WorldWideScience

Sample records for protocol evaluating communicative

  1. Performance evaluation of secured DICOM image communication with next generation internet protocol IPv6

    Science.gov (United States)

    Yu, Fenghai; Zhang, Jianguo; Chen, Xiaomeng; Huang, H. K.

    2005-04-01

    Next Generation Internet (NGI) technology with new communication protocol IPv6 emerges as a potential solution for low-cost and high-speed networks for image data transmission. IPv6 is designed to solve many of the problems of the current version of IP (known as IPv4) with regard to address depletion, security, autoconfiguration, extensibility, and more. We choose CTN (Central Test Node) DICOM software developed by The Mallinckrodt Institute of Radiology to implement IPv6/IPv4 enabled DICOM communication software on different operating systems (Windows/Linux), and used this DICOM software to evaluate the performance of the IPv6/IPv4 enabled DICOM image communication with different security setting and environments. We compared the security communications of IPsec with SSL/TLS on different TCP/IP protocols (IPv6/IPv4), and find that there are some trade-offs to choose security solution between IPsec and SSL/TLS in the security implementation of IPv6/IPv4 communication networks.

  2. Criteria for Evaluating Alternative Network and Link Layer Protocols for the NASA Constellation Program Communication Architecture

    Science.gov (United States)

    Benbenek, Daniel; Soloff, Jason; Lieb, Erica

    2010-01-01

    Selecting a communications and network architecture for future manned space flight requires an evaluation of the varying goals and objectives of the program, development of communications and network architecture evaluation criteria, and assessment of critical architecture trades. This paper uses Cx Program proposed exploration activities as a guideline; lunar sortie, outpost, Mars, and flexible path options are described. A set of proposed communications network architecture criteria are proposed and described. They include: interoperability, security, reliability, and ease of automating topology changes. Finally a key set of architecture options are traded including (1) multiplexing data at a common network layer vs. at the data link layer, (2) implementing multiple network layers vs. a single network layer, and (3) the use of a particular network layer protocol, primarily IPv6 vs. Delay Tolerant Networking (DTN). In summary, the protocol options are evaluated against the proposed exploration activities and their relative performance with respect to the criteria are assessed. An architectural approach which includes (a) the capability of multiplexing at both the network layer and the data link layer and (b) a single network layer for operations at each program phase, as these solutions are best suited to respond to the widest array of program needs and meet each of the evaluation criteria.

  3. On the network protocol performance evaluation for large scale communication system of nuclear plant

    International Nuclear Information System (INIS)

    Song, K. S.; Lee, T. H.; Kim, H. R.; Kim, D. H.; Ku, I. S.

    1998-01-01

    Computer technology has been dramatically advanced and it is now natural to apply digital network technology into nuclear plants. Communication architecture for nuclear plant defines the coordination of safety reactor control, balance of plant, subsystem utilities, and plant monitoring functions, and how they are connected and their user interface to guarantee plant performance and guarantee safety requirements. Therefore, to implement a digital network for control and monitoring systems of advanced nuclear plant needs systematic design and evaluation procedures because of responsive and hard real-time process characteristics of nuclear plant. In this paper, we evaluate several digital network protocols in terms of network delay, link failure effects to hard real-time requirements with full scale traffic

  4. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  5. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  6. Protocols for Scholarly Communication

    Science.gov (United States)

    Pepe, A.; Yeomans, J.

    2007-10-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should guide authors naturally towards OA publication, and CERN wants to help reach a full open access publishing environment for the particle physics community and related sciences in the next few years.

  7. Feasible quantum communication complexity protocol

    International Nuclear Information System (INIS)

    Galvao, Ernesto F.

    2002-01-01

    I show that a simple multiparty communication task can be performed more efficiently with quantum communication than with classical communication, even with low detection efficiency η. The task is a communication complexity problem in which distant parties need to compute a function of the distributed inputs, while minimizing the amount of communication between them. A realistic quantum optical setup is suggested that can demonstrate a five-party quantum protocol with higher-than-classical performance, provided η>0.33

  8. Cognitive Communications Protocols for SATCOM

    Science.gov (United States)

    2017-10-20

    communications protocols for satellite and space communications with possible broad applications in defense, homeland-security as well as consumer ...communications with possible broad applications in defense, homeland-security, and civilian as well as consumer telecommunications. Such cognitive...vulnerable against smart jammers that may attempt to learn the cognitive radios own behavior . In response, our second class of proposed algorithms

  9. A Business Evaluation Of The Next Generation Ipv6 Protocol In Fixed And Mobile Communication Services

    NARCIS (Netherlands)

    L-F. Pau (Louis-François)

    2002-01-01

    textabstractThis paper gives an analytical business model of the Internet IPv4 and IPv6 protocols ,focussing on the business implications of intrinsic technical properties of these protocols .The technical properties modeled in business terms are : address space, payload, autoconfiguration, IP

  10. A Business Evaluation Of The Next Generation Ipv6 Protocol In Fixed And Mobile Communication Services

    OpenAIRE

    Pau, Louis-François

    2002-01-01

    textabstractThis paper gives an analytical business model of the Internet IPv4 and IPv6 protocols ,focussing on the business implications of intrinsic technical properties of these protocols .The technical properties modeled in business terms are : address space, payload, autoconfiguration, IP mobility , security, and flow label. Three operational cash flow focussed performance indexes are defined for respectively an Internet operator or ISP, for the address domain owner, and for the end user...

  11. Deterministic secure communication protocol without using entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

  12. Parenting for Autism, Language, And Communication Evaluation Study (PALACES): protocol for a pilot randomised controlled trial.

    Science.gov (United States)

    Williams, Margiad Elen; Hastings, Richard; Charles, Joanna Mary; Evans, Sue; Hutchings, Judy

    2017-02-16

    Children with autistic spectrum disorder (ASD) often have associated behavioural difficulties that can present a challenge for parents and parenting. There are several effective social learning theory-based parenting programmes for dealing with behavioural difficulties, including the Incredible Years (IY) parent programmes. However, these programmes typically do not specifically target parents of children with ASD. Recently, a new addition to the IY suite of programmes known as the IY Autistic Spectrum and Language Delays (IY-ASLD) parent programme was developed. The main aims of the present study are to examine the feasibility of delivering this programme within child health services and to provide initial evidence for effectiveness and economic costs. The Parenting for Autism, Language, And Communication Evaluation Study (PALACES) trial is a pragmatic, multicentre, pilot randomised controlled trial comparing the IY-ASLD programme with a wait-list control condition. 72 parents of children with ASD (aged 3-8 years) will be randomly allocated to either the intervention or control condition. Data will be collected prior to randomisation and 6 months postrandomisation for all families. Families in the intervention condition only will also be followed up at 12 and 18 months postrandomisation. This study will provide initial evidence of effectiveness for the newly developed IY-ASLD parenting programme. It will also add to the limited economic evidence for an intervention targeting parents of children with ASD and provide longer term data, an important component for evaluations of parenting programmes. Approval for the study was granted by the Research Ethics Committee at the School of Psychology, Bangor University (reference number: 2016-15768) and the North Wales Research Ethics Committee, UK (reference number: 16/WA/0224). The findings will be disseminated through research conferences and peer-reviewed journals. ISRCTN57070414; Pre-results. Published by the BMJ

  13. Database communication protocol analyses and security detection

    International Nuclear Information System (INIS)

    Luo Qun; Liu Qiushi

    2003-01-01

    In this paper we introduced the analysis of TDS protocol in the communication application between Client and Server about SYBASE and MICROSOFT SQL SERVER and do some test for some bugs existed in the protocol. (authors)

  14. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  15. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  16. Supporting Adaptation of Wireless Communication Protocols

    International Nuclear Information System (INIS)

    Dhomeja, L.D.; Soomro, I.A.; Malkani, Y.A.

    2016-01-01

    Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants) come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity), Bluetooth, IrDA (Infrared), etc. In order for pervasive devices to interact with each other, they need to have matching (alike) communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth) from what the server has (e.g. WiFi), connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange), L2CAP (Logical Link Control and Adaptation Protocol), RFCOM (Radio Frequency Communication) and WiFi protocol and can run on (J2MW (Java 2 Micro Edition) enabled mobile phones which support both Bluetooth and WiFi capabilities. (author)

  17. Developing and Evaluating Communication Strategies to Support Informed Decisions and Practice Based on Evidence (DECIDE): protocol and preliminary results.

    Science.gov (United States)

    Treweek, Shaun; Oxman, Andrew D; Alderson, Philip; Bossuyt, Patrick M; Brandt, Linn; Brożek, Jan; Davoli, Marina; Flottorp, Signe; Harbour, Robin; Hill, Suzanne; Liberati, Alessandro; Liira, Helena; Schünemann, Holger J; Rosenbaum, Sarah; Thornton, Judith; Vandvik, Per Olav; Alonso-Coello, Pablo

    2013-01-09

    Healthcare decision makers face challenges when using guidelines, including understanding the quality of the evidence or the values and preferences upon which recommendations are made, which are often not clear. GRADE is a systematic approach towards assessing the quality of evidence and the strength of recommendations in healthcare. GRADE also gives advice on how to go from evidence to decisions. It has been developed to address the weaknesses of other grading systems and is now widely used internationally. The Developing and Evaluating Communication Strategies to Support Informed Decisions and Practice Based on Evidence (DECIDE) consortium (http://www.decide-collaboration.eu/), which includes members of the GRADE Working Group and other partners, will explore methods to ensure effective communication of evidence-based recommendations targeted at key stakeholders: healthcare professionals, policymakers, and managers, as well as patients and the general public. Surveys and interviews with guideline producers and other stakeholders will explore how presentation of the evidence could be improved to better meet their information needs. We will collect further stakeholder input from advisory groups, via consultations and user testing; this will be done across a wide range of healthcare systems in Europe, North America, and other countries. Targeted communication strategies will be developed, evaluated in randomized trials, refined, and assessed during the development of real guidelines. Results of the DECIDE project will improve the communication of evidence-based healthcare recommendations. Building on the work of the GRADE Working Group, DECIDE will develop and evaluate methods that address communication needs of guideline users. The project will produce strategies for communicating recommendations that have been rigorously evaluated in diverse settings, and it will support the transfer of research into practice in healthcare systems globally.

  18. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  19. Optimized UAV Communication Protocol Based on Prior Locations

    OpenAIRE

    Sboui, Lokman; Rabah, Abdullatif

    2015-01-01

    In this paper, we adopt a new communication protocol between the UAV and fixed on-ground nodes. This protocol tends to reduce communication power consumption by stopping communication if the channel is not good to communicate (i.e. far nodes, obstacles, etc.) The communication is performed using the XBee 868M standard and Libelium wapsmotes. Our designed protocol is based on a new communication model that we propose in this paper. The protocole decides wether to communicate or not after compu...

  20. Common protocol aids consolidated communications

    OpenAIRE

    Center for Homeland Defense and Security

    2010-01-01

    Center for Homeland Defense and Security, OUT OF THE CLASSROOM Download the paper: Paper: Managing Information Across All Levels of the Coast Guard” While a student at CHDS, then-Coast Guardsman Chris Kluckhuhn was well aware of the different communications platforms...

  1. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  2. Evaluation of Implant Communication with Polarisation and Unslotted CSMA/CA Protocol in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Kyung Sup Kwak

    2010-01-01

    Full Text Available The performance of the implant inside a human body with polarisation, distance, and different power settings at the base-station is presented. In addition, the unslotted CSMA/CA protocol is studied for a heterogeneous WBAN.

  3. Integration of robotic surgery into routine practice and impacts on communication, collaboration, and decision making: a realist process evaluation protocol

    Science.gov (United States)

    2014-01-01

    Background Robotic surgery offers many potential benefits for patients. While an increasing number of healthcare providers are purchasing surgical robots, there are reports that the technology is failing to be introduced into routine practice. Additionally, in robotic surgery, the surgeon is physically separated from the patient and the rest of the team, with the potential to negatively impact teamwork in the operating theatre. The aim of this study is to ascertain: how and under what circumstances robotic surgery is effectively introduced into routine practice; and how and under what circumstances robotic surgery impacts teamwork, communication and decision making, and subsequent patient outcomes. Methods and design We will undertake a process evaluation alongside a randomised controlled trial comparing laparoscopic and robotic surgery for the curative treatment of rectal cancer. Realist evaluation provides an overall framework for the study. The study will be in three phases. In Phase I, grey literature will be reviewed to identify stakeholders’ theories concerning how robotic surgery becomes embedded into surgical practice and its impacts. These theories will be refined and added to through interviews conducted across English hospitals that are using robotic surgery for rectal cancer resection with staff at different levels of the organisation, along with a review of documentation associated with the introduction of robotic surgery. In Phase II, a multi-site case study will be conducted across four English hospitals to test and refine the candidate theories. Data will be collected using multiple methods: the structured observation tool OTAS (Observational Teamwork Assessment for Surgery); video recordings of operations; ethnographic observation; and interviews. In Phase III, interviews will be conducted at the four case sites with staff representing a range of surgical disciplines, to assess the extent to which the results of Phase II are generalisable and to

  4. An one-time-pad key communication protocol with entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We present an one-time-pad key communication protocol that allows secure direct communication with entanglement. Alice can send message to Bob in a deterministic manner by using local measurements and public communication. The theoretical efficiency of this protocol is double compared with BB84 protocol. We show this protocol is unconditional secure under arbitrary quantum attack. And we discuss that this protocol can be perfectly implemented with current technologies.

  5. Taking the Politics Out of Satellite and Space-Based Communications Protocols

    Science.gov (United States)

    Ivancic, William D.

    2006-01-01

    After many years of studies, experimentation, and deployment, large amounts of misinformation and misconceptions remain regarding applicability of various communications protocols for use in satellite and space-based networks. This paper attempts to remove much of the politics, misconceptions, and misinformation that have plagued spacebased communications protocol development and deployment. This paper provides a common vocabulary for communications; a general discussion of the requirements for various communication environments; an evaluation of tradeoffs between circuit and packet-switching technologies, and the pros and cons of various link, network, transport, application, and security protocols. Included is the applicability of protocol enhancing proxies to NASA, Department of Defense (DOD), and commercial space communication systems.

  6. Efficient Communication Protocols for Deciding Edit Distance

    DEFF Research Database (Denmark)

    Jowhari, Hossein

    2012-01-01

    In this paper we present two communication protocols on computing edit distance. In our first result, we give a one-way protocol for the following Document Exchange problem. Namely given x ∈ Σn to Alice and y ∈ Σn to Bob and integer k to both, Alice sends a message to Bob so that he learns x...... or truthfully reports that the edit distance between x and y is greater than k. For this problem, we give a randomized protocol in which Alice transmits at most O ˜ (klog 2 n) bits and each party’s time complexity is O ˜ (nlogn+k 2 log 2 n) . Our second result is a simultaneous protocol for edit distance over...... permutations. Here Alice and Bob both send a message to a third party (the referee) who does not have access to the input strings. Given the messages, the referee decides if the edit distance between x and y is at most k or not. For this problem we give a protocol in which Alice and Bob run a O...

  7. Efficient SCT Protocol for Post Disaster Communication

    Science.gov (United States)

    Ramesh, T. K.; Giriraja, C. V.

    2017-08-01

    Natural and catastrophic disasters can cause damage to the communication system, the damage may be complete or it may be partial. In such areas communication and exchange of information plays a very important role and become difficult to happen in such situations. So, the rescue systems should be installed in those areas for the rescue operations and to take important decisions about how to make a connection from there to the outside world. Wireless communication network architecture should be setup in disaster areas for the communication to happen and to gather information. Wireless ad-hoc network architecture is proposed in this paper with access nodes. These access nodes acts as hotspot for certain area in which they are set up such that the Wi-Fi capable devices get connected to them for communication to happen. If the mobile battery is drained in such situations wireless charging using microwave is shown in this paper. Performance analysis of the communication transport layer protocols is shown and Efficient SCTP (ESTP) algorithm is developed which shows better results in terms of cumulative packet loss.

  8. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  9. On consensus through communication without a commonly known protocol

    OpenAIRE

    Tsakas Elias; Voorneveld Mark

    2010-01-01

    The present paper extends the standard model of pairwise communication among Bayesianagents to cases where the structure of the communication protocol is not commonly known.We show that, even under strict conditions on the structure of the protocols and the nature of the transmitted signals, a consensus may never be reached if very little asymmetric information about the protocol is introduced.

  10. MODELLING AND VERIFICATION OF KITSAT PACKET COMMUNICATION PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Young-Ro Lee

    1996-06-01

    Full Text Available In this paper, in order to verify KITSAT 1/2 packet communication protocols, we model the AX.25 protocol and PACSAT protocol by using an extended Petri net and then verify the correctness, boundedness, liveness and deadlock freeness of packet protocols by utilizing reachability trees.

  11. Securing statically-verified communications protocols against timing attacks

    DEFF Research Database (Denmark)

    Buchholtz, Mikael; Gilmore, Stephen; Hillston, Jane

    2004-01-01

    We present a federated analysis of communication protocols which considers both security properties and timing. These are not entirely independent observations of a protocol; by using timing observations of an executing protocol it is possible to deduce derived information about the nature...... of the communication even in the presence of unbreakable encryption. Our analysis is based on expressing the protocol as a process algebra model and deriving from this process models analysable by the Imperial PEPA Compiler and the LySatool....

  12. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use...... of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools....

  13. Localized radio frequency communication using asynchronous transfer mode protocol

    Science.gov (United States)

    Witzke, Edward L.; Robertson, Perry J.; Pierson, Lyndon G.

    2007-08-14

    A localized wireless communication system for communication between a plurality of circuit boards, and between electronic components on the circuit boards. Transceivers are located on each circuit board and electronic component. The transceivers communicate with one another over spread spectrum radio frequencies. An asynchronous transfer mode protocol controls communication flow with asynchronous transfer mode switches located on the circuit boards.

  14. Design and analysis of communication protocols for quantum repeater networks

    International Nuclear Information System (INIS)

    Jones, Cody; Kim, Danny; Rakher, Matthew T; Ladd, Thaddeus D; Kwiat, Paul G

    2016-01-01

    We analyze how the performance of a quantum-repeater network depends on the protocol employed to distribute entanglement, and we find that the choice of repeater-to-repeater link protocol has a profound impact on entanglement-distribution rate as a function of hardware parameters. We develop numerical simulations of quantum networks using different protocols, where the repeater hardware is modeled in terms of key performance parameters, such as photon generation rate and collection efficiency. These parameters are motivated by recent experimental demonstrations in quantum dots, trapped ions, and nitrogen-vacancy centers in diamond. We find that a quantum-dot repeater with the newest protocol (‘MidpointSource’) delivers the highest entanglement-distribution rate for typical cases where there is low probability of establishing entanglement per transmission, and in some cases the rate is orders of magnitude higher than other schemes. Our simulation tools can be used to evaluate communication protocols as part of designing a large-scale quantum network. (paper)

  15. Cryptanalysis and improvement of quantum secure communication network protocol with entangled photons for mobile communications

    International Nuclear Information System (INIS)

    Gao, Gan

    2014-01-01

    Recently, a communication protocol called controlled bidirectional quantum secret direct communication for mobile networks was proposed by Chou et al (2014 Mobile Netw. Appl. 19 121). We study the security of the proposed communication protocol and find that it is not secure. The controller, Telecom Company, may eavesdrop secret messages from mobile devices without being detected. Finally, we give a possible improvement of the communication protocol. (paper)

  16. Maximally efficient protocols for direct secure quantum communication

    Energy Technology Data Exchange (ETDEWEB)

    Banerjee, Anindita [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); Department of Physics and Center for Astroparticle Physics and Space Science, Bose Institute, Block EN, Sector V, Kolkata 700091 (India); Pathak, Anirban, E-mail: anirban.pathak@jiit.ac.in [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); RCPTM, Joint Laboratory of Optics of Palacky University and Institute of Physics of Academy of Science of the Czech Republic, Faculty of Science, Palacky University, 17. Listopadu 12, 77146 Olomouc (Czech Republic)

    2012-10-01

    Two protocols for deterministic secure quantum communication (DSQC) using GHZ-like states have been proposed. It is shown that one of these protocols is maximally efficient and that can be modified to an equivalent protocol of quantum secure direct communication (QSDC). Security and efficiency of the proposed protocols are analyzed and compared. It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. Maximally efficient QSDC protocols are shown to be more efficient than their DSQC counterparts. This additional efficiency arises at the cost of message transmission rate. -- Highlights: ► Two protocols for deterministic secure quantum communication (DSQC) are proposed. ► One of the above protocols is maximally efficient. ► It is modified to an equivalent protocol of quantum secure direct communication (QSDC). ► It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. ► Efficient QSDC protocols are always more efficient than their DSQC counterparts.

  17. Evaluating Internal Communication: The ICA Communication Audit.

    Science.gov (United States)

    Goldhaber, Gerald M.

    1978-01-01

    The ICA Communication Audit is described in detail as an effective measurement procedure that can help an academic institution to evaluate its internal communication system. Tools, computer programs, analysis, and feedback procedures are described and illustrated. (JMF)

  18. Analysis of NASA communications (Nascom) II network protocols and performance

    Science.gov (United States)

    Omidyar, Guy C.; Butler, Thomas E.

    1991-01-01

    The NASA Communications (Nascom) Division of the Mission Operations and Data Systems Directorate is to undertake a major initiative to develop the Nascom II (NII) network to achieve its long-range service objectives for operational data transport to support the Space Station Freedom Program, the Earth Observing System, and other projects. NII is the Nascom ground communications network being developed to accommodate the operational traffic of the mid-1990s and beyond. The authors describe various baseline protocol architectures based on current and evolving technologies. They address the internetworking issues suggested for reliable transfer of data over heterogeneous segments. They also describe the NII architecture, topology, system components, and services. A comparative evaluation of the current and evolving technologies was made, and suggestions for further study are described. It is shown that the direction of the NII configuration and the subsystem component design will clearly depend on the advances made in the area of broadband integrated services.

  19. Network Coding Protocols for Smart Grid Communications

    DEFF Research Database (Denmark)

    Prior, Rui; Roetter, Daniel Enrique Lucani; Phulpin, Yannick

    2014-01-01

    We propose a robust network coding protocol for enhancing the reliability and speed of data gathering in smart grids. At the heart of our protocol lies the idea of tunable sparse network coding, which adopts the transmission of sparsely coded packets at the beginning of the transmission process b...

  20. Eavesdropping on the "ping-pong" quantum communication protocol

    OpenAIRE

    Wojcik, Antoni

    2002-01-01

    The proposed eavesdropping scheme reveals that the quantum communication protocol recently presented by Bostrom and Felbinger [Phys. Rev. Lett. 89, 187902 (2002)] is not secure as far as quantum channel losses are taken into account.

  1. Secure Protocol for “Host — NFC Reader” Communication

    Directory of Open Access Journals (Sweden)

    A. O. Menshenin

    2012-06-01

    Full Text Available The paper presents a secure protocol for communication between host and NFC reader. The protocol protection scheme uses symmetric cipher with cyclic session key generation and provides confidentiality, integrity, end parties authentication and resistance to replay attacks. Deployment scenario in a typical electronic payment system is also presented.

  2. SPP: A data base processor data communications protocol

    Science.gov (United States)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  3. Communication Protocol for Advanced Prosthesis Components

    OpenAIRE

    Karnå, David

    2007-01-01

    It would be of great value for the prosthesis industry to achieve an open standard for communication in upper limb prostheses. Cooperation between NTNU and the University of New Brunswick has resulted in a functional requirements specification for such a standard, SCIP(Standardised Communication Interface in Prostheses). The special challenges for communication in a prosthesis system are possible noisy environments, high demands for light weight, safety for the user and the fact that devices ...

  4. From Explicit to Symbolic Types for Communication Protocols in CCS

    DEFF Research Database (Denmark)

    Nielson, Hanne Riis; Nielson, Flemming; Kreiker, Jörg

    2012-01-01

    We study communication protocols having several rounds and expressed in value passing CCS. We develop a type-based analysis for providing an explicit record of all communications and show the usual subject reduction result. Since the explicit records can be infinitely large, we also develop a type...

  5. New Communication Network Protocol for a Data Acquisition System

    Science.gov (United States)

    Uchida, T.; Fujii, H.; Nagasaka, Y.; Tanaka, M.

    2006-02-01

    An event builder based on communication networks has been used in high-energy physics experiments, and various networks have been adopted, for example, IEEE 802.3 (Ethernet), asynchronous transfer mode (ATM), and so on. In particular, Ethernet is widely used because its infrastructure is very cost effective. Many systems adopt standard protocols that are designed for a general network. However, in the case of an event builder, the communication pattern between stations is different from that in a general network. The unique communication pattern causes congestion, and thus makes it difficulty to quantitatively design the network. To solve this problem, we have developed a simple network protocol for a data acquisition (DAQ) system. The protocol is designed to keep the sequence of senders so that no congestion occurs. We implemented the protocol on a small hardware component [a field programmable gate array (FPGA)] and measured the performance, so that it will be ready for a generic DAQ system

  6. Collaborative communication protocols for wireless sensor networks

    NARCIS (Netherlands)

    Dulman, S.O.; van Hoesel, L.F.W.; Nieberg, T.; Havinga, Paul J.M.

    In this document, the design of communication within a wireless sensor network is discussed. The resource limitations of such a network, especially in terms of energy, require an integrated approach for all (traditional) layers of communication. We present such an integrated, collaborative approach

  7. Bidirectional Quantum Secure Direct Communication Network Protocol with Hyperentanglement

    International Nuclear Information System (INIS)

    Gu Bin; Chen Yulin; Huang Yugai; Fang Xia

    2011-01-01

    We propose a bidirectional quantum secure direct communication (QSDC) network protocol with the hyperentanglment in both the spatial-mode ad the polarization degrees of freedom of photon pairs which can in principle be produced with a beta barium borate crystal. The secret message can be encoded on the photon pairs with unitary operations in these two degrees of freedom independently. Compared with other QSDC network protocols, our QSDC network protocol has a higher capacity as each photon pair can carry 4 bits of information. Also, we discuss the security of our QSDC network protocol and its feasibility with current techniques. (general)

  8. A statistical frame based TDMA protocol for human body communication.

    Science.gov (United States)

    Nie, Zedong; Li, Zhao; Huang, Renwei; Liu, Yuhang; Li, Jingzhen; Wang, Lei

    2015-07-09

    Human body communication (HBC) using the human body as the transmission medium, which has been regarded as one of the most promising short-range communications in wireless body area networks (WBAN). Compared to the traditional wireless networks, two challenges are existed in HBC based WBAN. (1) Its sensor nodes should be energy saving since it is inconvenient to replace or recharge the battery on these sensor nodes; (2) the coordinator should be able to react dynamically and rapidly to the burst traffic triggered by sensing events. Those burst traffic conditions include vital physical signal (electrocardiogram, electroencephalogram etc.) monitoring, human motion detection (fall detection, activity monitoring, gesture recognition, motion sensing etc.) and so on. To cope with aforementioned challenges, a statistical frame based TDMA (S-TDMA) protocol with multi-constrained (energy, delay, transmission efficiency and emergency management) service is proposed in this paper. The scenarios where burst traffic is often triggered rapidly with low power consumption and low delay is handled in our proposed S-TDMA. A beacon frame with the contained synchronous and poll information is designed to reduce the possibility of collisions of request frames. A statistical frame which broadcasts the unified scheduling information is adopted to avoid packet collisions, idle listening and overhearing. Dynamic time slot allocation mechanism is presented to manage the burst traffic and reduce the active period in each beacon period. An emergency mechanism is proposed for vital signals to be transmitted. The theory analysis is proceed and the result is evaluated in the hardware platform. To verify its feasibility, S-TDMA was fully implemented on our independently-developed HBC platform where four sensor nodes and a coordinator are fastened on a human body. Experiment results show that S-TDMA costs 89.397 mJ every 20 s when the payload size is 122 bytes, 9.51% lower than Lightweight MAC

  9. Real-time communication protocols: an overview

    NARCIS (Netherlands)

    Hanssen, F.T.Y.; Jansen, P.G.

    2003-01-01

    This paper describes several existing data link layer protocols that provide real-time capabilities on wired networks, focusing on token-ring and Carrier Sense Multiple Access based networks. Existing modifications to provide better real-time capabilities and performance are also described. Finally

  10. An Evaluation of Protocols for UAV Science Applications

    Science.gov (United States)

    Ivancic, William D.; Stewart, David E.; Sullivan, Donald V.; Finch, Patrick E.

    2012-01-01

    This paper identifies data transport needs for current and future science payloads deployed on the NASA Global Hawk Unmanned Aeronautical Vehicle (UAV). The NASA Global Hawk communication system and operational constrains are presented. The Genesis and Rapid Intensification Processes (GRIP) mission is used to provide the baseline communication requirements as a variety of payloads were utilized in this mission. User needs and desires are addressed. Protocols are matched to the payload needs and an evaluation of various techniques and tradeoffs are presented. Such techniques include utilization rate-base selective negative acknowledgement protocols and possible use of protocol enhancing proxies. Tradeoffs of communication architectures that address ease-of-use and security considerations are also presented.

  11. Evaluation of the Cape Town Protocol for the isolation of ...

    African Journals Online (AJOL)

    DRINIE

    Available on website http://www.wrc.org.za. Short communication. Evaluation of the Cape Town Protocol for the isolation of. Campylobacter spp. from environmental waters. SM Diergaardt, SN Venter*, M Chalmers, J Theron and VS Brözel. Department of Microbiology and Plant Pathology, University of Pretoria, Pretoria, ...

  12. Experimental investigation of quantum communication protocols in higher dimensions

    International Nuclear Information System (INIS)

    Groeblacher, S.; Stuetz, M.; Vaziri, A.; Jennewein, T.; Zeilinger, A.

    2005-01-01

    Full text: Higher dimensional quantum systems, such as qutrits, offer unique possibilities for quantum communication. In particular, quantum key distribution may be realized with a higher security margin than with qubit systems. We plan to demonstrate quantum cryptography with entangled photonic qutrits based on orbital angular momentum (OAM). Therefore we test various methods of manipulating and transforming OAM states of photons, which is required for the implementation of quantum communication protocols. (author)

  13. Communication Buses and Protocols for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Andrew Mason

    2002-07-01

    Full Text Available This paper overviews existing digital communication buses which are commonly used in sensor networks, discusses sensor network architectures, and introduces a new sensor bus for low power microsystem applications. The new intra-module multi-element microsystem (IM2 bus is nine-line interface with 8b serial data which implements several advanced features such as power management and plug-n-play while maintaining minimum hardware overhead at the sensor node. Finally, some issues in wireless sensor networking are discussed. The coverage of these issues provides a guideline for choosing the appropriate bus for different sensor network applications.

  14. UAV telemetry communications using ZigBee protocol

    Science.gov (United States)

    Nasution, T. H.; Siregar, I.; Yasir, M.

    2017-10-01

    Wireless communication has been widely used in various fields or disciplines such as agriculture, health, engineering, military, and aerospace so as to support the work in that field. The communication technology is typically used for controlling devices and data monitoring. One development of wireless communication is the widely used telemetry system used to reach areas that cannot be reached by humans using UAV (Unmanned Aerial Vehicle) or unmanned aircraft. In this paper we discuss the design of telemetry system in UAV using ZigBee protocol. From the test obtained the system can work well with visualization displays without pause is 20 data per second with a maximum data length of 120 characters.

  15. Evaluation of Protocol Uniformity Concerning Laparoscopic Cholecystectomy in The Netherlands

    Science.gov (United States)

    Goossens, Richard H. M.; van Eijk, Daan J.; Lange, Johan F.

    2008-01-01

    Background Iatrogenic bile duct injury remains a current complication of laparoscopic cholecystectomy. One uniform and standardized protocol, based on the “critical view of safety” concept of Strasberg, should reduce the incidence of this complication. Furthermore, owing to the rapid development of minimally invasive surgery, technicians are becoming more frequently involved. To improve communication between the operating team and technicians, standardized actions should also be defined. The aim of this study was to compare existing protocols for laparoscopic cholecystectomy from various Dutch hospitals. Methods Fifteen Dutch hospitals were contacted for evaluation of their protocols for laparoscopic cholecystectomy. All evaluated protocols were divided into six steps and were compared accordingly. Results In total, 13 hospitals responded—5 academic hospitals, 5 teaching hospitals, 3 community hospitals—of which 10 protocols were usable for comparison. Concerning the trocar positions, only minor differences were found. The concept of “critical view of safety” was represented in just one protocol. Furthermore, the order of clipping and cutting the cystic artery and duct differed. Descriptions of instruments and apparatus were also inconsistent. Conclusions Present protocols differ too much to define a universal procedure among surgeons in The Netherlands. The authors propose one (inter)national standardized protocol, including standardized actions. This uniform standardized protocol has to be officially released and recommended by national scientific associations (e.g., the Dutch Society of Surgery) or international societies (e.g., European Association for Endoscopic Surgery and Society of American Gastrointestinal and Endoscopic Surgeons). The aim is to improve patient safety and professional communication, which are necessary for new developments. PMID:18224485

  16. Evaluating a multicomponent social behaviour change communication strategy to reduce intimate partner violence among married couples: study protocol for a cluster randomized trial in Nepal

    Directory of Open Access Journals (Sweden)

    Cari Jo Clark

    2017-01-01

    Full Text Available Abstract Background Intimate partner violence (IPV is a significant public health issue that affects 1 in 3 women globally and a similarly large number of women in Nepal. Over the past decade, important policy and programmatic steps have been taken to address violence against women in Nepal. There remains a dearth of evidence on the effectiveness of primary violence prevention strategies. The Change Starts at Home study begins to fill this gap by utilizing a multi-component social behaviour change communication (SBCC strategy involving a radio drama and community mobilization to shift attitudes, norms and behaviours that underpin IPV perpetration in Nepal. Methods/Design The study uses a concurrent mixed-methods design. The quantitative aspect of the evaluation is a pair-matched, repeated cross-sectional 2-armed, single-blinded cluster trial (RCT: N = 36 clusters, 1440 individuals, comparing a social behaviour change communication (SBCC strategy to radio programming alone for its impact on physical and / or sexual IPV at the end of programming (12 months’ post-baseline and 6-months post the cessation of project activities (18-months post baseline. The qualitative aspects of the design include several longitudinal approaches to understand the impact of the intervention and to examine mechanisms of change including in-depth interviews with participants (N = 18 couples, and focus group discussions with community leaders (N = 3 groups, and family members of participants (N = 12 groups. Treatment effects will be estimated with generalized logistic mixed models specified to compare differences in primary outcome from baseline to 12-month follow-up, and baseline to 18-months follow-up in accordance with intention-to-treat principles. Discussion The study rigorously evaluates the effectiveness of a promising strategy to prevent IPV. The results of the trial will be immediately useful for governmental, nongovernmental, and donor funded

  17. Development of IT-based Data Communication Protocol for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Jeong, K. I.; Kim, D. H.; Lee, J. C.

    2009-07-01

    The communication protocol, which provide overall communication rules and methods and give ways how to exchange information, is the most important part and it can affect the overall performance of communication network. Therefore, the first step of development of the communication network of an NPP is its own communication protocol design, which conforms to the requirements and characteristics of an NPP I and C. To manage the protocol development process, we establish development procedure and define detail substantive based on the procedure and we examine the adaptability of existing commercial communication protocols to the communication protocol of an NPP I and C. Existing commercial communication protocols based on Information Technology(IT) can be categorized into 3 groups: general commercial communication protocols, industrial communication protocols, military communication protocols. We analyze the design criteria and performance requirements of popular protocols in each group. And also, we examine the adaptability to the communication protocol of an NPP. Based on these results, we developed our own protocol for NPP I and C, which meet the required specifications through design overall protocol architecture and data frame format, definition of functional requirements and specifications

  18. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols.

    Science.gov (United States)

    Campagne, Fabien

    2008-02-29

    The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79-0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86-0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these protocols can fully substitute

  19. Emergency Handling for MAC Protocol in Human Body Communication

    Directory of Open Access Journals (Sweden)

    Kwon Youngmi

    2011-01-01

    Full Text Available The human body communication (HBC is a technology that enables short range data communication using the human body as a medium, like an electrical wire. Thus it removes the need for a traditional antenna. HBC may be used as a type of data communication in body area network (BAN, while the devices are being in contact with body. One of important issues in BAN is an emergency alarm because it may be closely related to human life. For emergency data communication, the most critical factor is the time constraint. IEEE 802.15.6 specifies that the emergency alarm for the BAN must be notified in less than 1 sec and must provide prioritization mechanisms for emergency traffic and notification. As one type of BAN, the HBC must follow this recommendation, too. Existing emergency handling methods in BAN are based on the carrier sensing capability on radio frequencies to detect the status of channels. However, PHY protocol in HBC does not provide the carrier sensing. So the previous methods are not well suitable for HBC directly. Additionally, in the environment that the emergency rate is very low, the allocation of dedicated slot(s for emergency in each superframe is very wasteful. In this work, we proposed specific emergency handling operation for human body communication's medium access control (HBC-MAC protocol to meet the emergency requirements for BAN. We also showed the optimal number of emergency slots for the various combinations of beacon intervals and emergency rates.

  20. Some Protocols For Optical-Fiber Digital Communications

    Science.gov (United States)

    Yeh, Cavour; Gerla, Mario

    1989-01-01

    One works best in heavy traffic, another, in light traffic. Three protocols proposed for digital communications among stations connected by passive taps to pair of uni-directional optical-fiber buses. Mediate round-robin, bounded-delay access to buses by all stations and particularly suited to fast transmission. Partly because transmission medium passive (no relay stations) and partly because protocols distribute control of network among all stations with provision for addition and deletion of stations (no control stations), communication network able to resist and recover from failures. Implicit token propagates in one direction on one bus and in opposite direction on other bus, minimizing interval of silence between end of one round and beginning of next.

  1. Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue

    Science.gov (United States)

    Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban

    2017-12-01

    Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.

  2. Development of Information Assurance Protocol for Low Bandwidth Nanosatellite Communications

    Science.gov (United States)

    2017-09-01

    14. SUBJECT TERMS commercial off-the-shelf technology , nanosatellites, CubeSat, encrypted communications 15. NUMBER OF PAGES 161 16. PRICE...integrate with several physical layer technologies . While this protocol does provide some additional functionality at a lower cost, it is limited to...G. S. Vernam, “Secret signaling system.” U.S. Patent U.S. 1310719 A, 22 July 1919. [22] D. Kahn, Codebreakers: The Story of Secret Writing, New

  3. Streetlight Control System Based on Wireless Communication over DALI Protocol

    Science.gov (United States)

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-01-01

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed. PMID:27128923

  4. Streetlight Control System Based on Wireless Communication over DALI Protocol

    Directory of Open Access Journals (Sweden)

    Francisco José Bellido-Outeiriño

    2016-04-01

    Full Text Available Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed.

  5. Keyboard with Universal Communication Protocol Applied to CNC Machine

    Directory of Open Access Journals (Sweden)

    Mejía-Ugalde Mario

    2014-04-01

    Full Text Available This article describes the use of a universal communication protocol for industrial keyboard based microcontroller applied to computer numerically controlled (CNC machine. The main difference among the keyboard manufacturers is that each manufacturer has its own programming of source code, producing a different communication protocol, generating an improper interpretation of the function established. The above results in commercial industrial keyboards which are expensive and incompatible in their connection with different machines. In the present work the protocol allows to connect the designed universal keyboard and the standard keyboard of the PC at the same time, it is compatible with all the computers through the communications USB, AT or PS/2, to use in CNC machines, with extension to other machines such as robots, blowing, injection molding machines and others. The advantages of this design include its easy reprogramming, decreased costs, manipulation of various machine functions and easy expansion of entry and exit signals. The results obtained of performance tests were satisfactory, because each key has the programmed and reprogrammed facility in different ways, generating codes for different functions, depending on the application where it is required to be used.

  6. An XML-based communication protocol for accelerator distributed controls

    International Nuclear Information System (INIS)

    Catani, L.

    2008-01-01

    This paper presents the development of XMLvRPC, an RPC-like communication protocol based, for this particular application, on the TCP/IP and XML (eXtensible Markup Language) tools built-in in LabVIEW. XML is used to format commands and data passed between client and server while socket interface for communication uses either TCP or UDP transmission protocols. This implementation extends the features of these general purpose libraries and incorporates solutions that might provide, with limited modifications, full compatibility with well established and more general communication protocol, i.e. XML-RPC, while preserving portability to different platforms supported by LabVIEW. The XMLvRPC suite of software has been equipped with specific tools for its deployment in distributed control systems as, for instance, a quasi-automatic configuration and registration of the distributed components and a simple plug-and-play approach to the installation of new services. Key feature is the management of large binary arrays that allow coding of large binary data set, e.g. raw images, more efficiently with respect to the standard XML coding

  7. An XML-based communication protocol for accelerator distributed controls

    Energy Technology Data Exchange (ETDEWEB)

    Catani, L. [INFN-Roma Tor Vergata, Rome (Italy)], E-mail: luciano.catani@roma2.infn.it

    2008-03-01

    This paper presents the development of XMLvRPC, an RPC-like communication protocol based, for this particular application, on the TCP/IP and XML (eXtensible Markup Language) tools built-in in LabVIEW. XML is used to format commands and data passed between client and server while socket interface for communication uses either TCP or UDP transmission protocols. This implementation extends the features of these general purpose libraries and incorporates solutions that might provide, with limited modifications, full compatibility with well established and more general communication protocol, i.e. XML-RPC, while preserving portability to different platforms supported by LabVIEW. The XMLvRPC suite of software has been equipped with specific tools for its deployment in distributed control systems as, for instance, a quasi-automatic configuration and registration of the distributed components and a simple plug-and-play approach to the installation of new services. Key feature is the management of large binary arrays that allow coding of large binary data set, e.g. raw images, more efficiently with respect to the standard XML coding.

  8. Streetlight Control System Based on Wireless Communication over DALI Protocol.

    Science.gov (United States)

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-04-27

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed.

  9. MATLAB Simulation of RFID Communication Protocol for Sensor Data Acquisition

    Directory of Open Access Journals (Sweden)

    Soumen GHOSH

    2015-05-01

    Full Text Available Data acquisition processes the sampling and conditioning the signals that measure real world physical conditions such as temperature, pressure, flow etc. and convert the signal into in appropriate format for displaying and transmission to remote end. Now a days RFID i.e. Radio Frequency Identification plays a vital role in Data acquisition system. The present article proposes a smart DAS scheme containing RFID reader and Active tag. The data acquisition system is interfaced with tag through I2C bus. The reader communicates with tag following RFID communication protocol requesting to send the logged data which are refreshed and stored into tag memory periodically. The communication is simulated using MATLAB software successfully.

  10. Emulation Platform for Cyber Analysis of Wireless Communication Network Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Van Leeuwen, Brian P. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Eldridge, John M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Wireless networking and mobile communications is increasing around the world and in all sectors of our lives. With increasing use, the density and complexity of the systems increase with more base stations and advanced protocols to enable higher data throughputs. The security of data transported over wireless networks must also evolve with the advances in technologies enabling more capable wireless networks. However, means for analysis of the effectiveness of security approaches and implementations used on wireless networks are lacking. More specifically a capability to analyze the lower-layer protocols (i.e., Link and Physical layers) is a major challenge. An analysis approach that incorporates protocol implementations without the need for RF emissions is necessary. In this research paper several emulation tools and custom extensions that enable an analysis platform to perform cyber security analysis of lower layer wireless networks is presented. A use case of a published exploit in the 802.11 (i.e., WiFi) protocol family is provided to demonstrate the effectiveness of the described emulation platform.

  11. The intergroup protocols: Scalable group communication for the internet

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo [Univ. of California, Santa Barbara, CA (United States)

    2000-12-04

    Reliable group ordered delivery of multicast messages in a distributed system is a useful service that simplifies the programming of distributed applications. Such a service helps to maintain the consistency of replicated information and to coordinate the activities of the various processes. With the increasing popularity of the Internet, there is an increasing interest in scaling the protocols that provide this service to the environment of the Internet. The InterGroup protocol suite, described in this dissertation, provides such a service, and is intended for the environment of the Internet with scalability to large numbers of nodes and high latency links. The InterGroup protocols approach the scalability problem from various directions. They redefine the meaning of group membership, allow voluntary membership changes, add a receiver-oriented selection of delivery guarantees that permits heterogeneity of the receiver set, and provide a scalable reliability service. The InterGroup system comprises several components, executing at various sites within the system. Each component provides part of the services necessary to implement a group communication system for the wide-area. The components can be categorized as: (1) control hierarchy, (2) reliable multicast, (3) message distribution and delivery, and (4) process group membership. We have implemented a prototype of the InterGroup protocols in Java, and have tested the system performance in both local-area and wide-area networks.

  12. Evaluating nuclear communications

    International Nuclear Information System (INIS)

    Middlemiss, Nigel

    1998-01-01

    Full text: Information is power, and no-one is more powerful than the media in affecting and reflecting attitudes and opinion. The media influences the way people vote, buy and think, not least those who are the nuclear industry's stakeholders. Capturing the impact of the media is essential if management and communicators in the nuclear business are to measure their performance, consider their options and plan for the future. Multiple studies have shown a strong correlation between what the media reports and what the public believes. For years market researchers have understood this important correlation. They have tried to analyse individual stories from clipping services, but found it slow and incomplete. Until recently the principal way of measuring public perception and media impact was by polling individuals in labour-intensive and expensive opinion surveys, focus groups and depth interviews. Today, with sophisticated computer programmes a new way to measure trends in media coverage and therefore public opinion has been developed - one that gives faster, and more complete, research intelligence. By analysing hundreds, or even thousands of news and opinion pieces, and by putting them into a meaningful context, a wealth of information can be gained for tactical and strategic purposes. The cumulative effect of taking a snapshot of perceptions and then overlaying information over time makes it even more powerful. Trends can be identified, and opportunities for improvements in communications strategy determined. Examples will be given of the effective use of media analysis in the nuclear and environmental arenas, where organisations and their communicators face particularly strong challenges, including hostile campaigning by pressure groups, e.g.: - how die-out of an issue for the European paper industry followed introduction of a Producer Responsibility campaign; - how nuclear industry items moved up and down the media agenda in the context of opening a major new

  13. Eavesdropping on the two-way quantum communication protocols with invisible photons

    Energy Technology Data Exchange (ETDEWEB)

    Cai Qingyu [State Key Laboratory of Magnetics Resonance and Atomic and Molecular Physics, Wuhan Institution of Physics and Mathematics, Chinese Academy of Sciences, Wuhan 430071 (China)]. E-mail: qycai@wipm.ac.cn

    2006-02-20

    The crucial issue of quantum communication protocol is its security. In this Letter, we show that all the deterministic and direct two-way quantum communication protocols, sometimes called ping-pong (PP) protocols, are insecure when an eavesdropper uses the invisible photon to eavesdrop on the communication. With our invisible photon eavesdropping (IPE) scheme, the eavesdropper can obtain full information of the communication with zero risk of being detected. We show that this IPE scheme can be implemented experimentally with current technology. Finally, a possible improvement of PP communication protocols security is proposed00.

  14. Eavesdropping on the two-way quantum communication protocols with invisible photons

    International Nuclear Information System (INIS)

    Cai Qingyu

    2006-01-01

    The crucial issue of quantum communication protocol is its security. In this Letter, we show that all the deterministic and direct two-way quantum communication protocols, sometimes called ping-pong (PP) protocols, are insecure when an eavesdropper uses the invisible photon to eavesdrop on the communication. With our invisible photon eavesdropping (IPE) scheme, the eavesdropper can obtain full information of the communication with zero risk of being detected. We show that this IPE scheme can be implemented experimentally with current technology. Finally, a possible improvement of PP communication protocols security is proposed

  15. Evaluation and Communication: Using a Communication Audit to Evaluate Organizational Communication

    Science.gov (United States)

    Hogard, Elaine; Ellis, Roger

    2006-01-01

    This article identifies a surprising dearth of studies that explicitly link communication and evaluation at substantive, theoretical, and methodological levels. A three-fold typology of evaluation studies referring to communication is proposed and examples given. The importance of organizational communication in program delivery is stressed and…

  16. A Review of Communications Protocol for Intelligent Remote Terminal Unit Development

    Directory of Open Access Journals (Sweden)

    Mohd Ruddin Ab. Ghani

    2013-11-01

    Full Text Available This paper reviewed all the possible interfacing communication protocols for remote terminal unit (RTU. Supervisory Control and Data Acquisition (SCADA system is a central station that can communicate with other network using the protocol. Fundamentally, the architectures of all networks are based on the seven layers of open system interconnection (OSI and International Standard Organization (ISO. The objective of designing the protocols is to check the status of all the input and output field devices and send the report according to that status. The corresponding protocol and communication parameters between the connecting devices will be included in designing a complex SCADA system. The available protocols to develop the communication of RTU are Modbus/ASCII, distributed network protocol (DNP3, controller area network (CAN, International Electro-technical Commission (IEC 60870, transmission control protocol/internet protocol (TCP/IP.

  17. Development of a standard communication protocol for an emergency situation management in nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Man Cheol, E-mail: charleskim@kaeri.re.k [Integrated Risk Assessment Center, Korea Atomic Energy Research Institute, 150, Deokjin-dong, Yuseong-gu, Daejeon 305-353 (Korea, Republic of); Park, Jinkyun; Jung, Wondea [Integrated Risk Assessment Center, Korea Atomic Energy Research Institute, 150, Deokjin-dong, Yuseong-gu, Daejeon 305-353 (Korea, Republic of); Kim, Hanjeom; Kim, Yoon Joong [YGN Nuclear Power Division Training Center, Korea Hydro and Nuclear Power Company, 517 Kyemari, Hongnong-eup, Yeongkwang-gun, Chonnam 513-880 (Korea, Republic of)

    2010-06-15

    Correct communication between main control room (MCR) operators is an important factor in the management of emergency situations in nuclear power plants (NPPs). For this reason, a standard communication protocol for the management of emergency situations in NPPs has been developed, with the basic direction of enhancing the safety of NPPs and the standardization of communication protocols. To validate the newly developed standard communication protocol, validation experiments with 10 licensed NPP MCR operator teams was performed. From the validation experiments, it was found that the use of the standard communication protocol required more time, but it can contribute to the enhancement of the safety of NPPs by an operators' better grasp of the safety-related parameters and a more efficient and clearer communication between NPP operators, while imposing little additional workloads on the NPP MCR operators. The standard communication protocol is expected to be used to train existing NPP MCR operators without much aversion, as well as new operators.

  18. Evaluation criteria for communications-related corrective action plans

    International Nuclear Information System (INIS)

    1997-02-01

    This document provides guidance and criteria for US Nuclear Regulatory Commission (NRC) personnel to use in evaluating corrective action plans for nuclear power plant communications. The document begins by describing the purpose, scope, and applicability of the evaluation criteria. Next, it presents background information concerning the communication process, root causes of communication errors, and development and implementation of corrective actions. The document then defines specific criteria for evaluating the effectiveness of the corrective action plan, interview protocols, and an observation protocol related to communication processes. This document is intended only as guidance. It is not intended to have the effect of a regulation, and it does not establish any binding requirements or interpretations of NRC regulations

  19. Validation of IT-based Data Communication Protocol for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Jeong, K. I.; Kim, D. H.; Lee, J. C.

    2009-12-01

    The communication network designed to transmit control and processing signals in digital Instrument and Control (I and C) systems in Nuclear Power Plant (NPP), should provide a high level of safety and reliability. There are different features between the communication networks of NPPs and other commercial communication networks. Safety and reliability are the most important factors in the communication networks of an NPP rather than efficiency which are important factors of a commercial communication network design. To develop Data Communication Protocol for Nuclear Power Plant, We analyze the design criteria and performance requirements of existing commercial communication protocols based on Information Technology(IT). And also, we examine the adaptability to the communication protocol of an NPP. Based on these results, we developed our own protocol(Nuclear power plant Safety Communication Protocol : NSCP) for NPP I and C, which meet the required specifications through design overall protocol architecture and data frame format, definition of functional requirements and specifications. NSCP is the communication protocol designed for a safety-grade control network in the nuclear power plant. In this report, we had specified NSCP protocol by FDT(Formal Description Technique) and established validation procedures based on the validation methodology. It was confirmed specification error, major function's validity and reachability of NSCP by performing simulation and the validation process using Telelogic Tau tool

  20. Data acquisition and meter unit based in wifi communication protocol

    Directory of Open Access Journals (Sweden)

    Gerardo Cázarez Ayala

    2012-05-01

    Full Text Available Without doubt, the competitive fast rhythm of the industries is one of the main causes helped bring to the accelerated growth of the electronic technology and the communication. The need to develop new products with a best quality, cheaper and faster as assure and increase the quality of the products in the international markets, requires of new technologies to the metering, monitoring and control of their production processes, of which finality is to improve the processes to guaranteed their products in the market in the less time possible, the best quality and low cost for the final consumer. This work is based in the design and implementation of a Wireless Data Acquisition Unit based in WiFi protocol, which is oriented to meter, monitoring and the control of processes in the industry, commercial and the home automation applications, using one of the wirelessprotocols with the biggest acceptance in the market, with the main objective of to take advantage of the installed physical infrastructure in the place of the application, like industry, company or house. The Unit is based in the RN-131G, a Roving Network company module, which is able to work in stand-alone mode with ultralow power consummation and supporting the IEEE 802.11b/g protocols, in which is possible to achieve transfer rates of up to 11 Mbps and 54 Mbps in /b & /g specifications respectively. Whit this unit is possible to meter up to 5 analogs signals with 14 bits precision and has include a temperature and relative humidity sensors. This unit can meter two digital signals and act mean two digitals outputs, and gas include an USB port for communication and programming tasks.

  1. RSComPro: An Open Communication Protocol for Remote Sensing Systems

    DEFF Research Database (Denmark)

    Vasiljevic, Nikola; Trujillo, Juan-José

    The remote sensing protocol (RSComPro) is a communication protocol, which has been developed for controlling multiple remote sensing systems simultaneously through a UDP/IP and TPC/IP network. This protocol is meant to be open to the remote sensing community. The scope is the implementation of so...

  2. QoS-aware self-adaptation of communication protocols in a pervasive service middleware

    DEFF Research Database (Denmark)

    Zhang, Weishan; Hansen, Klaus Marius; Fernandes, João

    2010-01-01

    Pervasive computing is characterized by heterogeneous devices that usually have scarce resources requiring optimized usage. These devices may use different communication protocols which can be switched at runtime. As different communication protocols have different quality of service (Qo......S) properties, this motivates optimized self-adaption of protocols for devices, e.g., considering power consumption and other QoS requirements, e.g. round trip time (RTT) for service invocations, throughput, and reliability. In this paper, we present an extensible approach for self-adaptation of communication...... protocols for pervasive web services, where protocols are designed as reusable connectors and our middleware infrastructure can hide the complexity of using different communication protocols to upper layers. We also propose to use Genetic Algorithms (GAs) to find optimized configurations at runtime...

  3. A communication protocol for mobile satellite systems affected by rain attenuation

    Science.gov (United States)

    Lay, Norman; Dessouky, Khaled

    1992-01-01

    A communication protocol is described that has been developed as part of a K/Ka-band mobile terminal breadboard system to be demonstrated through NASA's Advanced Communications Technology Satellite (ACTS) in 1993. The protocol is aimed at providing the means for enhancing link availability and continuity by supporting real-time data rate selection and changes during rain events. Particular attention is given to the system architecture; types of links, connections, and packets; the protocol procedures; and design rationales.

  4. Power-Efficient Communication Protocol for Integrated WWAN and WLAN

    Directory of Open Access Journals (Sweden)

    Golmie Nada

    2008-01-01

    Full Text Available Abstract One of the most impending requirements to support a seamless communication environment in heterogeneous wireless networks comes from the limited power supply of small-size and low-cost mobile terminals as in stand-alone WLANs or cellular networks. Thus, it is a challenge to design new techniques so that mobile terminals are able to not only maintain their active connection as they move across different types of wireless networks, but also minimize their power consumption. There have been several efforts aimed at having mobile devices equipped with multiple interfaces connect optimally to the access network that minimizes their power consumption. However, a study of existing schemes for WLAN notes that in the idle state, a device with both a WLAN and a WWAN interface needs to keep both interfaces on in order to receive periodic beacon messages from the access point (AP: WLAN and downlink control information from the base station (WWAN, resulting in significant power consumption. Therefore, in this paper, we propose a power-efficient communication protocol (PCP that includes turning off the WLAN interface after it enters the idle state and using the paging channel of WWAN in order to wake up the WLAN interface when there is incoming long-lived multimedia data. This scheme is known to limit the power consumption, while at the same time, it makes use of the paging channel in cellular networks. Further, our proposed scheme is designed to avoid repeatedly turning on and off WLAN interfaces, that consumes a significant amount of power. We propose turning on the WLAN interface when the number of packets in the radio network controller (RNC's buffer reaches a certain threshold level. The tradeoffs between the power saving and the number of packets dropped at the buffer are investigated analytically through the study of an on/off traffic model. Simulation results for scenarios of interest are also provided.

  5. Power-Efficient Communication Protocol for Integrated WWAN and WLAN

    Directory of Open Access Journals (Sweden)

    SuKyoung Lee

    2008-01-01

    Full Text Available One of the most impending requirements to support a seamless communication environment in heterogeneous wireless networks comes from the limited power supply of small-size and low-cost mobile terminals as in stand-alone WLANs or cellular networks. Thus, it is a challenge to design new techniques so that mobile terminals are able to not only maintain their active connection as they move across different types of wireless networks, but also minimize their power consumption. There have been several efforts aimed at having mobile devices equipped with multiple interfaces connect optimally to the access network that minimizes their power consumption. However, a study of existing schemes for WLAN notes that in the idle state, a device with both a WLAN and a WWAN interface needs to keep both interfaces on in order to receive periodic beacon messages from the access point (AP: WLAN and downlink control information from the base station (WWAN, resulting in significant power consumption. Therefore, in this paper, we propose a power-efficient communication protocol (PCP that includes turning off the WLAN interface after it enters the idle state and using the paging channel of WWAN in order to wake up the WLAN interface when there is incoming long-lived multimedia data. This scheme is known to limit the power consumption, while at the same time, it makes use of the paging channel in cellular networks. Further, our proposed scheme is designed to avoid repeatedly turning on and off WLAN interfaces, that consumes a significant amount of power. We propose turning on the WLAN interface when the number of packets in the radio network controller (RNC's buffer reaches a certain threshold level. The tradeoffs between the power saving and the number of packets dropped at the buffer are investigated analytically through the study of an on/off traffic model. Simulation results for scenarios of interest are also provided.

  6. New approach to enhance and evaluate the performance of vehicle-infrastructure integration and its communication systems, final report.

    Science.gov (United States)

    2010-09-01

    Initial research studied the use of wireless local area networks (WLAN) protocols in Inter-Vehicle Communications : (IVC) environments. The protocols performance was evaluated in terms of measuring throughput, jitter time and : delay time. This re...

  7. Evaluation protocol for amusia: Portuguese sample.

    Science.gov (United States)

    Peixoto, Maria Conceição; Martins, Jorge; Teixeira, Pedro; Alves, Marisa; Bastos, José; Ribeiro, Carlos

    2012-12-01

    Amusia is a disorder that affects the processing of music. Part of this processing happens in the primary auditory cortex. The study of this condition allows us to evaluate the central auditory pathways. To explore the diagnostic evaluation tests of amusia. The authors propose an evaluation protocol for patients with suspected amusia (after brain injury or complaints of poor musical perception), in parallel with the assessment of central auditory processing, already implemented in the department. The Montreal Evaluation of Battery of amusia was the basis for the selection of the tests. From this comprehensive battery of tests we selected some of the musical examples to evaluate different musical aspects, including memory and perception of music, ability concerning musical recognition and discrimination. In terms of memory there is a test for assessing delayed memory, adapted to the Portuguese culture. Prospective study. Although still experimental, with the possibility of adjustments in the assessment, we believe that this assessment, combined with the study of central auditory processing, will allow us to understand some central lesions, congenital or acquired hearing perception limitations.

