jeanette

    2014-03-01

    Cardiovascular magnetic resonance (CMR) is a versatile non-invasive imaging modality that serves a broad spectrum of indications in clinical cardiology and has proven evidence. Most of the numerous applications are appropriate in patients with previous cardiovascular surgery in the same manner as in non-surgical subjects. However, some specifics have to be considered. This review article is intended to provide information about the application of CMR in adults with previous cardiovascular surgery. In particular, the two main scenarios, i.e. following coronary artery bypass surgery and following heart valve surgery, are highlighted. Furthermore, several pictorial descriptions of other potential indications for CMR after cardiovascular surgery are given.

  19. Eavesdropping on the two-way quantum communication protocols with invisible photons

    Energy Technology Data Exchange (ETDEWEB)

    Cai Qingyu [State Key Laboratory of Magnetics Resonance and Atomic and Molecular Physics, Wuhan Institution of Physics and Mathematics, Chinese Academy of Sciences, Wuhan 430071 (China)]. E-mail: qycai@wipm.ac.cn

    2006-02-20

    The crucial issue of quantum communication protocol is its security. In this Letter, we show that all the deterministic and direct two-way quantum communication protocols, sometimes called ping-pong (PP) protocols, are insecure when an eavesdropper uses the invisible photon to eavesdrop on the communication. With our invisible photon eavesdropping (IPE) scheme, the eavesdropper can obtain full information of the communication with zero risk of being detected. We show that this IPE scheme can be implemented experimentally with current technology. Finally, a possible improvement of PP communication protocols security is proposed00.

  20. Eavesdropping on the two-way quantum communication protocols with invisible photons

    International Nuclear Information System (INIS)

    Cai Qingyu

    2006-01-01

    The crucial issue of quantum communication protocol is its security. In this Letter, we show that all the deterministic and direct two-way quantum communication protocols, sometimes called ping-pong (PP) protocols, are insecure when an eavesdropper uses the invisible photon to eavesdrop on the communication. With our invisible photon eavesdropping (IPE) scheme, the eavesdropper can obtain full information of the communication with zero risk of being detected. We show that this IPE scheme can be implemented experimentally with current technology. Finally, a possible improvement of PP communication protocols security is proposed

  1. Intelligent Cooperative MAC Protocol for Balancing Energy Consumption

    Science.gov (United States)

    Wu, S.; Liu, K.; Huang, B.; Liu, F.

    To extend the lifetime of wireless sensor networks, we proposed an intelligent balanced energy consumption cooperative MAC protocol (IBEC-CMAC) based on the multi-node cooperative transmission model. The protocol has priority to access high-quality channels for reducing energy consumption of each transmission. It can also balance the energy consumption among cooperative nodes by using high residual energy nodes instead of excessively consuming some node's energy. Simulation results show that IBEC-CMAC can obtain longer network lifetime and higher energy utilization than direct transmission.

  2. Efficient medium access control protocol for geostationary satellite systems

    Institute of Scientific and Technical Information of China (English)

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  3. GossipKit: A Framework of Gossip Protocol Family

    OpenAIRE

    Lin, Shen; Taiani, Francois; Blair, Gordon S.

    2007-01-01

    A large number of gossip protocols have been developed in the last few years to address a wide range of functionalities. So far, however, very few software frameworks have been proposed to ease the development and deployment of these gossip protocols. To address this issue, this paper presents GossipKit, an event-driven framework that provides a generic and extensible architecture for the development of (re)configurable gossip-oriented middleware. GossipKit is based on a generic interaction m...

  4. Medical guidelines for the patient: introducing the life assistance protocols.

    Science.gov (United States)

    Domínguez, David; Fernández, Carlos; Meneu, Teresa; Mocholí, Juan Bautista; Serafin, Riccardo

    2008-01-01

    This paper introduces our preliminary results in the modeling of Life Assistance Protocols, a new vision of medical guidelines and protocols through the lenses of p-Health. In this context the patient's role in the process is emphasized, the actions to be performed less defined and not only clinical situations considered, but also healthier lifestyle promotion processes accounted for, where the person's preferences and motivations play a key role. We propose a complete framework, balancing on classical clinical guideline models and covering both the theoretical and the practical aspects of the problem, describing it from conceptualization to the execution environment.

  5. Improving Wojcik's eavesdropping attack on the ping-pong protocol

    International Nuclear Information System (INIS)

    Zhang Zhanjun; Man Zhongxiao; Li Yong

    2004-01-01

    The eavesdropping scheme proposed by Wojcik [Phys. Rev. Lett. 90 (2003) 157901] on the ping-pong protocol [Phys. Rev. Lett. 89 (2002) 187902] is improved by constituting a new set of attack operations. The improved scheme only induces half of the eavesdropping-induced channel loss in Wojcik's scheme, therefore, in a larger domain of the quantum channel transmission efficiency η, i.e., [0,75%], the eavesdropper Eve can attack all the transmitted bits. The improvement of the ping-pong protocol security produced by Wojcik's is also suitable for our eavesdropping attack

  6. A Mac Protocol Implementation for Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Jamila Bhar

    2015-01-01

    Full Text Available IEEE 802.15.4 is an important standard for Low Rate Wireless Personal Area Network (LRWPAN. The IEEE 802.15.4 presents a flexible MAC protocol that provides good efficiency for data transmission by adapting its parameters according to characteristics of different applications. In this research work, some restrictions of this standard are explained and an improvement of traffic efficiency by optimizing MAC layer is proposed. Implementation details for several blocks of communication system are carefully modeled. The protocol implementation is done using VHDL language. The analysis gives a full understanding of the behavior of the MAC protocol with regard to backoff delay, data loss probability, congestion probability, slot effectiveness, and traffic distribution for terminals. Two ideas are proposed and tested to improve efficiency of CSMA/CA mechanism for IEEE 802.15.4 MAC Layer. Primarily, we dynamically adjust the backoff exponent (BE according to queue level of each node. Secondly, we vary the number of consecutive clear channel assessment (CCA for packet transmission. We demonstrate also that slot compensation provided by the enhanced MAC protocol can greatly avoid unused slots. The results show the significant improvements expected by our approach among the IEEE 802.15.4 MAC standards. Synthesis results show also hardware performances of our proposed architecture.

  7. [Effect of a multidisciplinar protocol on the clinical results obtained after bariatric surgery].

    Science.gov (United States)

    Cánovas Gaillemin, B; Sastre Martos, J; Moreno Segura, G; Llamazares Iglesias, O; Familiar Casado, C; Abad de Castro, S; López Pardo, R; Sánchez-Cabezudo Muñoz, M A

    2011-01-01

    Bariatric surgery has been shown to be an effective therapy for weight loss in patients with severe obesity, and the implementation of a multidisciplinar management protocol is recommended. To assess the usefulness of the implementation of a management protocol in obesity surgery based on the Spanish Consensus Document of the SEEDO. Retrospective comparative study of the outcomes in patients previously operated (51 patients) and after the implementation of the protocol (66 patients). The following data were gathered: anthropometry, pre-and post-surgery comorbidities, post-surgical nutritional and surgical complications, validated Quality of Life questionnaire, and dietary habits. Withdrawals (l7.6%) and alcoholism (5.8%) were higher in patients pre- versus post-implementation of the protocol (4.5% vs. 3%, respectively), the differences being statistically significant. The mortality rate was 2% in the pre-protocol group and 0% in the postprotocol group. The dietary habits were better in the post-protocol group, the pre-protocol group presenting a higher percentage of feeding-behavior disorders (5.1%) although not reaching a statistical significance. The improvement in quality of life was higher in the post-protocol group for all items, but only reaching statistical significance in sexual activity (p = 0.004). In the pre-protocol group, 70.5% of the patients had more than one nutritional complication vs. 32.8% in the post-protocol group (p 50% in 81.3% in the pre-protocol group vs. 74.8% in the pos-protocol group) or the comorbidities. Bariatric surgery achieves excellent outcomes in weight loss, comorbidities, and quality of life, but presents nutritional, surgical, and psychiatric complications that require a protocol-based and multidisciplinary approach. Our protocol improves the outcomes regarding the withdrawal rates, feeding-behavior disorders, dietary habits, nutritional complications, and quality of life.

  8. Squamous cell carcinoma arising in previously burned or irradiated skin

    International Nuclear Information System (INIS)

    Edwards, M.J.; Hirsch, R.M.; Broadwater, J.R.; Netscher, D.T.; Ames, F.C.

