WorldWideScience

Sample records for protocol including adenosine-stress

  1. Safety of adenosine stress myocardial perfusion imaging by a one-route infusion protocol

    International Nuclear Information System (INIS)

    Kawai, Yuko; Kishino, Koh

    2006-01-01

    When adenosine stress testing is performed, a vein is generally accessed in each arm. To determine whether the one-route infusion protocol, that is, infusion via one upper arm vein, is safe, myocardial perfusion imaging was performed during adenosine stress testing in patients with angina pectoris. Sixty-six consecutive patients (43 men, 68±11 years of age) with suspected coronary artery disease were enrolled in this study. For the stress test, adenosine was injected at 120 μg/kg/min for 6 minutes. Systolic blood pressure, diastolic blood pressure, and heart rate did not show any significant changes after injection of the adenosine and radioisotope (RI) tracer. Adverse events during infusion of the adenosine were seen in 42 (64%) patients and included chest discomfort/oppression in 17 (26%) and dyspnea/throat discomfort in 15 (23%). On the other hand, adverse events just after infusion of the RI tracer occurred in 5 (8%) patients and included chest oppression in 2 (3%) and dyspnea in 1 (2%). Almost all adverse events disappeared quickly without treatment. Therefore, we concluded that adenosine stress myocardial perfusion imaging using a one-route infusion protocol is safe and useful to do for patients unable to secure veins in both arms. (author)

  2. Detection of myocardial ischemia by automated, motion-corrected, color-encoded perfusion maps compared with visual analysis of adenosine stress cardiovascular magnetic resonance imaging at 3 T: a pilot study.

    Science.gov (United States)

    Doesch, Christina; Papavassiliu, Theano; Michaely, Henrik J; Attenberger, Ulrike I; Glielmi, Christopher; Süselbeck, Tim; Fink, Christian; Borggrefe, Martin; Schoenberg, Stefan O

    2013-09-01

    The purpose of this study was to compare automated, motion-corrected, color-encoded (AMC) perfusion maps with qualitative visual analysis of adenosine stress cardiovascular magnetic resonance imaging for detection of flow-limiting stenoses. Myocardial perfusion measurements applying the standard adenosine stress imaging protocol and a saturation-recovery temporal generalized autocalibrating partially parallel acquisition (t-GRAPPA) turbo fast low angle shot (Turbo FLASH) magnetic resonance imaging sequence were performed in 25 patients using a 3.0-T MAGNETOM Skyra (Siemens Healthcare Sector, Erlangen, Germany). Perfusion studies were analyzed using AMC perfusion maps and qualitative visual analysis. Angiographically detected coronary artery (CA) stenoses greater than 75% or 50% or more with a myocardial perfusion reserve index less than 1.5 were considered as hemodynamically relevant. Diagnostic performance and time requirement for both methods were compared. Interobserver and intraobserver reliability were also assessed. A total of 29 CA stenoses were included in the analysis. Sensitivity, specificity, positive predictive value, negative predictive value, and accuracy for detection of ischemia on a per-patient basis were comparable using the AMC perfusion maps compared to visual analysis. On a per-CA territory basis, the attribution of an ischemia to the respective vessel was facilitated using the AMC perfusion maps. Interobserver and intraobserver reliability were better for the AMC perfusion maps (concordance correlation coefficient, 0.94 and 0.93, respectively) compared to visual analysis (concordance correlation coefficient, 0.73 and 0.79, respectively). In addition, in comparison to visual analysis, the AMC perfusion maps were able to significantly reduce analysis time from 7.7 (3.1) to 3.2 (1.9) minutes (P < 0.0001). The AMC perfusion maps yielded a diagnostic performance on a per-patient and on a per-CA territory basis comparable with the visual analysis

  3. Impact of a pain protocol including hypnosis in major burns.

    Science.gov (United States)

    Berger, Mette M; Davadant, Maryse; Marin, Christian; Wasserfallen, Jean-Blaise; Pinget, Christophe; Maravic, Philippe; Koch, Nathalie; Raffoul, Wassim; Chiolero, René L

    2010-08-01

    Pain is a major issue after burns even when large doses of opioids are prescribed. The study focused on the impact of a pain protocol using hypnosis on pain intensity, anxiety, clinical course, and costs. All patients admitted to the ICU, aged >18 years, with an ICU stay >24h, accepting to try hypnosis, and treated according to standardized pain protocol were included. Pain was scaled on the Visual Analog Scale (VAS) (mean of daily multiple recordings), and basal and procedural opioid doses were recorded. Clinical outcome and economical data were retrieved from hospital charts and information system, respectively. Treated patients were matched with controls for sex, age, and the burned surface area. Forty patients were admitted from 2006 to 2007: 17 met exclusion criteria, leaving 23 patients, who were matched with 23 historical controls. Altogether patients were 36+/-14 years old and burned 27+/-15%BSA. The first hypnosis session was performed after a median of 9 days. The protocol resulted in the early delivery of higher opioid doses/24h (ppatient. A pain protocol including hypnosis reduced pain intensity, improved opioid efficiency, reduced anxiety, improved wound outcome while reducing costs. The protocol guided use of opioids improved patient care without side effects, while hypnosis had significant psychological benefits.

  4. Application of the newly developed Japanese adenosine normal database for adenosine stress myocardial scintigraphy.

    Science.gov (United States)

    Harata, Shingo; Isobe, Satoshi; Morishima, Itsuro; Suzuki, Susumu; Tsuboi, Hideyuki; Sone, Takahito; Ishii, Hideki; Murohara, Toyoaki

    2015-10-01

    The currently available Japanese normal database (NDB) in stress myocardial perfusion scintigraphy recommended by the Japanese Society of Nuclear Medicine (JSNM-NDB) is created based on the data from exercise tests. The newly developed adenosine normal database (ADS-NDB) remains to be validated for patients undergoing adenosine stress test. We tested whether the diagnostic accuracy of adenosine stress test is improved by the use of ADS-NDB (Kanazawa University). Of 233 consecutive patients undergoing (99m)Tc-MIBI adenosine stress test, 112 patients were tested. The stress/rest myocardial (99m)Tc-MIBI single-photon emission computed tomography (SPECT) images were analyzed by AutoQUANT 7.2 with both ADS-NDB and JSNM-NDB. The summed stress score (SSS) and summed difference score (SDS) were calculated. The agreements of the post-stress defect severity between ADS-NDB and JSNM-NDB were assessed using a weighted kappa statistic. In all patients, mean SSSs of all, right coronary artery (RCA), left anterior descending (LAD), and left circumflex (LCx) territories were significantly lower with ADS-NDB than those with JSNM-NDB. Mean SDSs in all, RCA, and LAD territories were significantly lower with ADS-NDB than those with JSNM-NDB. In 28 patients with significant coronary stenosis, the mean SSS in the RCA territory was significantly lower with ADS-NDB than that with JSNM-NDB. In 84 patients without ischemia, both mean SSSs and SDSs in all, RCA, LAD, and LCx territories were significantly lower with ADS-NDB than those with JSNM-NDB. Weighted kappa values of all patients, patients with significant stenosis, and patients without ischemia were 0.89, 0.83, and 0.92, respectively. Differences were observed between results from ADS-NDB and JSNM-NDB. The diagnostic accuracy of adenosine stress myocardial perfusion scintigraphy may be improved by reducing false-positive results.

  5. Information required from States, including 'small quantities protocol' status, under the Protocol Additional to Safeguards Agreements

    International Nuclear Information System (INIS)

    Tuley, N.

    1999-01-01

    The Model, or Additional, Protocol to the Model Safeguards Agreement, INFCIRC/153, contains, inter alia, provisions for expanded declarations from Member States to the IAEA. These provisions include earlier design information declarations and information on fuel cycles activities, such a mining and milling, that were not previously part of safeguards. The session discusses the extent of the expanded declarations and provides examples of the forms that will be used to provide the information to the Agency. (author)

  6. Impact on adenosine stress cardiac magnetic resonance for recanalisation and follow up of chronic total coronary occlusions

    Energy Technology Data Exchange (ETDEWEB)

    Heyne, J.P. [Institute of Diagnostic and Interventional Radiology, Friedrich Schiller University Jena, Erlanger Allee 101, D-07740 Jena (Germany)], E-mail: Jens-Peter.Heyne@med.uni-jena.de; Goernig, M. [Clinic for Internal Medicine I, Friedrich Schiller University Jena, Erlanger Allee 101, D-07740 Jena (Germany)], E-mail: Matthias.Goernig@med.uni-jena.de; Feger, J. [Institute of Diagnostic and Interventional Radiology, Friedrich Schiller University Jena, Erlanger Allee 101, D-07740 Jena (Germany)], E-mail: Joachim.Feger@email.de; Kurrat, C. [Institute of Diagnostic and Interventional Radiology, Friedrich Schiller University Jena, Erlanger Allee 101, D-07740 Jena (Germany)], E-mail: Claudia.Kurrat@med.uni-jena.de; Werner, G.S. [Clinic for Internal Medicine I, Friedrich Schiller University Jena, Erlanger Allee 101, D-07740 Jena (Germany)], E-mail: Gerald.Werner@Klinikum-Darmstadt.de; Figulla, H.R. [Clinic for Internal Medicine I, Friedrich Schiller University Jena, Erlanger Allee 101, D-07740 Jena (Germany)], E-mail: Hans.Figulla@med.uni-jena.de; Kaiser, W.A. [Institute of Diagnostic and Interventional Radiology, Friedrich Schiller University Jena, Erlanger Allee 101, D-07740 Jena (Germany)], E-mail: Werner.Kaiser@med.uni-jena.de

    2007-09-15

    Objective: To evaluate the impact on cardiac magnetic resonance imaging (CMRI) with adenosine stress and delayed enhancement for indication and follow up after interventional recanalisation of chronic total coronary occlusions (CTOs). Material and methods: Twenty consecutive patients (15 males; 5 females; mean age 65 years) with CTO verified by cardiac catheterisation referred to CMRI. Sixteen of them got CMRI before and after coronary recanalisation. Wall motion abnormalities (WMAs), first pass perfusion with adenosine and viability were assessed using a 1.5 T MR scanner (Sonata; Siemens). CMRI results were compared with clinical classifications, the results of cardiac catheterisation and follow up angiography. Results: Sixteen patients had a successful recanalisation, 15 of the occluded coronary artery and one of collateral donor artery stenosis. After recanalisation all stress-induced progressive or new wall motion abnormalities (WMAs) of the corresponding segments and in the collateral donor territory (5 patients) and all adenosine induced perfusion defects (PD) or delay (12 patients) were regredient. 13/16 patients showed no transmural and one patient transmural delayed enhancement (DE) indicating myocardial scar. In 10/16 patients CSS grading of angina improved after recanalisation. Conclusion: After successful recanalisation of CTOs, patients with preinterventional stress-induced PDs and WMAs in viable myocardium did not display any signs of stress-induced ischemia postinterventionally. A comprehensive CMRI approach, including assessment of rest and stress WMAs, first pass perfusion and myocardial viability represents an important tool for the pre-interventional decision to recanalise CTOs and follow up.

  7. Diagnostic accuracy of combined coronary angiography and adenosine stress myocardial perfusion imaging using 320-detector computed tomography: pilot study

    Energy Technology Data Exchange (ETDEWEB)

    Nasis, Arthur; Ko, Brian S.; Leung, Michael C.; Antonis, Paul R.; Wong, Dennis T.; Kyi, Leo; Cameron, James D.; Meredith, Ian T.; Seneviratne, Sujith K. [Southern Health and Monash University, Monash Cardiovascular Research Centre, Monash Heart, Department of Medicine Monash Medical Centre (MMC), Melbourne (Australia); Nandurkar, Dee; Troupis, John M. [MMC, Southern Health, Department of Diagnostic Imaging, Melbourne (Australia)

    2013-07-15

    To determine the diagnostic accuracy of combined 320-detector row computed tomography coronary angiography (CTA) and adenosine stress CT myocardial perfusion imaging (CTP) in detecting perfusion abnormalities caused by obstructive coronary artery disease (CAD). Twenty patients with suspected CAD who underwent initial investigation with single-photon-emission computed tomography myocardial perfusion imaging (SPECT-MPI) were recruited and underwent prospectively-gated 320-detector CTA/CTP and invasive angiography. Two blinded cardiologists evaluated invasive angiography images quantitatively (QCA). A blinded nuclear physician analysed SPECT-MPI images for fixed and reversible perfusion defects. Two blinded cardiologists assessed CTA/CTP studies qualitatively. Vessels/territories with both >50 % stenosis on QCA and corresponding perfusion defect on SPECT-MPI were defined as ischaemic and formed the reference standard. All patients completed the CTA/CTP protocol with diagnostic image quality. Of 60 vessels/territories, 17 (28 %) were ischaemic according to QCA/SPECT-MPI criteria. Sensitivity, specificity, PPV, NPV and area under the ROC curve for CTA/CTP was 94 %, 98 %, 94 %, 98 % and 0.96 (P < 0.001) on a per-vessel/territory basis. Mean CTA/CTP radiation dose was 9.2 {+-} 7.4 mSv compared with 13.2 {+-} 2.2 mSv for SPECT-MPI (P < 0.001). Combined 320-detector CTA/CTP is accurate in identifying obstructive CAD causing perfusion abnormalities compared with combined QCA/SPECT-MPI, achieved with lower radiation dose than SPECT-MPI. (orig.)

  8. Diagnostic accuracy of combined coronary angiography and adenosine stress myocardial perfusion imaging using 320-detector computed tomography: pilot study

    International Nuclear Information System (INIS)

    Nasis, Arthur; Ko, Brian S.; Leung, Michael C.; Antonis, Paul R.; Wong, Dennis T.; Kyi, Leo; Cameron, James D.; Meredith, Ian T.; Seneviratne, Sujith K.; Nandurkar, Dee; Troupis, John M.

    2013-01-01

    To determine the diagnostic accuracy of combined 320-detector row computed tomography coronary angiography (CTA) and adenosine stress CT myocardial perfusion imaging (CTP) in detecting perfusion abnormalities caused by obstructive coronary artery disease (CAD). Twenty patients with suspected CAD who underwent initial investigation with single-photon-emission computed tomography myocardial perfusion imaging (SPECT-MPI) were recruited and underwent prospectively-gated 320-detector CTA/CTP and invasive angiography. Two blinded cardiologists evaluated invasive angiography images quantitatively (QCA). A blinded nuclear physician analysed SPECT-MPI images for fixed and reversible perfusion defects. Two blinded cardiologists assessed CTA/CTP studies qualitatively. Vessels/territories with both >50 % stenosis on QCA and corresponding perfusion defect on SPECT-MPI were defined as ischaemic and formed the reference standard. All patients completed the CTA/CTP protocol with diagnostic image quality. Of 60 vessels/territories, 17 (28 %) were ischaemic according to QCA/SPECT-MPI criteria. Sensitivity, specificity, PPV, NPV and area under the ROC curve for CTA/CTP was 94 %, 98 %, 94 %, 98 % and 0.96 (P < 0.001) on a per-vessel/territory basis. Mean CTA/CTP radiation dose was 9.2 ± 7.4 mSv compared with 13.2 ± 2.2 mSv for SPECT-MPI (P < 0.001). Combined 320-detector CTA/CTP is accurate in identifying obstructive CAD causing perfusion abnormalities compared with combined QCA/SPECT-MPI, achieved with lower radiation dose than SPECT-MPI. (orig.)

  9. Clinical value of atropine-four minutes adenosine stressed 99Tcm-MIBI myocardial perfusion imaging in the diagnosis of coronary artery disease

    International Nuclear Information System (INIS)

    Peng Xulan; Zhang Baoniu; Jiang Sufang; Liang Hongwei; Liu Jun; Gao Guizhu; Ding Minghui; Hou Junfu

    2008-01-01

    Objective: The aim of this study was to compare the diagnostic efficacy of atropine-4 min adenosine stressed 99 Tc m -methoxyisobutylisonitrile (MIBI) myocardial perfusion imaging in the diagnosis of coronary artery disease (CAD). Methods: A total of 56 patients were divided into atropine-4 min adenosine stress (research group) and 6 min adenosine infusion (control group). The sex, age, the severity of CAD (judged by coronary, angiography) and associated symptoms were matched between the 2 groups. In research group, 0.5 mg atropine was injected intravenously 10 min before adenosine infusion. Adenosine was infused at a rate of 0.14 mg·kg -1 ·min -1 intravenously for 4 min and 6 min in research and control groups. At 3 min after adenosine infusion, 740 MBq 99 Tc m -MIBI was injected. SPECT myocardial imaging was obtained 1.5 h later. A rest myocardial perfusion imaging was performed on the following day. Results: (1) In research group and control group, the sensitivity, specificity, diagnostic accuracy was 85%, 6/8, 82% and 86%, 5/7, 82%, respectively (χ 2 0.05). (2)The sensitivity of the adenosine test for detection of single vessel, two vessels, three vessels disease were 6/7, 8/9, 3/4 and 7/8, 7/8, 4/5 in research group and control group, respectively(χ 2 0.05). (3) Side affects occurred in 82% of the patients in the research group and in 89% of the patients in the control group. The incidence of side effects in the two groups was not significantly different besides chest depression (43% and 68%, χ 2 =4.000, <0.05). Conclusions: Atropine-4 min adenosine infusion, in combination with perfusion tomography, has similar diagnostic efficacy for CAD to the 6 min protocol, and has lower incidence of chest depression than the standard 6 min infusion. (authors)

  10. Safety and tolerability of adenosine stress myocardial perfusion scintigraphy in the evaluation of coronary artery disease in the elderly patients - A case control study

    International Nuclear Information System (INIS)

    Gnanasegaran, G.; Malcolm, M.; Rossiter, A.; McCool, D.; Hilson, A.J.W.; Buscombe, J.R.

    2006-01-01

    Elderly patients referred for evaluation of chest pain are often unable to undertake adequate exercise for exercise stress testing. The aim of this retrospective study was to analyze haemodynamic effects and assess the safety of adenosine stress myocardial perfusion scintigraphy (MPS) in the elderly. Records of 380 Patients (Age range=30-93 years) were reviewed. These were divided into two groups, Group-A with 190 patients who were above 65 years of age and Group-B with 190 patients who were equal or below the age of 65 years, and who had undergone adenosine stress MPS. The two groups were matched for major risk factors and clinical presentations. Symptoms (flushing, headache, chest pain, dyspnoea, neck pain) were recorded throughout the adenosine infusion. Baseline blood pressure, heart rate and ECG were recorded and monitored throughout the study. A total of 167 out of 380 patients (44%) had side effects, 86 of them belonged to Group-A and 81 of them belonged to Group-B. Flushing occurred in 33% of patients in Group-A and 43% of patients in Group-B. Seventeen percent of patients in Group-A had chest pain, while this was encountered in 27% of patients in Group-B. Dyspnoea was recorded in 32% of patients from Group-A, while it was encountered in 21% of patients belonging to Group-B. Neck pain was experienced by 8.4% in Group-A and 15% in Group-B. All of these findings were statistically significant (p<0.05). Several other side effects were also encountered which included headache (Group-A: 14% and Group-B: 21%), abdominal discomfort (Group-A: 19% and Group-B: 23%), Nausea and/or vomiting (Group-A: 4.7% and Group-B: 7.3%). ECG changes were noted in both groups (Group-A: 14% and Group-B: 12%). None of these were found to be statistically significant. Based on this retrospective study, the authors concluded that Adenosine stress MPS is a safe method for the evaluation of coronary artery disease (CAD) in elderly patients and is well tolerated. Most side effects were

  11. Adenosine stress cardiovascular magnetic resonance with variable-density spiral pulse sequences accurately detects coronary artery disease: initial clinical evaluation.

    Science.gov (United States)

    Salerno, Michael; Taylor, Angela; Yang, Yang; Kuruvilla, Sujith; Ragosta, Michael; Meyer, Craig H; Kramer, Christopher M

    2014-07-01

    Adenosine stress cardiovascular magnetic resonance perfusion imaging can be limited by motion-induced dark-rim artifacts, which may be mistaken for true perfusion abnormalities. A high-resolution variable-density spiral pulse sequence with a novel density compensation strategy has been shown to reduce dark-rim artifacts in first-pass perfusion imaging. We aimed to assess the clinical performance of adenosine stress cardiovascular magnetic resonance using this new perfusion sequence to detect obstructive coronary artery disease. Cardiovascular magnetic resonance perfusion imaging was performed during adenosine stress (140 μg/kg per minute) and at rest on a Siemens 1.5-T Avanto scanner in 41 subjects with chest pain scheduled for coronary angiography. Perfusion images were acquired during injection of 0.1 mmol/kg Gadolinium-diethylenetriaminepentacetate at 3 short-axis locations using a saturation recovery interleaved variable-density spiral pulse sequence. Significant stenosis was defined as >50% by quantitative coronary angiography. Two blinded reviewers evaluated the perfusion images for the presence of adenosine-induced perfusion abnormalities and assessed image quality using a 5-point scale (1 [poor] to 5 [excellent]). The prevalence of obstructive coronary artery disease by quantitative coronary angiography was 68%. The average sensitivity, specificity, and accuracy were 89%, 85%, and 88%, respectively, with a positive predictive value and negative predictive value of 93% and 79%, respectively. The average image quality score was 4.4±0.7, with only 1 study with more than mild dark-rim artifacts. There was good inter-reader reliability with a κ statistic of 0.67. Spiral adenosine stress cardiovascular magnetic resonance results in high diagnostic accuracy for the detection of obstructive coronary artery disease with excellent image quality and minimal dark-rim artifacts. © 2014 American Heart Association, Inc.

  12. Comparison of adenosine stress and exercise stress 201Tl myocardial perfusion imaging for diagnosis of coronary heart disease

    International Nuclear Information System (INIS)

    Chen Guibing; Wu Hua; Jiang Ningyi; Liu Sheng; Lu Xianping; Liang Jiugen; Zhang Hong

    2007-01-01

    Objective: The aim of this study was to compare the diagnostic values of adenosine and exercise stress 201 Tl myocardial perfusion imaging for detecting coronary heart disease (CHD). Methods: 41 patients with suspected CHD were randomly divided into two groups. In one group adenosine stress was submitted, the exercise stress myocardial SPECT was performed in another. Coronary angiography (CAG) was performed in each patient within 2 weeks before or after SPECT. The result of CAG was taken as 'gold standard of CHD. They compared the diagnostic value of two methods. Results: In adenosine group, the sensitivity, specificity, positive predictive value, negative predictive value, accuracy are 92.86%, 57.14%, 81.25%, 80.00%, 80.95% respectively. In exercise stress group, are 100%, 60.0%, 71.43%, 100%, 80.00% respectively. Detection rates of coronary artery lesions were 66.67% and 72.22% in two groups respectively. Conclusion Adenosine stress testing and exercise stress testing 201 Tl myocardial perfusion imaging may provide similar value for detection of CHD. (authors)

  13. Adenosine-stress dynamic real-time myocardial perfusion CT and adenosine-stress first-pass dual-energy myocardial perfusion CT for the assessment of acute chest pain: Initial results

    Energy Technology Data Exchange (ETDEWEB)

    Weininger, Markus [Medical University of South Carolina, Department of Radiology and Radiological Science, Charleston, SC (United States); Schoepf, U. Joseph, E-mail: schoepf@musc.edu [Medical University of South Carolina, Department of Radiology and Radiological Science, Charleston, SC (United States); Department of Medicine, Division of Cardiology, Medical University of South Carolina, Charleston, SC (United States); Ramachandra, Ashok [Medical University of South Carolina, Department of Radiology and Radiological Science, Charleston, SC (United States); Fink, Christian [Institute of Clinical Radiology and Nuclear Medicine, University Medical Center Mannheim, Medical Faculty Mannheim, Heidelberg University (Germany); Rowe, Garrett W.; Costello, Philip [Medical University of South Carolina, Department of Radiology and Radiological Science, Charleston, SC (United States); Henzler, Thomas [Medical University of South Carolina, Department of Radiology and Radiological Science, Charleston, SC (United States); Institute of Clinical Radiology and Nuclear Medicine, University Medical Center Mannheim, Medical Faculty Mannheim, Heidelberg University (Germany)

    2012-12-15

    Purpose: Recent innovations in CT enable the evolution from mere morphologic imaging to dynamic and functional testing. We describe our initial experience performing myocardial stress perfusion CT in a clinical population with acute chest pain. Methods and materials: Myocardial stress perfusion CT was performed on twenty consecutive patients (15 men, 5 women; mean age 65 ± 8 years) who presented with acute chest pain and were clinically referred for stress/rest SPECT and cardiac MRI. Prior to CT each patient was randomly assigned either to Group A or to Group B in a consecutive order (10 patients per group). Group A underwent adenosine-stress dynamic real-time myocardial perfusion CT using a novel “shuttle” mode on a 2nd generation dual-source CT. Group B underwent adenosine-stress first-pass dual-energy myocardial perfusion CT using the same CT scanner in dual-energy mode. Two experienced observers visually analyzed all CT perfusion studies. CT findings were compared with MRI and SPECT. Results: In Group A 149/170 myocardial segments (88%) could be evaluated. Real-time perfusion CT (versus SPECT) had 86% (84%) sensitivity, 98% (92%) specificity, 94% (88%) positive predictive value, and 96% (92%) negative predictive value in comparison with perfusion MRI for the detection of myocardial perfusion defects. In Group B all myocardial segments were available for analysis. Compared with MRI, dual-energy myocardial perfusion CT (versus SPECT) had 93% (94%) sensitivity, 99% (98%) specificity, 92% (88%) positive predictive value, and 96% (94%) negative predictive value for detecting hypoperfused myocardial segments. Conclusion: Our results suggest the clinical feasibility of myocardial perfusion CT imaging in patients with acute chest pain. Compared to MRI and SPECT both, dynamic real-time perfusion CT and first-pass dual-energy perfusion CT showed good agreement for the detection of myocardial perfusion defects.

  14. Adenosine-stress dynamic real-time myocardial perfusion CT and adenosine-stress first-pass dual-energy myocardial perfusion CT for the assessment of acute chest pain: Initial results

    International Nuclear Information System (INIS)

    Weininger, Markus; Schoepf, U. Joseph; Ramachandra, Ashok; Fink, Christian; Rowe, Garrett W.; Costello, Philip; Henzler, Thomas

    2012-01-01

    Purpose: Recent innovations in CT enable the evolution from mere morphologic imaging to dynamic and functional testing. We describe our initial experience performing myocardial stress perfusion CT in a clinical population with acute chest pain. Methods and materials: Myocardial stress perfusion CT was performed on twenty consecutive patients (15 men, 5 women; mean age 65 ± 8 years) who presented with acute chest pain and were clinically referred for stress/rest SPECT and cardiac MRI. Prior to CT each patient was randomly assigned either to Group A or to Group B in a consecutive order (10 patients per group). Group A underwent adenosine-stress dynamic real-time myocardial perfusion CT using a novel “shuttle” mode on a 2nd generation dual-source CT. Group B underwent adenosine-stress first-pass dual-energy myocardial perfusion CT using the same CT scanner in dual-energy mode. Two experienced observers visually analyzed all CT perfusion studies. CT findings were compared with MRI and SPECT. Results: In Group A 149/170 myocardial segments (88%) could be evaluated. Real-time perfusion CT (versus SPECT) had 86% (84%) sensitivity, 98% (92%) specificity, 94% (88%) positive predictive value, and 96% (92%) negative predictive value in comparison with perfusion MRI for the detection of myocardial perfusion defects. In Group B all myocardial segments were available for analysis. Compared with MRI, dual-energy myocardial perfusion CT (versus SPECT) had 93% (94%) sensitivity, 99% (98%) specificity, 92% (88%) positive predictive value, and 96% (94%) negative predictive value for detecting hypoperfused myocardial segments. Conclusion: Our results suggest the clinical feasibility of myocardial perfusion CT imaging in patients with acute chest pain. Compared to MRI and SPECT both, dynamic real-time perfusion CT and first-pass dual-energy perfusion CT showed good agreement for the detection of myocardial perfusion defects.

  15. Adenosine stress and exercise 99Tcm-MIBI myocardial perfusion imaging in the diagnosis and risk stratification of patients with unstable angina

    International Nuclear Information System (INIS)

    Jia Peng; Guo Wanhua; Xu Shoulin; Feng Xuefeng

    2008-01-01

    Objective: The aim of this study was to evaluate the clinical value of adenosine stress or exercise 99 Tc m -methoxyisobutylisonitrile (MIBI) myocardial perfusion imaging in the diagnosis and risk stratification of patients with unstable angina. Methods: Eighty-seven hospitalized patients with unstable angina [54 men and 33 women, aged of (56.5±12.5) years] underwent adenosine stress or exercise myocardial perfusion imaging and coronary angiography. Patients were followed up. Results: Fifty-seven patients had abnormal myocardial perfusion imaging and significant coronary artery stenosis. Ten patients had abnormal myocardial perfusion imaging but normal coronary angiography. Eight patients had normal myocardial perfusion imaging but significant coronary artery stenosis. Twelve patients had normal myocardial perfusion imaging and normal coronary angiography. Patients with abnormal myocardial perfusion imaging had worse prognosis. There was relationship between cardiac events and the extent and severity of myocardial ischemia. Conclusion: Adenosine stress and exercise myocardial perfusion imaging is of important clinical value in the diagnosis and risk stratification of patients with unstable angina. (authors)

  16. Asymmetrically thickened posterior wall is associated with decline of ejection fraction after stress on adenosine stress/rest thallium-201 gated myocardial SPECT

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Bom Sahn; Lee, Won Woo; Lee, Dong Soo; Chung, June Key; Lee, Myung Chul; Kim, Sang Eun [College of Medicine, Seoul National University, Seoul (Korea, Republic of)

    2004-07-01

    LV parameters (LVEF. ESVI and EDVI) on adenosine stress/rest thallium-201 gated myocardial SPECT (gSPECT) are various from stress to rest. We investigated the reason why they were various in patients without coronary artery disease. Seventy-one patients(M:F=32:39, age 58.1{+-}9.7yrs), who underwent gSPECT and coronary angiography (CAG) due to chest pain or preoperative evaluation were included. CAG results were normal or insignificant. Exclusion criteria were atrial fibrillation, thyroid disease, primary cardiomyopathy, myocardial bridge, LBBB, MI, and valvular heart disease. Patients were calssified into 3 groups by EF difference ({delta}EF=rest-stress EF) on gSPECT : group1 ({delta}EF{>=}10), group2 (0 {<=}{delta}EF<10), and group3 ({delta}EF<0). LV parameters on gSPECT and thicknesses of IVS (interventricular septum) and LVPW (left ventricular posterior wall) on echocardiography were compared among the 3 groups. Myocardial perfusion status were normal or mild reversible/persistent perfusion defect in 76.1% (54/71). LVEFs at stress were not different among all 3 groups : 59.3{+-}8.54% in group 1 (61.3{+-}10.22% in group 2 and 64.8{+-}7.58% in group 3 (p>0.05). But LVEF at rest was smaller in group 3 (58.7{+-}8.38%) than the other groups (72.5{+-}8.77% in group1 and 66.7{+-}10.6% in group2) (p<0.01). EDVIs and ESVI at stress were larger than those at rest in all groups (p<0.05) except ESVI in group 3 (16.2{+-}6.21ml at stress and 17.5{+-}6.41ml at rest, p<0.01), and that was attributed to EF<0 in group 3. In echocardiographical analysis, group 3 had significantly increased wall thickness of LVPW (10.7{+-}1.2mm versus 9.4{+-}1.6mm, p=0.01) and decreased wall thickness ratio of IVS/LVPW (0.963{+-}0.102 versus 1.048{+-}0.104, p=0.035) than group 1. In patients without coronary artery disease, LVEF, EDVI and ESVI on gSPECT were various and decline of LVEF from stress to rest was caused by unnormalized ESVI . Asymmetrically thickened LVPW may play a crucial role and

  17. Agreement of left ventricular ejection fraction and volumes between adenosine stress TL-201 gated SPECT and echocardiography

    Energy Technology Data Exchange (ETDEWEB)

    Pai, M. S. [College of Medicine, Univ. of Ewha, Seoul (Korea, Republic of); Moon, D. H.; Kim, H. M.; Yang, Y. J.; Kang, D. H. [Asan Medical Center, Seoul (Korea, Republic of)

    2003-07-01

    Electrocardiogram-gated TI-201 SPECT measurements of left ventricular ejection fraction (EF), end-diastolic volume (EDV), and end-systolic volume (ESV) have shown high correlation with conventional methods. However, how much these parameters measured by TI-201 gated SPECT differ from those by echocardiography has not been assessed. Adenosine stress (Ad-G) and redistribution TI-201 gated SPECT (Re-G) and resting echocardiography were conducted in 337 patients (184 male, 153 female). EDV, ESV and LVEF measured by QGS software were compared with the results by echocardiography. Patients with arrhythmia (atrial fibrillation or frequent premature contractions) or evidence of fixed or reversible perfusion defects on TI-201 SPECT were excluded. EF, EDV and ESV measured by Ad-G (63.3{+-}9.8,73.8{+-}30.2,29.1{+-}20.1) and Re-G (65.2{+-}11.6,69.1{+-}30.1,26.5{+-}20.3) correlated well with those by Echo (61.4{+-}7.9,78.3{+-}2.7, 30.7{+-} 17.5 ; r of Ad-G=0.547, 0.850, 0.827, p<0.001 ; r of Re-G=0.585, 0.838, 0.819, p<0.001). However the difference (mean, SD, SEE of Echo - gated SPECT) was statistically significant (EF: Ad-G=1.71, 8.92, 0.48, Re-G=3.59, 10.39, 0.56, p<0.001 ; EDV: Ad-G=4.75, 16.21, 0.88, Re-G=9.53, 16.77, 0.91, p<0.001 ; ESV: Ad-G=1.75, 11.35, 0.61, p<0.05, Re-G=4.29, 11.7, 0.63, p<0.001). Bland-Altman plots showed that the difference of EDV and ESV did not vary in any systematic way over the range of measurement, whereas the difference of EF increased with increasing average EF by Echo and gated-SPECT. The difference of EF, EDV, and ESV between Ad-G and Echo was significantly smaller than those between Re-G and Echo (p<0.001). Gated TI-201 SPECT underestimates EDV and ESV over a wide range of volume. As a result, EF by gated TI-201 SPECT is overestimated especially in patients with small LV volume. Ad-G is preferable to Re-G in assessing left ventricular ejection fraction and volume in place of Echo because of smaller bias.

  18. Evaluation of Dogs with Border Collie Collapse, Including Response to Two Standardized Strenuous Exercise Protocols.

    Science.gov (United States)

    Taylor, Susan; Shmon, Cindy; Su, Lillian; Epp, Tasha; Minor, Katie; Mickelson, James; Patterson, Edward; Shelton, G Diane

    2016-01-01

    Clinical and metabolic variables were evaluated in 13 dogs with border collie collapse (BCC) before, during, and following completion of standardized strenuous exercise protocols. Six dogs participated in a ball-retrieving protocol, and seven dogs participated in a sheep-herding protocol. Findings were compared with 16 normal border collies participating in the same exercise protocols (11 retrieving, five herding). Twelve dogs with BCC developed abnormal mentation and/or an abnormal gait during evaluation. All dogs had post-exercise elevations in rectal temperature, pulse rate, arterial blood pH, PaO2, and lactate, and decreased PaCO2 and bicarbonate, as expected with strenuous exercise, but there were no significant differences between BCC dogs and normal dogs. Electrocardiography demonstrated sinus tachycardia in all dogs following exercise. Needle electromyography was normal, and evaluation of muscle biopsy cryosections using a standard panel of histochemical stains and reactions did not reveal a reason for collapse in 10 dogs with BCC in which these tests were performed. Genetic testing excluded the dynamin-1 related exercise-induced collapse mutation and the V547A malignant hyperthermia mutation as the cause of BCC. Common reasons for exercise intolerance were eliminated. Although a genetic basis is suspected, the cause of collapse in BCC was not determined.

  19. Defining robustness protocols: a method to include and evaluate robustness in clinical plans

    International Nuclear Information System (INIS)

    McGowan, S E; Albertini, F; Lomax, A J; Thomas, S J

    2015-01-01

    We aim to define a site-specific robustness protocol to be used during the clinical plan evaluation process. Plan robustness of 16 skull base IMPT plans to systematic range and random set-up errors have been retrospectively and systematically analysed. This was determined by calculating the error-bar dose distribution (ebDD) for all the plans and by defining some metrics used to define protocols aiding the plan assessment. Additionally, an example of how to clinically use the defined robustness database is given whereby a plan with sub-optimal brainstem robustness was identified. The advantage of using different beam arrangements to improve the plan robustness was analysed. Using the ebDD it was found range errors had a smaller effect on dose distribution than the corresponding set-up error in a single fraction, and that organs at risk were most robust to the range errors, whereas the target was more robust to set-up errors. A database was created to aid planners in terms of plan robustness aims in these volumes. This resulted in the definition of site-specific robustness protocols. The use of robustness constraints allowed for the identification of a specific patient that may have benefited from a treatment of greater individuality. A new beam arrangement showed to be preferential when balancing conformality and robustness for this case. The ebDD and error-bar volume histogram proved effective in analysing plan robustness. The process of retrospective analysis could be used to establish site-specific robustness planning protocols in proton therapy. These protocols allow the planner to determine plans that, although delivering a dosimetrically adequate dose distribution, have resulted in sub-optimal robustness to these uncertainties. For these cases the use of different beam start conditions may improve the plan robustness to set-up and range uncertainties. (paper)

  20. Defining robustness protocols: a method to include and evaluate robustness in clinical plans

    Science.gov (United States)

    McGowan, S. E.; Albertini, F.; Thomas, S. J.; Lomax, A. J.

    2015-04-01

    We aim to define a site-specific robustness protocol to be used during the clinical plan evaluation process. Plan robustness of 16 skull base IMPT plans to systematic range and random set-up errors have been retrospectively and systematically analysed. This was determined by calculating the error-bar dose distribution (ebDD) for all the plans and by defining some metrics used to define protocols aiding the plan assessment. Additionally, an example of how to clinically use the defined robustness database is given whereby a plan with sub-optimal brainstem robustness was identified. The advantage of using different beam arrangements to improve the plan robustness was analysed. Using the ebDD it was found range errors had a smaller effect on dose distribution than the corresponding set-up error in a single fraction, and that organs at risk were most robust to the range errors, whereas the target was more robust to set-up errors. A database was created to aid planners in terms of plan robustness aims in these volumes. This resulted in the definition of site-specific robustness protocols. The use of robustness constraints allowed for the identification of a specific patient that may have benefited from a treatment of greater individuality. A new beam arrangement showed to be preferential when balancing conformality and robustness for this case. The ebDD and error-bar volume histogram proved effective in analysing plan robustness. The process of retrospective analysis could be used to establish site-specific robustness planning protocols in proton therapy. These protocols allow the planner to determine plans that, although delivering a dosimetrically adequate dose distribution, have resulted in sub-optimal robustness to these uncertainties. For these cases the use of different beam start conditions may improve the plan robustness to set-up and range uncertainties.

  1. Impact of a standardized nurse observation protocol including MEWS after Intensive Care Unit discharge.

    Science.gov (United States)

    De Meester, K; Das, T; Hellemans, K; Verbrugghe, W; Jorens, P G; Verpooten, G A; Van Bogaert, P

    2013-02-01

    Analysis of in-hospital mortality after serious adverse events (SAE's) in our hospital showed the need for more frequent observation in medical and surgical wards. We hypothesized that the incidence of SAE's could be decreased by introducing a standard nurse observation protocol. To investigate the effect of a standard nurse observation protocol implementing the Modified Early Warning Score (MEWS) and a color graphic observation chart. Pre- and post-intervention study by analysis of patients records for a 5-day period after Intensive Care Unit (ICU) discharge to 14 medical and surgical wards before (n=530) and after (n=509) the intervention. For the total study population the mean Patient Observation Frequency Per Nursing Shift (POFPNS) during the 5-day period after ICU discharge increased from .9993 (95% C.I. .9637-1.0350) in the pre-intervention period to 1.0732 (95% C.I. 1.0362-1.1101) (p=.005) in the post-intervention period. There was an increased risk of a SAE in patients with MEWS 4 or higher in the present nursing shift (HR 8.25; 95% C.I. 2.88-23.62) and the previous nursing shift (HR 12.83;95% C.I. 4.45-36.99). There was an absolute risk reduction for SAE's within 120h after ICU discharge of 2.2% (95% C.I. -0.4-4.67%) from 5.7% to 3.5%. The intervention had a positive impact on the observation frequency. MEWS had a predictive value for SAE's in patients after ICU discharge. The drop in SAE's was substantial but did not reach statistical significance. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  2. Reversible wall motion abnormality on adenosine stress/rest thallium-201 gated myocardial SPECT is an independent predictor of coronary artery disease

    International Nuclear Information System (INIS)

    Park, Eun Kyung; Lee, Won Woo; So, Young; Eo, Jae Seon; Lee, Dong Soo; Chung, June Key; Lee, Myung Chul; Kim, Sang Eun; Kim, Cheol Ho; Lee, Sang Woo

    2004-01-01

    As early as 10 minutes after adenosine stress, immediate post-stress wall motion (ipsWM) can be evaluated on adenosine stress/rest TI-201 gated SPECT (gSPECT). To widen application of TI-201 in gated SPECT, we investigated image quality, LV parameters (EF, EDV, and ESV) reproducibility, and diagnostic competency of gSPECT regarding ipsWM evaluation Myocardial perfusion and wall motion were evaluated by 5-point scoring system in 20-segment model. Image quality was assessed using weighted Kappa (Kw) for inter-and intra-observer agreements of wall motion scores (n=49). Reproducibility was examined through repeated acquisition (n=31). Diagnostic competency was evaluated versus coronary angiography (CAG) and multivariate logistic regression analysis was performed to identify significant predictors of coronary artery disease (CAD) among stress abnormal perfusion (SSSp), stress abnormal wall motion (SSSwm), and reversible abnormal wall motion (SDSwm) (n=60). Kw for ipsWM was significantly better than that for rest regarding inter- (0.717 vs 0.489) and intra-observer agreements (0.792 vs 0.688) (p<0.05). 2SD for ipsWM was smaller than that for rest at EF (8.6% vs 10.7%) and ESV (6.0ml vs 8.4ml). Sensitivities of SSSp, SSSwm, and SDSwm were 63.3% (19/30), 63.3% (19/30), and 43.3% (13/30) and specificities 83.3% (25/30), 83.3% (25/30), and 86.7% (26/30), respectively. By multivariate analysis, SSSp (p=0.013) and SDSwm (p=0.039) remained significant predictors. Additionally, SSSwm or SDSwm could find undetected CAD in 54.5% (6/11) of patients with normal perfusion. TI-201 can be successfully applied to gated SPECT for ipsWM evaluation. Moreover, reversible wall motion abnormality on gSPECT is an independent predictor of significant CAD

  3. Efficacy of a protocol including heparin ointment for treatment of multikinase inhibitor-induced hand-foot skin reactions.

    Science.gov (United States)

    Li, Jian-ri; Yang, Chi-rei; Cheng, Chen-li; Ho, Hao-chung; Chiu, Kun-yuan; Su, Chung-Kuang; Chen, Wen-Ming; Wang, Shian-Shiang; Chen, Chuan-Shu; Yang, Cheng-Kuang; Ou, Yen-chuan

    2013-03-01

    The purpose of this study is to evaluate the efficacy of a protocol including topical heparin therapy for hand-foot skin reactions (HFSR) during multikinase (MKI) treatment. We prospectively collected 26 patients who had HFSRs during treatment with the MKIs, sunitinib, sorafenib, or axitinib. The age distribution ranged from 46 to 87 years, with a mean of 66 years. The distribution of HFSR severity was 12 patients with grade 1, 12 with grade 2, and 2 with grade 3. A heparin-containing topical ointment treatment, combined with hand-foot shock absorbers and skin moisturizers, was used at the lesion sites. Changes in the grade of HFSR, MKI dosage, and interruptions of MKI therapy were recorded. The results showed that 66.7% of grade 1 patients were cured of disease, 83.3% of grade 2 patients had improved symptoms, and both grade 3 patients (100%) had improved symptoms and were downgraded to grade 2. Four (15.4%) patients required reduction of MKI dosage, but there were no treatment interruptions or dropouts. Our protocol is beneficial in promoting resolution of HFSRs induced by MKIs. Further validation in large control studies should be investigated.

  4. Energy star compliant voice over internet protocol (VoIP) telecommunications network including energy star compliant VoIP devices

    Science.gov (United States)

    Kouchri, Farrokh Mohammadzadeh

    2012-11-06

    A Voice over Internet Protocol (VoIP) communications system, a method of managing a communications network in such a system and a program product therefore. The system/network includes an ENERGY STAR (E-star) aware softswitch and E-star compliant communications devices at system endpoints. The E-star aware softswitch allows E-star compliant communications devices to enter and remain in power saving mode. The E-star aware softswitch spools messages and forwards only selected messages (e.g., calls) to the devices in power saving mode. When the E-star compliant communications devices exit power saving mode, the E-star aware softswitch forwards spooled messages.

  5. Impact of cell lines included in enterovirus isolation protocol on perception of nonpolio enterovirus species C diversity.