  8. A case for evaluating sensor network protocols concurrently

    KAUST Repository

    Gnawali, Omprakash; Guibas, Leonidas; Levis, Philip

    2010-01-01

    Researchers typically evaluate and compare protocols on the testbeds by running them one at a time. This methodology ignores the variation in link qualities and wireless environment across these experiments. These variations can introduce significant noise in the results. Evaluating two protocols concurrently, however, suffers from inter-protocol interactions. These interactions can perturb performance even under very light load, especially timing and timing sensitive protocols. We argue that the benefits of running protocols concurrently greatly outweigh the disadvantages. Protocols rarely run in isolation in real networks, and so considering such interactions is valuable. Although the wireless environment is still uncontrolled, concurrent evaluations make comparisons fair and more statistically sound. Through experiments on two testbeds, we make the case for evaluating and comparing low data-rate sensor network protocols by running them concurrently. Copyright 2010 ACM.

  9. Eavesdropping on the Bostroem-Filbinger Communication Protocol in Noisy Quantum Channel

    OpenAIRE

    Cai, Qing-yu

    2004-01-01

    We show an eavesdropping scheme on Bostr\\UNICODE{0xf6}m-Felbinger communication protocol (called ping-pong protocol) [Phys. Rev. Lett. 89, 187902 (2002)] in an ideal quantum channel. A measurement attack can be perfectly used to eavesdrop Alice's information instead of a most general quantum operation attack. In a noisy quantum channel, the direct communication is forbidden. We present a quantum key distribution protocol based on the ping-pong protocol, which can be used in a low noisy quantu...

  10. SDL-Based Protocol Validation for the Integrated Safety Communication Network in Nuclear Power Plants

    International Nuclear Information System (INIS)

    Kim, Jung-hun; Kim, Dong-hoon; Lee, Dong-young; Park, Sung-woo

    2006-01-01

    The communication protocol in nuclear power plants needs to be validated systematically to avoid the critical situation that may be caused by its own faults. We establish the methodology to validate the protocol designed for the Integrated Safety Communication Networks (ISCN) of Korea Nuclear Instrumentation and Control System (KNICS). The ISCN protocol is specified using the formal description technique called the SDL. The validation of ISCN protocol is done via the Simulator and Validator, both of which are main functions provided by the SDL

  11. Carboplatin hypersensitivity: evaluation and successful desensitization protocol.

    Science.gov (United States)

    Bruchim, Ilan; Goldberg, Arnon; Fishman, Ami; Confino-Cohen, Ronit

    2014-01-01

    Carboplatin-induced immediate hypersensitivity reactions are relatively common among patients with gynecological malignancies. Once this occurs, the patient might be at risk for future carboplatin-induced reactions. This study evaluated the efficacy of allergic consultation, carboplatin skin testing and desensitization as a single intervention strategy in this population. Patients with a well-documented immediate reaction to carboplatin were offered allergy consultation, carboplatin skin testing and a desensitization plan in a single visit between scheduled chemotherapy sessions. Fifty-five patients with an immediate reaction were evaluated. After allergist assessment, 44 (89%) of 49 patients skin tested had a positive result. A total of 207 carboplatin desensitization cycles were administered to 49 women. Among them, 10 patients had a mild immediate hypersensitivity reaction during desensitization. Five patients subsequently tolerated carboplatin administered in the prolonged desensitization protocol. In the data presented, we propose a strategy that is both cost effective and very convenient for the patient. The diagnostic procedure, including allergist consultation and skin test, can be completed in less than 2 h. In most cases where carboplatin is indispensable, desensitization can be administered without overnight hospitalization.

  12. Cancer patients' evaluation of communication

    DEFF Research Database (Denmark)

    Ross, Lone; Petersen, Morten Aagaard; Johnsen, Anna Thit

    2013-01-01

    The aims of this study were to assess how communication with health care staff is perceived by Danish cancer patients and to characterise those patients who report problems in communication.......The aims of this study were to assess how communication with health care staff is perceived by Danish cancer patients and to characterise those patients who report problems in communication....

  13. Protocol converter for serial communication between digital rectifier controllers and a power plant SCADA system

    Directory of Open Access Journals (Sweden)

    Vukić Vladimir Đ.

    2016-01-01

    Full Text Available The paper describes the protocol converter INT-485-MBRTU, developed for serial communication between the thyristor rectifier (based on the proprietary protocol "INT-CPD-05", according to standard RS-485 and the SCADA system (based on protocol "Modbus RTU", of the same standard in the thermal power plant "Nikola Tesla B1". Elementary data on industrial communication protocols and communication gateways were provided. The basic technical characteristics of the "Omron" programmable logic controller CJ series were described, as well as the developed device INT-485-MBRTU. Protocol converters with two versions of communication software were tested, differing only in one control word, intended for a forced successive change of communication sequences, in opposite to automatic sequence relieve. The device iNT-485-MBRTU, with the program for forced successive change of communication sequences, demonstrated the reliability of data transfer of 100 %, in a sample of approximately 480 messages. For nearly the same sample, the same protocol converter, with a version of the program without any type of message identifiers, transferred less than 60 % of the foreseen data. During multiple sixty-hour tests, the reliability of data transfer of at least 99.9979% was recorded, in 100% of the analysed cases, and for a sample of nearly 96,000 pairs of the send and receive messages. We analysed the results and estimated the additional possibilities for application of the INT-485-MBRTU protocol converter.

  14. Communicating systems with UML 2 modeling and analysis of network protocols

    CERN Document Server

    Barrera, David Garduno

    2013-01-01

    This book gives a practical approach to modeling and analyzing communication protocols using UML 2. Network protocols are always presented with a point of view focusing on partial mechanisms and starting models. This book aims at giving the basis needed for anybody to model and validate their own protocols. It follows a practical approach and gives many examples for the description and analysis of well known basic network mechanisms for protocols.The book firstly shows how to describe and validate the main protocol issues (such as synchronization problems, client-server interactions, layer

  15. Are wearable devices ready for HTTPS? Measuring the cost of secure communication protocols on wearable devices

    OpenAIRE

    Kolamunna, Harini; Chauhan, Jagmohan; Hu, Yining; Thilakarathna, Kanchana; Perino, Diego; Makaroff, Dwight; Seneviratne, Aruna

    2016-01-01

    The majority of available wearable devices require communication with Internet servers for data analysis and storage, and rely on a paired smartphone to enable secure communication. However, wearable devices are mostly equipped with WiFi network interfaces, enabling direct communication with the Internet. Secure communication protocols should then run on these wearables itself, yet it is not clear if they can be efficiently supported. In this paper, we show that wearable devices are ready for...

  16. Engaging evaluation research: Reflecting on the process of sexual assault/domestic violence protocol evaluation research

    Directory of Open Access Journals (Sweden)

    Mavis Morton

    2014-06-01

    Full Text Available In keeping within the theme of CU Expo 2013, ‘Engaging Shared Worlds’, this case study examines and reflects on a complex community-university partnership which developed to conceptualise, design, conduct and communicate evaluation research on one community’s sexual assault and domestic violence protocol. As community-university partners coming together for the first time, we reflect on the purpose of our engagement, the characteristics and principles which define our partnership and our potential to teach graduate students how to undertake community-engaged scholarship. Keywords: Community-engaged research, evaluation research, complex community-university partnerships, scholarship of engagement, practice research

  17. A two-step quantum secure direct communication protocol with hyperentanglement

    International Nuclear Information System (INIS)

    Gu Bin; Zhang Cheng-Yi; Huang Yu-Gai; Fang Xia

    2011-01-01

    We propose a two-step quantum secure direct communication (QSDC) protocol with hyperentanglement in both the spatial-mode and the polarization degrees of freedom of photon pairs which can in principle be produced with a beta barium borate crystal. The secret message can be encoded on the photon pairs with unitary operations in these two degrees of freedom independently. This QSDC protocol has a higher capacity than the original two-step QSDC protocol as each photon pair can carry 4 bits of information. Compared with the QSDC protocol based on hyperdense coding, this QSDC protocol has the immunity to Trojan horse attack strategies with the process for determining the number of the photons in each quantum signal as it is a one-way quantum communication protocol. (general)

  18. The impact of the Family Communication Coordinator (FCC) Protocol on the role stress of hospital chaplains.

    Science.gov (United States)

    Dodd-McCue, Diane; Tartaglia, Alexander

    2005-01-01

    The Family Communication Coordinator (FCC) Protocol was implemented to provide early family intervention and to facilitate effective communications during potential organ donation cases. Previous studies found the Protocol associated with improved donor outcome measures and with reduced role stress for ICU nurses caring for potential donors. The present study examines the impact of the Protocol on the perceived role stress of hospital chaplains serving as FCCs. All hospital chaplains serving as FCCs at an academic teaching hospital were surveyed. Their perceptions of job dimensions, role stress, job satisfaction, and commitment were measured; interviews and secondary data supplemented the surveys. The findings demonstrate that the FCC Protocol is associated with improved role stress, specifically role ambiguity and role conflict, among hospital chaplains serving as FCCs. Additionally, the findings suggest that satisfaction with the Protocol may be associated with experience with the Protocol.

  19. Study, design and realization of a fault-tolerant and predictable synchronous communication protocol on off-the-shelf components

    International Nuclear Information System (INIS)

    Chabrol, D.

    2006-06-01

    This PhD thesis contributes to the design and realization of safety-critical real-time systems on multiprocessor architectures with distributed memory. They are essential to compute systems that have to ensure complex and critical functions. This PhD thesis deals with communication media management. The communication management conditions strongly the capability of the system to fulfill the timeliness property and the dependability requirements. Our contribution includes: - The design of predictable and fault-tolerant synchronous communication protocol; - The study and the definition of the execution model to have a efficient and safe communications management; - The proposal of a method to generate automatically the communications scheduling. Our approach is based on a communication model that allows the analysis of the feasibility, before execution, of a distributed safe-critical real-time system with timeliness and safety requirements. This leads to the definition of an execution model based on a time-triggered and parallel communication management. A set of linear constraints system is generated automatically to compute the network scheduling and the network load with timeliness fulfillment. Then, the proposed communication interface is based on an advanced version of TDMA protocol which allows to use proprietary components (TTP, FlexRay) as well as standard components (Ethernet). The concepts presented in this thesis lead to the realisation and evaluation of a prototype within the framework of the OASIS project done at the CEA/List. (author)

  20. A Protocol for Bidirectional Quantum Secure Communication Based on Genuine Four-Particle Entangled States

    International Nuclear Information System (INIS)

    Gao Gan; Wang Liping

    2010-01-01

    By swapping the entanglement of genuine four-particle entangled states, we propose a bidirectional quantum secure communication protocol. The biggest merit of this protocol is that the information leakage does not exist. In addition, the ideas of the 'two-step' transmission and the block transmission are employed in this protocol. In order to analyze the security of the second sequence transmission, decoy states are used. (general)

  1. Communication protocol in chassis detecting wireless transmission system based on WiFi

    Science.gov (United States)

    In chassis detecting wireless transmission system, the wireless network communication protocol plays a key role in the information exchange and synchronization between the host and chassis PDA. This paper presents a wireless network transmission protocol based on TCP/IP which makes the rules of info...

  2. Design and Analysis of Transport Protocols for Reliable High-Speed Communications

    NARCIS (Netherlands)

    Oláh, A.

    1997-01-01

    The design and analysis of transport protocols for reliable communications constitutes the topic of this dissertation. These transport protocols guarantee the sequenced and complete delivery of user data over networks which may lose, duplicate and reorder packets. Reliable transport services are

  3. End-to-end Configuration of Wireless Realtime Communication over Heterogeneous Protocols

    DEFF Research Database (Denmark)

    Malinowsky, B.; Grønbæk, Jesper; Schwefel, Hans-Peter

    2015-01-01

    This paper describes a wireless real-time communication system design using two Time Division Multiple Access (TDMA) protocols. Messages are subject to prioritization and queuing. For this interoperation scenario, we show a method for end-to-end configuration of protocols and queue sizes. Such co...

  4. An Evaluation Methodology for Protocol Analysis Systems

    Science.gov (United States)

    2007-03-01

    Main Memory Requirement NS: Needham-Schroeder NSL: Needham-Schroeder-Lowe OCaml : Objective Caml POSIX: Portable Operating System...methodology is needed. A. PROTOCOL ANALYSIS FIELD As with any field, there is a specialized language used within the protocol analysis community. Figure...ProVerif requires that Objective Caml ( OCaml ) be installed on the system, OCaml version 3.09.3 was installed. C. WINDOWS CONFIGURATION OS

  5. Impersonation attack on a quantum secure direct communication and authentication protocol with improvement

    Science.gov (United States)

    Amerimehr, Ali; Hadain Dehkordi, Massoud

    2018-03-01

    We analyze the security of a quantum secure direct communication and authentication protocol based on single photons. We first give an impersonation attack on the protocol. The cryptanalysis shows that there is a gap in the authentication procedure of the protocol so that an opponent can reveal the secret information by an undetectable attempt. We then propose an improvement for the protocol and show it closes the gap by applying a mutual authentication procedure. In the improved protocol single photons are transmitted once in a session, so it is easy to implement as the primary protocol. Furthermore, we use a novel technique for secret order rearrangement of photons by which not only quantum storage is eliminated also a secret key can be reused securely. So the new protocol is applicable in practical approaches like embedded system devices.

  6. DICOM image secure communications with Internet protocols IPv6 and IPv4.

    Science.gov (United States)

    Zhang, Jianguo; Yu, Fenghai; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen

    2007-01-01

    Image-data transmission from one site to another through public network is usually characterized in term of privacy, authenticity, and integrity. In this paper, we first describe a general scenario about how image is delivered from one site to another through a wide-area network (WAN) with security features of data privacy, integrity, and authenticity. Second, we give the common implementation method of the digital imaging and communication in medicine (DICOM) image communication software library with IPv6/IPv4 for high-speed broadband Internet by using open-source software. Third, we discuss two major security-transmission methods, the IP security (IPSec) and the secure-socket layer (SSL) or transport-layer security (TLS), being used currently in medical-image-data communication with privacy support. Fourth, we describe a test schema of multiple-modality DICOM-image communications through TCP/IPv4 and TCP/IPv6 with different security methods, different security algorithms, and operating systems, and evaluate the test results. We found that there are tradeoff factors between choosing the IPsec and the SSL/TLS-based security implementation of IPv6/IPv4 protocols. If the WAN networks only use IPv6 such as in high-speed broadband Internet, the choice is IPsec-based security. If the networks are IPv4 or the combination of IPv6 and IPv4, it is better to use SSL/TLS security. The Linux platform has more security algorithms implemented than the Windows (XP) platform, and can achieve better performance in most experiments of IPv6 and IPv4-based DICOM-image communications. In teleradiology or enterprise-PACS applications, the Linux operating system may be the better choice as peer security gateways for both the IPsec and the SSL/TLS-based secure DICOM communications cross public networks.

  7. Attacks to Cryptography Protocols of Wireless Industrial Communication Systems

    Directory of Open Access Journals (Sweden)

    Tomas Ondrasina

    2010-01-01

    Full Text Available The paper deals with problems of safety and security principles within wireless industrial communication systems. First safety requirements to wireless industrial communication system, summarisation of attack methods and the available measures for risks elimination are described with orientation to safety critical applications. The mainly part is oriented to identification of risks and summarisation of defensive methods of wireless communication based on cryptographic techniques. Practical part the cryptoanalytic’s attacks to COTS (Commercial Off-The-Shelf wireless communications are mentioned based on the IEEE 802.11 standards.

  8. Development of high-reliable real-time communication network protocol for SMART

    Energy Technology Data Exchange (ETDEWEB)

    Song, Ki Sang; Kim, Young Sik [Korea National University of Education, Chongwon (Korea); No, Hee Chon [Korea Advanced Institute of Science and Technology, Taejon (Korea)

    1999-04-01

    In this research, we first define protocol subsets for SMART(System-integrated Modular Advanced Reactor) communication network based on the requirement of SMART MMIS transmission delay and traffic requirements and OSI(Open System Interconnection) 7 layers' network protocol functions. Also, current industrial purpose LAN protocols are analyzed and the applicability of commercialized protocols are checked. For the suitability test, we have applied approximated SMART data traffic and maximum allowable transmission delay requirement. With the simulation results, we conclude that IEEE 802.5 and FDDI which is an ANSI standard, is the most suitable for SMART. We further analyzed the FDDI and token ring protocols for SMART and nuclear plant network environment including IEEE 802.4, IEEE 802.5, and ARCnet. The most suitable protocol for SMART is FDDI and FDDI MAC and RMT protocol specifications have been verified with LOTOS and the verification results show that FDDI MAC and RMT satisfy the reachability and liveness, but does not show deadlock and livelock. Therefore, we conclude that FDDI MAC and RMT is highly reliable protocol for SMART MMIS network. After that, we consider the stacking fault of IEEE 802.5 token ring protocol and propose a fault tolerant MAM(Modified Active Monitor) protocol. The simulation results show that the MAM protocol improves lower priority traffic service rate when stacking fault occurs. Therefore, proposed MAM protocol can be applied to SMART communication network for high reliability and hard real-time communication purpose in data acquisition and inter channel network. (author). 37 refs., 79 figs., 39 tabs.

  9. Verification of the safety communication protocol in train control system using colored Petri net

    International Nuclear Information System (INIS)

    Chen Lijie; Tang Tao; Zhao Xianqiong; Schnieder, Eckehard

    2012-01-01

    This paper deals with formal and simulation-based verification of the safety communication protocol in ETCS (European Train Control System). The safety communication protocol controls the establishment of safety connection between train and trackside. Because of its graphical user interface and modeling flexibility upon the changes in the system conditions, this paper proposes a composition Colored Petri Net (CPN) representation for both the logic and the timed model. The logic of the protocol is proved to be safe by means of state space analysis: the dead markings are correct; there are no dead transitions; being fair. Further analysis results have been obtained using formal and simulation-based verification approach. The timed models for the open transmit system and the application process are created for the purpose of performance analysis of the safety communication protocol. The models describe the procedure of data transmission and processing, and also provide relevant timed and stochastic factors, as well as time delay and lost packet, which may influence the time for establishment of safety connection of the protocol. Time for establishment of safety connection of the protocol in normal state is verified by formal verification, and then time for establishment of safety connection with different probability of lost packet is simulated. After verification it is found that the time for establishment of safety connection of the safety communication protocol satisfies the safety requirements.

  10. Timing Analysis of Rate Constrained Traffic for the TTEthernet Communication Protocol

    DEFF Research Database (Denmark)

    Tamas-Selicean, Domitian; Pop, Paul; Steiner, Wilfried

    2015-01-01

    Ethernet is a low-cost communication solution offering high transmission speeds. Although its applications extend beyond computer networking, Ethernet is not suitable for real-time and safety-critical systems. To alleviate this, several real-time Ethernet-based communication protocols have been...

  11. Application of Modbus communication protocol and float-point display in MCS51 system

    International Nuclear Information System (INIS)

    Kong Xiangcheng; Liu Shaozhen

    2010-01-01

    As its widely opening and easy performance, Modbus communication protocol has a great advantage in field bus using. Details are given on a method to implement Modbus communication protocol based on MCS51 system, and the advantage of uVision integrated environment. The design realizes Modbus RTU mode communication, meanwhile the problem of synchronization in communication is solved. And float-point operation and display are achieved by format print. All of this are carried out under uVision integrated environment. The result approves that the response ratio of Modbus communication is 100%. The design shows the advantage of uVision integrated environment and MCS51 system. And also gives solution to the occasion where communication interface and low cost are required. (authors)

  12. Evaluating Social (Pragmatic) Communication Disorder

    Science.gov (United States)

    Mandy, William; Wang, Adele; Lee, Irene; Skuse, David

    2017-01-01

    Background: Social (pragmatic) communication disorder (SPCD) is a new diagnosis introduced by DSM-5, characterised by problems with verbal and nonverbal social communication. It is currently unclear whether SPCD is a valid diagnostic category, because little is known about the characteristics of those who meet its criteria. We sought to identify…

  13. Promoting communication with older adults: protocols for resolving interpersonal conflicts and for enhancing interactions with doctors.

    Science.gov (United States)

    Weitzman, Patricia Flynn; Weitzman, Eben A

    2003-07-01

    In this paper, we review the importance of effective communication in older adulthood, and ideas for promoting it. We focus on theoretical and applied work in two communicative encounters that have particular relevance for older adult health, i.e., interpersonal conflict and visits with a healthcare provider. Little applied work has aimed to adapt training protocols for older adults in these two areas. We will present training protocols we have developed in constructive conflict resolution for older adults, and on enhancing doctor-patient communication. We present these protocols to stimulate ideas on the part of the reader on how to further develop and refine training efforts for older adults in effective communication.

  14. Secure Handshake in Wi-Fi Connection (A Secure and Enhanced Communication Protocol)

    OpenAIRE

    Ranbir Sinha; Nishant Behar; Devendra Singh

    2012-01-01

    This paper presents a concept of enhancing the security in wireless communication. A Computer Network is an interconnected group of autonomous computing nodes, which use a well-defined, mutually agreed set of rules and conventions known as protocols, interact with one-another meaningfully and allow resource sharing preferably in a predictable and controllable manner. Communication has a major impact on today’s business. It is desired to communicate data with high security. These days wireless...

  15. Evaluation of svr: a wireless sensor network routing protocol

    International Nuclear Information System (INIS)

    Baloch, J.; Khanzada, T.J.S.

    2014-01-01

    The advancement in technology has made it possible to create small in size, low cost sensor nodes. However, the small size and low cost of such nodes comesat at price that is, reduced processing power, low memory and significantly small battery energy storage. WSNs (Wireless Sensor Networks) are inherently ad hoc in nature and are assumed to work in the toughest terrain. The network lifetime plays a pivotal role in a wireless sensor network. A long network lifetime, could be achieved by either making significant changes in these low cost devices, which is not a feasible solution or by improving the means of communication throughout the network. The communication in such networks could be improved by employing energy efficient routing protocols, to route the data throughout the network. In this paper the SVR (Spatial Vector Routing) protocol is compared against the most common WSN routing protocols, and from the results it could be inferred that the SVR protocol out performs its counterparts. The protocol provides an energy efficient means of communication in the network. (author)

  16. Timing Analysis of the FlexRay Communication Protocol

    DEFF Research Database (Denmark)

    Pop, Traian; Pop, Paul; Eles, Petru

    2006-01-01

    FlexRay will very likely become the de-facto standard for in-vehicle communications. However, before it can be successfully used for safety-critical applications that require predictability, timing analysis techniques are necessary for providing bounds for the message communication times....... In this paper, we propose techniques for determining the timing properties of messages transmitted in both the static (ST) and the dynamic (DYN) segments of a FlexRay communication cycle. The analysis techniques for messages are integrated in the context of a holistic schedulability analysis that computes...

  17. A communication protocol for interactively controlling software tools

    NARCIS (Netherlands)

    Wulp, van der J.

    2008-01-01

    We present a protocol for interactively using software tools in a loosely coupled tool environment. Such an environment can assist the user in doing tasks that require the use of multiple tools. For example, it can invoke tools on certain input, set processing parameters, await task completion and

  18. Engaging patients and families in communication across transitions of care: an integrative review protocol.

    Science.gov (United States)

    Bucknall, Tracey K; Hutchinson, Alison M; Botti, Mari; McTier, Lauren; Rawson, Helen; Hewitt, Nicky A; McMurray, Anne; Marshall, Andrea P; Gillespie, Brigid M; Chaboyer, Wendy

    2016-07-01

    To describe an integrative review protocol to analyse and synthesize peer-reviewed research evidence in relation to engagement of patients and their families in communication during transitions of care to, in and from acute care settings. Communication at transitions of care in acute care settings can be complex and challenging, with important information about patients not always clearly transferred between responsible healthcare providers. Involving patients and their families in communication during transitions of care may improve the transfer of clinical information and patient outcomes and prevent adverse events during hospitalization and following discharge. Recently, optimizing patient and family participation during care transitions has been acknowledged as central to the implementation of patient-centred care. Integrative review with potential for meta-analysis and application of framework synthesis. The review will evaluate and synthesize qualitative and quantitative research evidence identified through a systematic search. Primary studies will be selected according to inclusion criteria. Data collection, quality appraisal and analysis of the evidence will be conducted by at least two authors. Nine electronic databases (including CINAHL and Medline) will be searched. The search will be restricted to 10 years up to December 2013. Data analysis will include content and thematic analysis. The review will seek to identify all types of patient engagement activities employed during transitions of care communication. The review will identify enablers for and barriers to engagement for patients, families and health professionals. Key strategies and tools for improving patient engagement, clinical communication and promoting patient-centred care will be recommended based on findings. © 2016 The Authors. Journal of Advanced Nursing Published by John Wiley & Sons Ltd.

  19. A system architecture, processor, and communication protocol for secure implants

    NARCIS (Netherlands)

    C. Strydis (Christos); R.M. Seepers (Robert); P. Peris-Lopez (Pedro); D. Siskos (Dimitrios); I. Sourdis (Ioannis)

    2013-01-01

    textabstractSecure and energy-efficient communication between Implantable Medical Devices (IMDs) and authorized external users is attracting increasing attention these days. However, there currently exists no systematic approach to the problem, while solutions from neighboring fields, such as

  20. Intelligent Media Access Protocol for SDR-Based Satellite Communications

    Data.gov (United States)

    National Aeronautics and Space Administration — In a communications channel, the space environment between a spacecraft and an Earth ground station can potentially cause the loss of a data link or at least degrade...

  1. A Performance Evaluation of NACK-Oriented Protocols as the Foundation of Reliable Delay- Tolerant Networking Convergence Layers

    Science.gov (United States)

    Iannicca, Dennis; Hylton, Alan; Ishac, Joseph

    2012-01-01

    Delay-Tolerant Networking (DTN) is an active area of research in the space communications community. DTN uses a standard layered approach with the Bundle Protocol operating on top of transport layer protocols known as convergence layers that actually transmit the data between nodes. Several different common transport layer protocols have been implemented as convergence layers in DTN implementations including User Datagram Protocol (UDP), Transmission Control Protocol (TCP), and Licklider Transmission Protocol (LTP). The purpose of this paper is to evaluate several stand-alone implementations of negative-acknowledgment based transport layer protocols to determine how they perform in a variety of different link conditions. The transport protocols chosen for this evaluation include Consultative Committee for Space Data Systems (CCSDS) File Delivery Protocol (CFDP), Licklider Transmission Protocol (LTP), NACK-Oriented Reliable Multicast (NORM), and Saratoga. The test parameters that the protocols were subjected to are characteristic of common communications links ranging from terrestrial to cis-lunar and apply different levels of delay, line rate, and error.

  2. Developing Evaluation and Communication Capacity in Information ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    It will result in a trained cadre of regional mentors who are able to facilitate advanced methodologies in both evaluation and communications. Participating flagship project teams will develop their evaluation and communication skills, and gain opportunities for policy and practice change. More will be learned about practical ...

  3. Lessons from Katrina: Crisis Communication and Rhetorical Protocol

    Science.gov (United States)

    Smith, Donald C.

    2007-01-01

    Widely misunderstood and often maligned, rhetoric in the simplest sense is the effective use of language in speech or writing. Much as law and medicine have well considered standards of conduct, so too does the field of communication. Experts in this area look at--patterns--of discourse in relation to specific kinds of events--tornadoes,…

  4. A wireless mesh communication protocol for smart-metering

    NARCIS (Netherlands)

    Geelen, D.J.M.; Kempen, van G.M.P.; Hoogstraten, van F.; Liotta, A.

    2012-01-01

    Worldwide there has been increasing interest over the past few years for so-called "Smart Meters", in academia, governments and in industry. Such smart-metering systems need a way to communicate the collected data reliably and cost efficiently to the back-office for analysis. Several competing

  5. A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Julien Haillot

    2010-01-01

    Full Text Available In content-based communication, information flows towards interested hosts rather than towards specifically set destinations. This new style of communication perfectly fits the needs of applications dedicated to information sharing, news distribution, service advertisement and discovery, etc. In this paper we address the problem of supporting content-based communication in partially or intermittently connected mobile ad hoc networks (MANETs. The protocol we designed leverages on the concepts of opportunistic networking and delay-tolerant networking in order to account for the absence of end-to-end connectivity in disconnected MANETs. The paper provides an overview of the protocol, as well as simulation results that show how this protocol can perform in realistic conditions.

  6. Establishing rational networking using the DL04 quantum secure direct communication protocol

    Science.gov (United States)

    Qin, Huawang; Tang, Wallace K. S.; Tso, Raylin

    2018-06-01

    The first rational quantum secure direct communication scheme is proposed, in which we use the game theory with incomplete information to model the rational behavior of the participant, and give the strategy space and utility function. The rational participant can get his maximal utility when he performs the protocol faithfully, and then the Nash equilibrium of the protocol can be achieved. Compared to the traditional schemes, our scheme will be more practical in the presence of rational participant.

  7. A hybrid MAC protocol design for energy-efficient very-high-throughput millimeter wave, wireless sensor communication networks

    Science.gov (United States)

    Jian, Wei; Estevez, Claudio; Chowdhury, Arshad; Jia, Zhensheng; Wang, Jianxin; Yu, Jianguo; Chang, Gee-Kung

    2010-12-01

    This paper presents an energy-efficient Medium Access Control (MAC) protocol for very-high-throughput millimeter-wave (mm-wave) wireless sensor communication networks (VHT-MSCNs) based on hybrid multiple access techniques of frequency division multiplexing access (FDMA) and time division multiplexing access (TDMA). An energy-efficient Superframe for wireless sensor communication network employing directional mm-wave wireless access technologies is proposed for systems that require very high throughput, such as high definition video signals, for sensing, processing, transmitting, and actuating functions. Energy consumption modeling for each network element and comparisons among various multi-access technologies in term of power and MAC layer operations are investigated for evaluating the energy-efficient improvement of proposed MAC protocol.

  8. Evaluation of video transmission of MAC protocols in wireless sensor network

    Science.gov (United States)

    Maulidin, Mahmuddin, M.; Kamaruddin, L. M.; Elsaikh, Mohamed

    2016-08-01

    Wireless Sensor Network (WSN) is a wireless network which consists of sensor nodes scattered in a particular area which are used to monitor physical or environment condition. Each node in WSN is also scattered in sensor field, so an appropriate scheme of MAC protocol should have to develop communication link for data transferring. Video transmission is one of the important applications for the future that can be transmitted with low aspect in side of cost and also power consumption. In this paper, comparison of five different MAC WSN protocol for video transmission namely IEEE 802.11 standard, IEEE 802.15.4 standard, CSMA/CA, Berkeley-MAC, and Lightweight-MAC protocol are studied. Simulation experiment has been conducted in OMNeT++ with INET network simulator software to evaluate the performance. Obtained results indicate that IEEE 802.11 works better than other protocol in term of packet delivery, throughput, and latency.

  9. Quantum broadcast communication and authentication protocol with a quantum one-time pad

    International Nuclear Information System (INIS)

    Chang Yan; Xu Chun-Xiang; Zhang Shi-Bin; Yan Li-Li

    2014-01-01

    A quantum broadcast communication and authentication protocol with a quantum one-time pad based on the Greenberger—Horne—Zeilinger state is proposed. A binary string is used to express the identity of the receiver, which is encoded as a single sequence of photons. The encoded photon sequence acts as a detection sequence and implements authentication. An XOR operation serves as a one-time pad and is used to ensure the security of the protocol. The binary string is reused even in a noisy channel and proves to be unconditionally secure. In contrast with the protocols proposed by Wang et al. [Chin. Phys. 16 1868 (2007)] and Yang et al. [Chin. Phys. B 19 070304 (2010)], the protocol in this study implements the identity authentication with a reusable binary string; no hash function or local unitary operation is used. The protocol in this study is also easier to implement and highly efficient without losing security. (general)

  10. An Evaluation of "Effective Communication Skills" Coursebook

    Science.gov (United States)

    Ahmed, Shameem

    2016-01-01

    In Communicative Language Teaching situation, role of material is not only important but also inevitable. In the traditional context of English teaching textbooks are considered the main source of materials. This paper will provide an evaluation of "Effective Communication Skills" ("ECS") coursebook that has been introduced as…

  11. Development of a research evaluation protocol for NSD research portfolios

    International Nuclear Information System (INIS)

    Gould, J.

    1999-01-01

    This report is concerned with developing and describing a research evaluation protocol for use by the Nuclear Safety Directorate (NSD), in evaluating their various programmes of research; or aspects of those programmes. The Health and Safety Executive (HSE) has been involved with research evaluation for some considerable time and NSD, as part of HSE, wishes to develop a protocol which, while it meets their needs, is also fully compatible with other HSE approaches. It is intended that the methodology developed by this project will be used for evaluation of the Probabilistic Safety Assessment Portfolio (as a separate project). The usefulness of the methodology will be reviewed in the light of this experience

  12. Design and Analysis of a secure multi-party communication protocol

    OpenAIRE

    Herberth, Klaus

    2016-01-01

    In the past years digital communication became an important aspect in every day life. Everything is shared and discussed in groups of friends, family or business part- ners without a proper way to protect that information. This master thesis introduces the first secure robust multi-party communication protocol which mimics a physical conversation with the help of a Diffie-Hellman key tree and social behaviours. Robust- ness against offline group members is reached by taking advantage of trans...

  13. Quantifying the nonlocality of Greenberger-Horne-Zeilinger quantum correlations by a bounded communication simulation protocol.

    Science.gov (United States)

    Branciard, Cyril; Gisin, Nicolas

    2011-07-08

    The simulation of quantum correlations with finite nonlocal resources, such as classical communication, gives a natural way to quantify their nonlocality. While multipartite nonlocal correlations appear to be useful resources, very little is known on how to simulate multipartite quantum correlations. We present a protocol that reproduces tripartite Greenberger-Horne-Zeilinger correlations with bounded communication: 3 bits in total turn out to be sufficient to simulate all equatorial Von Neumann measurements on the tripartite Greenberger-Horne-Zeilinger state.

  14. Developing Evaluation and Communication Capacity in Information ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Evaluation and communication are essential to ensuring that research has an impact. The two fields share common elements: the importance of engaging users from the beginning, the significance of ... New Economy Development Group, Inc.

  15. Task Group on Computer/Communication Protocols for Bibliographic Data Exchange. Interim Report = Groupe de Travail sur les Protocoles de Communication/Ordinateurs pour l'Exchange de Donnees Bibliographiques. Rapport d'Etape. May 1983.

    Science.gov (United States)

    Canadian Network Papers, 1983

    1983-01-01

    This preliminary report describes the work to date of the Task Group on Computer/Communication protocols for Bibliographic Data Interchange, which was formed in 1980 to develop a set of protocol standards to facilitate communication between heterogeneous library and information systems within the framework of Open Systems Interconnection (OSI). A…

  16. A reliable, delay bounded and less complex communication protocol for multicluster FANETs

    Directory of Open Access Journals (Sweden)

    Wajiya Zafar

    2017-02-01

    Full Text Available Recently, Flying Ad-hoc Networks (FANETs, enabling ad-hoc networking between Unmanned Aerial Vehicles (UAVs is gaining importance in several military and civilian applications. The sensitivity of the applications requires adaptive; efficient; delay bounded and scalable communication network among UAVs for data transmission. Due to communication protocol complexity; rigidity; cost of commercial-off-the-shelf (COT components; limited radio bandwidth; high mobility and computational resources; maintaining the desired level of Quality of Service (QoS becomes a daunting task. For the first time in this research we propose multicluster FANETs for efficient network management; the proposed scheme considerably reduces communication cost and optimizes network performance as well as exploit low power; less complex and low cost IEEE 802.15.4 (MAC protocol for intercluster and intracluster communication. In this research both beacon enabled mode and beaconless modes have been investigated with Guaranteed Time Slots (GTS and virtual Time Division Multiple Access (TDMA respectively. The methodology plays a key role towards reserving bandwidth for latency critical applications; eliminate collisions and medium access delays. Moreover analysis ad-hoc routing protocols including two proactive (OLSR, DSDV and one reactive (AODV is also presented. The results shows that the proposed scheme guarantees high packet delivery ratios while maintaining acceptable levels of latency requirements comparable with more complex and dedicatedly designed protocols in literature.

  17. Initial Characterization of Optical Communications with Disruption-Tolerant Network Protocols

    Science.gov (United States)

    Schoolcraft, Joshua; Wilson, Keith

    2011-01-01

    Disruption-tolerant networks (DTNs) are groups of network assets connected with a suite of communication protocol technologies designed to mitigate the effects of link delay and disruption. Application of DTN protocols to diverse groups of network resources in multiple sub-networks results in an overlay network-of-networks with autonomous data routing capability. In space environments where delay or disruption is expected, performance of this type of architecture (such as an interplanetary internet) can increase with the inclusion of new communications mediums and techniques. Space-based optical communication links are therefore an excellent building block of space DTN architectures. When compared to traditional radio frequency (RF) communications, optical systems can provide extremely power-efficient and high bandwidth links bridging sub-networks. Because optical links are more susceptible to link disruption and experience the same light-speed delays as RF, optical-enabled DTN architectures can lessen potential drawbacks and maintain the benefits of autonomous optical communications over deep space distances. These environment-driven expectations - link delay and interruption, along with asymmetric data rates - are the purpose of the proof-of-concept experiment outlined herein. In recognizing the potential of these two technologies, we report an initial experiment and characterization of the performance of a DTN-enabled space optical link. The experiment design employs a point-to-point free-space optical link configured to have asymmetric bandwidth. This link connects two networked systems running a DTN protocol implementation designed and written at JPL for use on spacecraft, and further configured for higher bandwidth performance. Comparing baseline data transmission metrics with and without periodic optical link interruptions, the experiment confirmed the DTN protocols' ability to handle real-world unexpected link outages while maintaining capability of

  18. SELF-POWERED WIRELESS SENSOR NODE POWER MODELING BASED ON IEEE 802.11 COMMUNICATION PROTOCOL

    Energy Technology Data Exchange (ETDEWEB)

    Vivek Agarwal; Raymond A. DeCarlo; Lefteri H. Tsoukalas

    2016-04-01

    Design and technical advancements in sensing, processing, and wireless communication capabilities of small, portable devices known as wireless sensor nodes (WSNs) have drawn extensive research attention and are vastly applied in science and engineering applications. The WSNs are typically powered by a chemical battery source that has a load dependent finite lifetime. Most applications, including the nuclear industry applications, require WSNs to operate for an extended period of time beginning with their deployment. To ensure longevity, it is important to develop self-powered WSNs. The benefit of self-powered WSNs goes far beyond the cost savings of removing the need for cable installation and maintenance. Self-powered WSNs will potentially offer significant expansion in remote monitoring of nuclear facilities, and provide important data on plant equipment and component status during normal operation, as well as in case of abnormal operation, station blackouts or post-accident evaluation. Advancements in power harvesting technologies enable electric energy generation from many sources, including kinetic, thermal, and radiated energy. For the ongoing research at Idaho National Laboratory, a solid-state thermoelectric-based technology, the thermoelectric generator (TEG), is used to convert thermal energy to power a WSN. The design and development of TEGs to power WSNs that would remain active for a long period of time requires comprehensive understanding of WSN operational. This motivates the research in modeling the lifetime, i.e., power consumption, of a WSN by taking into consideration various node and network level activities. A WSN must perform three essential tasks: sense events, perform quick local information processing of sensed events, and wirelessly exchange locally processed data with the base station or with other WSNs in the network. Each task has a power cost per unit tine and an additional cost when switching between tasks. There are number of other

  19. An Improved Protocol for Controlled Deterministic Secure Quantum Communication Using Five-Qubit Entangled State

    Science.gov (United States)

    Kao, Shih-Hung; Lin, Jason; Tsai, Chia-Wei; Hwang, Tzonelih

    2018-03-01

    In early 2009, Xiu et al. (Opt. Commun. 282(2) 333-337 2009) presented a controlled deterministic secure quantum communication (CDSQC) protocol via a newly constructed five-qubit entangled quantum state. Later, Qin et al. (Opt. Commun. 282(13), 2656-2658 2009) pointed out two security loopholes in Xiu et al.'s protocol: (1) A correlation-elicitation (CE) attack can reveal the entire secret message; (2) A leakage of partial information for the receiver is noticed. Then, Xiu et al. (Opt. Commun. 283(2), 344-347 2010) presented a revised CDSQC protocol to remedy the CE attack problem. However, the information leakage problem still remains open. This work proposes a new CDSQC protocol using the same five-qubit entangled state which can work without the above mentioned security problems. Moreover, the Trojan Horse attacks can be automatically avoided without using detecting devices in the new CDSQC.

  20. Quantum direct communication protocol strengthening against Pavičić’s attack

    Science.gov (United States)

    Zhang, Bo; Shi, Wei-Xu; Wang, Jian; Tang, Chao-Jing

    2015-12-01

    A quantum circuit providing an undetectable eavesdropping of information in message mode, which compromises all two-state ψ-ϕ quantum direct communication (QDC) protocols, has been recently proposed by Pavičić [Phys. Rev. A 87 (2013) 042326]. A modification of the protocol’s control mode is proposed, which improves users’ 25% detection probability of Eve to 50% at best, as that in ping-pong protocol. The modification also improves the detection probability of Wójcik’s attack [Phys. Rev. Lett 90 (2003) 157901] to 75% at best. The resistance against man-in-the-middle (MITM) attack as well as the discussion of security for four Bell state protocols is presented. As a result, the protocol security is strengthened both theoretically and practically, and quantum advantage of superdense coding is restored.

  1. An Improved Protocol for Controlled Deterministic Secure Quantum Communication Using Five-Qubit Entangled State

    Science.gov (United States)

    Kao, Shih-Hung; Lin, Jason; Tsai, Chia-Wei; Hwang, Tzonelih

    2018-06-01

    In early 2009, Xiu et al. (Opt. Commun. 282(2) 333-337 2009) presented a controlled deterministic secure quantum communication (CDSQC) protocol via a newly constructed five-qubit entangled quantum state. Later, Qin et al. (Opt. Commun. 282(13), 2656-2658 2009) pointed out two security loopholes in Xiu et al.'s protocol: (1) A correlation-elicitation (CE) attack can reveal the entire secret message; (2) A leakage of partial information for the receiver is noticed. Then, Xiu et al. (Opt. Commun. 283(2), 344-347 2010) presented a revised CDSQC protocol to remedy the CE attack problem. However, the information leakage problem still remains open. This work proposes a new CDSQC protocol using the same five-qubit entangled state which can work without the above mentioned security problems. Moreover, the Trojan Horse attacks can be automatically avoided without using detecting devices in the new CDSQC.

  2. Two-Layer Hierarchy Optimization Model for Communication Protocol in Railway Wireless Monitoring Networks

    Directory of Open Access Journals (Sweden)

    Xiaoping Ma

    2018-01-01

    Full Text Available The wireless monitoring system is always destroyed by the insufficient energy of the sensors in railway. Hence, how to optimize the communication protocol and extend the system lifetime is crucial to ensure the stability of system. However, the existing studies focused primarily on cluster-based or multihop protocols individually, which are ineffective in coping with the complex communication scenarios in the railway wireless monitoring system (RWMS. This study proposes a hybrid protocol which combines the cluster-based and multihop protocols (CMCP to minimize and balance the energy consumption in different sections of the RWMS. In the first hierarchy, the total energy consumption is minimized by optimizing the cluster quantities in the cluster-based protocol and the number of hops and the corresponding hop distances in the multihop protocol. In the second hierarchy, the energy consumption is balanced through rotating the cluster head (CH in the subnetworks and further optimizing the hops and the corresponding hop distances in the backbone network. On this basis, the system lifetime is maximized with the minimum and balance energy consumption among the sensors. Furthermore, the hybrid particle swarm optimization and genetic algorithm (PSO-GA are adopted to optimize the energy consumption from the two-layer hierarchy. Finally, the effectiveness of the proposed CMCP is verified in the simulation. The performances of the proposed CMCP in system lifetime, residual energy, and the corresponding variance are all superior to the LEACH protocol widely applied in the previous research. The effective protocol proposed in this study can facilitate the application of the wireless monitoring network in the railway system and enhance safety operation of the railway.

  3. An Efficient Causal Group Communication Protocol for Free Scale Peer-to-Peer Networks

    Directory of Open Access Journals (Sweden)

    Grigory Evropeytsev

    2016-08-01

    Full Text Available In peer-to-peer (P2P overlay networks, a group of n (≥2 peer processes have to cooperate with each other. Each peer sends messages to every peer and receives messages from every peer in a group. In group communications, each message sent by a peer is required to be causally delivered to every peer. Most of the protocols designed to ensure causal message order are designed for networks with a plain architecture. These protocols can be adapted to use in free scale and hierarchical topologies; however, the amount of control information is O(n, where n is the number of peers in the system. Some protocols are designed for a free scale or hierarchical networks, but in general they force the whole system to accomplish the same order viewed by a super peer. In this paper, we present a protocol that is specifically designed to work with a free scale peer-to-peer network. By using the information about the network’s architecture and by representing message dependencies on a bit level, the proposed protocol ensures causal message ordering without enforcing super peers order. The designed protocol is simulated and compared with the Immediate Dependency Relation and the Dependency Sequences protocols to show its lower overhead.

  4. An Evaluation of Effective Communication Skills Coursebook

    Directory of Open Access Journals (Sweden)

    Shameem Ahmed

    2016-06-01

    Full Text Available In Communicative Language Teaching situation, role of material is not only important but also inevitable. In the traditional context of English teaching textbooks are considered the main source of materials. This paper will provide an evaluation of Effective Communication Skills (ECS coursebook that has been introduced as a pilot project implemented in 2011 by the Ministry of Higher Education, Malaysia. For the current study, data has been collected on the basis of materials study, and questionnaires. The qualitative analysis has been conducted with a total sample of around 214 students, and 3 instructors. The results show that in spite of some shortcomings, there is a general satisfaction about this textbook as it is exclusively produced by the local experts for the tertiary level. The study concludes with suggestions and recommendations for the improvement of the Effective Communication Skills. Keywords: Coursebook evaluation, communicative English, Pilot Project, ECS

  5. Developing Evaluation Capacity in Information and Communication ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    17 août 2009 ... The nuanced ways in which information and communication technologies (ICTs) interact with developing country societies necessitate thoughtful, systematic evaluation of their effects, grounded in the concepts of utility, outcome and ownership. This grant will allow Developing Evaluation Capacity in ICT4D ...

  6. An Evaluation of Effective Communication Skills Coursebook

    OpenAIRE

    Shameem Ahmed

    2016-01-01

    In Communicative Language Teaching situation, role of material is not only important but also inevitable. In the traditional context of English teaching textbooks are considered the main source of materials. This paper will provide an evaluation of Effective Communication Skills (ECS) coursebook that has been introduced as a pilot project implemented in 2011 by the Ministry of Higher Education, Malaysia. For the current study, data has been collected on the basis of materials study, and quest...

  7. Security analysis of standards-driven communication protocols for healthcare scenarios.

    Science.gov (United States)

    Masi, Massimiliano; Pugliese, Rosario; Tiezzi, Francesco

    2012-12-01

    The importance of the Electronic Health Record (EHR), that stores all healthcare-related data belonging to a patient, has been recognised in recent years by governments, institutions and industry. Initiatives like the Integrating the Healthcare Enterprise (IHE) have been developed for the definition of standard methodologies for secure and interoperable EHR exchanges among clinics and hospitals. Using the requisites specified by these initiatives, many large scale projects have been set up for enabling healthcare professionals to handle patients' EHRs. The success of applications developed in these contexts crucially depends on ensuring such security properties as confidentiality, authentication, and authorization. In this paper, we first propose a communication protocol, based on the IHE specifications, for authenticating healthcare professionals and assuring patients' safety. By means of a formal analysis carried out by using the specification language COWS and the model checker CMC, we reveal a security flaw in the protocol thus demonstrating that to simply adopt the international standards does not guarantee the absence of such type of flaws. We then propose how to emend the IHE specifications and modify the protocol accordingly. Finally, we show how to tailor our protocol for application to more critical scenarios with no assumptions on the communication channels. To demonstrate feasibility and effectiveness of our protocols we have fully implemented them.

  8. A Review of Vehicle to Vehicle Communication Protocols for VANETs in the Urban Environment

    Directory of Open Access Journals (Sweden)

    Irshad Ahmed Abbasi

    2018-01-01

    Full Text Available Vehicular Ad-hoc Networks (VANETs have been gaining significant attention from the research community due to their increasing importance for building an intelligent transportation system. The characteristics of VANETs, such as high mobility, network partitioning, intermittent connectivity and obstacles in city environments, make routing a challenging task. Due to these characteristics of VANETs, the performance of a routing protocol is degraded. The position-based routing is considered to be the most significant approach in VANETs. In this paper, we present a brief review of most significant position based unicast routing protocols designed for vehicle to vehicle communications in the urban environment. We provide them with their working features for exchanging information between vehicular nodes. We describe their pros and cons. This study also provides a comparison of the vehicle to vehicle communication based routing protocols. The comparative study is based on some significant factors such as mobility, traffic density, forwarding techniques and method of junction selection mechanism, and strategy used to handle a local optimum situation. It also provides the simulation based study of existing dynamic junction selection routing protocols and a static junction selection routing protocol. It provides a profound insight into the routing techniques suggested in this area and the most valuable solutions to advance VANETs. More importantly, it can be used as a source of references to other researchers in finding literature that is relevant to routing in VANETs.

  9. Beyond communication: the role of standardized protocols in a changing health care environment.

    Science.gov (United States)

    Vardaman, James M; Cornell, Paul; Gondo, Maria B; Amis, John M; Townsend-Gervis, Mary; Thetford, Carol

    2012-01-01

    Communication errors have grave consequences in health care settings. The situation-background-assessment-recommendation (SBAR) protocol has been theorized to improve communication by creating a common language between nurses and physicians in acute care situations. This practice is gaining acceptance across the health care field. However, as yet, there has been little investigation of the ways in which SBAR may have an impact on how health care professionals operate beyond the creation of a common language. The purposes of the study were to explore the implementation of the SBAR protocol and investigate the potential impact of SBAR on the day-to-day experiences of nurses. We performed a qualitative case study of 2 hospitals that were implementing the SBAR protocol. We collected data from 80 semistructured interviews with nurses, nurse manager, and physicians; observation of nursing and other hospital activities; and documents that pertained to the implementation of the SBAR protocol. Data were analyzed using a thematic approach. Our analysis revealed 4 dimensions of impact that SBAR has beyond its use as a communication tool: schema formation, development of legitimacy, development of social capital, and reinforcement of dominant logics. The results indicate that SBAR may function as more than a tool to standardize communication among nurses and physicians. Rather, the findings indicate that SBAR may aid in schema development that allows rapid decision making by nurses, provide social capital and legitimacy for less-tenured nurses, and reinforce a move toward standardization in the nursing profession. Our findings further suggest that standardized protocols such as SBAR may be a cost-effective method for hospital managers and administrators to accelerate the socialization of nurses, particularly new hires.

  10. Evaluation of an app-based stress protocol

    Directory of Open Access Journals (Sweden)

    Noeh Claudius

    2016-09-01

    Full Text Available Stress is a major influence on the quality of life in our fast-moving society. This paper describes a standardized and contemporary protocol that is capable of inducing moderate psychological stress in a laboratory setting. Furthermore, it evaluates its effects on physiological biomarkers. The protocol called “THM-Stresstest” mainly consists of a rest period (30 min, an app-based stress test under the surveillance of an audience (4 min and a regeneration period (32 min. We investigated 12 subjects to evaluate the developed protocol. We could show significant changes in heart rate variability, electromyography, electro dermal activity and salivary cortisol and α-amylase. From this data we conclude that the THM-Stresstest can serve as a psychobiological tool for provoking responses in the cardiovascular-, the endocrine and exocrine system as well as the sympathetic part of the central nervous system.

  11. A Generic Communication Protocol for Remote Laboratories: an Implementation on e-lab

    Energy Technology Data Exchange (ETDEWEB)

    Henriques, Rafael B.; Fernandes, H.; Duarte, Andre S.; Pereira, Tiago; Fortunato, Joao [Instituto de Plasmas e Fusao Nuclear, Instituto Superior Tecnico, Universidade de Lisboa, 1049-001 Lisboa (Portugal); Pereira, Jose [Linkare TI - Tecnologias de Informacao Lda, Lisboa (Portugal); Dias, Francisco [Instituto Superior Tecnico, Universidade de Lisboa, 1049-001 Lisboa (Portugal)

    2015-07-01

    The remote laboratories at IST (Instituto Superior Tecnico), e-lab, serve as a valuable tool for education and training based on remote control technologies. Due to the high number and increase of remotely operated experiments a generic protocol was developed to perform the communication between the software driver and the respective experimental setup in an easier and more unified way. The training in these fields of students and personnel can take advantage of such infrastructure with the purpose of deploying new experiments in a faster way. More than 10 experiments using the generic protocol are available on-line in a 24 x 7 way. (authors)

  12. Clinical Simulation: A Protocol for Evaluation of Mobile Technology.

    Science.gov (United States)

    Mather, Carey; Jensen, Sanne; Cummings, Elizabeth

    2017-01-01

    For mobile technology to be accepted at point of care in healthcare environments there is a need to demonstrate benefits whilst ameliorating the risks and challenges. To provide a standardised approach to evaluation of mobile technology a simulation protocol was developed to provide guidance for its use in healthcare environments. Simulated conditions provide the opportunity to assess intended and unintended consequences and identify potential workarounds when using technology. The protocol can also be used to demonstrate the importance of the development of digital professionalism by end-users prior to students entering the clinical practice setting. The mobile technology protocol was adapted from a health information systems protocol developed and used at the ITX Lab, Denmark for use in other simulation laboratories. Use case scenarios were developed to enable evaluation of mobile technology for mobile learning of nurses, nurse supervisors, students and patients. The scenarios can be used in a range of simulated environments including hospital bedside, outpatient clinic or community settings. A case study exemplar of a nurse and patient is included to demonstrate how the mobile technology protocol can be applied.

  13. Evaluation of communication characteristics of operating teams in NPPs using SNA technique

    Energy Technology Data Exchange (ETDEWEB)

    Kim, H. J.; Lee, S. W.; Kang, H. G.; Seong, P. H. [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of); Park, J. K. [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Kang, H. G. [Khalifa Univ. of Science, Abu Dhabi (United Arab Emirates)

    2012-03-15

    Inappropriate communications within operational teams can lead to serious consequences of a system since it can cause lack of exchange of important information to perform the task to secure the safety of the system in nuclear power plants (NPPs). For that reason, we studied the communication characteristics However, existing studies on the communication characteristics seem to have problem since they have characterized team communications from a single perspective. According that, we have developed an evaluation method to characterize team communications using social network techniques which can evaluate them from various perspectives which are group cohesiveness, frequency of communications, degree of hierarchy, and communication contents. In addition, we suggested some kids of specific communication characteristics of operating teams that can reduce the occurrence of inappropriate communications. Eight verbal protocol data which are audio-visual recorded under emergency training sessions by main control room (MCR) operating teams are used. As a result of the study, there was negative relationship between group cohesiveness and the ratio of inappropriate communications. Moreover, some kinds of specific communication contents are related to the ratio of inappropriate communications. Consequently, we can evaluate communications characteristics of operating teams in NPPs and suggest specific characteristics to provide useful insights to prevent inappropriate communications.

  14. Evaluation of communication characteristics of operating teams in NPPs using SNA technique

    International Nuclear Information System (INIS)

    Kim, H. J.; Lee, S. W.; Kang, H. G.; Seong, P. H.; Park, J. K.; Kang, H. G.

    2012-01-01

    Inappropriate communications within operational teams can lead to serious consequences of a system since it can cause lack of exchange of important information to perform the task to secure the safety of the system in nuclear power plants (NPPs). For that reason, we studied the communication characteristics However, existing studies on the communication characteristics seem to have problem since they have characterized team communications from a single perspective. According that, we have developed an evaluation method to characterize team communications using social network techniques which can evaluate them from various perspectives which are group cohesiveness, frequency of communications, degree of hierarchy, and communication contents. In addition, we suggested some kids of specific communication characteristics of operating teams that can reduce the occurrence of inappropriate communications. Eight verbal protocol data which are audio-visual recorded under emergency training sessions by main control room (MCR) operating teams are used. As a result of the study, there was negative relationship between group cohesiveness and the ratio of inappropriate communications. Moreover, some kinds of specific communication contents are related to the ratio of inappropriate communications. Consequently, we can evaluate communications characteristics of operating teams in NPPs and suggest specific characteristics to provide useful insights to prevent inappropriate communications

  15. Evaluating Psychometric Characteristics of Detection Protocol of Malingering Stuttering

    Directory of Open Access Journals (Sweden)

    Arsia Thaghva

    2017-07-01

    Conclusion According to the results, the detection protocol of malingering stuttering is of good internal consistency and concurrent validity. However, considering that the sample population was not large in the present study, it can be said that this study is a preliminary evaluation to find the psychometric features of the instruments, with the aim of laying the groundwork for further studies.

  16. Improved security detection strategy in quantum secure direct communication protocol based on four-particle Green-Horne-Zeilinger state

    Energy Technology Data Exchange (ETDEWEB)

    Li, Jian; Nie, Jin-Rui; Li, Rui-Fan [Beijing Univ. of Posts and Telecommunications, Beijing (China). School of Computer; Jing, Bo [Beijing Univ. of Posts and Telecommunications, Beijing (China). School of Computer; Beijing Institute of Applied Meteorology, Beijing (China). Dept. of Computer Science

    2012-06-15

    To enhance the efficiency of eavesdropping detection in the quantum secure direct communication protocol, an improved quantum secure direct communication protocol based on a four-particle Green-Horne-Zeilinger (GHZ) state is presented. In the protocol, the four-particle GHZ state is used to detect eavesdroppers, and quantum dense coding is used to encode the message. In the security analysis, the method of entropy theory is introduced, and two detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference that has been introduced. If the eavesdropper wants to obtain all the information, the detection rate of the quantum secure direct communication using an Einstein-Podolsky-Rosen (EPR) pair block will be 50% and the detection rate of the presented protocol will be 87%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol proposed is more secure than the others. (orig.)

  17. Research on Multioperator silk screen printer Based on Communication Protocol Macro

    Directory of Open Access Journals (Sweden)

    Zhiming Zhang

    2018-01-01

    Full Text Available Multioperator silk screen printer is automatic silk screen printing equipment. There are many advantages, such as energy saving, reduce the labor intensity and so on. The control system consists of an intermittent movement main motor and eight color working station printing cycle motion motors. The system controls nine frequency converters through protocol macro communication by using PLC. This paper studies the principle and process characteristics of multioperator silk screen printer. Besides, this paper adopts protocol macro sequence generation method for communication between PLC and frequency converter. This method can control the programming of parameters, such as frequency, operation and monitoring. It also can realize the printing of eight color working stations and monitor the printing status in real time. The practical application proves that the method meets the technical requirements and the reliability is good.

  18. Performance Analysis of an Enhanced PRMA-HS Protocol for LEO Satellite Communication

    Institute of Scientific and Technical Information of China (English)

    ZHUO Yong-ning; YAN Shao-hu; WU Shi-qi

    2005-01-01

    The packet reservation multiple access with hindering state (PRMA-HS) is a protocol suitable for LEO satellite mobile communication. Although working well with light system payload (amount of user terminals), the protocol imposes high channel congestion on system with heavy payload, thus degrades the system's quality of service. To controlling the channel congestion, a scheme of enhanced PRMA-HS protocol is proposed, which aims to reduce the collision of voice packets by adopting a mechanism of access control. Through theoretic analysis, the system's mathematic model is presented and the packet drop probability of the scheme is deduced. To testify the performance of the scheme, a simulation is performed and the results support our analysis.

  19. AAAS Communicating Science Program: Reflections on Evaluation

    Science.gov (United States)

    Braha, J.