    1989-01-01

    Squamous cell carcinoma (SCC) arising in previously burned or irradiated skin was reviewed in 66 patients treated between 1944 and 1986. Healing of the initial injury was complicated in 70% of patients. Mean interval from initial injury to diagnosis of SCC was 37 years. The overwhelming majority of patients presented with a chronic intractable ulcer in previously injured skin. The regional relapse rate after surgical excision was very high, 58% of all patients. Predominant patterns of recurrence were in local skin and regional lymph nodes (93% of recurrences). Survival rates at 5, 10, and 20 years were 52%, 34%, and 23%, respectively. Five-year survival rates in previously burned and irradiated patients were not significantly different (53% and 50%, respectively). This review, one of the largest reported series, better defines SCC arising in previously burned or irradiated skin as a locally aggressive disease that is distinct from SCC arising in sunlight-damaged skin. An increased awareness of the significance of chronic ulceration in scar tissue may allow earlier diagnosis. Regional disease control and survival depend on surgical resection of all known disease and may require radical lymph node dissection or amputation

  9. Outcome Of Pregnancy Following A Previous Lower Segment ...

    African Journals Online (AJOL)

    Background: A previous ceasarean section is an important variable that influences patient management in subsequent pregnancies. A trial of vaginal delivery in such patients is a feasible alternative to a secondary section, thus aiding to reduce the ceasarean section rate and its associated co-morbidities. Objective: To ...

  10. 24 CFR 1710.552 - Previously accepted state filings.

    Science.gov (United States)

    2010-04-01

    ... of Substantially Equivalent State Law § 1710.552 Previously accepted state filings. (a) Materials... and contracts or agreements contain notice of purchaser's revocation rights. In addition see § 1715.15..., unless the developer is obligated to do so in the contract. (b) If any such filing becomes inactive or...

  11. The job satisfaction of principals of previously disadvantaged schools

    African Journals Online (AJOL)

    The aim of this study was to identify influences on the job satisfaction of previously disadvantaged ..... I am still riding the cloud … I hope it lasts. .... as a way of creating a climate and culture in schools where individuals are willing to explore.

  12. Haemophilus influenzae type f meningitis in a previously healthy boy

    DEFF Research Database (Denmark)

    Ronit, Andreas; Berg, Ronan M G; Bruunsgaard, Helle

    2013-01-01

    Non-serotype b strains of Haemophilus influenzae are extremely rare causes of acute bacterial meningitis in immunocompetent individuals. We report a case of acute bacterial meningitis in a 14-year-old boy, who was previously healthy and had been immunised against H influenzae serotype b (Hib...

  13. Research Note Effects of previous cultivation on regeneration of ...

    African Journals Online (AJOL)

    We investigated the effects of previous cultivation on regeneration potential under miombo woodlands in a resettlement area, a spatial product of Zimbabwe's land reforms. We predicted that cultivation would affect population structure, regeneration, recruitment and potential grazing capacity of rangelands. Plant attributes ...

  14. Cryptococcal meningitis in a previously healthy child | Chimowa ...

    African Journals Online (AJOL)

    An 8-year-old previously healthy female presented with a 3 weeks history of headache, neck stiffness, deafness, fever and vomiting and was diagnosed with cryptococcal meningitis. She had documented hearing loss and was referred to tertiary-level care after treatment with fluconazole did not improve her neurological ...

  15. Investigation of previously derived Hyades, Coma, and M67 reddenings

    International Nuclear Information System (INIS)

    Taylor, B.J.

    1980-01-01

    New Hyades polarimetry and field star photometry have been obtained to check the Hyades reddening, which was found to be nonzero in a previous paper. The new Hyades polarimetry implies essentially zero reddening; this is also true of polarimetry published by Behr (which was incorrectly interpreted in the previous paper). Four photometric techniques which are presumed to be insensitive to blanketing are used to compare the Hyades to nearby field stars; these four techniques also yield essentially zero reddening. When all of these results are combined with others which the author has previously published and a simultaneous solution for the Hyades, Coma, and M67 reddenings is made, the results are E (B-V) =3 +- 2 (sigma) mmag, -1 +- 3 (sigma) mmag, and 46 +- 6 (sigma) mmag, respectively. No support for a nonzero Hyades reddening is offered by the new results. When the newly obtained reddenings for the Hyades, Coma, and M67 are compared with results from techniques given by Crawford and by users of the David Dunlap Observatory photometric system, no differences between the new and other reddenings are found which are larger than about 2 sigma. The author had previously found that the M67 main-sequence stars have about the same blanketing as that of Coma and less blanketing than the Hyades; this conclusion is essentially unchanged by the revised reddenings

  16. Rapid fish stock depletion in previously unexploited seamounts: the ...

    African Journals Online (AJOL)

    Rapid fish stock depletion in previously unexploited seamounts: the case of Beryx splendens from the Sierra Leone Rise (Gulf of Guinea) ... A spectral analysis and red-noise spectra procedure (REDFIT) algorithm was used to identify the red-noise spectrum from the gaps in the observed time-series of catch per unit effort by ...

  17. 18 CFR 154.302 - Previously submitted material.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Previously submitted material. 154.302 Section 154.302 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY... concurrently with the rate change filing. There must be furnished to the Director, Office of Energy Market...

  18. Process cells dismantling of EUREX pant: previous activities

    International Nuclear Information System (INIS)

    Gili, M.

    1998-01-01

    In the '98-'99 period some process cells of the EUREX pant will be dismantled, in order to place there the liquid wastes conditioning plant 'CORA'. This report resumes the previous activities (plant rinsing campaigns and inactive Cell 014 dismantling), run in the past three years and the drawn experience [it

  19. The job satisfaction of principals of previously disadvantaged schools

    African Journals Online (AJOL)

    The aim of this study was to identify influences on the job satisfaction of previously disadvantaged school principals in North-West Province. Evans's theory of job satisfaction, morale and motivation was useful as a conceptual framework. A mixedmethods explanatory research design was important in discovering issues with ...

  20. Obstructive pulmonary disease in patients with previous tuberculosis ...

    African Journals Online (AJOL)

    Obstructive pulmonary disease in patients with previous tuberculosis: Pathophysiology of a community-based cohort. B.W. Allwood, R Gillespie, M Galperin-Aizenberg, M Bateman, H Olckers, L Taborda-Barata, G.L. Calligaro, Q Said-Hartley, R van Zyl-Smit, C.B. Cooper, E van Rikxoort, J Goldin, N Beyers, E.D. Bateman ...

  1. Abiraterone in metastatic prostate cancer without previous chemotherapy

    NARCIS (Netherlands)

    Ryan, Charles J.; Smith, Matthew R.; de Bono, Johann S.; Molina, Arturo; Logothetis, Christopher J.; de Souza, Paul; Fizazi, Karim; Mainwaring, Paul; Piulats, Josep M.; Ng, Siobhan; Carles, Joan; Mulders, Peter F. A.; Basch, Ethan; Small, Eric J.; Saad, Fred; Schrijvers, Dirk; van Poppel, Hendrik; Mukherjee, Som D.; Suttmann, Henrik; Gerritsen, Winald R.; Flaig, Thomas W.; George, Daniel J.; Yu, Evan Y.; Efstathiou, Eleni; Pantuck, Allan; Winquist, Eric; Higano, Celestia S.; Taplin, Mary-Ellen; Park, Youn; Kheoh, Thian; Griffin, Thomas; Scher, Howard I.; Rathkopf, Dana E.; Boyce, A.; Costello, A.; Davis, I.; Ganju, V.; Horvath, L.; Lynch, R.; Marx, G.; Parnis, F.; Shapiro, J.; Singhal, N.; Slancar, M.; van Hazel, G.; Wong, S.; Yip, D.; Carpentier, P.; Luyten, D.; de Reijke, T.

    2013-01-01

    Abiraterone acetate, an androgen biosynthesis inhibitor, improves overall survival in patients with metastatic castration-resistant prostate cancer after chemotherapy. We evaluated this agent in patients who had not received previous chemotherapy. In this double-blind study, we randomly assigned

  2. Response to health insurance by previously uninsured rural children.

    Science.gov (United States)

    Tilford, J M; Robbins, J M; Shema, S J; Farmer, F L

    1999-08-01

    To examine the healthcare utilization and costs of previously uninsured rural children. Four years of claims data from a school-based health insurance program located in the Mississippi Delta. All children who were not Medicaid-eligible or were uninsured, were eligible for limited benefits under the program. The 1987 National Medical Expenditure Survey (NMES) was used to compare utilization of services. The study represents a natural experiment in the provision of insurance benefits to a previously uninsured population. Premiums for the claims cost were set with little or no information on expected use of services. Claims from the insurer were used to form a panel data set. Mixed model logistic and linear regressions were estimated to determine the response to insurance for several categories of health services. The use of services increased over time and approached the level of utilization in the NMES. Conditional medical expenditures also increased over time. Actuarial estimates of claims cost greatly exceeded actual claims cost. The provision of a limited medical, dental, and optical benefit package cost approximately $20-$24 per member per month in claims paid. An important uncertainty in providing health insurance to previously uninsured populations is whether a pent-up demand exists for health services. Evidence of a pent-up demand for medical services was not supported in this study of rural school-age children. States considering partnerships with private insurers to implement the State Children's Health Insurance Program could lower premium costs by assembling basic data on previously uninsured children.