    Science.gov (United States)

    Adeniji, Johnson Adekunle; Faleye, Temitope Oluwasegun Cephas

    2014-10-01

    There has been under-reporting of nonpolio enterovirus species Cs (NPESCs) in Nigeria despite the fact that most isolates recovered from the Nigerian vaccine derived poliovirus serotype 2 (VDPV2) outbreak were recombinants with nonstructural region of NPESC origin. It has been suggested that cell lines included in enterovirus isolation protocols might account for this phenomenon and this study examined this suggestion. Fifteen environmental samples concentrated previously and analysed using L20B and RD cell lines as part of the poliovirus environmental surveillance (ES) program in Nigeria were randomly selected and inoculated into two cell lines (MCF-7 and LLC-MK2). Isolates were identified as enteroviruses and species C members using different RT-PCR assays, culture in L20B cell line and sequencing of partial VP1. Forty-eight (48) isolates were recovered from the 15 samples, 47 (97.9%) of which were enteroviruses. Of the enteroviruses, 32 (68.1%) belonged to enterovirus species C (EC) of which 19 (40.4%) were polioviruses and 13 (27.7%) were NPESC members. All 13 NPESC isolates were recovered on MCF-7. Results of the study show that NPESCs are circulating in Nigeria and their under-reporting was due to the combination of cell lines used for enterovirus isolation in previous reports. Copyright © 2014 Elsevier B.V. All rights reserved.

  6. Global warming potential estimates for the C1-C3 hydrochlorofluorocarbons (HCFCs) included in the Kigali Amendment to the Montreal Protocol

    Science.gov (United States)

    Papanastasiou, Dimitrios K.; Beltrone, Allison; Marshall, Paul; Burkholder, James B.

    2018-05-01

    Hydrochlorofluorocarbons (HCFCs) are ozone depleting substances and potent greenhouse gases that are controlled under the Montreal Protocol. However, the majority of the 274 HCFCs included in Annex C of the protocol do not have reported global warming potentials (GWPs) which are used to guide the phaseout of HCFCs and the future phase down of hydrofluorocarbons (HFCs). In this study, GWPs for all C1-C3 HCFCs included in Annex C are reported based on estimated atmospheric lifetimes and theoretical methods used to calculate infrared absorption spectra. Atmospheric lifetimes were estimated from a structure activity relationship (SAR) for OH radical reactivity and estimated O(1D) reactivity and UV photolysis loss processes. The C1-C3 HCFCs display a wide range of lifetimes (0.3 to 62 years) and GWPs (5 to 5330, 100-year time horizon) dependent on their molecular structure and the H-atom content of the individual HCFC. The results from this study provide estimated policy-relevant GWP metrics for the HCFCs included in the Montreal Protocol in the absence of experimentally derived metrics.

  7. Study protocol: Rehabilitation including Social and Physical activity and Education in Children and Teenagers with Cancer (RESPECT).

    Science.gov (United States)

    Thorsteinsson, Troels; Helms, Anne Sofie; Adamsen, Lis; Andersen, Lars Bo; Andersen, Karen Vitting; Christensen, Karl Bang; Hasle, Henrik; Heilmann, Carsten; Hejgaard, Nete; Johansen, Christoffer; Madsen, Marianne; Madsen, Svend Aage; Simovska, Venka; Strange, Birgit; Thing, Lone Friis; Wehner, Peder Skov; Schmiegelow, Kjeld; Larsen, Hanne Baekgaard

    2013-11-14

    During cancer treatment children have reduced contact with their social network of friends, and have limited participation in education, sports, and leisure activities. During and following cancer treatment, children describe school related problems, reduced physical fitness, and problems related to interaction with peers. The RESPECT study is a nationwide population-based prospective, controlled, mixed-methods intervention study looking at children aged 6-18 years newly diagnosed with cancer in eastern Denmark (n=120) and a matched control group in western Denmark (n=120). RESPECT includes Danish-speaking children diagnosed with cancer and treated at pediatric oncology units in Denmark. Primary endpoints are the level of educational achievement one year after the cessation of first-line cancer therapy, and the value of VO2max one year after the cessation of first-line cancer therapy. Secondary endpoints are quality of life measured by validated questionnaires and interviews, and physical performance. RESPECT includes a multimodal intervention program, including ambassador-facilitated educational, physical, and social interventions. The educational intervention includes an educational program aimed at the child with cancer, the child's schoolteachers and classmates, and the child's parents. Children with cancer will each have two ambassadors assigned from their class. The ambassadors visit the child with cancer at the hospital at alternating 2-week intervals and participate in the intervention program. The physical and social intervention examines the effect of early, structured, individualized, and continuous physical activity from diagnosis throughout the treatment period. The patients are tested at diagnosis, at 3 and 6 months after diagnosis, and one year after the cessation of treatment. The study is powered to quantify the impact of the combined educational, physical, and social intervention programs. RESPECT is the first population-based study to examine the

  8. Simulation of a MR–PET protocol for staging of head-and-neck cancer including Dixon MR for attenuation correction

    Energy Technology Data Exchange (ETDEWEB)

    Eiber, Matthias, E-mail: matthias.eiber@tum.de [Department of Radiology, Klinikum rechts der Isar, Technische Universität München, Ismaninger Str. 22, 81675 Munich (Germany); Souvatzoglou, Michael, E-mail: msouvatz@yahoo.de [Department of Nuclear Medicine, Klinikum rechts der Isar, Technische Universität München, Ismaninger Str. 22, 81675 Munich (Germany); Pickhard, Anja, E-mail: a.pickhard@lrz.tum.de [Department of Otorhinolaryngology, Klinikum rechts der Isar, Technische Universität München, Ismaninger Str. 22, 81675 Munich (Germany); Loeffelbein, Denys J., E-mail: denys.loeffelbein@gmx.de [Department of Maxillofacial Surgery, Klinikum rechts der Isar, Technische Universität München, Ismaninger Str. 22, 81675 Munich (Germany); Knopf, Andreas, E-mail: andreas.knopf@tum.de [Department of Otorhinolaryngology, Klinikum rechts der Isar, Technische Universität München, Ismaninger Str. 22, 81675 Munich (Germany); Holzapfel, Konstantin, E-mail: holzapfel@roe.med.tum.de [Department of Radiology, Klinikum rechts der Isar, Technische Universität München, Ismaninger Str. 22, 81675 Munich (Germany); Martinez-Möller, Axel, E-mail: a.martinez-moller@lrz.tu-muenchen.de [Department of Nuclear Medicine, Klinikum rechts der Isar, Technische Universität München, Ismaninger Str. 22, 81675 Munich (Germany); and others

    2012-10-15

    Purpose: To simulate and optimize a MR protocol for squamous cell cancer of the head and neck (HNSCC) patients for potential future use in an integrated whole-body MR–PET scanner. Materials and methods: On a clinical 3T scanner, which is the basis for a recently introduced fully integrated whole-body MR–PET, 20 patients with untreated HNSCC routinely staged with 18F-FDG PET/CT underwent a dedicated MR protocol for the neck. Moreover, a whole-body Dixon MR-sequence was applied, which is used for attenuation correction on a recently introduced hybrid MR–PET scanner. In a subset of patients volume-interpolated-breathhold (VIBE) T1w-sequences for lungs and liver were added. Total imaging time was analyzed for both groups. The quality of the delineation of the primary tumor (scale 0–3) and the presence or absence of lymph node metastases (scale 1–5) was evaluated for CT, MR, PET/CT and a combination of MR and PET to ensure that the MR–PET fusion does not cause a loss of diagnostic capability. PET was used to identify distant metastases. The PET dataset for simulated MR/PET was based on a segmentation of the CT data into 4 classes according to the approach of the Dixon MR-sequence for MR–PET. Standard of reference was histopathology in 19 cases. In one case no histopathological confirmation of a primary tumor could be achieved. Results: Mean imaging time was 35:17 min (range: 31:08–42:42 min) for the protocol including sequences for local staging and attenuation correction and 44:17 min (range: 35:44–54:58) for the extended protocol. Although not statistically significant a combination of MR and PET performed better in the delineation of the primary tumor (mean 2.20) compared to CT (mean 1.40), MR (1.95) and PET/CT (2.15) especially in patients with dental implants. PET/CT and combining MR and PET performed slightly better than CT and MR for the assessment of lymph node metastases. Two patients with distant metastases were only identified by PET

  9. Safety and efficacy of a multiphase dietetic protocol with meal replacements including a step with very low calorie diet.

    Science.gov (United States)

    Basciani, Sabrina; Costantini, Daniela; Contini, Savina; Persichetti, Agnese; Watanabe, Mikiko; Mariani, Stefania; Lubrano, Carla; Spera, Giovanni; Lenzi, Andrea; Gnessi, Lucio

    2015-04-01

    To investigate safety, compliance, and efficacy, on weight loss and cardiovascular risk factors of a multiphasic dietary intervention based on meal replacements, including a period of very low calorie diet (VLCD) in a population of obese patients. Anthropometric parameters, blood tests (including insulin), dual-energy-X-ray absorptiometry (DXA), and questionnaires for the assessment of safety and compliance before and after (phase I) a 30-day VLCD, 700 kcal/day, normoproteic, 50 g/day carbohydrate, four meal replacements; (phase II) a 30-day low calorie diet (LCD), 820 kcal/day, three meal replacements plus a protein plate; (phase III) 60-day LCD, 1,100 kcal/day, two meal replacements plus two protein plates and reintroduction of small amounts of carbohydrates; (phase IV) 60-day hypocaloric balanced diet (HBD), 1,200 kcal/day, one meal replacement, two protein plates and the reintroduction of carbohydrates. 24 patients (17 females, 7 males, mean BMI 33.8±3.2 kg/m2, mean age 35.1±10.2 years) completed the study. The average weight loss was 15.4±6.7%, with a significant reduction of fat mass (from 32.8±4.7 to 26.1±6.3% p<0.05) and a relative increase of lean mass (from 61.9±4.8 to 67.1±5.9% p<0.05). An improvement of metabolic parameters and no variations of the liver and kidney functions were found. A high safety profile and an excellent dietary compliance were seen. The VLCD dietary program and the replacement dietary system described here is an effective, safe, and well-tolerated treatment for weight control.

  10. Inter-observer reliability of animal-based welfare indicators included in the Animal Welfare Indicators welfare assessment protocol for dairy goats.

    Science.gov (United States)

    Vieira, A; Battini, M; Can, E; Mattiello, S; Stilwell, G

    2018-01-08

    This study was conducted within the context of the Animal Welfare Indicators (AWIN) project and the underlying scientific motivation for the development of the study was the scarcity of data regarding inter-observer reliability (IOR) of welfare indicators, particularly given the importance of reliability as a further step for developing on-farm welfare assessment protocols. The objective of this study is therefore to evaluate IOR of animal-based indicators (at group and individual-level) of the AWIN welfare assessment protocol (prototype) for dairy goats. In the design of the study, two pairs of observers, one in Portugal and another in Italy, visited 10 farms each and applied the AWIN prototype protocol. Farms in both countries were visited between January and March 2014, and all the observers received the same training before the farm visits were initiated. Data collected during farm visits, and analysed in this study, include group-level and individual-level observations. The results of our study allow us to conclude that most of the group-level indicators presented the highest IOR level ('substantial', 0.85 to 0.99) in both field studies, pointing to a usable set of animal-based welfare indicators that were therefore included in the first level of the final AWIN welfare assessment protocol for dairy goats. Inter-observer reliability of individual-level indicators was lower, but the majority of them still reached 'fair to good' (0.41 to 0.75) and 'excellent' (0.76 to 1) levels. In the paper we explore reasons for the differences found in IOR between the group and individual-level indicators, including how the number of individual-level indicators to be assessed on each animal and the restraining method may have affected the results. Furthermore, we discuss the differences found in the IOR of individual-level indicators in both countries: the Portuguese pair of observers reached a higher level of IOR, when compared with the Italian observers. We argue how the

  11. Development of new method and protocol for cryopreservation related to embryo and oocytes freezing in terms of fertilization rate: A comparative study including review of literature.

    Science.gov (United States)

    Barik, Mayadhar; Bajpai, Minu; Patnaik, Santosh; Mishra, Pravash; Behera, Priyamadhaba; Dwivedi, Sada Nanda

    2016-01-01

    Cryopreservation is basically related to meritorious thin samples or small clumps of cells that are cooled quickly without loss. Our main objective is to establish and formulate an innovative method and protocol development for cryopreservation as a gold standard for clinical uses in laboratory practice and treatment. The knowledge regarding usefulness of cryopreservation in clinical practice is essential to carry forward the clinical practice and research. We are trying to compare different methods of cryopreservation (in two dozen of cells) at the same time we compare the embryo and oocyte freezing interms of fertilization rate according to the International standard protocol. The combination of cryoprotectants and regimes of rapid cooling and rinsing during warming often allows successful cryopreservation of biological materials, particularly cell suspensions or thin tissue samples. Examples include semen, blood, tissue samples like tumors, histological cross-sections, human eggs and human embryos. Although presently many studies have reported that the children born from frozen embryos or "frosties," show consistently positive results with no increase in birth defects or development abnormalities is quite good enough and similar to our study (50-85%). We ensure that cryopreservation technology provided useful cell survivability, tissue and organ preservation in a proper way. Although it varies according to different laboratory conditions, it is certainly beneficial for patient's treatment and research. Further studies are needed for standardization and development of new protocol.

  12. Effect on attendance by including focused information on spirometry in preventive health checks: study protocol for a randomized controlled trial.

    Science.gov (United States)

    Ørts, Lene Maria; Løkke, Anders; Bjerregaard, Anne-Louise; Maindal, Helle Terkildsen; Sandbæk, Annelli

    2016-12-01

    Early detection of lung diseases can help to reduce their severity. Lung diseases are among the most frequently occurring and serious diseases worldwide; nonetheless, many patients remain undiagnosed. Preventive health checks including spirometry can detect lung diseases at early stages; however, recruitment for health checks remains a challenge, and little is known about what motivates the attendance. The aim of the study is to examine whether focused information on spirometry in the invitation compared to general information will impact the attendance rate in preventive health checks. This randomized, controlled trial tests the effect of information on spirometry embedded in the Check your Health Preventive Program (CHPP). The CHPP is an open-label, household cluster-randomized, controlled trial offering a preventive health check to 30- to -49-year-olds in a Danish municipality from 2012 to 2017 (n = 26,216). During 2015-2016, 4356 citizens aged 30-49 years will be randomized into two groups. The intervention group receives an invitation which highlights the value and contents of spirometry as part of a health check and information about lung diseases. The comparison group receives a standard invitation containing practical information and specifies the contents of the general health check. Outcomes are (1) differences in attendance rates measured by the proportion of citizens attending each of the two study groups and (2) proportion of persons at risk defined by smoking status and self-reported lung symptoms in the study groups. The proportion of participants with abnormal spirometry assessed at the preventive health check will be compared between the two study groups. The results from the present study will inform future recruitment strategies to health checks. The developed material on content, value, and information about lung disease is feasible and transferable to other populations, making it easy to implement if effective. ClinicalTrials.gov: NCT

  13. Characteristics of images of angiographically proven normal coronary arteries acquired by adenosine-stress thallium-201 myocardial perfusion SPECT/CT-IQ[Symbol: see text]SPECT with CT attenuation correction changed stepwise.

    Science.gov (United States)

    Takahashi, Teruyuki; Tanaka, Haruki; Kozono, Nami; Tanakamaru, Yoshiki; Idei, Naomi; Ohashi, Norihiko; Ohtsubo, Hideki; Okada, Takenori; Yasunobu, Yuji; Kaseda, Shunichi

    2015-04-01

    Although several studies have shown the diagnostic and prognostic value of CT-based attenuation correction (AC) of single photon emission computed tomography (SPECT) images for diagnosing coronary artery disease (CAD), this issue remains a matter of debate. To clarify the characteristics of CT-AC SPECT images that might potentially improve diagnostic performance, we analyzed images acquired using adenosine-stress thallium-201 myocardial perfusion SPECT/CT equipped with IQ[Symbol: see text]SPECT (SPECT/CT-IQ[Symbol: see text]SPECT) from patients with angiographically proven normal coronary arteries after changing the CT attenuation correction (CT-AC) in a stepwise manner. We enrolled 72 patients (Male 36, Female 36) with normal coronary arteries according to findings of invasive coronary angiography or CT-angiography within three months after a SPECT/CT study. Projection images were reconstructed at CT-AC values of (-), 40, 60, 80 and 100 % using a CT number conversion program according to our definition and analyzed using polar maps according to sex. CT attenuation corrected segments were located from the mid- and apical-inferior spread through the mid- and apical-septal regions and finally to the basal-anterior and basal- and mid-lateral regions in males, and from the mid-inferior region through the mid-septal and mid-anterior, and mid-lateral regions in females as the CT-AC values increased. Segments with maximal mean counts shifted from the apical-anterior to mid-anterolateral region under both stress and rest conditions in males, whereas such segments shifted from the apical-septal to the mid-anteroseptal region under both stress and rest conditions in females. We clarified which part of the myocardium and to which degree CT-AC affects it in adenosine-stress thallium-201 myocardial perfusion SPECT/CT-IQ[Symbol: see text]SPECT images by changing the CT-AC value stepwise. We also identified sex-specific shifts of segments with maximal mean counts that changed as

  14. Including pork in the Mediterranean diet for an Australian population: Protocol for a randomised controlled trial assessing cardiovascular risk and cognitive function.

    Science.gov (United States)

    Wade, Alexandra T; Davis, Courtney R; Dyer, Kathryn A; Hodgson, Jonathan M; Woodman, Richard J; Keage, Hannah A D; Murphy, Karen J

    2017-12-22

    The Mediterranean diet is characterised by the high consumption of extra virgin olive oil, fruits, vegetables, grains, legumes and nuts; moderate consumption of fish, poultry, eggs and dairy; and low consumption of red meat and sweets. Cross sectional, longitudinal and intervention studies indicate that a Mediterranean diet may be effective for the prevention of cardiovascular disease and dementia. However, previous research suggests that an Australian population may find red meat restrictions difficult, which could affect long term sustainability of the diet. This paper outlines the protocol for a randomised controlled trial that will assess the cardiovascular and cognitive benefits of a Mediterranean diet modified to include 2-3 weekly serves of fresh, lean pork. A 24-week cross-over design trial will compare a modified Mediterranean diet with a low-fat control diet in at-risk men and women. Participants will follow each of the two diets for 8 weeks, with an 8-week washout period separating interventions. Home measured systolic blood pressure will be the primary outcome measure. Secondary outcomes will include body mass index, body composition, fasting blood lipids, C-reactive protein, fasting plasma glucose, fasting serum insulin, erythrocyte fatty acids, cognitive function, psychological health and well-being, and dementia risk. To our knowledge this research is the first to investigate whether an alternate source of protein can be included in the Mediterranean diet to increase sustainability and feasibility for a non-Mediterranean population. Findings will be significant for the prevention of cardiovascular disease and age-related decline, and may inform individuals, clinicians and public health policy. ACTRN12616001046493 . Registered 5 August 2016.

  15. Including 10-Gigabit-capable Passive Optical Network under End-to-End Generalized Multi-Protocol Label Switching Provisioned Quality of Service

    DEFF Research Database (Denmark)

    Brewka, Lukasz Jerzy; Gavler, Anders; Wessing, Henrik

    2012-01-01

    of the network where quality of service signaling is bridged. This article proposes strategies for generalized multi-protocol label switching control over next emerging passive optical network standard, i.e., the 10-gigabit-capable passive optical network. Node management and resource allocation approaches...... are discussed, and possible issues are raised. The analysis shows that consideration of a 10-gigabit-capable passive optical network as a generalized multi-protocol label switching controlled domain is valid and may advance end-to-end quality of service provisioning for passive optical network based customers.......End-to-end quality of service provisioning is still a challenging task despite many years of research and development in this area. Considering a generalized multi-protocol label switching based core/metro network and resource reservation protocol capable home gateways, it is the access part...

  16. A water-based training program that include perturbation exercises to improve stepping responses in older adults: study protocol for a randomized controlled cross-over trial

    Directory of Open Access Journals (Sweden)

    Tsedek Irit

    2008-08-01

    Full Text Available Abstract Background Gait and balance impairments may increase the risk of falls, the leading cause of accidental death in the elderly population. Fall-related injuries constitute a serious public health problem associated with high costs for society as well as human suffering. A rapid step is the most important protective postural strategy, acting to recover equilibrium and prevent a fall from initiating. It can arise from large perturbations, but also frequently as a consequence of volitional movements. We propose to use a novel water-based training program which includes specific perturbation exercises that will target the stepping responses that could potentially have a profound effect in reducing risk of falling. We describe the water-based balance training program and a study protocol to evaluate its efficacy (Trial registration number #NCT00708136. Methods/Design The proposed water-based training program involves use of unpredictable, multi-directional perturbations in a group setting to evoke compensatory and volitional stepping responses. Perturbations are made by pushing slightly the subjects and by water turbulence, in 24 training sessions conducted over 12 weeks. Concurrent cognitive tasks during movement tasks are included. Principles of physical training and exercise including awareness, continuity, motivation, overload, periodicity, progression and specificity were used in the development of this novel program. Specific goals are to increase the speed of stepping responses and improve the postural control mechanism and physical functioning. A prospective, randomized, cross-over trial with concealed allocation, assessor blinding and intention-to-treat analysis will be performed to evaluate the efficacy of the water-based training program. A total of 36 community-dwelling adults (age 65–88 with no recent history of instability or falling will be assigned to either the perturbation-based training or a control group (no training

  17. Development of new method and protocol for cryopreservation related to embryo and oocytes freezing in terms of fertilization rate: A comparative study including review of literature

    Directory of Open Access Journals (Sweden)

    Mayadhar Barik

    2016-01-01

    Conclusions: We ensure that cryopreservation technology provided useful cell survivability, tissue and organ preservation in a proper way. Although it varies according to different laboratory conditions, it is certainly beneficial for patient′s treatment and research. Further studies are needed for standardization and development of new protocol.

  18. Optimizing Staining Protocols for Laser Microdissection of Specific Cell Types from the Testis Including Carcinoma In Situ

    DEFF Research Database (Denmark)

    Sonne, Si Brask; Dalgaard, Marlene D; Nielsen, John Erik

    2009-01-01

    Microarray and RT-PCR based methods are important tools for analysis of gene expression; however, in tissues containing many different cells types, such as the testis, characterization of gene expression in specific cell types can be severely hampered by noise from other cells. The laser microdis......Microarray and RT-PCR based methods are important tools for analysis of gene expression; however, in tissues containing many different cells types, such as the testis, characterization of gene expression in specific cell types can be severely hampered by noise from other cells. The laser...... protocols, and present two staining protocols for frozen sections, one for fast and specific staining of fetal germ cells, testicular carcinoma in situ cells, and other cells with embryonic stem cell-like properties that express the alkaline phosphatase, and one for specific staining of lipid droplet...

  19. Mapping of Schistosomiasis and Soil-Transmitted Helminths in Namibia: The First Large-Scale Protocol to Formally Include Rapid Diagnostic Tests.

    Directory of Open Access Journals (Sweden)

    José Carlos Sousa-Figueiredo

    Full Text Available Namibia is now ready to begin mass drug administration of praziquantel and albendazole against schistosomiasis and soil-transmitted helminths, respectively. Although historical data identifies areas of transmission of these neglected tropical diseases (NTDs, there is a need to update epidemiological data. For this reason, Namibia adopted a new protocol for mapping of schistosomiasis and geohelminths, formally integrating rapid diagnostic tests (RDTs for infections and morbidity. In this article, we explain the protocol in detail, and introduce the concept of 'mapping resolution', as well as present results and treatment recommendations for northern Namibia.This new protocol allowed a large sample to be surveyed (N = 17,896 children from 299 schools at relatively low cost (7 USD per person mapped and very quickly (28 working days. All children were analysed by RDTs, but only a sub-sample was also diagnosed by light microscopy. Overall prevalence of schistosomiasis in the surveyed areas was 9.0%, highly associated with poorer access to potable water (OR = 1.5, P<0.001 and defective (OR = 1.2, P<0.001 or absent sanitation infrastructure (OR = 2.0, P<0.001. Overall prevalence of geohelminths, more particularly hookworm infection, was 12.2%, highly associated with presence of faecal occult blood (OR = 1.9, P<0.001. Prevalence maps were produced and hot spots identified to better guide the national programme in drug administration, as well as targeted improvements in water, sanitation and hygiene. The RDTs employed (circulating cathodic antigen and microhaematuria for Schistosoma mansoni and S. haematobium, respectively performed well, with sensitivities above 80% and specificities above 95%.This protocol is cost-effective and sensitive to budget limitations and the potential economic and logistical strains placed on the national Ministries of Health. Here we present a high resolution map of disease prevalence levels, and treatment regimens are

  20. Comparison of 2 comprehensive Class II treatment protocols including the bonded Herbst and headgear appliances: a double-blind study of consecutively treated patients at puberty.

    Science.gov (United States)

    Baccetti, Tiziano; Franchi, Lorenzo; Stahl, Franka

    2009-06-01

    The aim of this clinical trial was to compare the effects of 2 protocols for single-phase comprehensive treatment of Class II Division 1 malocclusion (bonded Herbst followed by fixed appliances [BH + FA] vs headgear followed by fixed appliances and Class II elastics [HG + FA]) at the pubertal growth spurt. Fifty-six Class II patients were enrolled in the trial and allocated by personal choice to 2 practices, where they underwent 1 of 2 treatment protocols (28 patients were treated consecutively with BH + FA, and 28 patients were treated consecutively with HG + FA). All patients started treatment at puberty (cervical stage [CS] 3 or CS 4) and completed treatment after puberty (CS 5 or CS 6). Lateral cephalograms were taken before therapy and 6 months after the end of comprehensive therapy, with an average interval of 28 months. Longitudinal observations of a matched group of 28 subjects with untreated Class II malocclusions were compared with the 2 treated groups. Analysis of variance (ANOVA) with post-hoc tests was used for statistical comparisons. Discriminant analysis was applied to identify preferential candidates for the BH + FA protocol on the basis of profile changes (advancement of the soft tissues of the chin). The success rate (full occlusal correction of the malocclusion after treatment) was 92.8% in both treatment groups. The BH + FA group showed a significant increase in mandibular protrusion. The increase in effective mandibular length (Co-Gn) was significantly greater in both treatment groups when compared with natural growth changes in the Class II controls. Significantly greater improvement in sagittal maxillomandibular relationships was found in the BH + FA group. Retrusion of maxillary incisors and mesial movement of mandibular molars were significant in the HG + FA group. The BH + FA group showed significantly greater forward movements of soft-tissue B-point and pogonion compared with both the HG + FA and the control groups. Two pretreatment

  1. The effect of weight management interventions that include a diet component on weight-related outcomes in pregnant and postpartum women: a systematic review protocol.

    Science.gov (United States)

    Spencer, Lisa; Rollo, Megan; Hauck, Yvonne; MacDonald-Wicks, Lesley; Wood, Lisa; Hutchesson, Melinda; Giglia, Roslyn; Smith, Roger; Collins, Clare

    2015-01-01

    interventions for GWG, much is still unknown about the effectiveness of differing diet interventions over the antenatal and postpartum period. Specifically, the impact of differing diet intervention strategies on maternal weight gain is not known. Firstly, this systematic review will focus on whether weight management interventions which include a dietary component are effective in pregnant and postpartum women. In addition to this, this review will investigate the different intervention strategies utilized and their effectiveness in maternal weight management. A search of systematic review protocol databases has shown that there is no current review underway for this topic.

  2. Planned development and evaluation protocol of two versions of a web-based computer-tailored nutrition education intervention aimed at adults, including cognitive and environmental feedback.

    Science.gov (United States)

    Springvloet, Linda; Lechner, Lilian; Oenema, Anke

    2014-01-17

    Despite decades of nutrition education, the prevalence of unhealthy dietary patterns is still high and inequalities in intake between high and low socioeconomic groups still exist. Therefore, it is important to innovate and improve existing nutrition education interventions. This paper describes the development, design and evaluation protocol of a web-based computer-tailored nutrition education intervention for adults targeting fruit, vegetable, high-energy snack and fat intake. This intervention innovates existing computer-tailored interventions by not only targeting motivational factors, but also volitional and self-regulation processes and environmental-level factors. The intervention development was guided by the Intervention Mapping protocol, ensuring a theory-informed and evidence-based intervention. Two versions of the intervention were developed: a basic version targeting knowledge, awareness, attitude, self-efficacy and volitional and self-regulation processes, and a plus version additionally addressing the home environment arrangement and the availability and price of healthy food products in supermarkets. Both versions consist of four modules: one for each dietary behavior, i.e. fruit, vegetables, high-energy snacks and fat. Based on the self-regulation phases, each module is divided into three sessions. In the first session, feedback on dietary behavior is provided to increase awareness, feedback on attitude and self-efficacy is provided and goals and action plans are stated. In the second session goal achievement is evaluated, reasons for failure are explored, coping plans are stated and goals can be adapted. In the third session, participants can again evaluate their behavioral change and tips for maintenance are provided. Both versions will be evaluated in a three-group randomized controlled trial with measurements at baseline, 1-month, 4-months and 9-months post-intervention, using online questionnaires. Both versions will be compared with a generic

  3. Persistence of long term isokinetic strength deficits in subjects with lateral ankle sprain as measured with a protocol including maximal preloading.

    Science.gov (United States)

    Perron, Marc; Moffet, Hélène; Nadeau, Sylvie; Hébert, Luc J; Belzile, Sylvain

    2014-12-01

    The assessment of muscle function is a cornerstone in the management of subjects who have sustained a lateral ankle sprain. The ankle range of motion being relatively small, the use of preloading allows to measure maximal strength throughout the whole amplitude and therefore to better characterize ankle muscles weaknesses. This study aimed to assess muscle strength of the injured and uninjured ankles in subjects with a lateral ankle sprain, to document the timeline of strength recovery, and to determine the influence of sprain grade on strength loss. Maximal torque of the periarticular muscles of the ankle in a concentric mode using a protocol with maximal preloading was tested in 32 male soldiers at 8 weeks and 6 months post-injury. The evertor muscles of the injured ankles were weaker than the uninjured ones at 8 weeks and 6 months post-injury (Pankles at 8 weeks (P=0.0014, effect size=0.52-0.58) while at 6 months, only the subjects with a grade II sprain displayed such weaknesses (Pankle sprain in very active individuals. Copyright © 2014 Elsevier Ltd. All rights reserved.

  4. Transforming primary healthcare by including the stakeholders involved in delivering care to people living in poverty: EQUIhealThY study protocol.

    Science.gov (United States)

    Loignon, Christine; Hudon, Catherine; Boudreault-Fournier, Alexandrine; Dupéré, Sophie; Macaulay, Ann C; Pluye, Pierre; Gaboury, Isabelle; Haggerty, Jeannie L; Fortin, Martin; Goulet, Émilie; Lambert, Mireille; Pelissier-Simard, Luce; Boyer, Sophie; de Laat, Marianne; Lemire, Francine; Champagne, Louise; Lemieux, Martin

    2013-03-11

    Ensuring access to timely and appropriate primary healthcare for people living in poverty is an issue facing all countries, even those with universal healthcare systems. The transformation of healthcare practices and organization could be improved by involving key stakeholders from the community and the healthcare system in the development of research interventions. The aim of this project is to stimulate changes in healthcare organizations and practices by encouraging collaboration between care teams and people living in poverty. Our objectives are twofold: 1) to identify actions required to promote the adoption of professional practices oriented toward social competence in primary care teams; and 2) to examine factors that would encourage the inclusion of people living in poverty in the process of developing social competence in healthcare organizations. This study will use a participatory action research design applied in healthcare organizations. Participatory research is an increasingly recognized approach that is helpful for involving the people for whom the research results are intended. Our research team consists of 19 non-academic researchers, 11 academic researchers and six partners. A steering committee composed of academic researchers and stakeholders will have a decision-making role at each step, including knowledge dissemination and recommendations for new interventions. In this project we will adopt a multiphase approach and will use a variety of methods, including photovoice, group discussions and interviews. The proposed study will be one of only a few using participatory research in primary care to foster changes aimed at enhancing quality and access to care for people living in poverty. To our knowledge this will be the first study to use photovoice in healthcare organizations to promote new interventions. Our project includes partners who are targeted for practice changes and improvements in delivering primary care to persons living in poverty

  5. Prevention of diabetes in overweight/obese children through a family based intervention program including supervised exercise (PREDIKID project): study protocol for a randomized controlled trial.

    Science.gov (United States)

    Arenaza, Lide; Medrano, María; Amasene, María; Rodríguez-Vigil, Beatriz; Díez, Ignacio; Graña, Manuel; Tobalina, Ignacio; Maiz, Edurne; Arteche, Edurne; Larrarte, Eider; Huybrechts, Inge; Davis, Catherine L; Ruiz, Jonatan R; Ortega, Francisco B; Margareto, Javier; Labayen, Idoia

    2017-08-10

    The global pandemic of obesity has led to an increased risk for prediabetes and type-2 diabetes (T2D). The aims of the current project are: (1) to evaluate the effect of a 22-week family based intervention program, including supervised exercise, on insulin resistance syndrome (IRS) risk in children with a high risk of developing T2D and (2) to identify the profile of microRNA in circulating exosomes and in peripheral blood mononuclear cells in children with a high risk of developing T2D and its response to a multidisciplinary intervention program including exercise. A total of 84 children, aged 8-12 years, with a high risk of T2D will be included and randomly assigned to control (N = 42) or intervention (N = 42) groups. The control group will receive a family based lifestyle education and psycho-educational program (2 days/month), while the intervention group will attend the same lifestyle education and psycho-educational program plus the exercise program (3 days/week, 90 min per session including warm-up, moderate to vigorous aerobic activities, and strength exercises). The following measurements will be evaluated at baseline prior to randomization and after the intervention: fasting insulin, glucose and hemoglobin A1c; body composition (dual-energy X-ray absorptiometry); ectopic fat (magnetic resonance imaging); microRNA expression in circulating exosomes and in peripheral blood mononuclear cells (MiSeq; Illumina); cardiorespiratory fitness (cardiopulmonary exercise testing); dietary habits and physical activity (accelerometry). Prevention and identification of children with a high risk of developing T2D could help to improve their cardiovascular health and to reduce the comorbidities associated with obesity. ClinicalTrials.gov, ID: NCT03027726 . Registered on 16 January 2017.

  6. A prospective cohort study on ambient air pollution and respiratory morbidities including childhood asthma in adolescents from the western Cape Province: study protocol.

    Science.gov (United States)

    Olaniyan, Toyib; Jeebhay, Mohamed; Röösli, Martin; Naidoo, Rajen; Baatjies, Roslynn; Künzil, Nino; Tsai, Ming; Davey, Mark; de Hoogh, Kees; Berman, Dilys; Parker, Bhawoodien; Leaner, Joy; Dalvie, Mohamed Aqiel

    2017-09-16

    There is evidence from existing literature that ambient air pollutant exposure in early childhood likely plays an important role in asthma exacerbation and other respiratory symptoms, with greater effect among asthmatic children. However, there is inconclusive evidence on the role of ambient air pollutant exposures in relation to increasing asthma prevalence as well as asthma induction in children. At the population level, little is known about the potential synergistic effects between pollen allergens and air pollutants since this type of association poses challenges in uncontrolled real life settings. In particular, data from sub-Sahara Africa is scarce and virtually absent among populations residing in informal residential settlements. A prospective cohort study of 600 school children residing in four informal settlement areas with varying potential ambient air pollutant exposure levels in the Western Cape in South Africa is carried-out. The study has two follow-up periods of at least six-months apart including an embedded panel study in summer and winter. The exposure assessment component models temporal and spatial variability of air quality in the four study areas over the study duration using land-use regression modelling (LUR). Additionally, daily pollen levels (mould spores, tree, grass and weed pollen) in the study areas are recorded. In the panel study asthma symptoms and serial peak flow measurements is recorded three times daily to determine short-term serial airway changes in relation to varying ambient air quality and pollen over 10-days during winter and summer. The health outcome component of the cohort study include; the presence of asthma using a standardised ISAAC questionnaire, spirometry, fractional exhaled nitric-oxide (FeNO) and the presence of atopy (Phadiatop). This research applies state of the art exposure assessment approaches to characterize the effects of ambient air pollutants on childhood respiratory health, with a specific focus on

  7. A prospective cohort study on ambient air pollution and respiratory morbidities including childhood asthma in adolescents from the western Cape Province: study protocol

    Directory of Open Access Journals (Sweden)

    Toyib Olaniyan

    2017-09-01

    Full Text Available Abstract Background There is evidence from existing literature that ambient air pollutant exposure in early childhood likely plays an important role in asthma exacerbation and other respiratory symptoms, with greater effect among asthmatic children. However, there is inconclusive evidence on the role of ambient air pollutant exposures in relation to increasing asthma prevalence as well as asthma induction in children. At the population level, little is known about the potential synergistic effects between pollen allergens and air pollutants since this type of association poses challenges in uncontrolled real life settings. In particular, data from sub-Sahara Africa is scarce and virtually absent among populations residing in informal residential settlements. Methods/design A prospective cohort study of 600 school children residing in four informal settlement areas with varying potential ambient air pollutant exposure levels in the Western Cape in South Africa is carried-out. The study has two follow-up periods of at least six-months apart including an embedded panel study in summer and winter. The exposure assessment component models temporal and spatial variability of air quality in the four study areas over the study duration using land-use regression modelling (LUR. Additionally, daily pollen levels (mould spores, tree, grass and weed pollen in the study areas are recorded. In the panel study asthma symptoms and serial peak flow measurements is recorded three times daily to determine short-term serial airway changes in relation to varying ambient air quality and pollen over 10-days during winter and summer. The health outcome component of the cohort study include; the presence of asthma using a standardised ISAAC questionnaire, spirometry, fractional exhaled nitric-oxide (FeNO and the presence of atopy (Phadiatop. Discussion This research applies state of the art exposure assessment approaches to characterize the effects of ambient air

  8. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  9. Study protocol of a pragmatic, randomised controlled pilot trial: clinical effectiveness on smoking cessation of traditional and complementary medicine interventions, including acupuncture and aromatherapy, in combination with nicotine replacement therapy.

    Science.gov (United States)

    Jang, Soobin; Park, Sunju; Jang, Bo-Hyoung; Park, Yu Lee; Lee, Ju Ah; Cho, Chung-Sik; Go, Ho-Yeon; Shin, Yong Cheol; Ko, Seong-Gyu

    2017-06-02

    Nicotine dependence is a disease, and tobacco use is related to 6 million deaths annually worldwide. Recently, in many countries, there has been growing interest in the use of traditional and complementary medicine (T&CM) methods, especially acupuncture, as therapeutic interventions for smoking cessation. The aim of this pilot study is to investigate the effectiveness of T&CM interventions on smoking cessation. The STOP (Stop Tobacco Programme using traditional Korean medicine) study is designed to be a pragmatic, open-label, randomised pilot trial. This trial will evaluate whether adding T&CM methods (ie, ear and body acupuncture, aromatherapy) to conventional cessation methods (ie, nicotine replacement therapy (NRT), counselling) increases smoking cessation rates. Forty participants over 19 years old who are capable of communicating in Korean will be recruited. They will be current smokers who meet one of the following criteria: (1) smoke more than 10 cigarettes a day, (2) smoke less than 10 cigarettes a day and previously failed to cease smoking, or (3) smoke fewer than 10 cigarettes a day and have a nicotine dependence score (Fagerstrom Test for Nicotine Dependence) of 4 points or more. The trial will consist of 4 weeks of treatment and a 20 week follow-up period. A statistician will perform the statistical analyses for both the intention-to-treat (all randomly assigned participants) and per-protocol (participants who completed the trial without any protocol deviations) data using SAS 9.1.3. This study has been approved by the Institutional Review Board (IRB) of the Dunsan Korean Medicine Hospital of Daejeon University (IRB reference no: DJDSKH-15-BM-11-1, Protocol No. version 4.1.).The protocol will be reapproved by IRB if it requires amendment. The trial will be conducted according to the Declaration of Helsinki, 7th version (2013). This study is designed to minimise the risk to participants, and the investigators will explain the study to the

  10. Study protocol of a pragmatic, randomised controlled pilot trial: clinical effectiveness on smoking cessation of traditional and complementary medicine interventions, including acupuncture and aromatherapy, in combination with nicotine replacement therapy

    Science.gov (United States)

    Jang, Soobin; Park, Sunju; Jang, Bo-Hyoung; Park, Yu Lee; Lee, Ju Ah; Cho, Chung-Sik; Go, Ho-Yeon; Shin, Yong Cheol; Ko, Seong-Gyu

    2017-01-01

    Introduction Nicotine dependence is a disease, and tobacco use is related to 6 million deaths annually worldwide. Recently, in many countries, there has been growing interest in the use of traditional and complementary medicine (T&CM) methods, especially acupuncture, as therapeutic interventions for smoking cessation. The aim of this pilot study is to investigate the effectiveness of T&CM interventions on smoking cessation. Methods and analysis The STOP (Stop Tobacco Programme using traditional Korean medicine) study is designed to be a pragmatic, open-label, randomised pilot trial. This trial will evaluate whether adding T&CM methods (ie, ear and body acupuncture, aromatherapy) to conventional cessation methods (ie, nicotine replacement therapy (NRT), counselling) increases smoking cessation rates. Forty participants over 19 years old who are capable of communicating in Korean will be recruited. They will be current smokers who meet one of the following criteria: (1) smoke more than 10 cigarettes a day, (2) smoke less than 10 cigarettes a day and previously failed to cease smoking, or (3) smoke fewer than 10 cigarettes a day and have a nicotine dependence score (Fagerstrom Test for Nicotine Dependence) of 4 points or more. The trial will consist of 4 weeks of treatment and a 20 week follow-up period. A statistician will perform the statistical analyses for both the intention-to-treat (all randomly assigned participants) and per-protocol (participants who completed the trial without any protocol deviations) data using SAS 9.1.3. Ethics and dissemination This study has been approved by the Institutional Review Board (IRB) of the Dunsan Korean Medicine Hospital of Daejeon University (IRB reference no: DJDSKH-15-BM-11–1, Protocol No. version 4.1.).The protocol will be reapproved by IRB if it requires amendment. The trial will be conducted according to the Declaration of Helsinki, 7th version (2013). This study is designed to minimise the risk to participants

  11. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  12. Standardized cardiovascular magnetic resonance imaging (CMR protocols, society for cardiovascular magnetic resonance: board of trustees task force on standardized protocols

    Directory of Open Access Journals (Sweden)

    Kim Raymond J

    2008-07-01

    Full Text Available Index 1. General techniques 1.1. Stress and safety equipment 1.2. Left ventricular (LV structure and function module 1.3. Right ventricular (RV structure and function module 1.4. Gadolinium dosing module. 1.5. First pass perfusion 1.6. Late gadolinium enhancement (LGE 2. Disease specific protocols 2.1. Ischemic heart disease 2.1.1. Acute myocardial infarction (MI 2.1.2. Chronic ischemic heart disease and viability 2.1.3. Dobutamine stress 2.1.4. Adenosine stress perfusion 2.2. Angiography: 2.2.1. Peripheral magnetic resonance angiography (MRA 2.2.2. Thoracic MRA 2.2.3. Anomalous coronary arteries 2.2.4. Pulmonary vein evaluation 2.3. Other 2.3.1. Non-ischemic cardiomyopathy 2.3.2. Arrhythmogenic right ventricular cardiomyopathy (ARVC 2.3.3. Congenital heart disease 2.3.4. Valvular heart disease 2.3.5. Pericardial disease 2.3.6. Masses

  13. Nuclear myocardial perfusion imaging using thallium-201 with a novel multifocal collimator SPECT/CT: IQ-SPECT versus conventional protocols in normal subjects.