    2015-12-01

    The AAAS Center for Public Engagement (Center) with science builds capacity for scientists to engage public audiences by fostering collaboration among natural or physical scientists, communication researchers, and public engagement practitioners. The recently launched Leshner Leadership Institute empowers cohorts of mid-career scientists to lead public engagement by supporting their networks of scientists, researchers, and practitioners. The Center works closely with social scientists whose research addresses science communication and public engagement with science to ensure that the Communicating Science training program builds on empirical evidence to inform best practices. Researchers ( Besley, Dudo, & Storkdieck 2015) have helped Center staff and an external evaluator develop pan instrument that measures progress towards goals that are suggested by the researcher, including internal efficacy (increasing scientists' communication skills and confidence in their ability to engage with the public) and external efficacy (scientists' confidence in engagement methods). Evaluation results from one year of the Communicating Science program suggest that the model of training yields positive results that support scientists in the area that should lead to greater engagement. This talk will explore the model for training, which provides a context for strategic communication, as well as the practical factors, such as time, access to public engagement practitioners, and technical skill, that seems to contribute to increased willingness to engage with public audiences. The evaluation program results suggest willingness by training participants to engage directly or to take preliminary steps towards engagement. In the evaluation results, 38% of trained scientists reported time as a barrier to engagement; 35% reported concern that engagement would distract from their work as a barrier. AAAS works to improve practitioner-researcher-scientist networks to overcome such barriers.

  20. Eavesdropping on the "Ping-Pong" Quantum Communication Protocol Freely in a Noise Channel

    OpenAIRE

    Deng, Fu-Guo; Li, Xi-Han; Li, Chun-Yan; Zhou, Ping; Zhou, Hong-Yu

    2005-01-01

    We introduce an attack scheme for eavesdropping the ping-pong quantum communication protocol proposed by Bostr$\\ddot{o}$m and Felbinger [Phys. Rev. Lett. \\textbf{89}, 187902 (2002)] freely in a noise channel. The vicious eavesdropper, Eve, intercepts and measures the travel photon transmitted between the sender and the receiver. Then she replaces the quantum signal with a multi-photon signal in a same state, and measures the photons return with the measuring basis with which Eve prepares the ...

  1. Effects of Communication Expectancies, Actual Communication, and Expectancy Disconfirmation on Evaluations of Communicators and Their Communication Behavior.

    Science.gov (United States)

    Burgoon, Judee K.; Le Poire, Beth A.

    1993-01-01

    Investigates the perseverance of preinteraction expectancies in the face of actual communication behavior, the separate effects of personal attribute and communication expectancies, and the role of expectancy confirmation or disconfirmation on postinteraction evaluations. Confirms the validity of expectancy violations theory. (SR)

  2. Security analysis of the “Ping–Pong” quantum communication protocol in the presence of collective-rotation noise

    International Nuclear Information System (INIS)

    Li, Jian; Li, Lingyun; Jin, Haifei; Li, Ruifan

    2013-01-01

    Environmental noise is inevitable in non-isolated systems. It is, therefore, necessary to analyze the security of the “Ping–Pong” protocol in a noisy environment. An excellent model for collective-rotation noise is introduced, and information theoretical methods are applied to analyze the security of this protocol. If noise level ε is lower than 11%, an eavesdropper can gain some, but not all, information freely without being detected. Otherwise, the protocol becomes insecure. We conclude that the use of ‘Ping–Pong’ protocol as a quantum secure direct communication (QSDC) protocol is quasi-secure, as declared by the original author when ε⩽11%.

  3. Security analysis of the “Ping–Pong” quantum communication protocol in the presence of collective-rotation noise

    Energy Technology Data Exchange (ETDEWEB)

    Li, Jian; Li, Lingyun, E-mail: lilingyun@bupt.edu.cn; Jin, Haifei; Li, Ruifan

    2013-11-22

    Environmental noise is inevitable in non-isolated systems. It is, therefore, necessary to analyze the security of the “Ping–Pong” protocol in a noisy environment. An excellent model for collective-rotation noise is introduced, and information theoretical methods are applied to analyze the security of this protocol. If noise level ε is lower than 11%, an eavesdropper can gain some, but not all, information freely without being detected. Otherwise, the protocol becomes insecure. We conclude that the use of ‘Ping–Pong’ protocol as a quantum secure direct communication (QSDC) protocol is quasi-secure, as declared by the original author when ε⩽11%.

  4. Broadening the Educational Evaluation Lens with Communicative Evaluation

    Science.gov (United States)

    Brooks-LaRaviere, Margaret; Ryan, Katherine; Miron, Luis; Samuels, Maurice

    2009-01-01

    Outcomes-based accountability in the form of test scores and performance indicators are a primary lever for improving student achievement in the current educational landscape. The article presents communicative evaluation as a complementary evaluation approach that may be used along with the primary methods of school accountability to provide a…

  5. Dosimetric evaluation of cone beam computed tomography scanning protocols

    International Nuclear Information System (INIS)

    Soares, Maria Rosangela

    2015-01-01

    It was evaluated the cone beam computed tomography, CBCT scanning protocols, that was introduced in dental radiology at the end of the 1990's, and quickly became a fundamental examination for various procedures. Its main characteristic, the difference of medical CT is the beam shape. This study aimed to calculate the absorbed dose in eight tissues / organs of the head and neck, and to estimate the effective dose in 13 protocols and two techniques (stitched FOV e single FOV) of 5 equipment of different manufacturers of cone beam CT. For that purpose, a female anthropomorphic phantom was used, representing a default woman, in which were inserted thermoluminescent dosimeters at several points, representing organs / tissues with weighting values presented in the standard ICRP 103. The results were evaluated by comparing the dose according to the purpose of the tomographic image. Among the results, there is a difference up to 325% in the effective dose in relation to protocols with the same image goal. In relation to the image acquisition technique, the stitched FOV technique resulted in an effective dose of 5.3 times greater than the single FOV technique for protocols with the same image goal. In the individual contribution, the salivary glands are responsible for 31% of the effective dose in CT exams. The remaining tissues have also a significant contribution, 36%. The results drew attention to the need of estimating the effective dose in different equipment and protocols of the market, besides the knowledge of the radiation parameters and equipment manufacturing engineering to obtain the image. (author)

  6. Evaluation and Policy Analysis: A Communicative Framework

    Directory of Open Access Journals (Sweden)

    Cynthia Wallat

    1997-07-01

    Full Text Available A major challenge for the next generation of students of human development is to help shape the paradigms by which we analyze and evaluate public policies for children and families. Advocates of building research and policy connections point to health care and stress experiences across home, school, and community as critical policy issues that expand the scope of contexts and outcomes studied. At a minimum, development researchers and practitioners will need to be well versed in available methods of inquiry; they will need to be "methodologically multilingual" when conducting evaluation and policy analysis, producing reports, and reporting their interpretations to consumer and policy audiences. This article suggests how traditional approaches to policy inquiry can be reconsidered in light of these research inquiry and communicative skills needed by all policy researchers. A fifteen year review of both policy and discourse processes research is presented to suggest ways to conduct policy studies within a communicative framework.

  7. Communication of technical building systems. Interfaces, protocols and solutions; Kommunikation technischer Gebaeudesysteme. Schnittstellen, Protokolle und Loesungen

    Energy Technology Data Exchange (ETDEWEB)

    Kranz, H.R. [Siemens AG, Karlsruhe (Germany)

    1995-12-31

    In chapter 18 of the anthology about building control the communication between and with technical building systems is described. After the basics have been explained in the previous chapter interfaces, protocols and solutions are presented in this part. The following aspects are discussed: homogeneous and heterogeneous building automation systems, communication in the field of building automation, demands and characteristic numbers, open communication between heterogeneous systems, announcement and award procedures, protocol selection, FND - firm neutral data transmission system, PROFIBUS, ISP (InterOperable Systems Project) and Fieldbus Foundation with ``profile``; EIB (European Installation Bus), the standard bus for building system technology, BACNet (Building Automation Control Network) and EcheLON, open systems for building automation. (BWI) [Deutsch] Kapitel 18 des Sammelbandes ueber Building Control geht auf das Thema der Kommunikation zwischen und mit technischen Gebaeudesystemen ein. Nachdem im vorherigen Kapitel die Grundlagen besprochen wurden, wird im vorliegenden Teil auf Schnittstellen, Protokolle und Loesungen eingegangen. In diesem Zusammenhang werden folgenden Themenbereiche angesprochen: Homogene und heterogene GA-Systeme; Kommunikation in der Gebaeudeautomation; Anforderungen und Kennwert; offene Kommunikation heterogener Systeme; Ausschreibungs- und Vergabeprozeduren; Protokollauswahl; FND, das firmenneutrale Datenuebertragungsprotokoll; PROFIBUS, ISP und Fieldbus Foundation mit `Profil`; EIB, der Standardbus fuer die Gebaeudesystemtechnik; BACNet und EcheLON; Offene Systeme fuer die Gebaeudeautomation. (BWI)

  8. Evaluation of Sexual Communication Message Strategies

    Science.gov (United States)

    2011-01-01

    Parent-child communication about sex is an important proximal reproductive health outcome. But while campaigns to promote it such as the Parents Speak Up National Campaign (PSUNC) have been effective, little is known about how messages influence parental cognitions and behavior. This study examines which message features explain responses to sexual communication messages. We content analyzed 4 PSUNC ads to identify specific, measurable message and advertising execution features. We then develop quantitative measures of those features, including message strategies, marketing strategies, and voice and other stylistic features, and merged the resulting data into a dataset drawn from a national media tracking survey of the campaign. Finally, we conducted multivariable logistic regression models to identify relationships between message content and ad reactions/receptivity, and between ad reactions/receptivity and parents' cognitions related to sexual communication included in the campaign's conceptual model. We found that overall parents were highly receptive to the PSUNC ads. We did not find significant associations between message content and ad reactions/receptivity. However, we found that reactions/receptivity to specific PSUNC ads were associated with increased norms, self-efficacy, short- and long-term expectations about parent-child sexual communication, as theorized in the conceptual model. This study extends previous research and methods to analyze message content and reactions/receptivity. The results confirm and extend previous PSUNC campaign evaluation and provide further evidence for the conceptual model. Future research should examine additional message content features and the effects of reactions/receptivity. PMID:21599875

  9. Cryptanalysis of quantum broadcast communication and authentication protocol with a one-time pad

    International Nuclear Information System (INIS)

    Cao Ya; Gao Fei

    2016-01-01

    Chang et al . [ Chin. Phys. B 23 010305 (2014)] have proposed a quantum broadcast communication and authentication protocol. However, we find that an intercept-resend attack can be preformed successfully by a potential eavesdropper, who will be able to destroy the authentication function. Afterwards, he or she can acquire the secret transmitted message or even modify it while escaping detection, by implementing an efficient man-in-the-middle attack. Furthermore, we show a simple scheme to defend this attack, that is, applying non-reusable identity strings. (paper)

  10. Evaluation of the appropriate use of a CIWA-Ar alcohol withdrawal protocol in the general hospital setting.

    Science.gov (United States)

    Eloma, Amanda S; Tucciarone, Jason M; Hayes, Edmund M; Bronson, Brian D

    2018-01-01

    The Clinical Institute Withdrawal Assessment-Alcohol, Revised (CIWA-Ar) is an assessment tool used to quantify alcohol withdrawal syndrome (AWS) severity and inform benzodiazepine treatment for alcohol withdrawal. To evaluate the prescribing patterns and appropriate use of the CIWA-Ar protocol in a general hospital setting, as determined by the presence or absence of documented AWS risk factors, patients' ability to communicate, and provider awareness of the CIWA-Ar order. This retrospective chart review included 118 encounters of hospitalized patients placed on a CIWA-Ar protocol during one year. The following data were collected for each encounter: patient demographics, admitting diagnosis, ability to communicate, and admission blood alcohol level; and medical specialty of the clinician ordering CIWA-Ar, documentation of the presence or absence of established AWS risk factors, specific parameters of the protocol ordered, service admitted to, provider documentation of awareness of the active protocol within 48 h of initial order, total benzodiazepine dose equivalents administered and associated adverse events. 57% of patients who started on a CIWA-Ar protocol had either zero or one documented risk factor for AWS (19% and 38% respectively). 20% had no documentation of recent alcohol use. 14% were unable to communicate. 19% of medical records lacked documentation of provider awareness of the ordered protocol. Benzodiazepine associated adverse events were documented in 15% of encounters. The judicious use of CIWA-Ar protocols in general hospitals requires mechanisms to ensure assessment of validated alcohol withdrawal risk factors, exclusion of patients who cannot communicate, and continuity of care during transitions.

  11. Two-step quantum direct communication protocol using the Einstein- Podolsky-Rosen pair block

    CERN Document Server

    Fu Guo Deng; Xiao Shu Liu; 10.1103/PhysRevA.68.042317

    2003-01-01

    A protocol for quantum secure direct communication using blocks of Einstein-Podolsky-Rosen (EPR) pairs is proposed. A set of ordered N EPR pairs is used as a data block for sending secret message directly. The ordered N EPR set is divided into two particle sequences, a checking sequence and a message-coding sequence. After transmitting the checking sequence, the two parties of communication check eavesdropping by measuring a fraction of particles randomly chosen, with random choice of two sets of measuring bases. After insuring the security of the quantum channel, the sender Alice encodes the secret message directly on the message-coding sequence and sends them to Bob. By combining the checking and message-coding sequences together, Bob is able to read out the encoded messages directly. The scheme is secure because an eavesdropper cannot get both sequences simultaneously. We also discuss issues in a noisy channel. (30 refs).

  12. A Generic, Modular and User Transparent Protocol Scheme for Inter-FPGA Communication using Serial Links

    CERN Document Server

    AUTHOR|(CDS)2209162; Emery, Jonathan

    CERN, the European Organization for Nuclear Research, is a European research organization that operates the largest particle physics laboratory in the world. A large amount of particle accelerators and detectors are developed and used for scientific research purposes. With those, a large amount of information is created and needs to be stored before it can be analysed. As a consequence, the communication reliability, integrity, latency and transfer rates between these detectors and the control room are some of the key elements for the success of those experiments. While it is true that existing communication standards, or protocols, are focused on those key elements, it is usually a balanced compromise to stay polyvalent, where the emphasis on a specific aspect reduces the efficiency of the others. To improve the performance and capabilities of one of the operational accelerator instrument called the beam wire scanner (BWS), the CERN instrumentation Group (BE-BI) has created a complete new electro-mech...

  13. A protocol for better design, application, and communication of population viability analyses.

    Science.gov (United States)

    Pe'er, Guy; Matsinos, Yiannis G; Johst, Karin; Franz, Kamila W; Turlure, Camille; Radchuk, Viktoriia; Malinowska, Agnieszka H; Curtis, Janelle M R; Naujokaitis-Lewis, Ilona; Wintle, Brendan A; Henle, Klaus

    2013-08-01

    Population viability analyses (PVAs) contribute to conservation theory, policy, and management. Most PVAs focus on single species within a given landscape and address a specific problem. This specificity often is reflected in the organization of published PVA descriptions. Many lack structure, making them difficult to understand, assess, repeat, or use for drawing generalizations across PVA studies. In an assessment comparing published PVAs and existing guidelines, we found that model selection was rarely justified; important parameters remained neglected or their implementation was described vaguely; limited details were given on parameter ranges, sensitivity analysis, and scenarios; and results were often reported too inconsistently to enable repeatability and comparability. Although many guidelines exist on how to design and implement reliable PVAs and standards exist for documenting and communicating ecological models in general, there is a lack of organized guidelines for designing, applying, and communicating PVAs that account for their diversity of structures and contents. To fill this gap, we integrated published guidelines and recommendations for PVA design and application, protocols for documenting ecological models in general and individual-based models in particular, and our collective experience in developing, applying, and reviewing PVAs. We devised a comprehensive protocol for the design, application, and communication of PVAs (DAC-PVA), which has 3 primary elements. The first defines what a useful PVA is; the second element provides a workflow for the design and application of a useful PVA and highlights important aspects that need to be considered during these processes; and the third element focuses on communication of PVAs to ensure clarity, comprehensiveness, repeatability, and comparability. Thereby, DAC-PVA should strengthen the credibility and relevance of PVAs for policy and management, and improve the capacity to generalize PVA findings

  14. An evaluation of business implications of the Kyoto Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Torvanger, Asbjoern

    2001-12-01

    This report has been commissioned by Norsk Hydro ASA and written in November-December 2001. The aim of the report is to present and analyze the newest developments in the climate negotiations, particularly the seventh Conference of the Parties to the Climate Convention in Marrakech, Morocco, in October/November 2001, and to provide an evaluation of what the finalized Kyoto Protocol means for business. The report is organized as a collection of slides with supporting text explaining the background and contents of each slide. (author)

  15. The Time Division Multi-Channel Communication Model and the Correlative Protocol Based on Quantum Time Division Multi-Channel Communication

    International Nuclear Information System (INIS)

    Liu Xiao-Hui; Pei Chang-Xing; Nie Min

    2010-01-01

    Based on the classical time division multi-channel communication theory, we present a scheme of quantum time-division multi-channel communication (QTDMC). Moreover, the model of quantum time division switch (QTDS) and correlative protocol of QTDMC are proposed. The quantum bit error rate (QBER) is analyzed and the QBER simulation test is performed. The scheme shows that the QTDS can carry out multi-user communication through quantum channel, the QBER can also reach the reliability requirement of communication, and the protocol of QTDMC has high practicability and transplantable. The scheme of QTDS may play an important role in the establishment of quantum communication in a large scale in the future. (general)

  16. Generating Models of Infinite-State Communication Protocols Using Regular Inference with Abstraction

    Science.gov (United States)

    Aarts, Fides; Jonsson, Bengt; Uijen, Johan

    In order to facilitate model-based verification and validation, effort is underway to develop techniques for generating models of communication system components from observations of their external behavior. Most previous such work has employed regular inference techniques which generate modest-size finite-state models. They typically suppress parameters of messages, although these have a significant impact on control flow in many communication protocols. We present a framework, which adapts regular inference to include data parameters in messages and states for generating components with large or infinite message alphabets. A main idea is to adapt the framework of predicate abstraction, successfully used in formal verification. Since we are in a black-box setting, the abstraction must be supplied externally, using information about how the component manages data parameters. We have implemented our techniques by connecting the LearnLib tool for regular inference with the protocol simulator ns-2, and generated a model of the SIP component as implemented in ns-2.

  17. Self-Adaptive Context Aware Routing Protocol for Unicast Communication in Delay and Tolerant Network

    Directory of Open Access Journals (Sweden)

    Yunbo Chen

    2014-05-01

    Full Text Available At present, most of research works in mobile network focus on the network overhead of the known path which exists between the sender and the receiver. However, the trend of the current practical application demands is becoming increasingly distributed and decentralized. The Delay and Tolerant Network (DTN just comes out of such background of the conflicts between them. The DTN could effectively eliminate the gap between the mobile network and the practical application demands. In this paper, a Self-Adaptive Context Aware Routing Protocol (SACARP for the unicast communication in delay and tolerant networks is presented. Meanwhile, according to the real-time context information of DTN, the Kalman filter theory is introduced to predict the information state of mobility for the optional message ferrying node, and then gives the optimal selection strategy of the message ferrying nodes. The simulation experiments have shown that, compared to the familiar single- copy and multi-copy protocols, the SACARP proposed in this paper has better transmission performance and stability, especially when the network is free, the protocol would keep a good performance with fewer connections and less buffer space.

  18. Evaluation of Sexual Communication Message Strategies

    Directory of Open Access Journals (Sweden)

    Khan Munziba

    2011-05-01

    Full Text Available Abstract Parent-child communication about sex is an important proximal reproductive health outcome. But while campaigns to promote it such as the Parents Speak Up National Campaign (PSUNC have been effective, little is known about how messages influence parental cognitions and behavior. This study examines which message features explain responses to sexual communication messages. We content analyzed 4 PSUNC ads to identify specific, measurable message and advertising execution features. We then develop quantitative measures of those features, including message strategies, marketing strategies, and voice and other stylistic features, and merged the resulting data into a dataset drawn from a national media tracking survey of the campaign. Finally, we conducted multivariable logistic regression models to identify relationships between message content and ad reactions/receptivity, and between ad reactions/receptivity and parents' cognitions related to sexual communication included in the campaign's conceptual model. We found that overall parents were highly receptive to the PSUNC ads. We did not find significant associations between message content and ad reactions/receptivity. However, we found that reactions/receptivity to specific PSUNC ads were associated with increased norms, self-efficacy, short- and long-term expectations about parent-child sexual communication, as theorized in the conceptual model. This study extends previous research and methods to analyze message content and reactions/receptivity. The results confirm and extend previous PSUNC campaign evaluation and provide further evidence for the conceptual model. Future research should examine additional message content features and the effects of reactions/receptivity.

  19. Study, design and realization of a fault-tolerant and predictable synchronous communication protocol on off-the-shelf components; Etude, conception et mise en oeuvre d'un protocole de communication synchrone tolerant aux fautes et predictible sur des composants reseaux standards

    Energy Technology Data Exchange (ETDEWEB)

    Chabrol, D

    2006-06-15

    This PhD thesis contributes to the design and realization of safety-critical real-time systems on multiprocessor architectures with distributed memory. They are essential to compute systems that have to ensure complex and critical functions. This PhD thesis deals with communication media management. The communication management conditions strongly the capability of the system to fulfill the timeliness property and the dependability requirements. Our contribution includes: - The design of predictable and fault-tolerant synchronous communication protocol; - The study and the definition of the execution model to have a efficient and safe communications management; - The proposal of a method to generate automatically the communications scheduling. Our approach is based on a communication model that allows the analysis of the feasibility, before execution, of a distributed safe-critical real-time system with timeliness and safety requirements. This leads to the definition of an execution model based on a time-triggered and parallel communication management. A set of linear constraints system is generated automatically to compute the network scheduling and the network load with timeliness fulfillment. Then, the proposed communication interface is based on an advanced version of TDMA protocol which allows to use proprietary components (TTP, FlexRay) as well as standard components (Ethernet). The concepts presented in this thesis lead to the realisation and evaluation of a prototype within the framework of the OASIS project done at the CEA/List. (author)

  20. Evaluating emergency risk communications: a dialogue with the experts.

    Science.gov (United States)

    Thomas, Craig W; Vanderford, Marsha L; Crouse Quinn, Sandra

    2008-10-01

    Evaluating emergency risk communications is fraught with challenges since communication can be approached from both a systemic and programmatic level. Therefore, one must consider stakeholders' perspectives, effectiveness issues, standards of evidence and utility, and channels of influence (e.g., mass media and law enforcement). Evaluation issues related to timing, evaluation questions, methods, measures, and accountability are raised in this dialogue with emergency risk communication specialists. Besides the usual evaluation competencies, evaluators in this area need to understand and work collaboratively with stakeholders and be attuned to the dynamic contextual nature of emergency risk communications. Sample resources and measures are provided here to aid in this emerging and exciting field of evaluation.

  1. The evaluation of MRI protocols for the quantification of adiposity in the obese

    International Nuclear Information System (INIS)

    Tagami, Hirotaka; Taki, Tomomi; Ueoro, Kouichi

    1998-01-01

    Obesity is a recognized risk factor for the development of diseases such as atherosclerosis, diabetes mellitus and hypertension. The individual risk of the obesity can not be evaluated merely by the body weight or body mass index. The fat distribution is a key to evaluate it. So far, the MRI protocols in the literature tested for the evaluation of the fat distribution were spin-echo and inversion-recovery images. We tested both protocols and couldn't get good images basically due to motion artifacts. Therefore, the field-echo (FE) protocol, a rapid scan protocol, was evaluated. The transverse fat distributions at umbilical level of 8 male obese volunteers were examined with MRI FE protocol and X-ray computed tomography (CT). The excellent images were obtained with FE protocol and correlation with CT images was also satisfactory. The FE protocols for the evaluation of the fat distribution is of use and reasonable tool for the clinical usage. (author)

  2. Using OAI and other light-weight protocols to facilitate scholarly communication

    CERN Multimedia

    CERN. Geneva

    2005-01-01

    This presentation describes how we share and harvest sets of various OAI metadata, repurpose it through the Ockham Library Network, and demonstrate an alternative to traditional scholarly communication. The Ockham Library Network is a sponsored National Science Foundation Digital Library grant with co-PI's at Emory University, Virginia Tech, Oregon State University, and the University of Notre Dame. One of the purposes of Ockham is to exploit modular, light-weight protocols (such as OAI-PMH and SRW/U) into systems for learning, teaching, and scholarship. To date we have implemented a number of such services: * Ockham Digital Library Services Registry - A distributed directory of digital library services, collections, and agents. The contents of the Registry are described using the same XML schema articulated by the Information Environment Service Registry (IESR), and the records are shared among participating institutions on a peer-to-peer network utilizing OAI to propagate registry records amongst the distri...

  3. Verification of communication protocols in web services model-checking service compositions

    CERN Document Server

    Tari, Zahir; Mukherjee, Anshuman

    2014-01-01

    Gathers recent advancements in the field of self-organizing wireless sensor networks and provides readers with the essential, state-of-the-art information about sensor networking. In the near future, wireless sensor networks will become an integral part of our day-to-day life. To solve different sensor networking related issues, researchers have put a great deal of effort into coming up with innovative ideas. Verification of Communication Protocols in Web Services: Model-Checking Service Compositions gathers recent advancements in the field of self-organizing wireless sensor networks and provides readers with integral information about sensor networking. It introduces current technological trends, particularly in node organization, and provides implementation details of each networking type to help readers set up sensor networks in their related job fields. In addition, it identifies the limitations of current technologies, as well as future research directions.

  4. Faithful deterministic secure quantum communication and authentication protocol based on hyperentanglement against collective noise

    International Nuclear Information System (INIS)

    Chang Yan; Zhang Shi-Bin; Yan Li-Li; Han Gui-Hua

    2015-01-01

    Higher channel capacity and security are difficult to reach in a noisy channel. The loss of photons and the distortion of the qubit state are caused by noise. To solve these problems, in our study, a hyperentangled Bell state is used to design faithful deterministic secure quantum communication and authentication protocol over collective-rotation and collective-dephasing noisy channel, which doubles the channel capacity compared with using an ordinary Bell state as a carrier; a logical hyperentangled Bell state immune to collective-rotation and collective-dephasing noise is constructed. The secret message is divided into several parts to transmit, however the identity strings of Alice and Bob are reused. Unitary operations are not used. (paper)

  5. Interfaces and Communication Protocols in ATCA-Based LLRF Control Systems

    Science.gov (United States)

    Makowski, Dariusz; Koprek, Waldemar; Jezynski, Tomasz; Piotrowski, Adam; Jablonski, Grzegorz; Jalmuzna, Wojciech; Simrock, Stefan

    2009-10-01

    Linear accelerators driving Free Electron Lasers (FELs), such as the Free Electron Laser in Hamburg (FLASH) or the X-ray Free Electron Laser (XFEL), require sophisticated Low Level Radio Frequency (LLRF) control systems. The controller of the LLRF system should stabilize the phase and amplitude of the field in accelerating modules below 0.02% of the amplitude and 0.01 degree for phase tolerances to produce an ultra stable electron beam that meets the required conditions for Self-Amplified Spontaneous Emission (SASE). Since the LLRF system for the XFEL must be in operation for the next 20 years, it should be reliable, reproducible and upgradeable. Having in mind all requirements of the LLRF control system, the Advanced Telecommunications Computing Architecture (ATCA) has been chosen to build a prototype of the LLRF system for the FLASH accelerator that is able to supervise 32 cavities of one RF station. The LLRF controller takes advantage of features offered by the ATCA standard. The LLRF system consists of a few ATCA carrier blades, Rear Transition Modules (RTM) and several Advanced Mezzanine Cards (AMCs) that provide all necessary digital and analog hardware components. The distributed hardware of the LLRF system requires a number of communication links that should provide different latencies, bandwidths and protocols. The paper presents the general view of the ATC A-based LLRF system, discusses requirements and proposes an application for various interfaces and protocols in the distributed LLRF control system.

  6. Software protocol design: Communication and control in a multi-task robot machine for ITER vacuum vessel assembly and maintenance

    International Nuclear Information System (INIS)

    Li, Ming; Wu, Huapeng; Handroos, Heikki; Yang, Guangyou; Wang, Yongbo

    2015-01-01

    Highlights: • A high-level protocol is proposed for the data inter-transmission. • The protocol design is task-oriented for the robot control in the software system. • The protocol functions as a role of middleware in the software. • The protocol running stand-alone as an independent process in the software provides greater security. • Providing a reference design protocol for the multi-task robot machine in the industry. - Abstract: A specific communication and control protocol for software design of a multi-task robot machine is proposed. In order to fulfill the requirements on the complicated multi machining functions and the high performance motion control, the software design of robot is divided into two main parts accordingly, which consists of the user-oriented HMI part and robot control-oriented real-time control system. The two parts of software are deployed in the different hardware for the consideration of run-time performance, which forms a client–server-control architecture. Therefore a high-level task-oriented protocol is designed for the data inter-communication between the HMI part and the control system part, in which all the transmitting data related to a machining task is divided into three categories: trajectory-oriented data, task control-oriented data and status monitoring-oriented data. The protocol consists of three sub-protocols accordingly – a trajectory protocol, task control protocol and status protocol – which are deployed over the Ethernet and run as independent processes in both the client and server computers. The protocols are able to manage the vast amounts of data streaming due to the multi machining functions in a more efficient way. Since the protocol is functioning in the software as a role of middleware, and providing the data interface standards for the developing groups of two parts of software, it also permits greater focus of both software parts developers on their own requirements-oriented design. By

  7. Software protocol design: Communication and control in a multi-task robot machine for ITER vacuum vessel assembly and maintenance

    Energy Technology Data Exchange (ETDEWEB)

    Li, Ming, E-mail: ming.li@lut.fi [Laboratory of Intelligent Machines, Lappeenranta University of Technology (Finland); Wu, Huapeng; Handroos, Heikki [Laboratory of Intelligent Machines, Lappeenranta University of Technology (Finland); Yang, Guangyou [School of Mechanical Engineering, Hubei University of Technology, Wuhan (China); Wang, Yongbo [Laboratory of Intelligent Machines, Lappeenranta University of Technology (Finland)

    2015-10-15

    Highlights: • A high-level protocol is proposed for the data inter-transmission. • The protocol design is task-oriented for the robot control in the software system. • The protocol functions as a role of middleware in the software. • The protocol running stand-alone as an independent process in the software provides greater security. • Providing a reference design protocol for the multi-task robot machine in the industry. - Abstract: A specific communication and control protocol for software design of a multi-task robot machine is proposed. In order to fulfill the requirements on the complicated multi machining functions and the high performance motion control, the software design of robot is divided into two main parts accordingly, which consists of the user-oriented HMI part and robot control-oriented real-time control system. The two parts of software are deployed in the different hardware for the consideration of run-time performance, which forms a client–server-control architecture. Therefore a high-level task-oriented protocol is designed for the data inter-communication between the HMI part and the control system part, in which all the transmitting data related to a machining task is divided into three categories: trajectory-oriented data, task control-oriented data and status monitoring-oriented data. The protocol consists of three sub-protocols accordingly – a trajectory protocol, task control protocol and status protocol – which are deployed over the Ethernet and run as independent processes in both the client and server computers. The protocols are able to manage the vast amounts of data streaming due to the multi machining functions in a more efficient way. Since the protocol is functioning in the software as a role of middleware, and providing the data interface standards for the developing groups of two parts of software, it also permits greater focus of both software parts developers on their own requirements-oriented design. By

  8. Performance evaluation of spatial vector routing protocol for wireless sensor networks

    International Nuclear Information System (INIS)

    Baloch, J.; Jokhio, I.

    2012-01-01

    WSNs (Wireless Sensor Networks) is an emerging area of research. Researchers worldwide are working on the issues faced by sensor nodes. Communication has been a major issue in wireless networks and the problem is manifolds in WSN s because of the limited resources. The routing protocol in such networks plays a pivotal role, as an effective routing protocol could significantly reduce the energy consumed in transmitting and receiving data packets throughout a network. In this paper the performance of SVR (Spatial Vector Routing) an energy efficient, location aware routing protocol is compared with the existing location aware protocols. The results from the simulation trials show the performance of SVR. (author)

  9. Performance Evaluation of Spatial Vector Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Javed Ali Baloch

    2012-10-01

    Full Text Available WSNs (Wireless Sensor Networks is an emerging area of research. Researchers worldwide are working on the issues faced by sensor nodes. Communication has been a major issue in wireless networks and the problem is manifolds in WSNs because of the limited resources. The routing protocol in such networks plays a pivotal role, as an effective routing protocol could significantly reduce the energy consumed in transmitting and receiving data packets throughout a network. In this paper the performance of SVR (Spatial Vector Routing an energy efficient, location aware routing protocol is compared with the existing location aware protocols. The results from the simulation trials show the performance of SVR.

  10. STFTP: Secure TFTP Protocol for Embedded Multi-Agent Systems Communication

    Directory of Open Access Journals (Sweden)

    ZAGAR, D.

    2013-05-01

    Full Text Available Today's embedded systems have evolved into multipurpose devices moving towards an embedded multi-agent system (MAS infrastructure. With the involvement of MAS in embedded systems, one remaining issues is establishing communication between agents in low computational power and low memory embedded systems without present Embedded Operating System (EOS. One solution is the extension of an outdated Trivial File Transfer Protocol (TFTP. The main advantage of using TFTP in embedded systems is the easy implementation. However, the problem at hand is the overall lack of security mechanisms in TFTP. This paper proposes an extension to the existing TFTP in a form of added security mechanisms: STFTP. The authentication is proposed using Digest Access Authentication process whereas the data encryption can be performed by various cryptographic algorithms. The proposal is experimentally tested using two embedded systems based on micro-controller architecture. Communication is analyzed for authentication, data rate and transfer time versus various data encryption ciphers and files sizes. STFTP results in an expected drop in performance, which is in the range of similar encryption algorithms. The system could be improved by using embedded systems of higher computational power or by the use of hardware encryption modules.

  11. Proposed Fuzzy-NN Algorithm with LoRaCommunication Protocol for Clustered Irrigation Systems

    Directory of Open Access Journals (Sweden)

    Sotirios Kontogiannis

    2017-11-01

    Full Text Available Modern irrigation systems utilize sensors and actuators, interconnected together as a single entity. In such entities, A.I. algorithms are implemented, which are responsible for the irrigation process. In this paper, the authors present an irrigation Open Watering System (OWS architecture that spatially clusters the irrigation process into autonomous irrigation sections. Authors’ OWS implementation includes a Neuro-Fuzzy decision algorithm called FITRA, which originates from the Greek word for seed. In this paper, the FITRA algorithm is described in detail, as are experimentation results that indicate significant water conservations from the use of the FITRA algorithm. Furthermore, the authors propose a new communication protocol over LoRa radio as an alternative low-energy and long-range OWS clusters communication mechanism. The experimental scenarios confirm that the FITRA algorithm provides more efficient irrigation on clustered areas than existing non-clustered, time scheduled or threshold adaptive algorithms. This is due to the FITRA algorithm’s frequent monitoring of environmental conditions, fuzzy and neural network adaptation as well as adherence to past irrigation preferences.

  12. Evaluation of anaesthetic protocols for laboratory adult zebrafish (Danio rerio.

    Directory of Open Access Journals (Sweden)

    Tânia Martins

    Full Text Available In the last decades, the use of zebrafish (Danio rerio in biomedical research has increased. Anaesthesia is daily used in fish during experimental procedures to avoid discomfort, stress or pain. Also, fish welfare and the reliability of results can be compromised if an unsuitable anaesthetic protocol is used. Therefore, we aimed to refine anaesthetic protocols to be used in adult zebrafish by evaluating the efficacy of different anaesthetics, used alone or in combination. For that, zebrafish were randomly assigned to 8 different groups: 100 μg/mLMS-222 (MS; 0.2 μg/mL etomidate (E; 0.2 μg/mL etomidate + 100 μg/mL lidocaine (E+L; 1.25 μg/mL propofol (P; 1.25 μg/mL propofol + 100 μg/mL lidocaine (P+L; 100 μg/mL ketamine (K; 100 μg/mL ketamine + 1.25 μg/mL medetomidine (K+M; and 100 μg/mL ketamine + 1.25 μg/mL medetomidine/3.125 μg/mL atipamezole (K+M/A. The animals were placed in an anaesthetic water bath, then, the following parameters were registered: time for equilibrium loss and anaesthesia induction, loss of sensitivity to soft and painful stimuli, respiratory rate, recovery time, and activity after recovery. The combined forms of E+L, P+L and K+M were the fastest to induce a surgical anaesthetic stage. Nevertheless, E+L induced respiratory depression, while K+M was shown to have the longer recovery time compared to MS-222, even when atipamezole was added. In conclusion, the P+L combination was shown to provide good anaesthesia with analgesia, without causing a major respiratory depression, providing as well a quick recovery, similar to MS-222.

  13. Probabilistic Location-based Routing Protocol for Mobile Wireless Sensor Networks with Intermittent Communication

    Directory of Open Access Journals (Sweden)

    Sho KUMAGAI

    2015-02-01

    Full Text Available In a sensor network, sensor data messages reach the nearest stationary sink node connected to the Internet by wireless multihop transmissions. Recently, various mobile sensors are available due to advances of robotics technologies and communication technologies. A location based message-by-message routing protocol, such as Geographic Distance Routing (GEDIR is suitable for such mobile wireless networks; however, it is required for each mobile wireless sensor node to know the current locations of all its neighbor nodes. On the other hand, various intermittent communication methods for a low power consumption requirement have been proposed for wireless sensor networks. Intermittent Receiver-driven Data Transmission (IRDT is one of the most efficient methods; however, it is difficult to combine the location based routing and the intermittent communication. In order to solve this problem, this paper proposes a probabilistic approach IRDT-GEDIR with the help of one of the solutions of the secretaries problem. Here, each time a neighbor sensor node wakes up from its sleep mode, an intermediate sensor node determines whether it forwards its buffered sensor data messages to it or not based on an estimation of achieved pseudo speed of the messages. Simulation experiments show that IRDT-GEDIR achieves higher pseudo speed of sensor data message transmissions and shorter transmission delay than achieves shorter transmission delay than the two naive combinations of IRDT and GEDIR in sensor networks with mobile sensor nodes and a stationary sink node. In addition, the guideline of the estimated numbers of the neighbor nodes of each intermediate sensor node is provided based on the results of the simulation experiments to apply the probabilistic approach IRDT-GEDIR.

  14. Improving the communication reliability of body sensor networks based on the IEEE 802.15.4 protocol.

    Science.gov (United States)

    Gomes, Diogo; Afonso, José A

    2014-03-01

    Body sensor networks (BSNs) enable continuous monitoring of patients anywhere, with minimum constraints to daily life activities. Although the IEEE 802.15.4 and ZigBee(®) (ZigBee Alliance, San Ramon, CA) standards were mainly developed for use in wireless sensors network (WSN) applications, they are also widely used in BSN applications because of device characteristics such as low power, low cost, and small form factor. However, compared with WSNs, BSNs present some very distinctive characteristics in terms of traffic and mobility patterns, heterogeneity of the nodes, and quality of service requirements. This article evaluates the suitability of the carrier sense multiple access-collision avoidance protocol, used by the IEEE 802.15.4 and ZigBee standards, for data-intensive BSN applications, through the execution of experimental tests in different evaluation scenarios, in order to take into account the effects of contention, clock drift, and hidden nodes on the communication reliability. Results show that the delivery ratio may decrease substantially during transitory periods, which can last for several minutes, to a minimum of 90% with retransmissions and 13% without retransmissions. This article also proposes and evaluates the performance of the BSN contention avoidance mechanism, which was designed to solve the identified reliability problems. This mechanism was able to restore the delivery ratio to 100% even in the scenario without retransmissions.

  15. Communication Satisfaction in the Bank: An Audit Evaluation.

    Science.gov (United States)

    Walther, Joseph B.

    1988-01-01

    Evaluates structural influences on perceived communication adequacy in a multi-branch banking organization. Uses a communication audit to determine which groups within the banking system were experiencing dissatisfaction with received communication. Finds that part-time employees were significantly less satisfied than hourly workers. (MM)

  16. An evaluation of the hemiplegic subject based on the Bobath approach. Part II: The evaluation protocol.

    Science.gov (United States)

    Corriveau, H; Guarna, F; Dutil, E; Riley, E; Arsenault, A B; Drouin, G

    1988-01-01

    A protocol of evaluation of the hemiplegic patient based on the Bobath approach to treatment is presented. Six parameters are evaluated: sensorium, muscle tone, reflex activity, active movement, postural reactions and pain. The first and last of these are included because of their possible effects on the motor recovery process of the hemiplegic patient. The other four are directly borrowed from the Bobath modality of treatment. For each of these parameters, the procedures are given for its evaluation along with its respective rating scales. These scales are of an ordinal nature ranging from 0 to 3. It is suggested that this new evaluation protocol is fully compatible with the therapeutic modality developed by Bobath and as well is adequate to quantify patient progress in the principle aspects treated by this well used rehabilitation approach.

  17. Experimental Evaluation of TCP-Based DTN for Cislunar Communications in Presence of Long Link Disruption

    Directory of Open Access Journals (Sweden)

    Zhang Zhensheng

    2011-01-01

    Full Text Available Delay/disruption tolerant networking (DTN technology is considered a new solution to highly stressed communications in space environments. To date, little work has been done in evaluating the effectiveness and performance of the available DTN protocols when they are applied to an interplanetary Internet, especially in presence of a long link disruption. In this paper, we present an experimental investigation of the DTN architecture with a Bundle Protocol (BP running over TCP-based convergence layer (TCPCL protocol in a simulated cislunar communication environment characterized by a long link disruption. The intent of this work is to investigate the effectiveness of the TCPCL-based DTN protocol in coping with long link disruptions, through realistic file transfer experiments using a PC-based test-bed. The experiment results show that the DTN protocol is effective in handling a long link disruption experienced in data transmission accompanied by a cislunar link delay and a high BER. The performance of the DTN is most adversely affected by link disruption time in comparison to the effect of link delay and BER. For the transmissions with a very long link disruption of hours, the variations in goodput are nominal with respect to the change in cislunar link delay.

  18. On the Communication Complexity of Secure Function Evaluation with Long Output

    DEFF Research Database (Denmark)

    Hubacek, Pavel; Wichs, Daniel

    2015-01-01

    We study the communication complexity of secure function evaluation (SFE). Consider a setting where Alice has a short input χA, Bob has an input χB and we want Bob to learn some function y = f(χA, χB) with large output size. For example, Alice has a small secret decryption key, Bob has a large...... value. Moreover, we show that even in an offline/online protocol, the communication of the online phase must have output-size dependence. This negative result uses an incompressibility argument and it generalizes several recent lower bounds for functional encryption and (reusable) garbled circuits...

  19. Evaluating the Peruvian Rural Communication Services Project.

    Science.gov (United States)

    Mayo, John

    1988-01-01

    Reviews the Peruvian Rural Communication Services (PRCS) Project and outlines selected findings. Topics discussed include a brief description of Peru's economic and social conditions; satellite communication systems; audio teleconferencing; telephone service; planning and administration; research design features; data collection; and project…

  20. Mean-Field Analysis for the Evaluation of Gossip Protocols

    NARCIS (Netherlands)

    Bakshi, Rena; Cloth, L.; Fokkink, Wan; Haverkort, Boudewijn R.H.M.

    Gossip protocols are designed to operate in very large, decentralised networks. A node in such a network bases its decision to interact (gossip) with another node on its partial view of the global system. Because of the size of these networks, analysis of gossip protocols is mostly done using

  1. Mean-field analysis for the evaluation of gossip protocols

    NARCIS (Netherlands)

    Bakhshi, Rena; Cloth, L.; Fokkink, Wan; Haverkort, Boudewijn R.H.M.

    2008-01-01

    Gossip protocols are designed to operate in very large, decentralised networks. A node in such a network bases its decision to interact (gossip) with another node on its partial view of the global system. Because of the size of these networks, analysis of gossip protocols is mostly done using

  2. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    Science.gov (United States)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  3. Message Collision Avoidance Protocols for Detecting Stray Nodes in a Scuba Diving Group Using Ultrasonic Multi-Hop Message Communication

    Directory of Open Access Journals (Sweden)

    Shinya Kaido

    2017-12-01

    Full Text Available Recent years have seen a growing interest in underwater communication and some progress has been made in this area. However, underwater communication is still immature compared with terrestrial communication. A prime reason for this is that the underwater environment is intrinsically not suitable for propagation of electric waves. Instead, ultrasonic waves are mainly used for underwater communication. Since ultrasonic waves cannot provide sufficient communication speed or capacity, they cannot use existing network technologies, which assume use of radio waves. In particular, communication in shallow water is still an uncharted territory. Few communication technologies are employed in environments where people enjoy scuba diving. This paper addresses problems faced by recreational scuba divers. It proposes constructing an ad hoc mesh-shaped network between divers within a group and use ultrasonic waves as transmission media in order to enable the detection of a stray diver. It also proposes a communication protocol in which messages are relayed in multiple hops, and a message collision avoidance method, which is intended to reduce the rate of packet loss caused by message propagation delay. We have implemented the proposed methods in a network simulator, and compared them with an existing communication method that has no message collision avoidance function, in terms of the packet loss rate, the stray driver detection rate, and the rate of the ability to communicate in multiple hops.

  4. Training conversation partners of persons with communication disorders related to Parkinson's disease--a protocol and a pilot study.

    Science.gov (United States)

    Forsgren, Emma; Antonsson, Malin; Saldert, Charlotta

    2013-07-01

    This paper reports on the adaptation of a training programme for conversation partners of persons with Parkinson's disease, and a protocol for assessment of possible changes in conversational interaction as a result of intervention. We present data from an explorative multiple case study with three individuals with Parkinson's disease and their spouses. Repeated analysis of natural conversational interaction and measures of the participants' perception of communication as well as measures of different cognitive abilities were obtained. The results show that the communication in all three dyads was affected by both speech and language problems and that the conversation training model and the assessment protocol may work well after minor adjustments. Influence of different aspects of cognition on communication is discussed.

  5. A quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation

    International Nuclear Information System (INIS)

    Li Jian; Song Danjie; Guo Xiaojing; Jing Bo

    2012-01-01

    In order to transmit secure messages, a quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation is presented. The five-particle cluster state is used to detect eavesdroppers, and the classical XOR operation serving as a one-time-pad is used to ensure the security of the protocol. In the security analysis, the entropy theory method is introduced, and three detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all the information, the detection rate of the original ping-pong protocol is 50%; the second protocol, using two particles of the Einstein-Podolsky-Rosen pair as detection particles, is also 50%; while the presented protocol is 89%. Finally, the security of the proposed protocol is discussed, and the analysis results indicate that the protocol in this paper is more secure than the other two. (authors)

  6. Measurement of communication satisfaction. Evaluating the Communication Satisfaction Questionnaire as a communication audit tool

    NARCIS (Netherlands)

    Koning, K.H.; de Jong, Menno D.T.

    2007-01-01

    Despite the number of publications about auditing organizational communication, scholars have paid little attention to the reliability and validity of individual audit techniques. This study examines the merits and restrictions of the Communication Satisfaction Questionnaire (CSQ) by comparing CSQ

  7. Foundations of Reporting: Or Bartlett's Guide to Evaluation Communication.

    Science.gov (United States)

    Holley, Freda M.

    The author believes her ideas on evaluation reporting are old ideas in various fields including communication theory, advertising, social science, and learning theory. The human factor in reporting evaluation must be considered. Those being evaluated often feel threatened by the evaluation. Evaluators need to accept the behaviors of evaluation…

  8. Performance Evaluation of TDMA Medium Access Control Protocol in Cognitive Wireless Networks

    Directory of Open Access Journals (Sweden)

    Muhammed Enes Bayrakdar

    2017-02-01

    Full Text Available Cognitive radio paradigm has been revealed as a new communication technology that shares channels in wireless networks. Channel assignment is a crucial issue in the field of cognitive wireless networks because of the spectrum scarcity. In this work, we have evaluated the performance of TDMA medium access control protocol. In our simulation scenarios, primary users and secondary users utilize TDMA as a medium access control protocol. We have designed a network environment in Riverbed simulation software that consists of primary users, secondary users, and base stations. In our system model, secondary users sense the spectrum and inform the base station about empty channels. Then, the base station decides accordingly which secondary user may utilize the empty channel. Energy detection technique is employed as a spectrum sensing technique because it is the best when information about signal of primary user is acquired. Besides, different number of users is selected in simulation scenarios in order to obtain accurate delay and throughput results. Comparing analytical model with simulation results, we have shown that performance analysis of our system model is consistent and accurate.

  9. Assessing older drivers: a primary care protocol to evaluate driving safety risk.

    Science.gov (United States)

    Murden, Robert A; Unroe, Kathleen

    2005-08-01

    Most articles on elder drivers offer either general advice, or review testing protocols that divide drivers into two distinct groups: safe or unsafe. We believe it is unreasonable to expect any testing to fully separate drivers into just these two mutually exclusive groups, so we offer a protocol for a more practical approach. This protocol can be applied by primary care physicians. We review the justification for the many steps of this protocol, which have branches that lead to identifying drivers as low risk, high risk (for accidents) or needing further evaluation. Options for further evaluation are provided.

  10. Evaluating Management Information Systems, A Protocol for Automated Peer Review Systems

    OpenAIRE

    Black, Gordon C.

    1980-01-01

    This paper discusses key issues in evaluating an automated Peer Review System. Included are the conceptual base, design, steps in planning structural components, operation parameters, criteria, costs and a detailed outline or protocol for use in the evaluation.

  11. Network protocol changes can improve DisCom WAN performance : evaluating TCP modifications and SCTP in the ASC tri-lab environment.

    Energy Technology Data Exchange (ETDEWEB)

    Tolendino, Lawrence F.; Hu, Tan Chang

    2005-06-01

    The Advanced Simulation and Computing (ASC) Distance Computing (DisCom) Wide Area Network (WAN) is a high performance, long distance network environment that is based on the ubiquitous TCP/IP protocol set. However, the Transmission Control Protocol (TCP) and the algorithms that govern its operation were defined almost two decades ago for a network environment vastly different from the DisCom WAN. In this paper we explore and evaluate possible modifications to TCP that purport to improve TCP performance in environments like the DisCom WAN. We also examine a much newer protocol, SCTP (Stream Control Transmission Protocol) that claims to provide reliable network transport while also implementing multi-streaming, multi-homing capabilities that are appealing in the DisCom high performance network environment. We provide performance comparisons and recommendations for continued development that will lead to network communications protocol implementations capable of supporting the coming ASC Petaflop computing environments.

  12. Evaluation of an adult insulin infusion protocol at an academic medical center.

    Science.gov (United States)

    Petrov, Katerina I; Burns, Tammy L; Drincic, Andjela

    2012-05-01

    Acknowledging evidence of possible detrimental effects of tightly controlled blood glucose levels, the American Association of Clinical Endocrinologists and the American Diabetes Association published a consensus statement recommending less strict control for most diabetic patients. As a result of these recommendations, our academic center at Creighton University Medical Center revised its adult insulin infusion protocol to target blood glucose levels ranging from 120 to 180 mg/dL for regular (standard) glycemic control and 80 to 120 mg/dL for tight control; previous targets had ranged from 80 to 180 mg/dL and 70 to 110 mg/dL, respectively. The primary objective was to evaluate the time that blood glucose values were within the target range for patients receiving the new protocol, compared with patients receiving the previous protocol. Our study was designed to evaluate the effectiveness and safety of the revised protocol. Using a retrospective chart review, we collected data for 4 months from patients on the old insulin protocol (May to August 2009) and for 4 months from patients on the new protocol (September to December 2009). Secondary endpoints included the number of hypoglycemic episodes (blood glucose below 70 mg/dL) and severe hypoglycemic episodes (blood glucose 40 mg/dL or lower) experienced by patients receiving the new insulin protocol compared with those receiving the former protocol. Patient characteristics were similar at baseline. Blood glucose values stayed within the target range for a significantly shorter time with the new protocol than with the former protocol (44.6% vs. 56.8%, respectively; P protocol. No statistically significant differences in hypoglycemia were observed after the protocol was changed. Hypoglycemia occurred in 31% of the former-protocol patients compared with 18% of the revised-protocol patients. Severe hypoglycemia was experienced by 2.1% of patients on the old protocol and by 3.1% of patients on the new protocol. Rates of

  13. Experimental Evaluation of Unicast and Multicast CoAP Group Communication

    Directory of Open Access Journals (Sweden)

    Isam Ishaq

    2016-07-01

    Full Text Available The Internet of Things (IoT is expanding rapidly to new domains in which embedded devices play a key role and gradually outnumber traditionally-connected devices. These devices are often constrained in their resources and are thus unable to run standard Internet protocols. The Constrained Application Protocol (CoAP is a new alternative standard protocol that implements the same principals as the Hypertext Transfer Protocol (HTTP, but is tailored towards constrained devices. In many IoT application domains, devices need to be addressed in groups in addition to being addressable individually. Two main approaches are currently being proposed in the IoT community for CoAP-based group communication. The main difference between the two approaches lies in the underlying communication type: multicast versus unicast. In this article, we experimentally evaluate those two approaches using two wireless sensor testbeds and under different test conditions. We highlight the pros and cons of each of them and propose combining these approaches in a hybrid solution to better suit certain use case requirements. Additionally, we provide a solution for multicast-based group membership management using CoAP.

  14. Double C-NOT attack and counterattack on `Three-step semi-quantum secure direct communication protocol'

    Science.gov (United States)

    Gu, Jun; Lin, Po-hua; Hwang, Tzonelih

    2018-07-01

    Recently, Zou and Qiu (Sci China Phys Mech Astron 57:1696-1702, 2014) proposed a three-step semi-quantum secure direct communication protocol allowing a classical participant who does not have a quantum register to securely send his/her secret message to a quantum participant. However, this study points out that an eavesdropper can use the double C-NOT attack to obtain the secret message. To solve this problem, a modification is proposed.

  15. The Effect of Health Information Technology on Health Care Provider Communication: A Mixed-Method Protocol.

    Science.gov (United States)

    Manojlovich, Milisa; Adler-Milstein, Julia; Harrod, Molly; Sales, Anne; Hofer, Timothy P; Saint, Sanjay; Krein, Sarah L

    2015-06-11

    Communication failures between physicians and nurses are one of the most common causes of adverse events for hospitalized patients, as well as a major root cause of all sentinel events. Communication technology (ie, the electronic medical record, computerized provider order entry, email, and pagers), which is a component of health information technology (HIT), may help reduce some communication failures but increase others because of an inadequate understanding of how communication technology is used. Increasing use of health information and communication technologies is likely to affect communication between nurses and physicians. The purpose of this study is to describe, in detail, how health information and communication technologies facilitate or hinder communication between nurses and physicians with the ultimate goal of identifying how we can optimize the use of these technologies to support effective communication. Effective communication is the process of developing shared understanding between communicators by establishing, testing, and maintaining relationships. Our theoretical model, based in communication and sociology theories, describes how health information and communication technologies affect communication through communication practices (ie, use of rich media; the location and availability of computers) and work relationships (ie, hierarchies and team stability). Therefore we seek to (1) identify the range of health information and communication technologies used in a national sample of medical-surgical acute care units, (2) describe communication practices and work relationships that may be influenced by health information and communication technologies in these same settings, and (3) explore how differences in health information and communication technologies, communication practices, and work relationships between physicians and nurses influence communication. This 4-year study uses a sequential mixed-methods design, beginning with a

  16. Evaluation of two communication strategies to improve udder health management

    NARCIS (Netherlands)

    Jansen, J.; Renes, R.J.; Lam, T.J.G.M.

    2010-01-01

    Worldwide, programs to improve udder health are implemented using communication tools and methods that inform and persuade dairy farmers. This study evaluated 2 communication strategies used in a mastitis control program in the Netherlands. To improve farmers’ udder health management, tools such as

  17. Development and Evaluation of an Undergraduate Science Communication Module

    Science.gov (United States)

    Yeoman, Kay H.; James, Helen A.; Bowater, Laura

    2011-01-01

    This paper describes the design and evaluation of an undergraduate final year science communication module for the Science Faculty at the University of East Anglia. The module focuses specifically on science communication and aims to bring an understanding of how science is disseminated to the public. Students on the module are made aware of the…

  18. Performance Evaluation of Security Protocols Specified in LySa

    DEFF Research Database (Denmark)

    Bodei, Chiara; Curti, Michele; Degano, Pierpaolo

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on system describing cryptographic protocols. The transitions of the system carry enhanced labels. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architectu...

  19. Evaluation of protocol uniformity concerning laparoscopic cholecystectomy in The Netherlands

    NARCIS (Netherlands)

    L.S.G.L. Wauben; R.H.M. Goossens (Richard); D.J. van Eijk (Daan); J.F. Lange (Johan)

    2008-01-01

    textabstractBackground: Iatrogenic bile duct injury remains a current complication of laparoscopic cholecystectomy. One uniform and standardized protocol, based on the "critical view of safety" concept of Strasberg, should reduce the incidence of this complication. Furthermore, owing to the rapid

  20. Space Shuttle Underside Astronaut Communications Performance Evaluation

    Science.gov (United States)

    Hwu, Shian U.; Dobbins, Justin A.; Loh, Yin-Chung; Kroll, Quin D.; Sham, Catherine C.

    2005-01-01

    The Space Shuttle Ultra High Frequency (UHF) communications system is planned to provide Radio Frequency (RF) coverage for astronauts working underside of the Space Shuttle Orbiter (SSO) for thermal tile inspection and repairing. This study is to assess the Space Shuttle UHF communication performance for astronauts in the shadow region without line-of-sight (LOS) to the Space Shuttle and Space Station UHF antennas. To insure the RF coverage performance at anticipated astronaut worksites, the link margin between the UHF antennas and Extravehicular Activity (EVA) Astronauts with significant vehicle structure blockage was analyzed. A series of near-field measurements were performed using the NASA/JSC Anechoic Chamber Antenna test facilities. Computational investigations were also performed using the electromagnetic modeling techniques. The computer simulation tool based on the Geometrical Theory of Diffraction (GTD) was used to compute the signal strengths. The signal strength was obtained by computing the reflected and diffracted fields along the propagation paths between the transmitting and receiving antennas. Based on the results obtained in this study, RF coverage for UHF communication links was determined for the anticipated astronaut worksite in the shadow region underneath the Space Shuttle.

  1. Evaluation of Interoperability Protocols in Repositories of Electronic Theses and Dissertations

    Science.gov (United States)

    Hakimjavadi, Hesamedin; Masrek, Mohamad Noorman

    2013-01-01

    Purpose: The purpose of this study is to evaluate the status of eight interoperability protocols within repositories of electronic theses and dissertations (ETDs) as an introduction to further studies on feasibility of deploying these protocols in upcoming areas of interoperability. Design/methodology/approach: Three surveys of 266 ETD…

  2. Simple Models for the Performance Evaluation of a Class of Two-Hop Relay Protocols

    NARCIS (Netherlands)

    Al Hanbali, Ahmad; Kherani, Arzad A.; Nain, Philippe

    2007-01-01

    We evaluate the performance of a class of two-hop relay protocols for mobile ad hoc networks. The interest is on the multicopy two-hop relay (MTR) protocol, where the source may generate multiple copies of a packet and use relay nodes to deliver the packet (or a copy) to its destination, and on the

  3. Simple models for the performance evaluation of a class of two-hop relay protocols

    NARCIS (Netherlands)

    Al Hanbali, A.; Kherani, A.A.; Nain, P.; Akyildiz, I.F.; Sivakumar, R.; Ekici, E.; Cavalcante de Oliveira, J.; McNair, J.

    2007-01-01

    We evaluate the performance of a class of two-hop relay protocols for mobile ad hoc networks. The interest is on the multicopy two-hop relay (MTR) protocol, where the source may generate multiple copies of a packet and use relay nodes to deliver the packet (or a copy) to its destination, and on the

  4. Performance Evaluation of a Cluster-Based Service Discovery Protocol for Heterogeneous Wireless Sensor Networks

    NARCIS (Netherlands)

    Marin Perianu, Raluca; Scholten, Johan; Havinga, Paul J.M.; Hartel, Pieter H.