  3. Provable Fair Document Exchange Protocol with Transaction Privacy for E-Commerce

    OpenAIRE

    Ren-Junn Hwang; Chih-Hua Lai

    2015-01-01

    Transaction privacy has attracted a lot of attention in the e-commerce. This study proposes an efficient and provable fair document exchange protocol with transaction privacy. Using the proposed protocol, any untrusted parties can fairly exchange documents without the assistance of online, trusted third parties. Moreover, a notary only notarizes each document once. The authorized document owner can exchange a notarized document with different parties repeatedly without disclosing the origin o...

  4. A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.

    Science.gov (United States)

    Mohit, Prerna; Amin, Ruhul; Karati, Arijit; Biswas, G P; Khan, Muhammad Khurram

    2017-04-01

    Telecare Medical Information System (TMIS) supports a standard platform to the patient for getting necessary medical treatment from the doctor(s) via Internet communication. Security protection is important for medical records (data) of the patients because of very sensitive information. Besides, patient anonymity is another most important property, which must be protected. Most recently, Chiou et al. suggested an authentication protocol for TMIS by utilizing the concept of cloud environment. They claimed that their protocol is patient anonymous and well security protected. We reviewed their protocol and found that it is completely insecure against patient anonymity. Further, the same protocol is not protected against mobile device stolen attack. In order to improve security level and complexity, we design a light weight authentication protocol for the same environment. Our security analysis ensures resilience of all possible security attacks. The performance of our protocol is relatively standard in comparison with the related previous research.

  5. The impact of the Family Communication Coordinator (FCC) Protocol on the role stress of hospital chaplains.

    Science.gov (United States)

    Dodd-McCue, Diane; Tartaglia, Alexander

    2005-01-01

    The Family Communication Coordinator (FCC) Protocol was implemented to provide early family intervention and to facilitate effective communications during potential organ donation cases. Previous studies found the Protocol associated with improved donor outcome measures and with reduced role stress for ICU nurses caring for potential donors. The present study examines the impact of the Protocol on the perceived role stress of hospital chaplains serving as FCCs. All hospital chaplains serving as FCCs at an academic teaching hospital were surveyed. Their perceptions of job dimensions, role stress, job satisfaction, and commitment were measured; interviews and secondary data supplemented the surveys. The findings demonstrate that the FCC Protocol is associated with improved role stress, specifically role ambiguity and role conflict, among hospital chaplains serving as FCCs. Additionally, the findings suggest that satisfaction with the Protocol may be associated with experience with the Protocol.

  6. Reoperative sentinel lymph node biopsy after previous mastectomy.

    Science.gov (United States)

    Karam, Amer; Stempel, Michelle; Cody, Hiram S; Port, Elisa R

    2008-10-01

    Sentinel lymph node (SLN) biopsy is the standard of care for axillary staging in breast cancer, but many clinical scenarios questioning the validity of SLN biopsy remain. Here we describe our experience with reoperative-SLN (re-SLN) biopsy after previous mastectomy. Review of the SLN database from September 1996 to December 2007 yielded 20 procedures done in the setting of previous mastectomy. SLN biopsy was performed using radioisotope with or without blue dye injection superior to the mastectomy incision, in the skin flap in all patients. In 17 of 20 patients (85%), re-SLN biopsy was performed for local or regional recurrence after mastectomy. Re-SLN biopsy was successful in 13 of 20 patients (65%) after previous mastectomy. Of the 13 patients, 2 had positive re-SLN, and completion axillary dissection was performed, with 1 having additional positive nodes. In the 11 patients with negative re-SLN, 2 patients underwent completion axillary dissection demonstrating additional negative nodes. One patient with a negative re-SLN experienced chest wall recurrence combined with axillary recurrence 11 months after re-SLN biopsy. All others remained free of local or axillary recurrence. Re-SLN biopsy was unsuccessful in 7 of 20 patients (35%). In three of seven patients, axillary dissection was performed, yielding positive nodes in two of the three. The remaining four of seven patients all had previous modified radical mastectomy, so underwent no additional axillary surgery. In this small series, re-SLN was successful after previous mastectomy, and this procedure may play some role when axillary staging is warranted after mastectomy.

  7. Compact Modbus TCP/IP protocol for data acquisition systems based on limited hardware resources

    Science.gov (United States)

    Bai, Q.; Jin, B.; Wang, D.; Wang, Y.; Liu, X.

    2018-04-01

    The Modbus TCP/IP has been a standard industry communication protocol and widely utilized for establishing sensor-cloud platforms on the Internet. However, numerous existing data acquisition systems built on traditional single-chip microcontrollers without sufficient resources cannot support it, because the complete Modbus TCP/IP protocol always works dependent on a full operating system which occupies abundant hardware resources. Hence, a compact Modbus TCP/IP protocol is proposed in this work to make it run efficiently and stably even on a resource-limited hardware platform. Firstly, the Modbus TCP/IP protocol stack is analyzed and the refined protocol suite is rebuilt by streamlining the typical TCP/IP suite. Then, specific implementation of every hierarchical layer is respectively presented in detail according to the protocol structure. Besides, the compact protocol is implemented in a traditional microprocessor to validate the feasibility of the scheme. Finally, the performance of the proposed scenario is assessed. The experimental results demonstrate that message packets match the frame format of Modbus TCP/IP protocol and the average bandwidth reaches to 1.15 Mbps. The compact protocol operates stably even based on a traditional microcontroller with only 4-kB RAM and 12-MHz system clock, and no communication congestion or frequent packet loss occurs.

  8. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    Science.gov (United States)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-03-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  9. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    Science.gov (United States)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-06-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  10. Plant DNA Detection from Grasshopper Guts: A Step-by-Step Protocol, from Tissue Preparation to Obtaining Plant DNA Sequences

    Directory of Open Access Journals (Sweden)

    Alina Avanesyan

    2014-02-01

    Full Text Available Premise of the study: A PCR-based method of identifying ingested plant DNA in gut contents of Melanoplus grasshoppers was developed. Although previous investigations have focused on a variety of insects, there are no protocols available for plant DNA detection developed for grasshoppers, agricultural pests that significantly influence plant community composition. Methods and Results: The developed protocol successfully used the noncoding region of the chloroplast trnL (UAA gene and was tested in several feeding experiments. Plant DNA was obtained at seven time points post-ingestion from whole guts and separate gut sections, and was detectable up to 12 h post-ingestion in nymphs and 22 h post-ingestion in adult grasshoppers. Conclusions: The proposed protocol is an effective, relatively quick, and low-cost method of detecting plant DNA from the grasshopper gut and its different sections. This has important applications, from exploring plant “movement” during food consumption, to detecting plant–insect interactions.

  11. Development of an acquisition protocol and a segmentation algortihm for wounds of cutaneous Leishmaniasis in digital images

    Science.gov (United States)

    Diaz, Kristians; Castañeda, Benjamín; Miranda, César; Lavarello, Roberto; Llanos, Alejandro

    2010-03-01

    We developed a protocol for the acquisition of digital images and an algorithm for a color-based automatic segmentation of cutaneous lesions of Leishmaniasis. The protocol for image acquisition provides control over the working environment to manipulate brightness, lighting and undesirable shadows on the injury using indirect lighting. Also, this protocol was used to accurately calculate the area of the lesion expressed in mm2 even in curved surfaces by combining the information from two consecutive images. Different color spaces were analyzed and compared using ROC curves in order to determine the color layer with the highest contrast between the background and the wound. The proposed algorithm is composed of three stages: (1) Location of the wound determined by threshold and mathematical morphology techniques to the H layer of the HSV color space, (2) Determination of the boundaries of the wound by analyzing the color characteristics in the YIQ space based on masks (for the wound and the background) estimated from the first stage, and (3) Refinement of the calculations obtained on the previous stages by using the discrete dynamic contours algorithm. The segmented regions obtained with the algorithm were compared with manual segmentations made by a medical specialist. Broadly speaking, our results support that color provides useful information during segmentation and measurement of wounds of cutaneous Leishmaniasis. Results from ten images showed 99% specificity, 89% sensitivity, and 98% accuracy.

  12. Efficient Cooperative Protocols for Full-Duplex Relaying over Nakagami-m Fading Channels

    KAUST Repository

    Khafagy, Mohammad Galal

    2015-02-24

    In this work, efficient protocols are studied for full-duplex relaying (FDR) with loopback interference over Nakagami-m block fading channels. Recently, a selective decodeand- forward (DF) protocol was proposed for FDR, and was shown to outperform existing protocols in terms of outage over Rayleigh-fading channels. In this work, we propose an incremental selective DF protocol that offers additional power savings, yet yields the same outage performance. We evaluate their outage performance over independent non-identically distributed Nakagami-m fading links, and study their relative performance in terms of the signal-to-noise ratio cumulative distribution function via closed-form expressions. The offered diversity gain is also derived. In addition, we study their performance relative to their half-duplex counterparts, as well as known non-selective FDR protocols. We corroborate our theoretical results with simulation, and confirm that selective cooperation protocols outperform the known non-selective protocols in terms of outage. Finally, we show that depending on the loopback interference level, the proposed protocols can outperform their half-duplex counterparts when high spectral efficiencies are targeted.