    Science.gov (United States)

    Matsuo, Shinro; Nakajima, Kenichi; Onoguchi, Masahisa; Wakabayash, Hiroshi; Okuda, Koichi; Kinuya, Seigo

    2015-06-01

    A novel multifocal collimator, IQ-SPECT (Siemens) consists of SMARTZOOM, cardio-centric and 3D iterative SPECT reconstruction and makes it possible to perform MPI scans in a short time. The aims are to delineate the normal uptake in thallium-201 ((201)Tl) SPECT in each acquisition method and to compare the distribution between new and conventional protocol, especially in patients with normal imaging. Forty patients (eight women, mean age of 75 years) who underwent myocardial perfusion imaging were included in the study. All patients underwent one-day protocol perfusion scan after an adenosine-stress test and at rest after administering (201)Tl and showed normal results. Acquisition was performed on a Symbia T6 equipped with a conventional dual-headed gamma camera system (Siemens ECAM) and with a multifocal SMARTZOOM collimator. Imaging was performed with a conventional system followed by IQ-SPECT/computed tomography (CT). Reconstruction was performed with or without X-ray CT-derived attenuation correction (AC). Two nuclear physicians blinded to clinical information interpreted all myocardial perfusion images. A semi-quantitative myocardial perfusion was analyzed by a 17-segment model with a 5-point visual scoring. The uptake of each segment was measured and left ventricular functions were analyzed by QPS software. IQ-SPECT provided good or excellent image quality. The quality of IQ-SPECT images without AC was similar to those of conventional LEHR study. Mid-inferior defect score (0.3 ± 0.5) in the conventional LEHR study was increased significantly in IQ-SPECT with AC (0 ± 0). IQ-SPECT with AC improved the mid-inferior decreased perfusion shown in conventional images. The apical tracer count in IQ-SPECT with AC was decreased compared to that in LEHR (0.1 ± 0.3 vs. 0.5 ± 0.7, p IQ-SPECT was significantly higher than that from the LEHR collimator (p = 0.0009). The images of IQ-SPECT acquired in a short time are equivalent to that of conventional LEHR

  14. The ACCESS study a Zelen randomised controlled trial of a treatment package including problem solving therapy compared to treatment as usual in people who present to hospital after self-harm: study protocol for a randomised controlled trial

    Directory of Open Access Journals (Sweden)

    Parag Varsha

    2011-05-01

    Full Text Available Abstract Background People who present to hospital after intentionally harming themselves pose a common and important problem. Previous reviews of interventions have been inconclusive as existing trials have been under powered and done on unrepresentative populations. These reviews have however indicated that problem solving therapy and regular written communications after the self-harm attempt may be an effective treatment. This protocol describes a large pragmatic trial of a package of measures which include problem solving therapy, regular written communication, patient support, cultural assessment, improved access to primary care and a risk management strategy in people who present to hospital after self-harm using a novel design. Methods We propose to use a double consent Zelen design where participants are randomised prior to giving consent to enrol a large representative cohort of patients. The main outcome will be hospital attendance following repetition of self-harm, in the 12 months after recruitment with secondary outcomes of self reported self-harm, hopelessness, anxiety, depression, quality of life, social function and hospital use at three months and one year. Discussion A strength of the study is that it is a pragmatic trial which aims to recruit large numbers and does not exclude people if English is not their first language. A potential limitation is the analysis of the results which is complex and may underestimate any effect if a large number of people refuse their consent in the group randomised to problem solving therapy as they will effectively cross over to the treatment as usual group. However the primary analysis is a true intention to treat analysis of everyone randomised which includes both those who consent and do not consent to participate in the study. This provides information about how the intervention will work in practice in a representative population which is a major advance in this study compared to what has

  15. Long-Term Follow-Up Study of Young Adults Treated for Unilateral Complete Cleft Lip, Alveolus, and Palate by a Treatment Protocol Including Two-Stage Palatoplasty: Speech Outcomes

    Science.gov (United States)

    Bittermann, Dirk; Janssen, Laura; Bittermann, Gerhard Koendert Pieter; Boonacker, Chantal; Haverkamp, Sarah; de Wilde, Hester; Van Der Heul, Marise; Specken, Tom FJMC; Koole, Ron; Kon, Moshe; Breugem, Corstiaan Cornelis; Mink van der Molen, Aebele Barber

    2017-01-01

    Background No consensus exists on the optimal treatment protocol for orofacial clefts or the optimal timing of cleft palate closure. This study investigated factors influencing speech outcomes after two-stage palate repair in adults with a non-syndromal complete unilateral cleft lip and palate (UCLP). Methods This was a retrospective analysis of adult patients with a UCLP who underwent two-stage palate closure and were treated at our tertiary cleft centre. Patients ≥17 years of age were invited for a final speech assessment. Their medical history was obtained from their medical files, and speech outcomes were assessed by a speech pathologist during the follow-up consultation. Results Forty-eight patients were included in the analysis, with a mean age of 21 years (standard deviation, 3.4 years). Their mean age at the time of hard and soft palate closure was 3 years and 8.0 months, respectively. In 40% of the patients, a pharyngoplasty was performed. On a 5-point intelligibility scale, 84.4% received a score of 1 or 2; meaning that their speech was intelligible. We observed a significant correlation between intelligibility scores and the incidence of articulation errors (P<0.001). In total, 36% showed mild to moderate hypernasality during the speech assessment, and 11%–17% of the patients exhibited increased nasalance scores, assessed through nasometry. Conclusions The present study describes long-term speech outcomes after two-stage palatoplasty with hard palate closure at a mean age of 3 years old. We observed moderate long-term intelligibility scores, a relatively high incidence of persistent hypernasality, and a high pharyngoplasty incidence. PMID:28573094

  16. Long-Term Follow-Up Study of Young Adults Treated for Unilateral Complete Cleft Lip, Alveolus, and Palate by a Treatment Protocol Including Two-Stage Palatoplasty: Speech Outcomes

    Directory of Open Access Journals (Sweden)

    Isabelle Francisca Petronella Maria Kappen

    2017-05-01

    Full Text Available BackgroundNo consensus exists on the optimal treatment protocol for orofacial clefts or the optimal timing of cleft palate closure. This study investigated factors influencing speech outcomes after two-stage palate repair in adults with a non-syndromal complete unilateral cleft lip and palate (UCLP.MethodsThis was a retrospective analysis of adult patients with a UCLP who underwent two-stage palate closure and were treated at our tertiary cleft centre. Patients ≥17 years of age were invited for a final speech assessment. Their medical history was obtained from their medical files, and speech outcomes were assessed by a speech pathologist during the follow-up consultation.ResultsForty-eight patients were included in the analysis, with a mean age of 21 years (standard deviation, 3.4 years. Their mean age at the time of hard and soft palate closure was 3 years and 8.0 months, respectively. In 40% of the patients, a pharyngoplasty was performed. On a 5-point intelligibility scale, 84.4% received a score of 1 or 2; meaning that their speech was intelligible. We observed a significant correlation between intelligibility scores and the incidence of articulation errors (P<0.001. In total, 36% showed mild to moderate hypernasality during the speech assessment, and 11%–17% of the patients exhibited increased nasalance scores, assessed through nasometry.ConclusionsThe present study describes long-term speech outcomes after two-stage palatoplasty with hard palate closure at a mean age of 3 years old. We observed moderate long-term intelligibility scores, a relatively high incidence of persistent hypernasality, and a high pharyngoplasty incidence.

  17. Long-Term Follow-Up Study of Young Adults Treated for Unilateral Complete Cleft Lip, Alveolus, and Palate by a Treatment Protocol Including Two-Stage Palatoplasty: Speech Outcomes.

    Science.gov (United States)

    Kappen, Isabelle Francisca Petronella Maria; Bittermann, Dirk; Janssen, Laura; Bittermann, Gerhard Koendert Pieter; Boonacker, Chantal; Haverkamp, Sarah; de Wilde, Hester; Van Der Heul, Marise; Specken, Tom Fjmc; Koole, Ron; Kon, Moshe; Breugem, Corstiaan Cornelis; Mink van der Molen, Aebele Barber

    2017-05-01

    No consensus exists on the optimal treatment protocol for orofacial clefts or the optimal timing of cleft palate closure. This study investigated factors influencing speech outcomes after two-stage palate repair in adults with a non-syndromal complete unilateral cleft lip and palate (UCLP). This was a retrospective analysis of adult patients with a UCLP who underwent two-stage palate closure and were treated at our tertiary cleft centre. Patients ≥17 years of age were invited for a final speech assessment. Their medical history was obtained from their medical files, and speech outcomes were assessed by a speech pathologist during the follow-up consultation. Forty-eight patients were included in the analysis, with a mean age of 21 years (standard deviation, 3.4 years). Their mean age at the time of hard and soft palate closure was 3 years and 8.0 months, respectively. In 40% of the patients, a pharyngoplasty was performed. On a 5-point intelligibility scale, 84.4% received a score of 1 or 2; meaning that their speech was intelligible. We observed a significant correlation between intelligibility scores and the incidence of articulation errors (Pspeech assessment, and 11%-17% of the patients exhibited increased nasalance scores, assessed through nasometry. The present study describes long-term speech outcomes after two-stage palatoplasty with hard palate closure at a mean age of 3 years old. We observed moderate long-term intelligibility scores, a relatively high incidence of persistent hypernasality, and a high pharyngoplasty incidence.

  18. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  19. RAPP, a systematic e-assessment of postoperative recovery in patients undergoing day surgery: study protocol for a mixed-methods study design including a multicentre, two-group, parallel, single-blind randomised controlled trial and qualitative interview studies.

    Science.gov (United States)

    Nilsson, U; Jaensson, M; Dahlberg, K; Odencrants, S; Grönlund, Å; Hagberg, L; Eriksson, M

    2016-01-13

    Day surgery is a well-established practice in many European countries, but only limited information is available regarding postoperative recovery at home though there is a current lack of a standard procedure regarding postoperative follow-up. Furthermore, there is also a need for improvement of modern technology in assessing patient-related outcomes such as mobile applications. This article describes the Recovery Assessment by Phone Points (RAPP) study protocol, a mixed-methods study to evaluate if a systematic e-assessment follow-up in patients undergoing day surgery is cost-effective and improves postoperative recovery, health and quality of life. This study has a mixed-methods study design that includes a multicentre, two-group, parallel, single-blind randomised controlled trial and qualitative interview studies. 1000 patients >17 years of age who are undergoing day surgery will be randomly assigned to either e-assessed postoperative recovery follow-up daily in 14 days measured via smartphone app including the Swedish web-version of Quality of Recovery (SwQoR) or to standard care (ie, no follow-up). The primary aim is cost-effectiveness. Secondary aims are (A) to explore whether a systematic e-assessment follow-up after day surgery has a positive effect on postoperative recovery, health-related quality of life (QoL) and overall health; (B) to determine whether differences in postoperative recovery have an association with patient characteristic, type of surgery and anaesthesia; (C) to determine whether differences in health literacy have a substantial and distinct effect on postoperative recovery, health and QoL; and (D) to describe day surgery patient and staff experiences with a systematic e-assessment follow-up after day surgery.The primary aim will be measured at 2 weeks postoperatively and secondary outcomes (A-C) at 1 and 2 weeks and (D) at 1 and 4 months. NCT02492191; Pre-results. Published by the BMJ Publishing Group Limited. For permission to use

  20. New Zealand's Fourth National Communication under the United Nations Framework Convention on Climate Change. Including the Report on the Global Climate Observing System and the Report on Demonstrable Progress under the Kyoto Protocol

    International Nuclear Information System (INIS)

    2006-03-01

    The New Zealand Government is committed to playing its part in the global response to climate change. This Fourth National Communication provides a snapshot of New Zealand's progress with implementing the United Nations Framework Convention on Climate Change (UNFCCC). This document covers the period from the submission of the Third National Communication in January 2002 through to the end of December 2005. This document also contains New Zealand's Report on the Global Climate Observing System and the Report on Demonstrable Progress under the Kyoto Protocol. New Zealand's response to climate change has evolved substantially since the Third National Communication was submitted. On 19 December 2002, New Zealand became the 101st nation to ratify the Kyoto Protocol. In 2002, the New Zealand Parliament passed the Climate Change Response Act. This Act established a New Zealand climate change registry and corresponding institutional arrangements in accordance with Kyoto Protocol requirements. Other achievements are detailed throughout this Fourth National Communication. When the Government introduced its climate change policy package in 2002, it anticipated there would be three reviews of the package not later than 2005, 2007 and 2010. The reviews would be necessary to monitor progress with emissions reductions, assess the effectiveness of policies, and confirm that New Zealand was positioned to meet its commitments. The first of these reviews was commissioned by the Government in mid-2005 and completed by November 2005. The review concluded that some elements of the Government's 2002 climate change policy package should be modified to better position New Zealand to respond to the longer-term challenges of climate change. A key outcome of the policy review was the announcement by the newly elected Government in December 2005 that the previously announced carbon tax would not proceed. In addition, a suite of future work programmes would be required to inform Government

  1. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  2. Development of a Repeatable Protocol to Uniformly Coat Internal Complex Geometries of Fine Featured 3D Printed Objects with Ceramic Material, including Determination of Viscosity Limits to Properly Coat Certain Pore Sizes

    Energy Technology Data Exchange (ETDEWEB)

    Rogers, A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-05-18

    HEPA filters are commonly used in air filtration systems ranging in application from simple home systems to the more advanced networks used in research and development. Currently, these filters are most often composed of glass fibers with diameter on the order of one micron with polymer binders. These fibers, as well as the polymers used, are known to be fragile and can degrade or become extremely brittle with heat, severely limiting their use in high temperature applications. Ceramics are one promising alternative and can enhance the filtration capabilities compared to the current technology. Because ceramic materials are more thermally resistant and chemically stable, there is great interest in developing a repeatable protocol to uniformly coat fine featured polymer objects with ceramic material for use as a filter. The purpose of this experiment is to determine viscosity limits that are able to properly coat certain pore sizes in 3D printed objects, and additionally to characterize the coatings themselves. Latex paint was used as a surrogate because it is specifically designed to produce uniform coatings.

  3. Immunochemical protocols

    National Research Council Canada - National Science Library

    Pound, John D

    1998-01-01

    ... easy and important refinements often are not published. This much anticipated 2nd edition of Immunochemzcal Protocols therefore aims to provide a user-friendly up-to-date handbook of reliable techniques selected to suit the needs of molecular biologists. It covers the full breadth of the relevant established immunochemical methods, from protein blotting and immunoa...

  4. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  5. Protocol for a qualitative study exploring perspectives on the INternational CLassification of Diseases (11th revision); Using lived experience to improve mental health Diagnosis in NHS England: INCLUDE study.

    Science.gov (United States)

    Hackmann, Corinna; Green, Amanda; Notley, Caitlin; Perkins, Amorette; Reed, Geoffrey M; Ridler, Joseph; Wilson, Jon; Shakespeare, Tom

    2017-09-03

    Developed in dialogue with WHO, this research aims to incorporate lived experience and views in the refinement of the International Classification of Diseases Mental and Behavioural Disorders 11th Revision (ICD-11). The validity and clinical utility of psychiatric diagnostic systems has been questioned by both service users and clinicians, as not all aspects reflect their lived experience or are user friendly. This is critical as evidence suggests that diagnosis can impact service user experience, identity, service use and outcomes. Feedback and recommendations from service users and clinicians should help minimise the potential for unintended negative consequences and improve the accuracy, validity and clinical utility of the ICD-11. The name INCLUDE reflects the value of expertise by experience as all aspects of the proposed study are co-produced. Feedback on the planned criteria for the ICD-11 will be sought through focus groups with service users and clinicians. The data from these groups will be coded and inductively analysed using a thematic analysis approach. Findings from this will be used to form the basis of co-produced recommendations for the ICD-11. Two service user focus groups will be conducted for each of these diagnoses: Personality Disorder, Bipolar I Disorder, Schizophrenia, Depressive Disorder and Generalised Anxiety Disorder. There will be four focus groups with clinicians (psychiatrists, general practitioners and clinical psychologists). This study has received ethical approval from the Coventry and Warwickshire HRA Research Ethics Committee (16/WM/0479). The output for the project will be recommendations that reflect the views and experiences of experts by experience (service users and clinicians). The findings will be disseminated via conferences and peer-reviewed publications. As the ICD is an international tool, the aim is for the methodology to be internationally disseminated for replication by other groups. ClinicalTrials.gov: NCT03131505

  6. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  7. Study protocol

    DEFF Research Database (Denmark)

    Smith, Benjamin E; Hendrick, Paul; Bateman, Marcus

    2017-01-01

    avoidance behaviours, catastrophising, self-efficacy, sport and leisure activity participation, and general quality of life. Follow-up will be 3 and 6 months. The analysis will focus on descriptive statistics and confidence intervals. The qualitative components will follow a thematic analysis approach....... DISCUSSION: This study will evaluate the feasibility of running a definitive large-scale trial on patients with patellofemoral pain, within the NHS in the UK. We will identify strengths and weaknesses of the proposed protocol and the utility and characteristics of the outcome measures. The results from...... this study will inform the design of a multicentre trial. TRIAL REGISTRATION: ISRCTN35272486....

  8. Beyond protocols

    DEFF Research Database (Denmark)

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impact...... information on risk and the exploration of improved methods for decision making on biodiversity management. This is crucial for efficient conservation resource allocation and uptake by stakeholders and the public......., transparency and repeatability of assessments as well as the incorporation of uncertainty should all be explicitly considered. We recommend improved quality control of risk assessments through formalized peer review with clear feedback between assessors and reviewers. Alternatively, a consensus building...

  9. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  10. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  11. Dysphonia risk screening protocol

    Science.gov (United States)

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  12. Protocol Monitoring Energy Conservation; Protocol Monitoring Energiebesparing

    Energy Technology Data Exchange (ETDEWEB)

    Boonekamp, P.G.M. [ECN Beleidsstudies, Petten (Netherlands); Mannaerts, H. [Centraal Planburea CPB, Den Haag (Netherlands); Tinbergen, W. [Centraal Bureau voor de Statistiek CBS, Den Haag (Netherlands); Vreuls, H.H.J. [Nederlandse onderneming voor energie en milieu Novem, Utrecht (Netherlands); Wesselink, B. [Rijksinstituut voor Volksgezondheid en Milieuhygiene RIVM, Bilthoven (Netherlands)

    2001-12-01

    On request of the Dutch ministry of Economic Affairs five institutes have collaborated to create a 'Protocol Monitoring Energy Conservation', a common method and database to calculate the amount of energy savings realised in past years. The institutes concerned are the Central Bureau of Statistics (CBS), the Netherlands Bureau for Economic Policy Analysis (CPB), the Energy research Centre of the Netherlands (ECN), the National Agency for Energy and Environment (Novem) and the Netherlands Institute of Public Health and the Environment (RIVM). The institutes have agreed upon a clear definition of energy use and energy savings. The demarcation with renewable energy, the saving effects of substitution between energy carriers and the role of import and export of energy have been elaborated. A decomposition method is used to split up the observed change in energy use in a number of effects, on a national and sectoral level. This method includes an analysis of growth effects, effects of structural changes in production and consumption activities and savings on end use or with more efficient conversion processes. To calculate these effects the total energy use is desegregated as much as possible. For each segment a reference energy use is calculated according to the trend in a variable which is supposed to be representative for the use without savings. The difference with the actual energy use is taken as the savings realised. Results are given for the sectors households, industry, agriculture, services and government, transportation and the energy sector; as well as a national figure. A special feature of the protocol method is the application of primary energy use figures in the determination of savings for end users. This means that the use of each energy carrier is increased with a certain amount, according to the conversion losses caused elsewhere in the energy system. The losses concern the base year energy sector and losses abroad for imports of secondary

  13. Physical Therapy Protocols for Arthroscopic Bankart Repair.

    Science.gov (United States)

    DeFroda, Steven F; Mehta, Nabil; Owens, Brett D

    Outcomes after arthroscopic Bankart repair can be highly dependent on compliance and participation in physical therapy. Additionally, there are many variations in physician-recommended physical therapy protocols. The rehabilitation protocols of academic orthopaedic surgery departments vary widely despite the presence of consensus protocols. Descriptive epidemiology study. Level 3. Web-based arthroscopic Bankart rehabilitation protocols available online from Accreditation Council for Graduate Medical Education (ACGME)-accredited orthopaedic surgery programs were included for review. Individual protocols were reviewed to evaluate for the presence or absence of recommended therapies, goals for completion of ranges of motion, functional milestones, exercise start times, and recommended time to return to sport. Thirty protocols from 27 (16.4%) total institutions were identified out of 164 eligible for review. Overall, 9 (30%) protocols recommended an initial period of strict immobilization. Variability existed between the recommended time periods for sling immobilization (mean, 4.8 ± 1.8 weeks). The types of exercises and their start dates were also inconsistent. Goals to full passive range of motion (mean, 9.2 ± 2.8 weeks) and full active range of motion (mean, 12.2 ± 2.8 weeks) were consistent with other published protocols; however, wide ranges existed within the reviewed protocols as a whole. Only 10 protocols (33.3%) included a timeline for return to sport, and only 3 (10%) gave an estimate for return to game competition. Variation also existed when compared with the American Society of Shoulder and Elbow Therapists' (ASSET) consensus protocol. Rehabilitation protocols after arthroscopic Bankart repair were found to be highly variable. They also varied with regard to published consensus protocols. This discrepancy may lead to confusion among therapists and patients. This study highlights the importance of attending surgeons being very clear and specific with

  14. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  15. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  16. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  17. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  18. Using semantics for representing experimental protocols.

    Science.gov (United States)

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  19. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  20. The Geneva Protocol of 1925

    International Nuclear Information System (INIS)

    Mc Elroy, R.J.

    1991-01-01

    This paper reports that when President Gerald Ford signed the instruments of ratification for the Geneva Protocol of 1925 on January 22, 1975, a tortured, half-century-long chapter in U.S. arms control policy was brought to a close. Fifty years earlier, at the Geneva Conference for the Control of the International Trade in Arms, Munitions and Implements of War, the United States had played a key role in drafting and reaching agreement on the Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases and of Bacteriological Methods of Warfare. The protocol, signed by thirty nations, including the United States, on June 17, 1925, prohibits the use in war of asphyxiating, poisonous or other gases, and of all analogous liquids, materials or devices as well as the use of bacteriological methods of warfare

  1. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  2. Feasibility and safety of adenosine cardiovascular magnetic resonance in patients with MR conditional pacemaker systems at 1.5 Tesla.

    Science.gov (United States)

    Klein-Wiele, Oliver; Garmer, Marietta; Urbien, Rhyan; Busch, Martin; Kara, Kaffer; Mateiescu, Serban; Grönemeyer, Dietrich; Schulte-Hermes, Michael; Garbrecht, Marc; Hailer, Birgit

    2015-12-22

    Cardiovascular Magnetic Resonance (CMR) with adenosine stress is a valuable diagnostic tool in coronary artery disease (CAD). However, despite the development of MR conditional pacemakers CMR is not yet established in clinical routine for pacemaker patients with known or suspected CAD. A possible reason is that adenosine stress perfusion for ischemia detection in CMR has not been studied in patients with cardiac conduction disease requiring pacemaker therapy. Other than under resting conditions it is unclear whether MR safe pacing modes (paused pacing or asynchronous mode) can be applied safely because the effect of adenosine on heart rate is not precisely known in this entity of patients. We investigate for the first time feasibility and safety of adenosine stress CMR in pacemaker patients in clinical routine and evaluate a pacing protocol that considers heart rate changes under adenosine. We retrospectively analyzed CMR scans of 24 consecutive patients with MR conditional pacemakers (mean age 72.1 ± 11.0 years) who underwent CMR in clinical routine for the evaluation of known or suspected CAD. MR protocol included cine imaging, adenosine stress perfusion and late gadolinium enhancement. Pacemaker indications were sinus node dysfunction (n = 18) and second or third degree AV block (n = 6). Under a pacing protocol intended to avoid competitive pacing on the one hand and bradycardia due to AV block on the other no arrhythmia occurred. Pacemaker stimulation was paused to prevent competitive pacing in sinus node dysfunction with resting heart rate >45 bpm. Sympatho-excitatory effect of adenosine led to a significant acceleration of heart rate by 12.3 ± 8.3 bpm (p pacemakers. Heart rate response to adenosine has to be considered for the choice of pacing modes during CMR.

  3. Adaptive security protocol selection for mobile computing

    NARCIS (Netherlands)

    Pontes Soares Rocha, B.; Costa, D.N.O.; Moreira, R.A.; Rezende, C.G.; Loureiro, A.A.F.; Boukerche, A.

    2010-01-01

    The mobile computing paradigm has introduced new problems for application developers. Challenges include heterogeneity of hardware, software, and communication protocols, variability of resource limitations and varying wireless channel quality. In this scenario, security becomes a major concern for

  4. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  5. New seismograph includes filters

    Energy Technology Data Exchange (ETDEWEB)

    1979-11-02

    The new Nimbus ES-1210 multichannel signal enhancement seismograph from EG and G geometrics has recently been redesigned to include multimode signal fillers on each amplifier. The ES-1210F is a shallow exploration seismograph for near subsurface exploration such as in depth-to-bedrock, geological hazard location, mineral exploration, and landslide investigations.

  6. Analytic device including nanostructures

    KAUST Repository

    Di Fabrizio, Enzo M.; Fratalocchi, Andrea; Totero Gongora, Juan Sebastian; Coluccio, Maria Laura; Candeloro, Patrizio; Cuda, Gianni

    2015-01-01

    A device for detecting an analyte in a sample comprising: an array including a plurality of pixels, each pixel including a nanochain comprising: a first nanostructure, a second nanostructure, and a third nanostructure, wherein size of the first nanostructure is larger than that of the second nanostructure, and size of the second nanostructure is larger than that of the third nanostructure, and wherein the first nanostructure, the second nanostructure, and the third nanostructure are positioned on a substrate such that when the nanochain is excited by an energy, an optical field between the second nanostructure and the third nanostructure is stronger than an optical field between the first nanostructure and the second nanostructure, wherein the array is configured to receive a sample; and a detector arranged to collect spectral data from a plurality of pixels of the array.

  7. Saskatchewan resources. [including uranium

    Energy Technology Data Exchange (ETDEWEB)

    1979-09-01

    The production of chemicals and minerals for the chemical industry in Saskatchewan are featured, with some discussion of resource taxation. The commodities mentioned include potash, fatty amines, uranium, heavy oil, sodium sulfate, chlorine, sodium hydroxide, sodium chlorate and bentonite. Following the successful outcome of the Cluff Lake inquiry, the uranium industry is booming. Some developments and production figures for Gulf Minerals, Amok, Cenex and Eldorado are mentioned.

  8. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  9. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  10. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  11. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  12. Being Included and Excluded

    DEFF Research Database (Denmark)

    Korzenevica, Marina

    2016-01-01

    Following the civil war of 1996–2006, there was a dramatic increase in the labor mobility of young men and the inclusion of young women in formal education, which led to the transformation of the political landscape of rural Nepal. Mobility and schooling represent a level of prestige that rural...... politics. It analyzes how formal education and mobility either challenge or reinforce traditional gendered norms which dictate a lowly position for young married women in the household and their absence from community politics. The article concludes that women are simultaneously excluded and included from...... community politics. On the one hand, their mobility and decision-making powers decrease with the increase in the labor mobility of men and their newly gained education is politically devalued when compared to the informal education that men gain through mobility, but on the other hand, schooling strengthens...

  13. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  14. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  15. Field Monitoring Protocol. Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Earle, L. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Christensen, D. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Maguire, J. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Wilson, E. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Hancock, C. E. [Mountain Energy Partnership, Longmont, CO (United States)

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  16. Field Monitoring Protocol: Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  17. Recursion vs. Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2005-01-01

    We use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek's spect...... of messages in the sense of Amadio, Lugiez and Vanackere. We conclude by showing that reachability analysis for a replicative variant of the protocol becomes decidable....

  18. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  19. The Development of Korea Additional Protocol System

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yeo, Jin Kyun

    2008-01-01

    The Agreement between the Republic of Korea (ROK) and the IAEA for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Safeguards Agreement) entered into force on 14 November 1975. The Additional Protocol to the Safeguards Agreement (the Additional Protocol) was signed on 21 June 1999 and entered into force on 19 February 2004. ROK has been submitting annual updated reports of initial declaration on every May 15th since August 2004. Additional protocol reports were submitted through Protocol Reporter provided by IAEA. Annual declarations were simply uploaded and stored in the Accounting Information Treatment System of KINAC, which did not provide data analysis and management function. There have been demands for improvement to handle ever-increasing information. KAPS (Korea Additional Protocol System) has been developed to assist and administrate the additional protocol related works effectively. The new system enables integrated management including composition of additional protocol report and version control, periodical update of related information, results of IAEA complementary access to each facility

  20. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  1. MR efficiency using automated MRI-desktop eProtocol

    Science.gov (United States)

    Gao, Fei; Xu, Yanzhe; Panda, Anshuman; Zhang, Min; Hanson, James; Su, Congzhe; Wu, Teresa; Pavlicek, William; James, Judy R.

    2017-03-01

    MRI protocols are instruction sheets that radiology technologists use in routine clinical practice for guidance (e.g., slice position, acquisition parameters etc.). In Mayo Clinic Arizona (MCA), there are over 900 MR protocols (ranging across neuro, body, cardiac, breast etc.) which makes maintaining and updating the protocol instructions a labor intensive effort. The task is even more challenging given different vendors (Siemens, GE etc.). This is a universal problem faced by all the hospitals and/or medical research institutions. To increase the efficiency of the MR practice, we designed and implemented a web-based platform (eProtocol) to automate the management of MRI protocols. It is built upon a database that automatically extracts protocol information from DICOM compliant images and provides a user-friendly interface to the technologists to create, edit and update the protocols. Advanced operations such as protocol migrations from scanner to scanner and capability to upload Multimedia content were also implemented. To the best of our knowledge, eProtocol is the first MR protocol automated management tool used clinically. It is expected that this platform will significantly improve the radiology operations efficiency including better image quality and exam consistency, fewer repeat examinations and less acquisition errors. These protocols instructions will be readily available to the technologists during scans. In addition, this web-based platform can be extended to other imaging modalities such as CT, Mammography, and Interventional Radiology and different vendors for imaging protocol management.

  2. Advanced dementia pain management protocols.

    Science.gov (United States)

    Montoro-Lorite, Mercedes; Canalias-Reverter, Montserrat

    Pain management in advanced dementia is complex because of neurological deficits present in these patients, and nurses are directly responsible for providing interventions for the evaluation, management and relief of pain for people suffering from this health problem. In order to facilitate and help decision-makers, pain experts recommend the use of standardized protocols to guide pain management, but in Spain, comprehensive pain management protocols have not yet been developed for advanced dementia. This article reflects the need for an integrated management of pain in advanced dementia. From the review and analysis of the most current and relevant studies in the literature, we performed an approximation of the scales for the determination of pain in these patients, with the observational scale PAINAD being the most recommended for the hospital setting. In addition, we provide an overview for comprehensive management of pain in advanced dementia through the conceptual framework «a hierarchy of pain assessment techniques by McCaffery and Pasero» for the development and implementation of standardized protocols, including a four-phase cyclical process (evaluation, planning/performance, revaluation and recording), which can facilitate the correct management of pain in these patients. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.

  3. The Kyoto Protocol. An economic appraisal

    International Nuclear Information System (INIS)

    Grubb, M.

    2000-05-01

    This paper examines the overall economics of the Kyoto Protocol on climate change, in three main parts. The first part explores the structure of the Protocol and how this matches against classical economic criteria of an 'optimal' climate change agreement. This discussion also considers the nature of and reasons for shortcomings, and the prospects for its evolution. Given the various flexibilities in the agreement, the Kyoto Protocol is far more economically efficient in its structure than any previous global environmental agreement. The central conclusion is that, from an economic perspective, the Protocol's structure for industrialised country commitments is as good as could reasonably be expected. The second part of the paper explores more closely the economics of the commitments themselves and how they combine with the various flexibilities, briefly reviewing the available literature and using a simple spreadsheet model of how the commitments might combine with trading mechanisms under a range of assumptions. Flexibility is intrinsic and necessary, but it is argued that the allocations to Russia and Ukraine in particular mean that unlimited flexibility could render the Protocol's commitments weaker in their impacts than is economically desirable to address climate change. It is argued that, should this prove to be the case, access to the large surplus in the transition economies could be used as a control valve to limit the costs of the Protocol to within acceptable limits. Finally, the paper considers the issues of developing country involvement in the Kyoto Protocol, and the Protocol's longer-term impact and evolution, including its impact on technological evolution and dissemination and the evolution of future commitments. It is argued that taking account of such issues critically affects views of the Protocol

  4. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  5. ASSESSMENT OF RIP-V1 AND OSPF-V2 PROTOCOL WITH CONSIDERATION OF CONVERGENCE CRITERIA AND SENDING PROTOCOLS TRAFFIC

    Directory of Open Access Journals (Sweden)

    Hamed Jelodar

    2014-03-01

    Full Text Available Routing Protocols are underlying principles in networks like internet, transport and mobile. Routing Protocols include a series of rules and algorithms that consider routing metric and select the best way for sending healthy data packets from origin to destination. Dynamic routing protocol compatible to topology has a changeable state. RIP and OSPF are dynamic routing protocol that we consider criteria like convergence and sending protocols traffic assessment RIP first version and OSPF second version. By the test we have done on OPNET stimulation we understood that the OSPF protocol was more efficient than RIP protocol.

  6. Desensitization protocols and their outcome.

    Science.gov (United States)

    Marfo, Kwaku; Lu, Amy; Ling, Min; Akalin, Enver

    2011-04-01

    In the last decade, transplantation across previously incompatible barriers has increasingly become popular because of organ donor shortage, availability of better methods of detecting and characterizing anti-HLA antibodies, ease of diagnosis, better understanding of antibody-mediated rejection, and the availability of effective regimens. This review summarizes all manuscripts published since the first publication in 2000 on desensitized patients and discusses clinical outcomes including acute and chronic antibody-mediated rejection rate, the new agents available, kidney paired exchange programs, and the future directions in sensitized patients. There were 21 studies published between 2000 and 2010, involving 725 patients with donor-specific anti-HLA antibodies (DSAs) who underwent kidney transplantation with different desensitization protocols. All studies were single center and retrospective. The patient and graft survival were 95% and 86%, respectively, at a 2-year median follow-up. Despite acceptable short-term patient and graft survivals, acute rejection rate was 36% and acute antibody-mediated rejection rate was 28%, which is significantly higher than in nonsensitized patients. Recent studies with longer follow-up of those patients raised concerns about long-term success of desensitization protocols. The studies utilizing protocol biopsies in desensitized patients also reported higher subclinical and chronic antibody-mediated rejection. An association between the strength of DSAs determined by median fluorescence intensity values of Luminex single-antigen beads and risk of rejection was observed. Two new agents, bortezomib, a proteasome inhibitor, and eculizumab, an anti-complement C5 antibody, were recently introduced to desensitization protocols. An alternative intervention is kidney paired exchange, which should be considered first for sensitized patients. © 2011 by the American Society of Nephrology

  7. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  8. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  9. SPP: A data base processor data communications protocol

    Science.gov (United States)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  10. Optical protocols for terabit networks

    Science.gov (United States)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  11. Immunocytochemical methods and protocols

    National Research Council Canada - National Science Library

    Javois, Lorette C

    1999-01-01

    ... monoclonal antibodies to study cell differentiation during embryonic development. For a select few disciplines volumes have been published focusing on the specific application of immunocytochemical techniques to that discipline. What distinguished Immunocytochemical Methods and Protocols from earlier books when it was first published four years ago was i...

  12. Critical Response Protocol

    Science.gov (United States)

    Ellingson, Charlene; Roehrig, Gillian; Bakkum, Kris; Dubinsky, Janet M.

    2016-01-01

    This article introduces the Critical Response Protocol (CRP), an arts-based technique that engages students in equitable critical discourse and aligns with the "Next Generation Science Standards" vision for providing students opportunities for language learning while advancing science learning (NGSS Lead States 2013). CRP helps teachers…

  13. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification. In r...

  14. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one...

  15. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  16. Multiprofissional electronic protocol in ophtalmology with enfasis in strabismus

    Directory of Open Access Journals (Sweden)

    CHRISTIE GRAF RIBEIRO

    Full Text Available ABSTRACT Objective: to create and validate an electronic database in ophthalmology focused on strabismus, to computerize this database in the form of a systematic data collection software named Electronic Protocol, and to incorporate this protocol into the Integrated System of Electronic Protocols (SINPE(c. Methods: this is a descriptive study, with the methodology divided into three phases: (1 development of a theoretical ophthalmologic database with emphasis on strabismus; (2 computerization of this theoretical ophthalmologic database using SINPE(c and (3 interpretation of the information with demonstration of results to validate the protocol. We inputed data from the charts of fifty patients with known strabismus through the Electronic Protocol for testing and validation. Results: the new electronic protocol was able to store information regarding patient history, physical examination, laboratory exams, imaging results, diagnosis and treatment of patients with ophthalmologic diseases, with emphasis on strabismus. We included 2,141 items in this master protocol and created 20 new specific electronic protocols for strabismus, each with its own specifics. Validation was achieved through correlation and corroboration of the symptoms and confirmed diagnoses of the fifty included patients with the diagnostic criteria for the twenty new strabismus protocols. Conclusion: a new, validated electronic database focusing on ophthalmology, with emphasis on strabismus, was successfully created through the standardized collection of information, and computerization of the database using proprietary software. This protocol is ready for deployment to facilitate data collection, sorting and application for practitioners and researchers in numerous specialties.

  17. Mac protocols for wireless sensor network (wsn): a comparative study

    International Nuclear Information System (INIS)

    Arshad, J.; Akram, Q.; Saleem, Y.

    2014-01-01

    Data communication between nodes is carried out under Medium Access Control (MAC) protocol which is defined at data link layer. The MAC protocols are responsible to communicate and coordinate between nodes according to the defined standards in WSN (Wireless Sensor Networks). The design of a MAC protocol should also address the issues of energy efficiency and transmission efficiency. There are number of MAC protocols that exist in the literature proposed for WSN. In this paper, nine MAC protocols which includes S-MAC, T-MAC, Wise-MAC, Mu-MAC, Z-MAC, A-MAC, D-MAC, B-MAC and B-MAC+ for WSN have been explored, studied and analyzed. These nine protocols are classified in contention based and hybrid (combination of contention and schedule based) MAC protocols. The goal of this comparative study is to provide a basis for MAC protocols and to highlight different mechanisms used with respect to parameters for the evaluation of energy and transmission efficiency in WSN. This study also aims to give reader a better understanding of the concepts, processes and flow of information used in these MAC protocols for WSN. A comparison with respect to energy reservation scheme, idle listening avoidance, latency, fairness, data synchronization, and throughput maximization has been presented. It was analyzed that contention based MAC protocols are less energy efficient as compared to hybrid MAC protocols. From the analysis of contention based MAC protocols in term of energy consumption, it was being observed that protocols based on preamble sampling consume lesser energy than protocols based on static or dynamic sleep schedule. (author)

  18. Automatic Generation of Network Protocol Gateways

    DEFF Research Database (Denmark)

    Bromberg, Yérom-David; Réveillère, Laurent; Lawall, Julia

    2009-01-01

    for describing protocol behaviors, message structures, and the gateway logic.  Z2z includes a compiler that checks essential correctness properties and produces efficient code. We have used z2z to develop a number of gateways, including SIP to RTSP, SLP to UPnP, and SMTP to SMTP via HTTP, involving a range......The emergence of networked devices in the home has made it possible to develop applications that control a variety of household functions. However, current devices communicate via a multitude of incompatible protocols, and thus gateways are needed to translate between them.  Gateway construction......, however, requires an intimate knowledge of the relevant protocols and a substantial understanding of low-level network programming, which can be a challenge for many application programmers. This paper presents a generative approach to gateway construction, z2z, based on a domain-specific language...

  19. The development of standard operating protocols for paediatric radiology

    International Nuclear Information System (INIS)

    Hardwick, J.; Mencik, C.; McLaren, C.; Young, C.; Scadden, S.; Mashford, P.; McHugh, K.; Beckett, M.; Calvert, M.; Marsden, P.J.

    2001-01-01

    This paper describes how the requirement for operating protocols for standard radiological practice was expanded to provide a comprehensive aide to the operator conducting a medical exposure. The protocols adopted now include justification criteria, patient preparation, radiographic technique, standard exposure charts, diagnostic reference levels and image quality criteria. In total, the protocols have been welcomed as a tool for ensuring that medical exposures are properly optimised. (author)

  20. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  1. Epistemic Protocols for Distributed Gossiping

    Directory of Open Access Journals (Sweden)

    Krzysztof R. Apt

    2016-06-01

    Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.

  2. Diplomacy and Diplomatic Protocol

    Directory of Open Access Journals (Sweden)

    Lect. Ph.D Oana Iucu

    2008-12-01

    Full Text Available The present study aims to observe relationships and determining factors between diplomacyand diplomatic protocol as outlined by historical and contextual analyses. The approach is very dynamic,provided that concepts are able to show their richness, antiquity and polyvalence at the level of connotations,semantics, grammatical and social syntax. The fact that this information is up to date determines anattitude of appreciation and a state of positive contamination.

  3. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  4. Protocol Monitoring Passive Solar Energy

    International Nuclear Information System (INIS)

    Van den Ham, E.R.; Bosselaar, L.

    1998-01-01

    A method has been developed by means of which the contribution of passive solar energy to the Dutch energy balance can be quantified univocally. The contribution was 57 PJ in 1990 and also 57 PJ in 1995. The efficiency of passive solar energy systems increased from -31.5% to -28.1% in the period 1990-1995, mainly as a result of the use of extra insulating glazing. As a result of the reduction of energy consumption for heating in houses it is expected that the extra contribution of 2 PJ will not be realized in the year 2010. It is suggested that the method to determine the absolute contribution of passive solar energy to the energy demand of dwellings is to be included in the protocol monitoring renewable energy. For the method to be included in the energy statistics of Statistics Netherlands (CBS) it can be considered only to take into account the difference compared to 1990. 11 refs

  5. Analysis of limiting information characteristics of quantum-cryptography protocols

    International Nuclear Information System (INIS)

    Sych, D V; Grishanin, Boris A; Zadkov, Viktor N

    2005-01-01

    The problem of increasing the critical error rate of quantum-cryptography protocols by varying a set of letters in a quantum alphabet for space of a fixed dimensionality is studied. Quantum alphabets forming regular polyhedra on the Bloch sphere and the continual alphabet equally including all the quantum states are considered. It is shown that, in the absence of basis reconciliation, a protocol with the tetrahedral alphabet has the highest critical error rate among the protocols considered, while after the basis reconciliation, a protocol with the continual alphabet possesses the highest critical error rate. (quantum optics and quantum computation)

  6. Radio protocols for LTE and LTE-advanced

    CERN Document Server

    Yi, SeungJune; Lee, YoungDae; Park, SungJun; Jung, SungHoon

    2012-01-01

    Provides a unique focus on radio protocols for LTE and LTE-Advanced (LTE-A) Giving readers a valuable understanding of LTE radio protocols, this book covers LTE (Long-Term Evolution) Layer 2/3 radio protocols as well as new features including LTE-Advanced. It is divided into two sections to differentiate between the two technologies' characteristics. The authors systematically explain the design principles and functions of LTE radio protocols during the development of mobile handsets. The book also provides essential knowledge on the interaction between mobile networks a

  7. Recursion Versus Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Hüttel, Hans; Srba, Jiri

    2005-01-01

    We use some very recent techniques from process algebra to draw interesting conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbee...

  8. Study Application of RADIUS Protocol on Ethernet

    Institute of Scientific and Technical Information of China (English)

    GUO Fang; YANG Huan-yu; LI Hong

    2004-01-01

    This paper presents how to apply the RADIUS (Remote Authentication Dial In User Service)protocol ,which is generally applied to dial-up network, to the authentication & charge of Broad Band accessing control system on Ethernet. It is provided that the Broad Band accessing control system included a self-designed communication protocol is used in communicating between an terminal user and Network Access Server .The interface module on the servers side and the Radius system is also given in this article.

  9. An Experimental Protocol for Maternal Pulmonary Exposure in Developmental Toxicology

    DEFF Research Database (Denmark)

    Jackson, Petra; Lund, Søren P.; Kristiansen, Gitte

    2011-01-01

    To establish a protocol for studying effects of pulmonary exposure in developmental toxicity studies, the effects of intratracheal sham instillation under short-term isoflurane anaesthesia were evaluated with a protocol including multiple instillations during gestation. Twelve time-mated mice (C5...

  10. Two Cheers for the Trafficking Protocol

    Directory of Open Access Journals (Sweden)

    Anne T Gallagher

    2015-04-01

    Full Text Available The Trafficking Protocol makes an easy target for attack. Its origins lie in an attempt to control a particularly exploitative form of migration that was challenging the ability of States to control their own borders. Its parent instrument is a framework agreement to address transnational organised crime. While paying fleeting attention to the rights of victims, the Protocol, with its emphasis on criminalisation and border protection is nowhere near being a human rights treaty. On top of all that it does not even have a credible enforcement mechanism, allowing states parties wide latitude in interpreting and applying their obligations. Strangely, these seemingly insurmountable flaws have not stopped the Protocol’s emergence as perhaps the single most important development in the fight against human trafficking. Without the Protocol, arguments around definitions would have continued to block the evolution of principles and rules. Without the Protocol it is likely that the human rights system would have continued its shameful tradition of sidelining issues such as forced labour, forced sex, forced marriage and the ritual exploitation of migrant workers through debt. Most critically, the Protocol provided the impetus and template for a series of legal and political developments that, over time, have served to ameliorate some of its greatest weaknesses, including the lack of human rights protections and of a credible oversight mechanism.

  11. Magnetic resonance imaging protocols for paediatric neuroradiology

    International Nuclear Information System (INIS)

    Saunders, Dawn E.; Thompson, Clare; Gunny, Roxanne; Jones, Rod; Cox, Tim; Chong, Wui Khean

    2007-01-01

    Increasingly, radiologists are encouraged to have protocols for all imaging studies and to include imaging guidelines in care pathways set up by the referring clinicians. This is particularly advantageous in MRI where magnet time is limited and a radiologist's review of each patient's images often results in additional sequences and longer scanning times without the advantage of improvement in diagnostic ability. The difficulties of imaging small children and the challenges presented to the radiologist as the brain develops are discussed. We present our protocols for imaging the brain and spine of children based on 20 years experience of paediatric neurological MRI. The protocols are adapted to suit children under the age of 2 years, small body parts and paediatric clinical scenarios. (orig.)

  12. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  13. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Human Resources Division

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  14. Sincalide - the final protocol

    International Nuclear Information System (INIS)

    Clarke, E.A.; Notghi, A.; Hesslewood, S.R.; Harding, L.K.