    2006-01-01

    Abstract—This paper evaluates the performance in terms of resource consumption of a service discovery protocol proposed for heterogeneous Wireless Sensor Networks (WSNs). The protocol is based on a clustering structure, which facilitates the construction of a distributed directory. Nodes with higher

  5. Cyber Security Evaluation of the Wireless Communication for the Mobile Safeguard Systems in Nuclear Power Plants

    International Nuclear Information System (INIS)

    Lee, S.; Kim, Y.S.; Ye, S.H.

    2015-01-01

    This paper introduces cyber security evaluation results and a design of the wireless communication technology to apply to safeguard systems in nuclear power plants. While wireless communication technologies can generally make mobility and efficiency on plant operation, those have seldom been installed on the nuclear I&C systems due to the negative concern of unexpected outcomes that stem from electromagnetic interference and cyber attack. New design of advanced digital safeguard and I&C systems uses computer-based systems for the safeguard and safety functions. On the other hand, those are being exposed to various types of new and existing cyber threats, vulnerabilities and risks which significantly increase the likelihood that those could be compromised. In order to employ the wireless communication technology in safeguard function, licencees assess and manage the potential for adverse effects on safeguard and safety functions so as to provide high assurance that critical functions are properly protected cyber attack. It is expected that the safeguard function, specifically on the area of real-time monitoring, logging, can be enhanced by employing the mobile safeguard devices (: smart phone, laptop, smart pad, etc). In this paper, we deal with the cyber security evaluation, which consists of threat analysis, vulnerability test, establishment of security plan, and design solutions for the wireless communication on the basis of IEEE 802.11(Wi-Fi) protocol. Proposed evaluation and design solution could be a basis for the design of wireless communication and mobile safeguard systems in nuclear power plants. (author)

  6. Aligning research assessment in the Humanities to the national Standard Evaluation Protocol Challenges and developments in the Dutch research landscape

    Energy Technology Data Exchange (ETDEWEB)

    Prins, A.; Spaapen, J.; Van Vree, F

    2016-07-01

    The purpose of this session is a debate about innovation in comprehensive methods for the assessment of humanities research. Input will come from preliminary outcomes of an ongoing project in the Netherlands to find adequate indicators for humanities research that will fit in the national Standard Evaluation Protocol. The project includes processes of ‘bottom up’ data collection (that is, with input coming from the research community) and discussion with Humanities researchers, investigating the specific characteristics of publication and communication cultures in the Humanities, and the prospects for the use of quantitative and qualitative indicators. (Author)

  7. The characteristics and prognosis of patients fulfilling the Appropriateness Evaluation Protocol in a medical admission unit; a prospective observational study

    DEFF Research Database (Denmark)

    Brabrand, Mikkel; Knudsen, Torben; Hallas, Jesper

    2011-01-01

    To examine the prognostic significance of fulfilling at least one of the Appropriateness Evaluation Protocol (AEP) criteria.......To examine the prognostic significance of fulfilling at least one of the Appropriateness Evaluation Protocol (AEP) criteria....

  8. Improving health outcomes for young people with long term conditions: The role of digital communication in current and future patient-clinician communication for NHS providers of specialist clinical services for young people - LYNC study protocol.

    Science.gov (United States)

    Griffiths, Frances E; Atherton, Helen; Barker, Jack R; Cave, Jonathan Ak; Dennick, Kathryn; Dowdall, Peter; Fraser, Joe; Huxley, Caroline; Kim, Sung-Wook; Madan, Jason J; Matharu, Harjit; Musumadi, Luhanga; Palmer, Tom M; Paul, Moli; Sankaranarayanan, Sailesh; Slowther, Anne-Marie; Sujan, Mark A; Sutcliffe, Paul A; Sturt, Jackie

    2015-01-01

    Young people living with long term conditions are vulnerable to health service disengagement. This endangers their long term health. Studies report requests for digital forms of communication - email, text, social media - with their health care team. Digital clinical communication is troublesome for the UK NHS. In this article we aim to present the research protocol for evaluating the impacts and outcomes of digital clinical communications for young people living with long term conditions and provide critical analysis of their use, monitoring and evaluation by NHS providers (LYNC study: Long term conditions, Young people, Networked Communications). The research involves: (a) patient and public involvement activities with 16-24 year olds with and without long term health conditions; (b) six literature reviews; (c) case studies - the main empirical part of the study - and (d) synthesis and a consensus meeting. Case studies use a mixed methods design. Interviews and non-participant observation of practitioners and patients communicating in up to 20 specialist clinical settings will be combined with data, aggregated at the case level (non-identifiable patient data) on a range of clinical outcomes meaningful within the case and across cases. We will describe the use of digital clinical communication from the perspective of patients, clinical staff, support staff and managers, interviewing up to 15 young people and 15 staff per case study. Outcome data includes emergency admissions, A&E attendance and DNA (did not attend) rates. Case studies will be analysed to understand impacts of digital clinical communication on patient health outcomes, health care costs and consumption, ethics and patient safety.

  9. Evaluation of radiation doses delivered in different chest CT protocols

    International Nuclear Information System (INIS)

    Gorycki, Tomasz; Lasek, Iwona; Kamiński, Kamil; Studniarek, Michał

    2014-01-01

    There are differences in the reference diagnostic levels for the computed tomography (CT) of the chest as cited in different literature sources. The doses are expressed either in weighted CT dose index (CTDI VOL ) used to express the dose per slice, dose-length product (DLP), and effective dose (E). The purpose of this study was to assess the radiation dose used in Low Dose Computer Tomography (LDCT) of the chest in comparison with routine chest CT examinations as well as to compare doses delivered in low dose chest CT with chest X-ray doses. CTDI VOL and DLP doses were taken to analysis from routine CT chest examinations (64 MDCT TK LIGHT SPEED GE Medical System) performed in 202 adult patients with FBP reconstruction: 51 low dose, 106 helical, 20 angio CT, and 25 high resolution CT protocols, as well as 19 helical protocols with iterative ASIR reconstruction. The analysis of chest X-ray doses was made on the basis of reports from 44 examinations. Mean values of CTDI VOL and DLP were, respectively: 2.1 mGy and 85.1 mGy·cm, for low dose, 9.7 mGy and 392.3 mGy·cm for helical, 18.2 mGy and 813.9 mGy·cm for angio CT, 2.3 mGy and 64.4 mGy·cm for high resolution CT, 8.9 mGy. and 317.6 mGy·cm for helical ASIR protocols. Significantly lower CTDI VOL and DLP values were observed for low dose and high resolution CT versus the remaining CT protocols; doses delivered in CT ASIR protocols were also lower (80–81%). The ratio between medial doses in low dose CT and chest X-ray was 11.56. Radiation dose in extended chest LDCT with parameters allowing for identification of mediastinal structures and adrenal glands is still much lower than that in standard CT protocols. Effective doses predicted for LDCT may exceed those used in chest X-ray examinations by a factor of 4 to 12, depending on LDCT scan parameters. Our results, as well as results from other authors, suggest a possibility of reducing the dose by means of iterative reconstruction. Efforts towards further dose

  10. A Proof-checked Verification of a Real-Time Communication Protocol

    NARCIS (Netherlands)

    Polak, I.

    We present an analysis of a protocol developed by Philips to connect several components of an audio-system. The verification of the protocol is carried out using the timed I/O-automata model of Lynch and Vaandrager. The verification has been partially proof-checked with the interactive proof

  11. Facility for the evaluation of space communications and related systems

    Science.gov (United States)

    Kerczewski, Robert J.; Svoboda, James S.; Kachmar, Brian A.

    1995-01-01

    NASA Lewis Research Center's Communications Projects Branch has developed a facility for the evaluation of space communications systems and related types of systems, called the Advanced Space Communications (ASC) Laboratory. The ASC Lab includes instrumentation, testbed hardware, and experiment control and monitor software for the evaluation of components, subsystems, systems, and networks. The ASC lab has capabilities to perform radiofrequency (RF), microwave, and millimeter-wave characterizations as well as measurements using low, medium, or high data rate digital signals. In addition to laboratory measurements, the ASC Lab also includes integrated satellite ground terminals allowing experimentation and measurements accessing operational satellites through real space links.

  12. Geographic variation in lumbar diskectomy: a protocol for evaluation.

    Science.gov (United States)

    Barron, M; Kazandjian, V A

    1992-03-01

    In 1989 the Maryland Hospital Association (MHA) began developing a protocol related to lumbar diskectomy, a procedure with widely reported geographic variation in its use. The MHA's Laminectomy Advisory Committee drafted three criteria for performance of lumbar diskectomy and also developed a data-collection instrument with which the eight hospitals participating in a pilot study could abstract the necessary data from medical records. Both individual hospital and aggregate results showed wide variation in compliance with the criteria. These findings suggest research and development activities such as refinement of the data-collection instrument, use of the protocol for bench-marking, further investigation of clinical and other determinants of rate variation, and study of the effect of new diagnostic technology on utilization rates for this procedure.

  13. Testing protocols for evaluating monolithic waste forms containing mixed wastes

    International Nuclear Information System (INIS)

    Gilliam, T.M.; Sams, T.L.; Pitt, W.W.

    1986-01-01

    Test protocols have been presented which can be used as a guide in cement-based grout formulation development studies. Based on experience at ORNL, these six tests are generally sufficient to develop a grout product which will meet all applicable DOE, NRC, and EPA performance criteria. As such, these tests can be used to minimize the time required to tailor a grout to be compatible with both the waste stream and the process disposal scenario. 9 refs

  14. Measurement and protocol for evaluating video and still stabilization systems

    Science.gov (United States)

    Cormier, Etienne; Cao, Frédéric; Guichard, Frédéric; Viard, Clément

    2013-01-01

    This article presents a system and a protocol to characterize image stabilization systems both for still images and videos. It uses a six axes platform, three being used for camera rotation and three for camera positioning. The platform is programmable and can reproduce complex motions that have been typically recorded by a gyroscope mounted on different types of cameras in different use cases. The measurement uses a single chart for still image and videos, the texture dead leaves chart. Although the proposed implementation of the protocol uses a motion platform, the measurement itself does not rely on any specific hardware. For still images, a modulation transfer function is measured in different directions and is weighted by a contrast sensitivity function (simulating the human visual system accuracy) to obtain an acutance. The sharpness improvement due to the image stabilization system is a good measurement of performance as recommended by a CIPA standard draft. For video, four markers on the chart are detected with sub-pixel accuracy to determine a homographic deformation between the current frame and a reference position. This model describes well the apparent global motion as translations, but also rotations along the optical axis and distortion due to the electronic rolling shutter equipping most CMOS sensors. The protocol is applied to all types of cameras such as DSC, DSLR and smartphones.

  15. Experimental Evaluation of Simulation Abstractions for Wireless Sensor Network MAC Protocols

    Directory of Open Access Journals (Sweden)

    G. P. Halkes

    2010-01-01

    Full Text Available The evaluation of MAC protocols for Wireless Sensor Networks (WSNs is often performed through simulation. These simulations necessarily abstract away from reality in many ways. However, the impact of these abstractions on the results of the simulations has received only limited attention. Moreover, many studies on the accuracy of simulation have studied either the physical layer and per link effects or routing protocol effects. To the best of our knowledge, no other work has focused on the study of the simulation abstractions with respect to MAC protocol performance. In this paper, we present the results of an experimental study of two often used abstractions in the simulation of WSN MAC protocols. We show that a simple SNR-based reception model can provide quite accurate results for metrics commonly used to evaluate MAC protocols. Furthermore, we provide an analysis of what the main sources of deviation are and thereby how the simulations can be improved to provide even better results.

  16. The NLM evaluation lecture series: introduction to the special section on evaluating health communication programs.

    Science.gov (United States)

    Logan, Robert A; Kreps, Gary L

    2014-12-01

    This article introduces the Journal of Health Communication's special section, Evaluating Health Communication Programs. This special section is based on a public lecture series supported by the National Library of Medicine titled "Better Health: Evaluating Health Communication Programs" designed to share best practices for using evaluation research to develop, implement, refine, and institutionalize the best health communication programs for promoting public health. This introduction provides an overview to the series, summarizes the major presentations in the series, and describe implications from the series for translational health communication research, interventions, and programs that can enhance health outcomes.

  17. Investigating And Evaluating Of Network Failures And Performance Over Distributed WAN In Application Protocol Layer

    Directory of Open Access Journals (Sweden)

    Enoch Okoh Kofi

    2015-08-01

    Full Text Available The Experiment was done to find out network failures and application performance relationship over distributed Wide Area Net WAN. In order to access related application over the cloud there must be an internet connectivity which will help the respective workstations to access the remote server for applications being deployed over the network. Bandwidth improvement helps in reducing utilization over the network and it also helps in improving Application Efficiency of these Applications in terms of Response Time. Routers were configured under Enhance Interior Gateway Routing Protocol EIGRP to reduce utilization and to ensure load sharing over the network. Three scenarios were modeled and their performance efficiency was evaluated. A modeled computer Network with and without a fail Router under different scenarios and such Network was simulated with emphasis on the Application Performance. The Experiment was done for fifty workstations under three scenarios and these three scenarios were accessed and evaluated on experimental basis using Riverbed modeler to show the Effect of Application Network performance. The performance results show that increasing the bandwidth reduces utilization and also with the failure of one communication bandwidth users can still access Network Application with a minimal cost.

  18. Evaluation of image quality and dose in renal colic: comparison of different spiral-CT protocols

    International Nuclear Information System (INIS)

    Rimondini, A.; Mucelli, R.P.; Dalla Palma, L.; De Denaro, M.; Bregant, P.

    2001-01-01

    The aim of this study was to test different technical spiral-CT parameters to obtain optimal image quality with reduced X-ray dose. Images were acquired with a spiral-CT system Philips Tomoscan AVE1, using 250 mA, 120 kV, and 1-s rotational time. Three protocols were tested: protocol A with 5-mm thickness, pitch 1.6, slice reconstruction every 2.5 mm; protocol B with 3-mm thickness, pitch 1.6, slice reconstruction every 1.5 mm; and protocol C with 3-mm thickness, pitch 2, slice reconstruction every 1.5 mm. Two phantoms were employed to evaluate the image quality. Axial images were acquired, then sagittal and coronal images were reconstructed. Finally, the absorbed X-ray dose for each protocol was measured. Regarding image quality, 5-mm-thick images (protocol A) showed greater spatial resolution and lower noise compared with 3-mm-thick images (protocols B and C) on the axial plane; 3-mm reconstructed sagittal and coronal images (protocols B and C) showed an improved image quality compared with 5-mm reformatted images (protocol A). Concerning X-ray dose, the mean dose was: protocol A 19.6±0.8 mGy; protocol B 14.4±0.6 mGy; protocol C 12.5±1.0 mGy. Our study supports the use of thin slices (3 mm) combined with pitch of 1.6 or 2 in renal colic for X-ray dose reduction to the patient and good image quality. (orig.)

  19. Cryptanalysis and improvement of quantum broadcast communication and authentication protocol with a quantum one-time pad

    International Nuclear Information System (INIS)

    Liu Zhi-Hao; Chen Han-Wu

    2016-01-01

    The security of quantum broadcast communication (QBC) and authentication protocol based on Greenberger–Horne–Zeilinger (GHZ) state and quantum one-time pad is analyzed. It is shown that there are some security issues in this protocol. Firstly, an external eavesdropper can take the intercept–measure–resend attack strategy to eavesdrop on 0.369 bit of every bit of the identity string of each receiver without being detected. Meanwhile, 0.524 bit of every bit of the secret message can be eavesdropped on without being detected. Secondly, an inner receiver can take the intercept–measure–resend attack strategy to eavesdrop on half of the identity string of the other’s definitely without being checked. In addition, an alternative attack called the CNOT-operation attack is discussed. As for the multi-party QBC protocol, the attack efficiency increases with the increase of the number of users. Finally, the QBC protocol is improved to a secure one. (paper)

  20. Rendezvous Protocols and Dynamic Frequency Hopping Interference Design for Anti-Jamming Satellite Communication

    Science.gov (United States)

    2013-11-25

    previously considered this proactive approach to combat unintentional, persistent (non- reactive) interference . In this project, we plan on extending our...channel” (or code ) by chance, through public knowledge of the underlying protocol semantics , or by compromising one of the network devices. An alternative...AFRL-RV-PS- AFRL-RV-PS- TR-2013-0142 TR-2013-0142 RENDEZVOUS PROTOCOLS AND DYNAMIC FREQUENCY HOPPING INTERFERENCE DESIGN FOR ANTI-JAMMING

  1. Selected indicators for evaluating the effectiveness of marketing communication

    Directory of Open Access Journals (Sweden)

    Aneta Olejniczak

    2015-06-01

    Full Text Available The issue of the evaluation of marketing activity in each institution most often refers to marketing communications and therefore promotional activities of the company. Whereas measuring the effectiveness of marketing communications results, we can use many tools-indicators, the use of which will track the progress and assess the effectiveness of our institution run by marketing communications. With a view to implementing effective marketing strategy we must be able to measure our success. In this article, has been made a review of selected indicators to evaluate the effectiveness of marketing communications. Cited indicators are commonly used. According to the authors, each institution should create its own set of indicators by which the effects of its operations will be best measured.

  2. The nuts and bolts of evaluating science communication activities.

    Science.gov (United States)

    Spicer, Suzanne

    2017-10-01

    Since 2008 there has been a focus on fostering a culture of public engagement in higher education plus an impact agenda that demands scientists provide evidence of how their work, including their science communication, is making a difference. Good science communication takes a significant amount of time to plan and deliver so how can you improve what you are doing and demonstrate if you are having an impact? The answer is to evaluate. Effective evaluation needs to be planned so this paper takes you step by step through the evaluation process, illustrated using specific examples. Crown Copyright © 2017. Published by Elsevier Ltd. All rights reserved.

  3. Field validation of protocols developed to evaluate in-line mastitis detection systems.

    Science.gov (United States)

    Kamphuis, C; Dela Rue, B T; Eastwood, C R

    2016-02-01

    This paper reports on a field validation of previously developed protocols for evaluating the performance of in-line mastitis-detection systems. The protocols outlined 2 requirements of these systems: (1) to detect cows with clinical mastitis (CM) promptly and accurately to enable timely and appropriate treatment and (2) to identify cows with high somatic cell count (SCC) to manage bulk milk SCC levels. Gold standard measures, evaluation tests, performance measures, and performance targets were proposed. The current study validated the protocols on commercial dairy farms with automated in-line mastitis-detection systems using both electrical conductivity (EC) and SCC sensor systems that both monitor at whole-udder level. The protocol for requirement 1 was applied on 3 commercial farms. For requirement 2, the protocol was applied on 6 farms; 3 of them had low bulk milk SCC (128×10(3) cells/mL) and were the same farms as used for field evaluation of requirement 1. Three farms with high bulk milk SCC (270×10(3) cells/mL) were additionally enrolled. The field evaluation methodology and results were presented at a workshop including representation from 7 international suppliers of in-line mastitis-detection systems. Feedback was sought on the acceptance of standardized performance evaluation protocols and recommended refinements to the protocols. Although the methodology for requirement 1 was relatively labor intensive and required organizational skills over an extended period, no major issues were encountered during the field validation of both protocols. The validation, thus, proved the protocols to be practical. Also, no changes to the data collection process were recommended by the technology supplier representatives. However, 4 recommendations were made to refine the protocols: inclusion of an additional analysis that ignores small (low-density) clot observations in the definition of CM, extension of the time window from 4 to 5 milkings for timely alerts for CM

  4. The development of evaluation methodology for advanced interactive communication

    International Nuclear Information System (INIS)

    Okamoto, K.

    2005-01-01

    Face-to-face communication is one of the essential style of communication. Trough face-to-face communication, people exchange much information at a time, both verbal and non-verbal information, which is most effective to learn each other. The authors focused on the face-to-face communication, and developed an evaluation method to quantify the effectiveness of communication. We regard conversation as an exchange of keywords. The effectiveness of conversation is valued by the amount of the keywords, and the achievement of mutual understandings. Through two people's face-to-face communication, the author quantified the shared information by measuring the change of the amount of the participants' knowledge. The participants' knowledge is counted by the words they can give. We measured the change in their shared knowledge (number of the words they gave associated to the theme). And we also quantified the discords in their understandings against their partners by measuring the discords between the knowledge that they think they share and the knowledge that they really share. Through these data, we evaluate the effectiveness of communication and analyzed the trends of mutual understanding. (authors)

  5. Communicating Sustainability: An Operational Model for Evaluating Corporate Websites

    Directory of Open Access Journals (Sweden)

    Alfonso Siano

    2016-09-01

    Full Text Available The interest in corporate sustainability has increased rapidly in recent years and has encouraged organizations to adopt appropriate digital communication strategies, in which the corporate website plays a key role. Despite this growing attention in both the academic and business communities, models for the analysis and evaluation of online sustainability communication have not been developed to date. This paper aims to develop an operational model to identify and assess the requirements of sustainability communication in corporate websites. It has been developed from a literature review on corporate sustainability and digital communication and the analysis of the websites of the organizations included in the “Global CSR RepTrak 2015” by the Reputation Institute. The model identifies the core dimensions of online sustainability communication (orientation, structure, ergonomics, content—OSEC, sub-dimensions, such as stakeholder engagement and governance tools, communication principles, and measurable items (e.g., presence of the materiality matrix, interactive graphs. A pilot study on the websites of the energy and utilities companies included in the Dow Jones Sustainability World Index 2015 confirms the applicability of the OSEC framework. Thus, the model can provide managers and digital communication consultants with an operational tool that is useful for developing an industry ranking and assessing the best practices. The model can also help practitioners to identify corrective actions in the critical areas of digital sustainability communication and avoid greenwashing.

  6. Communicate To Evaluate: A Scottish Polytechnic Approach.

    Science.gov (United States)

    McLachlan, J.; Wood, V.

    The paper describes a critical peer review developed at Napier Polytechnic (NP) of Edinburgh, Scotland for the evaluation and monitoring of its courses. Illustrations of the system are based on the accounting courses offered by the Department of Accounting and Law. The paper first describes the creation of NP from an amalgamation of two colleges…

  7. Simulation of Routing Protocol with CoS/QoS Enhancements in Heterogeneous Communication Network

    National Research Council Canada - National Science Library

    Kubera, Emil; Sliwa, Joanna; Zubel, Krzysztof; Mroczko, Adrian

    2006-01-01

    The article describes the subject of QoS routing mechanism in tactical heterogeneous communication network consisting of network elements built in different technologies and connected following rules...

  8. A False-name-Proof Double Auction Protocol for Arbitrary Evaluation Values

    Science.gov (United States)

    Sakurai, Yuko; Yokoo, Makoto

    We develop a new false-name-proof double auction protocol called the Generalized Threshold Price Double auction (GTPD) protocol. False-name-proofness generalizes strategy-proofness by incorporating the possibility of false-name bids, e.g., bids submitted using multiple e-mail addresses. An existing protocol called TPD protocol is false-name-proof but can handle only the cases where marginal utilities of each agent always decrease, while our new GTPD protocol can handle arbitrary evaluation values. When marginal utilities can increase, some bids cannot be divided into a single unit (e.g., an all-or-nothing bid). Due to the existence of such indivisible bids, meeting supply/demand becomes difficult. Furthermore, a seller/buyer can submit a false-name-bid by pretending to be a potential buyer/seller to manipulate allocations and payments. In the GTPD protocol, the auctioneer is required to absorb the supply-demand imbalance up to a given upper-bound. Also, the GTPD incorporate a new false-name-proof one-sided auction protocol that is guaranteed to sell/buy a certain number of units. Simulation results show that when the threshold price is set appropriately, this protocol can obtain a good social surplus, and the number of absorbed units is much smaller than the given upper-bound.

  9. ABS-SmartComAgri: An Agent-Based Simulator of Smart Communication Protocols in Wireless Sensor Networks for Debugging in Precision Agriculture.

    Science.gov (United States)

    García-Magariño, Iván; Lacuesta, Raquel; Lloret, Jaime

    2018-03-27

    Smart communication protocols are becoming a key mechanism for improving communication performance in networks such as wireless sensor networks. However, the literature lacks mechanisms for simulating smart communication protocols in precision agriculture for decreasing production costs. In this context, the current work presents an agent-based simulator of smart communication protocols for efficiently managing pesticides. The simulator considers the needs of electric power, crop health, percentage of alive bugs and pesticide consumption. The current approach is illustrated with three different communication protocols respectively called (a) broadcast, (b) neighbor and (c) low-cost neighbor. The low-cost neighbor protocol obtained a statistically-significant reduction in the need of electric power over the neighbor protocol, with a very large difference according to the common interpretations about the Cohen's d effect size. The presented simulator is called ABS-SmartComAgri and is freely distributed as open-source from a public research data repository. It ensures the reproducibility of experiments and allows other researchers to extend the current approach.

  10. Performance evaluation of computer and communication systems

    CERN Document Server

    Le Boudec, Jean-Yves

    2011-01-01

    … written by a scientist successful in performance evaluation, it is based on his experience and provides many ideas not only to laymen entering the field, but also to practitioners looking for inspiration. The work can be read systematically as a textbook on how to model and test the derived hypotheses on the basis of simulations. Also, separate parts can be studied, as the chapters are self-contained. … the book can be successfully used either for self-study or as a supplementary book for a lecture. I believe that different types of readers will like it: practicing engineers and resea

  11. Striding networks of inter-process communication based on TCP/IP protocol

    International Nuclear Information System (INIS)

    Lou Yi; Chen Haichun; Qian Jing; Chen Zhuomin

    2004-01-01

    A mode of process/thread communication between QNX and WINDOWS operating systems in isomerous computers is described. It is proved in practice to be an entirely feasible mode with high efficiency and reliability. A socket created by Socket API is used to communicate between two operating systems. (authors)

  12. Specification and Verification of Communication Protocols in AFFIRM Using State Transition Models.

    Science.gov (United States)

    1981-03-01

    NewQueueOfftcket; theorem Pendnglnvariant, Remove(Pending(s)) = NewQueueOfPacket; Since the implementation is in keeping with the specification, its salp ...another communication line. The communication lines are unreliable; messages traveling in either direction can be lost, reordered, corrupted, or

  13. Impacts of information and communication technologies on nursing care: an overview of systematic reviews (protocol).

    Science.gov (United States)

    Rouleau, Geneviève; Gagnon, Marie-Pierre; Côté, José

    2015-05-23

    Information and communication technologies (ICTs) used in the health sector have well-known advantages. They can promote patient-centered healthcare, improve quality of care, and educate health professionals and patients. However, implementation of ICTs remains difficult and involves changes at different levels: patients, healthcare providers, and healthcare organizations. Nurses constitute the largest health provider group of the healthcare workforce. The use of ICTs by nurses can have impacts in their practice. The main objective of this review of systematic reviews is to systematically summarize the best evidence regarding the effects of ICTs on nursing care. We will include all types of reviews that aim to evaluate the influence of ICTs used by nurses on nursing care. We will consider four types of ICTs used by nurses as a way to provide healthcare: management systems, communication systems, information systems, and computerized decision support systems. We will exclude nursing management systems, educational systems, and telephone systems. The following types of comparisons will be carried out: ICT in comparison with usual care/practice, ICT compared to any other ICT, and ICT versus other types of interventions. The primary outcomes will include nurses' practice environment, nursing processes/scope of nursing practice, nurses' professional satisfaction as well as nursing sensitive outcomes, such as patient safety, comfort, and quality of life related to care, empowerment, functional status, satisfaction, and patient experience. Secondary outcomes will include satisfaction with ICT from the nurses and patients' perspective. Reviews published in English, French, or Spanish from 1 January 1995 will be considered. Two reviewers will independently screen the title and abstract of the papers in order to assess their eligibility and extract the following information: characteristics of the population and setting, type of interventions (e.g., type of ICTs and service

  14. Researches on the Security of Cluster-based Communication Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yanhong Sun

    2014-08-01

    Full Text Available Along with the in-depth application of sensor networks, the security issues have gradually become the bottleneck of wireless sensor applications. To provide a solution for security scheme is a common concern not only of researchers but also of providers, integrators and users of wireless sensor networks. Based on this demand, this paper focuses on the research of strengthening the security of cluster-based wireless sensor networks. Based on the systematic analysis of the clustering protocol and its security enhancement scheme, the paper introduces the broadcast authentication scheme, and proposes an SA-LEACH network security enhancement protocol. The performance analysis and simulation experiments prove that the protocol consumes less energy with the same security requirements, and when the base station is comparatively far from the network deployment area, it is more advantageous in terms of energy consumption and t more suitable for wireless sensor networks.

  15. Standardised test protocol (Constant Score) for evaluation of functionality in patients with shoulder disorders

    DEFF Research Database (Denmark)

    Ban, Ilija; Troelsen, Anders; Christiansen, David Høyrup

    2013-01-01

    INTRODUCTION: The Constant Score (CS), developed as a scoring system to evaluate overall functionality of patients with shoulder disorders, is widely used but has been criticised for relying on an imprecise terminology and for lack of a standardised methodology. A modified guideline was therefore...... differences. One of the authors of the modified CS approved both the English and the Danish test protocol. CONCLUSION: A simple test protocol of the modified CS was developed in both English and Danish. With precise terminology and definitions, the test protocol is the first of its kind. We suggest its use...

  16. Evaluation of three coding schemes designed for improved data communication

    Science.gov (United States)

    Snelsire, R. W.

    1974-01-01

    Three coding schemes designed for improved data communication are evaluated. Four block codes are evaluated relative to a quality function, which is a function of both the amount of data rejected and the error rate. The Viterbi maximum likelihood decoding algorithm as a decoding procedure is reviewed. This evaluation is obtained by simulating the system on a digital computer. Short constraint length rate 1/2 quick-look codes are studied, and their performance is compared to general nonsystematic codes.

  17. Operation and evaluation of online risk communication assistant tool, 'ORCAT'

    International Nuclear Information System (INIS)

    Kimura, Hiroshi; Katsumura, Soichiro; Furuta, Kazuo; Matsumura, Kenichi; Tanaka, Hiroshi

    2005-01-01

    Risk communication about the high-level radioactive waste (HLW) disposal is necessary for public acceptance of HLW disposal program. Online Risk Communication Assistant Tool (ORCAT) system is developed in order to support risk communication for high-level radioactive disposal on World Wide Web. We have carried out two test operations of ORCAT system. First test operation is carried out from Jun. 26 to Feb. 13, 2003. After the first operation, we improved the ORCAT system, and carried out the second test operation from Dec. 4 to 22, 2004. In the second test operation, 20 participants replayed the questionnaire about usability of ORCAT system. In consequence, we found that the ORCAT system remains what need to refine, but is evaluated useful to the risk communication about the HLW disposal. (author)

  18. Understanding discharge communication behaviours in a pediatric emergency care context: a mixed methods observation study protocol.

    Science.gov (United States)

    Curran, Janet A; Bishop, Andrea; Plint, Amy; MacPhee, Shannon; Zemek, Roger; Chorney, Jill; Jabbour, Mona; Porter, Stephen; Sawyer, Scott

    2017-04-17

    One of the most important transitions in the continuum of care for children is discharge to home. Optimal discharge communication between healthcare providers and caregivers (e.g., parents or other guardians) who present to the emergency department (ED) with their children is not well understood. The lack of policies and considerable variation in practice regarding discharge communication in pediatric EDs pose a quality and safety risk for children and their parents. The aim of this mixed methods study is to better understand the process and structure of discharge communication in a pediatric ED context to contribute to the design and development of discharge communication interventions. We will use surveys, administrative data and real-time video observation to characterize discharge communication for six common illness presentations in a pediatric ED: (1) asthma, (2) bronchiolitis, (3) abdominal pain, (4) fever, (5) diarrhea and vomiting, and (6) minor head injury. Participants will be recruited from one of two urban pediatric EDs in Canada. Video recordings will be analyzed using Observer XT. We will use logistic regression to identify potential demographic and visit characteristic cofounders and multivariate logistic regression to examine association between verbal and non-verbal behaviours and parent recall and comprehension. Video recording of discharge communication will provide an opportunity to capture important data such as temporality, sequence and non-verbal behaviours that might influence the communication process. Given the importance of better characterizing discharge communication to identify potential barriers and enablers, we anticipate that the findings from this study will contribute to the development of more effective discharge communication policies and interventions.

  19. A New Protocol to Evaluate the Effect of Topical Anesthesia

    Science.gov (United States)

    List, Thomas; Mojir, Katerina; Svensson, Peter; Pigg, Maria

    2014-01-01

    This double-blind, placebo-controlled, randomized cross-over clinical experimental study tested the reliability, validity, and sensitivity to change of punctuate pain thresholds and self-reported pain on needle penetration. Female subjects without orofacial pain were tested in 2 sessions at 1- to 2-week intervals. The test site was the mucobuccal fold adjacent to the first upper right premolar. Active lidocaine hydrochloride 2% (Dynexan) or placebo gel was applied for 5 minutes, and sensory testing was performed before and after application. The standardized quantitative sensory test protocol included mechanical pain threshold (MPT), pressure pain threshold (PPT), mechanical pain sensitivity (MPS), and needle penetration sensitivity (NPS) assessments. Twenty-nine subjects, mean (SD) age 29.0 (10.2) years, completed the study. Test-retest reliability intraclass correlation coefficient at 10-minute intervals between examinations was MPT 0.69, PPT 0.79, MPS 0.72, and NPS 0.86. A high correlation was found between NPS and MPS (r = 0.84; P < .001), whereas NPS and PPT were not significantly correlated. The study found good to excellent test-retest reliability for all measures. None of the sensory measures detected changes in sensitivity following lidocaine 2% or placebo gel. Electronic von Frey assessments of MPT/MPS on oral mucosa have good validity. PMID:25517548

  20. Smart Home Communication Technologies and Applications: Wireless Protocol Assessment for Home Area Network Resources

    Directory of Open Access Journals (Sweden)

    Tiago D. P. Mendes

    2015-07-01

    Full Text Available The paper discusses Home Area Networks (HAN communication technologies for smart home and domestic application integration. The work is initiated by identifying the application areas that can benefit from this integration. A broad and inclusive home communication interface is analysed utilizing as a key piece a Gateway based on machine-to-machine (M2M communications that interacts with the surrounding environment. Then, the main wireless networks are thoroughly assessed, and later, their suitability to the requirements of HAN considering the application area is analysed. Finally, a qualitative analysis is portrayed.

  1. Sharing Service Resource Information for Application Integration in a Virtual Enterprise - Modeling the Communication Protocol for Exchanging Service Resource Information

    Science.gov (United States)

    Yamada, Hiroshi; Kawaguchi, Akira

    Grid computing and web service technologies enable us to use networked resources in a coordinated manner. An integrated service is made of individual services running on coordinated resources. In order to achieve such coordinated services autonomously, the initiator of a coordinated service needs to know detailed service resource information. This information ranges from static attributes like the IP address of the application server to highly dynamic ones like the CPU load. The most famous wide-area service discovery mechanism based on names is DNS. Its hierarchical tree organization and caching methods take advantage of the static information managed. However, in order to integrate business applications in a virtual enterprise, we need a discovery mechanism to search for the optimal resources based on the given a set of criteria (search keys). In this paper, we propose a communication protocol for exchanging service resource information among wide-area systems. We introduce the concept of the service domain that consists of service providers managed under the same management policy. This concept of the service domain is similar to that for autonomous systems (ASs). In each service domain, the service information provider manages the service resource information of service providers that exist in this service domain. The service resource information provider exchanges this information with other service resource information providers that belong to the different service domains. We also verified the protocol's behavior and effectiveness using a simulation model developed for proposed protocol.

  2. SPEED: A Stateless Protocol for Real-Time Communication in Sensor Networks

    National Research Council Canada - National Science Library

    He, Tian; Stankovic, John A; Lu, Chenyang; Abdelzaher, Tarek

    2003-01-01

    .... End-to-end soft real-time communication is achieved by maintaining a desired delivery speed across the sensor network through a novel combination of feedback control and non-deterministic geographic forwarding...

  3. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  4. Evaluation of a protocol for the non-operative management of perforated peptic ulcer.

    Science.gov (United States)

    Marshall, C; Ramaswamy, P; Bergin, F G; Rosenberg, I L; Leaper, D J

    1999-01-01

    The non-operative management of perforated peptic ulcer has previously been shown to be both safe and effective although it remains controversial. A protocol for non-operative management was set up in this hospital in 1989. Adherence to the guidelines in the protocol has been audited over a 6-year period with a review of outcome. The case-notes of patients with a diagnosis of perforated peptic ulcer were reviewed. Twelve guidelines from the protocol were selected for evaluation of compliance to the protocol. Forty-nine patients underwent non-operative treatment initially. Eight patients failed to respond and underwent operation. Complications included abscess formation (seven patients), renal failure (one), gastric ileus (one), chest infection (two), and cardiac failure and stroke (one). Four deaths occurred in this group. Adherence to certain protocol guidelines was poor, notably those concerning prevention of thromboembolism, use of antibiotics, use of contrast examination to confirm the diagnosis and referral for follow-up endoscopy. Two gastric cancers were detected on subsequent endoscopy. This experience demonstrates that non-operative treatment can be used successfully in a general hospital. Adherence to protocol guidelines was found to be variable and the protocol has therefore been simplified. This study highlights the need for an accurate diagnosis and the importance of follow-up endoscopy.

  5. [The intervention mapping protocol: A structured process to develop, implement and evaluate health promotion programs].

    Science.gov (United States)

    Fassier, J-B; Lamort-Bouché, M; Sarnin, P; Durif-Bruckert, C; Péron, J; Letrilliart, L; Durand, M-J

    2016-02-01

    Health promotion programs are expected to improve population health and reduce social inequalities in health. However, their theoretical foundations are frequently ill-defined, and their implementation faces many obstacles. The aim of this article is to describe the intervention mapping protocol in health promotion programs planning, used recently in several countries. The challenges of planning health promotion programs are presented, and the six steps of the intervention mapping protocol are described with an example. Based on a literature review, the use of this protocol, its requirements and potential limitations are discussed. The intervention mapping protocol has four essential characteristics: an ecological perspective (person-environment), a participative approach, the use of theoretical models in human and social sciences and the use of scientific evidence. It comprises six steps: conduct a health needs assessment, define change objectives, select theory-based change techniques and practical applications, organize techniques and applications into an intervention program (logic model), plan for program adoption, implementation, and sustainability, and generate an evaluation plan. This protocol was used in different countries and domains such as obesity, tobacco, physical activity, cancer and occupational health. Although its utilization requires resources and a critical stance, this protocol was used to develop interventions which efficacy was demonstrated. The intervention mapping protocol is an integrated process that fits the scientific and practical challenges of health promotion. It could be tested in France as it was used in other countries, in particular to reduce social inequalities in health. Copyright © 2016. Published by Elsevier Masson SAS.

  6. Performance Evaluation of User Selection Protocols in Random Networks with Energy Harvesting and Hardware Impairments

    Directory of Open Access Journals (Sweden)

    Tan Nhat Nguyen

    2016-01-01

    Full Text Available In this paper, we evaluate performances of various user selection protocols under impact of hardware impairments. In the considered protocols, a Base Station (BS selects one of available Users (US to serve, while the remaining USs harvest the energy from the Radio Frequency (RF transmitted by the BS. We assume that all of the US randomly appear around the BS. In the Random Selection Protocol (RAN, the BS randomly selects a US to transmit the data. In the second proposed protocol, named Minimum Distance Protocol (MIND, the US that is nearest to the BS will be chosen. In the Optimal Selection Protocol (OPT, the US providing the highest channel gain between itself and the BS will be served. For performance evaluation, we derive exact and asymptotic closed-form expressions of average Outage Probability (OP over Rayleigh fading channels. We also consider average harvested energy per a US. Finally, Monte-Carlo simulations are then performed to verify the theoretical results.

  7. Efficacy methods to evaluate health communication and marketing campaigns.

    Science.gov (United States)

    Evans, W Douglas; Uhrig, Jennifer; Davis, Kevin; McCormack, Lauren

    2009-06-01

    Communication and marketing are growing areas of health research, but relatively few rigorous efficacy studies have been conducted in these fields. In this article, we review recent health communication and marketing efficacy research, present two case studies that illustrate some of the considerations in making efficacy design choices, and advocate for greater emphasis on rigorous health communication and marketing efficacy research and the development of a research agenda. Much of the outcomes research in health communication and marketing, especially mass media, utilizes effectiveness designs conducted in real time, in the media markets or communities in which messages are delivered. Such evaluations may be impractical or impossible, however, imiting opportunities to advance the state of health communication and marketing research and the knowledge base on effective campaign strategies, messages, and channels. Efficacy and effectiveness studies use similar measures of behavior change. Efficacy studies, however, offer greater opportunities for experimental control, message exposure, and testing of health communication and marketing theory. By examining the literature and two in-depth case studies, we identify advantages and limitations to efficacy studies. We also identify considerations for when to adopt efficacy and effectiveness methods, alone or in combination. Finally, we outline a research agenda to investigate issues of internal and external validity, mode of message presentation, differences between marketing and message strategies, and behavioral outcomes.

  8. An evaluation of smartphone communication (in)security

    OpenAIRE

    Brodd-Reijer, Christoffer

    2014-01-01

    The purpose of this study is to examine and evaluate the security of the data traffic sent to and from smartphone devices. Since smartphones are becoming more common, are highly connected, often use cloud based computation, and contain highly personal data, it is important that the communication is secure and safe. This paper examines the Android and iOS platforms and focuses on three key parts: platform, application, and user. The platforms are evaluated on the basis of their libraries, APIs...

  9. Criteria for evaluating internet tutorials in speech communication sciences

    OpenAIRE

    Bowerman, Chris; Eriksson, Anders; Huckvale, Mark; Rosner, Mike; Tatham, Mark; Wolters, Maria

    1999-01-01

    The Computer Aided Learning (CAL) working group of the SOCRATES thematic network in Speech Communication Science have studied how the Internet is being used and could be used for the provision of self-study materials for education. In this paper we follow up previous recommendations for the design of Internet tutorials with recommendations for their evaluation. The paper proposes that evaluation should be seen as a necessary quality assurance mechanism operating within the life-cycle of CAL m...

  10. Adaptive MAC-layer protocol for multiservice digital access via tree and branch communication networks

    Science.gov (United States)

    Sriram, Kotikalapudi; Li, Chia-Chang; Magill, Peter; Whitaker, Norman A.; Dail, James E.; Dajer, Miguel A.; Siller, Curtis A.

    1995-11-01

    Described here is an adaptive MAC-layer protocol that supports multiservice (STM and ATM) applications in the context of subscriber access to tree and branch (e.g., fiber-coaxial cable) networks. The protocol adapts to changing demands for a mix of circuit and cell mode applications, and efficiently allocates upstream and downstream bandwidth to a variety of bursty and isochronous traffic sources. In the case of a hybrid fiber-coaxial (HFC) network the protocol resides in customer premises equipment and a common head-end controller. A medium-access control (MAC) processor provides for dividing the time domain for a given digital bitstream into successive frames, each with multiple STM and ATM time slots. Within the STM region of a frame, variable length time slots are allocated to calls (e.g., telephony, video telephony) requiring different amounts of bandwidth. A contention access signaling channel is also provided in this region for call control and set-up requests. Within the ATM region fixed-length time slots accommodate one individual ATM cell. These ATM time slots may be reserved for a user for the duration of a call or burst of successive ATM cells, or shared via a contention process. At least one contention time slot is available for signaling messages related to ATM call control and set-up requests. Further, the fixed-length ATM time slots may be reserved by a user for the duration of a call, or shared through a contention process. This paper describes the MAC-layer protocol, its relation to circuit- and ATM- amenable applications, and its performance with respect to signaling throughput and latency, and bandwidth efficiency for several service scenarios.

  11. The Seamless Transfer-of-Care Protocol: a randomized controlled trial assessing the efficacy of an electronic transfer-of-care communication tool

    Directory of Open Access Journals (Sweden)

    Okoniewska Barbara M

    2012-11-01

    evaluation will assess the cost per life saved, cost per readmission avoided and cost per QALY gained with the TOC communication tool compared to traditional dictation summaries. Discussion This paper outlines the study protocol for a randomized controlled trial evaluating an electronic transfer-of-care communication tool, with sufficient statistical power to assess the impact of the tool on the significant outcomes of post-discharge death or readmission. The study findings will inform health systems around the world on the potential benefits of such tools, and the value for money associated with their widespread implementation. Trial registration ClinicalTrials.gov NCT01402609.

  12. The Seamless Transfer-of-Care Protocol: a randomized controlled trial assessing the efficacy of an electronic transfer-of-care communication tool.

    Science.gov (United States)

    Okoniewska, Barbara M; Santana, Maria J; Holroyd-Leduc, Jayna; Flemons, Ward; O'Beirne, Maeve; White, Deborah; Clement, Fiona; Forster, Alan; Ghali, William A

    2012-11-21

    readmission avoided and cost per QALY gained with the TOC communication tool compared to traditional dictation summaries. This paper outlines the study protocol for a randomized controlled trial evaluating an electronic transfer-of-care communication tool, with sufficient statistical power to assess the impact of the tool on the significant outcomes of post-discharge death or readmission. The study findings will inform health systems around the world on the potential benefits of such tools, and the value for money associated with their widespread implementation. ClinicalTrials.gov NCT01402609.

  13. [Inferential evaluation of intimacy based on observation of interpersonal communication].

    Science.gov (United States)

    Kimura, Masanori

    2015-06-01

    How do people inferentially evaluate others' levels of intimacy with friends? We examined the inferential evaluation of intimacy based on the observation of interpersonal communication. In Experiment 1, participants (N = 41) responded to questions after observing conversations between friends. Results indicated that participants inferentially evaluated not only goodness of communication, but also intimacy between friends, using an expressivity heuristic approach. In Experiment 2, we investigated how inferential evaluation of intimacy was affected by prior information about relationships and by individual differences in face-to-face interactional ability. Participants (N = 64) were divided into prior- and no-prior-information groups and all performed the same task as in Experiment 1. Additionally, their interactional ability was assessed. In the prior-information group, individual differences had no effect on inferential evaluation of intimacy. On the other hand, in the no-prior-information group, face-to-face interactional ability partially influenced evaluations of intimacy. Finally, we discuss the fact that to understand one's social environment, it is important to observe others' interpersonal communications.

  14. Evaluating evaluation as a communication process. What role for formative evaluation in ICT-based knowledge acquisition?

    Directory of Open Access Journals (Sweden)

    USEILLE Philippe

    2005-10-01

    Full Text Available This article examines how formative evaluation as a communication process contributes to knowledge acquisition in using ICT (Information and Communication Technologies. Previous studies, especially in the field of education and training, have shown that formative evaluation plays a crucial part in the learning process because it contributes to learning to learn. Through formative evaluation, the learner becomes aware of errors and can adjust learning strategies to the situation. In addition, formative evaluation provides the teaching side with significant and useful information. Consequently, ICT researches have developed a wide range of solutions for this specific purpose. It is however difficult to check the efficiency of these tools by considering the effects of ICT in the knowledge acquisition process. I suggest that formative evaluation includes also a communication system that has an effect on the learning process. This study tackles the issue by proposing an alternative approach to formative evaluation that considers it as both a learning and a communication process. The study is based on SADT (Structure Analysis and Design Technique that provides a suitable description for the whole complex communication process. It allows a rigorous understanding and identification of the variables of evaluation as a communication process in order to take care of an ICT frame. Finally, this article outlines a multidisciplinary method to evaluate formative evaluation by focusing on the validity facets of the communication process. Keywords: formative evaluation, communication process, validity criteria, ICT training context.

  15. Effective communication network structures for hospital infection prevention: a study protocol.

    Science.gov (United States)

    Rangachari, Pavani

    2013-01-01

    Many hospitals are unable to successfully implement "evidence-based practices" at the unit level. For example, consistent implementation of the central line bundle (CLB), proven to prevent catheter-related bloodstream infections (CRBSIs) is often difficult. This problem has been broadly characterized as "change implementation failure" in health care organizations. Several studies have used retrospective designs to examine the problem; however, there are few prospective studies examining communication dynamics underlying successful implementation of change (eg, evidence-based practices). This prospective study will be set in 2 intensive care units at an academic medical center. At baseline, both units have low compliance with CLB and higher-than-expected CRBSIs. Periodic quality improvement (QI) interventions will be conducted over a 52-week period to promote implementation of CLB in both units. Simultaneously, the following parameters will be examined: (1) Structure and content of communication related to CLB in both units through "communication logs" completed weekly by nurses, physicians, and managers; and (2) outcomes, that is, CLB adherence in both units through weekly chart review. Catheter utilization and CRBSI (infection) rates will serve as additional unit-level outcome measures. The aim is 2-fold: (1) to examine associations between QI interventions and structure and content of communication at the unit level; and (2) to examine associations between structure and content of communication and outcomes at the unit level. The periodic QI interventions are expected to increase CLB adherence and reduce CRBSIs through their influence on structure and content of communication. The prospective design would help examine dynamics in unit-level communication structure and content related to CLB, as well as unit-level outcomes. The study has potential to make significant contributions to theory and practice, particularly if interventions are found to be effective in

  16. Managing symptoms during cancer treatments: evaluating the implementation of evidence-informed remote support protocols

    Directory of Open Access Journals (Sweden)

    Stacey Dawn

    2012-11-01

    Full Text Available Abstract Background Management of cancer treatment-related symptoms is an important safety issue given that symptoms can become life-threatening and often occur when patients are at home. With funding from the Canadian Partnership Against Cancer, a pan-Canadian steering committee was established with representation from eight provinces to develop symptom protocols using a rigorous methodology (CAN-IMPLEMENT©. Each protocol is based on a systematic review of the literature to identify relevant clinical practice guidelines. Protocols were validated by cancer nurses from across Canada. The aim of this study is to build an effective and sustainable approach for implementing evidence-informed protocols for nurses to use when providing remote symptom assessment, triage, and guidance in self-management for patients experiencing symptoms while undergoing cancer treatments. Methods A prospective mixed-methods study design will be used. Guided by the Knowledge to Action Framework, the study will involve (a establishing an advisory knowledge user team in each of three targeted settings; (b assessing factors influencing nurses’ use of protocols using interviews/focus groups and a standardized survey instrument; (c adapting protocols for local use, ensuring fidelity of the content; (d selecting intervention strategies to overcome known barriers and implementing the protocols; (e conducting think-aloud usability testing; (f evaluating protocol use and outcomes by conducting an audit of 100 randomly selected charts at each of the three settings; and (g assessing satisfaction with remote support using symptom protocols and change in nurses’ barriers to use using survey instruments. The primary outcome is sustained use of the protocols, defined as use in 75% of the calls. Descriptive analysis will be conducted for the barriers, use of protocols, and chart audit outcomes. Content analysis will be conducted on interviews/focus groups and usability testing

  17. A Pattern Language for Designing Application-Level Communication Protocols and the Improvement of Computer Science Education through Cloud Computing

    OpenAIRE

    Lascano, Jorge Edison

    2017-01-01

    Networking protocols have been developed throughout time following layered architectures such as the Open Systems Interconnection model and the Internet model. These protocols are grouped in the Internet protocol suite. Most developers do not deal with low-level protocols, instead they design application-level protocols on top of the low-level protocol. Although each application-level protocol is different, there is commonality among them and developers can apply lessons learned from one prot...

  18. An On-Chip interconnect and protocol stack for multiple communication paradigms and programming models

    NARCIS (Netherlands)

    Hansson, A.; Goossens, Kees

    2009-01-01

    A growing number of applications, with diverse requirements, are integrated on the same System on Chip (SoC) in the form of hardware and software Intellectual Property (IP). The diverse requirements, coupled with the IPs being developed by unrelated design teams, lead to multiple communication

  19. An on-chip interconnect and protocol stack for multiple communication paradigms and programming models

    NARCIS (Netherlands)

    Hansson, M.A.; Goossens, K.G.W.

    2009-01-01

    A growing number of applications, with diverse requirements, are integrated on the same System on Chip (SoC) in the form of hardware and software Intellectual Property (IP). The diverse requirements, coupled with the IPs being developed by unrelated design teams, lead to multiple communication

  20. Integrating communication protocol selection with partitioning in hardware/software codesign

    DEFF Research Database (Denmark)

    Knudsen, Peter Voigt; Madsen, Jan

    1998-01-01

    frequencies of system components such as buses, CPU's, ASIC's, software code size, hardware area, and component prices. A distinct feature of the model is the modeling of driver processing of data (packing, splitting, compression, etc.) and its impact on communication throughput. The integration...

  1. Secured Communication for Business Process Outsourcing Using Optimized Arithmetic Cryptography Protocol Based on Virtual Parties

    Science.gov (United States)

    Pathak, Rohit; Joshi, Satyadhar

    Within a span of over a decade, India has become one of the most favored destinations across the world for Business Process Outsourcing (BPO) operations. India has rapidly achieved the status of being the most preferred destination for BPO for companies located in the US and Europe. Security and privacy are the two major issues needed to be addressed by the Indian software industry to have an increased and long-term outsourcing contract from the US. Another important issue is about sharing employee’s information to ensure that data and vital information of an outsourcing company is secured and protected. To ensure that the confidentiality of a client’s information is maintained, BPOs need to implement some data security measures. In this paper, we propose a new protocol for specifically for BPO Secure Multi-Party Computation (SMC). As there are many computations and surveys which involve confidential data from many parties or organizations and the concerned data is property of the organization, preservation and security of this data is of prime importance for such type of computations. Although the computation requires data from all the parties, but none of the associated parties would want to reveal their data to the other parties. We have proposed a new efficient and scalable protocol to perform computation on encrypted information. The information is encrypted in a manner that it does not affect the result of the computation. It uses modifier tokens which are distributed among virtual parties, and finally used in the computation. The computation function uses the acquired data and modifier tokens to compute right result from the encrypted data. Thus without revealing the data, right result can be computed and privacy of the parties is maintained. We have given a probabilistic security analysis of hacking the protocol and shown how zero hacking security can be achieved. Also we have analyzed the specific case of Indian BPO.

  2. Performance Evaluation of AODV Routing Protocol in VANET with NS2

    Directory of Open Access Journals (Sweden)

    Divya Rathi

    2017-03-01

    Full Text Available In intelligent transportation systems, the collaboration between vehicles and the road side units is essential to bring these systems to realization. The emerging Vehicular Ad Hoc Network (VANET is becoming more and more important as it provides intelligent transportation application, comfort, safety, entertainment for people in vehicles. In order to provide stable routes and to get good performance in VANET, there is a need of proper routing protocols must be designed. In this paper, we are working with the very well-known ad-hoc on-demand distance vector (AODV routing protocol. The existing Routing protocol AODV-L which is based on the Link expiration time is extended to propose a more reliable AODV-AD which is based on multichannel MAC protocol. For the performance evaluation of routing protocols, a simulation tool ‘NS2’ has been used. Simulation results show that the proposed AODV-AD protocol can achieves better performances in forms of high Route stability, Packet Delivery ratio and packet loss rate than traditional AODV-L and traditional AODV.

  3. Construction of an Anthropomorphic Phantom for Use in Evaluating Pediatric Airway Digital Tomosynthesis Protocols

    Directory of Open Access Journals (Sweden)

    Nima Kasraie

    2018-01-01

    Full Text Available Interpretation of radiolucent foreign bodies (FBs is a common task charged to pediatric radiologists. The use of a motion compensated technique to decrease breathing motion on images would greatly decrease overall exposure to ionizing radiation and increase access to treatment yielding a great impact on clinical care. This study reports on the methodology and materials used to construct an in-house anthropomorphic phantom for investigating image quality in digital tomosynthesis protocols for volumetric imaging of the pediatric airway. Availability and cost of possible substitute materials were considered and simplifying assumptions were made. Two different modular phantoms were assembled in coronal slab layers using materials designed to approximate a one- and three-year-old thorax at diagnostic photon energies for use with digital tomosynthesis protocols such as those offered on GE’s VolumeRAD application. Exposures were made using both phantoms with inserted food particles inside an oscillating airway. The goal of the phantom is to help evaluate (1 whether the currently used protocol is sufficient to image the airway despite breathing motion and (2 whether it is not, to find the optimal protocol by testing various commercially available protocols using this phantom. The affordable construction of the pediatric sized phantom aimed at optimizing GE’s VolumeRAD protocol for airway foreign body imaging is demonstrated in this study which can be used to test VolumeRAD’s ability to image the airways with and without a low-density foreign body within the airways.

  4. Evaluation of a biodegradation screening protocol for contaminated soil from manufactured gas plant sites

    International Nuclear Information System (INIS)

    Morgan, D.J.; Battaglia, A.; Smith, J.R.; Middleton, A.C.; Nakles, D.V.; Linz, D.G.

    1991-01-01

    Bioremediation has been demonstrated to be a viable alternative for treating soils contaminated with PAHs. however, given the variability encountered in soils characteristics and contamination level, their susceptibility to biological treatment must be assessed on a case-by-case basis. This paper discusses a new treatability protocol, the GRI Accelerated Treatability Protocol. The mainstay of the protocol, which is designed to quickly provide treatability data for a given contaminated soil is a bioslurry experiment, in which the contaminated soil is continuously stirred and provided with abundant oxygen, nutrients and water, to maximize biological activity and thus contaminant removal. The results of using such protocol on four soils, widely differing in physical characteristics and contamination levels, are compared to the results of traditional pan studies, and an empirical equation, describing the observed soil concentrations as a function of time in both slurry and pans, is presented. Similarities and differences between achievable endpoints and biodegradation rates are discussed, and the applicability of the GRI Accelerated Treatability Protocol to full-scale engineered systems is addressed. Results to date indicate that, for soils with less than 10% fines slurry and pan experiments yield approximately the same endpoint, so that for those soils the GRI Accelerated Treatability Protocol can be used to assess the viability of an unsaturated bioremediation system. For soils with more than 10% fines, the slurry treatment endpoints are better than the pans. For those soils a traditional pan study experiment should be performed to evaluate the potential capabilities of unsaturated bioremediation

  5. Flow cytometry protocol to evaluate ionizing radiation effects on P-glycoprotein activity

    International Nuclear Information System (INIS)

    Santos, Neyliane Goncalves dos; Amaral, Ademir; Cavalcanti, Mariana Brayner . E-mail; Neves, Maria Amelia Batista; Machado, Cintia Gonsalves de Faria

    2008-01-01

    The aim of this work was to establish a protocol to evaluate ionizing radiation effects on P-glycoprotein (P-gp) activity. For this, human peripheral blood samples were irradiated in vitro with different doses and P-gp activity was analyzed for CD4 and CD8 T lymphocytes through rhodamine123-efflux assay by flow cytometry. By simultaneous employment of percentage and mean fluorescence index parameters, subject-by-subject analysis pointed out changes in P-gp activity for some individuals and irradiated samples. Based on this work, the proposed protocol was considered adequate for evaluating P-gp activity on cells after radioactive stress. Besides, this research suggests that P-gp activity could be an important factor to define patient-specific protocols in combined chemo- and radiotherapy, particularly when radiation exposure precedes chemical treatment. (author)

  6. Feasibility of Automatic Extraction of Electronic Health Data to Evaluate a Status Epilepticus Clinical Protocol.

    Science.gov (United States)

    Hafeez, Baria; Paolicchi, Juliann; Pon, Steven; Howell, Joy D; Grinspan, Zachary M

    2016-05-01

    Status epilepticus is a common neurologic emergency in children. Pediatric medical centers often develop protocols to standardize care. Widespread adoption of electronic health records by hospitals affords the opportunity for clinicians to rapidly, and electronically evaluate protocol adherence. We reviewed the clinical data of a small sample of 7 children with status epilepticus, in order to (1) qualitatively determine the feasibility of automated data extraction and (2) demonstrate a timeline-style visualization of each patient's first 24 hours of care. Qualitatively, our observations indicate that most clinical data are well labeled in structured fields within the electronic health record, though some important information, particularly electroencephalography (EEG) data, may require manual abstraction. We conclude that a visualization that clarifies a patient's clinical course can be automatically created using the patient's electronic clinical data, supplemented with some manually abstracted data. Future work could use this timeline to evaluate adherence to status epilepticus clinical protocols. © The Author(s) 2015.