  13. Efficient Cooperative Protocols for Full-Duplex Relaying over Nakagami-m Fading Channels

    KAUST Repository

    Khafagy, Mohammad Galal; Tammam, Amr; Alouini, Mohamed-Slim; Aissa, Sonia

    2015-01-01

    In this work, efficient protocols are studied for full-duplex relaying (FDR) with loopback interference over Nakagami-m block fading channels. Recently, a selective decodeand- forward (DF) protocol was proposed for FDR, and was shown to outperform existing protocols in terms of outage over Rayleigh-fading channels. In this work, we propose an incremental selective DF protocol that offers additional power savings, yet yields the same outage performance. We evaluate their outage performance over independent non-identically distributed Nakagami-m fading links, and study their relative performance in terms of the signal-to-noise ratio cumulative distribution function via closed-form expressions. The offered diversity gain is also derived. In addition, we study their performance relative to their half-duplex counterparts, as well as known non-selective FDR protocols. We corroborate our theoretical results with simulation, and confirm that selective cooperation protocols outperform the known non-selective protocols in terms of outage. Finally, we show that depending on the loopback interference level, the proposed protocols can outperform their half-duplex counterparts when high spectral efficiencies are targeted.

  14. A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.

    Science.gov (United States)

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2015-08-01

    Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based RFID tag authentication protocol in TMIS. Their protocol uses lightweight hash operation and synchronized secret value shared between back-end server and tag, which is more secure and efficient than other related RFID authentication protocols. Unfortunately, in this paper, we demonstrate that Srivastava et al.'s tag authentication protocol has a serious security problem in that an adversary may use the stolen/lost reader to connect to the medical back-end server that store information associated with tagged objects and this privacy damage causing the adversary could reveal medical data obtained from stolen/lost readers in a malicious way. Therefore, we propose a secure and efficient RFID tag authentication protocol to overcome security flaws and improve the system efficiency. Compared with Srivastava et al.'s protocol, the proposed protocol not only inherits the advantages of Srivastava et al.'s authentication protocol for TMIS but also provides better security with high system efficiency.

  15. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.

    Science.gov (United States)

    Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen

    2011-01-01

    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.

  16. Hydrofluorocarbon (HFC) Scenarios, Climate Effects and the Montreal Protocol

    Science.gov (United States)

    Velders, G. J. M.; Fahey, D. W.; Daniel, J. S.

    2016-12-01

    The Montreal Protocol has reduced the use of ozone-depleting substances by more than 95% from its peak levels in the 1980s. As a direct result the use of hydrofluorocarbons (HFCs) as substitute compounds has increased significantly. National regulations to limit HFC use have been adopted recently in the European Union, Japan and USA, and four proposals have been submitted to amend the Montreal Protocol to substantially reduce growth in HFC use. The Parties of the Montreal Protocol have discussed these proposals during their meetings in 2016. The effects of the national regulations and Montreal Protocol amendment proposals on climate forcings and surface temperatures will be presented. Global scenarios of HFC emissions reach 4.0-5.3 GtCO2-eq yr-1 in 2050, which corresponds to a projected growth from 2015 to 2050 which is 9% to 29% of that for CO2 over the same time period. In 2050, in percent of global HFC emissions, China ( 30%), India and the rest of Asia ( 25%), Middle East and northern Africa ( 10%), and USA ( 10%) are the principal source regions; and refrigeration and stationary air conditioning are the major use sectors. Calculated baseline emissions are reduced by 90% in 2050 by implementing the North America Montreal Protocol amendment proposal. This corresponds to a reduction in surface temperature attributed to HFCs from 0.1 oC to 0.04 oC in 2050 and from 0.3-0.4 oC to 0.02 oC in 2100.

  17. 78 FR 52872 - Airworthiness Directives; 328 Support Services GmbH (Type Certificate Previously Held by AvCraft...

    Science.gov (United States)

    2013-08-27

    ... Services GmbH (Type Certificate Previously Held by AvCraft Aerospace GmbH; Fairchild Dornier GmbH; Dornier... certain 328 Support Services GmbH (Type Certificate Previously Held by AvCraft Aerospace GmbH; Fairchild... send any written relevant data, views, or arguments about this proposed AD. Send your comments to an...

  18. The Bush administration climate proposal: rhetoric and reality

    Energy Technology Data Exchange (ETDEWEB)

    Blanchard, O.

    2003-03-01

    This paper examines the Bush administration proposal and subsequent actions in terms of the United Nations Framework Convention on Climate Change (UNFCCC). It has four sections. Section one describes the main features of the Bush Administration climate proposal. Section 2 identifies the main underlying factors that shape this proposal. Section 3 rebuts the Administration critique in deciding to reject the Kyoto protocol. Section 4 explores the prospects of the US climate mitigation actions over the next few years. (A.L.B.)

  19. A two-step quantum secure direct communication protocol with hyperentanglement

    International Nuclear Information System (INIS)

    Gu Bin; Zhang Cheng-Yi; Huang Yu-Gai; Fang Xia

    2011-01-01

    We propose a two-step quantum secure direct communication (QSDC) protocol with hyperentanglement in both the spatial-mode and the polarization degrees of freedom of photon pairs which can in principle be produced with a beta barium borate crystal. The secret message can be encoded on the photon pairs with unitary operations in these two degrees of freedom independently. This QSDC protocol has a higher capacity than the original two-step QSDC protocol as each photon pair can carry 4 bits of information. Compared with the QSDC protocol based on hyperdense coding, this QSDC protocol has the immunity to Trojan horse attack strategies with the process for determining the number of the photons in each quantum signal as it is a one-way quantum communication protocol. (general)

  20. QoS-aware self-adaptation of communication protocols in a pervasive service middleware

    DEFF Research Database (Denmark)

    Zhang, Weishan; Hansen, Klaus Marius; Fernandes, João

    2010-01-01

    Pervasive computing is characterized by heterogeneous devices that usually have scarce resources requiring optimized usage. These devices may use different communication protocols which can be switched at runtime. As different communication protocols have different quality of service (Qo......S) properties, this motivates optimized self-adaption of protocols for devices, e.g., considering power consumption and other QoS requirements, e.g. round trip time (RTT) for service invocations, throughput, and reliability. In this paper, we present an extensible approach for self-adaptation of communication...... protocols for pervasive web services, where protocols are designed as reusable connectors and our middleware infrastructure can hide the complexity of using different communication protocols to upper layers. We also propose to use Genetic Algorithms (GAs) to find optimized configurations at runtime...

  1. Quantum broadcast communication and authentication protocol with a quantum one-time pad

    International Nuclear Information System (INIS)

    Chang Yan; Xu Chun-Xiang; Zhang Shi-Bin; Yan Li-Li

    2014-01-01

    A quantum broadcast communication and authentication protocol with a quantum one-time pad based on the Greenberger—Horne—Zeilinger state is proposed. A binary string is used to express the identity of the receiver, which is encoded as a single sequence of photons. The encoded photon sequence acts as a detection sequence and implements authentication. An XOR operation serves as a one-time pad and is used to ensure the security of the protocol. The binary string is reused even in a noisy channel and proves to be unconditionally secure. In contrast with the protocols proposed by Wang et al. [Chin. Phys. 16 1868 (2007)] and Yang et al. [Chin. Phys. B 19 070304 (2010)], the protocol in this study implements the identity authentication with a reusable binary string; no hash function or local unitary operation is used. The protocol in this study is also easier to implement and highly efficient without losing security. (general)

  2. A two-hop based adaptive routing protocol for real-time wireless sensor networks.

    Science.gov (United States)

    Rachamalla, Sandhya; Kancherla, Anitha Sheela

    2016-01-01

    One of the most important and challenging issues in wireless sensor networks (WSNs) is to optimally manage the limited energy of nodes without degrading the routing efficiency. In this paper, we propose an energy-efficient adaptive routing mechanism for WSNs, which saves energy of nodes by removing the much delayed packets without degrading the real-time performance of the used routing protocol. It uses the adaptive transmission power algorithm which is based on the attenuation of the wireless link to improve the energy efficiency. The proposed routing mechanism can be associated with any geographic routing protocol and its performance is evaluated by integrating with the well known two-hop based real-time routing protocol, PATH and the resulting protocol is energy-efficient adaptive routing protocol (EE-ARP). The EE-ARP performs well in terms of energy consumption, deadline miss ratio, packet drop and end-to-end delay.