    2002-01-01

    Full text: HIDA biliary studies examine the gallbladder (GB) to give a percentage ejection fraction (EF). Porcine CCK was an accepted agent for stimulating the GB prior to being withdrawn in the UK from 1998. Sincalide (a synthetic CCK) was the suggested replacement. We have tried many administration regimes in an attempt to get results comparable with our established CCK protocols. Dose concentration and length of infusion times have been studied. Initially a dose of 10 ngm/kg/min given over 2 minutes (manufacturer's recommended dose) was used. This gave falsely low ejection fractions. The dose was reduced to 3 ngm/kg/min over 3 minutes as it was felt the higher dose may be causing constriction of the sphincter of Oddi. This gave a slight improvement with 22 % of patients having normal EF (>35 %). The length of infusion was extended to 15 minutes and the dose concentration reduced again to 0.6 ngm/kg/min. 62 % of patients had a normal EF. However, on many of the curves the gallbladder was still contracting on completion of the 15 minute infusion and began to refill immediately after stopping Sincalide. A further change of protocol was indicated. The infusion time was extended to 30 minutes and the dose concentration per minute kept the same. Imaging began at 30 minutes post HIDA injection and continued for a total of 50 minutes. Sincalide infusion began at 35 minutes if a GB was visualized. This protocol has been performed on 17 patients. 53 % of these had a normal result (comparable with a normal rate of 40 % previously established with CCK) with a mean EF of 60 %. The mean EF of patients with abnormal studies was 15 %. Curves showed a plateau by 30 minutes in 94 % of patients indicating that gallbladder contraction was complete. No normal range is available so results were compared with ultrasound (US). All patients who had an abnormal US scan also had abnormal HIDA results. Three patients had a normal US scan and abnormal HIDA study. These are currently

  15. Distributed Network Protocols

    Science.gov (United States)

    1980-07-01

    MONITORING AGENCY NAME & ADDRESS(II different from Controlting Office) IS. SECURITY CLASS. (of this report) S Office of Naval Research Unclassified...All protocols are extended to networks with changing. topology. S80 8 4 246 DD0I iA 1473 EDITION OF INOV 65 IS OBSOLETE 8 0 24 SECURITY CLASSIFICATION...to the netowrk . f) Each node knows its adjacent links, but not necessarily the identity of its neighbors, i.e. the nodes at the other end of the links

  16. Direct data access protocols benchmarking on DPM

    Science.gov (United States)

    Furano, Fabrizio; Devresse, Adrien; Keeble, Oliver; Mancinelli, Valentina

    2015-12-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring information about any data access protocol to the same monitoring infrastructure that is used to monitor the Xrootd deployments. Our goal is to evaluate under which circumstances the HTTP-based protocols can be good enough for batch or interactive data access. In this contribution we show and discuss the results that our test systems have collected under the circumstances that include ROOT analyses using TTreeCache and stress tests on the metadata performance.

  17. Fetal MRI: techniques and protocols

    International Nuclear Information System (INIS)

    Prayer, Daniela; Brugger, Peter Christian; Prayer, Lucas

    2004-01-01

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  18. Fetal MRI: techniques and protocols

    Energy Technology Data Exchange (ETDEWEB)

    Prayer, Daniela [Department of Neuroradiology, University Clinics of Radiodiagnostics, Medical University Vienna, Waehringerguertel 18-10, 1090, Vienna (Austria); Brugger, Peter Christian [Department of Anatomy, Integrative Morphology Group, Medical University Vienna (Austria); Prayer, Lucas [Diagnosezentrum Urania, Vienna (Austria)

    2004-09-01

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  19. A Geographical Heuristic Routing Protocol for VANETs

    Science.gov (United States)

    Urquiza-Aguiar, Luis; Tripp-Barba, Carolina; Aguilar Igartua, Mónica

    2016-01-01

    Vehicular ad hoc networks (VANETs) leverage the communication system of Intelligent Transportation Systems (ITS). Recently, Delay-Tolerant Network (DTN) routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR) protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation). PMID:27669254

  20. [Computerized clinical protocol for occlusion].

    Science.gov (United States)

    Salsench, J; Ferrer, J; Nogueras, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself. In this work we all data collected in the protocol and we give the explanations of each concept.

  1. Telomerase Repeated Amplification Protocol (TRAP).

    Science.gov (United States)

    Mender, Ilgen; Shay, Jerry W

    2015-11-20

    Telomeres are found at the end of eukaryotic linear chromosomes, and proteins that bind to telomeres protect DNA from being recognized as double-strand breaks thus preventing end-to-end fusions (Griffith et al. , 1999). However, due to the end replication problem and other factors such as oxidative damage, the limited life span of cultured cells (Hayflick limit) results in progressive shortening of these protective structures (Hayflick and Moorhead, 1961; Olovnikov, 1973). The ribonucleoprotein enzyme complex telomerase-consisting of a protein catalytic component hTERT and a functional RNA component hTR or hTERC - counteracts telomere shortening by adding telomeric repeats to the end of chromosomes in ~90% of primary human tumors and in some transiently proliferating stem-like cells (Shay and Wright, 1996; Shay and Wright, 2001). This results in continuous proliferation of cells which is a hallmark of cancer. Therefore, telomere biology has a central role in aging, cancer progression/metastasis as well as targeted cancer therapies. There are commonly used methods in telomere biology such as Telomere Restriction Fragment (TRF) (Mender and Shay, 2015b), Telomere Repeat Amplification Protocol (TRAP) and Telomere dysfunction Induced Foci (TIF) analysis (Mender and Shay, 2015a). In this detailed protocol we describe Telomere Repeat Amplification Protocol (TRAP). The TRAP assay is a popular method to determine telomerase activity in mammalian cells and tissue samples (Kim et al. , 1994). The TRAP assay includes three steps: extension, amplification, and detection of telomerase products. In the extension step, telomeric repeats are added to the telomerase substrate (which is actually a non telomeric oligonucleotide, TS) by telomerase. In the amplification step, the extension products are amplified by the polymerase chain reaction (PCR) using specific primers (TS upstream primer and ACX downstream primer) and in the detection step, the presence or absence of telomerase is

  2. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  3. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  4. Operating systems and network protocols for wireless sensor networks.

    Science.gov (United States)

    Dutta, Prabal; Dunkels, Adam

    2012-01-13

    Sensor network protocols exist to satisfy the communication needs of diverse applications, including data collection, event detection, target tracking and control. Network protocols to enable these services are constrained by the extreme resource scarcity of sensor nodes-including energy, computing, communications and storage-which must be carefully managed and multiplexed by the operating system. These challenges have led to new protocols and operating systems that are efficient in their energy consumption, careful in their computational needs and miserly in their memory footprints, all while discovering neighbours, forming networks, delivering data and correcting failures.

  5. Hybrid protocols plus natural treatments for inflammatory conditions.

    Science.gov (United States)

    1998-01-01

    Hybrid protocols combine one, two, or three pharmaceutical drugs with several nutritional or immune-based therapies. These protocols are not limited solely to FDA-approved drugs or strictly to alternative therapies. The rationale for using a hybrid protocol is to find an effective antiviral regimen that also restores immune function. The goal is to obtain the benefits of protease inhibitors without viral resistance and side effects which include problems with fat metabolism and cholesterol levels. Natural treatments for inflammatory conditions are also described. Options include licorice root, ginger root, and slippery elm.

  6. Dosimetry in CBCT with different protocols: emphasis on small FOVs including exams for TMJ

    Energy Technology Data Exchange (ETDEWEB)

    Nascimento, Helena Aguiar Ribeiro; Nascimento, Eduarda Helena Leandro; Freitas, Deborah Queiroz, E-mail: eduarda.hln@gmail.com [Universidade de Campinas (UNICAMP), Piracicaba, SP (Brazil). Departmento de Diagnose Oral; Andrade, Marcos Ely Almeida [Universidade Federal de Pernambuco (UFPE), Recife, PE (Brazil). Departmento de Energia Nuclear; Frazão, Marco Antonio Gomes [Faculdade de Odontologia de Recife (FOR), Recife, PE (Brazil). Divisao de Radiologia Oral; Ramos-Perez, Flavia Maria Moraes [Universidade Federal de Pernambuco (UFPE), Recife, PE (Brazil). Departmento de Clinica e Odontologica Preventiva

    2017-07-15

    This study aimed to estimate the absorbed dose in cone beam computed tomography (CBCT) exams according to different exposure parameters and size and position of the field of view (FOV). In addition was compared the absorbed dose of two smaller FOV scans with that of a larger FOV scan for evaluation of temporomandibular joint (TMJ), as it is a bilateral structure. CBCT scans were obtained on OP300 Maxio unit varying scanning mode (standard, high and endo) as well as size (5 x 5, 6 x 8 and 8 x 15 cm) and positioning of FOV. With a small FOV, different areas were scanned (maxilla or mandible, anterior or posterior and TMJ). Absorbed doses were determined using thermoluminescent dosimeters on the skin surface of sensitive organs of an anthropomorphic phantom. Endo mode showed the highest dose, followed by the high and standard modes in all FOV positions. With small FOV, doses were higher in the posterior region, especially in the mandible. Dose reduction occurred when small FOVs were used, but it was not proportional to FOV size reduction. For TMJ, the dose in a single acquisition with large FOV was greater than two acquisitions with small FOV, but lower than two acquisitions with medium FOV (6x8 cm). In conclusion, scanning mode, size and FOV position have great influence on the absorbed dose. Small FOV decreases the dose, but there is no linear relation between FOV size and dose. For bilateral exams of TMJ, double acquisition with small FOVs produces decrease in absorbed dose relative to a large FOV. (author)

  7. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Aquino de Muro, Marilena; Rapley, Ralph

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  8. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  9. IAEA to implement Safeguards Additional Protocols in the EU

    International Nuclear Information System (INIS)

    2004-01-01

    Full text: IAEA Director General Mohamed ElBaradei welcomed the entry into force today of the Additional Protocols for 15 States of the European Union - France, the United Kingdom and the 13 non-nuclear weapon States of the EU - and the European Atomic Energy Community (EURATOM). The Protocols, which provide the Agency with better tools to verify compliance with nuclear non-proliferation commitments, entered into force when the European Commission informed the Agency that EURATOM's own requirements for entry into force had been met. The 15 States had provided similar notifications over the past years since signing the Protocols in 1998. The simultaneous entry into force of Additional Protocols for the 15 EU States is 'a very positive development and a milestone in our efforts to strengthen the verification regime', said Dr. ElBaradei. 'In my view, the Additional Protocol should become the standard for verification under the Treaty on the Non-Proliferation of Nuclear Weapons (NPT).' He added that the Agency had been preparing for the entry into force of the EU protocols and was confident that, in co-operation with the 15 States and EURATOM, it would be able to ensure effective and efficient implementation in the EU States. The Model Additional Protocol was developed following the discovery of Iraq's clandestine nuclear weapons programme to ensure that the IAEA is given the information and access it needs for timely discovery of any similar activities in States that have pledged not to use nuclear material and activities for weapons purposes. In the past year, Additional Protocols entered into force for 22 countries, and the Agency will now implement Additional Protocols in 58 States, which includes the 15 EU States. The 10 countries joining the EU on 1 May 2004 - seven of which already have brought into force Additional Protocols to their respective safeguards agreements - are expected to gradually accede to the Safeguards Agreement and Additional Protocol covering

  10. Auto-configuration protocols in mobile ad hoc networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  11. International protocol on volatile organic compounds

    International Nuclear Information System (INIS)

    Gauthier, J.-P.

    1992-01-01

    In August 1991, negotiations between Canada, the USA, and 33 European countries led to an international protocol on reducing the emissions of volatile organic compounds (VOC), which are responsible for serious ozone pollution problems. This was the third transborder pollution agreement developed under the auspices of the United Nations Economic Commission for Europe. Certain aspects of negotiations related to an earlier protocol developed for SO 2 and nitrogen oxide emissions had reappeared during the VOC negotiations, and these aspects are discussed. The VOC protocol proposes three approaches to satisfy basic obligations: reducing VOC emissions of a country by 30%, reducing VOC emissions by 30% in certain regions, and ensuring a freeze in VOC emissions in a country starting on a specified date. The protocol also introduces a new concept, that of zones of tropospheric ozone management. In Canada, plans for management of nitrogen oxides and VOC have been adapted to the ozone problem, and the management plan has been developed by a consultation process involving all sectors of society including industry, environmental groups, and governments. In Canada, it will be sufficient to reduce total VOC emissions by 16% during a first phase and to increase these reductions slightly in the second phase. Special ozone management zones in the Quebec City/Windsor corridor and the Fraser River valley have been established

  12. PROTOCOL FOR EXAMINATION OF THE INNER CAN CLOSURE WELD REGION FOR 3013 DE CONTAINERS

    Energy Technology Data Exchange (ETDEWEB)

    Mickalonis, J.

    2014-09-16

    The protocol for the examination of the inner can closure weld region (ICCWR) for 3013 DE containers is presented within this report. The protocol includes sectioning of the inner can lid section, documenting the surface condition, measuring corrosion parameters, and storing of samples. This protocol may change as the investigation develops since findings may necessitate additional steps be taken. Details of the previous analyses, which formed the basis for this protocol, are also presented.

  13. Direct data access protocols benchmarking on DPM

    CERN Document Server

    Furano, Fabrizio; Keeble, Oliver; Mancinelli, Valentina

    2015-01-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring infor...

  14. Removing Ambiguities of IP Telephony Traffic Using Protocol Scrubbers

    Directory of Open Access Journals (Sweden)

    Bazara I. A. Barry

    2012-10-01

    Full Text Available Network intrusion detection systems (NIDSs face the serious challenge of attacks such as insertion and evasion attacks that are caused by ambiguous network traffic. Such ambiguity comes as a result of the nature of network traffic which includes protocol implementation variations and errors alongside legitimate network traffic. Moreover, attackers can intentionally introduce further ambiguities in the traffic. Consequently, NIDSs need to be aware of these ambiguities when detection is performed and make sure to differentiate between true attacks and protocol implementation variations or errors; otherwise, detection accuracy can be affected negatively. In this paper we present the design and implementation of tools that are called protocol scrubbers whose main functionality is to remove ambiguities from network traffic before it is presented to the NIDS. The proposed protocol scrubbers are designed for session initiation and data transfer protocols in IP telephony systems. They guarantee that the traffic presented to NIDSs is unambiguous by eliminating ambiguous behaviors of protocols using well-designed protocol state machines, and walking through packet headers of protocols to make sure packets will be interpreted in the desired way by the NIDS. The experimental results shown in this paper demonstrate the good quality and applicability of the introduced scrubbers.

  15. Protocols for Scholarly Communication

    Science.gov (United States)

    Pepe, A.; Yeomans, J.

    2007-10-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should guide authors naturally towards OA publication, and CERN wants to help reach a full open access publishing environment for the particle physics community and related sciences in the next few years.

  16. Advanced routing protocols for wireless networks

    CERN Document Server

    Campista , Miguel Elias Mitre

    2014-01-01

    This text introduces the principles of routing protocols and metrics as they affect wireless networking environments, specifically in urban areas. Timely because of the recent rise in small city life, this topic includes the consideration of ad hoc, mesh, vehicular, sensor, and delay tolerant networks. These approaches are each unique, and author Miguel Mitre Campista provides a thorough, but accessible, explanation of their individual characteristics for engineers, computer scientists, IT professionals, and curious Internet users.

  17. Effectiveness of oxaliplatin desensitization protocols.

    Science.gov (United States)

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  18. Protocol compliance and time management in blunt trauma resuscitation.

    Science.gov (United States)

    Spanjersberg, W R; Bergs, E A; Mushkudiani, N; Klimek, M; Schipper, I B

    2009-01-01

    To study advanced trauma life support (ATLS) protocol adherence prospectively in trauma resuscitation and to analyse time management of daily multidisciplinary trauma resuscitation at a level 1 trauma centre, for both moderately and severely injured patients. All victims of severe blunt trauma were consecutively included. Patients with a revised trauma score (RTS) of 12 were resuscitated by a "minor trauma" team and patients with an RTS of less than 12 were resuscitated by a "severe trauma" team. Digital video recordings were used to analyse protocol compliance and time management during initial assessment. From 1 May to 1 September 2003, 193 resuscitations were included. The "minor trauma" team assessed 119 patients, with a mean injury severity score (ISS) of 7 (range 1-45). Overall protocol compliance was 42%, ranging from 0% for thoracic percussion to 93% for thoracic auscultation. The median resuscitation time was 45.9 minutes (range 39.7-55.9). The "severe team" assessed 74 patients, with a mean ISS of 22 (range 1-59). Overall protocol compliance was 53%, ranging from 4% for thoracic percussion to 95% for thoracic auscultation. Resuscitation took 34.8 minutes median (range 21.6-44.1). Results showed the current trauma resuscitation to be ATLS-like, with sometimes very low protocol compliance rates. Timing of secondary survey and radiology and thus time efficiency remains a challenge in all trauma patients. To assess the effect of trauma resuscitation protocols on outcome, protocol adherence needs to be improved.

  19. Deterministic secure communication protocol without using entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

  20. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  1. The HPA photon protocol and proposed electron protocol

    International Nuclear Information System (INIS)

    Pitchford, W.G.

    1985-01-01

    The Hospital Physicists Association (HPA) photon dosimetry protocol has been produced and was published in 1983. Revised values of some components of Csub(lambda) and refinements introduced into the theory in the last few years have enabled new Csub(lambda) values to be produced. The proposed HPA electron protocol is at present in draft form and will be published shortly. Both protocels are discussed. (Auth.)

  2. A Review of Communications Protocol for Intelligent Remote Terminal Unit Development

    Directory of Open Access Journals (Sweden)

    Mohd Ruddin Ab. Ghani

    2013-11-01

    Full Text Available This paper reviewed all the possible interfacing communication protocols for remote terminal unit (RTU. Supervisory Control and Data Acquisition (SCADA system is a central station that can communicate with other network using the protocol. Fundamentally, the architectures of all networks are based on the seven layers of open system interconnection (OSI and International Standard Organization (ISO. The objective of designing the protocols is to check the status of all the input and output field devices and send the report according to that status. The corresponding protocol and communication parameters between the connecting devices will be included in designing a complex SCADA system. The available protocols to develop the communication of RTU are Modbus/ASCII, distributed network protocol (DNP3, controller area network (CAN, International Electro-technical Commission (IEC 60870, transmission control protocol/internet protocol (TCP/IP.

  3. Antibody engineering: methods and protocols

    National Research Council Canada - National Science Library

    Chames, Patrick

    2012-01-01

    "Antibody Engineering: Methods and Protocols, Second Edition was compiled to give complete and easy access to a variety of antibody engineering techniques, starting from the creation of antibody repertoires and efficient...

  4. Implementation of postoperative handoff protocol

    African Journals Online (AJOL)

    Background: Standardised handoff protocols have become necessary patient ... improve the perioperative handoff communications from the cardiac operating theatres to the ICU. ..... as you can imagine, there was push-back to the change.

  5. Analysis of Security Protocols in Embedded Systems

    DEFF Research Database (Denmark)

    Bruni, Alessandro

    Embedded real-time systems have been adopted in a wide range of safety-critical applications—including automotive, avionics, and train control systems—where the focus has long been on safety (i.e., protecting the external world from the potential damage caused by the system) rather than security (i.......e., protecting the system from the external world). With increased connectivity of these systems to external networks the attack surface has grown, and consequently there is a need for securing the system from external attacks. Introducing security protocols in safety critical systems requires careful...... in this direction is to extend saturation-based techniques so that enough state information can be modelled and analysed. Finally, we present a methodology for proving the same security properties in the computational model, by means of typing protocol implementations....

  6. (including travel dates) Proposed itinerary

    Indian Academy of Sciences (India)

    Ashok

    31 July to 22 August 2012 (including travel dates). Proposed itinerary: Arrival in Bangalore on 1 August. 1-5 August: Bangalore, Karnataka. Suggested institutions: Indian Institute of Science, Bangalore. St Johns Medical College & Hospital, Bangalore. Jawaharlal Nehru Centre, Bangalore. 6-8 August: Chennai, TN.

  7. Data Exchange Protocol in Repsail

    Directory of Open Access Journals (Sweden)

    Gucma Maciej

    2017-12-01

    Full Text Available Article presents implantation and theoretical considerations of data exchange protocol developed for the RepSail project, where main objective was design and building innovative hybrid yacht. One of problems during the design process was improper functioning of data exchange protocols that were available in the commercially available devices to mention navigation purpose NMEA183 or 2000 as well as automation dedicated ones (CAN and similar. Author shows the basis of the dedicated format of exchange for in board devices.

  8. The Groningen protocol: another perspective

    OpenAIRE

    Jotkowitz, A B; Glick, S

    2006-01-01

    The Groningen protocol allows for the euthanasia of severely ill newborns with a hopeless prognosis and unbearable suffering. We understand the impetus for such a protocol but have moral and ethical concerns with it. Advocates for euthanasia in adults have relied on the concept of human autonomy, which is lacking in the case of infants. In addition, biases can potentially influence the decision making of both parents and physicians. It is also very difficult to weigh the element of quality of...

  9. Delay tolerant networks protocols and applications

    CERN Document Server

    Vasilakos, Athanasios V; Spyropoulos, Thrasyvoulos

    2011-01-01

    Delay Tolerant Networks (DTN) - which include terrestrial mobile networks, exotic media networks, ad-hoc networks, and sensor networks - are becoming more important and may not be well served by the current end-to-end TCP/IP model. This book provides a self-contained, one-stop reference for researchers and practitioners who are looking toward the future of networking. The text presents a systematic exploration of DTN concepts, architectures, protocols, enabling technologies, and applications. It also discusses various challenges associated with DTN. The author includes a wealth of illustrative

  10. Comparison of a new whole-body continuous-table-movement protocol versus a standard whole-body MR protocol for the assessment of multiple myeloma

    International Nuclear Information System (INIS)

    Weckbach, S.; Michaely, H.J.; Schoenberg, S.O.; Dinter, D.J.; Stemmer, A.

    2010-01-01

    To evaluate a whole body (WB) continuous-table-movement (CTM) MR protocol for the assessment of multiple myeloma (MM) in comparison to a step-by-step WB protocol. Eighteen patients with MM were examined at 1.5T using a WB CTM protocol (axial T2-w fs BLADE, T1-w GRE sequence) and a step-by-step WB protocol including coronal/sagittal T1-w SE and STIR sequences as reference. Protocol time was assessed. Image quality, artefacts, liver/spleen assessability, and the ability to depict bone marrow lesions less than or greater than 1 cm as well as diffuse infiltration and soft tissue lesions were rated. Potential changes in the Durie and Salmon Plus stage and the detectability of complications were assessed. Mean protocol time was 6:38 min (CTM) compared to 24:32 min (standard). Image quality was comparable. Artefacts were more prominent using the CTM protocol (P = 0.0039). Organ assessability was better using the CTM protocol (P < 0.001). Depiction of bone marrow and soft tissue lesions was identical without a staging shift. Vertebral fractures were not detected using the CTM protocol. The new protocol allows a higher patient throughput and facilitates the depiction of extramedullary lesions. However, as long as vertebral fractures are not detectable, the protocol cannot be safely used for clinical routine without the acquisition of an additional sagittal sequence. (orig.)

  11. Theory including future not excluded

    DEFF Research Database (Denmark)

    Nagao, K.; Nielsen, H.B.

    2013-01-01

    We study a complex action theory (CAT) whose path runs over not only past but also future. We show that, if we regard a matrix element defined in terms of the future state at time T and the past state at time TA as an expectation value in the CAT, then we are allowed to have the Heisenberg equation......, Ehrenfest's theorem, and the conserved probability current density. In addition,we showthat the expectation value at the present time t of a future-included theory for large T - t and large t - T corresponds to that of a future-not-included theory with a proper inner product for large t - T. Hence, the CAT...

  12. Web-accessible molecular modeling with Rosetta: The Rosetta Online Server that Includes Everyone (ROSIE).

    Science.gov (United States)

    Moretti, Rocco; Lyskov, Sergey; Das, Rhiju; Meiler, Jens; Gray, Jeffrey J

    2018-01-01

    The Rosetta molecular modeling software package provides a large number of experimentally validated tools for modeling and designing proteins, nucleic acids, and other biopolymers, with new protocols being added continually. While freely available to academic users, external usage is limited by the need for expertise in the Unix command line environment. To make Rosetta protocols available to a wider audience, we previously created a web server called Rosetta Online Server that Includes Everyone (ROSIE), which provides a common environment for hosting web-accessible Rosetta protocols. Here we describe a simplification of the ROSIE protocol specification format, one that permits easier implementation of Rosetta protocols. Whereas the previous format required creating multiple separate files in different locations, the new format allows specification of the protocol in a single file. This new, simplified protocol specification has more than doubled the number of Rosetta protocols available under ROSIE. These new applications include pK a determination, lipid accessibility calculation, ribonucleic acid redesign, protein-protein docking, protein-small molecule docking, symmetric docking, antibody docking, cyclic toxin docking, critical binding peptide determination, and mapping small molecule binding sites. ROSIE is freely available to academic users at http://rosie.rosettacommons.org. © 2017 The Protein Society.

  13. Monoclonal antibodies technology. Protocols

    International Nuclear Information System (INIS)

    Acevado Castro, B.E.

    1997-01-01

    Full text: Immunization. The first step in preparing useful monoclonal antibodies (MAbs) is to immunize an animal (Balb/c for example) with an appropriate antigen. Methods (only for soluble antigen): Solubilize selected antigen in Phosphate buffer solution (PBS) at pH 7.2-7.4, ideally at a final concentration per animal between 10 to 50 μg/ml. It is recommended that the antigen under consideration be incorporated into the emulsion adjuvants in 1:1 volumetric relation. We commonly use Frend's adjuvant (FA) to prepared immunized solution. The first immunization should be prepared with complete FA, and the another could be prepared with incomplete FA. It is recommended to inject mice with 0.2 ml intraperitoneal (ip) or subcutaneous (sc). Our experience suggests the sc route is the preferred route. A minimum protocol for immunizing mice to generate cells for preparing hybridomas is s follows: immunize sc on day 0, boost sc on day 21, take a trial bleeding on day 26; if antibody titters are satisfactory, boost ip on day 35 with antigen only, and remove the spleen to obtain cells for fusion on day 38. Fusion protocol. The myeloma cell line we are using is X63 Ag8.653. At the moment of fusion myeloma cells need a good viability (at least a 95%). 1. Remove the spleen cells from immunized mice using sterile conditions. An immune spleen should yield between 7 a 10x10 7 nucleated cells. 2. Place the spleen in 20 ml of serum-free RPMI 1640 in a Petri dish. Using a needle and syringe, inject the spleen with medium to distend and disrupt the spleen stroma and free the nucleated cells. 3. Flush the cell suspension with a Pasteur pipet to disperse clumps of cells. 4. Centrifuge the spleen cell suspension at 250g for 10 min. Resuspend the pellet in serum-free RPMI 1640. Determine cell concentration using Neuhabuer chamber. 5. Mix the myeloma cells and spleen cells in a conical 50-ml tube in serum-free RPMI 1640, 1 x10 7 spleen cells to 1x10 6 myeloma cells (ratio 10:1). Centrifuge

  14. Device including a contact detector

    DEFF Research Database (Denmark)

    2011-01-01

    arms (12) may extend from the supporting body in co-planar relationship with the first surface. The plurality of cantilever arms (12) may extend substantially parallel to each other and each of the plurality of cantilever arms (12) may include an electrical conductive tip for contacting the area......The present invention relates to a probe for determining an electrical property of an area of a surface of a test sample, the probe is intended to be in a specific orientation relative to the test sample. The probe may comprise a supporting body defining a first surface. A plurality of cantilever...... of the test sample by movement of the probe relative to the surface of the test sample into the specific orientation.; The probe may further comprise a contact detector (14) extending from the supporting body arranged so as to contact the surface of the test sample prior to any one of the plurality...

  15. Neoclassical transport including collisional nonlinearity.

    Science.gov (United States)

    Candy, J; Belli, E A

    2011-06-10

    In the standard δf theory of neoclassical transport, the zeroth-order (Maxwellian) solution is obtained analytically via the solution of a nonlinear equation. The first-order correction δf is subsequently computed as the solution of a linear, inhomogeneous equation that includes the linearized Fokker-Planck collision operator. This equation admits analytic solutions only in extreme asymptotic limits (banana, plateau, Pfirsch-Schlüter), and so must be solved numerically for realistic plasma parameters. Recently, numerical codes have appeared which attempt to compute the total distribution f more accurately than in the standard ordering by retaining some nonlinear terms related to finite-orbit width, while simultaneously reusing some form of the linearized collision operator. In this work we show that higher-order corrections to the distribution function may be unphysical if collisional nonlinearities are ignored.

  16. Evaluation of Protocol Uniformity Concerning Laparoscopic Cholecystectomy in The Netherlands

    Science.gov (United States)

    Goossens, Richard H. M.; van Eijk, Daan J.; Lange, Johan F.

    2008-01-01

    Background Iatrogenic bile duct injury remains a current complication of laparoscopic cholecystectomy. One uniform and standardized protocol, based on the “critical view of safety” concept of Strasberg, should reduce the incidence of this complication. Furthermore, owing to the rapid development of minimally invasive surgery, technicians are becoming more frequently involved. To improve communication between the operating team and technicians, standardized actions should also be defined. The aim of this study was to compare existing protocols for laparoscopic cholecystectomy from various Dutch hospitals. Methods Fifteen Dutch hospitals were contacted for evaluation of their protocols for laparoscopic cholecystectomy. All evaluated protocols were divided into six steps and were compared accordingly. Results In total, 13 hospitals responded—5 academic hospitals, 5 teaching hospitals, 3 community hospitals—of which 10 protocols were usable for comparison. Concerning the trocar positions, only minor differences were found. The concept of “critical view of safety” was represented in just one protocol. Furthermore, the order of clipping and cutting the cystic artery and duct differed. Descriptions of instruments and apparatus were also inconsistent. Conclusions Present protocols differ too much to define a universal procedure among surgeons in The Netherlands. The authors propose one (inter)national standardized protocol, including standardized actions. This uniform standardized protocol has to be officially released and recommended by national scientific associations (e.g., the Dutch Society of Surgery) or international societies (e.g., European Association for Endoscopic Surgery and Society of American Gastrointestinal and Endoscopic Surgeons). The aim is to improve patient safety and professional communication, which are necessary for new developments. PMID:18224485

  17. Families of quantum fingerprinting protocols

    Science.gov (United States)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  18. Montreal Protocol Benefits simulated with CCM SOCOL

    Directory of Open Access Journals (Sweden)

    T. Egorova

    2013-04-01

    Full Text Available Ozone depletion is caused by the anthropogenic increase of halogen-containing species in the atmosphere, which results in the enhancement of the concentration of reactive chlorine and bromine in the stratosphere. To reduce the influence of anthropogenic ozone-depleting substances (ODS, the Montreal Protocol was agreed by Governments in 1987, with several Amendments and Adjustments adopted later. In order to assess the benefits of the Montreal Protocol and its Amendments and Adjustments (MPA on ozone and UV radiation, two different runs of the chemistry-climate model (CCM SOCOL have been carried out. The first run was driven by the emission of ozone depleting substances (ODS prescribed according to the restrictions of the MPA. For the second run we allow the ODS to grow by 3% annually. We find that the MPA would have saved up to 80% of the global annual total ozone by the end of the 21st century. Our calculations also show substantial changes of the stratospheric circulation pattern as well as in surface temperature and precipitations that could occur in the world without MPA implementations. To illustrate the changes in UV radiation at the surface and to emphasise certain features, which can only be seen for some particular regions if the influence of the cloud cover changes is accounted for, we calculate geographical distribution of the erythemally weighted irradiance (Eery. For the no Montreal Protocol simulation Eery increases by factor of 4 to 16 between the 1970s and 2100. For the scenario including the Montreal Protocol it is found that UV radiation starts to decrease in 2000, with continuous decline of 5% to 10% at middle latitudes in the both Northern and Southern Hemispheres.

  19. The studsvik BNCT project: structure and the proposed protocols

    International Nuclear Information System (INIS)

    Capala, J.; Stenstam, B.H.; Skoeld, K.; Henriksson, R.; Salford, L.; Carlsson, J.

    2000-01-01

    The BNCT facility at Studsvik is now ready for clinical trials. Scientific operations of the Studsvik BNCT project are overseen by the Scientific Advisory Board comprised of representatives of all major universities in Sweden. Furthermore, special task groups for clinical and preclinical studies have been formed to facilitate collaboration with academia and to assure the quality of the research. Proposed clinical Phase II trials for glioblastoma are sponsored by the Swedish National Neuro-Oncology Group and, initially, will involve two protocols: Protocol no.1. BNCT for glioblastoma patients who have not received any therapy other than surgery (including stereotactic biopsy only). Protocol no.2. BNCT as a palliative treatment for patients with recurrent glioblastoma following conventional therapies or BNCT. In both protocols, BPA, administered by a 6 hour i.v. infusion, will be used as the boron delivery agent. (author)

  20. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  1. Understanding protocol performance: impact of test performance.

    Science.gov (United States)

    Turner, Robert G

    2013-01-01

    This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as

  2. Colon cleansing protocol in children: research conditions vs. clinical practice.

    Science.gov (United States)

    Elitsur, Yoram; Balfaqih, Yaslam; Preston, Deborah

    2018-04-01

     Colon preparation rates are the limiting factor for a successful diagnostic colonoscopy in children. Different colon cleansing protocols have been published for use in children. Unfortunately, the applicability of those published research protocols has not been formally evaluated in routine clinical practice. We investigated the success rate of our previously published colon cleansing protocol as utilized in our clinical practice.  This was a retrospective study. In the clinical practice, the colon cleansing protocol included PEG-3350 at a dose of 2 g/kg/day plus Dulcolax (Bisacodyl, Boehringer Ingelheim, TX USA) 5 mg/day for 2 days. Adequate colon preparation was graded between 1 - 5, as previously described, and grade ≥ 4.0 was considered an adequate preparation. Patients were instructed to complete a questionnaire that included PEG-3350 dose, number of stools per day, consistency of each stool, and side effects (vomiting, abdominal pain). Clinical and endoscopic results were compared between the protocol under research conditions and routine practice.  The success rate of the colon preparation in our clinical practice was similar to the results observed under our research protocol (75 % vs. 73.6 %). Moreover, the total number of stools, stool consistency, and the intubation rate of the terminal ileum were also similar. We concluded, that in our experience, the colon cleansing protocol used under research conditions was effective and appropriate for use in routine clinical practice.  We recommend testing each new protocol under the routine conditions of clinical practice to confirm its applicability for general practitioners.

  3. Development and validation of a remote home safety protocol.

    Science.gov (United States)

    Romero, Sergio; Lee, Mi Jung; Simic, Ivana; Levy, Charles; Sanford, Jon

    2018-02-01

    Environmental assessments and subsequent modifications conducted by healthcare professionals can enhance home safety and promote independent living. However, travel time, expense and the availability of qualified professionals can limit the broad application of this intervention. Remote technology has the potential to increase access to home safety evaluations. This study describes the development and validation of a remote home safety protocol that can be used by a caregiver of an elderly person to video-record their home environment for later viewing and evaluation by a trained professional. The protocol was developed based on literature reviews and evaluations from clinical and content experts. Cognitive interviews were conducted with a group of six caregivers to validate the protocol. The final protocol included step-by-step directions to record indoor and outdoor areas of the home. The validation process resulted in modifications related to safety, clarity of the protocol, readability, visual appearance, technical descriptions and usability. Our final protocol includes detailed instructions that a caregiver should be able to follow to record a home environment for subsequent evaluation by a home safety professional. Implications for Rehabilitation The results of this study have several implications for rehabilitation practice The remote home safety evaluation protocol can potentially improve access to rehabilitation services for clients in remote areas and prevent unnecessary delays for needed care. Using our protocol, a patient's caregiver can partner with therapists to quickly and efficiently evaluate a patient's home before they are released from the hospital. Caregiver narration, which reflects a caregiver's own perspective, is critical to evaluating home safety. In-home safety evaluations, currently not available to all who need them due to access barriers, can enhance a patient's independence and provide a safer home environment.

  4. e-SCP-ECG+ Protocol: An Expansion on SCP-ECG Protocol for Health Telemonitoring—Pilot Implementation

    Directory of Open Access Journals (Sweden)

    George J. Mandellos

    2010-01-01

    Full Text Available Standard Communication Protocol for Computer-assisted Electrocardiography (SCP-ECG provides standardized communication among different ECG devices and medical information systems. This paper extends the use of this protocol in order to be included in health monitoring systems. It introduces new sections into SCP-ECG structure for transferring data for positioning, allergies, and five additional biosignals: noninvasive blood pressure (NiBP, body temperature (Temp, Carbon dioxide (CO2, blood oxygen saturation (SPO2, and pulse rate. It also introduces new tags in existing sections for transferring comprehensive demographic data. The proposed enhanced version is referred to as e-SCP-ECG+ protocol. This paper also considers the pilot implementation of the new protocol as a software component in a Health Telemonitoring System.

  5. The Kyoto protocol development; La viabilite du protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)

    2002-04-01

    From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)

  6. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    We present our work on using abstract models for formally analysing cryptographic protocols: First, we present an ecient method for verifying trace-based authenticity properties of protocols using nonces, symmetric encryption, and asymmetric encryption. The method is based on a type system...... of Gordon et al., which we modify to support fully-automated type inference. Tests conducted via an implementation of our algorithm found it to be very ecient. Second, we show how privacy may be captured in a symbolic model using an equivalencebased property and give a formal denition. We formalise...

  7. Implementation of a Rapid, Protocol-based TIA Management Pathway.

    Science.gov (United States)

    Jarhult, Susann J; Howell, Melissa L; Barnaure-Nachbar, Isabelle; Chang, Yuchiao; White, Benjamin A; Amatangelo, Mary; Brown, David F; Singhal, Aneesh B; Schwamm, Lee H; Silverman, Scott B; Goldstein, Joshua N

    2018-03-01

    Our goal was to assess whether use of a standardized clinical protocol improves efficiency for patients who present to the emergency department (ED) with symptoms of transient ischemic attack (TIA). We performed a structured, retrospective, cohort study at a large, urban, tertiary care academic center. In July 2012 this hospital implemented a standardized protocol for patients with suspected TIA. The protocol selected high-risk patients for admission and low/intermediate-risk patients to an ED observation unit for workup. Recommended workup included brain imaging, vascular imaging, cardiac monitoring, and observation. Patients were included if clinical providers determined the need for workup for TIA. We included consecutive patients presenting during a six-month period prior to protocol implementation, and those presenting between 6-12 months after implementation. Outcomes included ED length of stay (LOS), hospital LOS, use of neuroimaging, and 90-day risk of stroke or TIA. From 01/2012 to 06/2012, 130 patients were evaluated for TIA symptoms in the ED, and from 01/2013 to 06/2013, 150 patients. The final diagnosis was TIA or stroke in 45% before vs. 41% after (p=0.18). Following the intervention, the inpatient admission rate decreased from 62% to 24% (pTIA among those with final diagnosis of TIA was 3% for both periods. Implementation of a TIA protocol significantly reduced ED LOS and total hospital LOS.

  8. Rosetta Ligand docking with flexible XML protocols.

    Science.gov (United States)

    Lemmon, Gordon; Meiler, Jens

    2012-01-01

    RosettaLigand is premiere software for predicting how a protein and a small molecule interact. Benchmark studies demonstrate that 70% of the top scoring RosettaLigand predicted interfaces are within 2Å RMSD from the crystal structure [1]. The latest release of Rosetta ligand software includes many new features, such as (1) docking of multiple ligands simultaneously, (2) representing ligands as fragments for greater flexibility, (3) redesign of the interface during docking, and (4) an XML script based interface that gives the user full control of the ligand docking protocol.

  9. 2014 Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, E. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht-Metzger, C. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Horowitz, S. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Hendron, R. [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2014-03-01

    As BA has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  10. 2014 Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, E. [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Engebrecht, C. Metzger [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Horowitz, S. [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Hendron, R. [National Renewable Energy Laboratory (NREL), Golden, CO (United States)

    2014-03-01

    As Building America has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  11. Introduction to Cryptography and the Bitcoin Protocol (1/2)

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    The Bitcoin protocol not only supports an electronic currency, but also has the possibility for being (mis)used in other ways. Topics will include the basic operation of how Bitcoin operates including motivations and also such things as block chaining, bitcoin mining, and how financial transactions operate. A knowledge of the topics covered in the Basic Cryptography lecture will be assumed.

  12. Introduction to Cryptography and the Bitcoin Protocol (2/2)

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    The Bitcoin protocol not only supports an electronic currency, but also has the possibility for being (mis)used in other ways. Topics will include the basic operation of how Bitcoin operates including motivations and also such things as block chaining, bitcoin mining, and how financial transactions operate. A knowledge of the topics covered in the Basic Cryptography lecture will be assumed.

  13. The DOMUS study protocol

    DEFF Research Database (Denmark)

    Nordly, Mie; Benthien, Kirstine Skov; Von Der Maase, Hans

    2014-01-01

    be a powerful tool to improve patients' quality of life and support family/caregivers during the disease trajectory. The present study offers a model for achieving optimal delivery of palliative care in the patient's preferred place of care and attempt to clarify challenges. TRIAL REGISTRATION: Clinicaltrials......BACKGROUND: The focus of Specialized Palliative Care (SPC) is to improve care for patients with incurable diseases and their families, which includes the opportunity to make their own choice of place of care and ultimately place of death. The Danish Palliative Care Trial (DOMUS) aims to investigate...... psychological intervention for patients and caregivers at home or b) standard care alone. Inclusion criteria are incurable cancer with no or limited antineoplastic treatment options. DISCUSSION: Programs that facilitate transition from hospital treatment to SPC at home for patients with incurable cancer can...

  14. An electronic specimen collection protocol schema (eSCPS). Document architecture for specimen management and the exchange of specimen collection protocols between biobanking information systems.

    Science.gov (United States)

    Eminaga, O; Semjonow, A; Oezguer, E; Herden, J; Akbarov, I; Tok, A; Engelmann, U; Wille, S

    2014-01-01

    The integrity of collection protocols in biobanking is essential for a high-quality sample preparation process. However, there is not currently a well-defined universal method for integrating collection protocols in the biobanking information system (BIMS). Therefore, an electronic schema of the collection protocol that is based on Extensible Markup Language (XML) is required to maintain the integrity and enable the exchange of collection protocols. The development and implementation of an electronic specimen collection protocol schema (eSCPS) was performed at two institutions (Muenster and Cologne) in three stages. First, we analyzed the infrastructure that was already established at both the biorepository and the hospital information systems of these institutions and determined the requirements for the sufficient preparation of specimens and documentation. Second, we designed an eSCPS according to these requirements. Finally, a prospective study was conducted to implement and evaluate the novel schema in the current BIMS. We designed an eSCPS that provides all of the relevant information about collection protocols. Ten electronic collection protocols were generated using the supplementary Protocol Editor tool, and these protocols were successfully implemented in the existing BIMS. Moreover, an electronic list of collection protocols for the current studies being performed at each institution was included, new collection protocols were added, and the existing protocols were redesigned to be modifiable. The documentation time was significantly reduced after implementing the eSCPS (5 ± 2 min vs. 7 ± 3 min; p = 0.0002). The eSCPS improves the integrity and facilitates the exchange of specimen collection protocols in the existing open-source BIMS.

  15. Petri Nets in Cryptographic Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Winskel, Glynn

    2001-01-01

    A process language for security protocols is presented together with a semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. By means of an example we illustrate...

  16. Improving the DGK comparison protocol

    NARCIS (Netherlands)

    Veugen, P.J.M.

    2012-01-01

    When processing signals in the encrypted domain, homomorphic encryption can be used to enable linear operations on encrypted data. Comparison of encrypted data however requires an additional protocol between the parties and will be relatively expensive. A well-known and frequently used comparison

  17. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use...... of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools....

  18. Art. 1 Eerste Protocol EVRM

    NARCIS (Netherlands)

    Poelmann, E.

    2014-01-01

    Het recht op bezit is niet in het Europees Verdrag ter bescherming van de rechten van de mens en de fundamentele vrijheden (hierna: EVRM) neergelegd, maar in het Eerste Protocol daarbij (hierna: EP), dat in 1954 in werking is getreden. Het is van belang voor ogen te houden dat de Tweede Wereldoorlog

  19. Bundle Security Protocol for ION

    Science.gov (United States)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  20. Affinity biosensors: techniques and protocols

    National Research Council Canada - National Science Library

    Rogers, Kim R; Mulchandani, Ashok

    1998-01-01

    ..., and government to begin or expand their biosensors research. This volume, Methods in Biotechnology vol. 7: Affinity Biosensors: Techniques and Protocols, describes a variety of classical and emerging transduction technologies that have been interfaced to bioaffinity elements (e.g., antibodies and receptors). Some of the reas...

  1. High Entropy Random Selection Protocols

    NARCIS (Netherlands)

    H. Buhrman (Harry); M. Christandl (Matthias); M. Koucky (Michal); Z. Lotker (Zvi); B. Patt-Shamir; M. Charikar; K. Jansen; O. Reingold; J. Rolim

    2007-01-01

    textabstractIn this paper, we construct protocols for two parties that do not trust each other, to generate random variables with high Shannon entropy. We improve known bounds for the trade off between the number of rounds, length of communication and the entropy of the outcome.