  7. Flow cytometry protocol to evaluate ionizing radiation effects on P-glycoprotein activity

    Energy Technology Data Exchange (ETDEWEB)

    Santos, Neyliane Goncalves dos; Amaral, Ademir; Cavalcanti, Mariana Brayner [Universidade Federal de Pernambuco (UFPE), Recife, PE (Brazil). Dept. de Energia Nuclear]. E-mail; neylisantos@yahoo.com.br; Neves, Maria Amelia Batista; Machado, Cintia Gonsalves de Faria [Fundacao de Hematologia e Hemoterapia de Pernambuco, Recife, PE (Brazil). Unidade de Laboratorios Especializados. Lab. de Imunofenotipagem

    2008-12-15

    The aim of this work was to establish a protocol to evaluate ionizing radiation effects on P-glycoprotein (P-gp) activity. For this, human peripheral blood samples were irradiated in vitro with different doses and P-gp activity was analyzed for CD4 and CD8 T lymphocytes through rhodamine123-efflux assay by flow cytometry. By simultaneous employment of percentage and mean fluorescence index parameters, subject-by-subject analysis pointed out changes in P-gp activity for some individuals and irradiated samples. Based on this work, the proposed protocol was considered adequate for evaluating P-gp activity on cells after radioactive stress. Besides, this research suggests that P-gp activity could be an important factor to define patient-specific protocols in combined chemo- and radiotherapy, particularly when radiation exposure precedes chemical treatment. (author)

  8. Development and Evaluation of a Psychosocial Intervention for Children and Teenagers Experiencing Diabetes (DEPICTED: a protocol for a cluster randomised controlled trial of the effectiveness of a communication skills training programme for healthcare professionals working with young people with type 1 diabetes

    Directory of Open Access Journals (Sweden)

    Lowes Lesley

    2010-02-01

    Full Text Available Abstract Background Diabetes is the third most common chronic condition in childhood and poor glycaemic control leads to serious short-term and life-limiting long-term complications. In addition to optimal medical management, it is widely recognised that psychosocial and educational factors play a key role in improving outcomes for young people with diabetes. Recent systematic reviews of psycho-educational interventions recognise the need for new methods to be developed in consultation with key stakeholders including patients, their families and the multidisciplinary diabetes healthcare team. Methods/design Following a development phase involving key stakeholders, a psychosocial intervention for use by paediatric diabetes staff and not requiring input from trained psychologists has been developed, incorporating a communication skills training programme for health professionals and a shared agenda-setting tool. The effectiveness of the intervention will be evaluated in a cluster-randomised controlled trial (RCT. The primary outcome, to be measured in children aged 4-15 years diagnosed with type 1 diabetes for at least one year, is the effect on glycaemic control (HbA1c during the year after training of the healthcare team is completed. Secondary outcomes include quality of life for patients and carers and cost-effectiveness. Patient and carer preferences for service delivery will also be assessed. Twenty-six paediatric diabetes teams are participating in the trial, recruiting a total of 700 patients for evaluation of outcome measures. Half the participating teams will be randomised to receive the intervention at the beginning of the trial and remaining centres offered the training package at the end of the one year trial period. Discussion The primary aim of the trial is to determine whether a communication skills training intervention for specialist paediatric diabetes teams will improve clinical and psychological outcomes for young people with

  9. Improvement The Transmission Efficiency For Wireless Packet Communication Systems Using Automatic Control for power And Time Slot Width Of Slotted Non persistent ISMA Protocol

    Directory of Open Access Journals (Sweden)

    Saad M. Hardan

    2013-05-01

    Full Text Available In packed communication systems which use a protocol, the protocol should perform the allocation of channels such that the transmission channel is used efficiently. Efficiency is usually measured in terms of channel throughput and the average transmission  delay. The Slotted Nonpersistent ISMA protocol is one of random access protocols used in packed communication systems. In this research a Slotted Nonpersistent ISMA protocol Model with automatic control for power and time slot is proposed. the suggested algorithm enable the base station(access point to control  the protocol time slot length and  transmission power in a dynamic way to control the normalized propagation delay d and to maintain all the uplink signals in the limit of captured power threshold (capture ratio in order to control the  throughput and the average transmission delay of the communication system by an automatic method. the computer simulation results  confirm the activity of the  proposed algorithm for increasing the  throughput and decreasing the average transmission delay by an accepted ratios.

  10. Evaluation of Introduction of a Delayed Cord Clamping Protocol for Premature Neonates in a High-Volume Maternity Center.

    Science.gov (United States)

    Liu, Lilly Y; Feinglass, Joe M; Khan, Janine Y; Gerber, Susan E; Grobman, William A; Yee, Lynn M

    2017-05-01

    To evaluate adherence to a delayed cord clamping protocol for preterm births in the first 2 years after its introduction, perform a quality improvement assessment, and determine neonatal outcomes associated with protocol implementation and adherence. This is a retrospective cohort study of women delivering singleton neonates at 23-32 weeks of gestation in the 2 years before (preprotocol) and 2 years after (postprotocol) introduction of a 30-second delayed cord clamping protocol at a large-volume academic center. This policy was communicated to obstetric and pediatric health care providers and nurses and reinforced with intermittent educational reviews. Barriers to receiving delayed cord clamping were assessed using χ tests and multivariable logistic regression. Neonatal outcomes then were compared between all neonates in the preprotocol period and all neonates in the postprotocol period and between all neonates in the preprotocol period and neonates receiving delayed cord clamping in the postprotocol period using multivariable linear and logistic regression analyses. Of the 427 eligible neonates, 187 were born postprotocol. Of these, 53.5% (n=100) neonates received delayed cord clamping according to the protocol. The rate of delayed cord clamping preprotocol was 0%. Protocol uptake and frequency of delayed cord clamping increased over the 2 years after its introduction. In the postprotocol period, cesarean delivery was the only factor independently associated with failing to receive delayed cord clamping (adjusted odds ratio [OR] 0.49, 95% confidence interval [CI] 0.25-0.96). In comparison with the preprotocol period, those who received delayed cord clamping in the postprotocol period had significantly higher birth hematocrit (β=2.46, P=.007) and fewer blood transfusions in the first week of life (adjusted OR 0.49, 95% CI 0.25-0.96). After introduction of an institutional delayed cord clamping protocol followed by continued health care provider education and

  11. Development and evaluation of a mobile AAC: a virtual therapist and speech assistant for people with communication disabilities.

    Science.gov (United States)

    Wang, Erh-Hsuan; Zhou, Leming; Chen, Szu-Han Kay; Hill, Katya; Parmanto, Bambang

    2017-09-26

    The currently existing Augmentative and Alternative Communication (AAC) technologies have limitations to produce the best communication rehabilitation outcomes and therefore a better solution is needed. In this work, a mobile AAC app was developed based on results from research studies. Sophisticated AAC language programming, embedded training materials, and real-time communication performance reporting were integrated into the app. Two groups of study participants were recruited to participate a usability study and a preliminary feasibility study for the purpose of evaluating this mobile AAC app, respectively. A tablet-based AAC app was developed to support communication rehabilitation. User studies of the app were conducted and included able-bodied individuals and people with verbal communication disabilities. All study participants agreed that the app establishes a usable alternative treatment protocol for communication rehabilitation. The app's integrated features have great potential to maximize users' communication effectiveness, enhance language skills, and ultimately improve users' quality of life. Implications for rehabilitation We have developed and evaluated an integrated mobile AAC language-based app. This tablet-based app integrated AAC with embedded trainings and real-time performance report.

  12. Understanding and Using the Controller Area Network Communication Protocol Theory and Practice

    CERN Document Server

    Di Natale, Marco; Giusto, Paolo; Ghosal, Arkadeb

    2012-01-01

    This is the first book to offer a hands-on guide to designing, analyzing and debugging a communication infrastructure based on the Controller Area Network (CAN) bus.  Although the CAN bus standard is well established and currently used in most automotive systems, as well as avionics, medical systems and other devices, its features are not fully understood by most developers, who tend to misuse the network. This results in lost opportunities for better efficiency and performance.   This book offers a comprehensive range of architectural solutions and domains of analysis. It also provides formal models and analytical results, with thorough discussion of their applicability, so that it serves as an invaluable reference for researchers and students, as well as practicing engineers.    Offers the first comprehensive guide to bridging the gap between theory and implementation of the widely accepted Controller Area Network (CAN) bus; Provides examples and best practices for design of communication systems, as w...

  13. Global system data bus using the Digital Autonomous Terminal Access Communication protocol

    Science.gov (United States)

    Holmes, David C. E.

    1986-01-01

    Modern digital avionic systems with distributed processing require networking to connect the many elements. Digital Autonomous Terminal Access Communication (DATAC) is one of many such networks. DATAC has been implemented on the Transport Systems Research Vehicle (TSRV), a Boeing 737 aircraft operated by the National Aeronautics and Space Administration's Advanced Transport Operating Systems Program Office (ATOPS). This paper presents the TSRV implementation of the DATAC bus, a description of the DATAC system, a synchronization mechanism, details of data flow throughout the system, and a discussion of the modes available with DATAC. Numerous flight tests have been conducted using DATAC as the only means of communication between systems with outstanding results. DATAC is now an integral part of the TSRV and is expected to satisfy near term as well as future requirements for growth and flexibility.

  14. Developing the Fourth Evaluation Dimension: A Protocol for Evaluation of Video From the Patient's Perspective During Major Incident Exercises.

    Science.gov (United States)

    Haverkort, J J Mark; Leenen, Luke P H

    2017-10-01

    Presently used evaluation techniques rely on 3 traditional dimensions: reports from observers, registration system data, and observational cameras. Some of these techniques are observer-dependent and are not reproducible for a second review. This proof-of-concept study aimed to test the feasibility of extending evaluation to a fourth dimension, the patient's perspective. Footage was obtained during a large, full-scale hospital trauma drill. Two mock victims were equipped with point-of-view cameras filming from the patient's head. Based on the Major Incident Hospital's first experience during the drill, a protocol was developed for a prospective, standardized method to evaluate a hospital's major incident response from the patient's perspective. The protocol was then tested in a second drill for its feasibility. New insights were gained after review of the footage. The traditional observer missed some of the evaluation points, which were seen on the point-of-view cameras. The information gained from the patient's perspective proved to be implementable into the designed protocol. Use of point-of-view camera recordings from a mock patient's perspective is a valuable addition to traditional evaluation of trauma drills and trauma care. Protocols should be designed to optimize and objectify judgement of such footage. (Disaster Med Public Health Preparedness. 2017;11:594-599).

  15. Code-expanded radio access protocol for machine-to-machine communications

    DEFF Research Database (Denmark)

    Thomsen, Henning; Kiilerich Pratas, Nuno; Stefanovic, Cedomir

    2013-01-01

    The random access methods used for support of machine-to-machine, also referred to as Machine-Type Communications, in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. We propose an approach that is motivated b...... subframes and orthogonal preambles, the amount of available contention resources is drastically increased, enabling the massive support of Machine-Type Communication users that is beyond the reach of current systems.......The random access methods used for support of machine-to-machine, also referred to as Machine-Type Communications, in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. We propose an approach that is motivated...... by the random access method employed in LTE, which significantly increases the amount of contention resources without increasing the system resources, such as contention subframes and preambles. This is accomplished by a logical, rather than physical, extension of the access method in which the available system...

  16. Toward Fairness in Assessing Student Groupwork: A Protocol for Peer Evaluation of Individual Contributions

    Science.gov (United States)

    Fellenz, Martin R.

    2006-01-01

    A key challenge for management instructors using graded groupwork with students is to find ways to maximize student learning from group projects while ensuring fair and accurate assessment methods. This article presents the Groupwork Peer-Evaluation Protocol (GPEP) that enables the assessment of individual contributions to graded student…

  17. Experimental Evaluation of Simulation Abstractions for Wireless Sensor Network MAC Protocols

    NARCIS (Netherlands)

    Halkes, G.P.; Langendoen, K.G.

    2010-01-01

    The evaluation ofMAC protocols forWireless Sensor Networks (WSNs) is often performed through simulation. These simulations necessarily abstract away from reality inmany ways. However, the impact of these abstractions on the results of the simulations has received only limited attention. Moreover,

  18. The Accent-protocol: a framework for benchmarking and model evaluation

    NARCIS (Netherlands)

    Builtjes, P.J.H.; Grewe, V.; Moussiopoulos, N.; Borrego, C.; Isaksen, I.S.A.; Volz-Thomas, A.

    2011-01-01

    We summarise results from a workshop on “Model Benchmarking and Quality Assurance” of the EU-Network of Excellence ACCENT, including results from other activities (e.g. COST Action 732) and publications. A formalised evaluation protocol is presented, i.e. a generic formalism describing the procedure

  19. DEVELOPMENT AND APPLICATION OF PROTOCOLS FOR EVALUATION OF OIL SPILL BIOREMEDIATION (RESEARCH BRIEF)

    Science.gov (United States)

    Protocols were developed and evaluated to assess the efficacy and environmental safety of commercial oil spill bioremediation agents (CBAs). Test systems that simulate oil slicks on open water or oiled sandy beaches were used to test the effectiveness of CBAs. Gravimetric and gas...

  20. The Security Analysis of Two-Step Quantum Direct Communication Protocol in Collective-Rotation Noise Channel

    International Nuclear Information System (INIS)

    Li Jian; Sun Feng-Qi; Pan Ze-Shi; Nie Jin-Rui; Chen Yan-Hua; Yuan Kai-Guo

    2015-01-01

    To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein–Podolsky–Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003) 042317] in collective-rotation noise channel, an excellent model of noise analysis is proposed. In the security analysis, the method of the entropy theory is introduced, and is compared with QDCP, an error rate point Q 0 (M : (Q 0 , 1.0)) is given. In different noise levels, if Eve wants to obtain the same amount of information, the error rate Q is distinguishable. The larger the noise level ϵ is, the larger the error rate Q is. When the noise level ϵ is lower than 11%, the high error rate is 0.153 without eavesdropping. Lastly, the security of the proposed protocol is discussed. It turns out that the quantum channel will be safe when Q < 0.153. Similarly, if error rate Q > 0.153 = Q 0 , eavesdropping information I > 1, which means that there exist eavesdroppers in the quantum channel, and the quantum channel will not be safe anymore. (paper)

  1. Robust quantum secure direct communication and authentication protocol against decoherence noise based on six-qubit DF state

    International Nuclear Information System (INIS)

    Chang Yan; Zhang Shi-Bin; Yan Li-Li; Han Gui-Hua

    2015-01-01

    By using six-qubit decoherence-free (DF) states as quantum carriers and decoy states, a robust quantum secure direct communication and authentication (QSDCA) protocol against decoherence noise is proposed. Four six-qubit DF states are used in the process of secret transmission, however only the |0′〉 state is prepared. The other three six-qubit DF states can be obtained by permuting the outputs of the setup for |0′〉. By using the |0′〉 state as the decoy state, the detection rate and the qubit error rate reach 81.3%, and they will not change with the noise level. The stability and security are much higher than those of the ping–pong protocol both in an ideal scenario and a decoherence noise scenario. Even if the eavesdropper measures several qubits, exploiting the coherent relationship between these qubits, she can gain one bit of secret information with probability 0.042. (paper)

  2. Improvement of Network Efficiency on the Grounds of Change Communication Protocol

    Directory of Open Access Journals (Sweden)

    Jiri Vychodil

    2012-01-01

    Full Text Available This article deals with both theoretical and practical application of Extensible Messaging and Presence Protocol instead of different solution described detailed in the article. It uses periodically HTTP method POST to gain information about a state, which a client stands in. During this process a new connection is created and closed, what enormously makes network traffic mote intensive. Instead of this we used XMPP, this technology eliminates disadvantages of synchronous HTTP connection by its adapting for real time connection. It uses stable connection, what does not need to create it any time any information needs to be sent. It decreased amount of transported data through a network and a time, in which is a client informed about an event due to a fact, that the new solution works in real time.

  3. Molecules for security measures: from keypad locks to advanced communication protocols.

    Science.gov (United States)

    Andréasson, J; Pischel, U

    2018-04-03

    The idea of using molecules in the context of information security has sparked the interest of researchers from many scientific disciplines. This is clearly manifested in the diversity of the molecular platforms and the analytical techniques used for this purpose, some of which we highlight in this Tutorial Review. Moreover, those molecular systems can be used to emulate a broad spectrum of security measures. For a long time, molecular keypad locks enjoyed a clear preference and the review starts off with a description of how these devices developed. In the last few years, however, the field has evolved into something larger. Examples include more complex authentication protocols (multi-factor authentication and one-time passwords), the recognition of erroneous procedures in data transmission (parity devices), as well as steganographic and cryptographic protection.

  4. Standardized communication protocol for BAS (IEIEJ/p); BAS hyojun interface shiyo (IEIEJ/p)

    Energy Technology Data Exchange (ETDEWEB)

    Toyoda, T. [Hitachi Building System Co. Ltd., Tokyo (Japan)

    2000-10-05

    For the BEMS user, to construct his BEMS tinder the multiple vendors environment is very beneficial because he could choice the most appropriate vendor among many vendors about every subsystem for the view point of technique and cost at any time. The effective tool which makes the BEMS tinder the multiple environment possible is the BACnet protocol which had developed and been standardized by ANSI/ASHRAE of U.S.. Institute of Electrical Installation Engineers-of Japan (IEIEJ) offers IEIEJ/p based on BACnet as IEIEJ's standard which is added the function of autonomous decentralized control to enhance the BEMS reliability to fit the Japanese multiple vendors environment, In this paper I present the outline of it's specification and feature of IEIEJ/p. (author)

  5. Longitudinal Evaluation of Transition Services (“LETS Study”: Protocol for outcome evaluation

    Directory of Open Access Journals (Sweden)

    Tsybina Irina

    2012-05-01

    Full Text Available Abstract Background Because of advances in medical treatment, most children with physical disabilities can expect to achieve near normal life spans. Typically, coordinated teams of health care providers in specialized pediatric settings care for these children. As these children reach adulthood, however, the availability of services and expertise changes because the adult health care system has different processes designed to meet their specialized needs. Gaps in continuity of care during the transition from pediatric to adult services, and associated poor health outcomes are well documented. In response, new models of care are being introduced to address the complex process of health care transition. This paper describes a study protocol of a client-centred, prospective, longitudinal, mixed-method evaluation of linked model of health care across the lifespan (the LIFEspan Model, offered by a pediatric rehabilitation centre and an adult rehabilitation centre. Method This project will include a process and an outcome evaluation of the LIFEspan Model. The process evaluation will detail the specific service delivery that occurs with respect to preparation for transition and transfer of care through chart audits of pediatric medical records and qualitative interviews with LIFEspan staff. The outcome evaluation will measure the effect of the model on: 1 maintaining continuity within the health care system from pediatric to adult care; and 2 secondary outcomes related to health, well-being, social participation, transition readiness, and health care utilization of youth with cerebral palsy and acquired brain injury. Standardized instruments will include Health Utilities Inventory, Assessment of Life Habits, Arc’s Self-Determination, Assessment of Health-Related Quality of Life, Partners in Health Questionnaire, Social Support Questionnaire, and Self-Efficacy for Managing Chronic Disease. Discussion The LETS study will be original in its undertaking

  6. An evaluation of remote communication versus face-to-face in clinical dental education.

    Science.gov (United States)

    Martin, N; Lazalde, O Martínez; Stokes, C; Romano, D

    2012-03-23

    Distance learning and internet-based delivery of educational content are becoming very popular as an alternative to real face-to-face delivery. Clinical-based discussions still remain greatly face-to-face despite the advancement of remote communication and internet sharing technology. In this study we have compared three communication modalities between a learner and educator: audio and video using voice over internet protocol (VoIP) alone [AV]; audio and video VoIP with the addition of a three dimensional virtual artefact [AV3D] and physical face-to-face [FTF]. Clinical case discussions based on fictitious patients were held between a 'learner' and an 'expert' using the three communication modalities. The learner presented a clinical scenario to the experts, with the aid of a prop (partially dentate cast, digitised for AV3D), to obtain advice on the management of the clinical case. Each communication modality was tested in timed exercises in a random order among one of three experts (senior clinical restorative staff) and a learner (from a cohort of 15 senior clinical undergraduate students) all from the School of Clinical Dentistry, University of Sheffield. All learners and experts used each communication modality in turn with no prior training. Video recording and structured analysis were used to ascertain learner behaviour and levels of interactivity. Evaluation questionnaires were completed by experts and learners immediately after the experiment to ascertain effectiveness of information exchange and barriers/facilitators to communication. The video recordings showed that students were more relaxed with AV and AV3D than FTF (p = 0.01). The evaluation questionnaires showed that students felt they could provide (p = 0.03) and obtain (p = 0.003) more information using the FTF modality, followed by AV and then AV3D. Experts also ranked FTF better than AV and AV3D for providing (p = 0.012) and obtaining (p = 0) information to/from the expert. Physical face

  7. Chapter 15: Commercial New Construction Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Keates, Steven [ADM Associates, Inc., Atlanta, GA (United States)

    2017-10-09

    This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) or packages of measures where evaluators can analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol (IPMVP).

  8. Evaluation of Dogs with Border Collie Collapse, Including Response to Two Standardized Strenuous Exercise Protocols.

    Science.gov (United States)

    Taylor, Susan; Shmon, Cindy; Su, Lillian; Epp, Tasha; Minor, Katie; Mickelson, James; Patterson, Edward; Shelton, G Diane

    2016-01-01

    Clinical and metabolic variables were evaluated in 13 dogs with border collie collapse (BCC) before, during, and following completion of standardized strenuous exercise protocols. Six dogs participated in a ball-retrieving protocol, and seven dogs participated in a sheep-herding protocol. Findings were compared with 16 normal border collies participating in the same exercise protocols (11 retrieving, five herding). Twelve dogs with BCC developed abnormal mentation and/or an abnormal gait during evaluation. All dogs had post-exercise elevations in rectal temperature, pulse rate, arterial blood pH, PaO2, and lactate, and decreased PaCO2 and bicarbonate, as expected with strenuous exercise, but there were no significant differences between BCC dogs and normal dogs. Electrocardiography demonstrated sinus tachycardia in all dogs following exercise. Needle electromyography was normal, and evaluation of muscle biopsy cryosections using a standard panel of histochemical stains and reactions did not reveal a reason for collapse in 10 dogs with BCC in which these tests were performed. Genetic testing excluded the dynamin-1 related exercise-induced collapse mutation and the V547A malignant hyperthermia mutation as the cause of BCC. Common reasons for exercise intolerance were eliminated. Although a genetic basis is suspected, the cause of collapse in BCC was not determined.

  9. FTR: Performance-Aware and Energy-Efficient Communication Protocol for Integrating Sensor Networks into the Internet

    Directory of Open Access Journals (Sweden)

    Sinung Suakanto

    2014-11-01

    Full Text Available Integrating sensor networks into the Internet brings many advantages. For example, users can monitor or control the state of the sensors remotely without visiting the field. Some researchers have proposed methods using a REST-based web service or HTTP to establish communication between sensors and server via the Internet. Unfortunately, as we know, HTTP is a best-effort service. In some cases this means that if the number of sensors increases the end-to-end Quality of Service will decrease. The end-to-end network delay increases, as well as the failure rate of data sending caused by HTTP timeouts. In this paper, we propose Finite Time Response (FTR HTTP as a communication protocol suitable for integrating sensor networks into the Internet. We have defined a cross-layer approach that coordinates between the application layer and the physical layer to control not only performance but also energy efficiency. The HTTP request-response delay measured at the application layer is used as the decision factor at the physical layer to control the active and sleep periods. We also propose a forced-sleep period as a control mechanism to guarantee average performance for all nodes. The experimental results have shown that FTR has the ability to maintain better performance, indicated by a lower average response time and a lower average timeout experience. Optimization is still needed to gain better performance and better energy efficiency while also considering the average value of the update time.

  10. A Conceptual Framework for the Evaluation of Emergency Risk Communications

    Science.gov (United States)

    Lin, Leesa; Gamhewage, Gaya M.

    2017-01-01

    Objectives. To articulate a conceptual framework in support of evaluation activities in emergency risk communications (ERC). Methods. The framework proposed is based on a systematic review of the scientific literature (2001–2016) combined with data derived from a series of semistructured interviews with experts and practitioners in ERC, and it is designed to support local, national, and international public health organizations in implementing evaluation studies in ERC. Results. We identified a list of ERC outcomes from the full-text review of 152 articles and categorized these into 3 groups, depending upon the level at which the outcome was measured: (1) information environment, (2) population, and (3) public health system. We analyzed interviewees’ data from 18 interviews to identify practices and processes related to the effectiveness of ERC and included these as key structural components and processes in the developed evaluation framework. Conclusions. Researchers and public health practitioners interested in the evaluation of ERC can use the conceptual framework described in this article to guide the development of evaluation studies and methods for assessing communication outcomes related to public health emergencies. PMID:28892436

  11. A Conceptual Framework for the Evaluation of Emergency Risk Communications.

    Science.gov (United States)

    Savoia, Elena; Lin, Leesa; Gamhewage, Gaya M

    2017-09-01

    To articulate a conceptual framework in support of evaluation activities in emergency risk communications (ERC). The framework proposed is based on a systematic review of the scientific literature (2001-2016) combined with data derived from a series of semistructured interviews with experts and practitioners in ERC, and it is designed to support local, national, and international public health organizations in implementing evaluation studies in ERC. We identified a list of ERC outcomes from the full-text review of 152 articles and categorized these into 3 groups, depending upon the level at which the outcome was measured: (1) information environment, (2) population, and (3) public health system. We analyzed interviewees' data from 18 interviews to identify practices and processes related to the effectiveness of ERC and included these as key structural components and processes in the developed evaluation framework. Researchers and public health practitioners interested in the evaluation of ERC can use the conceptual framework described in this article to guide the development of evaluation studies and methods for assessing communication outcomes related to public health emergencies.

  12. Evaluation of two communication strategies to improve udder health management.

    Science.gov (United States)

    Jansen, J; Renes, R J; Lam, T J G M

    2010-02-01

    Worldwide, programs to improve udder health are implemented using communication tools and methods that inform and persuade dairy farmers. This study evaluated 2 communication strategies used in a mastitis control program in the Netherlands. To improve farmers' udder health management, tools such as instruction cards, treatment plans, checklists and software were developed following an argument-based comprehensive "central route." These tools were used during on-farm study group meetings for farmers organized by veterinarians and also during individual veterinarian-farmer interactions. The second strategy aimed at adopting a single management practice to increase the use of milking gloves during milking. This approach followed a straightforward "peripheral" route that used implicit persuasion techniques. Results of an online survey of 374 Dutch dairy farmers showed that most farmers were able and willing to use the educational management tools to increase udder health on their farms. They evaluated the tools positively regardless of the mastitis problems on their farms. This seems to indicate that the central route of communication is most effective when farmers are motivated to work on udder health in general. Results of repeated random telephone surveys before, during, and after the campaign on the use of milking gloves showed that the use of gloves increased from 20.9 to 42.0% of the respondents. Respondents' opinions about milking gloves also changed favorably, indicating that a relatively short peripheral campaign on a single action can have a sustained effect on farmers' behavior. Both communication strategies seem to be potentially successful in disseminating knowledge to a specific target group of farmers and in changing that group's behavior. However, to reach as many farmers as possible, the strategies should be combined. When optimizing these strategies, both the farmers' motivation to work on udder health and the aim of the campaign should be considered

  13. Evaluating Management Information Systems, A Protocol for Automated Peer Review Systems

    Science.gov (United States)

    Black, Gordon C.

    1980-01-01

    This paper discusses key issues in evaluating an automated Peer Review System. Included are the conceptual base, design, steps in planning structural components, operation parameters, criteria, costs and a detailed outline or protocol for use in the evaluation. At the heart of the Peer Review System is the criteria utilized for measuring quality. Criteria evaluation should embrace, as a minimum, appropriateness, validity and reliability, and completemess or comprehensiveness of content. Such an evaluation is not complete without determining the impact (clinical outcome) of the service system or the patient and the population served.

  14. Chapter 6: Residential Lighting Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Dimetrosky, Scott [Apex Analytics, LLC, Boulder, CO (United States); Parkinson, Katie [Apex Analytics, LLC, Boulder, CO (United States); Lieb, Noah [Apex Analytics, LLC, Boulder, CO (United States)

    2017-10-19

    Given new regulations, increased complexity in the market, and the general shift from CFLs to LEDs, this evaluation protocol was updated in 2017 to shift the focus of the protocols toward LEDs and away from CFLs and to resolve evaluation uncertainties affecting residential lighting incentive programs.

  15. EVALUATION OF THE PROTOCOL FOR THE NATURAL ATTENUATION OF CHLORINATED SOLVENTS: CASE STUDY AT THE TWIN CITIES ARMY AMMUNITION PLANT

    Science.gov (United States)

    At the request of staff in the EPA Regions, EPA?s Office of Research and Development carried out an independent evaluation of the Technical Protocol for Evaluating Natural Attenuation of Chlorinated Solvents in Ground Water (EPA/600/R-98/128). The Protocol was developed around c...

  16. The effectiveness of information and communication technology-based psychological interventions for paediatric chronic pain: protocol for a systematic review, meta-analysis and intervention content analysis.

    Science.gov (United States)

    Traynor, Angeline; Morrissey, Eimear; Egan, Jonathan; McGuire, Brian E

    2016-10-18

    Resource and geographic barriers are the commonly cited constraints preventing the uptake of psychological treatment for chronic pain management. For adults, there is some evidence to support the use of information and communication technology (ICT) as a mode of treatment delivery. However, mixed findings have been reported for the effectiveness and acceptability of psychological interventions delivered using information and communication technology for children and adolescents. This is a protocol for a review that aims to (i) evaluate the effectiveness of psychological interventions delivered using information and communication technology for children and adolescents with chronic pain and (ii) identify the intervention components and usability factors in technology-based treatments associated with behaviour change. We will conduct a systematic review to evaluate the effectiveness of psychological interventions for paediatric chronic pain delivered using ICT. We plan to directly compare ICT-based, psychological interventions with active control, treatment as usual or waiting list control conditions. This systematic review will be reported in line with the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidance. Published and unpublished randomised controlled trials will be included and the literature search will comprise Ovid MEDLINE, Ovid Embase, PsycINFO and the Cochrane Library on Wiley, including CENTRAL and Cochrane Database of Systematic Reviews. Grey literature including theses, dissertations, technical and research reports will also be examined. Two review authors will independently conduct study selection, relevant data extraction and assessment of methodological quality. Risk of bias in included studies will be assessed using the Cochrane Collaboration risk of bias tool criteria. Two qualified coders will independently code behaviour change techniques according to the behaviour change taxonomy (v1) of 93 hierarchically

  17. Who needs inpatient detox? Development and implementation of a hospitalist protocol for the evaluation of patients for alcohol detoxification.

    Science.gov (United States)

    Stephens, John R; Liles, E Allen; Dancel, Ria; Gilchrist, Michael; Kirsch, Jonathan; DeWalt, Darren A

    2014-04-01

    Clinicians caring for patients seeking alcohol detoxification face many challenges, including lack of evidence-based guidelines for treatment and high recidivism rates. To develop a standardized protocol for determining which alcohol dependent patients seeking detoxification need inpatient versus outpatient treatment, and to study the protocol's implementation. Review of best evidence by ad hoc task force and subsequent creation of standardized protocol. Prospective observational evaluation of initial protocol implementation. Patients presenting for alcohol detoxification. Development and implementation of a protocol for evaluation and treatment of patients requesting alcohol detoxification. Number of admissions per month with primary alcohol related diagnosis (DRG), 30-day readmission rate, and length of stay, all measured before and after protocol implementation. We identified one randomized clinical trial and three cohort studies to inform the choice of inpatient versus outpatient detoxification, along with one prior protocol in this population, and combined that data with clinical experience to create an institutional protocol. After implementation, the average number of alcohol related admissions was 15.9 per month, compared with 18.9 per month before implementation (p = 0.037). There was no difference in readmission rate or length of stay. Creation and utilization of a protocol led to standardization of care for patients requesting detoxification from alcohol. Initial evaluation of protocol implementation showed a decrease in number of admissions.

  18. Space Communications Artificial Intelligence for Link Evaluation Terminal (SCAILET)

    Science.gov (United States)

    Shahidi, Anoosh

    1991-01-01

    A software application to assis end-users of the Link Evaluation Terminal (LET) for satellite communication is being developed. This software application incorporates artificial intelligence (AI) techniques and will be deployed as an interface to LET. The high burst rate (HBR) LET provides 30 GHz transmitting/20 GHz receiving, 220/110 Mbps capability for wideband communications technology experiments with the Advanced Communications Technology Satellite (ACTS). The HBR LET and ACTS are being developed at the NASA Lewis Research Center. The HBR LET can monitor and evaluate the integrity of the HBR communications uplink and downlink to the ACTS satellite. The uplink HBR transmission is performed by bursting the bit-pattern as a modulated signal to the satellite. By comparing the transmitted bit pattern with the received bit pattern, HBR LET can determine the bit error rate BER) under various atmospheric conditions. An algorithm for power augmentation is applied to enhance the system's BER performance at reduced signal strength caused by adverse conditions. Programming scripts, defined by the design engineer, set up the HBR LET terminal by programming subsystem devices through IEEE488 interfaces. However, the scripts are difficult to use, require a steep learning curve, are cryptic, and are hard to maintain. The combination of the learning curve and the complexities involved with editing the script files may discourage end-users from utilizing the full capabilities of the HBR LET system. An intelligent assistant component of SCAILET that addresses critical end-user needs in the programming of the HBR LET system as anticipated by its developers is described. A close look is taken at the various steps involved in writing ECM software for a C&P, computer and at how the intelligent assistant improves the HBR LET system and enhances the end-user's ability to perform the experiments.

  19. Evaluation of Data Transfer Performance Between Moving Sender and Receiver in Mobile Communication Networks for Heterogeneous Service Support

    Directory of Open Access Journals (Sweden)

    Dalė Dzemydienė

    2011-12-01

    Full Text Available Vehicular communication networks are acquiring more and more commercial relevance because of recent advances in inter-vehicular communications via the DSRC/WAVE standard, which stimulates a brand new family of visionary services for vehicles, from road safety to entertainment and multimedia applications. After deep analysis of the literature it was decided to investigate evaluation of data transfer performance between moving sender and receiver in mobile communication network for heterogeneous service support. After careful analysis of the simulation tools the NCTUns 6.0 software package was chosen for planned investigations. The results illustrate that the longest communication can be maintained at the maximum number of vehicles participating on the network, but the quality of communication is inversely proportional to the number of vehicles. On this changing topology network when growing number of nodes (vehicles increases flooding of network with the data packages and it determines many collisions. The number of rejected packages increases directly in proportion to the number of vehicles. When the number of nodes (vehicle increases—it is increasing the number of the received same packages which are received from different nodes in the recipient node. On the sender node, the packages are rejected because the collisions occur due to improperly functioning access channel allocation mechanisms. It can be concluded that the routing protocols created for a normal MANET networks is useless in a fast-changing topology large-scale vehicle communication network. To provide heterogeneous services new routing protocols and channel access methods are needed, specifically for vehicle communication networks.

  20. Evaluation of Data Transfer Performance Between Moving Sender and Receiver in Mobile Communication Networks for Heterogeneous Service Support

    Directory of Open Access Journals (Sweden)

    Dalė Dzemydienė

    2013-08-01

    Full Text Available Vehicular communication networks are acquiring more and more commercial relevance because of recent advances in inter-vehicular communications via the DSRC/WAVE standard, which stimulates a brand new family of visionary services for vehicles, from road safety to entertainment and multimedia applications. After deep analysis of the literature it was decided to investigate evaluation of data transfer performance between moving sender and receiver in mobile communication network for heterogeneous service support. After careful analysis of the simulation tools the NCTUns 6.0 software package was chosen for planned investigations. The results illustrate that the longest communication can be maintained at the maximum number of vehicles participating on the network, but the quality of communication is inversely proportional to the number of vehicles. On this changing topology network when growing number of nodes (vehicles increases flooding of network with the data packages and it determines many collisions. The number of rejected packages increases directly in proportion to the number of vehicles. When the number of nodes (vehicle increases—it is increasing the number of the received same packages which are received from different nodes in the recipient node. On the sender node, the packages are rejected because the collisions occur due to improperly functioning access channel allocation mechanisms. It can be concluded that the routing protocols created for a normal MANET networks is useless in a fast-changing topology large-scale vehicle communication network. To provide heterogeneous services new routing protocols and channel access methods are needed, specifically for vehicle communication networks.

  1. Standard protocol for evaluation of environmental transfer factors around NPP sites

    International Nuclear Information System (INIS)

    Hegde, A.G.; Verma, P.C.; Rao, D.D.

    2009-01-01

    This document presents the standard procedures for evaluation of site specific environmental transfer factors around NPP sites. The scope of this document is to provide standard protocol to be followed for evaluation of environmental transfer factors around NPP sites. The studies on transfer factors are being carried out at various NPP sites under DAE-BRNS projects for evaluation of site specific transfer factors for radionuclides released from power plants. This document contains a common methodology in terms of sampling, processing, measurements and analysis of elemental/radionuclides, while keeping the site specific requirements also in place. (author)

  2. Human Portable Radiation Detection System Communications Package Evaluation

    International Nuclear Information System (INIS)

    Morgen, Gerald P.; Peterson, William W.

    2009-01-01

    Testing and valuation of the Human Portable Radiation Detection System Communications Package for the US Coast Guard. The main components of the HCP field kit are an Archer Field PC(reg s ign) and an Iridium satellite phone, along with various charging components and cables. The Archer Field PC has an Enfora Global System for Mobile/General Packet Radio System (GSM/GPRS) wireless cellular modem installed via the compact flash (CF) port. The Iridium satellite phone has a serial communication interface attached. The Archer Field PC is running Windows Mobile(reg s ign) 5.0 operating system. Included Microsoft products are Excel(reg s ign) Mobile, PowerPoint(reg s ign) Mobile, Word(reg s ign) Mobile, and Internet Explorer(reg s ign) Mobile. There is an Outlook(reg s ign) Email program that can be accessed via sending a file or the Messaging link. The Cambridge Computer Corporation vxHpc program is installed to provide a Hyperterm-like software product. vxHpc supports multiple communication protocols. An AT and T SIM card was provided for the GSM wireless cellular modem. A check with AT and T determined the SIM card was not activated to provide cellular service. The Iridium satellite phone did not have a SIM card and has no service. The Archer Field PC boots into a HCP program, displaying the Main Menu. The following actions can be executed by selecting the appropriate box: Spectrum Download, Spectrum Transfer, and Admin Control. The Spectrum Download function uses the serial communication port to download data files from another device, such as a Radiation Isotope Identification Device (RIID). The Spectrum Transfer function uses either the installed wireless cellular modem or the Iridium satellite phone (attached to the serial communication port) to send data files to a computer modem at the Laboratories and Scientific Services (LSS). The Admin Control function allows entering phone numbers and data file deletion. PNNL recommends that DNDO (and/or CG) contact Sanmina

  3. 78 FR 14654 - Standards for Business Practices and Communication Protocols for Public Utilities

    Science.gov (United States)

    2013-03-07

    ... applicable to RTOs and ISOs is necessary and, if so, whether a NAESB or a Commission-led, or other process... final rule a requirement for RTOs and ISOs to adopt performance evaluation methods that provide a... Wholesale Energy Efficiency M&V apply only in markets administered by RTOs and ISOs. EEI and Southern...

  4. Evaluation and development the routing protocol of a fully functional simulation environment for VANETs

    Science.gov (United States)

    Ali, Azhar Tareq; Warip, Mohd Nazri Mohd; Yaakob, Naimah; Abduljabbar, Waleed Khalid; Atta, Abdu Mohammed Ali

    2017-11-01

    Vehicular Ad-hoc Networks (VANETs) is an area of wireless technologies that is attracting a great deal of interest. There are still several areas of VANETS, such as security and routing protocols, medium access control, that lack large amounts of research. There is also a lack of freely available simulators that can quickly and accurately simulate VANETs. The main goal of this paper is to develop a freely available VANETS simulator and to evaluate popular mobile ad-hoc network routing protocols in several VANETS scenarios. The VANETS simulator consisted of a network simulator, traffic (mobility simulator) and used a client-server application to keep the two simulators in sync. The VANETS simulator also models buildings to create a more realistic wireless network environment. Ad-Hoc Distance Vector routing (AODV), Dynamic Source Routing (DSR) and Dynamic MANET On-demand (DYMO) were initially simulated in a city, country, and highway environment to provide an overall evaluation.

  5. Cutting through the noise: an evaluative framework for research communication

    Science.gov (United States)

    Strickert, G. E.; Bradford, L. E.; Shantz, S.; Steelman, T.; Orozs, C.; Rose, I.

    2017-12-01

    With an ever-increasing amount of research, there is a parallel challenge to mobilize the research for decision making, policy development and management actions. The tradition of "loading dock" model of science to policy is under renovation, replaced by more engaging methods of research communication. Research communication falls on a continuum from passive methods (e.g. reports, social media, infographics) to more active methods (e.g. forum theatre, decision labs, and stakeholder planning, and mix media installations that blend, art, science and traditional knowledge). Drawing on a five-year water science research program in the Saskatchewan River Basin, an evaluation framework is presented that draws on a wide communities of knowledge users including: First Nation and Metis, Community Organizers, Farmers, Consultants, Researchers, and Civil Servants. A mixed method framework consisting of quantitative surveys, qualitative interviews, focus groups, and q-sorts demonstrates that participants prefer more active means of research communication to draw them into the research, but they also value more traditional and passive methods to provide more in-depth information when needed.

  6. Evaluation of Eight Case Studies of Facilitated Communication.

    Science.gov (United States)

    Moore, Susan; And Others

    1993-01-01

    The ability of eight adults with mental retardation (and in some cases cerebral palsy) to communicate using facilitated communication was assessed by a multidisciplinary team. Not one of the subjects demonstrated an ability to communicate using the technique. (JDD)

  7. Using Visualization Science to Evaluate Effective Communication of Climate Indicators

    Science.gov (United States)

    Gerst, M.; Kenney, M. A.; Wolfinger, F.; Lloyd, A.

    2015-12-01

    Indicators are observations or calculations that are used to track social and environmental conditions over time. For a large coupled system such as the economy and environment, the choice of indicators requires a structured process that involves co-production among facilitators, subject-matter experts, decision-makers, and the general public. This co-production is needed in part because such indicators serve a duel role of scientifically tracking change and of communicating to non-scientists important changes and information that may be useful in decision contexts. Because the goal is to communicate and inform decisions it is critical that indicators be understood by non-scientific audiences, which may require different visualization techniques than for scientific audiences. Here we describe a process of rigorously evaluating visual communication efficacy by using a simplified taxonomy of visualization design problems and trade-offs to assess existing and redesigned indicator images. The experimental design is three-part. It involves testing non-scientific audiences' understandability of scientific images found in the literature along with similar information shaped by a partial co-production process that informed the U.S. Global Change Research Program prototype indicators system, released in Spring 2015. These recommendations for physical, natural, and societal indicators of changes and impacts involved input from over 200 subject-matter experts, organized into 13 technical teams. Using results from the first two parts, we then explore visualization design improvements that may increase understandability to non-scientific audiences. We anticipate that this work will highlight important trade-offs in visualization design when moving between audiences that will be of great use to scientists who wish to communicate their results broader audiences.

  8. Experimental Evaluation of Wireless Communication Channels under Radiation Environment

    International Nuclear Information System (INIS)

    Wang, Quan; Bari, Ataul; Deng, Changjian; Li, Liquan

    2014-01-01

    Deployment of wireless systems in nuclear power plants has attracted a lot of attention recently. However, before wireless systems can be installed in a nuclear power plant, it is necessary to evaluate the effect of radiation environment on electromagnetic wave which is the communication media for all radio wave based wireless systems. This is particular important if the wireless systems are expected to work in a harsh and radioactive environment following a severe accident. This paper presents some results of an experiment for evaluating the effect of radiation on electromagnetic wave. The experiments involve placing transmitter antenna and receiver antenna in a hot cell with variable strength of radiation to study the attenuation effects of the radioactive media. The results indicate that radiation does not effect on the electromagnetic wave propagation. This fact should be considered during the design and deployment wireless systems in a potentially radioactive environment

  9. Stability of formation control using a consensus protocol under directed communications with two time delays and delay scheduling

    Science.gov (United States)

    Cepeda-Gomez, Rudy; Olgac, Nejat

    2016-01-01

    We consider a linear algorithm to achieve formation control in a group of agents which are driven by second-order dynamics and affected by two rationally independent delays. One of the delays is in the position and the other in the velocity information channels. These delays are taken as constant and uniform throughout the system. The communication topology is assumed to be directed and fixed. The formation is attained by adding a supplementary control term to the stabilising consensus protocol. In preparation for the formation control logic, we first study the stability of the consensus, using the recent cluster treatment of characteristic roots (CTCR) paradigm. This effort results in a unique depiction of the non-conservative stability boundaries in the domain of the delays. However, CTCR requires the knowledge of the potential stability switching loci exhaustively within this domain. The creation of these loci is done in a new surrogate coordinate system, called the 'spectral delay space (SDS)'. The relative stability is also investigated, which has to do with the speed of reaching consensus. This step leads to a paradoxical control design concept, called the 'delay scheduling', which highlights the fact that the group behaviour may be enhanced by increasing the delays. These steps lead to a control strategy to establish a desired group formation that guarantees spacing among the agents. Example case studies are presented to validate the underlying analytical derivations.

  10. Enhancing Network Communication in NPSNET-V Virtual Environments Using XML-Described Dynamic Behavior (DBP) Protocols

    National Research Council Canada - National Science Library

    Fischer, William

    2001-01-01

    .... Specifically, it describes design of the NPS Dynamic-Behavior-Protocol (DBP) protocols, which are multicast / unicast capable and can be added at runtime to the distributed operating environment...

  11. Evaluation of condyle defects using different reconstruction protocols of cone-beam computed tomography

    International Nuclear Information System (INIS)

    Bastos, Luana Costa; Campos, Paulo Sergio Flores; Ramos-Perez, Flavia Maria de Moraes; Pontual, Andrea dos Anjos; Almeida, Solange Maria

    2013-01-01

    This study was conducted to investigate how well cone-beam computed tomography (CBCT) can detect simulated cavitary defects in condyles, and to test the influence of the reconstruction protocols. Defects were created with spherical diamond burs (numbers 1013, 1016, 3017) in superior and / or posterior surfaces of twenty condyles. The condyles were scanned, and cross-sectional reconstructions were performed with nine different protocols, based on slice thickness (0.2, 0.6, 1.0 mm) and on the filters (original image, Sharpen Mild, S9) used. Two observers evaluated the defects, determining their presence and location. Statistical analysis was carried out using simple Kappa coefficient and McNemar’s test to check inter- and intra-rater reliability. The chi-square test was used to compare the rater accuracy. Analysis of variance (Tukey's test) assessed the effect of the protocols used. Kappa values for inter- and intra-rater reliability demonstrate almost perfect agreement. The proportion of correct answers was significantly higher than that of errors for cavitary defects on both condyle surfaces (p < 0.01). Only in identifying the defects located on the posterior surface was it possible to observe the influence of the 1.0 mm protocol thickness and no filter, which showed a significantly lower value. Based on the results of the current study, the technique used was valid for identifying the existence of cavities in the condyle surface. However, the protocol of a 1.0 mm-thick slice and no filter proved to be the worst method for identifying the defects on the posterior surface. (author)

  12. Defining robustness protocols: a method to include and evaluate robustness in clinical plans

    International Nuclear Information System (INIS)

    McGowan, S E; Albertini, F; Lomax, A J; Thomas, S J

    2015-01-01

    We aim to define a site-specific robustness protocol to be used during the clinical plan evaluation process. Plan robustness of 16 skull base IMPT plans to systematic range and random set-up errors have been retrospectively and systematically analysed. This was determined by calculating the error-bar dose distribution (ebDD) for all the plans and by defining some metrics used to define protocols aiding the plan assessment. Additionally, an example of how to clinically use the defined robustness database is given whereby a plan with sub-optimal brainstem robustness was identified. The advantage of using different beam arrangements to improve the plan robustness was analysed. Using the ebDD it was found range errors had a smaller effect on dose distribution than the corresponding set-up error in a single fraction, and that organs at risk were most robust to the range errors, whereas the target was more robust to set-up errors. A database was created to aid planners in terms of plan robustness aims in these volumes. This resulted in the definition of site-specific robustness protocols. The use of robustness constraints allowed for the identification of a specific patient that may have benefited from a treatment of greater individuality. A new beam arrangement showed to be preferential when balancing conformality and robustness for this case. The ebDD and error-bar volume histogram proved effective in analysing plan robustness. The process of retrospective analysis could be used to establish site-specific robustness planning protocols in proton therapy. These protocols allow the planner to determine plans that, although delivering a dosimetrically adequate dose distribution, have resulted in sub-optimal robustness to these uncertainties. For these cases the use of different beam start conditions may improve the plan robustness to set-up and range uncertainties. (paper)

  13. Defining robustness protocols: a method to include and evaluate robustness in clinical plans

    Science.gov (United States)

    McGowan, S. E.; Albertini, F.; Thomas, S. J.; Lomax, A. J.

    2015-04-01

    We aim to define a site-specific robustness protocol to be used during the clinical plan evaluation process. Plan robustness of 16 skull base IMPT plans to systematic range and random set-up errors have been retrospectively and systematically analysed. This was determined by calculating the error-bar dose distribution (ebDD) for all the plans and by defining some metrics used to define protocols aiding the plan assessment. Additionally, an example of how to clinically use the defined robustness database is given whereby a plan with sub-optimal brainstem robustness was identified. The advantage of using different beam arrangements to improve the plan robustness was analysed. Using the ebDD it was found range errors had a smaller effect on dose distribution than the corresponding set-up error in a single fraction, and that organs at risk were most robust to the range errors, whereas the target was more robust to set-up errors. A database was created to aid planners in terms of plan robustness aims in these volumes. This resulted in the definition of site-specific robustness protocols. The use of robustness constraints allowed for the identification of a specific patient that may have benefited from a treatment of greater individuality. A new beam arrangement showed to be preferential when balancing conformality and robustness for this case. The ebDD and error-bar volume histogram proved effective in analysing plan robustness. The process of retrospective analysis could be used to establish site-specific robustness planning protocols in proton therapy. These protocols allow the planner to determine plans that, although delivering a dosimetrically adequate dose distribution, have resulted in sub-optimal robustness to these uncertainties. For these cases the use of different beam start conditions may improve the plan robustness to set-up and range uncertainties.

  14. Evaluation of ovsynch protocols for timed artificial insemination in water buffaloes in Bangladesh

    International Nuclear Information System (INIS)

    Hoque, M.N.; Talukder, A.K.; Akter, M.; Shamsuddin, M.

    2016-01-01

    Full text: A total of 65 water buffaloes (groups A, B, and C) at =>60 days postpartum with a body condition score (BCS) of =>2.5 were selected to evaluate ovsynch protocols for timed artificial insemination (TAI). The group A buffaloes (n = 25) were treated with a simple ovsynch protocol (GnRH - Day 7 - PGF alpha - Day 2 - GnRH - 16 h - TAI). The group B buffaloes (n = 22) received PGF2 alpha treatment 12 days before the initiation of simple ovsynch (PGF2 alpha at Day -12 + simple ovsynch; modified ovsynch). The group C buffaloes (n = 18) were treated with a double ovsynch protocol (GnRH - Day 7 - PGF2 alpha - Day 3 - GnRH - Day 7 - GnRH - Day 7 - PGF2 alpha - 48 h - GnRH - 16 h - TAI). Milk P4 ELISA was used for tracking ovulation and conception rates. Ovulation rates were higher in buffaloes that received the double ovsynch treatment (group C; 83.3%) than those with simple ovsynch (group A; 72.0%; P < 0.05). The group C cows (44.4%) achieved a higher concentration rate than the cows of groups A (28.0%) and B (36.4%) (P < 0.05) and multiparous buffaloes having BCS of =>3.5 responded better to the ovsynch treatments than the primiparous ones (P < 0.05). The double ovsynch protocol increases both ovulation and conception rates in comparison to the simple and modified ovsynch protocols and is more effective in multiparous cows than in primiparous ones. (author)

  15. Evaluation of condyle defects using different reconstruction protocols of cone-beam computed tomography

    Energy Technology Data Exchange (ETDEWEB)

    Bastos, Luana Costa; Campos, Paulo Sergio Flores, E-mail: bastosluana@ymail.com [Universidade Federal da Bahia (UFBA), Salvador, BA (Brazil). Fac. de Odontologia. Dept. de Radiologia Oral e Maxilofacial; Ramos-Perez, Flavia Maria de Moraes [Universidade Federal de Pernambuco (UFPE), Recife, PE (Brazil). Fac. de Odontologia. Dept. de Clinica e Odontologia Preventiva; Pontual, Andrea dos Anjos [Universidade Federal de Pernambuco (UFPE), Camaragibe, PE (Brazil). Fac. de Odontologia. Dept. de Radiologia Oral; Almeida, Solange Maria [Universidade Estadual de Campinas (UNICAMP), Piracicaba, SP (Brazil). Fac. de Odontologia. Dept. de Radiologia Oral

    2013-11-15

    This study was conducted to investigate how well cone-beam computed tomography (CBCT) can detect simulated cavitary defects in condyles, and to test the influence of the reconstruction protocols. Defects were created with spherical diamond burs (numbers 1013, 1016, 3017) in superior and / or posterior surfaces of twenty condyles. The condyles were scanned, and cross-sectional reconstructions were performed with nine different protocols, based on slice thickness (0.2, 0.6, 1.0 mm) and on the filters (original image, Sharpen Mild, S9) used. Two observers evaluated the defects, determining their presence and location. Statistical analysis was carried out using simple Kappa coefficient and McNemar’s test to check inter- and intra-rater reliability. The chi-square test was used to compare the rater accuracy. Analysis of variance (Tukey's test) assessed the effect of the protocols used. Kappa values for inter- and intra-rater reliability demonstrate almost perfect agreement. The proportion of correct answers was significantly higher than that of errors for cavitary defects on both condyle surfaces (p < 0.01). Only in identifying the defects located on the posterior surface was it possible to observe the influence of the 1.0 mm protocol thickness and no filter, which showed a significantly lower value. Based on the results of the current study, the technique used was valid for identifying the existence of cavities in the condyle surface. However, the protocol of a 1.0 mm-thick slice and no filter proved to be the worst method for identifying the defects on the posterior surface. (author)

  16. Satellite communication on pipeline supervision using TCP-IP Protocol; Comunicacao via satelite na supervisao de dutos usando o protocolo TCP-IP

    Energy Technology Data Exchange (ETDEWEB)

    Silva, Agliberto Pessoa da [PETROBRAS S.A., Rio de Janeiro, RJ (Brazil); Brunette, Sergio Henrique de Moraes

    2003-07-01

    Bit transparent type or X-25 protocols have been used in VSAT satellite communication by PETROBRAS pipeline Supervisory Control and Data Acquisition System (SCADA) as access protocol. Both solutions have inconveniences. By the first one, difficulties exist for analysis and diagnosis of connection flaws, and therefore, for a ready identification by the system management stations of abnormality location. On the other hand, the usage of the X-25 brings an additional over-head in the communication since this is not an available option in most of the equipment that compose the SCADA. The access to VSAT through Ethernet, in the opposite, makes available all networks management tools of the TCP/IP platform and it allows a direct connection to the field devices, since the main models of the several makers of Programmable Controllers and Remote Terminal Units have Ethernet port. An additional earnings is the possibility of standardization that this solution allows. This paper describes a series of communication tests between two Programmable Controllers communicating through the satellite, using a protocol over Ethernet/TCP/IP. (author)

  17. Interoperative fundus image and report sharing in compliance with integrating the healthcare enterprise conformance and web access todigital imaging and communication in medicinepersistent object protocol

    Directory of Open Access Journals (Sweden)

    Hui-Qun Wu

    2013-12-01

    Full Text Available AIM:To address issues in interoperability between different fundus image systems, we proposed a web eye-picture archiving and communication system (PACS framework in conformance with digital imaging and communication in medicine (DICOM and health level 7 (HL7 protocol to realize fundus images and reports sharing and communication through internet.METHODS: Firstly, a telemedicine-based eye care work flow was established based on integrating the healthcare enterprise (IHE Eye Care technical framework. Then, a browser/server architecture eye-PACS system was established in conformance with the web access to DICOM persistent object (WADO protocol, which contains three tiers.RESULTS:In any client system installed with web browser, clinicians could log in the eye-PACS to observe fundus images and reports. Multipurpose internet mail extensions (MIME type of a structured report is saved as pdf/html with reference link to relevant fundus image using the WADO syntax could provide enough information for clinicians. Some functions provided by open-source Oviyam could be used to query, zoom, move, measure, view DICOM fundus images.CONCLUSION:Such web eye-PACS in compliance to WADO protocol could be used to store and communicate fundus images and reports, therefore is of great significance for teleophthalmology.

  18. Interoperative fundus image and report sharing in compliance with integrating the healthcare enterprise conformance and web access to digital imaging and communication in medicine persistent object protocol.

    Science.gov (United States)

    Wu, Hui-Qun; Lv, Zheng-Min; Geng, Xing-Yun; Jiang, Kui; Tang, Le-Min; Zhou, Guo-Min; Dong, Jian-Cheng

    2013-01-01

    To address issues in interoperability between different fundus image systems, we proposed a web eye-picture archiving and communication system (PACS) framework in conformance with digital imaging and communication in medicine (DICOM) and health level 7 (HL7) protocol to realize fundus images and reports sharing and communication through internet. Firstly, a telemedicine-based eye care work flow was established based on integrating the healthcare enterprise (IHE) Eye Care technical framework. Then, a browser/server architecture eye-PACS system was established in conformance with the web access to DICOM persistent object (WADO) protocol, which contains three tiers. In any client system installed with web browser, clinicians could log in the eye-PACS to observe fundus images and reports. Multipurpose internet mail extensions (MIME) type of a structured report is saved as pdf/html with reference link to relevant fundus image using the WADO syntax could provide enough information for clinicians. Some functions provided by open-source Oviyam could be used to query, zoom, move, measure, view DICOM fundus images. Such web eye-PACS in compliance to WADO protocol could be used to store and communicate fundus images and reports, therefore is of great significance for teleophthalmology.

  19. Protocol compliance of administering parenteral medication in Dutch hospitals: an evaluation and cost-estimation of the implementation.

    NARCIS (Netherlands)

    Schilp, J.; Boot, S.; Blok, C. de; Spreeuwenberg, P.; Wagner, C.

    2014-01-01

    Objectives: Preventable adverse drug events (ADEs) are closely related to administration processes of parenteral medication. The Dutch Patient Safety Program provided a protocol for administering parenteral medication to reduce the amount of ADEs. The execution of the protocol was evaluated and a

  20. Lung Ultrasonography in Patients With Idiopathic Pulmonary Fibrosis: Evaluation of a Simplified Protocol With High-Resolution Computed Tomographic Correlation.

    Science.gov (United States)

    Vassalou, Evangelia E; Raissaki, Maria; Magkanas, Eleftherios; Antoniou, Katerina M; Karantanas, Apostolos H

    2018-03-01

    To compare a simplified ultrasonographic (US) protocol in 2 patient positions with the same-positioned comprehensive US assessments and high-resolution computed tomographic (CT) findings in patients with idiopathic pulmonary fibrosis. Twenty-five consecutive patients with idiopathic pulmonary fibrosis were prospectively enrolled and examined in 2 sessions. During session 1, patients were examined with a US protocol including 56 lung intercostal spaces in supine/sitting (supine/sitting comprehensive protocol) and lateral decubitus (decubitus comprehensive protocol) positions. During session 2, patients were evaluated with a 16-intercostal space US protocol in sitting (sitting simplified protocol) and left/right decubitus (decubitus simplified protocol) positions. The 16 intercostal spaces were chosen according to the prevalence of idiopathic pulmonary fibrosis-related changes on high-resolution CT. The sum of B-lines counted in each intercostal space formed the US scores for all 4 US protocols: supine/sitting and decubitus comprehensive US scores and sitting and decubitus simplified US scores. High-resolution CT-related Warrick scores (J Rheumatol 1991; 18:1520-1528) were compared to US scores. The duration of each protocol was recorded. A significant correlation was found between all US scores and Warrick scores and between simplified and corresponding comprehensive scores (P idiopathic pulmonary fibrosis. The 16-intercostal space simplified protocol in the lateral decubitus position correlated better with high-resolution CT findings and was less time-consuming compared to the sitting position. © 2017 by the American Institute of Ultrasound in Medicine.