  3. Energy-efficient cooperative protocols for full-duplex relay channels

    KAUST Repository

    Khafagy, Mohammad Galal

    2013-12-01

    In this work, energy-efficient cooperative protocols are studied for full-duplex relaying (FDR) with loopback interference. In these protocols, relay assistance is only sought under certain conditions on the different link outages to ensure effective cooperation. Recently, an energy-efficient selective decode-And-forward protocol was proposed for FDR, and was shown to outperform existing schemes in terms of outage. Here, we propose an incremental selective decode-And-forward protocol that offers additional power savings, while keeping the same outage performance. We compare the performance of the two protocols in terms of the end-to-end signal-to-noise ratio cumulative distribution function via closed-form expressions. Finally, we corroborate our theoretical results with simulation, and show the relative relay power savings in comparison to non-selective cooperation in which the relay cooperates regardless of channel conditions. © 2013 IEEE.

  4. Fault-Tolerant Consensus of Multi-Agent System With Distributed Adaptive Protocol.

    Science.gov (United States)

    Chen, Shun; Ho, Daniel W C; Li, Lulu; Liu, Ming

    2015-10-01

    In this paper, fault-tolerant consensus in multi-agent system using distributed adaptive protocol is investigated. Firstly, distributed adaptive online updating strategies for some parameters are proposed based on local information of the network structure. Then, under the online updating parameters, a distributed adaptive protocol is developed to compensate the fault effects and the uncertainty effects in the leaderless multi-agent system. Based on the local state information of neighboring agents, a distributed updating protocol gain is developed which leads to a fully distributed continuous adaptive fault-tolerant consensus protocol design for the leaderless multi-agent system. Furthermore, a distributed fault-tolerant leader-follower consensus protocol for multi-agent system is constructed by the proposed adaptive method. Finally, a simulation example is given to illustrate the effectiveness of the theoretical analysis.

  5. Energy-efficient cooperative protocols for full-duplex relay channels

    KAUST Repository

    Khafagy, Mohammad Galal; Ismail, Amr; Alouini, Mohamed-Slim; Aï ssa, Sonia

    2013-01-01

    In this work, energy-efficient cooperative protocols are studied for full-duplex relaying (FDR) with loopback interference. In these protocols, relay assistance is only sought under certain conditions on the different link outages to ensure effective cooperation. Recently, an energy-efficient selective decode-And-forward protocol was proposed for FDR, and was shown to outperform existing schemes in terms of outage. Here, we propose an incremental selective decode-And-forward protocol that offers additional power savings, while keeping the same outage performance. We compare the performance of the two protocols in terms of the end-to-end signal-to-noise ratio cumulative distribution function via closed-form expressions. Finally, we corroborate our theoretical results with simulation, and show the relative relay power savings in comparison to non-selective cooperation in which the relay cooperates regardless of channel conditions. © 2013 IEEE.

  6. Model-Checking Driven Design of QoS-Based Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhi Chen

    2015-01-01

    Full Text Available Accurate and reliable routing protocols with Quality of Service (QoS support determine the mission-critical application efficiency in WSNs. This paper proposes a model-checking design driven framework for designing the QoS-based routing protocols of WSNs, which involves the light-weight design process, the timed automata model, and the alternative QoS verification properties. The accurate feedback of continually model checking in the iterative design process effectively stimulates the parameter tuning of the protocols. We demonstrate the straightforward and modular characteristics of the proposed framework in designing a prototype QoS-based routing protocol. The prototype study shows that the model-checking design framework may complement other design methods and ensure the QoS implementation of the QoS-based routing protocol design for WSNs.

  7. On the need of improved Accelerated Degradation Protocols (ADPs)

    DEFF Research Database (Denmark)

    Pizzutilo, E.; Geiger, S.; Grote, J. P.

    2016-01-01

    protocol covering the whole potential range from 0.6 to 1.5 VRHE. The latter is typically not addressed in literature. This finding is explained by taking into account platinum catalyzed carbon corrosion and transient platinum dissolution. Based on the obtained results, the question is raised...... protocols that are commonly used in the fuel cell community to simulate load cycle and start-stop conditions in proton exchange membrane fuel cells (PEMFCs). In contrast to previous assumptions, claiming a separation between carbon corrosion and platinum dissolution, in both standard protocols platinum...... dissolution and carbon corrosion are present at low rates, which is also reflected by a comparably low ECSA decrease. On the other hand, a huge increase in rate of both processes is observed during transitions from low to high potential regimes experienced by a PEMFC in operation, here studied in a third...

  8. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  9. Understanding protocol performance: impact of test performance.

    Science.gov (United States)

    Turner, Robert G

    2013-01-01

    This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as

  10. Climate change scenarios and Technology Transfer Protocols

    International Nuclear Information System (INIS)

    Kypreos, Socrates; Turton, Hal

    2011-01-01

    We apply a specific version of MERGE-ETL, an integrated assessment model, to study global climate policies supported by Technology Transfer Protocols (TTPs). We model a specific formulation of such a TTP where donor countries finance via carbon tax revenues, the diffusion of carbon-free technologies in developing countries (DCs) and quantify its benefits. Industrialized countries profit from increased technology exports, global diffusion of advanced technology (leading to additional technology learning and cost reductions) and reduced climate damages through the likelihood of greater global participation in a new international agreement. DCs experience increased welfare from access to subsidized technology, and profit from the reduction of damages related to climate change and expected secondary benefits of carbon abatement (such as reduced local and regional air pollution). The analysis identifies potential candidate technologies that could be supported under a TTP, and the impact of a TTP on economic development (including the flow of transfer subsidies) and global emissions. Although a TTP may encourage additional participation, such a proposal is only likely to be successful if an increased willingness to pay to avoid climate damages is accepted, first by the present and future generations of the industrialized world and later on, when sufficient economic growth is accumulated, by today's developing countries. - Research Highlights: → Climate policy scenarios are assessed with differentiated commitments in carbon emission control supported by Technology Transfer Protocols. → Donor countries finance, via carbon-tax revenues, the exports of carbon-free technologies in developing countries helping to get a new international agreement. → Developing countries experience increased welfare from access to subsidized technology, and profit from the reduction of damages related to climate change and secondary benefits. → Under Technology Protocols alone and

  11. Proposal of interference reduction routing for ad-hoc networks

    Directory of Open Access Journals (Sweden)

    Katsuhiro Naito

    2010-10-01

    Full Text Available In this paper, we propose an interference reduction routing protocol for ad-hoc networks. The interference is one of the degradation factors in wireless communications. In the ad-hoc network, some nodes communicate simultaneously. Therefore, these communications cause interference each other, and some packets are corrupted due to interference from another node. In the proposed protocol, each node estimates required transmission power according to hello messages. Therefore, the node can transmit a data packet with minimum required transmission power. Consequently, the interference against neighbor nodes can be reduced. From simulation results, we can find that the proposed protocol can reduce the number of control messages and can improve the throughput performance.

  12. The Geneva Protocol of 1925

    International Nuclear Information System (INIS)

    Mc Elroy, R.J.

    1991-01-01

    This paper reports that when President Gerald Ford signed the instruments of ratification for the Geneva Protocol of 1925 on January 22, 1975, a tortured, half-century-long chapter in U.S. arms control policy was brought to a close. Fifty years earlier, at the Geneva Conference for the Control of the International Trade in Arms, Munitions and Implements of War, the United States had played a key role in drafting and reaching agreement on the Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases and of Bacteriological Methods of Warfare. The protocol, signed by thirty nations, including the United States, on June 17, 1925, prohibits the use in war of asphyxiating, poisonous or other gases, and of all analogous liquids, materials or devices as well as the use of bacteriological methods of warfare

  13. A Multiple-Reception Access Protocol with Interruptions with Mixed Priorities in CDMA Networks

    Institute of Scientific and Technical Information of China (English)

    Lu Xiaowen; Zhu Jinkang

    2003-01-01

    A novel access protocol called Multiple-Reception Access Protocol (MRAP) and its modification MRAP/WI are proposed. In this protocol, all colliding users with a common code can be identified by the base station due to the offset of arrival time Thus they can retransmit access requests under the base station's control. Furthermore new arrivals with higher priority level can interrupt the lower retransmission in order to reduce its access delay although it increases the lower priority's delay. Simulation results of MRAP and MRAP/WI are given in order to highlight the superior performance of the proposed approach.

  14. A DUAL RESERVATION CDMA-BASED MAC PROTOCOL WITH POWER CONTROL FOR AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Jia Min; Chen Huimin; Yuan Yuhua

    2007-01-01

    This paper proposes a new multi-channel Medium Access Control (MAC) protocol named as Dual Reservation Code Division Multiple Access (CDMA) based MAC protocol with Power Control (DRCPC). The code channel is divided into common channel, broadcast channel and several data channels. And dynamic power control mechanism is implemented to reduce near-far interference. Compared with IEEE 802.11 Distributed Coordination Function (DCF) protocol, the results show that the proposed mechanism improves the average throughput and limits the transmission delay efficiently.