  2. A Student Teamwork Induction Protocol

    Science.gov (United States)

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  3. Cognitive Communications Protocols for SATCOM

    Science.gov (United States)

    2017-10-20

    communications protocols for satellite and space communications with possible broad applications in defense, homeland-security as well as consumer ...communications with possible broad applications in defense, homeland-security, and civilian as well as consumer telecommunications. Such cognitive...vulnerable against smart jammers that may attempt to learn the cognitive radios own behavior . In response, our second class of proposed algorithms

  4. Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Mahdi Zareei

    2017-09-01

    Full Text Available New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN. First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective.

  5. Directional Medium Access Control (MAC Protocols in Wireless Ad Hoc and Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    David Tung Chong Wong

    2015-06-01

    Full Text Available This survey paper presents the state-of-the-art directional medium access control (MAC protocols in wireless ad hoc and sensor networks (WAHSNs. The key benefits of directional antennas over omni-directional antennas are longer communication range, less multipath interference, more spatial reuse, more secure communications, higher throughput and reduced latency. However, directional antennas lead to single-/multi-channel directional hidden/exposed terminals, deafness and neighborhood, head-of-line blocking, and MAC-layer capture which need to be overcome. Addressing these problems and benefits for directional antennas to MAC protocols leads to many classes of directional MAC protocols in WAHSNs. These classes of directional MAC protocols presented in this survey paper include single-channel, multi-channel, cooperative and cognitive directional MACs. Single-channel directional MAC protocols can be classified as contention-based or non-contention-based or hybrid-based, while multi-channel directional MAC protocols commonly use a common control channel for control packets/tones and one or more data channels for directional data transmissions. Cooperative directional MAC protocols improve throughput in WAHSNs via directional multi-rate/single-relay/multiple-relay/two frequency channels/polarization, while cognitive directional MAC protocols leverage on conventional directional MAC protocols with new twists to address dynamic spectrum access. All of these directional MAC protocols are the pillars for the design of future directional MAC protocols in WAHSNs.

  6. A slotted access control protocol for metropolitan WDM ring networks

    Science.gov (United States)

    Baziana, P. A.; Pountourakis, I. E.

    2009-03-01

    In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.

  7. Past and Future of the Kyoto Protocol. Final report

    International Nuclear Information System (INIS)

    Wijen, F.; Zoeteman, K.

    2004-01-01

    The present report reflects findings from a study on the realization of and prospects for the Kyoto Protocol. The purpose of the study was (1) to obtain insights into the factors that enabled the realization of the Kyoto Protocol, in particular the interactions among major parties involved; (2) to assess the future opportunities and threats of the Kyoto Protocol, in particular against the backdrop of an increasingly globalised world. The study was conducted from February up to December 2003 by (a) reviewing the literature, especially publications on the negotiation history of the Kyoto process, the social interactions enabling the realization of the Protocol, analyses of strengths and weaknesses, and future climate regimes; (b) conducting a series of interviews with representatives from government, academia, non-governmental organisations, and business, who have been - directly or indirectly - involved in the Kyoto process; (c) internal discussions,brainstorming and analysing the Protocol's strengths and weaknesses, possible future scenarios (including policy options), and the management of a possible failure of the Kyoto Protocol. The present report reflects and integrates the different sources. The first section deals with the past and the present. It discusses how the Kyoto Protocol could be realized despite the divergent interests, reflects on its architecture, and analyses major strengths and weaknesses. In the second section, we present possible future scenarios. We explore how different combinations of domestic and international commitment provide possible realities that national government may face when crafting climate policy. The third section provides an in-depth analysis of the possible event that the Kyoto Protocol fails. We discuss its definition and policy implications. The final section is reserved for overall conclusions and policy recommendations

  8. Group covariant protocols for quantum string commitment

    International Nuclear Information System (INIS)

    Tsurumaru, Toyohiro

    2006-01-01

    We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next using this result, we prove that for every irreducible representation of a finite group, there always exists a corresponding nontrivial QSC protocol which reaches a level of security impossible to achieve classically

  9. Field protocols for the genomic era

    Directory of Open Access Journals (Sweden)

    N Bulatova

    2009-08-01

    Full Text Available For many decades karyotype was the only source of overall genomic information obtained from species of mammal. However, approaches have been developed in recent years to obtain molecular and ultimately genomic information directly from the extracted DNA of an organism. Molecular data have accumulated hugely for mammalian taxa. The growing volume of studies should motivate field researchers to collect suitable samples for molecular analysis from various species across all their ranges. This is the reason why we here include a molecular sampling procedure within a field work protocol, which also includes more traditional (including cytogenetic techniques. In this way we hope to foster the development of molecular and genomic studies in non-standard wild mammals.

  10. Quality control protocols for radiodiagnosis agents and radiopharmaceuticals

    International Nuclear Information System (INIS)

    Robles, A.; Condor, M.; Caballero, J.; Morote, M.; Garcia, C.; Benites, M.

    1997-01-01

    Based on the compilation of pharmacopoeia methods, literature, manuals and other information developed in our laboratory, protocols have been prepared to carry out quality controls for radiodiagnosis agents (RDA), better known as kits and RDA labelled with Tc99m. Quality control protocols cover physicochemical and biological controls. Physicochemical controls described for RDA include physical characteristics, particle size and number, pH, chemical identification, humidity, tin II; whereas biological controls include sterility, acute toxicity and bacterial endotoxin determination (LAL). Physicochemical controls described for radiopharmaceuticals labelled with Tc99m are pH and radiochemical purity; while biological distribution is described as a biological control

  11. Evaluation of an adult insulin infusion protocol at an academic medical center.

    Science.gov (United States)

    Petrov, Katerina I; Burns, Tammy L; Drincic, Andjela

    2012-05-01

    Acknowledging evidence of possible detrimental effects of tightly controlled blood glucose levels, the American Association of Clinical Endocrinologists and the American Diabetes Association published a consensus statement recommending less strict control for most diabetic patients. As a result of these recommendations, our academic center at Creighton University Medical Center revised its adult insulin infusion protocol to target blood glucose levels ranging from 120 to 180 mg/dL for regular (standard) glycemic control and 80 to 120 mg/dL for tight control; previous targets had ranged from 80 to 180 mg/dL and 70 to 110 mg/dL, respectively. The primary objective was to evaluate the time that blood glucose values were within the target range for patients receiving the new protocol, compared with patients receiving the previous protocol. Our study was designed to evaluate the effectiveness and safety of the revised protocol. Using a retrospective chart review, we collected data for 4 months from patients on the old insulin protocol (May to August 2009) and for 4 months from patients on the new protocol (September to December 2009). Secondary endpoints included the number of hypoglycemic episodes (blood glucose below 70 mg/dL) and severe hypoglycemic episodes (blood glucose 40 mg/dL or lower) experienced by patients receiving the new insulin protocol compared with those receiving the former protocol. Patient characteristics were similar at baseline. Blood glucose values stayed within the target range for a significantly shorter time with the new protocol than with the former protocol (44.6% vs. 56.8%, respectively; P protocol. No statistically significant differences in hypoglycemia were observed after the protocol was changed. Hypoglycemia occurred in 31% of the former-protocol patients compared with 18% of the revised-protocol patients. Severe hypoglycemia was experienced by 2.1% of patients on the old protocol and by 3.1% of patients on the new protocol. Rates of

  12. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  13. Phase Transition in Protocols Minimizing Work Fluctuations

    Science.gov (United States)

    Solon, Alexandre P.; Horowitz, Jordan M.

    2018-05-01

    For two canonical examples of driven mesoscopic systems—a harmonically trapped Brownian particle and a quantum dot—we numerically determine the finite-time protocols that optimize the compromise between the standard deviation and the mean of the dissipated work. In the case of the oscillator, we observe a collection of protocols that smoothly trade off between average work and its fluctuations. However, for the quantum dot, we find that as we shift the weight of our optimization objective from average work to work standard deviation, there is an analog of a first-order phase transition in protocol space: two distinct protocols exchange global optimality with mixed protocols akin to phase coexistence. As a result, the two types of protocols possess qualitatively different properties and remain distinct even in the infinite duration limit: optimal-work-fluctuation protocols never coalesce with the minimal-work protocols, which therefore never become quasistatic.

  14. Database communication protocol analyses and security detection

    International Nuclear Information System (INIS)

    Luo Qun; Liu Qiushi

    2003-01-01

    In this paper we introduced the analysis of TDS protocol in the communication application between Client and Server about SYBASE and MICROSOFT SQL SERVER and do some test for some bugs existed in the protocol. (authors)

  15. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  16. Fluid resuscitation for major burn patients with the TMMU protocol.

    Science.gov (United States)

    Luo, Gaoxing; Peng, Yizhi; Yuan, Zhiqiang; Cheng, Wenguang; Wu, Jun; Tang, Jin; Huang, Yuesheng; Fitzgerald, Mark

    2009-12-01

    Fluid resuscitation is one of the critical treatments for the major burn patient in the early phases after injury. We evaluated the practice of fluid resuscitation for severely burned patients with the Third Military Medical University (TMMU) protocol, which is most widely used in many regions of China. Patients with major burns (>30% total body surface area (TBSA)) presenting to Southwest Hospital, Third Military Medical University, between January 2005 and October 2007, were included in this study. Fluid resuscitation was initiated by the TMMU protocol. A total of 71 patients were (46 adults and 25 children) included in this study. All patients survived the first 48 h after injury smoothly and none developed abdominal compartment syndrome or other recognised complications associated with fluid resuscitation. The average quantity of fluid infused was 3.3-61.33% more than that calculated based on the TMMU protocol in both adult and paediatric groups. The average urine output during the first 24h after injury was about 1.2 ml per kg body weight per hour in the two groups, but reached 1.2 ml and 1.7 ml during the second 24h in adult and pediatric groups, respectively. This study indicates that the TMMU protocol for fluid resuscitation is a feasible option for burn patients. Individualised resuscitation - guided by the physiological response to fluid administration - is still important as in other protocols.

  17. Conducting Clinically Based Intimate Partner Violence Research: Safety Protocol Recommendations.

    Science.gov (United States)

    Anderson, Jocelyn C; Glass, Nancy E; Campbell, Jacquelyn C

    Maintaining safety is of utmost importance during research involving participants who have experienced intimate partner violence (IPV). Limited guidance on safety protocols to protect participants is available, particularly information related to technology-based approaches to informed consent, data collection, and contacting participants during the course of a study. The purpose of the article is to provide details on the safety protocol developed and utilized with women receiving care at an urban HIV clinic and who were taking part in an observational study of IPV, mental health symptoms, and substance abuse and their relationship to HIV treatment adherence. The protocol presents the technological strategies to promote safety and allow autonomy in participant decision-making throughout the research process, including Voice over Internet Protocol telephone numbers, and tablet-based eligibility screening and data collection. Protocols for management of participants at risk for suicide and/or intimate partner homicide that included automated high-risk messaging to participants and research staff and facilitated disclosure of risk to clinical staff based on participant preferences are discussed. Use of technology and partnership with clinic staff helped to provide an environment where research regarding IPV could be conducted without undue burden or risk to participants. Utilizing tablet-based survey administration provided multiple practical and safety benefits for participants. Most women who screened into high-risk categories for suicide or intimate partner homicide did not choose to have their results shared with their healthcare providers, indicating the importance of allowing participants control over information sharing whenever possible.

  18. Clinical Simulation: A Protocol for Evaluation of Mobile Technology.

    Science.gov (United States)

    Mather, Carey; Jensen, Sanne; Cummings, Elizabeth

    2017-01-01

    For mobile technology to be accepted at point of care in healthcare environments there is a need to demonstrate benefits whilst ameliorating the risks and challenges. To provide a standardised approach to evaluation of mobile technology a simulation protocol was developed to provide guidance for its use in healthcare environments. Simulated conditions provide the opportunity to assess intended and unintended consequences and identify potential workarounds when using technology. The protocol can also be used to demonstrate the importance of the development of digital professionalism by end-users prior to students entering the clinical practice setting. The mobile technology protocol was adapted from a health information systems protocol developed and used at the ITX Lab, Denmark for use in other simulation laboratories. Use case scenarios were developed to enable evaluation of mobile technology for mobile learning of nurses, nurse supervisors, students and patients. The scenarios can be used in a range of simulated environments including hospital bedside, outpatient clinic or community settings. A case study exemplar of a nurse and patient is included to demonstrate how the mobile technology protocol can be applied.

  19. Ocean Optics Protocols for Satellite Ocean Color Sensor Validation. Revised

    Science.gov (United States)

    Fargion, Giulietta S.; Mueller, James L.

    2000-01-01

    The document stipulates protocols for measuring bio-optical and radiometric data for the Sensor Intercomparison and Merger for Biological and Interdisciplinary Oceanic Studies (SIMBIOS) Project activities and algorithm development. This document supersedes the earlier version (Mueller and Austin 1995) published as Volume 25 in the SeaWiFS Technical Report Series. This document marks a significant departure from, and improvement on, theformat and content of Mueller and Austin (1995). The authorship of the protocols has been greatly broadened to include experts specializing in some key areas. New chapters have been added to provide detailed and comprehensive protocols for stability monitoring of radiometers using portable sources, abovewater measurements of remote-sensing reflectance, spectral absorption measurements for discrete water samples, HPLC pigment analysis and fluorometric pigment analysis. Protocols were included in Mueller and Austin (1995) for each of these areas, but the new treatment makes significant advances in each topic area. There are also new chapters prescribing protocols for calibration of sun photometers and sky radiance sensors, sun photometer and sky radiance measurements and analysis, and data archival. These topic areas were barely mentioned in Mueller and Austin (1995).

  20. MDEP Protocol VICWG-01. MDEP Protocol: Witnessed, Joint, and Multinational Vendor Inspection Protocol

    International Nuclear Information System (INIS)

    2014-01-01

    The Multinational Design Evaluation Programme (MDEP) was launched in 2006 by the US Nuclear Regulatory Commission (NRC) and the French Nuclear Safety Authority (ASN) with the aim of developing innovative approaches to leverage the resources and knowledge of national regulatory authorities reviewing new reactor designs. MDEP full members are regulators from Canada, People's Republic of China, Finland, France, India, Japan, Republic of Korea, Russian Federation, South Africa, Sweden, the United Kingdom and the United States of America. The United Arab Emirates and Turkey are associate members. The OECD Nuclear Energy Agency (NEA) acts as the Technical Secretariat for the MDEP. The International Atomic Energy Agency (IAEA) participates in many of the MDEP activities, including harmonisation efforts. The Vendor Inspection Cooperation Working Group (VICWG) is one of the issue-specific working groups that the MDEP members are undertaking with one long term goal of the VICWG being to maximize the use of the results obtained from other regulator's efforts in inspecting vendors. To accomplish this goal, it is vital that the regulators learn about each other's procedures, processes, and regulations. To facilitate the learning process the VICWG is coordinating vendor inspections among the involved regulatory authorities with the purpose of enhancing the understanding of each other's vendor inspection procedures. This programme is administered by the NEA. Involvement in specific inspections provides a number of opportunities for member state regulators to witness other regulators' inspection methods, gain useful information on the quality systems and manufacturing arrangements of specific vendors and where appropriate, actively participate in the inspection. The purpose of this protocol is to provide guidance to regulators that wish to carry out vendor inspections or participate in or witness other regulators' vendor inspections. It also provides

  1. Climate change scenarios and Technology Transfer Protocols

    International Nuclear Information System (INIS)

    Kypreos, Socrates; Turton, Hal

    2011-01-01

    We apply a specific version of MERGE-ETL, an integrated assessment model, to study global climate policies supported by Technology Transfer Protocols (TTPs). We model a specific formulation of such a TTP where donor countries finance via carbon tax revenues, the diffusion of carbon-free technologies in developing countries (DCs) and quantify its benefits. Industrialized countries profit from increased technology exports, global diffusion of advanced technology (leading to additional technology learning and cost reductions) and reduced climate damages through the likelihood of greater global participation in a new international agreement. DCs experience increased welfare from access to subsidized technology, and profit from the reduction of damages related to climate change and expected secondary benefits of carbon abatement (such as reduced local and regional air pollution). The analysis identifies potential candidate technologies that could be supported under a TTP, and the impact of a TTP on economic development (including the flow of transfer subsidies) and global emissions. Although a TTP may encourage additional participation, such a proposal is only likely to be successful if an increased willingness to pay to avoid climate damages is accepted, first by the present and future generations of the industrialized world and later on, when sufficient economic growth is accumulated, by today's developing countries. - Research Highlights: → Climate policy scenarios are assessed with differentiated commitments in carbon emission control supported by Technology Transfer Protocols. → Donor countries finance, via carbon-tax revenues, the exports of carbon-free technologies in developing countries helping to get a new international agreement. → Developing countries experience increased welfare from access to subsidized technology, and profit from the reduction of damages related to climate change and secondary benefits. → Under Technology Protocols alone and

  2. From protocol to published report

    DEFF Research Database (Denmark)

    Berendt, Louise; Callréus, Torbjörn; Petersen, Lene Grejs

    2016-01-01

    and published reports of academic clinical drug trials. METHODS: A comparison was made between study protocols and their corresponding published reports. We assessed the overall consistency, which was defined as the absence of discrepancy regarding study type (categorized as either exploratory or confirmatory...... in 1999, 2001, and 2003, 95 of which fulfilled the eligibility criteria and had at least one corresponding published report reporting data on trial subjects. Overall consistency was observed in 39% of the trials (95% CI: 29 to 49%). Randomized controlled trials (RCTs) constituted 72% (95% CI: 63 to 81......%) of the sample, and 87% (95% CI: 80 to 94%) of the trials were hospital based. CONCLUSIONS: Overall consistency between protocols and their corresponding published reports was low. Motivators for the inconsistencies are unknown but do not seem restricted to economic incentives....

  3. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  4. Feasible quantum communication complexity protocol

    International Nuclear Information System (INIS)

    Galvao, Ernesto F.

    2002-01-01

    I show that a simple multiparty communication task can be performed more efficiently with quantum communication than with classical communication, even with low detection efficiency η. The task is a communication complexity problem in which distant parties need to compute a function of the distributed inputs, while minimizing the amount of communication between them. A realistic quantum optical setup is suggested that can demonstrate a five-party quantum protocol with higher-than-classical performance, provided η>0.33

  5. Cost estimation of Kyoto Protocol

    International Nuclear Information System (INIS)

    Di Giulio, Enzo

    2005-01-01

    This article proposes a reflection on important aspects in the costs determination performance of Kyoto Protocol. The evaluation of the main models evidence possible impacts on the economies. A key role in the determination of the cost is represented by the relative hypothesis to emission trading and the projects CDM-JI and from the political capacity at the cost negative or equal to zero [it

  6. Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, Robert [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht, Cheryn [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  7. Behavior Protocols for Software Components

    Czech Academy of Sciences Publication Activity Database

    Plášil, František; Višňovský, Stanislav

    2002-01-01

    Roč. 28, č. 11 (2002), s. 1056-1076 ISSN 0098-5589 R&D Projects: GA AV ČR IAA2030902; GA ČR GA201/99/0244 Grant - others:Eureka(XE) Pepita project no.2033 Institutional research plan: AV0Z1030915 Keywords : behavior protocols * component-based programming * software architecture Subject RIV: JC - Computer Hardware ; Software Impact factor: 1.170, year: 2002

  8. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  9. Formal analysis of a fair payment protocol

    NARCIS (Netherlands)

    J.G. Cederquist; M.T. Dashti (Mohammad)

    2004-01-01

    textabstractWe formally specify a payment protocol. This protocol is intended for fair exchange of time-sensitive data. Here the ?-CRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free ?-calculus. These properties are then verified

  10. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, M.T.

    2004-01-01

    We formally specify a payment protocol. This protocol is intended for fair exchange of timesensitive data. Here the μCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free μ-calculus. These properties are then verified using the finite

  11. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi; Dimitrakos, Theo; Martinelli, Fabio

    We formally specify a payment protocol described by Vogt et al. This protocol is intended for fair exchange of time-sensitive data. Here the mCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free mu-calculus. These properties are then

  12. Early functional outcome of two surgical protocols used in the repair ...

    African Journals Online (AJOL)

    A wide range of cleft lip and palate management protocols currently exists throughout ... surgery. It includes subjective as well as objective measures of evaluation. Postoperative ... tools that include visual assessment of the lip, teeth, alveolar.

  13. Cost effectiveness of a protocol using palivizumab in preterm infants

    Directory of Open Access Journals (Sweden)

    Yolanda Hernández-Gago

    2017-03-01

    Full Text Available Objective: The main objective was to evaluate the cost-effectiveness of protocol use of palivizumab in premature established by consensus in our Hospital comparing it based on the recommendations of various Scientific Societies. As a secondary objective risk factors and severity of hospitalized patients attending the established protocol in our Hospital were analyzed. Methods: The study period was 4 seasons with the expanded protocol (retrospective data versus 2 with restricted or agreed protocol (prospective data. The perspective of the study was the Health System, including the costs of hospitalization and palivizumab our center. The calculation of the effectiveness was determined with the admission rate of premature patients stratified by weeks of gestational age <29, <32; and <35. For the analysis of risk factors and severity in patients admitted seasons with the new protocol are collected prospectively clinical data and environmental and social factors. Results: In the range of gestational age <29 years old and <32 greater effectiveness of the extended protocol was not demonstrated against the consensus. Only more effective for EG <35 in the accumulated data and comparing seasons 12/13 and 08/09 to 13/14 for individual data was observed. This range has an associated incremental cost effectiveness ratio of € 53 250,07 (range: € 14 793,39 to € 90 446,47 for singles data and € 50 525,53 (€ 28 688.22 to € 211 575,65 for accumulated. The establishment of this protocol in our center meant an average saving per season € 169 911,51. A cost- effectiveness of the extended protocol appropriate relationship is found if the cost of palivizumab per patient was less than € 1 206,67 (calculated for maximum use of the vial and a higher rate of hospitalization of 9.21%. Children entering the season with the new protocol (season 12/13 and 13/14 are 63.4% in children under 3 months and 90% are term infants who do not belong to any population at

  14. National protocol framework for the inventory and monitoring of bees

    Science.gov (United States)

    Droege, Sam; Engler, Joseph D.; Sellers, Elizabeth A.; Lee O'Brien,

    2016-01-01

    This national protocol framework is a standardized tool for the inventory and monitoring of the approximately 4,200 species of native and non-native bee species that may be found within the National Wildlife Refuge System (NWRS) administered by the U.S. Fish and Wildlife Service (USFWS). However, this protocol framework may also be used by other organizations and individuals to monitor bees in any given habitat or location. Our goal is to provide USFWS stations within the NWRS (NWRS stations are land units managed by the USFWS such as national wildlife refuges, national fish hatcheries, wetland management districts, conservation areas, leased lands, etc.) with techniques for developing an initial baseline inventory of what bee species are present on their lands and to provide an inexpensive, simple technique for monitoring bees continuously and for monitoring and evaluating long-term population trends and management impacts. The latter long-term monitoring technique requires a minimal time burden for the individual station, yet can provide a good statistical sample of changing populations that can be investigated at the station, regional, and national levels within the USFWS’ jurisdiction, and compared to other sites within the United States and Canada. This protocol framework was developed in cooperation with the United States Geological Survey (USGS), the USFWS, and a worldwide network of bee researchers who have investigated the techniques and methods for capturing bees and tracking population changes. The protocol framework evolved from field and lab-based investigations at the USGS Bee Inventory and Monitoring Laboratory at the Patuxent Wildlife Research Center in Beltsville, Maryland starting in 2002 and was refined by a large number of USFWS, academic, and state groups. It includes a Protocol Introduction and a set of 8 Standard Operating Procedures or SOPs and adheres to national standards of protocol content and organization. The Protocol Narrative

  15. A critical analysis of a locally agreed protocol for clinical practice

    International Nuclear Information System (INIS)

    Owen, A.; Hogg, P.; Nightingale, J.

    2004-01-01

    Within the traditional scope of radiographic practice (including advanced practice) there is a need to demonstrate effective patient care and management. Such practice should be set within a context of appropriate evidence and should also reflect peer practice. In order to achieve such practice the use of protocols is encouraged. Effective protocols can maximise care and management by minimising inter- and intra-professional variation; they can also allow for detailed procedural records to be kept in case of legal claims. However, whilst literature exists to encourage the use of protocols there is little published material available to indicate how to create, manage and archive them. This article uses an analytical approach to propose a suitable method for protocol creation and archival, it also offers suggestions on the scope and content of a protocol. To achieve this an existing clinical protocol for radiographer reporting barium enemas is analysed to draw out the general issues. Proposals for protocol creation, management, and archival were identified. The clinical practice described or inferred in the protocol should be drawn from evidence, such evidence could include peer-reviewed material, national standards and peer practice. The protocol should include an explanation of how to proceed when the radiographers reach the limit of their ability. It should refer to the initial training required to undertake the clinical duties as well as the on-going continual professional updating required to maintain competence. Audit of practice should be indicated, including the preferred audit methodology, and associated with this should be a clear statement about standards and what to do if standards are not adequately met. Protocols should be archived, in a paper-based form, for lengthy periods in case of legal claims. On the archived protocol the date it was in clinical use should be included

  16. Submission to the British Columbia government on the Kyoto Protocol

    International Nuclear Information System (INIS)

    2002-09-01

    The Business Council provided its comments concerning the Kyoto Protocol and climate change to the government of British Columbia, recommending that a clear position be established quickly on the matter. The adopted position should also be disseminated broadly to allow stake holders sufficient time to prepare for the upcoming meetings of the Joint Ministers and First Ministers. The federal government has announced that the decision on whether to ratify the Kyoto Protocol will be made before the end of 2002, and this decision will have numerous effects on the people of British Columbia, businesses, workers, and consumers alike. The Business Council of British Columbia believes that the unique interests of the province can best be protected by a proactive approach. Actions plans are being prepared by several of the other provinces and territories, who have already stated their position concerning the Kyoto Protocol. The long-term risks of climate change for British Columbia have not been determined nor have the elements of a provincial approach. The following elements should be included in British Columbia's position on the Kyoto Protocol, according to the Business Council of British Columbia: (1) a credible and cost-effective implementation plan that does not unduly burden the province and other jurisdictions must be developed before Canada decides to ratify the Protocol. British Columbia should go on the record stating it does not support the ratification of the Kyoto Protocol in its present form. (2) the province should advocate for a national approach to climate change that can be achieved within a reasonable time frame, reflects the long-term nature of the problem, and is in agreement with the economic development objectives of British Columbia, (3) a plan detailing how the province intends to deal with the growth of greenhouse gas emissions should supplement and support the position of the province on the Kyoto Protocol. Consumers and business should be engaged

  17. Protocol-based care: the standardisation of decision-making?

    Science.gov (United States)

    Rycroft-Malone, Jo; Fontenla, Marina; Seers, Kate; Bick, Debra

    2009-05-01

    To explore how protocol-based care affects clinical decision-making. In the context of evidence-based practice, protocol-based care is a mechanism for facilitating the standardisation of care and streamlining decision-making through rationalising the information with which to make judgements and ultimately decisions. However, whether protocol-based care does, in the reality of practice, standardise decision-making is unknown. This paper reports on a study that explored the impact of protocol-based care on nurses' decision-making. Theoretically informed by realistic evaluation and the promoting action on research implementation in health services framework, a case study design using ethnographic methods was used. Two sites were purposively sampled; a diabetic and endocrine unit and a cardiac medical unit. Within each site, data collection included observation, postobservation semi-structured interviews with staff and patients, field notes, feedback sessions and document review. Data were inductively and thematically analysed. Decisions made by nurses in both sites were varied according to many different and interacting factors. While several standardised care approaches were available for use, in reality, a variety of information sources informed decision-making. The primary approach to knowledge exchange and acquisition was person-to-person; decision-making was a social activity. Rarely were standardised care approaches obviously referred to; nurses described following a mental flowchart, not necessarily linked to a particular guideline or protocol. When standardised care approaches were used, it was reported that they were used flexibly and particularised. While the logic of protocol-based care is algorithmic, in the reality of clinical practice, other sources of information supported nurses' decision-making process. This has significant implications for the political goal of standardisation. The successful implementation and judicious use of tools such as

  18. A 2004 view of the Kyoto Protocol

    International Nuclear Information System (INIS)

    Singer, F.

    2004-01-01

    It may not be a household word, but by now the Kyoto Protocol has become a well-known political slogan. It is either ''fundamentally flawed'' (George W. Bush) or it is essential for saving the climate and humanity (Al Gore). There seems to be no in between. The Kyoto Protocol is a treaty to limit (i.e., ration) the use of energy to satisfy the concerns of environmental groups and other believers in global warming catastrophes. This group includes not only certified kooks but also such notables as former Treasury Secretary Paul O'Neill and Sir David King, chief scientific adviser to Her Majesty's government who equates the threat of warming with that of international terrorism. But Kyoto is quite ineffective, that is, it cannot really affect climate or even change the composition of the atmosphere. It is costly. And it is probably also defunct. Where did this treaty come from? Why is it being adopted by some countries but not by others? And what is its likely future?

  19. A high performance totally ordered multicast protocol

    Science.gov (United States)

    Montgomery, Todd; Whetten, Brian; Kaplan, Simon

    1995-01-01

    This paper presents the Reliable Multicast Protocol (RMP). RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service such as IP Multicasting. RMP is fully and symmetrically distributed so that no site bears un undue portion of the communication load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These QoS guarantees are selectable on a per packet basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, an implicit naming service, mutually exclusive handlers for messages, and mutually exclusive locks. It has commonly been held that a large performance penalty must be paid in order to implement total ordering -- RMP discounts this. On SparcStation 10's on a 1250 KB/sec Ethernet, RMP provides totally ordered packet delivery to one destination at 842 KB/sec throughput and with 3.1 ms packet latency. The performance stays roughly constant independent of the number of destinations. For two or more destinations on a LAN, RMP provides higher throughput than any protocol that does not use multicast or broadcast.

  20. Croatia energy planning and Kyoto Protocol

    International Nuclear Information System (INIS)

    Duic, Neven; Juretic, Franjo; Zeljko, Mladen; Bogdan, Z.

    2005-01-01

    Croatia as an Annex I country of the UN Framework Convention on Climate Change and a country that has pledged in the Annex B of the Kyoto Protocol to reduce its GHG emissions by 5% will have to envisage a new energy strategy. Compared to the energy consumption collapse in some transitional countries, Croatia has passed through a relatively short-term reduction of GHG emissions since 1990 because of higher energy efficiency of its pretransition economy. It is expected that in case of baseline scenario, it will breach the Kyoto target in 2003. Several scenarios of power generation are compared from the point of view of GHG emissions. The cost-effective scenario expects a mixture of coal and gas fired power plants to be built to satisfy the new demand and to replace the old power plants that are being decommissioned. More Kyoto friendly scenario envisages forcing the compliance with the Protocol with measures only in power generation sector by the construction of mainly zero emission generating capacity in the future, while decommissioning the old plants as planned, and is compared to the others from the GHG emissions point of view. The conclusion is that by measures tackling only power generation, it will not be possible to keep GHG emission under the Kyoto target level. The case of including the emissions from Croatian owned power plants in former Yugoslavia is also discussed

  1. Hardening Stratum, the Bitcoin Pool Mining Protocol

    Directory of Open Access Journals (Sweden)

    Recabarren Ruben

    2017-07-01

    Full Text Available Stratum, the de-facto mining communication protocol used by blockchain based cryptocurrency systems, enables miners to reliably and efficiently fetch jobs from mining pool servers. In this paper we exploit Stratum’s lack of encryption to develop passive and active attacks on Bitcoin’s mining protocol, with important implications on the privacy, security and even safety of mining equipment owners. We introduce StraTap and ISP Log attacks, that infer miner earnings if given access to miner communications, or even their logs. We develop BiteCoin, an active attack that hijacks shares submitted by miners, and their associated payouts. We build BiteCoin on WireGhost, a tool we developed to hijack and surreptitiously maintain Stratum connections. Our attacks reveal that securing Stratum through pervasive encryption is not only undesirable (due to large overheads, but also ineffective: an adversary can predict miner earnings even when given access to only packet timestamps. Instead, we devise Bedrock, a minimalistic Stratum extension that protects the privacy and security of mining participants. We introduce and leverage the mining cookie concept, a secret that each miner shares with the pool and includes in its puzzle computations, and that prevents attackers from reconstructing or hijacking the puzzles.

  2. Temporary Operational Protocol for making safe and managing Orphaned or Seized Radioactive Sources

    International Nuclear Information System (INIS)

    2013-01-01

    This protocol outlines the arrangements to manage the safe interim storage of an orphaned radioactive source or of a source identified for seizure, pending its ultimate disposal. Such sources may be sources found outside of regulatory control, detected at a frontier or seized in the public interest. This includes a radioactive source arising from a CBRN, chemical, biological, radiological, nuclear, incident, following neutralisation of any associated dispersal device and confirmation of the suspect object as radioactive. The arrangements in this protocol are meant to be consistent with and used in conjunction with relevant protocols to the Major Emergency Framework Document and may be revisited as necessary as those protocols are further developed

  3. Taking the Politics Out of Satellite and Space-Based Communications Protocols

    Science.gov (United States)

    Ivancic, William D.

    2006-01-01

    After many years of studies, experimentation, and deployment, large amounts of misinformation and misconceptions remain regarding applicability of various communications protocols for use in satellite and space-based networks. This paper attempts to remove much of the politics, misconceptions, and misinformation that have plagued spacebased communications protocol development and deployment. This paper provides a common vocabulary for communications; a general discussion of the requirements for various communication environments; an evaluation of tradeoffs between circuit and packet-switching technologies, and the pros and cons of various link, network, transport, application, and security protocols. Included is the applicability of protocol enhancing proxies to NASA, Department of Defense (DOD), and commercial space communication systems.

  4. Analysis of the differential-phase-shift-keying protocol in the quantum-key-distribution system

    International Nuclear Information System (INIS)

    Rong-Zhen, Jiao; Chen-Xu, Feng; Hai-Qiang, Ma

    2009-01-01

    The analysis is based on the error rate and the secure communication rate as functions of distance for three quantum-key-distribution (QKD) protocols: the Bennett–Brassard 1984, the Bennett–Brassard–Mermin 1992, and the coherent differential-phase-shift keying (DPSK) protocols. We consider the secure communication rate of the DPSK protocol against an arbitrary individual attack, including the most commonly considered intercept-resend and photon-number splitting attacks, and concluded that the simple and efficient differential-phase-shift-keying protocol allows for more than 200 km of secure communication distance with high communication rates. (general)

  5. Decidability Issues for Extended Ping-Pong Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2006-01-01

    We use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek...

  6. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  7. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Science.gov (United States)

    Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing

    2017-01-01

    Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  8. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Directory of Open Access Journals (Sweden)

    Shameng Wen

    Full Text Available Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  9. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis.

    Science.gov (United States)

    Alanazi, Adwan; Elleithy, Khaled

    2015-09-02

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol.

  10. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  11. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  12. Asymptotic adaptive bipartite entanglement-distillation protocol

    International Nuclear Information System (INIS)

    Hostens, Erik; Dehaene, Jeroen; De Moor, Bart

    2006-01-01

    We present an asymptotic bipartite entanglement-distillation protocol that outperforms all existing asymptotic schemes. This protocol is based on the breeding protocol with the incorporation of two-way classical communication. Like breeding, the protocol starts with an infinite number of copies of a Bell-diagonal mixed state. Breeding can be carried out as successive stages of partial information extraction, yielding the same result: one bit of information is gained at the cost (measurement) of one pure Bell state pair (ebit). The basic principle of our protocol is at every stage to replace measurements on ebits by measurements on a finite number of copies, whenever there are two equiprobable outcomes. In that case, the entropy of the global state is reduced by more than one bit. Therefore, every such replacement results in an improvement of the protocol. We explain how our protocol is organized as to have as many replacements as possible. The yield is then calculated for Werner states

  13. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  14. Design Aspects of An Energy-Efficient, Lightweight Medium Access Control Protocol for Wireless Sensor Networks

    NARCIS (Netherlands)

    van Hoesel, L.F.W.; Havinga, Paul J.M.

    2006-01-01

    This document gives an overview of the most relevant design aspects of the lightweight medium access control (LMAC) protocol [16] for wireless sensor networks (WSNs). These aspects include selfconfiguring and localized operation of the protocol, time synchronization in multi-hop networks, network

  15. 76 FR 60503 - Guidance for Industry on Target Animal Safety and Effectiveness Protocol Development and...

    Science.gov (United States)

    2011-09-29

    ... Safety and Effectiveness Protocol Development and Submission.'' The purpose of this document is to provide sponsors guidance in preparation of study protocols for review by the Center for Veterinary Medicine, Office of New Animal Drug Evaluation. The recommendations included in this guidance are intended...

  16. [Chinese Protocol of Diagnosis and Treatment of Colorectal Cancer].

    Science.gov (United States)

    2018-04-01

    Colorectal cancer is one of the most common malignant tumors in China. In 2012 one million thirty six thousand cases of colorectal cancer were diagnosed all over the world, two hundred fifty three thousand cases were diagnosed in China (accounted for 18.6%). China has the largest number of new cases of colorectal cancer in the world. Colorectal cancer has becoming a serious threat of Chinese residents' health. In 2010, the National Ministry of Health organized colorectal cancer expertise of the Chinese Medical Association to write the "Chinese Protocol of Diagnosis and Treatment of Colorectal Cancer" (2010edition), and publish it publicly. In recent years, the National Health and Family Planning Commission has organized experts to revised the protocol 2 times: the first time in 2015, the second time in 2017. The revised part of "Chinese Protocol of Diagnosis and Treatment of Colorectal Cancer" (2017 edition) involves new progress in the field of imaging examination, pathological evaluation, surgery, chemotherpy and radiotherapy. The 2017 edition of the protocol not only referred to the contents of the international guidelines, but also combined with the specific national conditions and clinical practice in China, and also included many evidence-based clinical data in China recently. The 2017 edition of the protocol would further promote the standardization of diagnosis and treatment of colorectal cancer in China, improve the survival and prognosis of patients, and benefit millions of patients with colorectal cancer and their families.

  17. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  18. Accessibility in Public Buildings: Efficiency of Checklist Protocols.

    Science.gov (United States)

    Andersson, Jonas E; Skehan, Terry

    2016-01-01

    In Sweden, governmental agencies and bodies are required to implement a higher level of accessibility in their buildings than that stipulated by the National Building and Planning Act (PBL). The Swedish Agency for Participation (MFD, Myndigheten för delaktighet) develops holistic guidelines in order to conceptualize this higher level of accessibility. In conjunction to these guidelines, various checklist protocols have been produced. The present study focuses on the efficiency of such checklist protocols. The study revolved around the use of a checklist protocol in assessments of two buildings in Stockholm: the new head office for the National Authority for Social Insurances (ASI) and the School of Architecture at the Royal Institute of Technology (KTH). The study included three groups: Group 1 and Group 2 consisted of 50 real estate managers employed by the ASI, while Group 3 consisted of three participants in a course at the KTH. The results were similar in all of the groups. The use of the checklist protocol generated queries, which related mainly to two factors: (1) the accompanying factsheet consisted of textual explanations with no drawings, photographs or illustrations and (2) the order of the questions in the checklist protocol was difficult to correlate with the two buildings' spatial logic of accessing, egressing and making use of the built space.

  19. GnRH antagonist versus long agonist protocols in IVF

    DEFF Research Database (Denmark)

    Lambalk, C B; Banga, F R; Huirne, J A

    2017-01-01

    BACKGROUND: Most reviews of IVF ovarian stimulation protocols have insufficiently accounted for various patient populations, such as ovulatory women, women with polycystic ovary syndrome (PCOS) or women with poor ovarian response, and have included studies in which the agonist or antagonist...... was not the only variable between the compared study arms. OBJECTIVE AND RATIONALE: The aim of the current study was to compare GnRH antagonist protocols versus standard long agonist protocols in couples undergoing IVF or ICSI, while accounting for various patient populations and treatment schedules. SEARCH...... in couples undergoing IVF or ICSI. The primary outcome was ongoing pregnancy rate. Secondary outcomes were: live birth rate, clinical pregnancy rate, number of oocytes retrieved and safety with regard to ovarian hyperstimulation syndrome (OHSS). Separate comparisons were performed for the general IVF...

  20. The Internet of Things Key Applications and Protocols

    CERN Document Server

    Hersent, Olivier; Elloumi, Omar

    2011-01-01

    An all-in-one reference to the major Home Area Networking, Building Automation and AMI protocols, including 802.15.4 over radio or PLC, 6LowPAN/RPL, ZigBee 1.0 and Smart Energy 2.0, Zwave, LON, BACNet, KNX, ModBus, mBus, C.12 and DLMS/COSEM, and the new ETSI M2M system level standard. In-depth coverage of Smart-grid and EV charging use cases. This book describes the Home Area Networking, Building Automation and AMI protocols and their evolution towards open protocols based on IP such as 6LowPAN and ETSI M2M. The authors discuss the approach taken by service providers to interconnect the protoc

  1. Development of characterization protocol for mixed liquid radioactive waste classification

    Energy Technology Data Exchange (ETDEWEB)

    Zakaria, Norasalwa, E-mail: norasalwa@nuclearmalaysia.gov.my [Waste Technology Development Centre, Malaysian Nuclear Agency, 43000 Kajang, Selangor (Malaysia); Wafa, Syed Asraf [Radioisotop Technology and Innovation, Malaysian Nuclear Agency, 43000 Kajang, Selangor (Malaysia); Wo, Yii Mei [Radiochemistry and Environment, Malaysian Nuclear Agency, 43000 Kajang, Selangor (Malaysia); Mahat, Sarimah [Material Technology Group, Malaysian Nuclear Agency, 43000 Kajang, Selangor (Malaysia)

    2015-04-29

    Mixed liquid organic waste generated from health-care and research activities containing tritium, carbon-14, and other radionuclides posed specific challenges in its management. Often, these wastes become legacy waste in many nuclear facilities and being considered as ‘problematic’ waste. One of the most important recommendations made by IAEA is to perform multistage processes aiming at declassification of the waste. At this moment, approximately 3000 bottles of mixed liquid waste, with estimated volume of 6000 litres are currently stored at the National Radioactive Waste Management Centre, Malaysia and some have been stored for more than 25 years. The aim of this study is to develop a characterization protocol towards reclassification of these wastes. The characterization protocol entails waste identification, waste screening and segregation, and analytical radionuclides profiling using various analytical procedures including gross alpha/ gross beta, gamma spectrometry, and LSC method. The results obtained from the characterization protocol are used to establish criteria for speedy classification of the waste.

  2. Quantum Information Protocols with Gaussian States of Light

    DEFF Research Database (Denmark)

    Jacobsen, Christian Scheffmann

    and hardware for secure quantum key distribution. These technologies directly exploit quantum effects, and indeed this is where they offer advantages to classical products. This thesis deals with the development and implementation of quantum information protocols that utilize the rather inexpensive resource......Quantum cryptography is widely regarded as the most mature field within the context of quantum information in the sense that its application and development has produced companies that base their products on genuine quantum mechanical principles. Examples include quantum random number generators...... of Gaussian states. A quantum information protocol is essentially a sequence of state exchanges between some number of parties and a certain ordering of quantum mechanical unitary operators performed by these parties. An example of this is the famous BB84 protocol for secret key generation, where photons...

  3. An Evaluation of Protocols for UAV Science Applications

    Science.gov (United States)

    Ivancic, William D.; Stewart, David E.; Sullivan, Donald V.; Finch, Patrick E.

    2012-01-01

    This paper identifies data transport needs for current and future science payloads deployed on the NASA Global Hawk Unmanned Aeronautical Vehicle (UAV). The NASA Global Hawk communication system and operational constrains are presented. The Genesis and Rapid Intensification Processes (GRIP) mission is used to provide the baseline communication requirements as a variety of payloads were utilized in this mission. User needs and desires are addressed. Protocols are matched to the payload needs and an evaluation of various techniques and tradeoffs are presented. Such techniques include utilization rate-base selective negative acknowledgement protocols and possible use of protocol enhancing proxies. Tradeoffs of communication architectures that address ease-of-use and security considerations are also presented.

  4. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  5. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  6. Proposed quality control protocol of a dual energy bone densitometer from Spanish protocol for quality control of radiology

    International Nuclear Information System (INIS)

    Saez, F.; Benito, M. A.; Collado, P.; Saez, M.

    2011-01-01

    In this paper we propose additional testing to complete the tests by the Spanish Protocol for Quality Control of Diagnostic Radiology, taking into account the particular characteristics of these units, and including these tests in the estimation of patient dose dose assessment area. There is also the possibility to independently verify the quality control tests that are done automatically.

  7. Protein blotting protocol for beginners.

    Science.gov (United States)

    Petrasovits, Lars A

    2014-01-01

    The transfer and immobilization of biological macromolecules onto solid nitrocellulose or nylon (polyvinylidene difluoride (PVDF)) membranes subsequently followed by specific detection is referred to as blotting. DNA blots are called Southerns after the inventor of the technique, Edwin Southern. By analogy, RNA blots are referred to as northerns and protein blots as westerns (Burnette, Anal Biochem 112:195-203, 1981). With few exceptions, western blotting involves five steps, namely, sample collection, preparation, separation, immobilization, and detection. In this chapter, protocols for the entire process from sample collection to detection are described.