  1. Evaluation of sample preparation protocols for spider venom profiling by MALDI-TOF MS.

    Science.gov (United States)

    Bočánek, Ondřej; Šedo, Ondrej; Pekár, Stano; Zdráhal, Zbyněk

    2017-07-01

    Spider venoms are highly complex mixtures containing biologically active substances with potential for use in biotechnology or pharmacology. Fingerprinting of venoms by Matrix-Assisted Laser Desorption-Ionization - Time of Flight Mass Spectrometry (MALDI-TOF MS) is a thriving technology, enabling the rapid detection of peptide/protein components that can provide comparative information. In this study, we evaluated the effects of sample preparation procedures on MALDI-TOF mass spectral quality to establish a protocol providing the most reliable analytical outputs. We adopted initial sample preparation conditions from studies already published in this field. Three different MALDI matrixes, three matrix solvents, two sample deposition methods, and different acid concentrations were tested. As a model sample, venom from Brachypelma albopilosa was used. The mass spectra were evaluated on the basis of absolute and relative signal intensities, and signal resolution. By conducting three series of analyses at three weekly intervals, the reproducibility of the mass spectra were assessed as a crucial factor in the selection for optimum conditions. A sample preparation protocol based on the use of an HCCA matrix dissolved in 50% acetonitrile with 2.5% TFA deposited onto the target by the dried-droplet method was found to provide the best results in terms of information yield and repeatability. We propose that this protocol should be followed as a standard procedure, enabling the comparative assessment of MALDI-TOF MS spider venom fingerprints. Copyright © 2017 Elsevier Ltd. All rights reserved.

  2. Evaluating veterinary practitioner perceptions of communication skills and training.

    Science.gov (United States)

    McDermott, M P; Cobb, M A; Tischler, V A; Robbé, I J; Dean, R S

    2017-03-25

    A survey was conducted among veterinary practitioners in the UK and the USA in 2012/2013. Thematic analysis was used to identify underlying reasons behind answers to questions about the importance of communication skills and the desire to participate in postgraduate communication skills training. Lack of training among more experienced veterinary surgeons, incomplete preparation of younger practitioners and differences in ability to communicate all contribute to gaps in communication competency. Barriers to participating in further communication training include time, cost and doubts in the ability of training to provide value. To help enhance communication ability, communication skills should be assessed in veterinary school applicants, and communication skills training should be more thoroughly integrated into veterinary curricula. Continuing education/professional development in communication should be part of all postgraduate education and should be targeted to learning style preferences and communication needs and challenges through an entire career in practice. British Veterinary Association.

  3. 3D-CT vascular setting protocol using computer graphics for the evaluation of maxillofacial lesions

    Directory of Open Access Journals (Sweden)

    CAVALCANTI Marcelo de Gusmão Paraiso

    2001-01-01

    Full Text Available In this paper we present the aspect of a mandibular giant cell granuloma in spiral computed tomography-based three-dimensional (3D-CT reconstructed images using computer graphics, and demonstrate the importance of the vascular protocol in permitting better diagnosis, visualization and determination of the dimensions of the lesion. We analyzed 21 patients with maxillofacial lesions of neoplastic and proliferative origins. Two oral and maxillofacial radiologists analyzed the images. The usefulness of interactive 3D images reconstructed by means of computer graphics, especially using a vascular setting protocol for qualitative and quantitative analyses for the diagnosis, determination of the extent of lesions, treatment planning and follow-up, was demonstrated. The technique is an important adjunct to the evaluation of lesions in relation to axial CT slices and 3D-CT bone images.

  4. 3D-CT vascular setting protocol using computer graphics for the evaluation of maxillofacial lesions.

    Science.gov (United States)

    Cavalcanti, M G; Ruprecht, A; Vannier, M W

    2001-01-01

    In this paper we present the aspect of a mandibular giant cell granuloma in spiral computed tomography-based three-dimensional (3D-CT) reconstructed images using computer graphics, and demonstrate the importance of the vascular protocol in permitting better diagnosis, visualization and determination of the dimensions of the lesion. We analyzed 21 patients with maxillofacial lesions of neoplastic and proliferative origins. Two oral and maxillofacial radiologists analyzed the images. The usefulness of interactive 3D images reconstructed by means of computer graphics, especially using a vascular setting protocol for qualitative and quantitative analyses for the diagnosis, determination of the extent of lesions, treatment planning and follow-up, was demonstrated. The technique is an important adjunct to the evaluation of lesions in relation to axial CT slices and 3D-CT bone images.

  5. Electrocardiographic, echocardiographic, and indirect blood pressure evaluation in dogs subjected to different sedation protocols

    Directory of Open Access Journals (Sweden)

    Helena Mondardo Cardoso

    Full Text Available ABSTRACT: The present study aimed to evaluate the effects of different sedation protocols on blood pressure and echocardiographic and electrocardiographic parameters in dogs. In total, 24 male mixed-breed dogs with a mean weight of 9.87±3.0kg were used.Animals were randomly divided into four groups (n=6, which were subjected to sedation using the following protocols: acepromazine (0.05mgkg-1 and butorphanol (0.3mgkg-1 (AB; acepromazine (0.05mgkg-1and methadone (0.5mgkg-1 (AM; acepromazine (0.03mgkg-1, methadone (0.5mgkg-1, and midazolam (0.3mgkg-1(MAM; and methadone only (0.5mgkg-1 (M. Indirect blood pressure (BP measurements and computerized electrocardiography (ECG and echocardiography (ECO were performed immediately before the application of the sedation protocol (baseline, and the same evaluations were repeated after 15 minutes. BP decreased in groups AB, MAM, and AM compared to baseline values. Electrocardiographic measurements showed decreased heart rates (HRs after sedation in all groups, and bradycardia was observed after sedation in two dogs from group M and one animal from group AM. The P-wave duration increased after sedation in groups AM and M. After sedation, no changes in cardiac dimensions were revealed byECO.Fractional shortening (FS decreased after sedation in the AM group, and dogs from group AB exhibited a smaller decrease in FS compared with the other groups. The cardiac index (CI was lower in groups AM and M than in the other groups. Animals from group AB were less resistant to examination and exhibited the most favorable sedation scores. It was concluded that the combination of acepromazine and butorphanol was the best sedation protocol for performing echocardiogram measurementsbecause dogs were less resistant to examinations and echocardiographic parameters of FS and CI remained stable.

  6. Automated extraction protocol for quantification of SARS-Coronavirus RNA in serum: an evaluation study

    Directory of Open Access Journals (Sweden)

    Lui Wing-bong

    2006-02-01

    Full Text Available Abstract Background We have previously developed a test for the diagnosis and prognostic assessment of the severe acute respiratory syndrome (SARS based on the detection of the SARS-coronavirus RNA in serum by real-time quantitative reverse transcriptase polymerase chain reaction (RT-PCR. In this study, we evaluated the feasibility of automating the serum RNA extraction procedure in order to increase the throughput of the assay. Methods An automated nucleic acid extraction platform using the MagNA Pure LC instrument (Roche Diagnostics was evaluated. We developed a modified protocol in compliance with the recommended biosafety guidelines from the World Health Organization based on the use of the MagNA Pure total nucleic acid large volume isolation kit for the extraction of SARS-coronavirus RNA. The modified protocol was compared with a column-based extraction kit (QIAamp viral RNA mini kit, Qiagen for quantitative performance, analytical sensitivity and precision. Results The newly developed automated protocol was shown to be free from carry-over contamination and have comparable performance with other standard protocols and kits designed for the MagNA Pure LC instrument. However, the automated method was found to be less sensitive, less precise and led to consistently lower serum SARS-coronavirus concentrations when compared with the column-based extraction method. Conclusion As the diagnostic efficiency and prognostic value of the serum SARS-CoV RNA RT-PCR test is critically associated with the analytical sensitivity and quantitative performance contributed both by the RNA extraction and RT-PCR components of the test, we recommend the use of the column-based manual RNA extraction method.

  7. Space Communication Artificial Intelligence for Link Evaluation Terminal (SCAILET)

    Science.gov (United States)

    Shahidi, Anoosh K.; Schlegelmilch, Richard F.; Petrik, Edward J.; Walters, Jerry L.

    1992-01-01

    A software application to assist end-users of the high burst rate (HBR) link evaluation terminal (LET) for satellite communications is being developed. The HBR LET system developed at NASA Lewis Research Center is an element of the Advanced Communications Technology Satellite (ACTS) Project. The HBR LET is divided into seven major subsystems, each with its own expert. Programming scripts, test procedures defined by design engineers, set up the HBR LET system. These programming scripts are cryptic, hard to maintain and require a steep learning curve. These scripts were developed by the system engineers who will not be available for the end-users of the system. To increase end-user productivity a friendly interface needs to be added to the system. One possible solution is to provide the user with adequate documentation to perform the needed tasks. With the complexity of this system the vast amount of documentation needed would be overwhelming and the information would be hard to retrieve. With limited resources, maintenance is another reason for not using this form of documentation. An advanced form of interaction is being explored using current computer techniques. This application, which incorporates a combination of multimedia and artificial intelligence (AI) techniques to provided end-users with an intelligent interface to the HBR LET system, is comprised of an intelligent assistant, intelligent tutoring, and hypermedia documentation. The intelligent assistant and tutoring systems address the critical programming needs of the end-user.

  8. Medical image transmission via communication satellite. Evaluation of bone scintigraphy

    International Nuclear Information System (INIS)

    Suzuki, Hideki; Inoue, Tomio; Endo, Keigo; Shimamoto, Shigeru.

    1995-01-01

    As compared with terrestrial circuits, the communication satellite possesses superior characteristics such as wide area coverage, broadcasting, high capacity, and robustness to disasters. Utilizing the narrow band channel (64 kbps) of the geostationary satellite JCSAT 1 located at the altitude of 36,000 km above the equator, the authors investigated satellite-relayed medical imagings by video signals, with bone scintigraphy as a model. Each bone scintigraphy was taken by a handy-video camera, digitalized and transmitted from faculty of technology located at 25 kilometers apart from our department. Clear bone scintigraphy was obtained via satellite, as seen on the view box. Eight nuclear physicians evaluated 20 cases of bone scintigraphy. ROC (Receiver Operating Characteristic) analysis was performed between the scintigraphies on view box and via satellite by the rating method. The area under the ROC curve was 91.6±2.6% via satellite, and 93.2±2.4% on the view box and there was no significant difference between them. These results suggest that the satellite communication is very useful and effective system to send nuclear imagings to distant institutes. (author)

  9. [Medical image transmission via communication satellite: evaluation of bone scintigraphy].

    Science.gov (United States)

    Suzuki, H; Inoue, T; Endo, K; Shimamoto, S

    1995-10-01

    As compared with terrestrial circuits, the communication satellite possesses superior characteristics such as wide area coverage, broadcasting, high capacity, and robustness to disasters. Utilizing the narrow band channel (64 kbps) of the geostationary satellite JCSAT1 located at the altitude of 36,000 km above the equator, the authors investigated satellite-relayed medical images by video signals, with bone scintigraphy as a model. Each bone scintigraphy was taken by a handy-video camera, digitalized and transmitted from faculty of technology located at 25 kilometers apart from our department. Clear bone scintigraphy was obtained via satellite, as seen on the view box. Eight nuclear physicians evaluated 20 cases of bone scintigraphy. ROC (Receiver Operating Characteristic) analysis was performed between the scintigraphies on view box and via satellite by the rating method. The area under the ROC curve was 91.6 +/- 2.6% via satellite, and 93.2 +/- 2.4% on the view box and there was no significant difference between them. These results suggest that the satellite communication is very useful and effective system to send nuclear imagings to distant institutes.

  10. Rural applications of Advanced Traveler Information Systems : evaluation of satellite communications systems for mayday applications

    Science.gov (United States)

    This report documents the results of an evaluation of satellite communication systems for mayday applications conducted as part of the Rural Applications of Advanced Traveler Information Systems (ATIS) study. It focuses on satellite communications sy...

  11. Evaluating Critical Thinking in Computer Mediated Communication Discussions

    Directory of Open Access Journals (Sweden)

    Faizah Mohamad

    2008-06-01

    Full Text Available This paper presents an investigation of whether computer mediated communication (CMC can develop critical thinking in language classrooms. The research was conducted at a university branch campus in Malaysia over a period of 12 weeks. It involved three groups of learners in which each group was exposed to different discussion modes. The first group was exposed to a CMC discussion mode, the second group was exposed to a mixed mode of CMC and face-to-face (F2F discussions and the third group had only the face-to-face mode of discussion. The critical thinking development in these three conditions was evaluated based on the content analysis method used by Newman, Johnson, Cochrane and Webb (1995. This research reports the findings which hopefully will give some insight to other teaching practitioners who are interested in incorporating IT in their classrooms

  12. FPGA implementation cost and performance evaluation of IEEE 802.11 protocol encryption security schemes

    Science.gov (United States)

    Sklavos, N.; Selimis, G.; Koufopavlou, O.

    2005-01-01

    The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given.

  13. FPGA implementation cost and performance evaluation of IEEE 802.11 protocol encryption security schemes

    International Nuclear Information System (INIS)

    Sklavos, N; Selimis, G; Koufopavlou, O

    2005-01-01

    The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given

  14. Performance Analysis of TDMA Protocol in a Femtocell Network

    Directory of Open Access Journals (Sweden)

    Wanod Kumar

    2014-07-01

    Full Text Available In this paper, we evaluate the performance of TDMA (Time Division Multiple Access protocol using queuing theory in a femtocell network. The fair use of wireless channel among the users of network is carried out using TDMA protocol. The arrival of data packets from M communicating nodes becomes multiple Poisson process. The time slots of TDMA protocol represent c servers to communicate data packets coming from communicating nodes to the input of FAP (Femtocell Access Point. The service time of each server (time slot is exponentially distributed. This complete communication scenario using TDMA protocol is modeled using M/M/c queue. The performance of the protocol is evaluated in terms of mean number in system, average system delay and utilization for varying traffic intensity

  15. The patient experience of patient-centered communication with nurses in the hospital setting: a qualitative systematic review protocol.

    Science.gov (United States)

    Newell, Stephanie; Jordan, Zoe

    2015-01-01

    Service Standards (NSQHSS) in 2011 and the Australian Safety and Quality Goals for Health Care (The Goals) in 2012. The NSQHSS focus on partnerships with health consumers in their own care and treatment and also in health service planning, the design of care and service monitoring and evaluation. Standard 1 - Governance for Safety and Quality, and Standard 2 - Partnering with Consumers, are required to be integrated within all of the other eight Standards.With patient safety and quality being core to the delivery of care the Safety of Care, Appropriateness of Care and Partnering with Consumers goals have been identified as the three areas that will make up the goals over the next five years until 2017. The Australian Commission on Safety and Quality in Health Care, in providing further justification for the focus on these three areas, states:The third priority area of The Goals, Partnering with Consumers, reflects patient-centered care practice by ensuring 'that there are effective partnerships between consumers and healthcare providers and organizations at all levels of healthcare provision, planning and evaluation'. Specifically, 'Consumers and healthcare providers understand each other when communicating about care and treatment and health care organizations are health literate organizations''.As healthcare focuses on providing services that are patient-centered and methods to ensure this occurs, patients' voice and experience of health care provision is increasingly being sought from an organizational quality improvement perspective. Patients are being surveyed on their healthcare experience across interpersonal areas such as being provided the opportunity by their health professional to ask questions, the level of involvement in their own care and whether they were shown courtesy, treated with respect and listened to carefully by their health professional.Surveys of patients' satisfaction with their care are now being superseded by surveys of patient experiences of

  16. Evaluating veterinary practitioner perceptions of communication skills and training

    OpenAIRE

    McDermott, M.P.; Cobb, M.A.; Tischler, Victoria; Robbé, I.J.; Dean, R.S.

    2017-01-01

    A survey was conducted among veterinary practitioners in the UK and the USA in 2012/2013. Thematic analysis was used to identify underlying reasons behind answers to questions about the importance of communication skills and the desire to participate in postgraduate communication skills training. Lack of training among more experienced veterinary surgeons, incomplete preparation of younger practitioners and differences in ability to communicate all contribute to gaps in communication competen...

  17. Online Support Program for Parents of Children With a Chronic Kidney Disease Using Intervention Mapping: A Development and Evaluation Protocol.

    Science.gov (United States)

    Geense, Wytske W; van Gaal, Betsie Gi; Knoll, Jacqueline L; Cornelissen, Elisabeth Am; Schoonhoven, Lisette; Kok, Gerjo

    2016-01-13

    The care for children with a chronic kidney disease (CKD) is complex. Parents of these children may experience high levels of stress in managing their child's disease, potentially leading to negative effects on their child's health outcomes. Although the experienced problems are well known, adequate (online) support for these parents is lacking. The objective of the study is to describe the systematic development of an online support program for parents of children with CKD, and how this program will be evaluated. Intervention Mapping (IM) was used for the development of the program. After conducting a needs assessment, defining program objectives, searching for theories, and selecting practical applications, the online program e-Powered Parents was developed. e-Powered Parents consist of three parts: (1) an informative part with information about CKD and treatments, (2) an interactive part where parents can communicate with other parents and health care professionals by chat, private messages, and a forum, and (3) a training platform consisting of four modules: Managing stress, Setting limits, Communication, and Coping with emotions. In a feasibility study, the potential effectiveness and effect size of e-Powered Parents will be evaluated using an explorative randomized controlled trial with parents of 120 families. The outcomes will be the child's quality of life, parental stress and fatigue, self-efficacy in the communication with health care professionals, and family management. A process evaluation will provide insight in parents' experiences, including their experienced level of support. Study results are expected to be published in the summer of 2016. Although the development of e-Powered Parents using IM was time-consuming, IM has been a useful protocol. IM provided us with a systematic framework for structuring the development process. The participatory planning group was valuable as well; knowledge, experiences, and visions were shared, ensuring us that

  18. The development and evaluation of an internal workplace violence risk assessment protocol: one organization's experience.

    Science.gov (United States)

    Heitt, Michael C; Tamburo, Melissa Back

    2005-01-01

    The creation and development of a Risk Assessment Team at a large urban university is presented as a case study, with particular focus on the role the Employee Assistance Program (EAP) plays in the multidisciplinary team. The structure of the team and differing roles and responsibilities of members will be discussed. A specific protocol for addressing incidents will be introduced, along with changes in the team ' response over time. Major lessons learned will be presented, as well as the challenges the team faces today, and discussion of areas for future research and evaluation.

  19. Evaluating Risk Communication After the Fukushima Disaster Based on Nudge Theory.

    Science.gov (United States)

    Murakami, Michio; Tsubokura, Masaharu

    2017-03-01

    Using nudge theory and some examples of risk communication that followed the Fukushima disaster, this article discusses the influences and justifications of risk communication, in addition to how risk communication systems are designed. To assist people in making decisions based on their own value systems, we provide three suggestions, keeping in mind that people can be influenced (ie, "nudged") depending on how risk communication takes place: (1) accumulate knowledge on the process of evaluating how the method of risk communication and a system's default design could impact people; (2) clarify the purpose and outcomes of risk communication; and (3) see what risk communication might be ethically unjustifiable. Quantitative studies on risk communication and collective narratives will provide some ideas for how to design better risk communication systems and to help people make decisions. Furthermore, we have shown examples of unjustifiable risk communication.

  20. Evaluating communication to optimise consumer-directed energy efficiency interventions

    International Nuclear Information System (INIS)

    Wilson, Caroline

    2014-01-01

    Awareness campaigns, education and training programmes, label schemes and smart metering are all initiatives based on the principle that more and better information will encourage consumers to use less energy. Initiatives of this type can realise efficiency savings of up to 30%, and are likely to remain politically popular while preferred by the public to legislation or fines. While widespread, such programmes can have mixed performance, with savings often not reaching potential. This article investigates whether existing theoretical models can usefully be combined for evaluations of such message-oriented programmes. To do this it examines relationships between the variables of the Elaboration Likelihood Model (ELM) and Theory of Planned Behaviour (TPB) using empirical data from participants exposed to energy behaviour change projects. Analysis revealed that when used together, the theories may offer insight into the impact of messaging. While a single exploratory study can only describe what has occurred, it offers initial evidence to advocate further analysis of the potential of the combined framework. The author offers an illustration of how the framework might be utilised by other schemes by example of its application to a major EU project to save energy in Europe’s public buildings. - Highlights: • Consumer energy saving schemes have huge potential as a route to emissions reduction. • Mixed performance could be addressed by focus on impact of communication. • Evidence from exploratory study supports case for proposed evaluation framework. • Framework is illustrated at varying stages: planning, mid-term, and impact

  1. Evaluation of multiple-channel OFDM based airborne ultrasonic communications.

    Science.gov (United States)

    Jiang, Wentao; Wright, William M D

    2016-09-01

    Orthogonal frequency division multiplexing (OFDM) modulation has been extensively used in both wired and wireless communication systems. The use of OFDM technology allows very high spectral efficiency data transmission without using complex equalizers to correct the effect of a frequency-selective channel. This work investigated OFDM methods in an airborne ultrasonic communication system, using commercially available capacitive ultrasonic transducers operating at 50kHz to transmit information through the air. Conventional modulation schemes such as binary phase shift keying (BPSK) and quadrature amplitude modulation (QAM) were used to modulate sub-carrier signals, and the performances were evaluated in an indoor laboratory environment. Line-of-sight (LOS) transmission range up to 11m with no measurable errors was achieved using BPSK at a data rate of 45kb/s and a spectral efficiency of 1b/s/Hz. By implementing a higher order modulation scheme (16-QAM), the system data transfer rate was increased to 180kb/s with a spectral efficiency of 4b/s/Hz at attainable transmission distances up to 6m. Diffraction effects were incorporated into a model of the ultrasonic channel that also accounted for beam spread and attenuation in air. The simulations were a good match to the measured signals and non-LOS signals could be demodulated successfully. The effects of multipath interference were also studied in this work. By adding cyclic prefix (CP) to the OFDM symbols, the bit error rate (BER) performance was significantly improved in a multipath environment. Copyright © 2016 Elsevier B.V. All rights reserved.

  2. Wireless communications networks for the smart grid

    CERN Document Server

    Ho, Quang-Dung; Rajalingham, Gowdemy; Le-Ngoc, Tho

    2014-01-01

    This brief presents a comprehensive review of the network architecture and communication technologies of the smart grid communication network (SGCN). It then studies the strengths, weaknesses and applications of two promising wireless mesh routing protocols that could be used to implement the SGCN. Packet transmission reliability, latency and robustness of these two protocols are evaluated and compared by simulations in various practical SGCN scenarios. Finally, technical challenges and open research opportunities of the SGCN are addressed. Wireless Communications Networks for Smart Grid provi

  3. Evaluation and comparison of four protein extraction protocols for mono- and two-dimensional electrophoresis in Mytilus galloprovincialis

    Directory of Open Access Journals (Sweden)

    Marina Ceruso

    2015-09-01

    Full Text Available In this study, four protein extraction protocols from Mytilus galloprovincialis were evaluated with the aim to identify the most practical, efficient and reproducible method. Four extraction protocols frequently used for mussels and organic matrices were selected and compared. The methods were based on the use of: i TRIzol reagent; ii Lysis buffer; iii phenylmethanesulfonyl fluoride; iv trichloroacetic acid-acetone. Protein concentration was measured by the Bradford method. Three specimens of mussels were studied and the analysis was conducted in triplicate for each of the four protocols. Results indicated that the four methods could extract significantly different protein profiles. The highest number of protein spots resolved in 2DE gels and the best reproducibility was obtained using trichloroacetic acid-acetone protocol. Results afforded the selection of a suitable extraction protocol to be used for ecotoxicoproteomics studies from mussels and for other proteomic studies conducted by particularly complex tissues such as Mytilus galloprovincialis.

  4. Evaluation of a dedicated MDCT protocol using iterative image reconstruction after cervical spine trauma.

    Science.gov (United States)

    Geyer, L L; Körner, M; Hempel, R; Deak, Z; Mueck, F G; Linsenmaier, U; Reiser, M F; Wirth, S

    2013-07-01

    To evaluate radiation exposure for 64-row computed tomography (CT) of the cervical spine comparing two optimized protocols using filtered back projection (FBP) and adaptive statistical iterative reconstruction (ASIR), respectively. Sixty-seven studies using FBP (scanner 1) were retrospectively compared with 80 studies using ASIR (scanner 2). The key scanning parameters were identical (120 kV dose modulation, 64 × 0.625 mm collimation, pitch 0.531:1). In protocol 2, the noise index (NI) was increased from 5 to 25, and ASIR and the high-definition (HD) mode were used. The scan length, CT dose index (CTDI), and dose-length product (DLP) were recorded. The image quality was analysed subjectively by using a three-point scale (0; 1; 2), and objectively by using a region of interest (ROI) analysis. Mann-Whitney U and Wilcoxon's test were used. In the FBP group, the mean CTDI was 21.43 mGy, mean scan length 186.3 mm, and mean DLP 441.15 mGy cm. In the ASIR group, the mean CTDI was 9.57 mGy, mean scan length 195.21 mm, and mean DLP 204.23 mGy cm. The differences were significant for CTDI and DLP (p 0.05). The estimated mean effective dose decreased from 2.38 mSv (FBP) to 1.10 mSv (ASIR). The radiation dose of 64-row MDCT can be reduced to a level comparable to plain radiography without loss of subjective image quality by implementation of ASIR in a dedicated cervical spine trauma protocol. These results might contribute to an improved relative risk-to-benefit ratio and support the justification of CT as a first-line imaging tool to evaluate cervical spine trauma. Copyright © 2013 The Royal College of Radiologists. Published by Elsevier Ltd. All rights reserved.

  5. Trauma surgeon becomes consultant: evaluation of a protocol for management of intermediate-level trauma patients.

    Science.gov (United States)

    Fallon, Sara C; Delemos, David; Christopher, Daniel; Frost, Mary; Wesson, David E; Naik-Mathuria, Bindi

    2014-01-01

    At our level 1 pediatric trauma center, 9-54 intermediate-level ("level 2") trauma activations are received per month. Previously, the surgery team was required to respond to and assume responsibility for all patients who had "level 2" trauma activations. In 8/2011, we implemented a protocol where the emergency room (ER) physician primarily manages these patients with trauma consultation for surgical evaluation or admission. The purpose of this study was to prospectively evaluate the effects of the new protocol to ensure that patient safety and quality of care were maintained. We compared outcomes of patients treated PRE-implementation (10/2010-7/2011) and POST-implementation (9/2011-5/2012), including surgeon consultation rate, utilization of imaging and laboratory testing, ER length of stay, admission rate, and missed injuries or readmissions. Statistical analysis included chi-square and Student's t-test. We identified 472 patients: 179 in the PRE and 293 in the POST period. The populations had similar baseline clinical characteristics. The surgical consultation rate in the POST period was only 42%, with no missed injuries or readmissions. The ER length of stay did not change. However, in the POST period there were significant decreases in the admission rate (73% to 44%) and the mean number of CT scans (1.4 to 1), radiographs (2.4 to 1.7), and laboratory tests (5.1 to 3.3) ordered in the emergency room (all p<0.001). Intermediate-level pediatric trauma patients can be efficiently and safely managed by pediatric emergency room physicians, with surgical consultation only as needed. The protocol change improved resource utilization by decreasing testing and admissions and streamlining resident utilization in an era of reduced duty hours. © 2014.

  6. Evaluation of a dedicated MDCT protocol using iterative image reconstruction after cervical spine trauma

    International Nuclear Information System (INIS)

    Geyer, L.L.; Körner, M.; Hempel, R.; Deak, Z.; Mueck, F.G.; Linsenmaier, U.; Reiser, M.F.; Wirth, S.

    2013-01-01

    Aim: To evaluate radiation exposure for 64-row computed tomography (CT) of the cervical spine comparing two optimized protocols using filtered back projection (FBP) and adaptive statistical iterative reconstruction (ASIR), respectively. Materials and methods: Sixty-seven studies using FBP (scanner 1) were retrospectively compared with 80 studies using ASIR (scanner 2). The key scanning parameters were identical (120 kV dose modulation, 64 × 0.625 mm collimation, pitch 0.531:1). In protocol 2, the noise index (NI) was increased from 5 to 25, and ASIR and the high-definition (HD) mode were used. The scan length, CT dose index (CTDI), and dose–length product (DLP) were recorded. The image quality was analysed subjectively by using a three-point scale (0; 1; 2), and objectively by using a region of interest (ROI) analysis. Mann–Whitney U and Wilcoxon's test were used. Results: In the FBP group, the mean CTDI was 21.43 mGy, mean scan length 186.3 mm, and mean DLP 441.15 mGy cm. In the ASIR group, the mean CTDI was 9.57 mGy, mean scan length 195.21 mm, and mean DLP 204.23 mGy cm. The differences were significant for CTDI and DLP (p 0.05). The estimated mean effective dose decreased from 2.38 mSv (FBP) to 1.10 mSv (ASIR). Conclusion: The radiation dose of 64-row MDCT can be reduced to a level comparable to plain radiography without loss of subjective image quality by implementation of ASIR in a dedicated cervical spine trauma protocol. These results might contribute to an improved relative risk-to-benefit ratio and support the justification of CT as a first-line imaging tool to evaluate cervical spine trauma

  7. Optimizing a Treadmill Ramp Protocol to Evaluate Aerobic Capacity of Hemiparetic Poststroke Patients.

    Science.gov (United States)

    Bernardes, Wendell L; Montenegro, Rafael A; Monteiro, Walace D; de Almeida Freire, Raul; Massaferri, Renato; Farinatti, Paulo

    2018-03-01

    Bernardes, WL, Montenegro, RA, Monteiro, WD, de Almeida Freire, R, Massaferri, R, and Farinatti, P. Optimizing a treadmill ramp protocol to evaluate aerobic capacity of hemiparetic poststroke patients. J Strength Cond Res 32(3): 876-884, 2018-A correct assessment of cardiopulmonary capacity is important for aerobic training within motor rehabilitation of poststroke hemiparetic patients (PSHPs). However, specific cardiopulmonary exercise testing (CPET) for these patients are scarce. We proposed adaptations in a protocol originally developed for PSHPs by Ovando et al. (CPET1). We hypothesized that our adapted protocol (CPET2) would improve the original test, by preventing early fatigue and increasing patients' peak performance. Eleven PSHPs (52 ± 14 years, 10 men) performed both protocols. CPET2 integrated changes in final speed (100-120% vs. 140% maximal speed in 10-m walking test), treadmill inclination (final inclination of 5 vs. 10%), and estimated test duration (10 vs. 8 minutes) to smooth the rate of workload increment of CPET1. Peak oxygen uptake (V[Combining Dot Above]O2peak) (20.3 ± 6.1 vs. 18.6 ± 5.0 ml·kg·min; p = 0.04), V[Combining Dot Above]O2 at gas exchange transition (V[Combining Dot Above]O2-GET) (11.5 ± 2.9 vs. 9.8 ± 2.0 ml·kg·min; p = 0.04), and time to exhaustion (10 ± 3 vs. 6 ± 2 minutes; p higher in CPET2 than in CPET1. Slopes and intercepts of regressions describing relationships between V[Combining Dot Above]O2 vs. workload, heart rate vs. workload, and V[Combining Dot Above]O2 vs. heart rate were similar between CPETs. However, standard errors of estimates obtained for regressions between heart rate vs. workload (3.0 ± 1.3 vs. 3.8 ± 1.0 b·min; p = 0.004) and V[Combining Dot Above]O2 vs. heart rate (6.0 ± 2.1 vs. 4.8 ± 2.4 ml·kg·min; p = 0.05) were lower in CPET2 than in CPET1. In conclusion, the present adaptations in Ovando's CPET protocol increased exercise tolerance of PSHPs, eliciting higher V[Combining Dot Above]O2peak

  8. Prospective evaluation of a protocol for using transabdominal ultrasound to screen for short cervix.

    Science.gov (United States)

    Pandipati, Santosh; Combs, C Andrew; Fishman, Alan; Lee, Sarah Y; Mallory, Kimberly; Ianovich, Francesca

    2015-07-01

    We sought to evaluate a recently proposed protocol whereby transabdominal ultrasound of the cervix might be used as a prescreen to select women to undergo or to forgo measurement of cervical length via transvaginal ultrasound (CLvag). This was a prospective cohort study. Measurements of cervical length via transabdominal ultrasound (CLabd) and CLvag were made in women with singleton pregnancy during routine obstetrical ultrasound examination at 18(0/7) to 23(6/7) weeks of gestation. The transabdominal screen was considered positive if CLabd was ≤36 mm with the maternal bladder full or ≤35 mm with the bladder empty, or adequate imaging of the cervix could not be obtained. Sensitivity, specificity, predictive values, and likelihood ratios of a positive screen to detect a short cervix (CLvag ≤25 mm) were calculated. An interim analysis identified several technical problems with CLabd measurements, so the protocol was extensively revised. Under the revised protocol, 1580 women were included. Adequate views of the cervix were obtained via transabdominal imaging in 46% of subjects with the bladder empty and 56% with the bladder full. The correlation between CLabd and CLvag was poor (r = 0.38). Of the 17 patients with a short cervix, 15 had suboptimal transabdominal exams (screen positive) and 2 had CLabd ≤35 mm with bladder empty (screen positive). Sensitivity of the screen was 100% (95% confidence interval, 80.5-100%) but specificity was only 32.2% (95% confidence interval, 29.9-34.6%) and screen positive rate was 66.3%. Several technical problems and limitations of transabdominal imaging of the cervix are shown. Using modern, high-resolution ultrasound equipment, we were unable to adequately image the cervix via transabdominal ultrasound in half the cases. Although we confirmed that a CLabd cutoff value of 35-36 mm is appropriate for detection of short cervix, the technique for measuring CLabd is fraught with technical problems. Practitioners must validate the

  9. Joint evaluation of communication quality and user experience in an audio-visual virtual reality meeting

    DEFF Research Database (Denmark)

    Møller, Anders Kalsgaard; Hoffmann, Pablo F.; Carrozzino, Marcello

    2013-01-01

    The state-of-the-art speech intelligibility tests are created with the purpose of evaluating acoustic communication devices and not for evaluating audio-visual virtual reality systems. This paper present a novel method to evaluate a communication situation based on both the speech intelligibility...

  10. Optimizing the ASC WAN: evaluating network performance tools for comparing transport protocols.

    Energy Technology Data Exchange (ETDEWEB)

    Lydick, Christopher L.

    2007-07-01

    The Advanced Simulation & Computing Wide Area Network (ASC WAN), which is a high delay-bandwidth network connection between US Department of Energy National Laboratories, is constantly being examined and evaluated for efficiency. One of the current transport-layer protocols which is used, TCP, was developed for traffic demands which are different from that on the ASC WAN. The Stream Control Transport Protocol (SCTP), on the other hand, has shown characteristics which make it more appealing to networks such as these. Most important, before considering a replacement for TCP on any network, a testing tool that performs well against certain criteria needs to be found. In order to try to find such a tool, two popular networking tools (Netperf v.2.4.3 & v.2.4.6 (OpenSS7 STREAMS), and Iperf v.2.0.6) were tested. These tools implement both TCP and SCTP and were evaluated using four metrics: (1) How effectively can the tool reach a throughput near the bandwidth? (2) How much of the CPU does the tool utilize during operation? (3) Is the tool freely and widely available? And, (4) Is the tool actively developed? Following the analysis of those tools, this paper goes further into explaining some recommendations and ideas for future work.

  11. Evaluation of spacecraft technology programs (effects on communication satellite business ventures), volume 2

    Science.gov (United States)

    Greenburg, J. S.; Kaplan, M.; Fishman, J.; Hopkins, C.

    1985-01-01

    The computational procedures used in the evaluation of spacecraft technology programs that impact upon commercial communication satellite operations are discussed. Computer programs and data bases are described.

  12. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  13. Communication between nurses and simulated patients with cancer: evaluation of a communication training programme.

    NARCIS (Netherlands)

    Kruijver, I.P.M.; Kerkstra, A.; Kerssens, J.J.; Holtkamp, C.C.M.; Bensing, J.M.; Wiel, H.B.M. van de

    2001-01-01

    In this paper the effect of a communication training programme on the instrumental and affective communication skills employed by ward nurses during the admittance interview with recently diagnosed cancer patients was investigated. The training focused on teaching nurses skills to discuss and handle

  14. Body surface posture evaluation: construction, validation and protocol of the SPGAP system (Posture evaluation rotating platform system).

    Science.gov (United States)

    Schwertner, Debora Soccal; Oliveira, Raul; Mazo, Giovana Zarpellon; Gioda, Fabiane Rosa; Kelber, Christian Roberto; Swarowsky, Alessandra

    2016-05-04

    Several posture evaluation devices have been used to detect deviations of the vertebral column. However it has been observed that the instruments present measurement errors related to the equipment, environment or measurement protocol. This study aimed to build, validate, analyze the reliability and describe a measurement protocol for the use of the Posture Evaluation Rotating Platform System (SPGAP, Brazilian abbreviation). The posture evaluation system comprises a Posture Evaluation Rotating Platform, video camera, calibration support and measurement software. Two pilot studies were carried out with 102 elderly individuals (average age 69 years old, SD = ±7.3) to establish a protocol for SPGAP, controlling the measurement errors related to the environment, equipment and the person under evaluation. Content validation was completed with input from judges with expertise in posture measurement. The variation coefficient method was used to validate the measurement by the instrument of an object with known dimensions. Finally, reliability was established using repeated measurements of the known object. Expert content judges gave the system excellent ratings for content validity (mean 9.4 out of 10; SD 1.13). The measurement of an object with known dimensions indicated excellent validity (all measurement errors reality. To verify the images of objects with known dimensions the values for the width and height were, respectively, CV 0.88 (width) and 2.33 (height), SD 0.22 (width) and 0.35 (height), minimum and maximum values 24.83-25.2 (width) and 14.56 - 15.75 (height). In the analysis of different images (similar) of an individual, greater discrepancies were observed in the values found. The cervical index, for example, presented minimum and maximum values of 15.38 and 37.5, a coefficient of variation of 0.29 and a standard deviation of 6.78. The SPGAP was shown to be a valid and reliable instrument for the quantitative analysis of body posture with applicability and

  15. Performance Evaluation of Terrestrial Emergency Communication System in NPPs

    International Nuclear Information System (INIS)

    Son, Gwang Sub; Kim, Chang Hwoi; Kang, Hyun Gook

    2014-01-01

    The Fukushima accident induced by the great earthquake and tsunami reveals the vulnerability of I and C System. In the severe environment, the normal I and C system did not work properly and results in false information about the internal situation in NPP. Eventually the accident was not properly handled at the early stage. Therefore advanced emergency response system using a wireless channel is necessary to cope with the severe accident. In this paper, we introduce the ERS consisting of the HMS and MCS the ECS linking the HMS with MCS and the performance requirement of the ECS is analyzed. The ECS satisfying the requirement is designed conceptually and the performance of the ECS is evaluated through analysis and simulator. The terrestrial communication system is designed based on the IEEE 802.11. Analyzed performance results prove that the performance requirement can be sufficiently achieved. But if the scalability of data capacity is considered later, use of the advanced 802.11 standard such as 802.11n and multiple signal paths between the HMS and MCS are necessary

  16. Performance Evaluation of Terrestrial Emergency Communication System in NPPs

    Energy Technology Data Exchange (ETDEWEB)

    Son, Gwang Sub; Kim, Chang Hwoi; Kang, Hyun Gook [KAERI, Daejeon (Korea, Republic of)

    2014-08-15

    The Fukushima accident induced by the great earthquake and tsunami reveals the vulnerability of I and C System. In the severe environment, the normal I and C system did not work properly and results in false information about the internal situation in NPP. Eventually the accident was not properly handled at the early stage. Therefore advanced emergency response system using a wireless channel is necessary to cope with the severe accident. In this paper, we introduce the ERS consisting of the HMS and MCS the ECS linking the HMS with MCS and the performance requirement of the ECS is analyzed. The ECS satisfying the requirement is designed conceptually and the performance of the ECS is evaluated through analysis and simulator. The terrestrial communication system is designed based on the IEEE 802.11. Analyzed performance results prove that the performance requirement can be sufficiently achieved. But if the scalability of data capacity is considered later, use of the advanced 802.11 standard such as 802.11n and multiple signal paths between the HMS and MCS are necessary.

  17. A SURVEY ON MULTICAST ROUTING PROTOCOLS FOR PERFORMANCE EVALUATION IN WIRELESS SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    A. Suruliandi

    2015-03-01

    Full Text Available Multicast is a process used to transfer same message to multiple receivers at the same time. This paper presents the simulation and analysis of the performance of six different multicast routing protocols for Wireless Sensor Network (WSN. They are On Demand Multicast Routing Protocol (ODMRP, Protocol for Unified Multicasting through Announcement (PUMA, Multicast Adhoc On demand Distance Vector Protocol (MAODV, Overlay Boruvka-based Adhoc Multicast Protocol (OBAMP, Application Layer Multicast Algorithm (ALMA and enhanced version of ALMA (ALMA-H for WSN. Among them, ODMRP, MAODV and PUMA are reactive protocols while OBAMP, ALMA and ALMA-H are proactive protocols. This paper compares the performance of these protocols with common parameters such as Throughput, Reliability, End-to-End delay and Packet Delivery Ratio (PDR with increasing the numbers of nodes and increasing the speed of the nodes. The main objective of this work is to select the efficient multicast routing protocol for WSN among six multicast routing protocol based on relative strength and weakness of each protocol. The summary of above six multicast routing protocols is presented with a table of different performance characteristics. Experimental result shows that ODMRP attains higher throughput, reliability and higher packet delivery ratio than other multicast routing protocol, while incurring far less end-to-end delay.

  18. Design and evaluation of interactive instruction as communicative dialogue

    NARCIS (Netherlands)

    Bouwhuis, D.G.; Elsendoorn, B.A.G.; Coninx, F.

    1993-01-01

    Throughout history hearing people have been puzzled about the difficulty to communicate with deafpeople; a puzzlementperhaps strengthened by the fact that hearing is only one of the human sensory faculties. Apparently loss of hearing affects human communication far more than any other sensory

  19. Evaluation of forensic DNA mixture evidence: protocol for evaluation, interpretation, and statistical calculations using the combined probability of inclusion.

    Science.gov (United States)

    Bieber, Frederick R; Buckleton, John S; Budowle, Bruce; Butler, John M; Coble, Michael D

    2016-08-31

    The evaluation and interpretation of forensic DNA mixture evidence faces greater interpretational challenges due to increasingly complex mixture evidence. Such challenges include: casework involving low quantity or degraded evidence leading to allele and locus dropout; allele sharing of contributors leading to allele stacking; and differentiation of PCR stutter artifacts from true alleles. There is variation in statistical approaches used to evaluate the strength of the evidence when inclusion of a specific known individual(s) is determined, and the approaches used must be supportable. There are concerns that methods utilized for interpretation of complex forensic DNA mixtures may not be implemented properly in some casework. Similar questions are being raised in a number of U.S. jurisdictions, leading to some confusion about mixture interpretation for current and previous casework. Key elements necessary for the interpretation and statistical evaluation of forensic DNA mixtures are described. Given the most common method for statistical evaluation of DNA mixtures in many parts of the world, including the USA, is the Combined Probability of Inclusion/Exclusion (CPI/CPE). Exposition and elucidation of this method and a protocol for use is the focus of this article. Formulae and other supporting materials are provided. Guidance and details of a DNA mixture interpretation protocol is provided for application of the CPI/CPE method in the analysis of more complex forensic DNA mixtures. This description, in turn, should help reduce the variability of interpretation with application of this methodology and thereby improve the quality of DNA mixture interpretation throughout the forensic community.

  20. The ACCENT-protocol: a framework for benchmarking and model evaluation

    Directory of Open Access Journals (Sweden)

    V. Grewe

    2012-05-01

    Full Text Available We summarise results from a workshop on "Model Benchmarking and Quality Assurance" of the EU-Network of Excellence ACCENT, including results from other activities (e.g. COST Action 732 and publications. A formalised evaluation protocol is presented, i.e. a generic formalism describing the procedure of how to perform a model evaluation. This includes eight steps and examples from global model applications which are given for illustration. The first and important step is concerning the purpose of the model application, i.e. the addressed underlying scientific or political question. We give examples to demonstrate that there is no model evaluation per se, i.e. without a focused purpose. Model evaluation is testing, whether a model is fit for its purpose. The following steps are deduced from the purpose and include model requirements, input data, key processes and quantities, benchmark data, quality indicators, sensitivities, as well as benchmarking and grading. We define "benchmarking" as the process of comparing the model output against either observational data or high fidelity model data, i.e. benchmark data. Special focus is given to the uncertainties, e.g. in observational data, which have the potential to lead to wrong conclusions in the model evaluation if not considered carefully.

  1. Evaluation with stabilometric platform of balance disorders in osteoporosis patients. A proposal for a diagnostic protocol.

    Science.gov (United States)

    Cultrera, Pina; Pratelli, Elisa; Petrai, Veronica; Postiglione, Marco; Zambelan, Giulia; Pasquetti, Pietro

    2010-05-01

    Osteoporosis is a systemic disease with reduced bone mass and qualitative alterations of the bone, associated to increased risk of fracture. Pathogenesis of osteoporosis fractures is multifactorial. Main risk factor is falls (except for vertebral fragility fractures which occurs often in absence of trauma). Aging by itself produces physiological changes: muscular hypotrophy with asthenia, deficit of visus and hearing together with associated pathologies and multi-drug therapies. In osteoporosis patients with vertebral fractures posture change occurs which reduces balance. After clinical postural evaluation it is possible to carry out instrumental evaluation of posture with computerized methods such as stabilometry, baropodometry, dynanometry and gait analysis. Examination carried out with use of stabilometric computerized platform allows stabilometric (body sway assessment) as well as posturometric examination (center of pressure assessment during quiet standing). Fundamental parameters obtained are: position of the body center of gravity, area and shape of sway density curve and velocity variables. Protocol of evaluation includes assessment of examination in standard condition and in condition of temporary sensorial deprivation (to investigate the influence of various afferent systems on the maintenance of posture and balance). Accurate evaluation of postural control in osteoporosis patients constitutes a fundamental tool in fracture risk evaluation due to fall and in identification and correction of modifiable factors responsible for balance defect. This approach, together with adequate drug therapy, may lead to significant reduction of fractures in osteoporosis patients with subsequent reduction of hospitalization and residual consequent disabilities.

  2. The ACCENT-protocol: a framework for benchmarking and model evaluation

    Science.gov (United States)

    Grewe, V.; Moussiopoulos, N.; Builtjes, P.; Borrego, C.; Isaksen, I. S. A.; Volz-Thomas, A.

    2012-05-01

    We summarise results from a workshop on "Model Benchmarking and Quality Assurance" of the EU-Network of Excellence ACCENT, including results from other activities (e.g. COST Action 732) and publications. A formalised evaluation protocol is presented, i.e. a generic formalism describing the procedure of how to perform a model evaluation. This includes eight steps and examples from global model applications which are given for illustration. The first and important step is concerning the purpose of the model application, i.e. the addressed underlying scientific or political question. We give examples to demonstrate that there is no model evaluation per se, i.e. without a focused purpose. Model evaluation is testing, whether a model is fit for its purpose. The following steps are deduced from the purpose and include model requirements, input data, key processes and quantities, benchmark data, quality indicators, sensitivities, as well as benchmarking and grading. We define "benchmarking" as the process of comparing the model output against either observational data or high fidelity model data, i.e. benchmark data. Special focus is given to the uncertainties, e.g. in observational data, which have the potential to lead to wrong conclusions in the model evaluation if not considered carefully.

  3. Evaluation with stabilometric platform of balance disorders in osteoporosis patients. A proposal for a diagnostic protocol

    Science.gov (United States)

    Cultrera, Pina; Pratelli, Elisa; Petrai, Veronica; Postiglione, Marco; Zambelan, Giulia; Pasquetti, Pietro

    2010-01-01

    Osteoporosis is a systemic disease with reduced bone mass and qualitative alterations of the bone, associated to increased risk of fracture. Pathogenesis of osteoporosis fractures is multifactorial. Main risk factor is falls (except for vertebral fragility fractures which occurs often in absence of trauma). Aging by itself produces physiological changes: muscular hypotrophy with asthenia, deficit of visus and hearing together with associated pathologies and multi-drug therapies. In osteoporosis patients with vertebral fractures posture change occurs which reduces balance. After clinical postural evaluation it is possible to carry out instrumental evaluation of posture with computerized methods such as stabilometry, baropodometry, dynanometry and gait analysis. Examination carried out with use of stabilometric computerized platform allows stabilometric (body sway assessment) as well as posturometric examination (center of pressure assessment during quiet standing). Fundamental parameters obtained are: position of the body center of gravity, area and shape of sway density curve and velocity variables. Protocol of evaluation includes assessment of examination in standard condition and in condition of temporary sensorial deprivation (to investigate the influence of various afferent systems on the maintenance of posture and balance). Accurate evaluation of postural control in osteoporosis patients constitutes a fundamental tool in fracture risk evaluation due to fall and in identification and correction of modifiable factors responsible for balance defect. This approach, together with adequate drug therapy, may lead to significant reduction of fractures in osteoporosis patients with subsequent reduction of hospitalization and residual consequent disabilities. PMID:22460016

  4. The Dutch 'Focus on Strength' intervention study protocol: programme design and production, implementation and evaluation plan.

    Science.gov (United States)

    Ten Hoor, G A; Kok, G; Rutten, G M; Ruiter, R A C; Kremers, S P J; Schols, A M J W; Plasqui, G

    2016-06-10

    Overweight youngsters are better in absolute strength exercises than their normal-weight counterparts; a physiological phenomenon with promising psychological impact. In this paper we describe the study protocol of the Dutch, school-based program 'Focus on Strength' that aims to improve body composition of 11-13 year old students, and with that to ultimately improve their quality of life. The development of this intervention is based on the Intervention Mapping (IM) protocol, which starts from a needs assessment, uses theory and empirical research to develop a detailed intervention plan, and anticipates program implementation and evaluation. This novel intervention targets first year students in preparatory secondary vocational education (11-13 years of age). Teachers are the program implementers. One part of the intervention involves a 30 % increase of strength exercises in the physical education lessons. The other part is based on Motivational Interviewing, promoting autonomous motivation of students to become more physically active outside school. Performance and change objectives are described for both teachers and students. The effectiveness of the intervention will be tested in a Randomized Controlled Trial in 9 Dutch high schools. Intervention Mapping is a useful framework for program planning a school-based program to improve body composition and motivation to exercise in 11-13 year old adolescents by a "Focus on Strength". NTR5676 , registered 8 February 2016 (retrospectively registered).

  5. A Conflict-Free Low-Jitter Guaranteed-Rate MAC Protocol for Base-Station Communications in Wireless Mesh Networks

    Science.gov (United States)

    Szymanski, T. H.

    A scheduling algorithm and MAC protocol which provides low-jitter guaranteed-rate (GR) communications between base-stations (BS) in a Wireless Mesh Network (WMN) is proposed. The protocol can provision long-term multimedia services such as VOIP, IPTV, or Video-on-Demand. The time-axis is partitioned into scheduling frames with F time-slots each. A directional antennae scheme is used to provide each directed link with a fixed transmission rate. A protocol such as IntServ is used to provision resources along an end-to-end path of BSs for GR sessions. The Guaranteed Rates between the BSs are then specified in a doubly stochastic traffic rate matrix, which is recursively decomposed to yield a low-jitter GR frame transmission schedule. In the resulting schedule, the end-to-end delay and jitter are small and bounded, and the cell loss rate due to primary scheduling conflicts is zero. For dual-channel WMNs, the MAC protocol can achieve 100% utilization, as well as near-minimal queueing delays and near minimal delay jitter. The scheduling time complexity is O(NFlogNF), where N is the number of BSs. Extensive simulation results are presented.

  6. Data communications

    International Nuclear Information System (INIS)

    Preckshot, G.G.

    1993-08-01

    The purpose of this paper is to recommend regulatory guidance for reviewers examining computer communication systems used in nuclear power plants. The recommendations cover three areas important to these communications systems: system design, communication protocols, and communication media. The first area, system design, considers three aspects of system design--questions about architecture, specific risky design elements or omissions to look for in designs being reviewed, and recommendations for multiplexed data communication systems used in safety systems. The second area reviews pertinent aspects of communication protocol design and makes recommendations for newly designed protocols or the selection of existing protocols for safety system, information display, and non-safety control system use. The third area covers communication media selection, which differs significantly from traditional wire and cable. The recommendations for communication media extend or enhance the concerns of published IEEE standards about three subjects: data rate, imported hazards and maintainability

  7. [Evaluation of implementation of the protocol for managing tuberculosis/ human immunodeficiency virus coinfection in specialized care services in ceará state].

    Science.gov (United States)

    de Paula, Silvia Helena Bastos; Martins, Telma Alves; Santiago Borges, Sheila Maria; de Oliveira Nogueira, Christiana Maria; Freire, Valderina Ramos

    2017-05-25

    Identify barriers and strategies for implementation of the protocol for managing tuberculosis/ human immunodeficiency virus (TB/HIV) coinfection in specialized care services in Ceará state, through evaluation research. The study followed iPIER methodology, a new initiative to help improve the implementation of health programs through the use of research that is conducted as a part of the implementation process. Data were collected on the structure and processes of 22 services and barriers were explored in four focus groups with 28 participants, from the standpoint of the health team, administrators, and users. The discussions were transcribed and interpreted with regard to the objectives of the study. The information on structure and process revealed that six services manage TB/HIV coinfection and 16 do not. The barriers were: team members were unaware of the protocol; lack of clinical practice guidelines in the services; specialized care services working at all three levels of the health system; inadequate spaces for treatment of airborne diseases; and lack of communication with primary health care sectors for patient transfers. The results were discussed with teams and administrators in seminars held in the services and with program managers for sexually transmitted infections, human immunodeficiency virus, AIDS, hepatitis, and tuberculosis. Direct dialogue between administrators, implementers, users, and researchers generated knowledge about the services and led to joint preparation of modifications in workflow aimed at acceptance and use of the protocol; however, users continue to resist adherence to treatment.

  8. Economic evaluation of an intensive group training protocol compared with usual care physiotherapy in patients with chronic low back pain

    NARCIS (Netherlands)

    van der Roer, N.; van Tulder, M.; van Mechelen, W.; de Vet, H.C.W.

    2008-01-01

    STUDY DESIGN. Economic evaluation from a societal perspective conducted alongside a randomized controlled trial with a follow-up of 52 weeks. OBJECTIVE. To evaluate the cost effectiveness and cost utility of an intensive group training protocol compared with usual care physiotherapy in patients with

  9. Comparing Voice-Therapy and Vocal-Hygiene Treatments in Dysphonia Using a Limited Multidimensional Evaluation Protocol

    Science.gov (United States)

    Rodriguez-Parra, Maria J.; Adrian, Jose A.; Casado, Juan C.

    2011-01-01

    Purpose: This study evaluates the effectiveness of two different programs of voice-treatment on a heterogeneous group of dysphonic speakers and the stability of therapeutic progress for longterm follow-up post-treatment period, using a limited multidimensional protocol of evaluation. Method: Forty-two participants with voice disorders were…

  10. A Robust and Self-Paced BCI System Based on a Four Class SSVEP Paradigm: Algorithms and Protocols for a High-Transfer-Rate Direct Brain Communication

    Directory of Open Access Journals (Sweden)

    Sergio Parini

    2009-01-01

    Full Text Available In this paper, we present, with particular focus on the adopted processing and identification chain and protocol-related solutions, a whole self-paced brain-computer interface system based on a 4-class steady-state visual evoked potentials (SSVEPs paradigm. The proposed system incorporates an automated spatial filtering technique centred on the common spatial patterns (CSPs method, an autoscaled and effective signal features extraction which is used for providing an unsupervised biofeedback, and a robust self-paced classifier based on the discriminant analysis theory. The adopted operating protocol is structured in a screening, training, and testing phase aimed at collecting user-specific information regarding best stimulation frequencies, optimal sources identification, and overall system processing chain calibration in only a few minutes. The system, validated on 11 healthy/pathologic subjects, has proven to be reliable in terms of achievable communication speed (up to 70 bit/min and very robust to false positive identifications.

  11. Chapter 2: Commercial and Industrial Lighting Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Gowans, Dakers [Left Fork Energy, Harrison, NY (United States); Telarico, Chad [DNV GL, Mahwah, NJ (United States)

    2017-11-02

    The Commercial and Industrial Lighting Evaluation Protocol (the protocol) describes methods to account for gross energy savings resulting from the programmatic installation of efficient lighting equipment in large populations of commercial, industrial, and other nonresidential facilities. This protocol does not address savings resulting from changes in codes and standards, or from education and training activities. A separate Uniform Methods Project (UMP) protocol, Chapter 3: Commercial and Industrial Lighting Controls Evaluation Protocol, addresses methods for evaluating savings resulting from lighting control measures such as adding time clocks, tuning energy management system commands, and adding occupancy sensors.

  12. Experimental Evaluation of the Training Structure of the Picture Exchange Communication System (PECS)

    Science.gov (United States)

    Cummings, Anne R.; Carr, James E.; LeBlanc, Linda A.

    2012-01-01

    The Picture Exchange Communication System (PECS) is a picture-based alternative communication method that is widely accepted and utilized with individuals with disabilities. Although prior studies have examined the clinical efficacy of PECS, none have experimentally evaluated its manualized training structure. We experimentally evaluated the…

  13. Evaluation of a communication and stress management training programme for infertile couples

    DEFF Research Database (Denmark)

    Schmidt, Lone; Tjørnhøj-Thomsen, Tine; Boivin, Jackey

    2005-01-01

    This study evaluates a patient education programme focussed on improving communication and stress management skills among couples in fertility treatment.......This study evaluates a patient education programme focussed on improving communication and stress management skills among couples in fertility treatment....

  14. Pharmacokinetic-Pharmacodynamic Model To Evaluate Intramuscular Tetracycline Treatment Protocols To Prevent Antimicrobial Resistance in Pigs

    DEFF Research Database (Denmark)

    Ahmad, Amais; Græsbøll, Kaare; Christiansen, Lasse Engbo

    2015-01-01

    High instances of antimicrobial resistance are linked to both routine and excessive antimicrobial use, but excessive or inappropriate use represents an unnecessary risk. The competitive growth advantages of resistant bacteria may be amplified by the strain dynamics; in particular, the extent...... to which resistant strains outcompete susceptible strains under antimicrobial pressure may depend not only on the antimicrobial treatment strategies but also on the epidemiological parameters, such as the composition of the bacterial strains in a pig. This study evaluated how variation in the dosing...... protocol for intramuscular administration of tetracycline and the composition of bacterial strains in a pig affect the level of resistance in the intestine of a pig. Predictions were generated by a mathematical model of competitive growth of Escherichia coli strains in pigs under specified plasma...

  15. Pharmacokinetic-Pharmacodynamic Model To Evaluate Intramuscular Tetracycline Treatment Protocols To Prevent Antimicrobial Resistance in Pigs

    DEFF Research Database (Denmark)

    Ahmad, Amais; Græsbøll, Kaare; Christiansen, Lasse Engbo

    2015-01-01

    protocol for intramuscular administration of tetracycline and the composition of bacterial strains in a pig affect the level of resistance in the intestine of a pig. Predictions were generated by a mathematical model of competitive growth of Escherichia coli strains in pigs under specified plasma......High instances of antimicrobial resistance are linked to both routine and excessive antimicrobial use, but excessive or inappropriate use represents an unnecessary risk. The competitive growth advantages of resistant bacteria may be amplified by the strain dynamics; in particular, the extent...... to which resistant strains outcompete susceptible strains under antimicrobial pressure may depend not only on the antimicrobial treatment strategies but also on the epidemiological parameters, such as the composition of the bacterial strains in a pig. This study evaluated how variation in the dosing...