  15. [Fatal amnioinfusion with previous choriocarcinoma in a parturient woman].

    Science.gov (United States)

    Hrgović, Z; Bukovic, D; Mrcela, M; Hrgović, I; Siebzehnrübl, E; Karelovic, D

    2004-04-01

    The case of 36-year-old tercipare is described who developed choriocharcinoma in a previous pregnancy. During the first term labour the patient developed cardiac arrest, so reanimation and sectio cesarea was performed. A male new-born was delivered in good condition, but even after intensive therapy and reanimation occurred death of parturient woman with picture of disseminate intravascular coagulopathia (DIK). On autopsy and on histology there was no sign of malignant disease, so it was not possible to connect previous choricarcinoma with amniotic fluid embolism. Maybe was place of choriocarcinoma "locus minoris resistentiae" which later resulted with failure in placentation what was hard to prove. On autopsy we found embolia of lung with a microthrombosis of terminal circulation with punctiformis bleeding in mucous, what stands for DIK.

  16. Challenging previous conceptions of vegetarianism and eating disorders.

    Science.gov (United States)

    Fisak, B; Peterson, R D; Tantleff-Dunn, S; Molnar, J M

    2006-12-01

    The purpose of this study was to replicate and expand upon previous research that has examined the potential association between vegetarianism and disordered eating. Limitations of previous research studies are addressed, including possible low reliability of measures of eating pathology within vegetarian samples, use of only a few dietary restraint measures, and a paucity of research examining potential differences in body image and food choice motives of vegetarians versus nonvegetarians. Two hundred and fifty-six college students completed a number of measures of eating pathology and body image, and a food choice motives questionnaire. Interestingly, no significant differences were found between vegetarians and nonvegetarians in measures of eating pathology or body image. However, significant differences in food choice motives were found. Implications for both researchers and clinicians are discussed.

  17. Previously unreported abnormalities in Wolfram Syndrome Type 2.

    Science.gov (United States)

    Akturk, Halis Kaan; Yasa, Seda

    2017-01-01

    Wolfram syndrome (WFS) is a rare autosomal recessive disease with non-autoimmune childhood onset insulin dependent diabetes and optic atrophy. WFS type 2 (WFS2) differs from WFS type 1 (WFS1) with upper intestinal ulcers, bleeding tendency and the lack ofdiabetes insipidus. Li-fespan is short due to related comorbidities. Only a few familieshave been reported with this syndrome with the CISD2 mutation. Here we report two siblings with a clinical diagnosis of WFS2, previously misdiagnosed with type 1 diabetes mellitus and diabetic retinopathy-related blindness. We report possible additional clinical and laboratory findings that have not been pre-viously reported, such as asymptomatic hypoparathyroidism, osteomalacia, growth hormone (GH) deficiency and hepatomegaly. Even though not a requirement for the diagnosis of WFS2 currently, our case series confirm hypogonadotropic hypogonadism to be also a feature of this syndrome, as reported before. © Polish Society for Pediatric Endocrinology and Diabetology.

  18. An in vivo investigative protocol for HDR prostate brachytherapy using urethral and rectal thermoluminescence dosimetry

    International Nuclear Information System (INIS)

    Toye, Warren; Das, Ram; Kron, Tomas; Franich, Rick; Johnston, Peter; Duchesne, Gillian

    2009-01-01

    Purpose: To develop an in vivo dosimetry based investigative action level relevant for a corrective protocol for HDR brachytherapy boost treatment. Methods and materials: The dose delivered to points within the urethra and rectum was measured using TLD in vivo dosimetry in 56 patients. Comparisons between the urethral and rectal measurements and TPS calculations showed differences, which are related to the relative position of the implant and TLD trains, and allowed shifts of implant position relative to the prostate to be estimated. Results and conclusions: Analysis of rectal dose measurements is consistent with implant movement, which was previously only identified with the urethral data. Shift corrected doses were compared with results from the TPS. Comparison of peak doses to the urethra and rectum has been assessed against the proposed corrective protocol to limit overdosing these critical structures. An initial investigative level of 20% difference between measured and TPS peak dose was established, which corresponds to 1/3 of patients which was practical for the caseload. These patients were assessed resulting in corrective action being applied for one patient. Multiple triggering for selective investigative action is outlined. The use of a single in vivo measurement in the first fraction optimizes patient benefit at acceptable cost.

  19. Low-dose computed tomography image restoration using previous normal-dose scan

    International Nuclear Information System (INIS)

    Ma, Jianhua; Huang, Jing; Feng, Qianjin; Zhang, Hua; Lu, Hongbing; Liang, Zhengrong; Chen, Wufan

    2011-01-01

    Purpose: In current computed tomography (CT) examinations, the associated x-ray radiation dose is of a significant concern to patients and operators. A simple and cost-effective means to perform the examinations is to lower the milliampere-seconds (mAs) or kVp parameter (or delivering less x-ray energy to the body) as low as reasonably achievable in data acquisition. However, lowering the mAs parameter will unavoidably increase data noise and the noise would propagate into the CT image if no adequate noise control is applied during image reconstruction. Since a normal-dose high diagnostic CT image scanned previously may be available in some clinical applications, such as CT perfusion imaging and CT angiography (CTA), this paper presents an innovative way to utilize the normal-dose scan as a priori information to induce signal restoration of the current low-dose CT image series. Methods: Unlike conventional local operations on neighboring image voxels, nonlocal means (NLM) algorithm utilizes the redundancy of information across the whole image. This paper adapts the NLM to utilize the redundancy of information in the previous normal-dose scan and further exploits ways to optimize the nonlocal weights for low-dose image restoration in the NLM framework. The resulting algorithm is called the previous normal-dose scan induced nonlocal means (ndiNLM). Because of the optimized nature of nonlocal weights calculation, the ndiNLM algorithm does not depend heavily on image registration between the current low-dose and the previous normal-dose CT scans. Furthermore, the smoothing parameter involved in the ndiNLM algorithm can be adaptively estimated based on the image noise relationship between the current low-dose and the previous normal-dose scanning protocols. Results: Qualitative and quantitative evaluations were carried out on a physical phantom as well as clinical abdominal and brain perfusion CT scans in terms of accuracy and resolution properties. The gain by the use

  20. Previous climatic alterations are caused by the sun

    International Nuclear Information System (INIS)

    Groenaas, Sigbjoern

    2003-01-01

    The article surveys the scientific results of previous research into the contribution of the sun to climatic alterations. The author concludes that there is evidence of eight cold periods after the last ice age and that the alterations largely were due to climate effects from the sun. However, these effects are only causing a fraction of the registered global warming. It is assumed that the human activities are contributing to the rest of the greenhouse effect

  1. Influence of previous knowledge in Torrance tests of creative thinking

    OpenAIRE

    Aranguren, María; Consejo Nacional de Investigaciones Científicas y Técnicas CONICET

    2015-01-01

    The aim of this work is to analyze the influence of study field, expertise and recreational activities participation in Torrance Tests of Creative Thinking (TTCT, 1974) performance. Several hypotheses were postulated to explore the possible effects of previous knowledge in TTCT verbal and TTCT figural university students’ outcomes. Participants in this study included 418 students from five study fields: Psychology;Philosophy and Literature, Music; Engineering; and Journalism and Advertisin...

  2. A quantum secret-sharing protocol with fairness

    International Nuclear Information System (INIS)

    Liu, Feng; Qin, Su-Juan; Wen, Qiao-Yan

    2014-01-01

    A quantum secret-sharing (QSS) protocol consists of two main phases, called sharing and reconstruction. In the first phase, the dealer selects a secret, divides it into several shares, and sends each participant its share securely with a quantum channel. In the second phase, the participants run an interactive protocol in order to reconstruct the secret. If the participants can communicate via a broadcast channel, they can show their shares and learn the secrets simultaneously. So what happens if the channel is not simultaneous? In this paper, we propose a QSS protocol with cheaters by using partially and maximally entangled states. A secure and fair reconstruction mechanism is designed, in a way that each participant can learn or cannot learn the secret simultaneously. (papers)

  3. ADAPTIVE GOSSIP BASED PROTOCOL FOR ENERGY EFFICIENT MOBILE ADHOC NETWORK

    Directory of Open Access Journals (Sweden)

    S. Rajeswari

    2012-03-01

    Full Text Available In Gossip Sleep Protocol, network performance is enhanced based on energy resource. But energy conservation is achieved with the reduced throughput. In this paper, it has been proposed a new Protocol for Mobile Ad hoc Network to achieve reliability with energy conservation. Based on the probability (p values, the value of sleep nodes is fixed initially. The probability value can be adaptively adjusted by Remote Activated Switch during the transmission process. The adaptiveness of gossiping probability is determined by the Packet Delivery Ratio. For performance comparison, we have taken Routing overhead, Packet Delivery Ratio, Number of dropped packets and Energy consumption with the increasing number of forwarding nodes. We used UDP based traffic models to analyze the performance of this protocol. We analyzed TCP based traffic models for average end to end delay. We have used the NS-2 simulator.