  8. Zero-Knowledge Protocols and Multiparty Computation

    DEFF Research Database (Denmark)

    Pastro, Valerio

    majority, in which all players but one are controlled by the adversary. In Chapter 5 we present both the preprocessing and the online phase of [DKL+ 13], while in Chapter 2 we describe only the preprocessing phase of [DPSZ12] since the combination of this preprocessing phase with the online phase of [DKL...... on information-theoretic message authentication codes, requires only a linear amount of data from the preprocessing, and improves on the number of field multiplications needed to perform one secure multiplication (linear, instead of quadratic as in earlier work). The preprocessing phase in Chapter 5 comes...... in an actively secure flavour and in a covertly secure one, both of which compare favourably to previous work in terms of efficiency and provable security. Moreover, the covertly secure solution includes a key generation protocol that allows players to obtain a public key and shares of a corresponding secret key...

  9. The Kyoto Protocol Is Cost-effective

    Directory of Open Access Journals (Sweden)

    Marino Gatto

    2002-06-01

    Full Text Available Despite recent advances, there is a high degree of uncertainty concerning the climate change that would result from increasing atmospheric greenhouse gas concentrations. Also, opponents of the Kyoto Protocol raised the key objection that reducing emissions would impose an unacceptable economic burden on businesses and consumers. Based on an analysis of alternative scenarios for electricity generation in Italy, we show that if the costs in terms of damage to human health, material goods, agriculture, and the environment caused by greenhouse gas emissions are included in the balance, the economic argument against Kyoto is untenable. Most importantly, the argument holds true even if we exclude global external costs (those due to global warming, and account for local external costs only (such as those due to acidic precipitation and lung diseases resulting from air pollution.

  10. Optical protocols for advanced spacecraft networks

    Science.gov (United States)

    Bergman, Larry A.

    1991-01-01

    Most present day fiber optic networks are in fact extensions of copper wire networks. As a result, their speed is still limited by electronics even though optics is capable of running three orders of magnitude faster. Also, the fact that photons do not interact with one another (as electrons do) provides optical communication systems with some unique properties or new functionality that is not readily taken advantage of with conventional approaches. Some of the motivation for implementing network protocols in the optical domain, a few possible approaches including optical code-division multiple-access (CDMA), and how this class of networks can extend the technology life cycle of the Space Station Freedom (SSF) with increased performance and functionality are described.

  11. Optical protocols for advanced spacecraft networks

    Science.gov (United States)

    Bergman, Larry A.

    1991-09-01

    Most present day fiber optic networks are in fact extensions of copper wire networks. As a result, their speed is still limited by electronics even though optics is capable of running three orders of magnitude faster. Also, the fact that photons do not interact with one another (as electrons do) provides optical communication systems with some unique properties or new functionality that is not readily taken advantage of with conventional approaches. Some of the motivation for implementing network protocols in the optical domain, a few possible approaches including optical code-division multiple-access (CDMA), and how this class of networks can extend the technology life cycle of the Space Station Freedom (SSF) with increased performance and functionality are described.

  12. Hamstring Muscle Injuries, a Rehabilitation Protocol Purpose.

    Science.gov (United States)

    Valle, Xavier; L Tol, Johannes; Hamilton, Bruce; Rodas, Gil; Malliaras, Peter; Malliaropoulos, Nikos; Rizo, Vicenc; Moreno, Marcel; Jardi, Jaume

    2015-12-01

    Hamstring acute muscle injuries are prevalent in several sports including AFL football (Australian Football League), sprinting and soccer, and are often associated with prolonged time away from sport. In response to this, research into prevention and management of hamstring injury has increased, but epidemiological data shows no decline in injury and re-injury rates, suggesting that rehabilitation programs and return to play (RTP) criteria have to be improved. There continues to be a lack of consensus regarding how to assess performance, recovery and readiness to RTP, following hamstring strain injury. The aim of this paper was to propose rehabilitation protocol for hamstring muscle injuries based on current basic science and research knowledge regarding injury demographics and management options. Criteria-based (subjective and objective) progression through the rehabilitation program will be outlined along with exercises for each phase, from initial injury to RTP.

  13. Multi-protocol header generation system

    Energy Technology Data Exchange (ETDEWEB)

    Roberts, David A.; Ignatowski, Michael; Jayasena, Nuwan; Loh, Gabriel

    2017-09-05

    A communication device includes a data source that generates data for transmission over a bus, and a data encoder that receives and encodes outgoing data. An encoder system receives outgoing data from a data source and stores the outgoing data in a first queue. An encoder encodes outgoing data with a header type that is based upon a header type indication from a controller and stores the encoded data that may be a packet or a data word with at least one layered header in a second queue for transmission. The device is configured to receive at a payload extractor, a packet protocol change command from the controller and to remove the encoded data and to re-encode the data to create a re-encoded data packet and placing the re-encoded data packet in the second queue for transmission.

  14. A simulation of the FASTBUS protocols

    International Nuclear Information System (INIS)

    Booth, A.W.

    1981-01-01

    FASTBUS is a standard bus system being developed for high speed data acquisition and processing in the next generation of large scale physics experiments. Prototypes are being built according to a draft specification. The FASTBUS protocols have been simulated using a powerful software tool which is a computer description language. This Instruction Set Processor Specification language, ISPS, has been used in the design and development of several microprocessor systems. It's applications are diverse, including automated design and the generation of machine relative software, as well as simulation. The results of the FASTBUS simulation are presented, with an overview of the ISPS hardware description language. An additional facility is discussed, which supplements the simulation by providing a visual presentation of the FASTBUS signals, that is, a timing-graph generator. (orig.)

  15. Oral breathing: new early treatment protocol

    Directory of Open Access Journals (Sweden)

    Gloria Denotti

    2014-01-01

    Full Text Available Oral breathing is a respiratory dysfunction that affects approximately 10-15% of child population. It is responsable of local effects and systemic effects, both immediate and long-term. They affect the growth of the subject and his physical health in many ways: pediatric, psycho-behavioral and cognitive. The etiology is multifactorial. It’s important the establishment of a vicious circle involving more areas and it is essential to stop it as soon as possible. In order to correct this anomaly, the pediatric dentist must be able to make a correct diagnosis to treat early the disfunction and to avoid the onset of cascade mechanisms. Who plays a central role is the pediatrician who first and frequently come into contact with little patients. He can identify the anomalies, and therefore collaborate with other specialists, including the dentist. The key aspect that guides us in the diagnosis, and allows us to identify the oral respirator, is the “adenoid facies”. The purpose of the study is to highlight the importance and benefits of an early and multidisciplinary intervention (pediatric, orthopedic-orthodontic-functional. A sample of 20 patients was selected with the following inclusion criteria: mouth breathing, transverse discrepancy > 4 mm, early mixed dentition, central and lateral permenent incisors, overjet increased, lip and nasal incompetence, snoring and/or sleep apnea episodes. The protocol of intervention includes the use of the following devices and procedures: a maxillary rapid expander (to correct the transverse discrepancy, to increase the amplitude of the upper respiratory airway and to reduce nasal resistances tract in association with myo-functional devices (nasal stimulator and oral obturator. They allow the reconstruction of a physiological balance between the perioral musculature and tongue, the acquisition of nasal and lips competence and the reduction of overjet. This protocol speeds up and stabilizes the results. The

  16. Implementation of the Kyoto protocol

    International Nuclear Information System (INIS)

    2006-07-01

    The Rio Earth summit in 1992 has been the starting point of an international awareness about the global risk of climatic change. At this occasion, the richest countries committed themselves to stabilize their greenhouse gas emissions and to reach by the year 2000 an emissions level equivalent to the one of 1990. The Kyoto protocol in 1997 has permitted to convert this will into juridically constraining quantitative commitments. In 2005, Russia ratified the protocol while in 2001 the USA refused to do so. Because the commitments signed are ambitious, flexibility mechanisms have been implemented: 'emission permits' (emissions trading), 'joint implementation' allowing the investments abroad for greenhouse gases abatement in another developed country, and 'clean development mechanisms' when investments are made in a developing country. The Marrakech conference of December 2001 has permitted to fix up the eligibility criteria of projects belonging to the joint implementation and clean development mechanisms. The effective implementation of these mechanisms still raises technical difficulties to evaluate and measure the effective abatement of greenhouse gas emissions. (J.S.)

  17. Latest approaches of Kyoto protocol

    International Nuclear Information System (INIS)

    Matei, M.; Matei, L.

    2005-01-01

    Recently EURELECTRIC welcome the proposal of new EC Directive concerning the inclusion in the EU Emissions Trading Scheme (ETS) of credits from the project mechanisms - Joint Implementation (JI) and Clean Development Mechanism (CDM). The proposed Directive is an amendment to the EU Emissions Trading Directive adopted in June 2003. EURELECTRIC calls for unlimited use of credits in ETS. The draft Directive provides for the application of these mechanisms to begin as of 2008, on condition that the Kyoto Protocol does actually enter into force, an event which is still dependent on Russia's ratification. Such ratification has been subject to contradictory statements from the Russian Government, and the question of whether their signature to the Protocol is forthcoming is still fraught with uncertainty. Although it is not anticipated that significant quantities of JI or CDM certified credits will be available in the period 2005-2007, those that do become available would provide some additional liquidity in the emissions trading market. There is a direct relation between the coming ETS and electricity pricing: environmental policy is the driver, based on the need to switch to a low-carbon future and manage the necessary investments in a rational manner - and emissions trading is the best solution available. Romania has good opportunities to be involved in the greenhouse gases market, both in ETS and JI mechanisms. Some JI projects between Romanian and The Netherlands are already done or underway. (author)

  18. Ocean fertilization, carbon credits and the Kyoto Protocol

    Science.gov (United States)

    Westley, M. B.; Gnanadesikan, A.

    2008-12-01

    Commercial interest in ocean fertilization as a carbon sequestration tool was excited by the December 1997 agreement of the Kyoto Protocol to the United Nations Convention on Climate Change. The Protocol commits industrialized countries to caps on net greenhouse gas emissions and allows for various flexible mechanisms to achieve these caps in the most economically efficient manner possible, including trade in carbon credits from projects that reduce emissions or enhance sinks. The carbon market was valued at 64 billion in 2007, with the bulk of the trading (50 billion) taking place in the highly regulated European Union Emission Trading Scheme, which deals primarily in emission allowances in the energy sector. A much smaller amount, worth $265 million, was traded in the largely unregulated "voluntary" market (Capoor and Ambrosi 2008). As the voluntary market grows, so do calls for its regulation, with several efforts underway to set rules and standards for the sale of voluntary carbon credits using the Kyoto Protocol as a starting point. Four US-based companies and an Australian company currently seek to develop ocean fertilization technologies for the generation of carbon credits. We review these plans through the lens of the Kyoto Protocol and its flexible mechanisms, and examine whether and how ocean fertilization could generate tradable carbon credits. We note that at present, ocean sinks are not included in the Kyoto Protocol, and that furthermore, the Kyoto Protocol only addresses sources and sinks of greenhouse gases within national boundaries, making open-ocean fertilization projects a jurisdictional challenge. We discuss the negotiating history behind the limited inclusion of land use, land use change and forestry in the Kyoto Protocol and the controversy and eventual compromise concerning methodologies for terrestrial carbon accounting. We conclude that current technologies for measuring and monitoring carbon sequestration following ocean fertilization

  19. Fiber Laser Component Testing for Space Qualification Protocol Development

    Science.gov (United States)

    Falvey, S.; Buelow, M.; Nelson, B.; Starcher, Y.; Thienel, L.; Rhodes, C.; Tull, Jackson; Drape, T.; Westfall, C.

    A test protocol for the space qualifying of Ytterbium-doped diode-pumped fiber laser (DPFL) components was developed under the Bright Light effort, sponsored by AFRL/VSE. A literature search was performed and summarized in an AMOS 2005 conference paper that formed the building blocks for the development of the test protocol. The test protocol was developed from the experience of the Bright Light team, the information in the literature search, and the results of a study of the Telcordia standards. Based on this protocol developed, test procedures and acceptance criteria for a series of vibration, thermal/vacuum, and radiation exposure tests were developed for selected fiber laser components. Northrop Grumman led the effort in vibration and thermal testing of these components at the Aerospace Engineering Facility on Kirtland Air Force Base, NM. The results of the tests conducted have been evaluated. This paper discusses the vibration and thermal testing that was executed to validate the test protocol. The lessons learned will aid in future assessments and definition of space qualification protocols. Components representative of major items within a Ytterbium-doped diode-pumped fiber laser were selected for testing; including fibers, isolators, combiners, fiber Bragg gratings, and laser diodes. Selection of the components was based on guidelines to test multiple models of typical fiber laser components. A goal of the effort was to test two models (i.e. different manufacturers) of each type of article selected, representing different technologies for the same type of device. The test articles did not include subsystems or systems. These components and parts may not be available commercial-off-the-shelf (COTS), and, in fact, many are custom articles, or newly developed by the manufacturer. The primary goal for this effort is a completed taxonomy that lists all relevant laser components, modules, subsystems, and interfaces, and cites the documentation for space

  20. Use of limited MR protocol (coronal STIR) in the evaluation of patients with hip pain

    International Nuclear Information System (INIS)

    Khoury, N.J.; Birjawi, G.A.; Hourani, M.H.; Chaaya, M.

    2003-01-01

    To assess the role of a limited MR protocol (coronal STIR) as the initial part of the MR examination in patients with hip pain. Eighty-five patients presenting with hip pain, and normal radiographs of the pelvis, and who underwent our full MR protocol for hips were included retrospectively in the study. The full protocol consists of coronal T1-weighted and short tau inversion-recovery (STIR), and axial T2-weighted sequences. Ninety-three MR examinations were performed. Two radiologists interpreted the STIR (limited) examinations and the full studies separately, masked to each other's findings and to the final diagnosis. Comparison between the two protocols was then undertaken. For both readers, all normal MR examinations on the coronal STIR limited protocol were normal on the full protocol, with an interobserver reliability of 0.96. The STIR protocol was able to detect the presence or absence of an abnormality in 100% of cases (sensitivity). The STIR-only protocol provided a specific diagnosis in only 65% of cases (specificity). A normal coronal STIR study of the hips in patients with hip pain and normal radiographs precludes the need for further pelvic MR sequences. Any abnormality detected on this limited protocol should be further assessed by additional MR sequences. (orig.)

  1. A Performance Evaluation of NACK-Oriented Protocols as the Foundation of Reliable Delay- Tolerant Networking Convergence Layers

    Science.gov (United States)

    Iannicca, Dennis; Hylton, Alan; Ishac, Joseph

    2012-01-01

    Delay-Tolerant Networking (DTN) is an active area of research in the space communications community. DTN uses a standard layered approach with the Bundle Protocol operating on top of transport layer protocols known as convergence layers that actually transmit the data between nodes. Several different common transport layer protocols have been implemented as convergence layers in DTN implementations including User Datagram Protocol (UDP), Transmission Control Protocol (TCP), and Licklider Transmission Protocol (LTP). The purpose of this paper is to evaluate several stand-alone implementations of negative-acknowledgment based transport layer protocols to determine how they perform in a variety of different link conditions. The transport protocols chosen for this evaluation include Consultative Committee for Space Data Systems (CCSDS) File Delivery Protocol (CFDP), Licklider Transmission Protocol (LTP), NACK-Oriented Reliable Multicast (NORM), and Saratoga. The test parameters that the protocols were subjected to are characteristic of common communications links ranging from terrestrial to cis-lunar and apply different levels of delay, line rate, and error.

  2. Development of high-reliable real-time communication network protocol for SMART

    Energy Technology Data Exchange (ETDEWEB)

    Song, Ki Sang; Kim, Young Sik [Korea National University of Education, Chongwon (Korea); No, Hee Chon [Korea Advanced Institute of Science and Technology, Taejon (Korea)

    1999-04-01

    In this research, we first define protocol subsets for SMART(System-integrated Modular Advanced Reactor) communication network based on the requirement of SMART MMIS transmission delay and traffic requirements and OSI(Open System Interconnection) 7 layers' network protocol functions. Also, current industrial purpose LAN protocols are analyzed and the applicability of commercialized protocols are checked. For the suitability test, we have applied approximated SMART data traffic and maximum allowable transmission delay requirement. With the simulation results, we conclude that IEEE 802.5 and FDDI which is an ANSI standard, is the most suitable for SMART. We further analyzed the FDDI and token ring protocols for SMART and nuclear plant network environment including IEEE 802.4, IEEE 802.5, and ARCnet. The most suitable protocol for SMART is FDDI and FDDI MAC and RMT protocol specifications have been verified with LOTOS and the verification results show that FDDI MAC and RMT satisfy the reachability and liveness, but does not show deadlock and livelock. Therefore, we conclude that FDDI MAC and RMT is highly reliable protocol for SMART MMIS network. After that, we consider the stacking fault of IEEE 802.5 token ring protocol and propose a fault tolerant MAM(Modified Active Monitor) protocol. The simulation results show that the MAM protocol improves lower priority traffic service rate when stacking fault occurs. Therefore, proposed MAM protocol can be applied to SMART communication network for high reliability and hard real-time communication purpose in data acquisition and inter channel network. (author). 37 refs., 79 figs., 39 tabs.

  3. Routing Protocols for Underwater Wireless Sensor Networks: Taxonomy, Research Challenges, Routing Strategies and Future Directions.

    Science.gov (United States)

    Khan, Anwar; Ali, Ihsan; Ghani, Abdullah; Khan, Nawsher; Alsaqer, Mohammed; Rahman, Atiq Ur; Mahmood, Hasan

    2018-05-18

    Recent research in underwater wireless sensor networks (UWSNs) has gained the attention of researchers in academia and industry for a number of applications. They include disaster and earthquake prediction, water quality and environment monitoring, leakage and mine detection, military surveillance and underwater navigation. However, the aquatic medium is associated with a number of limitations and challenges: long multipath delay, high interference and noise, harsh environment, low bandwidth and limited battery life of the sensor nodes. These challenges demand research techniques and strategies to be overcome in an efficient and effective fashion. The design of routing protocols for UWSNs is one of the promising solutions to cope with these challenges. This paper presents a survey of the routing protocols for UWSNs. For the ease of description, the addressed routing protocols are classified into two groups: localization-based and localization-free protocols. These groups are further subdivided according to the problems they address or the major parameters they consider during routing. Unlike the existing surveys, this survey considers only the latest and state-of-the-art routing protocols. In addition, every protocol is described in terms of its routing strategy and the problem it addresses and solves. The merit(s) of each protocol is (are) highlighted along with the cost. A description of the protocols in this fashion has a number of advantages for researchers, as compared to the existing surveys. Firstly, the description of the routing strategy of each protocol makes its routing operation easily understandable. Secondly, the demerit(s) of a protocol provides (provide) insight into overcoming its flaw(s) in future investigation. This, in turn, leads to the foundation of new protocols that are more intelligent, robust and efficient with respect to the desired parameters. Thirdly, a protocol can be selected for the appropriate application based on its described

  4. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  5. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... active and adaptive corruptions in the random oracle model. Due to its simplicity, the protocol is extremely efficient and it allows to perform m 1-out-of-n OTs using only: - Computation: (n+1)m+2 exponentiations (mn for the receiver, mn+2 for the sender) and - Communication: 32(m+1) bytes (for the group...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  6. A proposed protocol for remote control of automated assessment devices

    International Nuclear Information System (INIS)

    Kissock, P.S.; Pritchard, D.A.

    1996-01-01

    Systems and devices that are controlled remotely are becoming more common in security systems in the US Air Force and other government agencies to provide protection of valuable assets. These systems reduce the number of needed personnel while still providing a high level of protection. However, each remotely controlled device usually has its own communication protocol. This limits the ability to change devices without changing the system that provides the communications control to the device. Sandia is pursuing a standard protocol that can be used to communicate with the different devices currently in use, or may be used in the future, in the US Air Force and other government agencies throughout the security community. Devices to be controlled include intelligent pan/tilt mounts, day/night video cameras, thermal imaging cameras, and remote data processors. Important features of this protocol include the ability to send messages of varying length, identify the sender, and more importantly, control remote data processors. This paper describes the proposed public domain protocol, features, and examples of use. The authors hope to elicit comments from security technology developers regarding format and use of remotely controlled automated assessment devices

  7. Development of a neuromuscular electrical stimulation protocol for sprint training.

    Science.gov (United States)

    Russ, David W; Clark, Brian C; Krause, Jodi; Hagerman, Fredrick C

    2012-09-01

    Sprint training is associated with several beneficial adaptations in skeletal muscle, including an enhancement of sarcoplasmic reticulum (SR) Ca(2+) release. Unfortunately, several patient populations (e.g., the elderly, those with cardiac dysfunction) that might derive great benefit from sprint exercise are unlikely to tolerate it. The purpose of this report was to describe the development of a tolerable neuromuscular electrical stimulation (NMES) protocol that induces skeletal muscle adaptations similar to those observed with sprint training. Our NMES protocol was modeled after a published sprint exercise protocol and used a novel electrode configuration and stimulation sequence to provide adequate training stimulus while maintaining subject tolerance. Nine young, healthy subjects (four men) began and completed the training protocol of the knee extensor muscles. All subjects completed the protocol, with ratings of discomfort far less than those reported in studies of traditional NMES. Training induced significant increases in SR Ca(2+) release and citrate synthase activity (~16% and 32%, respectively), but SR Ca(2+) uptake did not change. The percentage of myosin heavy chain IIx isoform was decreased significantly after training. At the whole muscle level, neither central activation nor maximum voluntary isometric contraction force were significantly altered, although isometric force did exhibit a trend toward an increase (~3%, P = 0.055). Surprisingly, the NMES training produced a significant increase in muscle cross-sectional area (~3%, P = 0.04). It seems that an appropriately designed NMES protocol can mimic many of the benefits of sprint exercise training, with a low overall time commitment and training volume. These findings suggest that NMES has the potential to bring the benefits of sprint exercise to individuals who are unable to tolerate traditional sprint training.

  8. Blockchain Consensus Protocols in the Wild

    OpenAIRE

    Cachin, Christian; Vukolić, Marko

    2017-01-01

    A blockchain is a distributed ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received renewed attention because they also address blockchain systems. This work discusses the process o...

  9. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol h...

  10. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  11. Bitcoin-NG: A Scalable Blockchain Protocol

    OpenAIRE

    Eyal, Ittay; Gencer, Adem Efe; Sirer, Emin Gun; van Renesse, Robbert

    2015-01-01

    Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is By...

  12. Search and nonsearch protocols for radiographic consultation

    International Nuclear Information System (INIS)

    Swensson, R.G.; Theodore, G.H.

    1989-01-01

    Six radiologists, acting as film reviewers, used two different consultation protocols to differentiate among 292 ambiguous findings on chest films: 120 simulated nodules and 172 normal findings (previous readers' false-positive reports of nodules). The non-search protocol identified each finding (by location), and reviewers rated its likelihood as a nodule. The search protocol, which asked reviewers to report and rate all locations regarded as possible nodules on each film, assigned a default negative rating to any unreported finding (nodule or normal). Receiver operator characteristic analyses demonstrated a significantly higher accuracy for each reviewer's search- protocol discriminations between these nodules and confusing normal findings

  13. Adaptive Protocols for Mobile Wireless Networks

    National Research Council Canada - National Science Library

    Pursley, Michael B

    2005-01-01

    .... Research results are presented on adaptive, energy-efficient, distributed protocols for mobile wireless networks that must operate effectively over unreliable communication links in highly dynamic...

  14. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  15. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  16. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  17. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  18. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  19. Secure Multi-Player Protocols

    DEFF Research Database (Denmark)

    Fehr, Serge

    While classically cryptography is concerned with the problem of private communication among two entities, say players, in modern cryptography multi-player protocols play an important role. And among these, it is probably fair to say that secret sharing, and its stronger version verifiable secret...... sharing (VSS), as well as multi-party computation (MPC) belong to the most appealing and/or useful ones. The former two are basic tools to achieve better robustness of cryptographic schemes against malfunction or misuse by “decentralizing” the security from one single to a whole group of individuals...... (captured by the term threshold cryptography). The latter allows—at least in principle—to execute any collaboration among a group of players in a secure way that guarantees the correctness of the outcome but simultaneously respects the privacy of the participants. In this work, we study three aspects...

  20. Software for simulating IMRT protocol

    Energy Technology Data Exchange (ETDEWEB)

    Fonseca, Thelma C.F.; Campos, Tarcisio P.R. de, E-mail: tcff@ufmg.b, E-mail: campos@nuclear.ufmg.b [Universidade Federal de Minas Gerais (UFMG), Belo Horizonte, MG (Brazil). Dept. de Engenharia Nuclear

    2009-07-01

    The Intensity Modulated Radiation Therapy - IMRT is an advanced technique to cancer treatment widely used on oncology around the world. The present paper describes the SOFT-RT software which is a tool for simulating IMRT protocol. Also, it will be present a cerebral tumor case of studied in which three irradiation windows with distinct orientation were applied. The SOFT-RT collect and export data to MCNP code. This code simulates the photon transport on the voxel model. Later, a out-module from SOFT-RT import the results and express the dose-response superimposing dose and voxel model in a tree-dimensional graphic representation. The present paper address the IMRT software and its function as well a cerebral tumor case of studied is showed. The graphic interface of the SOFT-RT illustrates the example case. (author)

  1. Software for simulating IMRT protocol

    International Nuclear Information System (INIS)

    Fonseca, Thelma C.F.; Campos, Tarcisio P.R. de

    2009-01-01

    The Intensity Modulated Radiation Therapy - IMRT is an advanced technique to cancer treatment widely used on oncology around the world. The present paper describes the SOFT-RT software which is a tool for simulating IMRT protocol. Also, it will be present a cerebral tumor case of studied in which three irradiation windows with distinct orientation were applied. The SOFT-RT collect and export data to MCNP code. This code simulates the photon transport on the voxel model. Later, a out-module from SOFT-RT import the results and express the dose-response superimposing dose and voxel model in a tree-dimensional graphic representation. The present paper address the IMRT software and its function as well a cerebral tumor case of studied is showed. The graphic interface of the SOFT-RT illustrates the example case. (author)

  2. Analysing Protocol Stacks for Services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    We show an approach, CaPiTo, to model service-oriented applications using process algebras such that, on the one hand, we can achieve a certain level of abstraction without being overwhelmed by the underlying implementation details and, on the other hand, we respect the concrete industrial...... standards used for implementing the service-oriented applications. By doing so, we will be able to not only reason about applications at different levels of abstractions, but also to build a bridge between the views of researchers on formal methods and developers in industry. We apply our approach...... to the financial case study taken from Chapter 0-3. Finally, we develop a static analysis to analyse the security properties as they emerge at the level of concrete industrial protocols....

  3. Interplanetary Overlay Network Bundle Protocol Implementation

    Science.gov (United States)

    Burleigh, Scott C.

    2011-01-01

    The Interplanetary Overlay Network (ION) system's BP package, an implementation of the Delay-Tolerant Networking (DTN) Bundle Protocol (BP) and supporting services, has been specifically designed to be suitable for use on deep-space robotic vehicles. Although the ION BP implementation is unique in its use of zero-copy objects for high performance, and in its use of resource-sensitive rate control, it is fully interoperable with other implementations of the BP specification (Internet RFC 5050). The ION BP implementation is built using the same software infrastructure that underlies the implementation of the CCSDS (Consultative Committee for Space Data Systems) File Delivery Protocol (CFDP) built into the flight software of Deep Impact. It is designed to minimize resource consumption, while maximizing operational robustness. For example, no dynamic allocation of system memory is required. Like all the other ION packages, ION's BP implementation is designed to port readily between Linux and Solaris (for easy development and for ground system operations) and VxWorks (for flight systems operations). The exact same source code is exercised in both environments. Initially included in the ION BP implementations are the following: libraries of functions used in constructing bundle forwarders and convergence-layer (CL) input and output adapters; a simple prototype bundle forwarder and associated CL adapters designed to run over an IPbased local area network; administrative tools for managing a simple DTN infrastructure built from these components; a background daemon process that silently destroys bundles whose time-to-live intervals have expired; a library of functions exposed to applications, enabling them to issue and receive data encapsulated in DTN bundles; and some simple applications that can be used for system checkout and benchmarking.

  4. Accuracy of prehospital triage protocols in selecting severely injured patients: A systematic review.

    Science.gov (United States)

    van Rein, Eveline A J; Houwert, R Marijn; Gunning, Amy C; Lichtveld, Rob A; Leenen, Luke P H; van Heijl, Mark

    2017-08-01

    Prehospital trauma triage ensures proper transport of patients at risk of severe injury to hospitals with an appropriate corresponding level of trauma care. Incorrect triage results in undertriage and overtriage. The American College of Surgeons Committee on Trauma recommends an undertriage rate below 5% and an overtriage rate below 50% for prehospital trauma triage protocols. To find the most accurate prehospital trauma triage protocol, a clear overview of all currently available protocols and corresponding outcomes is necessary. The aim of this systematic review was to evaluate the current literature on all available prehospital trauma triage protocols and determine accuracy of protocol-based triage quality in terms of sensitivity and specificity. A search of Pubmed, Embase, and Cochrane Library databases was performed to identify all studies describing prehospital trauma triage protocols before November 2016. The search terms included "trauma," "trauma center," or "trauma system" combined with "triage," "undertriage," or "overtriage." All studies describing protocol-based triage quality were reviewed. To assess the quality of these type of studies, a new critical appraisal tool was developed. In this review, 21 articles were included with numbers of patients ranging from 130 to over 1 million. Significant predictors for severe injury were: vital signs, suspicion of certain anatomic injuries, mechanism of injury, and age. Sensitivity ranged from 10% to 100%; specificity from 9% to 100%. Nearly all protocols had a low sensitivity, thereby failing to identify severely injured patients. Additionally, the critical appraisal showed poor quality of the majority of included studies. This systematic review shows that nearly all protocols are incapable of identifying severely injured patients. Future studies of high methodological quality should be performed to improve prehospital trauma triage protocols. Systematic review, level III.

  5. The African Women's Protocol: bringing attention to reproductive rights and the MDGs.

    Directory of Open Access Journals (Sweden)

    Liesl Gerntholtz

    2011-04-01

    Full Text Available Andrew Gibbs and colleagues discuss the African Women's Protocol, a framework for ensuring reproductive rights are supported throughout the continent and for supporting interventions to improve women's reproductive health, including the MDGs.

  6. Evaluating Management Information Systems, A Protocol for Automated Peer Review Systems

    OpenAIRE

    Black, Gordon C.

    1980-01-01

    This paper discusses key issues in evaluating an automated Peer Review System. Included are the conceptual base, design, steps in planning structural components, operation parameters, criteria, costs and a detailed outline or protocol for use in the evaluation.

  7. Wind power agreement protocol; Protocole d'accord eolien

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-10-01

    The aim of this protocol of agreement is to propose to wind turbine fitters some models of contracts allowing the setting up of wind turbines on agricultural lots. These documents, which make an indissociable ensemble, apply to both phases of development of a wind power project: the feasibility study phase, for a duration comprised between 2 and 5 years (studies, administrative procedures, precise definition of the project), and the construction, exploitation and dismantling phase. These documents will serve as common guidelines for both the farmers and the wind turbine designers. Both parties agree to meet together in the future to propose some modifications of these texts if necessary. The four models of contracts are attached to the document: contract for the feasibility study phase, first contract between the landlord and the farmer for the cancellation of the rural lease, second contract between the landlord and the wind power exploitation company for the common right lease, and the third contract between the farmer and the wind power company for the indemnification convention. (J.S.)

  8. Analysis of a security protocol in ?CRL

    NARCIS (Netherlands)

    J. Pang

    2002-01-01

    textabstractNeedham-Schroeder public-key protocol; With the growth and commercialization of the Internet, the security of communication between computers becomes a crucial point. A variety of security protocols based on cryptographic primitives are used to establish secure communication over

  9. An Argument Approach to Observation Protocol Validity

    Science.gov (United States)

    Bell, Courtney A.; Gitomer, Drew H.; McCaffrey, Daniel F.; Hamre, Bridget K.; Pianta, Robert C.; Qi, Yi

    2012-01-01

    This article develops a validity argument approach for use on observation protocols currently used to assess teacher quality for high-stakes personnel and professional development decisions. After defining the teaching quality domain, we articulate an interpretive argument for observation protocols. To illustrate the types of evidence that might…

  10. Model checking the HAVi leader election protocol

    NARCIS (Netherlands)

    J.M.T. Romijn (Judi)

    1999-01-01

    textabstractThe HAVi specification proposes an architecture for audio/video interoperability in home networks. Part of the HAVi specification is a distributed leader election protocol. We have modelled this leader election protocol in Promela and Lotos and have checked several properties with the

  11. Climate Change And The Kyoto Protocol

    International Nuclear Information System (INIS)

    Comsan, M.N.H.

    2007-01-01

    The problem of global warming is addressed. Changes in earth surface temperature, emission of CO 2 and other four major green house gases are presented. Effect of global warming on weather, ocean, and ecosystem is discussed. A brief history of the Kyoto protocol starting from the 151 Earth Summit in 1972 is outlined. An overview of the protocol and a brief summary are given

  12. Kyoto Protocol: trade versus the environment

    International Nuclear Information System (INIS)

    Loose, H.

    2001-01-01

    Could the signatories to the Kyoto Protocol find themselves up against the WTO? This paper examines how the climate change agreement could conflict with trade rules, and shows that there are potentially serious conflicts in the interface between the WTO and the Kyoto Protocol. It argues for dialogue and debate before it is too late. (author)

  13. Network Coding Protocols for Smart Grid Communications

    DEFF Research Database (Denmark)

    Prior, Rui; Roetter, Daniel Enrique Lucani; Phulpin, Yannick

    2014-01-01

    We propose a robust network coding protocol for enhancing the reliability and speed of data gathering in smart grids. At the heart of our protocol lies the idea of tunable sparse network coding, which adopts the transmission of sparsely coded packets at the beginning of the transmission process b...

  14. UNFINISHED BUSINESS: The Economics of The Kyoto Protocol

    Energy Technology Data Exchange (ETDEWEB)

    JA Edmonds; CN MacCracken; RD Sands; SH Kim

    2000-07-06

    The Kyoto Protocol to the Framework Convention on Climate Change (FCCC) was completed on the morning of December 11, 1997, following over two years of negotiations. The product of these deliberations is a complex and incomplete document knitting together the diversity of interests and perspectives represented by the more than 150 delegations. Because the document is complex, its implications are not immediately obvious. If it enters into force, the Kyoto Protocol will have far-reaching implications for all nations--both nations with obligations under the Protocol and those without obligations. National energy systems, and the world's energy system, could be forever changed. In this paper the authors develop an assessment of the energy and economic implications of achieving the goals of the Kyoto Protocol. They find that many of the details of the Protocol that remain to be worked out introduce critical uncertainties affecting the cost of compliance. There are also a variety of uncertainties that further complicate the analysis. These include future non-CO{sub 2} greenhouse gas emissions and the cost of their mitigation. Other uncertainties include the resolution of negotiations to establish rules for determining and allocating land-use emissions rights, mechanisms for Annex 1 trading, and participation by non-Annex 1 members in the Clean Development Mechanism. In addition, there are economic uncertainties, such as the behavior of Eastern Europe and the former Soviet Union in supplying emissions credits under Annex 1 trading. These uncertainties in turn could affect private sector investments in anticipation of the Protocol's entrance into force. The longer the nature of future obligations remains unclear, the less able decision makers will be to incorporate these rules into their investment decisions. They find that the cost of implementing the Protocol in the US can vary by more than an order of magnitude. The marginal cost could be as low as $26 per

  15. Quality and Variability of Online Available Physical Therapy Protocols From Academic Orthopaedic Surgery Programs for Anterior Cruciate Ligament Reconstruction.

    Science.gov (United States)

    Makhni, Eric C; Crump, Erica K; Steinhaus, Michael E; Verma, Nikhil N; Ahmad, Christopher S; Cole, Brian J; Bach, Bernard R

    2016-08-01

    To assess the quality and variability found across anterior cruciate ligament (ACL) rehabilitation protocols published online by academic orthopaedic programs. Web-based ACL physical therapy protocols from United States academic orthopaedic programs available online were included for review. Main exclusion criteria included concomitant meniscus repair, protocols aimed at pediatric patients, and failure to provide time points for the commencement or recommended completion of any protocol components. A comprehensive, custom scoring rubric was created that was used to assess each protocol for the presence or absence of various rehabilitation components, as well as when those activities were allowed to be initiated in each protocol. Forty-two protocols were included for review from 155 U.S. academic orthopaedic programs. Only 13 protocols (31%) recommended a prehabilitation program. Five protocols (12%) recommended continuous passive motion postoperatively. Eleven protocols (26%) recommended routine partial or non-weight bearing immediately postoperatively. Ten protocols (24%) mentioned utilization of a secondary/functional brace. There was considerable variation in range of desired full-weight-bearing initiation (9 weeks), as well as in the types of strength and proprioception exercises specifically recommended. Only 8 different protocols (19%) recommended return to sport after achieving certain strength and activity criteria. Many ACL rehabilitation protocols recommend treatment modalities not supported by current reports. Moreover, high variability in the composition and time ranges of rehabilitation components may lead to confusion among patients and therapists. Level II. Copyright © 2016 Arthroscopy Association of North America. Published by Elsevier Inc. All rights reserved.

  16. A Novel Re-keying Function Protocol (NRFP For Wireless Sensor Network Security

    Directory of Open Access Journals (Sweden)

    Naif Alsharabi

    2008-12-01

    Full Text Available This paper describes a novel re-keying function protocol (NRFP for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs, covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.

  17. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security

    Science.gov (United States)

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-01-01

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding innetwork processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks. PMID:27873963

  18. Implementation of a protocol to reduce occurrence of retained sponges after vaginal delivery.

    Science.gov (United States)

    Lutgendorf, Monica A; Schindler, Lynnett L; Hill, James B; Magann, Everett F; O'Boyle, John D

    2011-06-01

    Retained sponges (gossypiboma) following vaginal delivery are an uncommon occurrence. Although significant morbidity from such an event is unlikely, there are many reported adverse effects, including symptoms of malodorous discharge, loss of confidence in providers and the medical system, and legal claims. To report a protocol intended to reduce the occurrence of retained sponges following vaginal delivery. After identification of limitations with existing delivery room protocols, we developed a sponge count protocol to reduce occurrence of retained vaginal sponges. We report our experience at Naval Medical Center Portsmouth, a large tertiary care military treatment facility with our efforts to implement a sponge count protocol to reduce retained sponges following vaginal delivery. With appropriate pre-implementation training, protocols which incorporate post-delivery vaginal sweep and sponge counts are well accepted by the health care team and can be incorporated into the delivery room routine.

  19. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    Energy Technology Data Exchange (ETDEWEB)

    Conover, David R. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Crawford, Aladsair J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Fuller, Jason C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Gourisetti, Sri Nikhil Gup [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Viswanathan, Vilayanur V. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Ferreira, Summer [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Schoenwald, David [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Rosewater, David [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-04-01

    The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Based on experiences with the application and use of that document, and to include additional ESS applications and associated duty cycles, test procedures and performance metrics, a first revision of the November 2012 Protocol was issued in June 2014 (PNNL 22010 Rev. 1). As an update of the 2014 revision 1 to the Protocol, this document (the March 2016 revision 2 to the Protocol) is intended to supersede the June 2014 revision 1 to the Protocol and provide a more user-friendly yet more robust and comprehensive basis for measuring and expressing ESS performance.

  20. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security.

    Science.gov (United States)

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-12-04

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.

  1. A shortened protocol for assessing cognitive bias in rats.

    Science.gov (United States)

    Brydges, Nichola M; Hall, Lynsey

    2017-07-15

    Reliable measurement of affective state in animals is a significant goal of animal welfare. Such measurements would also improve the validity of pre-clinical mental health research which relies on animal models. However, at present, affective states in animals are inaccessible to direct measurement. In humans, changes in cognitive processing can give reliable indications of emotional state. Therefore, similar techniques are increasingly being used to gain proxy measures of affective states in animals. In particular, the 'cognitive bias' assay has gained popularity in recent years. Major disadvantages of this technique include length of time taken for animals to acquire the task (typically several weeks), negative experiences associated with task training, and issues of motivation. Here we present a shortened cognitive bias protocol using only positive reinforcers which must actively be responded to. The protocol took an average of 4days to complete, and produced similar results to previous, longer methods (minimum 30days). Specifically, rats housed in standard laboratory conditions demonstrated negative cognitive biases when presented with ambiguous stimuli, and took longer to make a decision when faced with an ambiguous stimulus. Compared to previous methods, this protocol is significantly shorter (average 4days vs. minimum 30days), utilises only positive reinforcers to avoid inducing negative affective states, and requires active responses to all cues, avoiding potential confounds of motivational state. We have successfully developed a shortened cognitive bias protocol, suitable for use with laboratory rats. Copyright © 2017 The Author(s). Published by Elsevier B.V. All rights reserved.

  2. A Self-Stabilizing Hybrid Fault-Tolerant Synchronization Protocol

    Science.gov (United States)

    Malekpour, Mahyar R.

    2015-01-01

    This paper presents a strategy for solving the Byzantine general problem for self-stabilizing a fully connected network from an arbitrary state and in the presence of any number of faults with various severities including any number of arbitrary (Byzantine) faulty nodes. The strategy consists of two parts: first, converting Byzantine faults into symmetric faults, and second, using a proven symmetric-fault tolerant algorithm to solve the general case of the problem. A protocol (algorithm) is also present that tolerates symmetric faults, provided that there are more good nodes than faulty ones. The solution applies to realizable systems, while allowing for differences in the network elements, provided that the number of arbitrary faults is not more than a third of the network size. The only constraint on the behavior of a node is that the interactions with other nodes are restricted to defined links and interfaces. The solution does not rely on assumptions about the initial state of the system and no central clock nor centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. A mechanical verification of a proposed protocol is also present. A bounded model of the protocol is verified using the Symbolic Model Verifier (SMV). The model checking effort is focused on verifying correctness of the bounded model of the protocol as well as confirming claims of determinism and linear convergence with respect to the self-stabilization period.

  3. Developing of the protocol for electron beam food irradiation facility

    International Nuclear Information System (INIS)

    Petreska, Svetlana

    2012-01-01

    By establishing the needs for institution of new technologies in the process of food processing, in this case a randomized choice of electron beam accelerator facility, arises the need for designing a protocol for safe and secure performance of the facility. The protocol encompasses safety and security measures for protection from ionizing radiation of the individuals who work at the facility, as well as, the population and the environment in the immediate neighborhood of the facility. Thus, the adopted approach is the establishment of appropriate systems responding to the protocol. Dosimetry system, which includes appropriate procedures for accurate measure and recording of the absorbed dose values, according to the provisions for protection from ionizing radiation. Ionizing radiation protection system and providing the safety and security of the facility for food processing by means of ionizing radiation. System for providing quality and safety control of the facility for food processing by means of ionizing radiation. Pursuant to the designed a protocol for safe and secure performance of the facility for electron beam food processing, contributes to protection against ionizing radiation as occupationally exposed persons as well the population. (Author)

  4. Protocol independent transmission method in software defined optical network

    Science.gov (United States)

    Liu, Yuze; Li, Hui; Hou, Yanfang; Qiu, Yajun; Ji, Yuefeng

    2016-10-01

    With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.i., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). Using a proprietary protocol or encoding format is a way to improve information security. However, the flow, which carried by proprietary protocol or code, cannot go through the traditional IP network. In addition, ultra- high-definition video transmission service once again become a hot spot. Traditionally, in the IP network, the Serial Digital Interface (SDI) signal must be compressed. This approach offers additional advantages but also bring some disadvantages such as signal degradation and high latency. To some extent, HD-SDI can also be regard as a proprietary protocol, which need transparent transmission such as optical channel. However, traditional optical networks cannot support flexible traffics . In response to aforementioned challenges for future network, one immediate solution would be to use NFV technology to abstract the network infrastructure and provide an all-optical switching topology graph for the SDN control plane. This paper proposes a new service-based software defined optical network architecture, including an infrastructure layer, a virtualization layer, a service abstract layer and an application layer. We then dwell on the corresponding service providing method in order to implement the protocol-independent transport. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit the HD-SDI signal in the software-defined optical network.

  5. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  6. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  7. Nucleic acid protocols: Extraction and optimization

    Directory of Open Access Journals (Sweden)

    Saeed El-Ashram

    2016-12-01

    Full Text Available Yield and quality are fundamental features for any researchers during nucleic acid extraction. Here, we describe a simplified, semi-unified, effective, and toxic material free protocol for extracting DNA and RNA from different prokaryotic and eukaryotic sources exploiting the physical and chemical properties of nucleic acids. Furthermore, this protocol showed that DNA and RNA are under triple protection (i.e. EDTA, SDS and NaCl during lysis step, and this environment is improper for RNase to have DNA liberated of RNA and even for DNase to degrade the DNA. Therefore, the complete removal of RNA under RNase influence is achieved when RNase is added after DNA extraction, which gives optimal quality with any protocols. Similarly, DNA contamination in an isolated RNA is degraded by DNase to obtain high-quality RNA. Our protocol is the protocol of choice in terms of simplicity, recovery time, environmental safety, amount, purity, PCR and RT-PCR applicability.