  16. Characterizing performance improvement in primary care systems in Mesoamerica: A realist evaluation protocol.

    Science.gov (United States)

    Munar, Wolfgang; Wahid, Syed S; Curry, Leslie

    2018-01-03

    Background . Improving performance of primary care systems in low- and middle-income countries (LMICs) may be a necessary condition for achievement of universal health coverage in the age of Sustainable Development Goals. The Salud Mesoamerica Initiative (SMI), a large-scale, multi-country program that uses supply-side financial incentives directed at the central-level of governments, and continuous, external evaluation of public, health sector performance to induce improvements in primary care performance in eight LMICs. This study protocol seeks to explain whether and how these interventions generate program effects in El Salvador and Honduras. Methods . This study presents the protocol for a study that uses a realist evaluation approach to develop a preliminary program theory that hypothesizes the interactions between context, interventions and the mechanisms that trigger outcomes. The program theory was completed through a scoping review of relevant empirical, peer-reviewed and grey literature; a sense-making workshop with program stakeholders; and content analysis of key SMI documents. The study will use a multiple case-study design with embedded units with contrasting cases. We define as a case the two primary care systems of Honduras and El Salvador, each with different context characteristics. Data will be collected through in-depth interviews with program actors and stakeholders, documentary review, and non-participatory observation. Data analysis will use inductive and deductive approaches to identify causal patterns organized as 'context, mechanism, outcome' configurations. The findings will be triangulated with existing secondary, qualitative and quantitative data sources, and contrasted against relevant theoretical literature. The study will end with a refined program theory. Findings will be published following the guidelines generated by the Realist and Meta-narrative Evidence Syntheses study (RAMESES II). This study will be performed

  17. Methods for the evaluation of hospital cooperation activities (Systematic review protocol

    Directory of Open Access Journals (Sweden)

    Rotter Thomas

    2012-02-01

    Full Text Available Abstract Background Hospital partnerships, mergers and cooperatives are arrangements frequently seen as a means of improving health service delivery. Many of the assumptions used in planning hospital cooperatives are not stated clearly and are often based on limited or poor scientific evidence. Methods This is a protocol for a systematic review, following the Cochrane EPOC methodology. The review aims to document, catalogue and synthesize the existing literature on the reported methods for the evaluation of hospital cooperation activities as well as methods of hospital cooperation. We will search the Database of Abstracts of Reviews of Effectiveness, the Effective Practice and Organisation of Care Register, the Cochrane Central Register of Controlled Trials and bibliographic databases including PubMed (via NLM, Web of Science, NHS EED, Business Source Premier (via EBSCO and Global Health for publications that report on methods for evaluating hospital cooperatives, strategic partnerships, mergers, alliances, networks and related activities and methods used for such partnerships. The method proposed by the Cochrane EPOC group regarding randomized study designs, controlled clinical trials, controlled before and after studies, and interrupted time series will be followed. In addition, we will also include cohort, case-control studies, and relevant non-comparative publications such as case reports. We will categorize and analyze the review findings according to the study design employed, the study quality (low versus high quality studies and the method reported in the primary studies. We will present the results of studies in tabular form. Discussion Overall, the systematic review aims to identify, assess and synthesize the evidence to underpin hospital cooperation activities as defined in this protocol. As a result, the review will provide an evidence base for partnerships, alliances or other fields of cooperation in a hospital setting. PROSPERO

  18. External evaluation of the Radiation Therapy Oncology Group brachial plexus contouring protocol: several issues identified

    International Nuclear Information System (INIS)

    Min, Myo; Carruthers, Scott; Zanchetta, Lydia; Roos, Daniel; Keating, Elly; Shakeshaft, John; Baxi, Siddhartha; Penniment, Michael; Wong, Karen

    2014-01-01

    The aims of the study were to evaluate interobserver variability in contouring the brachial plexus (BP) using the Radiation Therapy Oncology Group (RTOG)-approved protocol and to analyse BP dosimetries. Seven outliners independently contoured the BPs of 15 consecutive patients. Interobserver variability was reviewed qualitatively (visually by using planning axial computed-tomography images and anteroposterior digitally reconstructed radiographs) and quantitatively (by volumetric and statistical analyses). Dose–volume histograms of BPs were calculated and compared. We found significant interobserver variability among outliners in both qualitative and quantitative analyses. These were most pronounced for the T1 nerve roots on visual inspection and for the BP volume on statistical analysis. The BP volumes were smaller than those described in the RTOG atlas paper, with a mean volume of 20.8cc (range 11–40.7 cc) compared with 33±4cc (25.1–39.4cc). The average values of mean dose, maximum dose, V60Gy, V66Gy and V70Gy for patients treated with conventional radiotherapy and IMRT were 42.2Gy versus 44.8Gy, 64.5Gy versus 68.5Gy, 6.1% versus 7.6%, 2.9% versus 2.4% and 0.6% versus 0.3%, respectively. This is the first independent external evaluation of the published protocol. We have identified several issues, including significant interobserver variation. Although radiation oncologists should contour BPs to avoid dose dumping, especially when using IMRT, the RTOG atlas should be used with caution. Because BPs are largely radiologically occult on CT, we propose the term brachial-plexus regions (BPRs) to represent regions where BPs are likely to be present. Consequently, BPRs should in principle be contoured generously.

  19. A modified laboratory canning protocol for quality evaluation of dry bean (Phaseolus vulgaris L).

    Science.gov (United States)

    Balasubramanian, Parthiba; Slinkard, Alfred; Tyler, Robert; Vandenberg, Albert

    2000-05-01

    The effects of calcium (Ca 2+ ) level in the soak water, blanch water and brine, blanching temperature, and total seed solids on dry bean canning quality were investigated to optimise a laboratory canning protocol. A linear increase in the Ca 2+ level of soak water, blanch water and brine resulted in a linear decrease in hydration coefficient and percent washed drained weight but a linear increase in texture. Low Ca 2+ level (10 mg kg -1 ) reduced the hydration time for dry bean seed from 14 to 1 h. Blanching temperatures of 50, 70 and 88 °C had non-significant effects on canning quality traits. Blanching for 30 min at 70 °C for black bean or at 88 °C for navy bean and pinto bean resulted in percent washed drained weight ≥ 60, as required by the Canada Agricultural Products Standards Act. Seed solids levels of 95-97 g per 300 × 407 (14 fl oz) can were sufficient to attain a percent washed drained weight of 60. It was confirmed that the thermal processing conditions (115.6 °C retort temperature, 45 min) used in this study were sufficient to achieve commercial sterility. The optimised lab protocol for evaluation of the canning quality of dry bean breeding lines is as follows. Seed containing 95 g of solids for pinto bean, 96 g for navy bean and 97 g for black bean is soaked in water for 30 min at 20 °C and blanched for 30 min at 70 °C for black bean and 88 °C for navy bean and pinto bean in water containing 10 mg kg -1 of Ca 2+ . The seed is then transferred to a 300 × 407 can, filled with brine containing 10 mg kg -1 of Ca 2+ , 1.3% (w/v) of NaCl and 1.6% (w/v) of sugar. The can is then sealed, processed in steam at 115.6 °C for 45 min and cooled at 20 °C for 20 min. Cans are stored for at least 2 weeks prior to quality evaluation of the canned product. Canning of dry bean seed according to this protocol results in precise estimation of canning quality traits, particularly percent

  20. Zambia Communications Support for Health Safe Love Campaign Outcome Evaluation

    Data.gov (United States)

    US Agency for International Development — The Safe Love campaign was a three-year comprehensive HIV prevention behavior change and communication (BCC) initiative implemented between June 2011 and June 2014....

  1. Evaluation of the Efficiency of Two Different Freezing Media and Two Different Protocols to Preserve Human Spermatozoa from Cryoinjury

    Directory of Open Access Journals (Sweden)

    Gemma Fabozzi

    2016-01-01

    Full Text Available It is universally recognized that cryopreservation impairs sperm quality. In order to improve postthawing sperm survival and motility, media of different composition and different protocols have been proposed. However, no clear evidence is available to understand which are the most efficient protocol and medium for sperm cryopreservation. The present study evaluates the efficiency of two different cryopreservation protocols and two common freezing media (FM containing different cryoprotectants (CPs, TEST Yolk Buffer (TYB and Sperm Freeze (SF, to preserve human sperm quality. Our data suggest that TYB is better than SF both in terms of postthaw viability and in terms of progressive motility, while the direct addition of FM to the sperm sample resulted in the most efficient protocol in terms of postthaw viability but not in terms of progressive motility.

  2. Cost effectiveness methodology for evaluating Korean international communication system alternatives.

    OpenAIRE

    Hwang, Tae Kyun.

    1987-01-01

    Approved for public release; distribution in unlimited. Cost and Effectiveness models are developed by using of cost-effectiveness technique for fiber optic cable and satellite communication media. The models are applied to the Korean international communication problem. Alternative selection is required since the two medias different in cost and effectiveness. The major difficulties encountered were data gathering and measuring the effectiveness of the Korean international ...

  3. Understanding the motivation and performance of community health volunteers involved in the delivery of health programmes in Kampala, Uganda: a realist evaluation protocol

    Science.gov (United States)

    Vareilles, Gaëlle; Pommier, Jeanine; Kane, Sumit; Pictet, Gabriel; Marchal, Bruno

    2015-01-01

    Introduction The recruitment of community health volunteers to support the delivery of health programmes is a well-established approach in many countries, particularly where health services are not readily available. However, studies on management of volunteers are scarce and current research on human resource management of volunteers faces methodological challenges. This paper presents the protocol of a realist evaluation that aims at identifying the factors influencing the performance of community health volunteers involved in the delivery of a Red Cross immunisation programme in Kampala (Uganda) with a specific focus on motivation. Methods and analysis The realist evaluation cycle structures the protocol. To develop the theoretical basis for the evaluation, the authors conducted interviews and reviewed the literature on community health volunteers’ performance, management and organisational behaviour. This led to the formulation of the initial programme theory, which links the intervention inputs (capacity-building strategies) to the expected outcomes (positive work behaviour) with mechanisms that point in the direction of drivers of motivation. The contextual elements include components such as organisational culture, resource availability, etc. A case study design will be adopted. We define a case as a Red Cross branch, run by a programme manager, and will select two cases at the district level in Kampala. Mixed methods will be used in data collection, including individual interviews of volunteers, participant observation and document review. The thematic analysis will be based on the initial programme theory and will seek for context-mechanism-outcome configurations. Findings from the two cases will be compared. Discussion We discuss the scope for applying realist evaluation and the methodological challenges we encountered in developing this protocol. Ethics and dissemination The study was approved by the Ethical Committee at Rennes University Hospital

  4. Performance evaluation of cognitive radio in advanced metering infrastructure communication

    Science.gov (United States)

    Hiew, Yik-Kuan; Mohd Aripin, Norazizah; Din, Norashidah Md

    2016-03-01

    Smart grid is an intelligent electricity grid system. A reliable two-way communication system is required to transmit both critical and non-critical smart grid data. However, it is difficult to locate a huge chunk of dedicated spectrum for smart grid communications. Hence, cognitive radio based communication is applied. Cognitive radio allows smart grid users to access licensed spectrums opportunistically with the constraint of not causing harmful interference to licensed users. In this paper, a cognitive radio based smart grid communication framework is proposed. Smart grid framework consists of Home Area Network (HAN) and Advanced Metering Infrastructure (AMI), while AMI is made up of Neighborhood Area Network (NAN) and Wide Area Network (WAN). In this paper, the authors only report the findings for AMI communication. AMI is smart grid domain that comprises smart meters, data aggregator unit, and billing center. Meter data are collected by smart meters and transmitted to data aggregator unit by using cognitive 802.11 technique; data aggregator unit then relays the data to billing center using cognitive WiMAX and TV white space. The performance of cognitive radio in AMI communication is investigated using Network Simulator 2. Simulation results show that cognitive radio improves the latency and throughput performances of AMI. Besides, cognitive radio also improves spectrum utilization efficiency of WiMAX band from 5.92% to 9.24% and duty cycle of TV band from 6.6% to 10.77%.

  5. Early economic evaluation of emerging health technologies: protocol of a systematic review

    Science.gov (United States)

    2014-01-01

    Background The concept of early health technology assessment, discussed well over a decade, has now been collaboratively implemented by industry, government, and academia to select and expedite the development of emerging technologies that may address the needs of patients and health systems. Early economic evaluation is essential to assess the value of emerging technologies, but empirical data to inform the current practice of early evaluation is limited. We propose a systematic review of early economic evaluation studies in order to better understand the current practice. Methods/design This protocol describes a systematic review of economic evaluation studies of regulated health technologies in which the evaluation is conducted prior to regulatory approval and when the technology effectiveness is not well established. Included studies must report an economic evaluation, defined as the comparative analysis of alternatives with respect to their associated costs and health consequences, and must evaluate some regulated health technology such as pharmaceuticals, biologics, high-risk medical devices, or biomarkers. We will conduct the literature search on multiple databases, including MEDLINE, EMBASE, the Centre for Reviews and Dissemination Databases, and EconLit. Additional citations will be identified via scanning reference lists and author searching. We suspect that many early economic evaluation studies are unpublished, especially those conducted for internal use only. Additionally, we use a chain-referral sampling approach to identify authors of unpublished studies who work in technology discovery and development, starting out with our contact lists and authors who published relevant studies. Citation screening and full-text review will be conducted by pairs of reviewers. Abstracted data will include those related to the decision context and decision problem of the early evaluation, evaluation methods (e.g., data sources, methods, and assumptions used to

  6. Evaluating a protocol for testing fire-resistant oil-spill containment boom

    International Nuclear Information System (INIS)

    Walton, W.D.; Twilley, W.H.; Hiltabrand, R.R.; Mullin, J.V.

    1998-01-01

    A series of experiments were conducted to evaluate a protocol for testing the ability of fire-resistant booms to withstand both fire and waves. Most response plans for in situ burning of oil at sea require the use of a fire-resistant boom to contain the oil during a burn. For this study, a wave tank was designed and constructed to assess the capabilities of a 15 m section of a boom subjected to a 5 m diameter fire with 0.15 m high waves. Five typical fire-resistant oil-spill containment booms were tested. The purpose of the project was to evaluate the test procedure, therefore the overall performance of the boom was not evaluated on a pass-fail criterion. The two most important aspects of the test method were repeatability and reproducibility. Some of the parameters tested included the effect of wind, waves, fire size, and fire duration. Methods to constrain the booms were also tested. 7 refs., 6 tabs., 7 figs

  7. 'Communicate to vaccinate' (COMMVAC. building evidence for improving communication about childhood vaccinations in low- and middle-income countries: protocol for a programme of research

    Directory of Open Access Journals (Sweden)

    Lewin Simon

    2011-12-01

    Full Text Available Abstract Background Effective provider-parent communication can improve childhood vaccination uptake and strengthen immunisation services in low- and middle-income countries (LMICs. Building capacity to improve communication strategies has been neglected. Rigorous research exists but is not readily found or applicable to LMICs, making it difficult for policy makers to use it to inform vaccination policies and practice. The aim of this project is to build research knowledge and capacity to use evidence-based strategies for improving communication about childhood vaccinations with parents and communities in LMICs. Methods and design This project is a mixed methods study with six sub-studies. In sub-study one, we will develop a systematic map of provider-parent communication interventions for childhood vaccinations by screening and extracting data from relevant literature. This map will inform sub-study two, in which we will develop a taxonomy of interventions to improve provider-parent communication around childhood vaccination. In sub-study three, the taxonomy will be populated with trial citations to create an evidence map, which will also identify how evidence is linked to communication barriers regarding vaccination. In the project's fourth sub-study, we will present the interventions map, taxonomy, and evidence map to international stakeholders to identify high-priority topics for systematic reviews of interventions to improve parent-provider communication for childhood vaccination. We will produce systematic reviews of the effects of high-priority interventions in the fifth sub-study. In the sixth and final sub-study of the project, evidence from the systematic reviews will be translated into accessible formats and messages for dissemination to LMICs. Discussion This project combines evidence mapping, conceptual and taxonomy development, priority setting, systematic reviews, and knowledge transfer. It will build and share concepts, terms

  8. A cross-sectional study on person-centred communication in the care of older people: the COMHOME study protocol

    NARCIS (Netherlands)

    Hafskjold, L.; Sundler, A.J.; Holmstrom, I.K.; Sundling, V.; Dulmen, S. van; Eide, H.

    2015-01-01

    INTRODUCTION: This paper presents an international cross-sectional study on person-centred communication with older people receiving healthcare (COMHOME). Person-centred care relies on effective communication, but few studies have explored this with a specific focus on older people. The main aim of

  9. A cross-sectional study on person-centred communication in the care of older people: the COMHOME study protocol.

    NARCIS (Netherlands)

    Hafskjold, L.; Sundler, A.J.; Holmström, I.K.; Sundling, V.; Dulmen, S. van; Eide, H.

    2015-01-01

    Introduction: This paper presents an international cross-sectional study on person-centred communication with older people receiving healthcare (COMHOME). Person-centred care relies on effective communication, but few studies have explored this with a specific focus on older people. The main aim of

  10. Shuttle orbiter Ku-band radar/communications system design evaluation. Deliverable test equipment evaluation

    Science.gov (United States)

    Maronde, R. G.

    1980-07-01

    The Ku-band test equipment, known as the Deliverable System Test equipment (DSTE), is reviewed and evaluated. The DSTE is semiautomated and computer programs were generated for 14 communication mode tests and 17 radar mode tests. The 31 test modules provide a good cross section of tests with which to exercise the Ku-band system; however, it is very limited when being used to verify Ku-band system performance. More detailed test descriptions are needed, and a major area of concern is the DSTE sell-off procedure which is inadequate.

  11. Chapter 18: Variable Frequency Drive Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    Energy Technology Data Exchange (ETDEWEB)

    Romberger, Jeff [SBW Consulting, Inc., Bellevue, WA (United States)

    2017-06-21

    An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol.

  12. Communication strategies in acute health care: evaluation within the context of infection prevention and control.

    Science.gov (United States)

    Edwards, R; Sevdalis, N; Vincent, C; Holmes, A

    2012-09-01

    Communication in healthcare settings has recently received significant attention in the literature. However, there continues to be a large gap in current understanding of the effectiveness of different communication channels used in acute healthcare settings, particularly in the context of infection prevention and control (IPC). To explore and evaluate the main communication channels used within hospitals to communicate with healthcare workers (HCWs) and to propose practical recommendations. Critical review of the main communication channels used within acute health care to communicate information to HCWs, and analysis of their impact on practice. The analysis covers verbal communications, standardization via guidelines, education and training, electronic communications and marketing strategies. Traditional communication channels have not been successful in changing and sustaining best practice in IPC, but newer approaches (electronic messages and marketing) also have pitfalls. A few simple recommendations are made in relation to the development, implementation and evaluation of communications to HCWs; top-down vs bottom-up communications; and the involvement of HCWs, particularly ward personnel. Copyright © 2012 The Healthcare Infection Society. Published by Elsevier Ltd. All rights reserved.

  13. An evaluation of internal communication in the local council of Moqhaka Municipality

    Directory of Open Access Journals (Sweden)

    Lazarus Mohapi Maleho

    2011-01-01

    Full Text Available Municipalities face the task of communicating their policies and practices to employees. Their purpose is to achieve an understanding of their strategies by all stakeholders, including their employees. The research conducted exhibited evidence that Moqhaka Municipality in Free State Province of South Africa recognised the need to address the issue of internal communications but had not been involved in any in-depth assessment of its internal communications, nor did it have a written internal communication strategy. The first stage of the empirical study was to identify the current communication strategy within the particular municipality. Official documents were analysed and qualitative semi-structured interviews were conducted with key role players selected according to their expertise, availability and knowledge regarding the research topic. In the second stage the researcher focused on the employees’ perceptions and needs with regard to the internal communication at their workplace. To gather information, self-administered open and closed-ended questionnaires were distributed to employees. It was established through the literature study, that a need does exist for the internal communication to undergo regular evaluation. The results showed a general dissatisfaction in respect of communication and specific dissatisfaction in relation to particular areas of the organisation. The findings demonstrate not only the need to evaluate communication in an organisation on a regular basis, but also the importance of communication to employees, and the general need for improved organisational communication.

  14. Use of the OSCE to Evaluate Brief Communication Skills Training for Dental Students

    Science.gov (United States)

    Cannick, Gabrielle F.; Horowitz, Alice M.; Garr, David R.; Reed, Susan G.; Neville, Brad W.; Day, Terry A.; Woolson, Robert F.; Lackland, Daniel T.

    2009-01-01

    Although communications competency is recommended by the American Dental Education Association, only a few (n=5) dental schools report evaluating students’ skills using a competency examination for communication. This study used an objective structured clinical examination (OSCE) to evaluate dental students’ competency in interpersonal and tobacco cessation communication skills. All students were evaluated on their interpersonal communication skills at baseline and at six months post-OSCE by standardized patients and on their tobacco cessation communication skills by two independent raters. First- and second-year dental students (n=104) were randomized to a control or intervention group. One month after the baseline OSCE, students in the intervention group participated in a two-hour training session in which faculty members communicated with a standardized patient during a head and neck examination and counseled the patient about tobacco cessation. There were no statistically significant differences from baseline to post-test between the intervention and control group students as measured by the OSCE. However, among first-year students, both the intervention (n=23) and control (n=21) groups significantly increased in tobacco cessation communication scores. Second-year students in both intervention (n=24) and control (n=28) groups declined in interpersonal communication skills from baseline to post-test. Overall, this one-shot intervention was not successful, and results suggest that a comprehensive communication skills training course may be more beneficial than a single, brief training session for improving dental students’ communication skills. PMID:17761627

  15. Evaluation of Extraction Protocols for Simultaneous Polar and Non-Polar Yeast Metabolite Analysis Using Multivariate Projection Methods

    Directory of Open Access Journals (Sweden)

    Nicolas P. Tambellini

    2013-07-01

    Full Text Available Metabolomic and lipidomic approaches aim to measure metabolites or lipids in the cell. Metabolite extraction is a key step in obtaining useful and reliable data for successful metabolite studies. Significant efforts have been made to identify the optimal extraction protocol for various platforms and biological systems, for both polar and non-polar metabolites. Here we report an approach utilizing chemoinformatics for systematic comparison of protocols to extract both from a single sample of the model yeast organism Saccharomyces cerevisiae. Three chloroform/methanol/water partitioning based extraction protocols found in literature were evaluated for their effectiveness at reproducibly extracting both polar and non-polar metabolites. Fatty acid methyl esters and methoxyamine/trimethylsilyl derivatized aqueous compounds were analyzed by gas chromatography mass spectrometry to evaluate non-polar or polar metabolite analysis. The comparative breadth and amount of recovered metabolites was evaluated using multivariate projection methods. This approach identified an optimal protocol consisting of 64 identified polar metabolites from 105 ion hits and 12 fatty acids recovered, and will potentially attenuate the error and variation associated with combining metabolite profiles from different samples for untargeted analysis with both polar and non-polar analytes. It also confirmed the value of using multivariate projection methods to compare established extraction protocols.

  16. Multi-centred mixed-methods PEPFAR HIV care & support public health evaluation: study protocol

    Directory of Open Access Journals (Sweden)

    Fayers Peter

    2010-09-01

    Full Text Available Abstract Background A public health response is essential to meet the multidimensional needs of patients and families affected by HIV disease in sub-Saharan Africa. In order to appraise curret provision of HIV care and support in East Africa, and to provide evidence-based direction to future care programming, and Public Health Evaluation was commissioned by the PEPFAR programme of the US Government. Methods/Design This paper described the 2-Phase international mixed methods study protocol utilising longitudinal outcome measurement, surveys, patient and family qualitative interviews and focus groups, staff qualitative interviews, health economics and document analysis. Aim 1 To describe the nature and scope of HIV care and support in two African countries, including the types of facilities available, clients seen, and availability of specific components of care [Study Phase 1]. Aim 2 To determine patient health outcomes over time and principle cost drivers [Study Phase 2]. The study objectives are as follows. 1 To undertake a cross-sectional survey of service configuration and activity by sampling 10% of the facilities being funded by PEPFAR to provide HIV care and support in Kenya and Uganda (Phase 1 in order to describe care currently provided, including pharmacy drug reviews to determine availability and supply of essential drugs in HIV management. 2 To conduct patient focus group discussions at each of these (Phase 1 to determine care received. 3 To undertake a longitudinal prospective study of 1200 patients who are newly diagnosed with HIV or patients with HIV who present with a new problem attending PEPFAR care and support services. Data collection includes self-reported quality of life, core palliative outcomes and components of care received (Phase 2. 4 To conduct qualitative interviews with staff, patients and carers in order to explore and understand service issues and care provision in more depth (Phase 2. 5 To undertake document

  17. Hierarchical evaluation of electrical stimulation protocols for chronic wound healing: An effect size meta-analysis.

    Science.gov (United States)

    Khouri, Charles; Kotzki, Sylvain; Roustit, Matthieu; Blaise, Sophie; Gueyffier, Francois; Cracowski, Jean-Luc

    2017-09-01

    Electrical stimulation (ES) has been tested for decades to improve chronic wound healing. However, uncertainty remains on the magnitude of the efficacy and on the best applicable protocol. We conducted an effect size meta-analysis to assess the overall efficacy of ES on wound healing, to compare the efficacy of the different modalities of electrical stimulation, and to determine whether efficacy differs depending on the wound etiology, size, and age of the chronic wound. Twenty-nine randomized clinical trials with 1,510 patients and 1,753 ulcers were selected. Overall efficacy of ES on would healing was a 0.72 SMD (95% CI: 0.48, 1) corresponding to a moderate to large effect size. We found that unidirectional high voltage pulsed current (HVPC) with the active electrode over the wound was the best evidence-based protocol to improve wound healing with a 0.8 SMD (95% CI: 0.38, 1.21), while evaluation of the efficacy of direct current was limited by the small number of studies. ES was more effective on pressure ulcers compared to venous and diabetic ulcers, and efficacy trended to be inversely associated with the wound size and duration. This study confirms the overall efficacy of ES to enhance healing of chronic wounds and highlights the superiority of HVPC over other type of currents, which is more effective on pressure ulcers, and inversely associated with the wound size and duration. This will enable to standardize future ES practices. © 2017 by the Wound Healing Society.

  18. Clinical utility of a complete diagnostic protocol for the ocular evaluation of free-living raptors.

    Science.gov (United States)

    Labelle, Amber L; Whittington, Julia K; Breaux, Carrie B; Labelle, Philippe; Mitchell, Mark A; Zarfoss, Mitzi K; Schmidt, Stephanie A; Hamor, Ralph E

    2012-01-01

      To describe a protocol for the examination of free-living raptors and report the ophthalmic examination findings of seven raptor species native to central Illinois, namely the barred owl, Cooper's hawk, eastern screech owl, great horned owl, American kestrel, red-tailed hawk, and turkey vulture and to determine if the findings relative to visual prognosis affected eligibility for future release.   Seventy-nine free-living raptors.   Under manual restraint, complete ophthalmic examination including slit-lamp biomicroscopy and indirect funduscopy, applanation tonometry, rebound tonometry, ocular morphometrics, B-mode ultrasound, and electroretinography (ERG) were performed on each bird. Histopathology of enucleated globes was performed after euthanasia or death in selected cases.   The examination protocol was easily performed using manual restraint alone on all birds. Ocular lesions were detected in 48.1% of birds, with 47.3% affected unilaterally and 52.6% affected bilaterally. Ocular lesions were considered to be vision threatening in 29.0% of the unilaterally affected birds and 29.0% of the bilaterally affected birds. The most common case outcomes were discharge from hospital to rehabilitation facility (45.6%) followed by euthanasia (43.0%). The presence of an ocular lesion or a vision-threatening ocular lesion was not significantly associated with outcome. Reference ranges are reported for B-mode ultrasound, ocular morphometrics, and horizontal corneal diameter in all species.   Complete ophthalmic examination can be supplemented by the use of ocular morphometrics, ultrasound, and ERG in the manually restrained raptor. These advanced diagnostic techniques may be useful in developing more objective criteria for evaluating eligibility for release following rehabilitation of free-living birds of prey. © 2011 American College of Veterinary Ophthalmologists.

  19. The evaluation of complex clinical trial protocols: resources available to research ethics committees and the use of clinical trial registries--a case study.

    Science.gov (United States)

    Homedes, Núria; Ugalde, Antonio

    2015-06-01

    To assess the potential role of clinical trial (CT) registries and other resources available to research ethics committees (RECs) in the evaluation of complex CT protocols in low-income and middle-income countries. Using a case study approach, the authors examined the decision-making process of a REC in Argentina and its efforts to use available resources to decide on a complex protocol. We also analysed the information in the USA and other CT registries and consulted 24 CT experts in seven countries. Information requested by the Argentinean REC from other national RECs and ethics' experts was not useful to verify the adequacy of the REC's decision whether or not to approve the CT. The responses from the national regulatory agency and the sponsor were not helpful either. The identification of international resources that could assist was beyond the REC's capability. The information in the USA and other CT registries is limited, and at times misleading; and its accuracy is not verified by register keepers. RECs have limited access to experts and institutions that could assist them in their deliberations. Sponsors do not always answer RECs' request for information to properly conduct the ethical and methodological assessment of CT protocols. The usefulness of the CT registries is curtailed by the lack of appropriate codes and by data errors. Information about reasons for rejection, withdrawal or suspension of the trial should be included in the registries. Establishing formal channels of communication among national and foreign RECs and with independent international reference centres could strengthen the ethical review of CT protocols. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  20. Interventions for the prevention of cardiovascular diseases: a protocol for a systematic review of economic evaluations in low-income and middle-income countries.

    Science.gov (United States)

    Aminde, Leopold Ndemnge; Veerman, Lennert

    2016-12-21

    Low-income and middle-income countries (LMICs) are experiencing a growing disease burden due to cardiovascular and other chronic non-communicable diseases. Interventions for the control of these diseases are paramount; however, these countries are faced with competing health and financial needs. There is an urgent need for quality evidence on cost-effective strategies to address these chronic diseases. We aim to synthesise the current literature on economic evaluations of interventions for primary and secondary cardiovascular disease prevention in LMICs. A systematic review of studies (published and unpublished) in LMICs up to 30 October 2016 will be conducted. The following databases will be searched: PubMed/MEDLINE, EMBASE, SCOPUS, CINAHL, Web of Science, EconLit, NHS Economic Evaluations Database (NHS EED). Data sources specific to African literature, such as the WHO AFROLIB, Africa Index Medicus and African Journals online (AJOL) as well as grey literature, will also be searched. 2 reviewers shall independently screen potential articles for inclusion and disagreements shall be resolved by consensus. Quality appraisal of studies shall be done using Drummond's checklist for economic evaluation of studies. A descriptive synthesis of the evidence obtained is planned. The primary outcomes will be costs per life years gained or unit of clinical outcome, cost per quality-adjusted life years or disability-adjusted life years. This systematic review protocol has been prepared according to the Preferred Reporting Items for Systematic reviews and Meta-analyses for Protocols (PRISMA-P) 2015 statement. Ethics approval is not required considering that this is a protocol for a systematic review of published studies. Results from this review will be disseminated via conference presentations and peer-reviewed journal publications. CRD42016043510. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  1. A cross-sectional study on person-centred communication in the care of older people: the COMHOME study protocol.

    Science.gov (United States)

    Hafskjold, Linda; Sundler, Annelie J; Holmström, Inger K; Sundling, Vibeke; van Dulmen, Sandra; Eide, Hilde

    2015-04-15

    This paper presents an international cross-sectional study on person-centred communication with older people receiving healthcare (COMHOME). Person-centred care relies on effective communication, but few studies have explored this with a specific focus on older people. The main aim of the COMHOME study is to generate knowledge on person-centred communication with older people (>65 years) in home healthcare services, radiographic and optometric practice. This study will explore the communication between care providers and older persons in home care services. Home healthcare visits will be audiorecorded (n=500) in Norway, the Netherlands and Sweden. Analyses will be performed with the Verona Coding Definitions for Emotional Sequences (VR-CoDES), the Roter Interaction Analysis System (RIAS) and qualitative methods. The content of the communication, communicative challenging situations as well as empathy, power distance, decision-making, preservation of dignity and respect will be explored. In Norway, an additional 100 encounters, 50 in optometric practice (video recorded) and 50 in radiographic practice (audiorecorded), will be analysed. Furthermore, healthcare providers' self-reported communication skills, empathy, mindfulness and emotional intelligence in relation to observed person-centred communication skills will be assessed using well-established standardised instruments. Depending on national legislation, approval of either the central ethical committees (eg, nation or university), the national data protection officials or the local ethical committees (eg, units of home healthcare) was obtained. Study findings will be disseminated widely through peer-reviewed publications and conference presentations. The research findings will add knowledge to improve services provided to this vulnerable group of patients. Additionally, the findings will underpin a training programme for healthcare students and care providers focusing on communication with older people

  2. LOTIR: A Routing Protocol for Multi-hop V-to-I Communication Using Local Traffic Information

    Directory of Open Access Journals (Sweden)

    Kun-chan Lan

    2012-08-01

    Full Text Available Vehicular Ad Hoc Network (VANET is an emerging technology that can be applied to safety, transport efficiency, or infotainment applications for roads and highways. However, due to its unique features, such as dynamic mobility patterns and uneven distributions of vehicles, VANET faces many challenging research issues for robust data dissemination in the network. Many routing protocols have been proposed for VANET in the past few years, and the idea of utilizing a navigation system to assist the routing protocol for selecting the next best forwarder has become increasingly popular. However, it might not be realistic to assume that every vehicle is equipped with a navigation system. In addition, due to privacy concerns, drivers might not want to reveal their planned routes to other cars. In this work, we propose a new routing protocol, called LOTIR (LOcal Traffic Information Routing, that relies on only local traffic information and does not require the assistance of a navigation system. LOTIR is a DTN-based routing protocol that utilizes the car-following theory and traffic light information to decide the next carrier to forward the data to. We implement LOTIR in NS-2, and our results show that it can achieve similar performance as prior work which depends on the availability of global network topology information.

  3. Evaluating the implementation of a national clinical programme for diabetes to standardise and improve services: a realist evaluation protocol.

    Science.gov (United States)

    McHugh, S; Tracey, M L; Riordan, F; O'Neill, K; Mays, N; Kearney, P M

    2016-07-28

    Over the last three decades in response to the growing burden of diabetes, countries worldwide have developed national and regional multifaceted programmes to improve the monitoring and management of diabetes and to enhance the coordination of care within and across settings. In Ireland in 2010, against a backdrop of limited dedicated strategic planning and engrained variation in the type and level of diabetes care, a national programme was established to standardise and improve care for people with diabetes in Ireland, known as the National Diabetes Programme (NDP). The NDP comprises a range of organisational and service delivery changes to support evidence-based practices and policies. This realist evaluation protocol sets out the approach that will be used to identify and explain which aspects of the programme are working, for whom and in what circumstances to produce the outcomes intended. This mixed method realist evaluation will develop theories about the relationship between the context, mechanisms and outcomes of the diabetes programme. In stage 1, to identify the official programme theories, documentary analysis and qualitative interviews were conducted with national stakeholders involved in the design, development and management of the programme. In stage 2, as part of a multiple case study design with one case per administrative region in the health system, qualitative interviews are being conducted with frontline staff and service users to explore their responses to, and reasoning about, the programme's resources (mechanisms). Finally, administrative data will be used to examine intermediate implementation outcomes such as service uptake, acceptability, and fidelity to models of care. This evaluation is using the principles of realist evaluation to examine the implementation of a national programme to standardise and improve services for people with diabetes in Ireland. The concurrence of implementation and evaluation has enabled us to produce formative

  4. Use of limited MR protocol (coronal STIR) in the evaluation of patients with hip pain

    International Nuclear Information System (INIS)

    Khoury, N.J.; Birjawi, G.A.; Hourani, M.H.; Chaaya, M.

    2003-01-01

    To assess the role of a limited MR protocol (coronal STIR) as the initial part of the MR examination in patients with hip pain. Eighty-five patients presenting with hip pain, and normal radiographs of the pelvis, and who underwent our full MR protocol for hips were included retrospectively in the study. The full protocol consists of coronal T1-weighted and short tau inversion-recovery (STIR), and axial T2-weighted sequences. Ninety-three MR examinations were performed. Two radiologists interpreted the STIR (limited) examinations and the full studies separately, masked to each other's findings and to the final diagnosis. Comparison between the two protocols was then undertaken. For both readers, all normal MR examinations on the coronal STIR limited protocol were normal on the full protocol, with an interobserver reliability of 0.96. The STIR protocol was able to detect the presence or absence of an abnormality in 100% of cases (sensitivity). The STIR-only protocol provided a specific diagnosis in only 65% of cases (specificity). A normal coronal STIR study of the hips in patients with hip pain and normal radiographs precludes the need for further pelvic MR sequences. Any abnormality detected on this limited protocol should be further assessed by additional MR sequences. (orig.)

  5. Flap monitoring after head and neck reconstruction: evaluating an observation protocol.

    Science.gov (United States)

    Devine, J C; Potter, L A; Magennis, P; Brown, J S; Vaughan, E D

    2001-01-01

    This study evaluated the postoperative free-flap monitoring frequency protocol used in a maxillofacial unit for patients receiving free-tissue transfer for reconstruction following orofacial cancer. All free-tissue transfers undertaken in the unit between January 1992 and October 1998 were reviewed retrospectively. Of the 370 patients evaluated, 46 returned to theatre with compromised free flaps. The compromise was purely venous in origin in 37 of these cases, arterial in three and due to a combination of arterial and venous problems in six. Thirty-five of the flaps were successfully salvaged. On average, the clinical manifestation of the problem occurred 25.5 hours postoperatively. However, there was a significant time difference between flaps that were salvaged successfully and those that were not: in the salvaged group the compromise was identified 17.5 hours postsurgery compared with 51 hours for the unsuccessful group. The timing of the return to theatre following the identification of the compromise was a significant factor in the success rate: 71 minutes for those salvaged and 103 minutes for those not salvaged. It is recommended that flaps are monitored hourly for the first 72 postoperative hours and observations recorded on a chart.

  6. A protocol for a pragmatic randomized controlled trial evaluating outcomes of emergency nurse practitioner service.

    Science.gov (United States)

    Jennings, Natasha; Gardner, Glenn; O'Reilly, Gerard

    2014-09-01

    To evaluate emergency nurse practitioner service effectiveness on outcomes related to quality of care and service responsiveness. Increasing service pressures in the emergency setting have resulted in the adoption of service innovation models; the most common and rapidly expanding of these is the emergency nurse practitioner. The delivery of high quality patient care in the emergency department is one of the most important service indicators to be measured in health services today. The rapid uptake of emergency nurse practitioner service in Australia has outpaced the capacity to evaluate this model in outcomes related to safety and quality of patient care. Pragmatic randomized controlled trial at one site with 260 participants. This protocol describes a definitive prospective randomized controlled trial, which will examine the impact of emergency nurse practitioner service on key patient care and service indicators. The study control will be standard emergency department care. The intervention will be emergency nurse practitioner service. The primary outcome measure is pain score reduction and time to analgesia. Secondary outcome measures are waiting time, number of patients who did not wait, length of stay in the emergency department and representations within 48 hours. Scant research enquiry evaluating emergency nurse practitioner service on patient effectiveness and service responsiveness exists currently. This study is a unique trial that will test the effectiveness of the emergency nurse practitioner service on patients who present to the emergency department with pain. The research will provide an opportunity to further evaluate emergency nurse practitioner models of care and build research capacity into the workforce. Trial registration details: Australian and New Zealand Clinical Trials Registry dated 18th August 2013, ACTRN12613000933752. © 2014 John Wiley & Sons Ltd.

  7. Evaluating public relations effectiveness in a health care setting. The identification of communication assets and liabilities via a communication audit.

    Science.gov (United States)

    Henderson, Julie K

    2005-01-01

    The practice of public relations has experienced tremendous growth and evolution over the past 25 years, especially in the area of medical public relations. The constant changes in health care delivery have often led to increased need for communication with important publics. At the same time, practitioners in all fields of public relations have explored methods of accurately measuring the effectiveness of public relations programs. One such method of evaluation is the communication audit. This paper includes a brief overview of the communication audit concept followed by a case study based on an audit conducted for a small, multicultural non-profit health-care agency. Steps taken to conduct the audit and the methodology used are discussed. An analysis of the data is used to address two research questions regarding the efficacy of the Center's mission and vision. Suggestions for future audits are provided.

  8. 76 FR 14678 - Communications Unit Leader Prerequisite and Evaluation

    Science.gov (United States)

    2011-03-17

    ... evaluation form. OEC will use the evaluation form to identify course attendees, verify satisfaction of course... and evaluation of OEC events. Evaluation forms will be available in hard copy at each training session... Prerequisite and Evaluation. OMB Number: 1670--NEW. COML Prerequisites Verification Frequency: On occasion...

  9. Economic evaluation of an intensive group training protocol compared with usual care physiotherapy in patients with chronic low back pain.

    Science.gov (United States)

    van der Roer, Nicole; van Tulder, Maurits; van Mechelen, Willem; de Vet, Henrica

    2008-02-15

    Economic evaluation from a societal perspective conducted alongside a randomized controlled trial with a follow-up of 52 weeks. To evaluate the cost effectiveness and cost utility of an intensive group training protocol compared with usual care physiotherapy in patients with nonspecific chronic low back pain. The intensive group training protocol combines exercise therapy, back school, and behavioral principles. Two studies found a significant reduction in absenteeism for a graded activity program in occupational health care. This program has not yet been evaluated in a primary care physiotherapy setting. Participating physical therapists in primary care recruited 114 patients with chronic nonspecific low back pain. Eligible patients were randomized to either the protocol group or the guideline group. Outcome measures included functional status (Roland Morris Disability Questionnaire), pain intensity (11-point numerical rating scale), general perceived effect and quality of life (EuroQol-5D). Cost data were measured with cost diaries and included direct and indirect costs related to low back pain. After 52 weeks, the direct health care costs were significantly higher for patients in the protocol group, largely due to the costs of the intervention. The mean difference in total costs amounted to [Euro sign] 233 (95% confidence interval: [Euro sign] -2.185; [Euro sign] 2.764). The cost-effectiveness planes indicated no significant differences in cost effectiveness between the 2 groups. The results of this economic evaluation showed no difference in total costs between the protocol group and the guideline group. The differences in effects were small and not statistically significant. At present, national implementation of the protocol is not recommended.

  10. Using concurrent think-aloud and protocol analysis to explore student nurses' social learning information communication technology knowledge and skill development.

    Science.gov (United States)

    Todhunter, Fern

    2015-06-01

    Observations obtained through concurrent think-aloud and protocol analysis offer new understanding about the influence of social learning on student nurses' acquisition of Information and Communication Technology (ICT) knowledge and skills. The software used provides a permanent record of the underpinning study method, events and analyses. The emerging themes reflect the dimensions of social engagement, and the characteristics of positive and negative reactions to ICT. The evidence shows that given the right conditions, stronger learners will support and guide their peers. To explore the use of concurrent think-aloud and protocol analysis as a method to examine how student nurses approach ICT. To identify the benefits and challenges of using observational technology to capture learning behaviours. To show the influence of small group arrangement and student interactions on their ICT knowledge and skills development. Previous studies examining social interaction between students show how they work together and respond to interactive problem solving. Social interaction has been shown to enhance skills in both ICT and collaborative decision making. Structured observational analysis using concurrent think-aloud and protocol analysis. Students displayed varying degrees of pastoral support and emotional need, leadership, reflection, suggestion and experimentation skills. Encouraging student nurses to work in small mixed ability groups can be conducive for social and ICT skill and knowledge development. Observational software gives a permanent record of the proceedings. Copyright © 2015 Elsevier Ltd. All rights reserved.

  11. Design and implementation of a medium speed communications interface and protocol for a low cost, refreshed display computer

    Science.gov (United States)

    Phyne, J. R.; Nelson, M. D.

    1975-01-01

    The design and implementation of hardware and software systems involved in using a 40,000 bit/second communication line as the connecting link between an IMLAC PDS 1-D display computer and a Univac 1108 computer system were described. The IMLAC consists of two independent processors sharing a common memory. The display processor generates the deflection and beam control currents as it interprets a program contained in the memory; the minicomputer has a general instruction set and is responsible for starting and stopping the display processor and for communicating with the outside world through the keyboard, teletype, light pen, and communication line. The processing time associated with each data byte was minimized by designing the input and output processes as finite state machines which automatically sequence from each state to the next. Several tests of the communication link and the IMLAC software were made using a special low capacity computer grade cable between the IMLAC and the Univac.

  12. Strategic Evaluation on Communicating Research for Influence: Part I

    International Development Research Centre (IDRC) Digital Library (Canada)

    IDRC aims to support research that is not just about development, or relevant to development, but that will actually influence development. In order to do so, that research has to be effectively communicated and strategically positioned. IDRC endeavours to do this is by engaging potential research users in the research ...

  13. Teaching Effective Communication Skills with ACE: Analyzing, Composing, & Evaluating

    Science.gov (United States)

    Snyder, Lisa Gueldenzoph; Shwom, Barbara

    2011-01-01

    Most business communication classes teach students to use a writing process to compose effective documents. Students practice the process by applying it to various types of writing with various purposes-reports, presentations, bad news letters, persuasive memos, etc. However, unless students practice that process in other contexts outside of the…

  14. Alleviating Communication Apprehension through Rational Emotive Therapy: A Comparative Evaluation.

    Science.gov (United States)

    Watson, Arden K.; Dodd, Carley H.

    Albert Ellis's Rational Emotive Therapy (RET), which assumes that a person can change an emotional disturbance by discovering and disputing the irrational ideas giving rise to that emotion, has been used effectively in treating public speaking anxiety. To compare RET with other treatments for communication apprehension, 52 high communication…

  15. Communicating Ocean Sciences to Informal Audiences (COSIA): Interim Evaluation Report

    Science.gov (United States)

    St. John, Mark; Phillips, Michelle; Smith, Anita; Castori, Pam

    2009-01-01

    Communicating Ocean Sciences to Informal Audiences (COSIA) is a National Science Foundation (NSF)-funded project consisting of seven long-term three-way partnerships between the Lawrence Hall of Science (LHS) and an informal science education institution (ISEI) partnered with an institution of higher education (IHE). Together, educators from the…

  16. Communicating Ocean Sciences to Informal Audiences (COSIA): Final Evaluation Report

    Science.gov (United States)

    Phillips, Michelle; St. John, Mark

    2010-01-01

    Communicating Ocean Sciences to Informal Audiences (COSIA) is a National Science Foundation (NSF)-funded project consisting of six three-way partnerships between the Lawrence Hall of Science (LHS) and an informal science education institution (ISEI) partnered with an institution of higher education (IHE). Together, educators from the ISEI (often…

  17. Documentation Protocols to Generate Risk Indicators Regarding Degradation Processes for Cultural Heritage Risk Evaluation

    Science.gov (United States)

    Kioussi, A.; Karoglou, M.; Bakolas, A.; Labropoulos, K.; Moropoulou, A.

    2013-07-01

    Sustainable maintenance and preservation of cultural heritage assets depends highly on its resilience to external or internal alterations and to various hazards. Risk assessment of a heritage asset's can be defined as the identification of all potential hazards affecting it and the evaluation of the asset's vulnerability (building materials and building structure conservation state).Potential hazards for cultural heritage are complex and varying. The risk of decay and damage associated with monuments is not limited to certain long term natural processes, sudden events and human impact (macroscale of the heritage asset) but is also a function of the degradation processes within materials and structural elements due to physical and chemical procedures. Obviously, these factors cover different scales of the problem. The deteriorating processes in materials may be triggered by external influences or caused because of internal chemical and/or physical variations of materials properties and characteristics. Therefore risk evaluation should be dealt in the direction of revealing the specific active decay and damage mechanism both in mesoscale [type of decay and damage] and microscale [decay phenomenon mechanism] level. A prerequisite for risk indicators identification and development is the existence of an organised source of comparable and interoperable data about heritage assets under observation. This unified source of information offers a knowledge based background of the asset's vulnerability through the diagnosis of building materials' and building structure's conservation state, through the identification of all potential hazards affecting these and through mapping of its possible alterations during its entire life-time. In this framework the identification and analysis of risks regarding degradation processes for the development of qualitative and quantitative indicators can be supported by documentation protocols. The data investigated by such protocols help

  18. DOCUMENTATION PROTOCOLS TO GENERATE RISK INDICATORS REGARDING DEGRADATION PROCESSES FOR CULTURAL HERITAGE RISK EVALUATION

    Directory of Open Access Journals (Sweden)

    A. Kioussi

    2013-07-01

    Full Text Available Sustainable maintenance and preservation of cultural heritage assets depends highly on its resilience to external or internal alterations and to various hazards. Risk assessment of a heritage asset's can be defined as the identification of all potential hazards affecting it and the evaluation of the asset's vulnerability (building materials and building structure conservation state.Potential hazards for cultural heritage are complex and varying. The risk of decay and damage associated with monuments is not limited to certain long term natural processes, sudden events and human impact (macroscale of the heritage asset but is also a function of the degradation processes within materials and structural elements due to physical and chemical procedures. Obviously, these factors cover different scales of the problem. The deteriorating processes in materials may be triggered by external influences or caused because of internal chemical and/or physical variations of materials properties and characteristics. Therefore risk evaluation should be dealt in the direction of revealing the specific active decay and damage mechanism both in mesoscale [type of decay and damage] and microscale [decay phenomenon mechanism] level. A prerequisite for risk indicators identification and development is the existence of an organised source of comparable and interoperable data about heritage assets under observation. This unified source of information offers a knowledge based background of the asset's vulnerability through the diagnosis of building materials' and building structure's conservation state, through the identification of all potential hazards affecting these and through mapping of its possible alterations during its entire life-time. In this framework the identification and analysis of risks regarding degradation processes for the development of qualitative and quantitative indicators can be supported by documentation protocols. The data investigated by such

  19. Re-evaluation of broiler carcass scalding protocols for impact on the recovery of Campylobacter from breast skin after defeathering

    Science.gov (United States)

    This research re-evaluated the impact of scalding protocols on the recovery of Campylobacter from breast skin following defeathering after preliminary processing trials detected Campylobacter from breast skin for 4/8 carcasses that had vents plugged and sutured prior to scalding. Published research...

  20. Diagnostic efficacy of a modified low-dose acquisition protocol for the preoperative evaluation of mini-implant sites

    Energy Technology Data Exchange (ETDEWEB)

    Tadinada, Aditya; Marczak, Alana; Yadav, Sumit [University of Connecticut School of Dental Medicine, Farmington (United States)

    2017-09-15

    The objective of this study was to compare the outcomes of surgical mini-implant placement when potential mini-implant sites were scanned using a lower-dose 180° acquisition protocol versus a conventional 360° acquisition protocol. Ten dentate human skulls were used to provide sites for potential mini-implant placement. The sites were randomly divided into 2 groups: 360° and 180° cone-beam computed tomography (CBCT) acquisition protocols. A small-volume 180° CBCT scan and a 360° CBCT scan of each site were acquired using a Morita Accuitomo-170 CBCT machine and then a mini-implant was placed. A follow-up 360° CBCT scan was done as a gold standard to evaluate the location of the mini-implant and root perforation. Two raters evaluated the scans. Ninety-eight percent of the mini-implants placed did not perforate any root structure. Two percent of the sites had an appearance suggestive of perforation. On a Likert scale, both raters agreed that their subjective evaluation of the diagnostic quality of the protocols, ability to make and read measurements of the sites, and preferences for the specified diagnostic task were comparable. The Cohen kappa showed high inter-rater and intra-rater agreement. In this ex vivo study, we found that the 180° rotational acquisition was as effective as the conventional 360° rotational acquisition for the preoperative evaluation of potential mini-implant sites.

  1. Fracture Strength of Indirect Resin Composite Laminates to Teeth with Existing Restorations : An Evaluation of Conditioning Protocols

    NARCIS (Netherlands)

    Mese, Ayse; Ozcan, Mutlu

    2009-01-01

    Purpose: This study evaluated the fracture strength and failure types of indirect resin-based composite laminates bonded to teeth with aged Class III composite restorations that were conditioned according to various protocols. Materials and Methods: Maxillary central incisors (N = 60) with

  2. A process evaluation of implementing a vocational enablement protocol for employees with hearing difficulties in clinical practice

    NARCIS (Netherlands)

    Gussenhoven, A.H.M.; Singh, A.S.; Goverts, S.T.; van Til, M.; Anema, J.R.; Kramer, S.E.

    2015-01-01

    A multidisciplinary vocational rehabilitation programme, the Vocational Enablement Protocol (VEP) was developed to address the specific needs of employees with hearing difficulties. In the current study we evaluated the process of implementing the VEP in audiologic care among employees with hearing

  3. Modified calibration protocol evaluated in a model-based testing of SBR flexibility

    DEFF Research Database (Denmark)

    Corominas, Lluís; Sin, Gürkan; Puig, Sebastià

    2011-01-01

    The purpose of this paper is to refine the BIOMATH calibration protocol for SBR systems, in particular to develop a pragmatic calibration protocol that takes advantage of SBR information-rich data, defines a simulation strategy to obtain proper initial conditions for model calibration and provide...

  4. Evaluation of storage and filtration protocols for alpine/subalpine lake water quality samples

    Science.gov (United States)

    John L. Korfmacher; Robert C. Musselman

    2007-01-01

    Many government agencies and other organizations sample natural alpine and subalpine surface waters using varying protocols for sample storage and filtration. Simplification of protocols would be beneficial if it could be shown that sample quality is unaffected. In this study, samples collected from low ionic strength waters in alpine and subalpine lake inlets...

  5. Mean-field framework for performance evaluation of push–pull gossip protocols

    NARCIS (Netherlands)

    Bakhshi, Rena; Cloth, L.; Fokkink, Wan; Haverkort, Boudewijn R.H.M.

    Gossip protocols are designed to operate in very large, decentralised networks. A node in such a network bases its decision to interact (gossip) with another node on its partial view of the global system. Because of the size of these networks, analysis of gossip protocols is mostly done using

  6. Mean-field framework for performance evaluation of push-pull gossip protocols

    NARCIS (Netherlands)

    Bakhshi, R.; Cloth, L.; Fokkink, W.J.; Haverkort, B.

    2011-01-01

    Gossip protocols are designed to operate in very large, decentralised networks. A node in such a network bases its decision to interact (gossip) with another node on its partial view of the global system. Because of the size of these networks, analysis of gossip protocols is mostly done using

  7. Evaluation de la mise en ceuvre des services du protocole IPV6 ...

    African Journals Online (AJOL)

    At present, the configurations of networks are based on the protocol ipv4. The addresses ipv4 begin to run out. Groups of search work on the new version of the protocol IPV6 (in France, in United States, in Japan). Certain networks run under ipv6. However the great majority of the existing networks always use the ...

  8. Computation and Communication Evaluation of an Authentication Mechanism for Time-Triggered Networked Control Systems

    Science.gov (United States)

    Martins, Goncalo; Moondra, Arul; Dubey, Abhishek; Bhattacharjee, Anirban; Koutsoukos, Xenofon D.

    2016-01-01

    In modern networked control applications, confidentiality and integrity are important features to address in order to prevent against attacks. Moreover, network control systems are a fundamental part of the communication components of current cyber-physical systems (e.g., automotive communications). Many networked control systems employ Time-Triggered (TT) architectures that provide mechanisms enabling the exchange of precise and synchronous messages. TT systems have computation and communication constraints, and with the aim to enable secure communications in the network, it is important to evaluate the computational and communication overhead of implementing secure communication mechanisms. This paper presents a comprehensive analysis and evaluation of the effects of adding a Hash-based Message Authentication (HMAC) to TT networked control systems. The contributions of the paper include (1) the analysis and experimental validation of the communication overhead, as well as a scalability analysis that utilizes the experimental result for both wired and wireless platforms and (2) an experimental evaluation of the computational overhead of HMAC based on a kernel-level Linux implementation. An automotive application is used as an example, and the results show that it is feasible to implement a secure communication mechanism without interfering with the existing automotive controller execution times. The methods and results of the paper can be used for evaluating the performance impact of security mechanisms and, thus, for the design of secure wired and wireless TT networked control systems. PMID:27463718

  9. An Evaluation of Strategies for Training Staff to Implement the Picture Exchange Communication System

    Science.gov (United States)

    Barnes, Clarissa S.; Dunning, Johnna L.; Rehfeldt, Ruth Anne

    2011-01-01

    The picture exchange communication system (PECS) is a functional communication system frequently used with individuals diagnosed with autism spectrum disorders who experience severe language delays (Frost & Bondy, 2002). Few empirical investigations have evaluated strategies for training direct care staff how to effectively implement PECS with…

  10. Evaluating verbal and non-verbal communication skills, in an ethnogeriatric OSCE.

    Science.gov (United States)

    Collins, Lauren G; Schrimmer, Anne; Diamond, James; Burke, Janice

    2011-05-01

    Communication during medical interviews plays a large role in patient adherence, satisfaction with care, and health outcomes. Both verbal and non-verbal communication (NVC) skills are central to the development of rapport between patients and healthcare professionals. The purpose of this study was to assess the role of non-verbal and verbal communication skills on evaluations by standardized patients during an ethnogeriatric Objective Structured Clinical Examination (OSCE). Interviews from 19 medical students, residents, and fellows in an ethnogeriatric OSCE were analyzed. Each interview was videotaped and evaluated on a 14 item verbal and an 8 item non-verbal communication checklist. The relationship between verbal and non-verbal communication skills on interview evaluations by standardized patients were examined using correlational analyses. Maintaining adequate facial expression (FE), using affirmative gestures (AG), and limiting both unpurposive movements (UM) and hand gestures (HG) had a significant positive effect on perception of interview quality during this OSCE. Non-verbal communication skills played a role in perception of overall interview quality as well as perception of culturally competent communication. Incorporating formative and summative evaluation of both verbal and non-verbal communication skills may be a critical component of curricular innovations in ethnogeriatrics, such as the OSCE. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  11. Evaluation of the efficacy and toxicity of protocol cisplatin, 5-fluorouracil, leucovorin compared to protocol fluorouracil, doxorubicin and mitomycin C in locally advanced and metastatic gastric cancer

    Directory of Open Access Journals (Sweden)

    Andrić Zoran

    2012-01-01

    Full Text Available Introduction. Still there is no consensus on the choice of the most efficient and the least toxic chemotherapy regimen in the treatment of advanced gastric cancer. Nowadays few therapy protocols are available for treating this disease. Objective. Study was conducted to compare the efficacy and toxicity of FAM (flurouracil, doxorubicin, mitomycin C with CDDP and FU/FA (cisplatin, 5-fluorouracil, leucovorin protocols in patients with locally advanced and metastatic gastric cancer. Methods. This randomized study involved a group of 50 patients with locally advanced or metastatic gastric cancer, who had not previously undergone chemotherapy treatment. Progression free survival, overall survival and drug toxicity were evaluated. For statistical analysis chi-square test, Kaplan-Meier curve and the log rank test were used. Results. The overall response rate was 20% in the group treated with FAM and 24% in the group treated with CDDP, FU/FA (4% of patients from each group had complete response, but without significant statistical difference. Median survival was 10.9 months in the FAM group and 11.8 months in CDDP, FU/FA group, with no statistically significant difference. Non-haematological and haematological toxicities of CDDP, FU/FA were considerably less frequent than of FAM, and there was no treatment related deaths in any of the groups. Conclusion. Both investigated regimens demonstrated moderate efficacy. The study shows in favour of justified application of both protocols, while in regard to toxicity CDDP and FU/FA can be recommended as preferable treatment for locally advanced and metastatic gastric cancer. New strategies should be considered for better efficacy in the treatment of advanced gastric cancer. New strategies are necessary with the goal to achieve a better therapeutic effect.

  12. Improving mental health care transitions for children and youth: a protocol to implement and evaluate an emergency department clinical pathway.