  4. Analysis of previous screening examinations for patients with breast cancer

    International Nuclear Information System (INIS)

    Lee, Eun Hye; Cha, Joo Hee; Han, Dae Hee; Choi, Young Ho; Hwang, Ki Tae; Ryu, Dae Sik; Kwak, Jin Ho; Moon, Woo Kyung

    2007-01-01

    We wanted to improve the quality of subsequent screening by reviewing the previous screening of breast cancer patients. Twenty-four breast cancer patients who underwent previous screening were enrolled. All 24 took mammograms and 15 patients also took sonograms. We reviewed the screening retrospectively according to the BI-RADS criteria and we categorized the results into false negative, true negative, true positive and occult cancers. We also categorized the causes of false negative cancers into misperception, misinterpretation and technical factors and then we analyzed the attributing factors. Review of the previous screening revealed 66.7% (16/24) false negative, 25.0% (6/24) true negative, and 8.3% (2/24) true positive cancers. False negative cancers were caused by the mammogram in 56.3% (9/16) and by the sonogram in 43.7% (7/16). For the false negative cases, all of misperception were related with mammograms and this was attributed to dense breast, a lesion located at the edge of glandular tissue or the image, and findings seen on one view only. Almost all misinterpretations were related with sonograms and attributed to loose application of the final assessment. To improve the quality of breast screening, it is essential to overcome the main causes of false negative examinations, including misperception and misinterpretation. We need systematic education and strict application of final assessment categories of BI-RADS. For effective communication among physicians, it is also necessary to properly educate them about BI-RADS

  5. Development of high-reliable real-time communication network protocol for SMART

    Energy Technology Data Exchange (ETDEWEB)

    Song, Ki Sang; Kim, Young Sik [Korea National University of Education, Chongwon (Korea); No, Hee Chon [Korea Advanced Institute of Science and Technology, Taejon (Korea)

    1999-04-01

    In this research, we first define protocol subsets for SMART(System-integrated Modular Advanced Reactor) communication network based on the requirement of SMART MMIS transmission delay and traffic requirements and OSI(Open System Interconnection) 7 layers' network protocol functions. Also, current industrial purpose LAN protocols are analyzed and the applicability of commercialized protocols are checked. For the suitability test, we have applied approximated SMART data traffic and maximum allowable transmission delay requirement. With the simulation results, we conclude that IEEE 802.5 and FDDI which is an ANSI standard, is the most suitable for SMART. We further analyzed the FDDI and token ring protocols for SMART and nuclear plant network environment including IEEE 802.4, IEEE 802.5, and ARCnet. The most suitable protocol for SMART is FDDI and FDDI MAC and RMT protocol specifications have been verified with LOTOS and the verification results show that FDDI MAC and RMT satisfy the reachability and liveness, but does not show deadlock and livelock. Therefore, we conclude that FDDI MAC and RMT is highly reliable protocol for SMART MMIS network. After that, we consider the stacking fault of IEEE 802.5 token ring protocol and propose a fault tolerant MAM(Modified Active Monitor) protocol. The simulation results show that the MAM protocol improves lower priority traffic service rate when stacking fault occurs. Therefore, proposed MAM protocol can be applied to SMART communication network for high reliability and hard real-time communication purpose in data acquisition and inter channel network. (author). 37 refs., 79 figs., 39 tabs.

  6. Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-06-01

    Full Text Available Wireless sensor networks (WSNs consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC for WSNs. However, it turned out that Yeh et al.’s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.’s protocol. However, Shi et al.’s improvement introduces other security weaknesses. In this paper, we show that Shi et al.’s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  7. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography.

    Science.gov (United States)

    Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho

    2014-06-10

    Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  8. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    We present our work on using abstract models for formally analysing cryptographic protocols: First, we present an ecient method for verifying trace-based authenticity properties of protocols using nonces, symmetric encryption, and asymmetric encryption. The method is based on a type system...... of Gordon et al., which we modify to support fully-automated type inference. Tests conducted via an implementation of our algorithm found it to be very ecient. Second, we show how privacy may be captured in a symbolic model using an equivalencebased property and give a formal denition. We formalise...

  9. The incidence of congenital heart disease: Previous findings and perspectives

    Directory of Open Access Journals (Sweden)

    Miranović Vesna

    2014-01-01

    Full Text Available Congenital heart defects (CHD are the most common of all congenital anomalies, and represent a significant global health problem. Involvement of medical professionals of different profiles has led to drastic changes in survival and quality of life of children with CHD. The motivation for the implementation of the first large population studies on this subject was not only to obtain answers to the question on the level of incidence of CHD, but the harmonization of criteria and protocols for monitoring and treatment of certain defects as well as the planning of medical staff dealing with children with CHD. Data on the incidence varies from 4-10/1000 live births. Fetal echocardiography can have potential impact on decrease of CHD incidence. The increase in incidence may be due to the possibility that children with CHD will grow up and have offsprings. Owing to the progress that has been made, an increasing number of patients experiences adulthood, creating an entirely new and growing population of patients: patients with “adult” CHD. Survivors suffer morbidity resulting from their circulatory abnormalities as well as from medical and surgical therapies they have been subjected to. Application of the achievements of human genome projects will in time lead to drastic changes in the approach to the patients with CHD. Until the time when it is possible, the goal will be further improvement of the existing system of service: networking in a unique, multicenter clinical registry of patients with CHD, as well as upgrading of technical and non-technical conditions for the treatment of patients with CHD. We are in an unprecedented time of change, but are actually at the end of the beginning of making pediatric cardiac care a highly reliable institution.

  10. Zero-Knowledge Protocols and Multiparty Computation

    DEFF Research Database (Denmark)

    Pastro, Valerio

    majority, in which all players but one are controlled by the adversary. In Chapter 5 we present both the preprocessing and the online phase of [DKL+ 13], while in Chapter 2 we describe only the preprocessing phase of [DPSZ12] since the combination of this preprocessing phase with the online phase of [DKL...... on information-theoretic message authentication codes, requires only a linear amount of data from the preprocessing, and improves on the number of field multiplications needed to perform one secure multiplication (linear, instead of quadratic as in earlier work). The preprocessing phase in Chapter 5 comes...... in an actively secure flavour and in a covertly secure one, both of which compare favourably to previous work in terms of efficiency and provable security. Moreover, the covertly secure solution includes a key generation protocol that allows players to obtain a public key and shares of a corresponding secret key...

  11. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

    Science.gov (United States)

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S

    2015-11-01

    In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.

  12. Energy Reduction Multipath Routing Protocol for MANET Using Recoil Technique

    Directory of Open Access Journals (Sweden)

    Rakesh Kumar Sahu

    2018-04-01

    Full Text Available In Mobile Ad-hoc networks (MANET, power conservation and utilization is an acute problem and has received significant attention from academics and industry in recent years. Nodes in MANET function on battery power, which is a rare and limited energy resource. Hence, its conservation and utilization should be done judiciously for the effective functioning of the network. In this paper, a novel protocol namely Energy Reduction Multipath Routing Protocol for MANET using Recoil Technique (AOMDV-ER is proposed, which conserves the energy along with optimal network lifetime, routing overhead, packet delivery ratio and throughput. It performs better than any other AODV based algorithms, as in AOMDV-ER the nodes transmit packets to their destination smartly by using a varying recoil off time technique based on their geographical location. This concept reduces the number of transmissions, which results in the improvement of network lifetime. In addition, the local level route maintenance reduces the additional routing overhead. Lastly, the prediction based link lifetime of each node is estimated which helps in reducing the packet loss in the network. This protocol has three subparts: an optimal route discovery algorithm amalgamation with the residual energy and distance mechanism; a coordinated recoiled nodes algorithm which eliminates the number of transmissions in order to reduces the data redundancy, traffic redundant, routing overhead, end to end delay and enhance the network lifetime; and a last link reckoning and route maintenance algorithm to improve the packet delivery ratio and link stability in the network. The experimental results show that the AOMDV-ER protocol save at least 16% energy consumption, 12% reduction in routing overhead, significant achievement in network lifetime and packet delivery ratio than Ad hoc on demand multipath distance vector routing protocol (AOMDV, Ad hoc on demand multipath distance vector routing protocol life

  13. Predicting implementation from organizational readiness for change: a study protocol

    Directory of Open Access Journals (Sweden)