  8. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  9. Protocol for the quantification of greenhouse gas emissions from waste management activities

    International Nuclear Information System (INIS)

    2013-10-01

    ' document. The quantification of GHG emissions from waste management activities is a complex exercise. This Protocol is a living document which is going to evolve together with the improvement of calculation and measurement techniques. This Protocol is a tool for quantifying and reporting a greenhouse gas inventory from waste activities over a given time frame, typically a year. In this regard, the landfill methane emissions reported are only those estimated to be emitted in the given reporting year. The reported value does not include the future emissions resulting from the degradation of waste landfilled in and prior to the reporting year. Therefore, the reported landfill methane values based on this Protocol should not be used in the context of a comparison of greenhouse gas footprint of various waste technologies

  10. PROTOCOL OF TREATMENT IN LOW BACK PAIN

    Directory of Open Access Journals (Sweden)

    Alisson Guimbala dos Santos Araujo

    2013-09-01

    Full Text Available Low back pain can be considered as one of the main factors that lead to decreased functional capacity of the human being. Being a frequent dysfunction in people, causing a decrease in quality of life, productivity and functional disability and is associated with important social and economic impact. Therefore the objective of the research was to assess the treatment protocols in low back pain. The study is characterized by being a literature of scientific articles, based on data published in PubMed, SciELO, BIREME and Cochrane from 2000 to 2012. We found eight scientific articles that addressed physical therapy methods in the treatment of low back pain, including a literature review. Related Articles show variation from one to 55 patients in groups, with a total of 185 patients studied. It was concluded then that it hasn’t met a specific treatment that is placed as the most effective for this pathology, although all include electrotherapy, manual therapy, exercise and RPG they show significant results in pain relief, quality of life thereby increasing functionality.

  11. Massive transfusion protocols: current best practice

    Directory of Open Access Journals (Sweden)

    Hsu YM

    2016-03-01

    Full Text Available Yen-Michael S Hsu,1 Thorsten Haas,2 Melissa M Cushing1 1Department of Pathology and Laboratory Medicine, Weill Cornell Medical College, New York, NY, USA; 2Department of Anesthesia, University Children's Hospital Zurich, Zurich, Switzerland Abstract: Massive transfusion protocols (MTPs are established to provide rapid blood replacement in a setting of severe hemorrhage. Early optimal blood transfusion is essential to sustain organ perfusion and oxygenation. There are many variables to consider when establishing an MTP, and studies have prospectively evaluated different scenarios and patient populations to establish the best practices to attain improved patient outcomes. The establishment and utilization of an optimal MTP is challenging given the ever-changing patient status during resuscitation efforts. Much of the MTP literature comes from the trauma population, due to the fact that massive hemorrhage is the leading cause of preventable trauma-related death. As we come to further understand the positive and negative clinical impacts of transfusion-related factors, massive transfusion practice can be further refined. This article will first discuss specific MTPs targeting different patient populations and current relevant international guidelines. Then, we will examine a wide selection of therapeutic products to support MTPs, including newly available products and the most suitable of the traditional products. Lastly, we will discuss the best design for an MTP, including ratio-based MTPs and MTPs based on the use of point-of-care coagulation diagnostic tools. Keywords: hemorrhage, MTP, antifibrinolytics, coagulopathy, trauma, ratio, logistics, guidelines, hemostatic

  12. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  13. A Performance Study of LEACH and Direct Diffusion Routing Protocols in Wireless Sensor Network

    International Nuclear Information System (INIS)

    Fakher, S.; Sharshar, K.; Moawad, M.I.; Shokair, M.

    2016-01-01

    The Wireless Sensor Network (WSN) is composed of a large number of sensor nodes with limited computation communication, and battery facilities. One of the common applications of this network is environment monitoring through sensing motion, measuring temperature, humidity and radiation. One of the basic activities in WSN is data gathering which represents a great challenge. Many routing protocols are proposed for that network to collect and aggregate the data. The most popular ones are hierarchy and data centric routing protocols. The main goal of this study is to identify the most preferable routing protocol, to be used in each mobility model. This paper studies the performance of LEACH (Low Energy Adaptive Clustering Hierarchy) from hierarchy routing protocol and direct diffusion from data centric routing protocol which is not clarified until now. Moreover, a comparison between LEACH and direct diffusion protocol using NS2 simulator will be made, and an analysis of these protocols will be conducted. The comparison includes packet delivery ratio, throughput, average energy ratio, average delay, network lifetime, and routing overhead. The performance is evaluated by varying the number of sensor nodes under three mobility models Reference Point Group Mobility Model (RPGM), Manhattan and random waypoint mobility model. Simulation results show that LEACH routing protocol has a good performance in RPGM and Manhattan than random waypoint mobility model. Direct diffusion has a good performance in random waypoint mobility model than in RPGM and Manhattan mobility model

  14. SPIRIT 2013 explanation and elaboration: guidance for protocols of clinical trials.

    Science.gov (United States)

    Chan, An-Wen; Tetzlaff, Jennifer M; Gøtzsche, Peter C; Altman, Douglas G; Mann, Howard; Berlin, Jesse A; Dickersin, Kay; Hróbjartsson, Asbjørn; Schulz, Kenneth F; Parulekar, Wendy R; Krleza-Jeric, Karmela; Laupacis, Andreas; Moher, David

    2013-01-08

    High quality protocols facilitate proper conduct, reporting, and external review of clinical trials. However, the completeness of trial protocols is often inadequate. To help improve the content and quality of protocols, an international group of stakeholders developed the SPIRIT 2013 Statement (Standard Protocol Items: Recommendations for Interventional Trials). The SPIRIT Statement provides guidance in the form of a checklist of recommended items to include in a clinical trial protocol. This SPIRIT 2013 Explanation and Elaboration paper provides important information to promote full understanding of the checklist recommendations. For each checklist item, we provide a rationale and detailed description; a model example from an actual protocol; and relevant references supporting its importance. We strongly recommend that this explanatory paper be used in conjunction with the SPIRIT Statement. A website of resources is also available (www.spirit-statement.org). The SPIRIT 2013 Explanation and Elaboration paper, together with the Statement, should help with the drafting of trial protocols. Complete documentation of key trial elements can facilitate transparency and protocol review for the benefit of all stakeholders.

  15. A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.

    Science.gov (United States)

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2015-08-01

    Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based RFID tag authentication protocol in TMIS. Their protocol uses lightweight hash operation and synchronized secret value shared between back-end server and tag, which is more secure and efficient than other related RFID authentication protocols. Unfortunately, in this paper, we demonstrate that Srivastava et al.'s tag authentication protocol has a serious security problem in that an adversary may use the stolen/lost reader to connect to the medical back-end server that store information associated with tagged objects and this privacy damage causing the adversary could reveal medical data obtained from stolen/lost readers in a malicious way. Therefore, we propose a secure and efficient RFID tag authentication protocol to overcome security flaws and improve the system efficiency. Compared with Srivastava et al.'s protocol, the proposed protocol not only inherits the advantages of Srivastava et al.'s authentication protocol for TMIS but also provides better security with high system efficiency.

  16. A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.

    Science.gov (United States)

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Telecare medical information system (TMIS) makes an efficient and convenient connection between patient(s)/user(s) and doctor(s) over the insecure internet. Therefore, data security, privacy and user authentication are enormously important for accessing important medical data over insecure communication. Recently, many user authentication protocols for TMIS have been proposed in the literature and it has been observed that most of the protocols cannot achieve complete security requirements. In this paper, we have scrutinized two (Mishra et al., Xu et al.) remote user authentication protocols using smart card and explained that both the protocols are suffering against several security weaknesses. We have then presented three-factor user authentication and key agreement protocol usable for TMIS, which fix the security pitfalls of the above mentioned schemes. The informal cryptanalysis makes certain that the proposed protocol provides well security protection on the relevant security attacks. Furthermore, the simulator AVISPA tool confirms that the protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The security functionalities and performance comparison analysis confirm that our protocol not only provide strong protection on security attacks, but it also achieves better complexities along with efficient login and password change phase as well as session key verification property.

  17. A family of multi-party authentication protocols

    NARCIS (Netherlands)

    Cremers, C.J.F.; Mauw, S.

    2006-01-01

    We introduce a family of multi-party authentication protocols and discuss six novel protocols, which are members of this family. The first three generalize the well-known Needham-Schroeder-Lowe public-key protocol, the Needham-Schroeder private-key protocol, and the Bilateral Key Exchange protocol.

  18. Universally composable protocols with relaxed set-up assumptions

    DEFF Research Database (Denmark)

    Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus

    2004-01-01

    A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally composable (UC) protocols provide this guarantee in a strong sense: A protocol remains secure even when composed concurrently with an unbounded number of ...

  19. Live chat alternative security protocol

    Science.gov (United States)

    Rahman, J. P. R.; Nugraha, E.; Febriany, A.

    2018-05-01

    Indonesia is one of the largest e-commerce markets in Southeast Asia, as many as 5 million people do transactions in e-commerce, therefore more and more people use live chat service to communicate with customer service. In live chat, the customer service often asks customers’ data such as, full name, address, e-mail, transaction id, which aims to verify the purchase of the product. One of the risks that will happen is sniffing which will lead to the theft of confidential information that will cause huge losses to the customer. The anticipation that will be done is build an alternative security protocol for user interaction in live chat by using a cryptographic algorithm that is useful for protecting confidential messages. Live chat requires confidentiality and data integration with encryption and hash functions. The used algorithm are Rijndael 256 bits, RSA, and SHA256. To increase the complexity, the Rijndael algorithm will be modified in the S-box and ShiftRow sections based on the shannon principle rule, the results show that all pass the Randomness test, but the modification in Shiftrow indicates a better avalanche effect. Therefore the message will be difficult to be stolen or changed.

  20. Industrial wireless sensor networks applications, protocols, and standards

    CERN Document Server

    Güngör, V Çagri

    2013-01-01

    The collaborative nature of industrial wireless sensor networks (IWSNs) brings several advantages over traditional wired industrial monitoring and control systems, including self-organization, rapid deployment, flexibility, and inherent intelligent processing. In this regard, IWSNs play a vital role in creating more reliable, efficient, and productive industrial systems, thus improving companies' competitiveness in the marketplace. Industrial Wireless Sensor Networks: Applications, Protocols, and Standards examines the current state of the art in industrial wireless sensor networks and outline

  1. An optimised protocol for molecular identification of Eimeria from chickens☆

    Science.gov (United States)

    Kumar, Saroj; Garg, Rajat; Moftah, Abdalgader; Clark, Emily L.; Macdonald, Sarah E.; Chaudhry, Abdul S.; Sparagano, Olivier; Banerjee, Partha S.; Kundu, Krishnendu; Tomley, Fiona M.; Blake, Damer P.

    2014-01-01

    Molecular approaches supporting identification of Eimeria parasites infecting chickens have been available for more than 20 years, although they have largely failed to replace traditional measures such as microscopy and pathology. Limitations of microscopy-led diagnostics, including a requirement for specialist parasitological expertise and low sample throughput, are yet to be outweighed by the difficulties associated with accessing genomic DNA from environmental Eimeria samples. A key step towards the use of Eimeria species-specific PCR as a sensitive and reproducible discriminatory tool for use in the field is the production of a standardised protocol that includes sample collection and DNA template preparation, as well as primer selection from the numerous PCR assays now published. Such a protocol will facilitate development of valuable epidemiological datasets which may be easily compared between studies and laboratories. The outcome of an optimisation process undertaken in laboratories in India and the UK is described here, identifying four steps. First, samples were collected into a 2% (w/v) potassium dichromate solution. Second, oocysts were enriched by flotation in saturated saline. Third, genomic DNA was extracted using a QIAamp DNA Stool mini kit protocol including a mechanical homogenisation step. Finally, nested PCR was carried out using previously published primers targeting the internal transcribed spacer region 1 (ITS-1). Alternative methods tested included sample processing in the presence of faecal material, DNA extraction using a traditional phenol/chloroform protocol, the use of SCAR multiplex PCR (one tube and two tube versions) and speciation using the morphometric tool COCCIMORPH for the first time with field samples. PMID:24138724

  2. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  3. Protocol and networking design issues for local access WDM networks

    OpenAIRE

    Salvador, M.R.; Heemstra de Groot, S.M.; Niemegeers, I.G.M.M.

    1999-01-01

    This report gives an overview of some of the protocol and networking design issues that have been addressed in Flamingo, a major ongoing project which investigates the use of WDM optical technology in local access networks. Quality of service delivery and wavelength assignment are focused on in this report. A brief introduction to optical networks and WDM as well as a brief description of Flamingo are also included in this report.

  4. Multiprofissional electronic protocol in ophtalmology with enfasis in strabismus.

    Science.gov (United States)

    Ribeiro, Christie Graf; Moreira, Ana Tereza Ramos; Pinto, José Simão DE Paula; Malafaia, Osvaldo

    2016-01-01

    to create and validate an electronic database in ophthalmology focused on strabismus, to computerize this database in the form of a systematic data collection software named Electronic Protocol, and to incorporate this protocol into the Integrated System of Electronic Protocols (SINPE(c)). this is a descriptive study, with the methodology divided into three phases: (1) development of a theoretical ophthalmologic database with emphasis on strabismus; (2) computerization of this theoretical ophthalmologic database using SINPE(c) and (3) interpretation of the information with demonstration of results to validate the protocol. We inputed data from the charts of fifty patients with known strabismus through the Electronic Protocol for testing and validation. the new electronic protocol was able to store information regarding patient history, physical examination, laboratory exams, imaging results, diagnosis and treatment of patients with ophthalmologic diseases, with emphasis on strabismus. We included 2,141 items in this master protocol and created 20 new specific electronic protocols for strabismus, each with its own specifics. Validation was achieved through correlation and corroboration of the symptoms and confirmed diagnoses of the fifty included patients with the diagnostic criteria for the twenty new strabismus protocols. a new, validated electronic database focusing on ophthalmology, with emphasis on strabismus, was successfully created through the standardized collection of information, and computerization of the database using proprietary software. This protocol is ready for deployment to facilitate data collection, sorting and application for practitioners and researchers in numerous specialties. criar uma base eletrônica de dados em oftalmologia com ênfase em estrabismo através da coleta padronizada de informações. Informatizar esta base sob a forma de software para a coleta sistemática de dados chamado "Protocolo Eletrônico" e incorporar este

  5. Formal Specification and Description Language and Message Sequence Chart to Model and Validate Session Initiation Protocol Services

    OpenAIRE

    Sa'ed Abed; Mohammad H. Al Shayeji; Ovais Ahmed; Sahel Alouneh

    2016-01-01

    Session Initiation Protocol (SIP) is a signaling layer protocol for building, adjusting and ending sessions among participants including Internet conferences, telephone calls and multimedia distribution. SIP facilitates user movement by proxying and forwarding requests to the present location of the user. In this paper, we provide a formal Specification and Description Language (SDL) and Message Sequence Chart (MSC) to model and define the Internet Engineering Task Force (IETF) SIP protocol a...

  6. Prayer Healing: A Case Study Research Protocol.

    Science.gov (United States)

    Kruijthoff, Dirk J; van der Kooi, Cornelis; Glas, Gerrit; Abma, Tineke A

    2017-01-01

    Context • Prayer healing is a common practice in many religious communities around the world. Even in the highly secularized Dutch society, cases of prayer healing are occasionally reported in the media, often generating public attention. There is an ongoing debate regarding whether such miraculous cures do actually occur and how to interpret them. Objective • The aim of the article was to present a research protocol for the investigation of reported cases of remarkable and/or unexplained healing after prayer. Design • The research team developed a method to perform a retrospective, case-based study of prayer healing. Reported prayer healings can be investigated systematically in accordance with a step-by-step methodology. The focus is on understanding the healing by studying it from multiple perspectives, using both medical judgment and patients' narratives collected by qualitative methods Setting • The study occurred at Vrije Universiteit (VU) and VU Medical Center (Amsterdam, Netherlands) as well as the general medical practice of the first author. Participants • Potential participants could be any individuals in the Netherlands or neighboring countries who claim to have been healed through prayer. The reports of healing came from multiple sources, including the research team's medical practices and their direct vicinities, newspaper articles, prayer healers, and medical colleagues. Outcome Measures • Medical data were obtained before and after prayer. Subsequently, a member of a research team and of a medical assessment committee made a standardized judgment that evaluated whether a cure was clinically remarkable or scientifically unexplained. The participants' experiences and insider perspectives were studied, using in-depth interviews in accordance with a qualitative research methodology, to gain insight into the perceptions and explanations of the cures that were offered by participants and by the members of the medical assessment committee. The

  7. Acute kidney injury in critically burned patients resuscitated with a protocol that includes low doses of Hydroxyethyl Starch.

    Science.gov (United States)

    Sánchez-Sánchez, M; Garcia-de-Lorenzo, A; Cachafeiro, L; Herrero, E; Asensio, M J; Agrifoglio, A; Flores, E; Estebanez, B; Extremera, P; Iglesias, C; Martinez, J R

    2016-09-30

    Acute kidney injury (AKI) is an important complication in burn patients. Recently, it has been recommended that hydroxyethyl starch (HES) be avoided in burn patients because it increases the incidence of AKI. Our purpose was to study incidence of AKI in critically ill burn patients resuscitated with Ringer's solution and supplements of HES. We conducted an observational study of 165 patients admitted to the critical care burn unit (with 30 ± 15% TBSA burned). The main outcome measures were incidence of AKI, contributions of colloids and crystalloids, various severity scores, comorbidities, complications and mortality. According to the RIFLE criteria, 10 (6.1%) patients presented with Risk, 11 (6.7%) presented with Injury and 11 (6.7%) presented with Failure. According to the AKIN criteria, 9.7% presented stage I, 3% stage II and 10.3% stage III. Replacement therapy (RRT) was performed in 15 patients (9.1%), but in 6 of them RRT was employed in the final stages of multi-organ failure. The incidence of AKI in severe burn patients is high according to the RIFLE or AKIN criteria and these patients experience more complications and higher mortality. Our study suggests that the use of HES in low doses in the burn resuscitation phase does not cause more AKI than resuscitation without HES, but further evaluation is required. Further studies should be conducted.

  8. Acute kidney injury in critically burned patients resuscitated with a protocol that includes low doses of Hydroxyethyl Starch

    OpenAIRE

    Sánchez-Sánchez, M.; Garcia-de-Lorenzo, A.; Cachafeiro, L.; Herrero, E.; Asensio, MJ.; Agrifoglio, A.; Flores, E.; Estebanez, B.; Extremera, P.; Iglesias, C.; Martinez, J.R..

    2016-01-01

    Acute kidney injury (AKI) is an important complication in burn patients. Recently, it has been recommended that hydroxyethyl starch (HES) be avoided in burn patients because it increases the incidence of AKI. Our purpose was to study incidence of AKI in critically ill burn patients resuscitated with Ringer’s solution and supplements of HES. We conducted an observational study of 165 patients admitted to the critical care burn unit (with 30 ± 15% TBSA burned). The main outcome measures were in...

  9. Resolving issues on terrestrial biospheric sinks in the Kyoto Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Nabuurs, G.J.; Verkaik, E.; Mohren, G.M.J. [DLO Institute for Forestry and Nature Research IBN-DLO, Wageningen (Netherlands); Dolman, A.J.; Kabat, P. [DLO Winand Staring Centre SC-DLO, Wageningen (Netherlands); Whitmore, A.P.; Oenema, O. [DLO Institute for Agrobiology AB-DLO, Wageningen (Netherlands); Daamen, W.P. [Consulatancy Daamen, Schoonderwoerd and De Klein, Kesteren (Netherlands)

    1999-08-01

    In the Kyoto Protocol, all Annex I countries have agreed to reduce their carbon dioxide emissions with a certain percentage in 2008-2012 compared to 1990. To achieve that target, some direct human induced activities initiated in the Land-use Change and Forestry sector since 1990, may be used. However, the wording in the Protocol has caused confusion on what is exactly meant in the Protocol, which activities may be included, whether soils should be included and whether any additional measures may be included in the future. Also, the way of monitoring, verification and reporting is unclear. In this NRP project the implications of a choice for a certain definition, additional compartments of the C cycle, and feasibility of monitoring are assessed for a limited number of countries. This is done by applying those definitions and additional measures to the countries` C budget on the latest data. The forest related matters are handled by the Institute for Forestry and Nature Research (IBN-DLO), the soil related matters are handled by the Research Institute for Agrobiology and Soil fertility (AB-DLO), the monitoring and verification matters are handled by the Winand Staring Centre for Integrated Land, Soil and Water Research (SC-DLO). 120 refs.

  10. Blockchain protocols in clinical trials: Transparency and traceability of consent

    Science.gov (United States)

    Benchoufi, Mehdi; Porcher, Raphael; Ravaud, Philippe

    2018-01-01

    Clinical trial consent for protocols and their revisions should be transparent for patients and traceable for stakeholders. Our goal is to implement a process allowing for collection of patients’ informed consent, which is bound to protocol revisions, storing and tracking the consent in a secure, unfalsifiable and publicly verifiable way, and enabling the sharing of this information in real time. For that, we build a consent workflow using a trending technology called Blockchain. This is a distributed technology that brings a built-in layer of transparency and traceability. From a more general and prospective point of view, we believe Blockchain technology brings a paradigmatical shift to the entire clinical research field. We designed a Proof-of-Concept protocol consisting of time-stamping each step of the patient’s consent collection using Blockchain, thus archiving and historicising the consent through cryptographic validation in a securely unfalsifiable and transparent way. For each protocol revision, consent was sought again.  We obtained a single document, in an open format, that accounted for the whole consent collection process: a time-stamped consent status regarding each version of the protocol. This document cannot be corrupted and can be checked on any dedicated public website. It should be considered a robust proof of data. However, in a live clinical trial, the authentication system should be strengthened to remove the need for third parties, here trial stakeholders, and give participative control to the peer users. In the future, the complex data flow of a clinical trial could be tracked by using Blockchain, which core functionality, named Smart Contract, could help prevent clinical trial events not occurring in the correct chronological order, for example including patients before they consented or analysing case report form data before freezing the database. Globally, Blockchain could help with reliability, security, transparency and could be

  11. Blockchain protocols in clinical trials: Transparency and traceability of consent.

    Science.gov (United States)

    Benchoufi, Mehdi; Porcher, Raphael; Ravaud, Philippe

    2017-01-01

    Clinical trial consent for protocols and their revisions should be transparent for patients and traceable for stakeholders. Our goal is to implement a process allowing for collection of patients' informed consent, which is bound to protocol revisions, storing and tracking the consent in a secure, unfalsifiable and publicly verifiable way, and enabling the sharing of this information in real time. For that, we build a consent workflow using a trending technology called Blockchain. This is a distributed technology that brings a built-in layer of transparency and traceability. From a more general and prospective point of view, we believe Blockchain technology brings a paradigmatical shift to the entire clinical research field. We designed a Proof-of-Concept protocol consisting of time-stamping each step of the patient's consent collection using Blockchain, thus archiving and historicising the consent through cryptographic validation in a securely unfalsifiable and transparent way. For each protocol revision, consent was sought again.  We obtained a single document, in an open format, that accounted for the whole consent collection process: a time-stamped consent status regarding each version of the protocol. This document cannot be corrupted and can be checked on any dedicated public website. It should be considered a robust proof of data. However, in a live clinical trial, the authentication system should be strengthened to remove the need for third parties, here trial stakeholders, and give participative control to the peer users. In the future, the complex data flow of a clinical trial could be tracked by using Blockchain, which core functionality, named Smart Contract, could help prevent clinical trial events not occurring in the correct chronological order, for example including patients before they consented or analysing case report form data before freezing the database. Globally, Blockchain could help with reliability, security, transparency and could be a

  12. Computationally Developed Sham Stimulation Protocol for Multichannel Desynchronizing Stimulation

    Directory of Open Access Journals (Sweden)

    Magteld Zeitler

    2018-05-01

    Full Text Available A characteristic pattern of abnormal brain activity is abnormally strong neuronal synchronization, as found in several brain disorders, such as tinnitus, Parkinson's disease, and epilepsy. As observed in several diseases, different therapeutic interventions may induce a placebo effect that may be strong and hinder reliable clinical evaluations. Hence, to distinguish between specific, neuromodulation-induced effects and unspecific, placebo effects, it is important to mimic the therapeutic procedure as precisely as possibly, thereby providing controls that actually lack specific effects. Coordinated Reset (CR stimulation has been developed to specifically counteract abnormally strong synchronization by desynchronization. CR is a spatio-temporally patterned multichannel stimulation which reduces the extent of coincident neuronal activity and aims at an anti-kindling, i.e., an unlearning of both synaptic connectivity and neuronal synchrony. Apart from acute desynchronizing effects, CR may cause sustained, long-lasting desynchronizing effects, as already demonstrated in pre-clinical and clinical proof of concept studies. In this computational study, we set out to computationally develop a sham stimulation protocol for multichannel desynchronizing stimulation. To this end, we compare acute effects and long-lasting effects of six different spatio-temporally patterned stimulation protocols, including three variants of CR, using a no-stimulation condition as additional control. This is to provide an inventory of different stimulation algorithms with similar fundamental stimulation parameters (e.g., mean stimulation rates but qualitatively different acute and/or long-lasting effects. Stimulation protocols sharing basic parameters, but inducing nevertheless completely different or even no acute effects and/or after-effects, might serve as controls to validate the specific effects of particular desynchronizing protocols such as CR. In particular, based on

  13. New logistics protocols for distributed interactive simulation

    Science.gov (United States)

    Taylor, Darrin; Morrison, John; Katz, Warren; Felton, Erik; Herman, Deborah A.

    1995-06-01

    In today's environment, the transportation and maintenance of military forces is nearly as important as combat operations. Rapid deployment to regions of low-intensity conflict will become a very common training scenario for the U.S. military. Thus it is desirable to apply distributed simulation technology to train logistics personnel in their combat support roles. Currently, distributed interactive simulation (DIS) only contains rudimentary logistics protocols. This paper introduces new protocols designed to handle the logistics problem. The Newtonian protocol takes a physics-based approach to modeling interactions on the simulation network. This protocol consists of a family of protocol data units (PDUs) which are used to communicate forces in different circumstances. The protocol implements a small set of physical relations. This represents a flexible and general mechanism to describe battlefield interactions between network entities. The migratory object protocol (MOP) family addresses the transfer of control. General mechanisms provide the means to simulate resupply, repair, and maintenance of entities at any level of abstraction (individual soldier to division). It can also increase the fidelity of mine laying, enable handover of weapons for terminal guidance, allow for the distribution of aggregate-level simulation entities, provide capabilities for the simulation of personnel, etc.

  14. Examining recombinant human TSH primed {sup 131}I therapy protocol in patients with metastatic differentiated thyroid carcinoma: comparison with the traditional thyroid hormone withdrawal protocol

    Energy Technology Data Exchange (ETDEWEB)

    Rani, Deepa; Kaisar, Sushma; Awasare, Sushma; Kamaldeep; Abhyankar, Amit; Basu, Sandip [Bhabha Atomic Research Centre (BARC), Radiation Medicine Centre, Mumbai (India)

    2014-09-15

    Recombinant human thyroid-stimulating hormone (rhTSH)-based protocol is a promising recent development in the management of differentiated thyroid carcinoma (DTC). The objectives of this prospective study were: (1) to assess the feasibility and efficacy of the rhTSH primed {sup 131}I therapy protocol in patients with DTC with distant metastatic disease, (2) to perform lesional dosimetry in this group of patients compared to the traditional protocol, (3) to document the practical advantages (patient symptoms and hospital stay) of the rhTSH protocol compared to the traditional thyroid hormone withdrawal protocol, (4) to document and record any adverse effect of this strategy, (5) to compare the renal function parameters, and (6) to compare the serum TSH values achieved in either of the protocols in this group of patients. The study included 37 patients with metastatic DTC having lung or skeletal metastases or both. A comparison of lesional radiation absorbed dose, hospital stay, renal function tests, and symptom profile was undertaken between the traditional thyroid hormone withdrawal protocol and rhTSH-based therapy protocol. Dosimetric calculations of metastatic lesions were performed using lesion uptake and survey meter readings for calculation of effective half-life. Non-contrast-enhanced CT was used for assessment of tumor volume. Quality of life was assessed using the European Organization for Research and Treatment of Cancer (EORTC) QOL forms. A comparison of pretreatment withdrawal thyroglobulin (TG) was done with the withdrawal TG level 3 months after treatment. The mean effective half-life of {sup 131}I in metastatic lesions was less during the rhTSH protocol (29.49 h) compared to the thyroid hormone withdrawal protocol (35.48 h), but the difference was not statistically significant (p = 0.056). The mean 24-h % uptake of the lesions during the traditional protocol (4.84 %) was slightly higher than the 24-h % uptake during the rhTSH protocol (3.56 %), but

  15. 42 CFR 410.100 - Included services.

    Science.gov (United States)

    2010-10-01

    ... service; however, maintenance therapy itself is not covered as part of these services. (c) Occupational... increase respiratory function, such as graded activity services; these services include physiologic... rehabilitation plan of treatment, including physical therapy services, occupational therapy services, speech...

  16. Optimization of a sample processing protocol for recovery of Bacillus anthracis spores from soil

    Science.gov (United States)

    Silvestri, Erin E.; Feldhake, David; Griffin, Dale; Lisle, John T.; Nichols, Tonya L.; Shah, Sanjiv; Pemberton, A; Schaefer III, Frank W

    2016-01-01

    Following a release of Bacillus anthracis spores into the environment, there is a potential for lasting environmental contamination in soils. There is a need for detection protocols for B. anthracis in environmental matrices. However, identification of B. anthracis within a soil is a difficult task. Processing soil samples helps to remove debris, chemical components, and biological impurities that can interfere with microbiological detection. This study aimed to optimize a previously used indirect processing protocol, which included a series of washing and centrifugation steps. Optimization of the protocol included: identifying an ideal extraction diluent, variation in the number of wash steps, variation in the initial centrifugation speed, sonication and shaking mechanisms. The optimized protocol was demonstrated at two laboratories in order to evaluate the recovery of spores from loamy and sandy soils. The new protocol demonstrated an improved limit of detection for loamy and sandy soils over the non-optimized protocol with an approximate matrix limit of detection at 14 spores/g of soil. There were no significant differences overall between the two laboratories for either soil type, suggesting that the processing protocol will be robust enough to use at multiple laboratories while achieving comparable recoveries.

  17. Energy Efficient Network Protocols for Wireless and Mobile Networks

    National Research Council Canada - National Science Library

    Sivalingam, Krishna

    2001-01-01

    ... (also called power aware) network protocols for wireless and mobile networks. Battery power limitations are a very serious concern, and it is essential to study energy efficient protocol design at different layers of the network protocol stack...

  18. Event-by-event simulation of quantum cryptography protocols

    NARCIS (Netherlands)

    Zhao, S.; Raedt, H. De

    We present a new approach to simulate quantum cryptography protocols using event-based processes. The method is validated by simulating the BB84 protocol and the Ekert protocol, both without and with the presence of an eavesdropper.

  19. Protocolized hyperventilation enhances electroconvulsive therapy.

    Science.gov (United States)

    de Arriba-Arnau, Aida; Dalmau, Antonia; Soria, Virginia; Salvat-Pujol, Neus; Ribes, Carmina; Sánchez-Allueva, Ana; Menchón, José Manuel; Urretavizcaya, Mikel

    2017-08-01

    Hyperventilation is recommended in electroconvulsive therapy (ECT) to enhance seizures and to increase patients' safety. However, more evidence is needed regarding its effects and the optimum method of application. This prospective study involving 21 subjects compared two procedures, protocolized hyperventilation (PHV) and hyperventilation as usual (HVau), applied to the same patient in two consecutive sessions. Transcutaneous partial pressure of carbon dioxide (TcPCO 2 ) was measured throughout all sessions. Ventilation parameters, hemodynamic measures, seizure characteristics, and side effects were also explored. PHV resulted in lower TcPCO 2 after hyperventilation (p=.008) and over the whole session (p=.035). The lowest TcPCO 2 was achieved after voluntary hyperventilation. Changes in TcPCO 2 from baseline showed differences between HVau and PHV at each session time-point (all p<.05). Between- and within-subjects factors were statistically significant in a general linear model. Seizure duration was greater in PHV sessions (p=.028), without differences in other seizure quality parameters or adverse effects. Correlations were found between hypocapnia induction and seizure quality indexes. Secondary outcomes could be underpowered. PHV produces hypocapnia before the stimulus, modifies patients' TcPCO 2 values throughout the ECT session and lengthens seizure duration. Voluntary hyperventilation is the most important part of the PHV procedure with respect to achieving hypocapnia. A specific ventilation approach, CO 2 quantification and monitoring may be advisable in ECT. PHV is easy to apply in daily clinical practice and does not imply added costs. Ventilation management has promising effects in terms of optimizing ECT technique. Copyright © 2017 Elsevier B.V. All rights reserved.

  20. Static, Lightweight Includes Resolution for PHP

    NARCIS (Netherlands)

    M.A. Hills (Mark); P. Klint (Paul); J.J. Vinju (Jurgen)

    2014-01-01

    htmlabstractDynamic languages include a number of features that are challenging to model properly in static analysis tools. In PHP, one of these features is the include expression, where an arbitrary expression provides the path of the file to include at runtime. In this paper we present two

  1. Article Including Environmental Barrier Coating System

    Science.gov (United States)

    Lee, Kang N. (Inventor)

    2015-01-01

    An enhanced environmental barrier coating for a silicon containing substrate. The enhanced barrier coating may include a bond coat doped with at least one of an alkali metal oxide and an alkali earth metal oxide. The enhanced barrier coating may include a composite mullite bond coat including BSAS and another distinct second phase oxide applied over said surface.

  2. Rare thoracic cancers, including peritoneum mesothelioma

    NARCIS (Netherlands)

    Siesling, Sabine; van der Zwan, Jan Maarten; Izarzugaza, Isabel; Jaal, Jana; Treasure, Tom; Foschi, Roberto; Ricardi, Umberto; Groen, Harry; Tavilla, Andrea; Ardanaz, Eva

    Rare thoracic cancers include those of the trachea, thymus and mesothelioma (including peritoneum mesothelioma). The aim of this study was to describe the incidence, prevalence and survival of rare thoracic tumours using a large database, which includes cancer patients diagnosed from 1978 to 2002,

  3. Rare thoracic cancers, including peritoneum mesothelioma

    NARCIS (Netherlands)

    Siesling, Sabine; Zwan, J.M.V.D.; Izarzugaza, I.; Jaal, J.; Treasure, T.; Foschi, R.; Ricardi, U.; Groen, H.; Tavilla, A.; Ardanaz, E.

    2012-01-01

    Rare thoracic cancers include those of the trachea, thymus and mesothelioma (including peritoneum mesothelioma). The aim of this study was to describe the incidence, prevalence and survival of rare thoracic tumours using a large database, which includes cancer patients diagnosed from 1978 to 2002,

  4. The protocol amending the 1963 Vienna Convention

    International Nuclear Information System (INIS)

    Lamm, V.

    2006-01-01

    Technically the Vienna Convention was revised by the adoption of the protocol to amend the instrument. and according to Article 19 of the protocol 'A State which is Party to this Protocol but not to the 1963 Vienna Convention shall be bound by the provisions of that Convention as amended by this Protocol in relation to other States Parties hereto, and failing an expression of a different intention by that State at the time of deposit of an instrument referred to in Article 20 shall be bound by the provisions of the 1963 Vienna Convention in relation to States which are only Parties thereto'. This solution has created a special situation, because after the entry into force of the protocol there will be living together or operating in practice 'two' Vienna Conventions, notably the convention's original text of 1963 and its new version as amended by the protocol. After the protocol has come into force, a state may only accede to the amended version, but in the inter se relations of the States Party to the 'old' Vienna Convention the provisions of that convention will remain in force until such time as they have acceded to the new protocol. This rather complicated situation is nevertheless understandable and is fully in accord with Article 40 of the 1969 Vienna Convention on the Law of Treaties, which provides for the amendment of multilateral treaties. In 1989 the negotiations on the revision of the Vienna Convention had begun with the aim of strengthening the existing nuclear liability regime and of improving the situation of potential victims of nuclear accidents. The Protocol to Amend the Vienna Convention serves those purposes; it also reflects a good compromise, since it is the outcome of a negotiation process in which experts from both nuclear and non-nuclear states, from Contacting Parties and non-Contracting Parties were very active. That affords some assurance that the compromise solution reached is acceptable to all States participating in the adoption of

  5. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  6. Security Protocol Review Method Analyzer(SPRMAN)

    OpenAIRE

    Navaz, A. S. Syed; Narayanan, H. Iyyappa; Vinoth, R.

    2013-01-01

    This Paper is designed using J2EE (JSP, SERVLET), HTML as front end and a Oracle 9i is back end. SPRMAN is been developed for the client British Telecom (BT) UK., Telecom company. Actually the requirement of BT is, they are providing Network Security Related Products to their IT customers like Virtusa,Wipro,HCL etc., This product is framed out by set of protocols and these protocols are been associated with set of components. By grouping all these protocols and components together, product is...

  7. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...

  8. Establishing treatment protocols for clinical mastitis.

    Science.gov (United States)

    Roberson, Jerry R

    2003-03-01

    Each farm has a unique mix of mastitis pathogens and management procedures that have evolved over time. The herd veterinarian should work with the manager/owner to systematically develop treatment protocols that meet the needs and management of the farm. To establish a mastitis treatment protocol, it is necessary to develop a system to routinely identify clinical mastitis cases, develop a herd-specific severity level assessment system, manage the clinical mastitis cases based on severity level and culture result (when available), avoid antibiotic residues, and monitor the success of the system and alter the protocol as necessary.

  9. Overview of the InterGroup protocols

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah A. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Melliar-Smith, P. Michael [Univ. of California, Santa Barbara, CA (United States); Moser, Louise E. [Univ. of California, Santa Barbara, CA (United States)

    2001-03-01

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

  10. The Singapore protocol [for quantum cryptography

    International Nuclear Information System (INIS)

    Englert, B.

    2005-01-01

    The qubit protocol for quantum key distribution presented in this talk is fully tomographic and more efficient than other tomographic protocols. Under ideal circumstances the efficiency is log 2 (4/3) = 0.415 key bits per qubit sent, which is 25% more than the efficiency of 1/3 = 0.333 for the standard 6-state protocol. One can extract 0.4 key bits per qubit by a simple two-way communication scheme, and can so get close to the information-theoretical limit. The noise thresholds for secure key bit generation in the presence of unbiased noise will be reported and discussed. (author)

  11. A Logical Analysis of Quantum Voting Protocols

    Science.gov (United States)

    Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja

    2017-12-01

    In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.

  12. A hash based mutual RFID tag authentication protocol in telecare medicine information system.

    Science.gov (United States)

    Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C

    2015-01-01

    Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.

  13. A novel protocol for dispatcher assisted CPR improves CPR quality and motivation among rescuers-A randomized controlled simulation study.

    Science.gov (United States)

    Rasmussen, Stinne Eika; Nebsbjerg, Mette Amalie; Krogh, Lise Qvirin; Bjørnshave, Katrine; Krogh, Kristian; Povlsen, Jonas Agerlund; Riddervold, Ingunn Skogstad; Grøfte, Thorbjørn; Kirkegaard, Hans; Løfgren, Bo

    2017-01-01

    Emergency dispatchers use protocols to instruct bystanders in cardiopulmonary resuscitation (CPR). Studies changing one element in the dispatcher's protocol report improved CPR quality. Whether several changes interact is unknown and the effect of combining multiple changes previously reported to improve CPR quality into one protocol remains to be investigated. We hypothesize that a novel dispatch protocol, combining multiple beneficial elements improves CPR quality compared with a standard protocol. A novel dispatch protocol was designed including wording on chest compressions, using a metronome, regular encouragements and a 10-s rest each minute. In a simulated cardiac arrest scenario, laypersons were randomized to perform single-rescuer CPR guided with the novel or the standard protocol. a composite endpoint of time to first compression, hand position, compression depth and rate and hands-off time (maximum score: 22 points). Afterwards participants answered a questionnaire evaluating the dispatcher assistance. The novel protocol (n=61) improved CPR quality score compared with the standard protocol (n=64) (mean (SD): 18.6 (1.4)) points vs. 17.5 (1.7) points, pCPR. A novel bundle of care protocol improved CPR quality score and motivation among rescuers. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  14. Who needs inpatient detox? Development and implementation of a hospitalist protocol for the evaluation of patients for alcohol detoxification.

    Science.gov (United States)

    Stephens, John R; Liles, E Allen; Dancel, Ria; Gilchrist, Michael; Kirsch, Jonathan; DeWalt, Darren A

    2014-04-01

    Clinicians caring for patients seeking alcohol detoxification face many challenges, including lack of evidence-based guidelines for treatment and high recidivism rates. To develop a standardized protocol for determining which alcohol dependent patients seeking detoxification need inpatient versus outpatient treatment, and to study the protocol's implementation. Review of best evidence by ad hoc task force and subsequent creation of standardized protocol. Prospective observational evaluation of initial protocol implementation. Patients presenting for alcohol detoxification. Development and implementation of a protocol for evaluation and treatment of patients requesting alcohol detoxification. Number of admissions per month with primary alcohol related diagnosis (DRG), 30-day readmission rate, and length of stay, all measured before and after protocol implementation. We identified one randomized clinical trial and three cohort studies to inform the choice of inpatient versus outpatient detoxification, along with one prior protocol in this population, and combined that data with clinical experience to create an institutional protocol. After implementation, the average number of alcohol related admissions was 15.9 per month, compared with 18.9 per month before implementation (p = 0.037). There was no difference in readmission rate or length of stay. Creation and utilization of a protocol led to standardization of care for patients requesting detoxification from alcohol. Initial evaluation of protocol implementation showed a decrease in number of admissions.

  15. Lung Ultrasonography in Patients With Idiopathic Pulmonary Fibrosis: Evaluation of a Simplified Protocol With High-Resolution Computed Tomographic Correlation.

    Science.gov (United States)

    Vassalou, Evangelia E; Raissaki, Maria; Magkanas, Eleftherios; Antoniou, Katerina M; Karantanas, Apostolos H

    2018-03-01

    To compare a simplified ultrasonographic (US) protocol in 2 patient positions with the same-positioned comprehensive US assessments and high-resolution computed tomographic (CT) findings in patients with idiopathic pulmonary fibrosis. Twenty-five consecutive patients with idiopathic pulmonary fibrosis were prospectively enrolled and examined in 2 sessions. During session 1, patients were examined with a US protocol including 56 lung intercostal spaces in supine/sitting (supine/sitting comprehensive protocol) and lateral decubitus (decubitus comprehensive protocol) positions. During session 2, patients were evaluated with a 16-intercostal space US protocol in sitting (sitting simplified protocol) and left/right decubitus (decubitus simplified protocol) positions. The 16 intercostal spaces were chosen according to the prevalence of idiopathic pulmonary fibrosis-related changes on high-resolution CT. The sum of B-lines counted in each intercostal space formed the US scores for all 4 US protocols: supine/sitting and decubitus comprehensive US scores and sitting and decubitus simplified US scores. High-resolution CT-related Warrick scores (J Rheumatol 1991; 18:1520-1528) were compared to US scores. The duration of each protocol was recorded. A significant correlation was found between all US scores and Warrick scores and between simplified and corresponding comprehensive scores (P idiopathic pulmonary fibrosis. The 16-intercostal space simplified protocol in the lateral decubitus position correlated better with high-resolution CT findings and was less time-consuming compared to the sitting position. © 2017 by the American Institute of Ultrasound in Medicine.

  16. Evaluation protocol for amusia: Portuguese sample.

    Science.gov (United States)

    Peixoto, Maria Conceição; Martins, Jorge; Teixeira, Pedro; Alves, Marisa; Bastos, José; Ribeiro, Carlos

    2012-12-01

    Amusia is a disorder that affects the processing of music. Part of this processing happens in the primary auditory cortex. The study of this condition allows us to evaluate the central auditory pathways. To explore the diagnostic evaluation tests of amusia. The authors propose an evaluation protocol for patients with suspected amusia (after brain injury or complaints of poor musical perception), in parallel with the assessment of central auditory processing, already implemented in the department. The Montreal Evaluation of Battery of amusia was the basis for the selection of the tests. From this comprehensive battery of tests we selected some of the musical examples to evaluate different musical aspects, including memory and perception of music, ability concerning musical recognition and discrimination. In terms of memory there is a test for assessing delayed memory, adapted to the Portuguese culture. Prospective study. Although still experimental, with the possibility of adjustments in the assessment, we believe that this assessment, combined with the study of central auditory processing, will allow us to understand some central lesions, congenital or acquired hearing perception limitations.

  17. Carboplatin hypersensitivity: evaluation and successful desensitization protocol.

    Science.gov (United States)

    Bruchim, Ilan; Goldberg, Arnon; Fishman, Ami; Confino-Cohen, Ronit

    2014-01-01

    Carboplatin-induced immediate hypersensitivity reactions are relatively common among patients with gynecological malignancies. Once this occurs, the patient might be at risk for future carboplatin-induced reactions. This study evaluated the efficacy of allergic consultation, carboplatin skin testing and desensitization as a single intervention strategy in this population. Patients with a well-documented immediate reaction to carboplatin were offered allergy consultation, carboplatin skin testing and a desensitization plan in a single visit between scheduled chemotherapy sessions. Fifty-five patients with an immediate reaction were evaluated. After allergist assessment, 44 (89%) of 49 patients skin tested had a positive result. A total of 207 carboplatin desensitization cycles were administered to 49 women. Among them, 10 patients had a mild immediate hypersensitivity reaction during desensitization. Five patients subsequently tolerated carboplatin administered in the prolonged desensitization protocol. In the data presented, we propose a strategy that is both cost effective and very convenient for the patient. The diagnostic procedure, including allergist consultation and skin test, can be completed in less than 2 h. In most cases where carboplatin is indispensable, desensitization can be administered without overnight hospitalization.