    Science.gov (United States)

    Jabbour, Mona; Reid, S; Polihronis, C; Cloutier, P; Gardner, W; Kennedy, A; Gray, C; Zemek, R; Pajer, K; Barrowman, N; Cappelli, M

    2016-07-07

    While the emergency department (ED) is often a first point of entry for children and youth with mental health (MH) concerns, there is a limited capacity to respond to MH needs in this setting. Child MH systems are typically fragmented among multiple ministries, organizations, and providers. Communication among these groups is often poor, resulting in gaps, particularly in transitions of care, for this vulnerable population. The evidence-based Emergency Department Mental Health Clinical Pathway (EDMHCP) was created with two main goals: (1) to guide risk assessment and disposition decision-making for children and youth presenting to the ED with MH concerns and (2) to provide a streamlined transition to follow-up services with community MH agencies (CMHAs) and other providers. The purpose of this paper is to describe our study protocol to implement and evaluate the EDMHCP. This mixed methods health services research project will involve implementation and evaluation of the EDMHCP in four exemplar ED-CMHA dyads. The Theoretical Domains Framework will be used to develop a tailored intervention strategy to implement the EDMHCP. A multiple baseline study design and interrupted time-series analysis will be used to determine if the EDMHCP has improved health care utilization, medical management of the MH problems, and health sector coordination. The primary process outcome will be the proportion of patients with MH-specific recommendations documented in the health record. The primary service outcome will be the proportion of patients receiving the EDMHCP-recommended follow-up at 24-h or at 7 days. Data sources will include qualitative interviews, health record audits, administrative databases, and patient surveys. A concurrent process evaluation will be conducted to assess the degree of variability and fidelity in implementation across the sites. This paper presents a novel model for measuring the effects of the EDMHCP. Our development process will identify how the EDMHCP

  13. NASA/DARPA advanced communications technology satellite project for evaluation of telemedicine outreach using next-generation communications satellite technology: Mayo Foundation participation.

    Science.gov (United States)

    Gilbert, B K; Mitchell, M P; Bengali, A R; Khandheria, B K

    1999-08-01

    To describe the development of telemedicine capabilities-application of remote consultation and diagnostic techniques-and to evaluate the feasibility and practicality of such clinical outreach to rural and underserved communities with limited telecommunications infrastructures. In 1992, Mayo Foundation (Rochester, Minn, Jacksonville, Fla, and Scottsdale, Ariz), the National Aeronautics and Space Administration, and the Defense Advanced Research Projects Agency collaborated to create a complex network of fiberoptic landlines, video recording systems, satellite terminals, and specially developed data translators linking Mayo sites with other locations in the continental United States on an on-demand basis. The purpose was to transmit data via the asynchronous transfer mode (ATM) digital communications protocol over the Advanced Communications Technology Satellite. The links were intended to provide a conduit for transmission of data for patient-specific consultations between physicians, evaluation of medical imagery, and medical education for clinical staffs at remote sites. Low-data-rate (LDR) experiments went live late in 1993. Mayo Clinic Rochester successfully provided medical consultation and services to 2 small regional medical facilities. High-data-rate (HDR) experiments included studies of remote digital echocardiography, store-and-forward telemedicine, cardiac catheterization, and teleconsultation for congenital heart disease. These studies combined landline data transmission with use of the satellite. The complexity of the routing paths and network components, immaturity of available software, and inexperience with existing telecommunications caused significant study delays. These experiments demonstrated that next-generation satellite technology can provide batch and real-time imagery for telemedicine. The first-generation of the ATM and satellite network technology used in these experiments created several technical problems and inconveniences that should

  14. Taking stock: protocol for evaluating a family planning supply chain intervention in Senegal.

    Science.gov (United States)

    Cavallaro, Francesca L; Duclos, Diane; Baggaley, Rebecca F; Penn-Kekana, Loveday; Goodman, Catherine; Vahanian, Alice; Santos, Andreia C; Bradley, John; Paintain, Lucy; Gallien, Jérémie; Gasparrini, Antonio; Hasselback, Leah; Lynch, Caroline A

    2016-04-21

    In Senegal, only 12% of women of reproductive age in union (WRAU) were using contraceptives and another 29% had an unmet need for contraceptives in 2010-11. One potential barrier to accessing contraceptives is the lack of stock availability in health facilities where women seek them. Multiple supply chain interventions have been piloted in low- and middle-income countries with the aim of improving contraceptive availability in health facilities. However, there is limited evidence on the effect of these interventions on contraceptive availability in facilities, and in turn on family planning use in the population. This evaluation protocol pertains to a supply chain intervention using performance-based contracting for contraceptive distribution that was introduced throughout Senegal between 2012 and 2015. This multi-disciplinary research project will include quantitative, qualitative and economic evaluations. Trained researchers in the different disciplines will implement the studies separately but alongside each other, sharing findings throughout the project to inform each other's data collection. A non-randomised study with stepped-wedge design will be used to estimate the effect of the intervention on contraceptive stock availability in health facilities, and on the modern contraceptive prevalence rate among women in Senegal, compared to the current pull-based distribution model used for other commodities. Secondary data from annual Service Provision Assessments and Demographic and Health Surveys will be used for this study. Data on stock availability and monthly family planning consultations over a 4-year period will be collected from 200 health facilities in five regions to perform time series analyses. A process evaluation will be conducted to understand the extent to which the intervention was implemented as originally designed, the acceptability of third-party logisticians within the health system and potential unintended consequences. These will be assessed

  15. Medical image transmission via communication satellite: evaluation of ultrasonographic images.

    Science.gov (United States)

    Suzuki, H; Horikoshi, H; Shiba, H; Shimamoto, S

    1996-01-01

    As compared with terrestrial circuits, communication satellites possess superior characteristics such as wide area coverage, broadcasting functions, high capacity, and resistance to disasters. Utilizing the narrow band channel (64 kbps) of the stationary communication satellite JCSAT1 located at an altitude of 36,000 km above the equator, we investigated satelliterelayed dynamic medical images transmitted by video signals, using hepatic ultrasonography as a model. We conclude that the "variable playing speed transmission scheme" proposed by us is effective for the transmission of dynamic images in the narrow band channel. This promises to permit diverse utilization and applications for purposes such as the transmission of other types of ultrasonic images as well as remotely directed medical diagnosis and treatment.

  16. Overcoming language barriers in healthcare: A protocol for investigating safe and effective communication when patients or clinicians use a second language.

    Science.gov (United States)

    Meuter, Renata F I; Gallois, Cindy; Segalowitz, Norman S; Ryder, Andrew G; Hocking, Julia

    2015-09-10

    Miscommunication in the healthcare sector can be life-threatening. The rising number of migrant patients and foreign-trained staff means that communication errors between a healthcare practitioner and patient when one or both are speaking a second language are increasingly likely. However, there is limited research that addresses this issue systematically. This protocol outlines a hospital-based study examining interactions between healthcare practitioners and their patients who either share or do not share a first language. Of particular interest are the nature and efficacy of communication in language-discordant conversations, and the degree to which risk is communicated. Our aim is to understand language barriers and miscommunication that may occur in healthcare settings between patients and healthcare practitioners, especially where at least one of the speakers is using a second (weaker) language. Eighty individual interactions between patients and practitioners who speak either English or Chinese (Mandarin or Cantonese) as their first language will be video recorded in a range of in- and out-patient departments at three hospitals in the Metro South area of Brisbane, Australia. All participants will complete a language background questionnaire. Patients will also complete a short survey rating the effectiveness of the interaction. Recordings will be transcribed and submitted to both quantitative and qualitative analyses to determine elements of the language used that might be particularly problematic and the extent to which language concordance and discordance impacts on the quality of the patient-practitioner consultation. Understanding the role that language plays in creating barriers to healthcare is critical for healthcare systems that are experiencing an increasing range of culturally and linguistically diverse populations both amongst patients and practitioners. The data resulting from this study will inform policy and practical solutions for

  17. Accuracy Evaluation of a Stereolithographic Surgical Template for Dental Implant Insertion Using 3D Superimposition Protocol

    Directory of Open Access Journals (Sweden)

    Corina Marilena Cristache

    2017-01-01

    Full Text Available The aim of this study was to evaluate the accuracy of a stereolithographic template, with sleeve structure incorporated into the design, for computer-guided dental implant insertion in partially edentulous patients. Materials and Methods. Sixty-five implants were placed in twenty-five consecutive patients with a stereolithographic surgical template. After surgery, digital impression was taken and 3D inaccuracy of implants position at entry point, apex, and angle deviation was measured using an inspection tool software. Mann–Whitney U test was used to compare accuracy between maxillary and mandibular surgical guides. A p value < .05 was considered significant. Results. Mean (and standard deviation of 3D error at the entry point was 0.798 mm (±0.52, at the implant apex it was 1.17 mm (±0.63, and mean angular deviation was 2.34 (±0.85. A statistically significant reduced 3D error was observed at entry point p=.037, at implant apex p=.008, and also in angular deviation p=.030 in mandible when comparing to maxilla. Conclusions. The surgical template used has proved high accuracy for implant insertion. Within the limitations of the present study, the protocol for comparing a digital file (treatment plan with postinsertion digital impression may be considered a useful procedure for assessing surgical template accuracy, avoiding radiation exposure, during postoperative CBCT scanning.

  18. MRI technique for the preoperative evaluation of deep infiltrating endometriosis: current status and protocol recommendation

    International Nuclear Information System (INIS)

    Schneider, C.; Oehmke, F.; Tinneberg, H.-R.; Krombach, G.A.

    2016-01-01

    Endometriosis is a common cause of chronic pelvic pain and infertility. It is defined as the occurrence of endometrial tissue outside the uterine cavity and can manifest as a peritoneal, ovarian or infiltrating form, the latter being referred to as deep infiltrating endometriosis (DIE). Surgery is essential in the treatment of DIE and depending on the severity of the disease, surgery can be difficult and extensive. Beside clinical examination and ultrasound, magnetic resonance imaging (MRI) has proven its value to provide useful information for planning surgery in patients with suspected DIE. To optimise the quality of MRI examinations, radiologists have to be familiar with the capabilities and also the limitations of this technique with respect to the assessment of DIE. MRI yields morphological information by using mainly T1- and T2-weighted sequences, but can also provide functional information by means of intravenous gadolinium, diffusion-weighted imaging or cine-MRI. In this article, these techniques and also adequate measures of patient preparation, which are indispensable for successful MRI imaging for the preoperative evaluation of DIE, are reviewed and a comprehensive protocol recommendation is provided.

  19. Performance Evaluation of Distributed Mobility Management Protocols: Limitations and Solutions for Future Mobile Networks

    Directory of Open Access Journals (Sweden)

    J. Carmona-Murillo

    2017-01-01

    Full Text Available Mobile Internet data traffic has experienced an exponential growth over the last few years due to the rise of demanding multimedia content and the increasing number of mobile devices. Seamless mobility support at the IP level is envisioned as a key architectural requirement in order to deal with the ever-increasing demand for data and to efficiently utilize a plethora of different wireless access networks. Current efforts from both industry and academia aim to evolve the mobility management protocols towards a more distributed operation to tackle shortcomings of fully centralized approaches. However, distributed solutions face several challenges that can result in lower performance which might affect real-time and multimedia applications. In this paper, we conduct an analytical and simulated evaluation of the main centralized and proposed Distributed Mobility Management (DMM solutions. Our results show that, in some scenarios, when users move at high speed and/or when the mobile node is running long-lasting applications, the DMM approaches incur high signaling cost and long handover latency.

  20. Evaluation of imaging protocol for ECT based on CS image reconstruction algorithm

    International Nuclear Information System (INIS)

    Zhou Xiaolin; Yun Mingkai; Cao Xuexiang; Liu Shuangquan; Wang Lu; Huang Xianchao; Wei Long

    2014-01-01

    Single-photon emission computerized tomography and positron emission tomography are essential medical imaging tools, for which the sampling angle number and scan time should be carefully chosen to give a good compromise between image quality and radiopharmaceutical dose. In this study, the image quality of different acquisition protocols was evaluated via varied angle number and count number per angle with Monte Carlo simulation data. It was shown that, when similar imaging counts were used, the factor of acquisition counts was more important than that of the sampling number in emission computerized tomography. To further reduce the activity requirement and the scan duration, an iterative image reconstruction algorithm for limited-view and low-dose tomography based on compressed sensing theory has been developed. The total variation regulation was added to the reconstruction process to improve the signal to noise Ratio and reduce artifacts caused by the limited angle sampling. Maximization of the maximum likelihood of the estimated image and the measured data and minimization of the total variation of the image are alternatively implemented. By using this advanced algorithm, the reconstruction process is able to achieve image quality matching or exceed that of normal scans with only half of the injection radiopharmaceutical dose. (authors)

  1. Comparison between evaluating methods about the protocols of different dose distributions in radiotherapy

    International Nuclear Information System (INIS)

    Ju Yongjian; Chen Meihua; Sun Fuyin; Zhang Liang'an; Lei Chengzhi

    2004-01-01

    Objective: To study the relationship between tumor control probability (TCP) or equivalent uniform dose (EUD) and the heterogeneity degree of the dose changes with variable biological parameter values of the tumor. Methods: According to the definitions of TCP and EUD, calculating equations were derived. The dose distributions in the tumor were assumed to be Gaussian ones. The volume of the tumor was divided into several voxels, and the absorbed doses of these voxels were simulated by Monte Carlo methods. Then with the different values of radiosensitivity (α) and potential doubling time of the clonogens (T p ), the relationships between TCP or EUD and the standard deviation of dose (S d ) were evaluated. Results: The TCP-S d curves were influenced by the variable α and T p values, but the EUD-S d curves showed little variation. Conclusion: When the radiotherapy protocols with different dose distributions are compared, if the biological parameter values of the tumor have been known exactly, it's better to use the TCP, otherwise the EUD will be preferred

  2. A comparison of students' self-assessments with faculty evaluations of their communication skills.

    Science.gov (United States)

    Lundquist, Lisa M; Shogbon, Angela O; Momary, Kathryn M; Rogers, Hannah K

    2013-05-13

    To compare students' self-assessment of their communication skills with faculty members' formal evaluation of their skills in a therapeutics course. Over a 3-year period, faculty members evaluated second-year pharmacy students' communication skills as part of a requirement in a therapeutics course. Immediately following an individual oral assessment and again following a group oral assessment, students self-assessed their communication skills using the same rubric the faculty members had used. Students' self-assessments were then compared with faculty members' evaluation of students' communication skills. Four hundred one (97.3%) students consented to participate in this study. Faculty evaluation scores of students for both the individual and group oral assessments were significantly higher than students' self-assessment scores. Students' self-assessment scores of their communication skills increased from the individual to the group oral assessment. Students' self-assessments of communication skills were consistently lower than faculty members' evaluations. Greater use of oral assessments throughout the pharmacy curriculum may help to improve students' confidence in and self-assessment of their communication skills.

  3. Integrating design science theory and methods to improve the development and evaluation of health communication programs.

    Science.gov (United States)

    Neuhauser, Linda; Kreps, Gary L

    2014-12-01

    Traditional communication theory and research methods provide valuable guidance about designing and evaluating health communication programs. However, efforts to use health communication programs to educate, motivate, and support people to adopt healthy behaviors often fail to meet the desired goals. One reason for this failure is that health promotion issues are complex, changeable, and highly related to the specific needs and contexts of the intended audiences. It is a daunting challenge to effectively influence health behaviors, particularly culturally learned and reinforced behaviors concerning lifestyle factors related to diet, exercise, and substance (such as alcohol and tobacco) use. Too often, program development and evaluation are not adequately linked to provide rapid feedback to health communication program developers so that important revisions can be made to design the most relevant and personally motivating health communication programs for specific audiences. Design science theory and methods commonly used in engineering, computer science, and other fields can address such program and evaluation weaknesses. Design science researchers study human-created programs using tightly connected build-and-evaluate loops in which they use intensive participatory methods to understand problems and develop solutions concurrently and throughout the duration of the program. Such thinking and strategies are especially relevant to address complex health communication issues. In this article, the authors explore the history, scientific foundation, methods, and applications of design science and its potential to enhance health communication programs and their evaluation.

  4. Study protocol: Evaluating the impact of a rural Australian primary health care service on rural health

    Directory of Open Access Journals (Sweden)

    Buykx Penny

    2011-03-01

    Full Text Available Abstract Background Rural communities throughout Australia are experiencing demographic ageing, increasing burden of chronic diseases, and de-population. Many are struggling to maintain viable health care services due to lack of infrastructure and workforce shortages. Hence, they face significant health disadvantages compared with urban regions. Primary health care yields the best health outcomes in situations characterised by limited resources. However, few rigorous longitudinal evaluations have been conducted to systematise them; assess their transferability; or assess sustainability amidst dynamic health policy environments. This paper describes the study protocol of a comprehensive longitudinal evaluation of a successful primary health care service in a small rural Australian community to assess its performance, sustainability, and responsiveness to changing community needs and health system requirements. Methods/Design The evaluation framework aims to examine the health service over a six-year period in terms of: (a Structural domains (health service performance; sustainability; and quality of care; (b Process domains (health service utilisation and satisfaction; and (c Outcome domains (health behaviours, health outcomes and community viability. Significant international research guided the development of unambiguous reliable indicators for each domain that can be routinely and unobtrusively collected. Data are to be collected and analysed for trends from a range of sources: audits, community surveys, interviews and focus group discussions. Discussion This iterative evaluation framework and methodology aims to ensure the ongoing monitoring of service activity and health outcomes that allows researchers, providers and administrators to assess the extent to which health service objectives are met; the factors that helped or hindered achievements; what worked or did not work well and why; what aspects of the service could be improved and how

  5. Study protocol for the evaluation of an Infant Simulator based program delivered in schools: a pragmatic cluster randomised controlled trial

    OpenAIRE

    Brinkman, Sally A; Johnson, Sarah E; Lawrence, David; Codde, James P; Hart, Michael B; Straton, Judith AY; Silburn, Sven

    2010-01-01

    Abstract Background This paper presents the study protocol for a pragmatic randomised controlled trial to evaluate the impact of a school based program developed to prevent teenage pregnancy. The program includes students taking care of an Infant Simulator; despite growing popularity and an increasing global presence of such programs, there is no published evidence of their long-term impact. The aim of this trial is to evaluate the Virtual Infant Parenting (VIP) program by investigating pre-c...

  6. Study protocol for improving asthma outcomes through cross-cultural communication training for physicians: a randomized trial of physician training.

    Science.gov (United States)

    Patel, Minal R; Thomas, Lara J; Hafeez, Kausar; Shankin, Matthew; Wilkin, Margaret; Brown, Randall W

    2014-06-16

    Massive resources are expended every year on cross-cultural communication training for physicians. Such training is a focus of continuing medical education nationwide and is part of the curriculum of virtually every medical school in America. There is a pressing need for evidence regarding the effects on patients of cross-cultural communication training for physicians. There is a need to understand the added benefit of such training compared to more general communication. We know of no rigorous study that has assessed whether cross-cultural communication training for physicians results in better health outcomes for their patients. The current study aims to answer this question by enhancing the Physician Asthma Care Education (PACE) program to cross cultural communication (PACE Plus), and comparing the effect of the enhanced program to PACE on the health outcomes of African American and Latino/Hispanic children with asthma. A three-arm randomized control trial is used to compare PACE Plus, PACE, and usual care. Both PACE and PACE Plus are delivered in two, two-hour sessions over a period of two weeks to 5-10 primary care physicians who treat African American and Latino/Hispanic children with asthma. One hundred twelve physicians and 1060 of their pediatric patients were recruited who self-identify as African American or Latino/Hispanic and experience persistent asthma. Physicians were randomized into receiving either the PACE Plus or PACE intervention or into the control group. The comparative effectiveness of PACE and PACE Plus on clinician's therapeutic and communication practices with the family/patient, children's urgent care use for asthma, asthma control, and quality of life, and parent/caretaker satisfaction with physician performance will be assessed. Data are collected via telephone survey and medical record review at baseline, 9 months following the intervention, and 21 months following the intervention. This study aims to reduce disparities in asthma

  7. The implementation and evaluation of a communication skills training program for oncology nurses.

    Science.gov (United States)

    Banerjee, Smita C; Manna, Ruth; Coyle, Nessa; Penn, Stacey; Gallegos, Tess E; Zaider, Talia; Krueger, Carol A; Bialer, Philip A; Bylund, Carma L; Parker, Patricia A

    2017-09-01

    Many nurses express difficulty in communicating with their patients, especially in oncology settings where there are numerous challenges and high-stake decisions during the course of diagnosis and treatment. Providing specific training in communication skills is one way to enhance the communication between nurses and their patients. We developed and implemented a communication skills training program for nurses, consisting of three teaching modules: responding empathically to patients; discussing death, dying, and end-of-life goals of care; and responding to challenging interactions with families. Training included didactic and experiential small group role plays. This paper presents results on program evaluation, self-efficacy, and behavioral demonstration of learned communication skills. Three hundred forty-two inpatient oncology nurses participated in a 1-day communication skills training program and completed course evaluations, self-reports, and pre- and post-standardized patient assessments. Participants rated the training favorably, and they reported significant gains in self-efficacy in their ability to communicate with patients in various contexts. Participants also demonstrated significant improvement in several empathic skills, as well as in clarifying skill. Our work demonstrates that implementation of a nurse communication skills training program at a major cancer center is feasible and acceptable and has a significant impact on participants' self-efficacy and uptake of communication skills.

  8. Non operative management of blunt splenic trauma: a prospective evaluation of a standardized treatment protocol.

    Science.gov (United States)

    Brillantino, A; Iacobellis, F; Robustelli, U; Villamaina, E; Maglione, F; Colletti, O; De Palma, M; Paladino, F; Noschese, G

    2016-10-01

    The advantages of the conservative approach for major spleen injuries are still debated. This study was designed to evaluate the safety and effectiveness of NOM in the treatment of minor (grade I-II according with the American Association for the Surgery of Trauma; AAST) and severe (AAST grade III-V) blunt splenic trauma, following a standardized treatment protocol. All the hemodynamically stable patients with computer tomography (CT) diagnosis of blunt splenic trauma underwent NOM, which included strict clinical and laboratory observation, 48-72 h contrast-enhanced ultrasonography (CEUS) follow-up and splenic angioembolization, performed both in patients with admission CT evidence of vascular injuries and in patients with falling hematocrit during observation. 87 patients [32 (36.7 %) women and 55 (63.2 %) men, median age 34 (range 14-68)] were included. Of these, 28 patients (32.1 %) had grade I, 22 patients (25.2 %) grade II, 20 patients (22.9 %) grade III, 11 patients (12.6 %) grade IV and 6 patients (6.8 %) grade V injuries. The overall success rate of NOM was 95.4 % (82/87). There was no significant difference in the success rate between the patients with different splenic injuries grade. Of 24 patients that had undergone angioembolization, 22 (91.6 %) showed high splenic injury grade. The success rate of embolization was 91.6 % (22/24). No major complications were observed. The minor complications (2 pleural effusions, 1 pancreatic fistula and 2 splenic abscesses) were successfully treated by EAUS or CT guided drainage. The non operative management of blunt splenic trauma, according to our protocol, represents a safe and effective treatment for both minor and severe injuries, achieving an overall success rate of 95 %. The angiographic study could be indicated both in patients with CT evidence of vascular injuries and in patients with high-grade splenic injuries, regardless of CT findings.

  9. Towards a standardised approach for evaluating guidelines and guidance documents on palliative sedation: study protocol.

    Science.gov (United States)

    Abarshi, Ebun; Rietjens, Judith; Caraceni, Augusto; Payne, Sheila; Deliens, Luc; Van Den Block, Lieve

    2014-01-01

    Sedation in palliative care has received growing attention in recent years; and so have guidelines, position statements, and related literature that provide recommendations for its practice. Yet little is known collectively about the content, scope and methodological quality of these materials. According to research, there are large variations in palliative sedation practice, depending on the definition and methodology used. However, a standardised approach to comparing and contrasting related documents, across countries, associations and governmental bodies is lacking. This paper reports on a protocol designed to enable thorough and systematic comparison of guidelines and guidance documents on palliative sedation. A multidisciplinary and international group of palliative care researchers, identified themes and clinical issues on palliative sedation based on expert consultations and evidence drawn from the EAPC (European Association of Palliative Care) framework for palliative sedation and AGREE II (Appraisal Guideline Research and Evaluation) instrument for guideline assessment. The most relevant themes were selected and built into a comprehensive checklist. This was tested on people working closely with practitioners and patients, for user-friendliness and comprehensibility, and modified where necessary. Next, a systematic search was conducted for guidelines in English, Dutch, Flemish, or Italian. The search was performed in multiple databases (PubMed, CancerLit, CNAHL, Cochrane Library, NHS Evidence and Google Scholar), and via other Internet resources. Hereafter, the final version of the checklist will be used to extract data from selected literature, and the same will be compiled, entered into SPSS, cleaned and analysed systematically for publication. We have together developed a comprehensive checklist in a scientifically rigorous manner to allow standardised and systematic comparison. The protocol is applicable to all guidelines on palliative sedation, and

  10. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  11. Incorporating Standardized Colleague Simulations in a Clinical Assessment Course and Evaluating the Impact on Interprofessional Communication.

    Science.gov (United States)

    Shrader, Sarah; Dunn, Brianne; Blake, Elizabeth; Phillips, Cynthia

    2015-05-25

    To determine the impact of incorporating standardized colleague simulations on pharmacy students' confidence and interprofessional communication skills. Four simulations using standardized colleagues portraying attending physicians in inpatient and outpatient settings were integrated into a required course. Pharmacy students interacted with the standardized colleagues using the Situation, Background, Assessment, Request/Recommendation (SBAR) communication technique and were evaluated on providing recommendations while on simulated inpatient rounds and in an outpatient clinic. Additionally, changes in student attitudes and confidence toward interprofessional communication were assessed with a survey before and after the standardized colleague simulations. One hundred seventy-one pharmacy students participated in the simulations. Student interprofessional communication skills improved after each simulation. Student confidence with interprofessional communication in both inpatient and outpatient settings significantly improved. Incorporation of simulations using standardized colleagues improves interprofessional communication skills and self-confidence of pharmacy students.

  12. A Practice-Based Evaluation of Distress Screening Protocol Adherence and Medical Service Utilization.

    Science.gov (United States)

    Zebrack, Brad; Kayser, Karen; Bybee, Deborah; Padgett, Lynne; Sundstrom, Laura; Jobin, Chad; Oktay, Julianne

    2017-07-01

    Background: This study examined the extent to which cancer programs demonstrated adherence to their own prescribed screening protocol, and whether adherence to that protocol was associated with medical service utilization. The hypothesis is that higher rates of service utilization are associated with lower rates of adherence to screening protocols. Methods: Oncology social workers at Commission on Cancer-accredited cancer programs reviewed electronic health records (EHRs) in their respective cancer programs during a 2-month period in 2014. Rates of overall adherence to a prescribed distress screening protocol were calculated based on documentation in the EHR that screening adherence and an appropriate clinical response had occurred. We examined documentation of emergency department (ED) use and hospitalization within 2 months after the screening visit. Results: Review of 8,409 EHRs across 55 cancer centers indicated that the overall adherence rate to screening protocols was 62.7%. The highest rates of adherence were observed in Community Cancer Programs (76.3%) and the lowest rates were in NCI-designated Cancer Centers (43.3%). Rates of medical service utilization were significantly higher than expected when overall protocol adherence was lacking. After controlling for patient and institutional characteristics, risk ratios for ED use (0.82) and hospitalization (0.81) suggest that when overall protocol adherence was documented, 18% to 19% fewer patients used these medical services. Conclusions: The observed associations between a mandated psychosocial care protocol and medical service utilization suggest opportunities for operational efficiencies and costs savings. Further investigations of protocol integrity, as well as the clinical care models by which psychosocial care is delivered, are warranted. Copyright © 2017 by the National Comprehensive Cancer Network.

  13. Gated single-photon emission tomography imaging protocol to evaluate myocardial stunning after exercise

    International Nuclear Information System (INIS)

    Hashimoto, Jun; Kubo, Atsushi; Iwasaki, Ryuichiro; Iwanaga, Shiro; Mitamura, Hideo; Ogawa, Satoshi; Kosuda, Shigeru

    1999-01-01

    This study was designed to apply ECG-gating to stress myocardial perfusion single-photon emission tomography (SPET) for the evaluation of myocardial stunning after exercise. Technetium-99m sestamibi was selected as the perfusion agent and a rest/exercise 1-day protocol was employed. Fourteen patients without coronary stenosis and 33 patients with coronary stenosis were enrolled in the study. We carried out three data acquisitions with ECG-gating: a 15-min data acquisition starting 30 min after the rest injection (AC1), a 5-min acquisition starting 5 min after the stress injection (AC2) and a 15-min acquisition starting 20 min after the stress injection (AC3). Calculation of left ventricular ejection fraction (LVEF) values was performed by means of automatic determination of the endocardial surface for all gating intervals in the cardiac cycle. Measured global EF values in 14 patients without coronary stenosis were 52.3%±7.6% (AC1), 60.6%±8.9% (AC2) and 55.6%±5.6% (AC3), and those in 11 patients with severe ischaemia were 53.6%±8.0% (AC1), 45.6%±12.1% (AC2) and 49.7%±10.7%. The magnitude of the depression of post-stress LVEF relative to the rest LVEF correlated with the severity of ischaemia (r=0.594, P=0.002), and segments manifesting post-stress functional depression were associated with ischaemic segments showing reversible perfusion defects. Stress myocardial perfusion SPET with ECG-gating is a feasible method for the evaluation of myocardial stunning as well as exercise-induced ischaemia. (orig.)

  14. Evaluating the short-term effects of a communication skills program for preclinical medical students.

    Science.gov (United States)

    Lee, Young-Mee; Lee, Young Hee

    2014-09-01

    Regardless of the growing importance of communication skills as a core clinical competence, few studies have determined the effects of communication skills courses in undergraduate medical curricula in Asian medical schools. The purpose of this study was to examine the effectiveness of a communication skills program for preclinical medical students. A communication skills course was provided to 111 second-year medical students in a medical college in Korea. Students' self-assessed competency of communication skills was evaluated by a questionnaire survey. To examine the improvement in observed communication skills, the students' encounters with standardized patients (SPs) were assessed at the first session and at the final course assessment. A structured checklist, consisting of 25 communication skills items, was used for the assessment. Students' self-assessed competency of communication skills increased significantly after completion of the course (pcommunication skills scores also improved significantly at the end of the course; the mean scores of the first SPs encounters was 49.6 (standard deviation [SD], 11.1), and those of cases A and B at the final assessment were 61.5 (SD, 8.4) and 69.6 (SD, 7.8), respectively (F61=269.54, pcommunication skills course was beneficial in developing and improving communication skills competency in preclinical medical students. Further studies should be followed to examine whether the acquisition of communication skills during preclinical studies can be sustained into clerkship and actual practice.

  15. Optimization of Saanen sperm genes amplification: evaluation of standardized protocols in genetically uncharacterized rural goats reared under a subtropical environment.

    Science.gov (United States)

    Barbour, Elie K; Saade, Maya F; Sleiman, Fawwak T; Hamadeh, Shady K; Mouneimne, Youssef; Kassaifi, Zeina; Kayali, Ghazi; Harakeh, Steve; Jaber, Lina S; Shaib, Houssam A

    2012-10-01

    The purpose of this research is to optimize quantitatively the amplification of specific sperm genes in reference genomically characterized Saanen goat and to evaluate the standardized protocols applicability on sperms of uncharacterized genome of rural goats reared under subtropical environment for inclusion in future selection programs. The optimization of the protocols in Saanen sperms included three production genes (growth hormone (GH) exons 2, 3, and 4, αS1-casein (CSN1S1), and α-lactalbumin) and two health genes (MHC class II DRB and prion (PrP)). The optimization was based on varying the primers concentrations and the inclusion of a PCR cosolvent (Triton X). The impact of the studied variables on statistically significant increase in the yield of amplicons was noticed in four out of five (80%) optimized protocols, namely in those related to GH, CSN1S1, α-lactalbumin, and PrP genes (P 0.05). The applicability of the optimized protocols of Saanen sperm genes on amplification of uncharacterized rural goat sperms revealed a 100% success in tested individuals for amplification of GH, CSN1S1, α-lactalbumin, and MHC class II DRB genes and a 75% success for the PrP gene. The significant success in applicability of the Saanen quantitatively optimized protocols to other uncharacterized genome of rural goats allows for their inclusion in future selection, targeting the sustainability of this farming system in a subtropical environment and the improvement of the farmers livelihood.

  16. Experimental performance evaluation of software defined networking (SDN) based data communication networks for large scale flexi-grid optical networks.

    Science.gov (United States)

    Zhao, Yongli; He, Ruiying; Chen, Haoran; Zhang, Jie; Ji, Yuefeng; Zheng, Haomian; Lin, Yi; Wang, Xinbo

    2014-04-21

    Software defined networking (SDN) has become the focus in the current information and communication technology area because of its flexibility and programmability. It has been introduced into various network scenarios, such as datacenter networks, carrier networks, and wireless networks. Optical transport network is also regarded as an important application scenario for SDN, which is adopted as the enabling technology of data communication networks (DCN) instead of general multi-protocol label switching (GMPLS). However, the practical performance of SDN based DCN for large scale optical networks, which is very important for the technology selection in the future optical network deployment, has not been evaluated up to now. In this paper we have built a large scale flexi-grid optical network testbed with 1000 virtual optical transport nodes to evaluate the performance of SDN based DCN, including network scalability, DCN bandwidth limitation, and restoration time. A series of network performance parameters including blocking probability, bandwidth utilization, average lightpath provisioning time, and failure restoration time have been demonstrated under various network environments, such as with different traffic loads and different DCN bandwidths. The demonstration in this work can be taken as a proof for the future network deployment.

  17. Evaluation of two protocols for low-level laser application in patients submitted to orthodontic treatment

    Directory of Open Access Journals (Sweden)

    Mariana Marquezan

    2013-02-01

    Full Text Available INTRODUCTION: Different low-level laser (LLL irradiation protocols have been tested to accelerate orthodontic tooth movement (OTM. Nevertheless, divergent results have been obtained. It was suggested that the stimulatory action of low level laser irradiation occurs during the proliferation and differentiation stages of bone cellular precursors, but not during later stages. OBJECTIVE: The purpose of this study was to determine the effect of two protocols of LLL irradiation on experimental tooth movement: One with daily irradiations and another with irradiations during the early stages. METHODS: Thirty-six rats were divided into control groups (CG1, CG2, CG3 and irradiated groups (IrG1, IrG2, IrG3 according to the presence of: experimental tooth movement, laser irradiation, type of laser irradiation protocol and date of euthanasia (3th or 8th day of experiment. At the end of experimental periods, a quantitative evaluation of the amount of OTM was made and the reactions of the periodontium were analyzed by describing cellular and tissue reactions and by counting blood vessels. RESULTS: The amount of OTM revealed no significant differences between groups in the same experimental period (p INTRODUÇÃO: diferentes protocolos de irradiação por laser de baixa potência (LBP têm sido testados para potencializar o movimento ortodôntico; entretanto, há resultados divergentes. Foi sugerido que seu efeito bioestimulador ocorre nas fases de proliferação e diferenciação celular, não agindo em estágios tardios. OBJETIVO: avaliar o efeito de dois protocolos de irradiação do LBP na movimentação ortodôntica: um com irradiações diárias e outro em que irradiações foram realizadas apenas nos períodos iniciais. MÉTODOS: trinta e seis ratos Wistar foram divididos em grupos controles (GC1, GC2 e GC3 e irradiados (GIr1, GIr2 e GIr3, de acordo com a presença de dispositivo ortodôntico, a presença de irradiação, o tipo de protocolo de irradia

  18. Effects of communication training with the MAAS-Global-D instrument on the antibiotic prescribing for respiratory infections in primary care: study protocol of a randomised controlled trial.

    Science.gov (United States)

    Hammersen, Friederike; Goetz, Katja; Soennichsen, Andreas; Emcke, Timo; Steinhaeuser, Jost

    2016-04-02

    Primary care physicians account for the majority of antibiotic prescribing in ambulatory care in Germany. Respiratory diseases are, regardless of effectiveness, often treated with antibiotics. Research has found this use without indication to be caused largely by communication problems (e.g. expectations on the patient's part or false assumptions about them by the physician). The present randomised controlled trial (RCT) study evaluates whether communication training for primary care physicians can reduce the antibiotic prescribing rate for respiratory tract infections. The study consists of three groups: group A will receive communication training; group B will be given the same, plus additional, access to an evidence-based point-of-care tool; and group C will function as the control group. The primary endpoint is the difference between intervention and control groups regarding the antibiotic prescribing rate before and after the intervention assessed through routine data. The communication skills are captured with the help of the communication instrument MAAS-Global-D, as well as individual videos of physician-patient consultations recorded by the primary care physicians. These skills will also be regarded with respect to the antibiotic prescribing rate. A process evaluation using qualitative as well as quantitative methods should provide information about barriers and enablers to implementing the communication training. The trial contributes to an insight into the effectiveness of the different components to reduce antibiotic prescribing, which will also be supported by an extensive evaluation. Communication training could be an effective method of reducing antibiotic prescribing in primary care. DRKS00009566 DATE REGISTRATION: 5 November 2015.

  19. A Cross-Layered Communication Protocol for Load Balancing in Large Scale Multi-sink Wireless Sensor Networks

    NARCIS (Netherlands)

    Erman-Tüysüz, A.; Mutter, T.; van Hoesel, L.F.W.; Havinga, Paul J.M.

    2008-01-01

    One of the fundamental operations in sensor networks is convergecast which refers to the communication pattern in which data is collected from a set of sensor nodes and forwarded to a common end-point gateway, namely sink node, in the network. In case of multiple sinks within the network, the total

  20. A Cross-Layered Communication Protocol for Load Balancing in Large Scale Multi-sink Wireless Sensor Networks

    NARCIS (Netherlands)

    Erman-Tüysüz, A.; Mutter, T.; van Hoesel, L.F.W.; Havinga, Paul J.M.

    One of the fundamental operations in sensor networks is convergecast which refers to the communication pattern in which data is collected from a set of sensor nodes and forwarded to a common end-point gateway, namely sink node, in the network. In case of multiple sinks within the network, the total

  1. TosNet: An easy-to-use, real-time communications protocol for modular, distributed robot controllers

    DEFF Research Database (Denmark)

    Falsig, Simon; Sørensen, Anders Stengaard

    2009-01-01

    Net supports up to 15 nodes, with cycle-rates up to 25 kHz, depending on the configuration. The protocol stack is completely specified as VHDL code, implemented in an FPGA. The physical layer is implemented with Toslink fiberoptic links, offering a compact, robust and highly available link technology......This paper presents the TosNet network, created for robotics research, education, and prototyping, emphasizing ease of use, robustness, compactness, flexibility and fast hard realtime response, to allow distribution of all levels of the robot control system. The current implementation of Tos...

  2. Evaluation of Two Estrus Synchronization Protocols in Dairy Cattle at North Shoa Zone Ethiopia

    OpenAIRE

    Chanyalew, Yeshimebet; Zewde, Tesfaye; Gatew, Hulunim; Girma, Lina; Kassa, Getachew; Demis, Chekol; Bihon, Amare; Tsegaye, Yeshak

    2017-01-01

    This study was initiated to change the hesitation of the farmer on the effectiveness of estrus synchronization under their (Ethiopian small holder) livestock management system using two synchronization protocols. Non-pregnant animals with normal reproductive tract and that fulfilled the preconditions for estrus synchronization were considered for treatment & assigned into two synchronization protocols (single PGF2α injection; and double PGF2α injection). Among 94 (27 heifer and 67 cows) synch...

  3. GULiVER - travelling into the heart of good doctor-patient communication from a patient perspective: study protocol of an international multicentre study.

    NARCIS (Netherlands)

    Moretti, F.; Fletcher, I.; Mazzi, M.A.; Deveugele, M.; Rimondini, M.; Geurts, C.; Zimmermann, C.; Bensing, J.

    2012-01-01

    BACKGROUND: The project GULiVer explores how lay people in Belgium (Gent), the Netherlands (Utrecht), the UK (Liverpool) and Italy (Verona) evaluate physicians' communicative skills. The aims are to present the study design and to assess the quality of collected data. METHODS: In each centre one out

  4. Patient-Physician Communication in Oncology Care : The character of, barriers against, and ways to evaluate patient-physician communication, with focus on the psychosocial dimensions

    OpenAIRE

    Fagerlind, Hanna

    2012-01-01

    The overall aim of this thesis was to characterize patient-physician communication in oncology care with focus on the content and quality of the consultations from the perspectives of patients, oncologists and observer. Further, the aim was to explore oncologists’ perceived barriers against psychosocial communication in out-patient consultations. Finally, the aim was to evaluate different methods for evaluating communication in this setting. Routine oncology out-patient consultations from two...

  5. Breaking bad news-what patients want and what they get: evaluating the SPIKES protocol in Germany.

    Science.gov (United States)

    Seifart, C; Hofmann, M; Bär, T; Riera Knorrenschild, J; Seifart, U; Rief, W

    2014-03-01

    Evaluation of the SPIKES protocol, a recommended guideline for breaking bad news, is sparse, and information about patients' preferences for bad-news delivery in Germany is lacking. Being the first actual-theoretical comparison of a 'breaking bad news' guideline, the present study evaluates the recommended steps of the SPIKES protocol. Moreover, emotional consequences and quality of bad-news delivery are investigated. A total of 350 cancer patients answered the MABBAN (Marburg Breaking Bad News Scale), a questionnaire representing the six SPIKES subscales, asking for the procedure, perception and satisfaction of the first cancer disclosure and patient's assign to these items. Only 46.2% of the asked cancer patients are completely satisfied with how bad news had been broken to them. The overall quality is significantly related to the emotional state after receiving bad news (r = -0.261, P bad news were delivered, and the resulting rang list of patients' preferences indicates that the SPIKES protocol do not fully meet the priorities of cancer patients in Germany. It could be postulated that the low satisfaction of patients observed in this study reflects the highly significant difference between patients' preferences and bad-news delivery. Therefore, some adjunctions to the SPIKES protocol should be considered, including a frequent reassurance of listeners' understanding, the perpetual possibility to ask question, respect for prearrangement needs and the conception of bad-news delivery in a two-step procedure.

  6. Cine-magnetic resonance imaging evaluation of communication between middle cranial fossa arachnoid cysts and cisterns

    International Nuclear Information System (INIS)

    Eguchi, Takahiko; Nikaido, Yuji; Shiomi, Kazuaki; Fujimoto, Takatoshi; Otsuka, Hiroyuki; Takeuchi, Hiroshi; Taoka, Toshiaki.

    1996-01-01

    Cine-magnetic resonance (MR) imaging examinations were performed in 10 patients with middle cranial fossa arachnoid cysts to evaluate communication between the cysts and the normal cerebrospinal fluid (CSF) space. Eight of 10 patients were evaluated by time of flight cine-MR imaging, and two by phase contrast cine-MR imaging. Two patients underwent membranectomy of the cysts, and were evaluated both pre-and postoperatively. Computed tomography cisternography was used to confirm communication between the cysts and the surrounding cisterns. Pulsatile fluid motion within the cysts was present in all patients. However, marked fluid motion and jet flow between the cysts and the surrounding cisterns were only observed in communicating cysts. In the two patients who underwent membranectomy, postoperative examination found greater fluid motion and jet flow not previously present. Cine-MR imaging demonstration of marked pulsatile fluid motion accompanied by jet flow suggests that a cyst communicates with the normal CSF space. (author)

  7. Research and Implementation of Collision Detection Based on Modbus Protocol

    Directory of Open Access Journals (Sweden)

    Yinglan Fang

    2013-01-01

    Full Text Available In order to solve the communication errors resulted by traditional working condition multi-platform device communication using the custom protocol communication and link congestion malpractice brought by retransmission, it ensures network communication using time-sharing communication conflict detection based on mature Modbus protocol. Thereby it enhances the stability of the entire system during operation process, and provides simple, efficient, stable business specification interface for the future expansion of the system. After a comprehensive evaluation and analysis of system communication messages before and after improvement, system comprehensive evaluation target has improved. While the system is more flexible to modular design, develop transparent, structure open side and has a broad application prospects.

  8. A critical ethnography of communication processes involving the management of oral chemotherapeutic agents by patients with a primary diagnosis of colorectal cancer: study protocol.

    Science.gov (United States)

    Mitchell, Gary; Porter, Sam; Manias, Elizabeth

    2015-04-01

    To describe the protocol used to examine the processes of communication between health professionals, patients and informal carers during the management of oral chemotherapeutic medicines to identify factors that promote or inhibit medicine concordance. Ideally communication practices about oral medicines should incorporate shared decision-making, two-way dialogue and an equality of role between practitioner and patient. While there is evidence that healthcare professionals are adopting these concordant elements in general practice there are still some patients who have a passive role during consultations. Considering oral chemotherapeutic medications, there is a paucity of research about communication practices which is surprising given the high risk of toxicity associated with chemotherapy. A critical ethnographic design will be used, incorporating non-participant observations, individual semi-structured and focus-group interviews as several collecting methods. Observations will be carried out on the interactions between healthcare professionals (physicians, nurses and pharmacists) and patients in the outpatient departments where prescriptions are explained and supplied and on follow-up consultations where treatment regimens are monitored. Interviews will be conducted with patients and their informal carers. Focus-groups will be carried out with healthcare professionals at the conclusion of the study. These several will be analysed using thematic analysis. This research is funded by the Department for Employment and Learning in Northern Ireland (Awarded February 2012). Dissemination of these findings will contribute to the understanding of issues involved when communicating with people about oral chemotherapy. It is anticipated that findings will inform education, practice and policy. © 2014 John Wiley & Sons Ltd.

  9. Evaluation of a communication skills training course for medical students using peer role-play.

    Science.gov (United States)

    Ayuob, Nasra Naeim; Qadi, Mahdi Ali; El Deek, Basem Salama; Boker, Abdulaziz Mohamed

    2017-05-01

    To evaluate the effect of using peer role-playing in learning the communication skills as a step in the development of the communication skills training course delivered to pre-clinical medical students. This study was conducted at the King Abdulaziz University, Jeddah, Saudi Arabia, between September 2014 and February 2015 and comprised medical students. Mixed methods design was used to evaluate the developed communication skills training course. Tests were conducted before and after the communication skills training course to assess the students' self-reported communication. After the course, the students completed a satisfaction survey. Focus groups were conducted to assess the behavioural and organisational changes induced by the course. SPSS 16 was used for data analysis.. Of the293 respondents, 246(84%) were satisfied with the course. Overall, 169(58%) subjects chose the lectures as the most helpful methods for learning the communication skills while 124(42%) considered practical sessions as the most helpful method. Besides, 237(81%) respondents reported that the role-play was beneficial for their learning, while 219(75%) perceived the video-taped role-play as an appropriate method for assessing the communication skills. Peer role-play was found to be a feasible and well-perceived alternative method in facilitating the acquisition of communication skills..

  10. Evaluating Protocol Lifecycle Time Intervals in HIV/AIDS Clinical Trials

    Science.gov (United States)

    Schouten, Jeffrey T.; Dixon, Dennis; Varghese, Suresh; Cope, Marie T.; Marci, Joe; Kagan, Jonathan M.

    2014-01-01

    Background Identifying efficacious interventions for the prevention and treatment of human diseases depends on the efficient development and implementation of controlled clinical trials. Essential to reducing the time and burden of completing the clinical trial lifecycle is determining which aspects take the longest, delay other stages, and may lead to better resource utilization without diminishing scientific quality, safety, or the protection of human subjects. Purpose In this study we modeled time-to-event data to explore relationships between clinical trial protocol development and implementation times, as well as identify potential correlates of prolonged development and implementation. Methods We obtained time interval and participant accrual data from 111 interventional clinical trials initiated between 2006 and 2011 by NIH’s HIV/AIDS Clinical Trials Networks. We determined the time (in days) required to complete defined phases of clinical trial protocol development and implementation. Kaplan-Meier estimates were used to assess the rates at which protocols reached specified terminal events, stratified by study purpose (therapeutic, prevention) and phase group (pilot/phase I, phase II, and phase III/ IV). We also examined several potential correlates to prolonged development and implementation intervals. Results Even though phase grouping did not determine development or implementation times of either therapeutic or prevention studies, overall we observed wide variation in protocol development times. Moreover, we detected a trend toward phase III/IV therapeutic protocols exhibiting longer developmental (median 2 ½ years) and implementation times (>3years). We also found that protocols exceeding the median number of days for completing the development interval had significantly longer implementation. Limitations The use of a relatively small set of protocols may have limited our ability to detect differences across phase groupings. Some timing effects

  11. Enhancing medical students' communication skills: development and evaluation of an undergraduate training program

    Science.gov (United States)

    2012-01-01

    Background There is a relative lack of current research on the effects of specific communication training offered at the beginning of the medical degree program. The newly developed communication training "Basics and Practice in Communication Skills" was pilot tested in 2008 and expanded in the following year at the University Medical Centre Hamburg-Eppendorf in Germany. The goal was to promote and improve the communicative skills of participants and show the usefulness of an early offered intervention on patient-physician communication within the medical curriculum. Methods The students participating in the project and a comparison group of students from the standard degree program were surveyed at the beginning and end of the courses. The survey consisted of a self-assessment of their skills as well as a standardised expert rating and an evaluation of the modules by means of a questionnaire. Results Students who attended the communication skills course exhibited a considerable increase of communication skills in this newly developed training. It was also observed that students in the intervention group had a greater degree of self-assessed competence following training than the medical students in the comparison group. This finding is also reflected in the results from a standardised objective measure. Conclusions The empirical results of the study showed that the training enabled students to acquire specialised competence in communication through the course of a newly developed training program. These findings will be used to establish new communication training at the University Medical Centre Hamburg-Eppendorf. PMID:22443807

  12. Development and evaluation of new mask protocols for gene expression profiling in humans and chimpanzees

    Directory of Open Access Journals (Sweden)

    Siegmund Kimberly D

    2009-03-01

    Full Text Available Abstract Background Cross-species gene expression analyses using oligonucleotide microarrays designed to evaluate a single species can provide spurious results due to mismatches between the interrogated transcriptome and arrayed probes. Based on the most recent human and chimpanzee genome assemblies, we developed updated and accessible probe masking methods that allow human Affymetrix oligonucleotide microarrays to be used for robust genome-wide expression analyses in both species. In this process, only data from oligonucleotide probes predicted to have robust hybridization sensitivity and specificity for both transcriptomes are retained for analysis. Results To characterize the utility of this resource, we applied our mask protocols to existing expression data from brains, livers, hearts, testes, and kidneys derived from both species and determined the effects probe numbers have on expression scores of specific transcripts. In all five tissues, probe sets with decreasing numbers of probes showed non-linear trends towards increased variation in expression scores. The relationships between expression variation and probe number in brain data closely matched those observed in simulated expression data sets subjected to random probe masking. However, there is evidence that additional factors affect the observed relationships between gene expression scores and probe number in tissues such as liver and kidney. In parallel, we observed that decreasing the number of probes within probe sets lead to linear increases in both gained and lost inferences of differential cross-species expression in all five tissues, which will affect the interpretation of expression data subject to masking. Conclusion We introduce a readily implemented and updated resource for human and chimpanzee transcriptome analysis through a commonly used microarray platform. Based on empirical observations derived from the analysis of five distinct data sets, we provide novel guidelines

  13. DreamTel; Diabetes risk evaluation and management tele-monitoring study protocol.

    Science.gov (United States)

    Tobe, Sheldon W; Wentworth, Joan; Ironstand, Laurie; Hartman, Susan; Hoppe, Jackie; Whiting, Judi; Kennedy, Janice; McAllister, Colin; Kiss, Alex; Perkins, Nancy; Vincent, Lloyd; Pylypchuk, George; Lewanczuk, Richard Z

    2009-05-09

    The rising prevalence of type 2 diabetes underlines the importance of secondary strategies for the prevention of target organ damage. While access to diabetes education centers and diabetes intensification management has been shown to improve blood glucose control, these services are not available to all that require them, particularly in rural and northern areas. The provision of these services through the Home Care team is an advance that can overcome these barriers. Transfer of blood glucose data electronically from the home to the health care provider may improve diabetes management. The study population will consist of patients with type 2 diabetes with uncontrolled A1c levels living on reserve in the Battlefords region of Saskatchewan, Canada. This pilot study will take place over three phases. In the first phase over three months the impact of the introduction of the Bluetooth enabled glucose monitor will be assessed. In the second phase over three months, the development of guidelines based treatment algorithms for diabetes intensification will be completed. In the third phase lasting 18 months, study subjects will have diabetes intensification according to the algorithms developed. The first phase will determine if the use of the Bluetooth enabled blood glucose devices which can transmit results electronically will lead to changes in A1c levels. It will also determine the feasibility of recruiting subjects to use this technology. The rest of the Diabetes Risk Evaluation and Management Tele-monitoring (DreamTel) study will determine if the delivery of a diabetes intensification management program by the Home Care team supported by the Bluetooth enabled glucose meters leads to improvements in diabetes management. Protocol NCT00325624.

  14. DreamTel; Diabetes risk evaluation and management tele-monitoring study protocol

    Directory of Open Access Journals (Sweden)

    Kiss Alex

    2009-05-01

    Full Text Available Abstract Background The rising prevalence of type 2 diabetes underlines the importance of secondary strategies for the prevention of target organ damage. While access to diabetes education centers and diabetes intensification management has been shown to improve blood glucose control, these services are not available to all that require them, particularly in rural and northern areas. The provision of these services through the Home Care team is an advance that can overcome these barriers. Transfer of blood glucose data electronically from the home to the health care provider may improve diabetes management. Methods and design The study population will consist of patients with type 2 diabetes with uncontrolled A1c levels living on reserve in the Battlefords region of Saskatchewan, Canada. This pilot study will take place over three phases. In the first phase over three months the impact of the introduction of the Bluetooth enabled glucose monitor will be assessed. In the second phase over three months, the development of guidelines based treatment algorithms for diabetes intensification will be completed. In the third phase lasting 18 months, study subjects will have diabetes intensification according to the algorithms developed. Discussion The first phase will determine if the use of the Bluetooth enabled blood glucose devices which can transmit results electronically will lead to changes in A1c levels. It will also determine the feasibility of recruiting subjects to use this technology. The rest of the Diabetes Risk Evaluation and Management Tele-monitoring (DreamTel study will determine if the delivery of a diabetes intensification management program by the Home Care team supported by the Bluetooth enabled glucose meters leads to improvements in diabetes management. Trial Registration Protocol NCT00325624

  15. Aggregative Learning Method and Its Application for Communication Quality Evaluation

    Science.gov (United States)

    Akhmetov, Dauren F.; Kotaki, Minoru

    2007-12-01

    In this paper, so-called Aggregative Learning Method (ALM) is proposed to improve and simplify the learning and classification abilities of different data processing systems. It provides a universal basis for design and analysis of mathematical models of wide class. A procedure was elaborated for time series model reconstruction and analysis for linear and nonlinear cases. Data approximation accuracy (during learning phase) and data classification quality (during recall phase) are estimated from introduced statistic parameters. The validity and efficiency of the proposed approach have been demonstrated through its application for monitoring of wireless communication quality, namely, for Fixed Wireless Access (FWA) system. Low memory and computation resources were shown to be needed for the procedure realization, especially for data classification (recall) stage. Characterized with high computational efficiency and simple decision making procedure, the derived approaches can be useful for simple and reliable real-time surveillance and control system design.

  16. Evaluation methodology for comparing memory and communication of analytic processes in visual analytics

    Energy Technology Data Exchange (ETDEWEB)

    Ragan, Eric D [ORNL; Goodall, John R [ORNL

    2014-01-01

    Provenance tools can help capture and represent the history of analytic processes. In addition to supporting analytic performance, provenance tools can be used to support memory of the process and communication of the steps to others. Objective evaluation methods are needed to evaluate how well provenance tools support analyst s memory and communication of analytic processes. In this paper, we present several methods for the evaluation of process memory, and we discuss the advantages and limitations of each. We discuss methods for determining a baseline process for comparison, and we describe various methods that can be used to elicit process recall, step ordering, and time estimations. Additionally, we discuss methods for conducting quantitative and qualitative analyses of process memory. By organizing possible memory evaluation methods and providing a meta-analysis of the potential benefits and drawbacks of different approaches, this paper can inform study design and encourage objective evaluation of process memory and communication.

  17. Evaluation of image-guidance protocols in the treatment of head and neck cancers

    International Nuclear Information System (INIS)

    Zeidan, Omar A.; Langen, Katja M.; Meeks, Sanford L.; Manon, Rafael R.; Wagner, Thomas H.; Willoughby, Twyla R.; Jenkins, D. Wayne; Kupelian, Patrick A.

    2007-01-01

    Purpose: The aim of this study was to assess the residual setup error of different image-guidance (IG) protocols in the alignment of patients with head and neck cancer. The protocols differ in the percentage of treatment fractions that are associated with image guidance. Using data from patients who were treated with daily IG, the residual setup errors for several different protocols are retrospectively calculated. Methods and Materials: Alignment data from 24 patients (802 fractions) treated with daily IG on a helical tomotherapy unit were analyzed. The difference between the daily setup correction and the setup correction that would have been made according to a specific protocol was used to calculate the residual setup errors for each protocol. Results: The different protocols are generally effective in reducing systematic setup errors. Random setup errors are generally not reduced for fractions that are not image guided. As a consequence, if every other treatment is image guided, still about 11% of all treatments (IG and not IG) are subject to three-dimensional setup errors of at least 5 mm. This frequency increases to about 29% if setup errors >3 mm are scored. For various protocols that require 15% to 31% of the treatments to be image guided, from 50% to 60% and from 26% to 31% of all fractions are subject to setup errors >3 mm and >5 mm, respectively. Conclusion: Residual setup errors reduce with increasing frequency of IG during the course of external-beam radiotherapy for head-and-neck cancer patients. The inability to reduce random setup errors for fractions that are not image guided results in notable residual setup errors

  18. Evaluation of Communication Alternatives for Intelligent Transportation Systems

    Science.gov (United States)

    2010-08-31

    The primary focus of this study involved developing a process for the evaluation of wireless technologies : for intelligent transportation systems, and for conducting experiments of potential wireless technologies : and topologies. Two wireless techn...

  19. A communicational framework for evaluating interaction with IT by analyzing user-reception of electronic texts

    DEFF Research Database (Denmark)

    Wentzer, Helle

    2006-01-01

    Interpreting IT as a medium for continuous communication across time and place of the communicators offers a way of analyzing the effect of IT in concrete practices. The users’ readings determine the actual communication with IT. A poetics of how meaning is translated from one person to another...... through semiotic texts is presented, termed the poetics of the e-text. The poetics of the e-text offers a meta-communicational framework for identifying user constraints in the possibilities of interacting with the system. Identifying communicational problems with ICT-mediated interactions again offer...... grounds for redesigning and re-author the e-text. The poetics of the e-text are subsequently applied as a method of analyzing user-reception and evaluating the interaction with ICT. Examples are given from user-receptions of collaborating with ICT in home care, Denmark....

  20. Store-Carry and Forward-Type M2M Communication Protocol Enabling Guide Robots to Work together and the Method of Identifying Malfunctioning Robots Using the Byzantine Algorithm

    Directory of Open Access Journals (Sweden)

    Yoshio Suga

    2016-11-01

    Full Text Available This paper concerns a service in which multiple guide robots in an area display arrows to guide individual users to their destinations. It proposes a method of identifying malfunctioning robots and robots that give wrong directions to users. In this method, users’ mobile terminals and robots form a store-carry and forward-type M2M communication network, and a distributed cooperative protocol is used to enable robots to share information and identify malfunctioning robots using the Byzantine algorithm. The robots do not directly communicate with each other, but through users’ mobile terminals. We have introduced the concept of the quasi-synchronous number, so whether a certain robot is malfunctioning can be determined even when items of information held by all of the robots are not synchronized. Using simulation, we have evaluated the proposed method in terms of the rate of identifying malfunctioning robots, the rate of reaching the destination and the average length of time to reach the destination.