    Kelly P Adam

    2011-07-01

    Full Text Available Abstract Background There is widespread interest in measuring organizational readiness to implement evidence-based practices in clinical care. However, there are a number of challenges to validating organizational measures, including inferential bias arising from the halo effect and method bias - two threats to validity that, while well-documented by organizational scholars, are often ignored in health services research. We describe a protocol to comprehensively assess the psychometric properties of a previously developed survey, the Organizational Readiness to Change Assessment. Objectives Our objective is to conduct a comprehensive assessment of the psychometric properties of the Organizational Readiness to Change Assessment incorporating methods specifically to address threats from halo effect and method bias. Methods and Design We will conduct three sets of analyses using longitudinal, secondary data from four partner projects, each testing interventions to improve the implementation of an evidence-based clinical practice. Partner projects field the Organizational Readiness to Change Assessment at baseline (n = 208 respondents; 53 facilities, and prospectively assesses the degree to which the evidence-based practice is implemented. We will conduct predictive and concurrent validities using hierarchical linear modeling and multivariate regression, respectively. For predictive validity, the outcome is the change from baseline to follow-up in the use of the evidence-based practice. We will use intra-class correlations derived from hierarchical linear models to assess inter-rater reliability. Two partner projects will also field measures of job satisfaction for convergent and discriminant validity analyses, and will field Organizational Readiness to Change Assessment measures at follow-up for concurrent validity (n = 158 respondents; 33 facilities. Convergent and discriminant validities will test associations between organizational readiness and

  14. A protocol for a systematic review for perioperative pregabalin use

    Directory of Open Access Journals (Sweden)

    Eipe Naveen

    2012-09-01

    Full Text Available Abstract Background Perioperative pain management has recently been revolutionized with the recognition of novel mechanisms and introduction of newer drugs. Many randomized trials have studied the use of the gabapentinoid anti-epileptic, pregabalin, in acute pain. Published systematic reviews suggest that using pregabalin for perioperative pain management may decrease analgesic requirements and pain scores, at the expense of troublesome side effects. A major limitation of the extant reviews is the lack of rigorous investigation of clinical characteristics that would maximize the benefit harms ratio in favor of surgical patients. We posit that effects of pregabalin for perioperative pain management vary by the type of surgical pain model and propose this systematic review protocol to update previous systematic reviews and investigate the heterogeneity in findings across subgroups of surgical pain models. Methods/Design Using a peer-reviewed search strategy, we will search key databases for clinical trials on perioperative pregabalin use in adults. The electronic searches will be supplemented by scanning the reference lists of included studies. No limits of language, country or year will be imposed. Outcomes will include pain; use of co-analgesia, particularly opioids; enhanced recovery; and drug-related harms. We will focus on the identification of surgical models and patient characteristics that have shown benefit and adverse effects from pregabalin. Two clinical experts will independently screen the studies for inclusion using eligibility criteria established a priori. Data extracted by the reviewers will then be verified. Publication bias will be assessed, as will risk of bias using the Cochrane Risk of Bias tool. Meta-analysis and meta-regression are planned if the studies are deemed statistically, methodologically and clinically homogenous. Evidence will be graded for its strength for a select number of outcomes. Discussion We will explore

  15. A shortened protocol for assessing cognitive bias in rats.

    Science.gov (United States)

    Brydges, Nichola M; Hall, Lynsey

    2017-07-15

    Reliable measurement of affective state in animals is a significant goal of animal welfare. Such measurements would also improve the validity of pre-clinical mental health research which relies on animal models. However, at present, affective states in animals are inaccessible to direct measurement. In humans, changes in cognitive processing can give reliable indications of emotional state. Therefore, similar techniques are increasingly being used to gain proxy measures of affective states in animals. In particular, the 'cognitive bias' assay has gained popularity in recent years. Major disadvantages of this technique include length of time taken for animals to acquire the task (typically several weeks), negative experiences associated with task training, and issues of motivation. Here we present a shortened cognitive bias protocol using only positive reinforcers which must actively be responded to. The protocol took an average of 4days to complete, and produced similar results to previous, longer methods (minimum 30days). Specifically, rats housed in standard laboratory conditions demonstrated negative cognitive biases when presented with ambiguous stimuli, and took longer to make a decision when faced with an ambiguous stimulus. Compared to previous methods, this protocol is significantly shorter (average 4days vs. minimum 30days), utilises only positive reinforcers to avoid inducing negative affective states, and requires active responses to all cues, avoiding potential confounds of motivational state. We have successfully developed a shortened cognitive bias protocol, suitable for use with laboratory rats. Copyright © 2017 The Author(s). Published by Elsevier B.V. All rights reserved.

  16. Hamstring Muscle Injuries, a Rehabilitation Protocol Purpose.

    Science.gov (United States)

    Valle, Xavier; L Tol, Johannes; Hamilton, Bruce; Rodas, Gil; Malliaras, Peter; Malliaropoulos, Nikos; Rizo, Vicenc; Moreno, Marcel; Jardi, Jaume

    2015-12-01

    Hamstring acute muscle injuries are prevalent in several sports including AFL football (Australian Football League), sprinting and soccer, and are often associated with prolonged time away from sport. In response to this, research into prevention and management of hamstring injury has increased, but epidemiological data shows no decline in injury and re-injury rates, suggesting that rehabilitation programs and return to play (RTP) criteria have to be improved. There continues to be a lack of consensus regarding how to assess performance, recovery and readiness to RTP, following hamstring strain injury. The aim of this paper was to propose rehabilitation protocol for hamstring muscle injuries based on current basic science and research knowledge regarding injury demographics and management options. Criteria-based (subjective and objective) progression through the rehabilitation program will be outlined along with exercises for each phase, from initial injury to RTP.

  17. Wireless Power Transfer Protocols in Sensor Networks: Experiments and Simulations

    Directory of Open Access Journals (Sweden)

    Sotiris Nikoletseas

    2017-04-01

    Full Text Available Rapid technological advances in the domain of Wireless Power Transfer pave the way for novel methods for power management in systems of wireless devices, and recent research works have already started considering algorithmic solutions for tackling emerging problems. In this paper, we investigate the problem of efficient and balanced Wireless Power Transfer in Wireless Sensor Networks. We employ wireless chargers that replenish the energy of network nodes. We propose two protocols that configure the activity of the chargers. One protocol performs wireless charging focused on the charging efficiency, while the other aims at proper balance of the chargers’ residual energy. We conduct detailed experiments using real devices and we validate the experimental results via larger scale simulations. We observe that, in both the experimental evaluation and the evaluation through detailed simulations, both protocols achieve their main goals. The Charging Oriented protocol achieves good charging efficiency throughout the experiment, while the Energy Balancing protocol achieves a uniform distribution of energy within the chargers.

  18. IoT real time data acquisition using MQTT protocol

    Science.gov (United States)

    Atmoko, R. A.; Riantini, R.; Hasin, M. K.

    2017-05-01

    The Internet of Things (IoT) provides ease to monitor and to gain sensor data through the Internet [1]. The need of high quality data is increasing to the extent that data monitoring and acquisition system in real time is required, such as smart city or telediagnostic in medical areas [2]. Therefore, an appropriate communication protocol is required to resolve these problems. Lately, researchers have developed a lot of communication protocols for IoT, of which each has advantages and disadvantages. This study proposes the utilization of MQTT as a communication protocol, which is one of data communication protocols for IoT. This study used temperature and humidity sensors because the physical parameters are often needed as parameters of environment condition [3]. Data acquisition was done in real-time and stored in MySQL database. This study is also completed by interface web-based and mobile for online monitoring. This result of this study is the enhancement of data quality and reliability using MQTT protocol.

  19. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  20. MAC Protocol for Ad Hoc Networks Using a Genetic Algorithm

    Science.gov (United States)

    Elizarraras, Omar; Panduro, Marco; Méndez, Aldo L.

    2014-01-01

    The problem of obtaining the transmission rate in an ad hoc network consists in adjusting the power of each node to ensure the signal to interference ratio (SIR) and the energy required to transmit from one node to another is obtained at the same time. Therefore, an optimal transmission rate for each node in a medium access control (MAC) protocol based on CSMA-CDMA (carrier sense multiple access-code division multiple access) for ad hoc networks can be obtained using evolutionary optimization. This work proposes a genetic algorithm for the transmission rate election considering a perfect power control, and our proposition achieves improvement of 10% compared with the scheme that handles the handshaking phase to adjust the transmission rate. Furthermore, this paper proposes a genetic algorithm that solves the problem of power combining, interference, data rate, and energy ensuring the signal to interference ratio in an ad hoc network. The result of the proposed genetic algorithm has a better performance (15%) compared to the CSMA-CDMA protocol without optimizing. Therefore, we show by simulation the effectiveness of the proposed protocol in terms of the throughput. PMID:25140339