  18. Results of ERAS protocol in patients with colorectal cancer

    Directory of Open Access Journals (Sweden)

    A. O. Rasulov

    2016-01-01

    Full Text Available Objective: explore the use of enhanced recovery after surgery (ERAS in the treatment of patients with colorectal cancer, evaluate its efficacy and safety.Materials and methods. Prospective, single-site, randomized study for the implementation of enhanced recovery after surgery in patients with colorectal cancer has been conducted from October 2014 till the present time. All patients after laparoscopic surgeries undergo treatment according to ERAS protocol, patients after open surgeries are randomized (1:1 in groups of the standard treatment or treatment according to ERAS protocol. The study included patients with localized and locally disseminated colorectal cancer aged from 18 to 75 years, ECOG score ≤ 2. The primary evaluated parameters were the following: the number of postoperative complications (according to Clavien– Dindo classification, postoperative hospital days, incidence of complications and mortality in the 30-day period, timing of activation.Results. Up to date, the study includes 105 patients: laparoscopic group – 51 patients, open-surgery group of patients treated by ERAS protocol – 27 patients, open-surgery group of patients with the standard post-op treatment – 26 patients. Complications requiring emergency surgery for anastomotic leak (p = 0.159 developed in 3.7 % of patients with the standard post-op treatment and in 3.9 % of patients after laparoscopic surgery, while 1 patient required repeat hospitalization. The total number of complications was significantly lower in opensurgery group of patients treated by ERAS protocol compared with the standard post-op treatment (p = 0.021. However, there were no differences between laparoscopic and open-surgery group with the standard post-op treatment (p = 0.159. An average hospitalization stay in patients with the standard post-op treatment was equal to 10 days compared to 7 days in patients treated by ERAS protocol (p = 0.067 and 6 days after laparoscopic

  19. Protocol adaptations to conduct Systematic Literature Reviews in Software Engineering: a chronological study

    Directory of Open Access Journals (Sweden)

    Samuel Sepúlveda

    2015-09-01

    Full Text Available Systematic literature reviews (SLR have reached a considerable level of adoption in Software Engineering (SE, how-ever protocol adaptations for its implementation remain tangentially addressed. This work provides a chronological framework for the use and adaptation of the SLR protocol, including its current status. A systematic literature search was performed, reviewing a set of twelve articles being selected in accordance with the inclusion and exclusion criteria between 2004 and 2013, using digital data sources recognized by the SE community. A chronological framework is provided that includes the current state of the protocol adaptations to conduct SLR in SE. The results indicate areas where the quantity and quality of investigations needs to be increased and the identi- fication of the main proposals providing adaptations for the protocol conducting SLR in SE.

  20. Taking an idea to a research protocol

    African Journals Online (AJOL)

    2013-11-13

    Nov 13, 2013 ... Review Article: Taking an idea to a research protocol ... step is to identify the knowledge gap within the intended field of research by examining the background ... be found by writing a critical narrative review of the literature.

  1. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... results. The most important generalization is the support for all security properties of the geometric fragment proposed by [Gut14]....... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...

  2. Oxygen tolerance test : A standardised protocol

    Directory of Open Access Journals (Sweden)

    D K Ghosh

    2015-01-01

    Conclusion: By following a standardised protocol for Oxygen Tolerance Test, an objective assessment and recordkeeping is possible. This shall entail a more effective screening during the initial diving medical examination.

  3. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  4. Authentication Protocol using Quantum Superposition States

    Energy Technology Data Exchange (ETDEWEB)

    Kanamori, Yoshito [University of Alaska; Yoo, Seong-Moo [University of Alabama, Huntsville; Gregory, Don A. [University of Alabama, Huntsville; Sheldon, Frederick T [ORNL

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  5. Technical Analysis of SSP-21 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-09

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.

  6. Entanglement distillation protocols and number theory

    International Nuclear Information System (INIS)

    Bombin, H.; Martin-Delgado, M.A.

    2005-01-01

    We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set Z D n associated with Bell diagonal states is a module rather than a vector space. We find that a partition of Z D n into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D. When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively

  7. Saudi Arabia and CERN sign protocol

    CERN Multimedia

    2008-01-01

    On 9 May 2008, Mohammed I. Al Suwaiyel, President of the King Abdulaziz City of Science and Technology, representing the Government of Saudi Arabia, and CERN Director-General, Robert Aymar, signed a protocol to the 2006 cooperation agreement between CERN and Saudi Arabia. Members of the Saudi Arabian Government visit ATLAS.The purpose of the protocol is to define the operational framework needed to carry out various specific tasks provided for in the cooperation agreement in order to promote the development of a high energy particle physics community in Saudi Arabia and its ultimate visible participation as a member of the global CERN community. Signing the protocol, Mohammed I. Al-Suwaiyel said: "The Saudi Arabian Government has taken a number of initiatives to promote R&D in the interests of our country’s development and the advancement of science. Thanks to this protocol, Saudi scientists will be able to work towards this go...

  8. Verbal protocols as methodological resources: research evidence

    Directory of Open Access Journals (Sweden)

    Alessandra Baldo

    2012-01-01

    Full Text Available This article aims at reflecting on the use of verbal protocols as a methodological resource in qualitative research, more specifically on the aspect regarded as the main limitation of a study about lexical inferencing in L2 (BALDO; VELASQUES, 2010: its subjective trait. The article begins with a brief literature review on protocols, followed by a description of the study in which they were employed as methodological resources. Based on that, protocol subjectivity is illustrated through samples of unparalleled data classification, carried out independently by two researchers. In the final section, the path followed to minimize the problem is presented, intending to contribute to improve efficiency in the use of verbal protocols in future research.

  9. Real-Time Fault Tolerant Networking Protocols

    National Research Council Canada - National Science Library

    Henzinger, Thomas A

    2004-01-01

    We made significant progress in the areas of video streaming, wireless protocols, mobile ad-hoc and sensor networks, peer-to-peer systems, fault tolerant algorithms, dependability and timing analysis...

  10. Development of measurement protocols for quantum magnetometry

    DEFF Research Database (Denmark)

    Stark, Alexander

    and protocols to enhance the lifetime and the coherences of the NV center with the overall goal of enhancing the capabilities of this sensor in the field of magnetometry. In order to realize complex protocols, a sophisticated software control of the measurement setup is required. A general software framework......, is serving as rigorous framework to reduce the complexity of the setup configuration by a fundamental separation of tasks. As a consequence, the general idea of this framework is not limited to experiments with color centers in diamond, but can find application in any laboratory environment. The measurement...... of magnetic fields in the high-frequency GHz regimes is challenging. In this thesis, a continuous dynamical decoupling protocol is developed and implemented, which extends the capabilities of the NV sensor to probe GHz signals with a narrow bandwidth. Moreover, the protocol protects the system from noise...

  11. How to write a research protocol

    African Journals Online (AJOL)

    A research protocol is best viewed as a key to open the gates between the researcher and ... studies will be quantitative designs and these form the focus of this paper. ..... applied to the underlying clinical problem addressed by the study.

  12. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  13. Language, Semantics, and Methods for Security Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico

    events. Methods like strand spaces and the inductive method of Paulson have been designed to support an intensional, event-based, style of reasoning. These methods have successfully tackled a number of protocols though in an ad hoc fashion. They make an informal spring from a protocol to its......-nets. They have persistent conditions and as we show in this thesis, unfold under reasonable assumptions to a more basic kind of nets. We relate SPL-nets to strand spaces and inductive rules, as well as trace languages and event structures so unifying a range of approaches, as well as providing conditions under...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...

  14. Implementation of the Additional Protocol in Japan

    International Nuclear Information System (INIS)

    Ogawa, T.

    2001-01-01

    The Additional Protocol between Japan and the IAEA entered into force in December 1999. To come into force a series of implementation trials of Additional Protocol was carried out at two Japanese representative nuclear research centers, i.e. Tokai Research Establishment of Japan Atomic Energy Research Institute (JAERI) and Oarai Engineering Center of Japan Nuclear Fuel Cycle Development Institute (JNC). These trials were proposed by Japan and were conducted in cooperation with the IAEA Secretariat. In addition, Japan amended 'the Law for the Regulation of Reactors etc.', to collect adequate information to submit to the IAEA, to arrange the surrounding for the complementary access, etc. In addition, Japan Submitted the Initial Declaration of the Additional Protocol within 180 days of the entry into force of the Protocol, in the middle of June, 2000

  15. An Integrated Biochemistry Laboratory, Including Molecular Modeling

    Science.gov (United States)

    Hall, Adele J. Wolfson Mona L.; Branham, Thomas R.

    1996-11-01

    for lysozyme activity and a colorimetric one for protein concentration. Familiarity with the assays is reinforced by an independently designed project to modify a variable in one of these assays. The assay for lysozyme activity is that of Shugar (6), based on hydrolysis of a cell-wall suspension from the bacterium Micrococcus lysodeikticus, a substrate that is particularly sensitive to lysozyme. As the cell walls are broken down by the enzyme, the turbidity of the sample decreases. This decrease can be conveniently measured by following the decrease in absorbance at a wavelength of 450 nm, using a spectrophotometer or other device for measuring light scattering. The Bradford method (7), a standard assay, is used to determine protein concentration. Using the data from both lysozyme activity assays and protein concentration assays, students can calculate the specific activity for commercial lysozyme and an egg- white solution. These calculations clearly demonstrate the increase in specific activity with increasing purity, since the purified (commercial) preparation has a specific activity approximately 20-fold higher than that of the crude egg-white solution. Lysozyme Purification by Ion-Exchange Chromatography (5 weeks) As suggested by Strang (8), students can design a rational purification of lysozyme using ion-exchange chromatography when presented with information on the isoelectric point of the enzyme and the properties of ion- exchange resins. One week is spent discussing protein purification and the relative advantages and disadvantages of different resins. Each group has a choice of anion-exchange (DEAE) or cation-exchange (CM) resins. Because lysozyme is positively charged below a pH of 11, it will not be adsorbed to an anion-exchange resin, but will be adsorbed to the cation-exchange resin. Therefore, for the cation-exchange protocols, there are further options for methods of collecting and eluting the desired protein. A purification table, including

  16. Implementation of the Welfare Quality broiler assessment protocol – final report : overview of outcome-based measurement of broiler welfare and a general discussion on the Welfare Quality broiler assessment protocol

    NARCIS (Netherlands)

    Jong, de I.C.; Gunnink, H.; Hindle, V.A.

    2015-01-01

    In the current report, two topics related to our study on the implementation of the Welfare Quality® broiler assessment protocol are discussed. First, animal-based measures for broiler welfare, currently included in the Welfare Quality® broiler assessment protocol, are discussed with respect to

  17. Report on July 2015 Additional Protocol Coordinators Best Practices Workshop

    Energy Technology Data Exchange (ETDEWEB)

    Gitau, Ernest T.N. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Burbank, Roberta L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Finch, Valerie A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-07-31

    After 10 years of implementation experience, the Office of Nonproliferation and Arms Control (NPAC) within the Department of Energy/National Nuclear Security Administration (DOE/NNSA) conducted the Additional Protocol (AP) Coordinators Best Practices Workshop at Oak Ridge National Laboratory from July 29-30, 2015. The goal of this workshop was to identify implementation best practices, lessons learned, and compliance challenges from the various Additional Protocol Coordinators (APCs) at each laboratory in the DOE/NNSA complex and associated sites. The workshop provided the opportunity for participants to share their insights and establish networks that APCs can utilize to continue to discuss challenges (new and old), identify best practices, and enhance communication and coordination for reporting multi-lab research projects during review activities. Workshop participants included DOE/NNSA HQ, laboratory and site APCs, seasoned experts, members of the original implementation outreach team, and Field Element and site security representatives.

  18. The European protocol on organ transplant: key issues.

    Science.gov (United States)

    Byk, Christian

    2009-09-01

    What is interesting in the philosophy of the European Protocol is the search of a balanced position which acknowledges the medical progress brought by organ transplants and considers the necessity to ensure that human dignity and individual freedom are respected. However, the principles adopted for such regulations at the European level leave on some major issues a great margin of appreciation to the domestic legislation. This is particularly true in areas such as defining death or consenting to organ transplants including the situation of minors and the role of the family. A last point should also be stressed regarding the European protocol: its lack of efficiency concerning a neglected but important issue: organ trafficking.

  19. An Evaluation Methodology for Protocol Analysis Systems

    Science.gov (United States)

    2007-03-01

    Main Memory Requirement NS: Needham-Schroeder NSL: Needham-Schroeder-Lowe OCaml : Objective Caml POSIX: Portable Operating System...methodology is needed. A. PROTOCOL ANALYSIS FIELD As with any field, there is a specialized language used within the protocol analysis community. Figure...ProVerif requires that Objective Caml ( OCaml ) be installed on the system, OCaml version 3.09.3 was installed. C. WINDOWS CONFIGURATION OS

  20. Topology Discovery Using Cisco Discovery Protocol

    OpenAIRE

    Rodriguez, Sergio R.

    2009-01-01

    In this paper we address the problem of discovering network topology in proprietary networks. Namely, we investigate topology discovery in Cisco-based networks. Cisco devices run Cisco Discovery Protocol (CDP) which holds information about these devices. We first compare properties of topologies that can be obtained from networks deploying CDP versus Spanning Tree Protocol (STP) and Management Information Base (MIB) Forwarding Database (FDB). Then we describe a method of discovering topology ...

  1. Emulation of Industrial Control Field Device Protocols

    Science.gov (United States)

    2013-03-01

    today. The protocol operates at the application layer of the open systems interconnection ( OSI ) model, meaning it operates independently of the...the OSI model. Their job is to receive serial data from an MTU in the Modbus RTU or ASCII protocol, encapsulate and transmit the data to another modem...facing connection and out-of-band logging capabilities over the other LAN -facing connection. Despite the fact that the hardware configuration of the

  2. A Review of Fair Exchange Protocols

    OpenAIRE

    Abdullah AlOtaibi; Hamza Aldabbas

    2012-01-01

    Recently, the Internet has become an essential business platform, aiding trading, distribution and sales between organisations, consumers and even between consumers themselves. This technology revolution has brought e-commerce to an entirely new level, which therefore has raised some new security issues. Security protocols in e-commerce are required to manage the transactions between buyers and sellers. In order to engage customers in e-commerce, these protocols should be well formulated and ...

  3. Broadening and Simplifying the First SETI Protocol

    Science.gov (United States)

    Michaud, M. A. G.

    The Declaration of Principles Concerning Activities Following the Detection of Extraterrestrial Intelligence, known informally as the First SETI Protocol, is the primary existing international guidance on this subject. During the fifteen years since the document was issued, several people have suggested revisions or additional protocols. This article proposes a broadened and simplified text that would apply to the detection of alien technology in our solar system as well as to electromagnetic signals from more remote sources.

  4. Hybrid Long-Distance Entanglement Distribution Protocol

    DEFF Research Database (Denmark)

    Brask, J.B.; Rigas, I.; Polzik, E.S.

    2010-01-01

    We propose a hybrid (continuous-discrete variable) quantum repeater protocol for long-distance entanglement distribution. Starting from states created by single-photon detection, we show how entangled coherent state superpositions can be generated by means of homodyne detection. We show that near......-deterministic entanglement swapping with such states is possible using only linear optics and homodyne detectors, and we evaluate the performance of our protocol combining these elements....

  5. Dynamic Aggregation Protocol for Wireless Sensor Networks

    OpenAIRE

    Mounir Said , Adel; William Ibrahim , Ashraf; Soua , Ahmed; Afifi , Hossam

    2013-01-01

    International audience; Sensor networks suffer from limited capabilities such as bandwidth, low processing power, and memory size. There is therefore a need for protocols that deliver sensor data in an energy-efficient way to the sink. One of those techniques, it gathers sensors' data in a small size packet suitable for transmission. In this paper, we propose a new Effective Data Aggregation Protocol (DAP) to reduce the energy consumption in Wireless Sensor Networks (WSNs), which prolongs the...

  6. Optimistic protocol for partitioned distributed database systems

    International Nuclear Information System (INIS)

    Davidson, S.B.

    1982-01-01

    A protocol for transaction processing during partition failures is presented which guarantees mutual consistency between copies of data-items after repair is completed. The protocol is optimistic in that transactions are processed without restrictions during the failure; conflicts are detected at repair time using a precedence graph and are resolved by backing out transactions according to some backout strategy. The protocol is then evaluated using simulation and probabilistic modeling. In the simulation, several parameters are varied such as the number of transactions processed in a group, the type of transactions processed, the number of data-items present in the database, and the distribution of references to data-items. The simulation also uses different backout strategies. From these results we note conditions under which the protocol performs well, i.e., conditions under which the protocol backs out a small percentage of the transaction run. A probabilistic model is developed to estimate the expected number of transactions backed out using most of the above database and transaction parameters, and is shown to agree with simulation results. Suggestions are then made on how to improve the performance of the protocol. Insights gained from the simulation and probabilistic modeling are used to develop a backout strategy which takes into account individual transaction costs and attempts to minimize total backout cost. Although the problem of choosing transactions to minimize total backout cost is, in general, NP-complete, the backout strategy is efficient and produces very good results

  7. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  8. Implementation of a Rapid, Protocol-based TIA Management Pathway

    Directory of Open Access Journals (Sweden)

    Susann J. Jarhult

    2018-02-01

    Full Text Available Introduction: Our goal was to assess whether use of a standardized clinical protocol improves efficiency for patients who present to the emergency department (ED with symptoms of transient ischemic attack (TIA. Methods: We performed a structured, retrospective, cohort study at a large, urban, tertiary care academic center. In July 2012 this hospital implemented a standardized protocol for patients with suspected TIA. The protocol selected high-risk patients for admission and low/intermediate-risk patients to an ED observation unit for workup. Recommended workup included brain imaging, vascular imaging, cardiac monitoring, and observation. Patients were included if clinical providers determined the need for workup for TIA. We included consecutive patients presenting during a six-month period prior to protocol implementation, and those presenting between 6–12 months after implementation. Outcomes included ED length of stay (LOS, hospital LOS, use of neuroimaging, and 90-day risk of stroke or TIA. Results: From 01/2012 to 06/2012, 130 patients were evaluated for TIA symptoms in the ED, and from 01/2013 to 06/2013, 150 patients. The final diagnosis was TIA or stroke in 45% before vs. 41% after (p=0.18. Following the intervention, the inpatient admission rate decreased from 62% to 24% (p<0.001, median ED LOS decreased by 1.2 hours (5.7 to 4.9 hours, p=0.027, and median total hospital LOS from 29.4 hours to 23.1 hours (p=0.019. The proportion of patients receiving head computed tomography (CT went from 68% to 58% (p=0.087; brain magnetic resonance (MR imaging from 83% to 88%, (p=0.44 neck CT angiography from 32% to 22% (p=0.039; and neck MR angiography from 61% to 72% (p=0.046. Ninety-day stroke or recurrent TIA among those with final diagnosis of TIA was 3% for both periods. Conclusion: Implementation of a TIA protocol significantly reduced ED LOS and total hospital LOS.

  9. Examining recombinant human TSH primed 131I therapy protocol in patients with metastatic differentiated thyroid carcinoma: comparison with the traditional thyroid hormone withdrawal protocol

    International Nuclear Information System (INIS)

    Rani, Deepa; Kaisar, Sushma; Awasare, Sushma; Kamaldeep; Abhyankar, Amit; Basu, Sandip

    2014-01-01

    Recombinant human thyroid-stimulating hormone (rhTSH)-based protocol is a promising recent development in the management of differentiated thyroid carcinoma (DTC). The objectives of this prospective study were: (1) to assess the feasibility and efficacy of the rhTSH primed 131 I therapy protocol in patients with DTC with distant metastatic disease, (2) to perform lesional dosimetry in this group of patients compared to the traditional protocol, (3) to document the practical advantages (patient symptoms and hospital stay) of the rhTSH protocol compared to the traditional thyroid hormone withdrawal protocol, (4) to document and record any adverse effect of this strategy, (5) to compare the renal function parameters, and (6) to compare the serum TSH values achieved in either of the protocols in this group of patients. The study included 37 patients with metastatic DTC having lung or skeletal metastases or both. A comparison of lesional radiation absorbed dose, hospital stay, renal function tests, and symptom profile was undertaken between the traditional thyroid hormone withdrawal protocol and rhTSH-based therapy protocol. Dosimetric calculations of metastatic lesions were performed using lesion uptake and survey meter readings for calculation of effective half-life. Non-contrast-enhanced CT was used for assessment of tumor volume. Quality of life was assessed using the European Organization for Research and Treatment of Cancer (EORTC) QOL forms. A comparison of pretreatment withdrawal thyroglobulin (TG) was done with the withdrawal TG level 3 months after treatment. The mean effective half-life of 131 I in metastatic lesions was less during the rhTSH protocol (29.49 h) compared to the thyroid hormone withdrawal protocol (35.48 h), but the difference was not statistically significant (p = 0.056). The mean 24-h % uptake of the lesions during the traditional protocol (4.84 %) was slightly higher than the 24-h % uptake during the rhTSH protocol (3.56 %), but the

  10. "International Criminalisation and Child Welfare Protection": The Optional Protocol to the Convention on the Rights of the Child

    Science.gov (United States)

    Buck, Trevor

    2008-01-01

    The Optional Protocol to the Convention on the Rights of the Child (CRC) on the Sale of Children, Child Prostitution and Child Pornography has two overall aims: (i) to strengthen international criminalisation and (ii) to provide welfare protection for child victims. This article reviews the context of the Protocol including the work of the Special…

  11. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  12. Pregnancy outcome of “delayed start” GnRH antagonist protocol versus GnRH antagonist protocol in poor responders: A clinical trial study

    Directory of Open Access Journals (Sweden)

    Abbas Aflatoonian

    2017-08-01

    Full Text Available Background: Management of poor-responding patients is still major challenge in assisted reproductive techniques (ART. Delayed-start GnRH antagonist protocol is recommended to these patients, but little is known in this regards. Objective: The goal of this study was assessment of delayed-start GnRH antagonist protocol in poor responders, and in vitro fertilization (IVF outcomes. Materials and Methods: This randomized clinical trial included sixty infertile women with Bologna criteria for ovarian poor responders who were candidate for IVF. In case group (n=30, delayed-start GnRH antagonist protocol administered estrogen priming followed by early follicular-phase GnRH antagonist treatment for 7 days before ovarian stimulation with gonadotropin. Control group (n=30 treated with estrogen priming antagonist protocol. Finally, endometrial thickness, the rates of oocytes maturation, , embryo formation, and pregnancy were compared between two groups. Results: Rates of implantation, chemical, clinical, and ongoing pregnancy in delayed-start cycles were higher although was not statistically significant. Endometrial thickness was significantly higher in case group. There were no statistically significant differences in the rates of oocyte maturation, embryo formation, and IVF outcomes between two groups. Conclusion: There is no significant difference between delayed-start GnRH antagonist protocol versus GnRH antagonist protocol.

  13. Evaluation of a protocol for the non-operative management of perforated peptic ulcer.

    Science.gov (United States)

    Marshall, C; Ramaswamy, P; Bergin, F G; Rosenberg, I L; Leaper, D J

    1999-01-01

    The non-operative management of perforated peptic ulcer has previously been shown to be both safe and effective although it remains controversial. A protocol for non-operative management was set up in this hospital in 1989. Adherence to the guidelines in the protocol has been audited over a 6-year period with a review of outcome. The case-notes of patients with a diagnosis of perforated peptic ulcer were reviewed. Twelve guidelines from the protocol were selected for evaluation of compliance to the protocol. Forty-nine patients underwent non-operative treatment initially. Eight patients failed to respond and underwent operation. Complications included abscess formation (seven patients), renal failure (one), gastric ileus (one), chest infection (two), and cardiac failure and stroke (one). Four deaths occurred in this group. Adherence to certain protocol guidelines was poor, notably those concerning prevention of thromboembolism, use of antibiotics, use of contrast examination to confirm the diagnosis and referral for follow-up endoscopy. Two gastric cancers were detected on subsequent endoscopy. This experience demonstrates that non-operative treatment can be used successfully in a general hospital. Adherence to protocol guidelines was found to be variable and the protocol has therefore been simplified. This study highlights the need for an accurate diagnosis and the importance of follow-up endoscopy.

  14. Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method

    Directory of Open Access Journals (Sweden)

    Hanane Houmani

    2012-01-01

    Full Text Available Most applications in the Internet such as e-banking and e-commerce use the SET and the NSL protocols to protect the communication channel between the client and the server. Then, it is crucial to ensure that these protocols respect some security properties such as confidentiality, authentication, and integrity. In this paper, we analyze the SET and the NSL protocols with respect to the confidentiality (secrecy property. To perform this analysis, we use the interpretation functions-based method. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily-life protocols such as SET and NSL. Also, this method could be used under different assumptions such as a variety of intruder abilities including algebraic properties of cryptographic primitives. The NSL protocol, for instance, is analyzed with and without the homomorphism property. We show also, using the SET protocol, the usefulness of this approach to correct weaknesses and problems discovered during the analysis.

  15. Protocol: An updated integrated methodology for analysis of metabolites and enzyme activities of ethylene biosynthesis

    Directory of Open Access Journals (Sweden)

    Geeraerd Annemie H

    2011-06-01

    Full Text Available Abstract Background The foundations for ethylene research were laid many years ago by researchers such as Lizada, Yang and Hoffman. Nowadays, most of the methods developed by them are still being used. Technological developments since then have led to small but significant improvements, contributing to a more efficient workflow. Despite this, many of these improvements have never been properly documented. Results This article provides an updated, integrated set of protocols suitable for the assembly of a complete picture of ethylene biosynthesis, including the measurement of ethylene itself. The original protocols for the metabolites 1-aminocyclopropane-1-carboxylic acid and 1-(malonylaminocyclopropane-1-carboxylic acid have been updated and downscaled, while protocols to determine in vitro activities of the key enzymes 1-aminocyclopropane-1-carboxylate synthase and 1-aminocyclopropane-1-carboxylate oxidase have been optimised for efficiency, repeatability and accuracy. All the protocols described were optimised for apple fruit, but have been proven to be suitable for the analysis of tomato fruit as well. Conclusions This work collates an integrated set of detailed protocols for the measurement of components of the ethylene biosynthetic pathway, starting from well-established methods. These protocols have been optimised for smaller sample volumes, increased efficiency, repeatability and accuracy. The detailed protocol allows other scientists to rapidly implement these methods in their own laboratories in a consistent and efficient way.

  16. A modified FASP protocol for high-throughput preparation of protein samples for mass spectrometry.

    Directory of Open Access Journals (Sweden)

    Jeremy Potriquet

    Full Text Available To facilitate high-throughput proteomic analyses we have developed a modified FASP protocol which improves the rate at which protein samples can be processed prior to mass spectrometry. Adapting the original FASP protocol to a 96-well format necessitates extended spin times for buffer exchange due to the low centrifugation speeds tolerated by these devices. However, by using 96-well plates with a more robust polyethersulfone molecular weight cutoff membrane, instead of the cellulose membranes typically used in these devices, we could use isopropanol as a wetting agent, decreasing spin times required for buffer exchange from an hour to 30 minutes. In a typical work flow used in our laboratory this equates to a reduction of 3 hours per plate, providing processing times similar to FASP for the processing of up to 96 samples per plate. To test whether our modified protocol produced similar results to FASP and other FASP-like protocols we compared the performance of our modified protocol to the original FASP and the more recently described eFASP and MStern-blot. We show that all FASP-like methods, including our modified protocol, display similar performance in terms of proteins identified and reproducibility. Our results show that our modified FASP protocol is an efficient method for the high-throughput processing of protein samples for mass spectral analysis.

  17. Comparison of IAEA protocols for clinical electron beam dosimetry

    International Nuclear Information System (INIS)

    Novotny, J.; Soukup, M.

    2002-01-01

    control measurements for the last three years were analyzed and compared with those measured during this study. The data show that measured average values for d ref are much stable with time compared to average d max values (average standard deviation of 0,032 and 0,007 [cm] for d max and d ref , respectively). The absorbed doses in reference depths were calculated from measured values using five different methods. Different calibration factors, still used in clinical practice, were employed for calculations of absorbed dose in reference conditions. To compare the doses using both TRS recommendations the ratio D max /D deref was established as well. Estimated uncertainties for individual methods are also included. Summary of absorbed dose determination in electron beams is presented as a dose for 100 MU in the same reference point. One can see that doses, except dose for 20 MeV electrons, are scattered within the range of 2,5% which is less than values for combined uncertainties estimated for individual methods. The large deviation (4,7%) observed for 20 MeV beam can not be explain easily, the only possible factor for the moment is too small field size used for depth dose curves measurement. More detail studies for this energy are carried out now. The replacement of presently used TRS 381 protocol in our country for TRS 398 protocol will not have a significant influence on absorbed dose estimation in clinical practice. Application of dosimetry protocols based on absorbed dose to water standards will considerably reduce the uncertainty of the absorbed dose delivery to a patient as the number of steps involved in correction factors applied is reduced

  18. Studying protocol-based pain management in the emergency department

    Directory of Open Access Journals (Sweden)

    Akkamahadevi Patil

    2017-01-01

    Full Text Available Background: Majority of the patients presenting to emergency department (ED have pain. ED oligoanalgesia remains a challenge. Aims: This study aims to study the effect of implementing a protocol-based pain management in the ED on (1 time to analgesia and (2 adequacy of analgesia obtained. Settings and Design: Cross-sectional study in the ED. Methods: Patients aged 18–65 years of age with pain of numeric rating scale (NRS ≥4 were included. A series of 100 patients presenting before introduction of the protocol-based pain management were grouped “pre-protocol,” and managed as per existing practice. Following this, a protocol for management of all patients presenting to ED with pain was implemented. Another series of 100 were grouped as “post-protocol” and managed as per the new pain management protocol. The data of patients from both the groups were collected and analyzed. Statistical Analysis Used: Descriptive statistical tests such as percentage, mean and standard deviation and inferential statistical tests such as Pearson coefficient, Student's t-test were applied. Differences were interpreted as significant when P < 0.05. Results: Mean time to administer analgesic was significantly lesser in the postprotocol group (preprotocol 20.30 min vs. postprotocol 13.05 min; P < 0.001. There was significant difference in the pain relief achieved (change in NRS between the two groups, with greater pain relief achieved in the postprotocol group (preprotocol group 4.6800 vs. postprotocol group 5.3600; P < 0.001. Patients' rating of pain relief (assessed on E5 scale was significantly higher in the postprotocol group (preprotocol 3.91 vs. postprotocol 4.27; P = 0.001. Patients' satisfaction (North American Spine Society scale with the overall treatment was also compared and found to be significantly higher in postprotocol group (mean: preprotocol 1.59 vs. postprotocol 1.39; P = 0.008. Conclusion: Protocol-based pain management provided timely and

  19. Births and deaths including fetal deaths

    Data.gov (United States)

    U.S. Department of Health & Human Services — Access to a variety of United States birth and death files including fetal deaths: Birth Files, 1968-2009; 1995-2005; Fetal death file, 1982-2005; Mortality files,...

  20. Including Indigenous Minorities in Decision-Making

    DEFF Research Database (Denmark)

    Pristed Nielsen, Helene

    Based on theories of public sphere participation and deliberative democracy, this book presents empirical results from a study of experiences with including Aboriginal and Maori groups in political decision-making in respectively Western Australia and New Zealand......Based on theories of public sphere participation and deliberative democracy, this book presents empirical results from a study of experiences with including Aboriginal and Maori groups in political decision-making in respectively Western Australia and New Zealand...

  1. Gas storage materials, including hydrogen storage materials

    Science.gov (United States)

    Mohtadi, Rana F; Wicks, George G; Heung, Leung K; Nakamura, Kenji

    2013-02-19

    A material for the storage and release of gases comprises a plurality of hollow elements, each hollow element comprising a porous wall enclosing an interior cavity, the interior cavity including structures of a solid-state storage material. In particular examples, the storage material is a hydrogen storage material such as a solid state hydride. An improved method for forming such materials includes the solution diffusion of a storage material solution through a porous wall of a hollow element into an interior cavity.

  2. Augmented Quadruple-Phase Contrast Media Administration and Triphasic Scan Protocol Increases Image Quality at Reduced Radiation Dose During Computed Tomography Urography.

    Science.gov (United States)

    Saade, Charbel; Mohamad, May; Kerek, Racha; Hamieh, Nadine; Alsheikh Deeb, Ibrahim; El-Achkar, Bassam; Tamim, Hani; Abdul Razzak, Farah; Haddad, Maurice; Abi-Ghanem, Alain S; El-Merhi, Fadi

    The aim of this article was to investigate the opacification of the renal vasculature and the urogenital system during computed tomography urography by using a quadruple-phase contrast media in a triphasic scan protocol. A total of 200 patients with possible urinary tract abnormalities were equally divided between 2 protocols. Protocol A used the conventional single bolus and quadruple-phase scan protocol (pre, arterial, venous, and delayed), retrospectively. Protocol B included a quadruple-phase contrast media injection with a triphasic scan protocol (pre, arterial and combined venous, and delayed), prospectively. Each protocol used 100 mL contrast and saline at a flow rate of 4.5 mL. Attenuation profiles and contrast-to-noise ratio of the renal arteries, veins, and urogenital tract were measured. Effective radiation dose calculation, data analysis by independent sample t test, receiver operating characteristic, and visual grading characteristic analyses were performed. In arterial circulation, only the inferior interlobular arteries in both protocols showed a statistical significance (P contrast-to-noise ratio than protocol A (protocol B: 22.68 ± 13.72; protocol A: 14.75 ± 5.76; P contrast media and triphasic scan protocol usage increases the image quality at a reduced radiation dose.

  3. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

    Science.gov (United States)

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S

    2015-11-01

    In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.

  4. A Self-Stabilizing Hybrid-Fault Tolerant Synchronization Protocol

    Science.gov (United States)

    Malekpour, Mahyar R.

    2014-01-01

    In this report we present a strategy for solving the Byzantine general problem for self-stabilizing a fully connected network from an arbitrary state and in the presence of any number of faults with various severities including any number of arbitrary (Byzantine) faulty nodes. Our solution applies to realizable systems, while allowing for differences in the network elements, provided that the number of arbitrary faults is not more than a third of the network size. The only constraint on the behavior of a node is that the interactions with other nodes are restricted to defined links and interfaces. Our solution does not rely on assumptions about the initial state of the system and no central clock nor centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. We also present a mechanical verification of a proposed protocol. A bounded model of the protocol is verified using the Symbolic Model Verifier (SMV). The model checking effort is focused on verifying correctness of the bounded model of the protocol as well as confirming claims of determinism and linear convergence with respect to the self-stabilization period. We believe that our proposed solution solves the general case of the clock synchronization problem.

  5. Design, Implementation, and Verification of the Reliable Multicast Protocol. Thesis

    Science.gov (United States)

    Montgomery, Todd L.

    1995-01-01

    This document describes the Reliable Multicast Protocol (RMP) design, first implementation, and formal verification. RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service. RMP is fully and symmetrically distributed so that no site bears an undue portion of the communications load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These guarantees are selectable on a per message basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, a client/server model of delivery, mutually exclusive handlers for messages, and mutually exclusive locks. It has been commonly believed that total ordering of messages can only be achieved at great performance expense. RMP discounts this. The first implementation of RMP has been shown to provide high throughput performance on Local Area Networks (LAN). For two or more destinations a single LAN, RMP provides higher throughput than any other protocol that does not use multicast or broadcast technology. The design, implementation, and verification activities of RMP have occurred concurrently. This has allowed the verification to maintain a high fidelity between design model, implementation model, and the verification model. The restrictions of implementation have influenced the design earlier than in normal sequential approaches. The protocol as a whole has matured smoother by the inclusion of several different perspectives into the product development.

  6. Analysis of Pervasive Mobile Ad Hoc Routing Protocols

    Science.gov (United States)

    Qadri, Nadia N.; Liotta, Antonio

    Mobile ad hoc networks (MANETs) are a fundamental element of pervasive networks and therefore, of pervasive systems that truly support pervasive computing, where user can communicate anywhere, anytime and on-the-fly. In fact, future advances in pervasive computing rely on advancements in mobile communication, which includes both infrastructure-based wireless networks and non-infrastructure-based MANETs. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure - they rely on wireless terminals for routing and transport services. Due to highly dynamic topology, absence of established infrastructure for centralized administration, bandwidth constrained wireless links, and limited resources in MANETs, it is challenging to design an efficient and reliable routing protocol. This chapter reviews the key studies carried out so far on the performance of mobile ad hoc routing protocols. We discuss performance issues and metrics required for the evaluation of ad hoc routing protocols. This leads to a survey of existing work, which captures the performance of ad hoc routing algorithms and their behaviour from different perspectives and highlights avenues for future research.

  7. Keyboard with Universal Communication Protocol Applied to CNC Machine

    Directory of Open Access Journals (Sweden)

    Mejía-Ugalde Mario

    2014-04-01

    Full Text Available This article describes the use of a universal communication protocol for industrial keyboard based microcontroller applied to computer numerically controlled (CNC machine. The main difference among the keyboard manufacturers is that each manufacturer has its own programming of source code, producing a different communication protocol, generating an improper interpretation of the function established. The above results in commercial industrial keyboards which are expensive and incompatible in their connection with different machines. In the present work the protocol allows to connect the designed universal keyboard and the standard keyboard of the PC at the same time, it is compatible with all the computers through the communications USB, AT or PS/2, to use in CNC machines, with extension to other machines such as robots, blowing, injection molding machines and others. The advantages of this design include its easy reprogramming, decreased costs, manipulation of various machine functions and easy expansion of entry and exit signals. The results obtained of performance tests were satisfactory, because each key has the programmed and reprogrammed facility in different ways, generating codes for different functions, depending on the application where it is required to be used.

  8. MODELLING AND VERIFICATION OF KITSAT PACKET COMMUNICATION PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Young-Ro Lee

    1996-06-01

    Full Text Available In this paper, in order to verify KITSAT 1/2 packet communication protocols, we model the AX.25 protocol and PACSAT protocol by using an extended Petri net and then verify the correctness, boundedness, liveness and deadlock freeness of packet protocols by utilizing reachability trees.

  9. Differential phase-time shifting protocol for QKD (DPTS)

    DEFF Research Database (Denmark)

    Usuga Castaneda, Mario A.; Bacco, Davide; Christensen, Jesper Bjerge

    2016-01-01

    We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols.......We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols....

  10. Subgroup analyses in randomised controlled trials: cohort study on trial protocols and journal publications.

    Science.gov (United States)

    Kasenda, Benjamin; Schandelmaier, Stefan; Sun, Xin; von Elm, Erik; You, John; Blümle, Anette; Tomonaga, Yuki; Saccilotto, Ramon; Amstutz, Alain; Bengough, Theresa; Meerpohl, Joerg J; Stegert, Mihaela; Olu, Kelechi K; Tikkinen, Kari A O; Neumann, Ignacio; Carrasco-Labra, Alonso; Faulhaber, Markus; Mulla, Sohail M; Mertz, Dominik; Akl, Elie A; Bassler, Dirk; Busse, Jason W; Ferreira-González, Ignacio; Lamontagne, Francois; Nordmann, Alain; Gloy, Viktoria; Raatz, Heike; Moja, Lorenzo; Rosenthal, Rachel; Ebrahim, Shanil; Vandvik, Per O; Johnston, Bradley C; Walter, Martin A; Burnand, Bernard; Schwenkglenks, Matthias; Hemkens, Lars G; Bucher, Heiner C; Guyatt, Gordon H; Briel, Matthias

    2014-07-16

    To investigate the planning of subgroup analyses in protocols of randomised controlled trials and the agreement with corresponding full journal publications. Cohort of protocols of randomised controlled trial and subsequent full journal publications. Six research ethics committees in Switzerland, Germany, and Canada. 894 protocols of randomised controlled trial involving patients approved by participating research ethics committees between 2000 and 2003 and 515 subsequent full journal publications. Of 894 protocols of randomised controlled trials, 252 (28.2%) included one or more planned subgroup analyses. Of those, 17 (6.7%) provided a clear hypothesis for at least one subgroup analysis, 10 (4.0%) anticipated the direction of a subgroup effect, and 87 (34.5%) planned a statistical test for interaction. Industry sponsored trials more often planned subgroup analyses compared with investigator sponsored trials (195/551 (35.4%) v 57/343 (16.6%), P<0.001). Of 515 identified journal publications, 246 (47.8%) reported at least one subgroup analysis. In 81 (32.9%) of the 246 publications reporting subgroup analyses, authors stated that subgroup analyses were prespecified, but this was not supported by 28 (34.6%) corresponding protocols. In 86 publications, authors claimed a subgroup effect, but only 36 (41.9%) corresponding protocols reported a planned subgroup analysis. Subgroup analyses are insufficiently described in the protocols of randomised controlled trials submitted to research ethics committees, and investigators rarely specify the anticipated direction of subgroup effects. More than one third of statements in publications of randomised controlled trials about subgroup prespecification had no documentation in the corresponding protocols. Definitive judgments regarding credibility of claimed subgroup effects are not possible without access to protocols and analysis plans of randomised controlled trials. © The DISCO study group 2014.

  11. Comparison of absorbed dose determinations using the IAEA dosimetry protocol and the ferrous sulphate dosimeter

    International Nuclear Information System (INIS)

    Mattsson, Olof

    1988-01-01

    In 1985 a comparison of different revised protocols for the dosimetry of high-energy photon and electron beams was published (Mattsson, 1985). The conclusions were that the agreement in absorbed dose to water determined using the different protocols is very good and that the agreement between ionization chamber and ferrous sulphate dosimetry is generally good. For electron beams the differences obtained with the ionization chamber and ferrous sulphate dosimeters were up to about 2%. The influence of the energy and angular distribution of the electron beams on the ionization chamber dosimetry is not fully considered in the dosimetry protocols. The basis for the ionization chamber dosimetry has recently been changed when the Bureau International des Poids et Mesures (BIPM) in 1986 changed the air-kerma standard. The reason was the adaption of the new stopping-power values reported in the ICRU Report No. 37. To achieve consistency in the ionization chamber dosimetry the interaction coefficients and correction factors given in the dosimetry protocols should also be based on the same set of stopping-power values. This is not the case with the protocols included in the comparison made by Mattsson. However, in the international code of practice by the International Atomic Energy Agency (IAEA, 1987) the new stopping-power values have been used. The formalism is the same as in most of the previous protocols. Mattsson et al. (1989) have shown that the differences in the various steps cancel out for the protocols published by NACP (1980) and by IAEA (1987) for cobalt-60 gamma quality. However, it is also of interest to investigate the influence of the new air-kerma standard and the new values on coefficients and factors given in the IAEA protocol for other beam qualities. Therefore, the data given by Mattsson (1985) have been recalculated using the new air-kerma standard and the IAEA protocol

  12. Influence of a multidisciplinary protocol on nutritional status at diagnosis in amyotrophic lateral sclerosis.

    Science.gov (United States)

    López-Gómez, Juan José; Torres-Torres, Beatriz; Gómez-Hoyos, Emilia; Fernández-Buey, Nieves; Ortolá-Buigues, Ana; Castro-Lozano, Ángeles; Arenillas-Lara, Juan F; De Luis-Román, Daniel A

    2018-04-01

    The aim of this study were to understand the influence of a multidisciplinary care protocol in amyotrophic lateral sclerosis (ALS) on the change in the delay of remission to the nutrition specialist and the initial nutritional status. A cohort study was performed in 43 patients with ALS who were referred to the Nutrition Unit between April 2015 and April 2017. Anthropometric parameters and diagnostic times were collected, and the nutritional status was studied through subjective global assessment (SGA). Patients who were included before (control cohort [NoP]) and after (protocol cohort [P]) a multidisciplinary protocol were compared. The mean age of the participants was 66.79 y (10.86 y). Of the patients, 62.8% belonged to the protocol cohort. Patients who started the protocol had a lower delay in initial assessment by a nutrition specialist (P:2 [1-6] mo/NoP:12 [10-29] mo; P = 0.03). When the nutritional status was analyzed according to the SGA, more patients who did not initiate protocol were in the state of severe malnutrition (C) (P 22.2% versus NoP 60%; P = 0.01). Entry into the protocol was an independent protective factor of the presence of severe malnutrition at the beginning of the nutritional follow-up (odds ratio, 0.20; 95% confidence interval, 0.03-0.73; P = 0.02). The implementation of a multidisciplinary protocol in ALS allowed patients to present a lower percentage of severe malnutrition in an initial assessment by the nutrition specialist. This protocol is a protective factor for the presence of malnutrition at the beginning of support. Copyright © 2017 Elsevier Inc. All rights reserved.

  13. A Survey of Enhanced Recovery After Surgery Protocols for Cesarean Delivery in Serbia

    Directory of Open Access Journals (Sweden)

    Borislava Pujic

    2018-04-01

    Full Text Available Enhanced recovery after surgery (ERAS protocols have been described for patients undergoing colon surgery. Similar protocols for cesarean delivery (CD have been developed recently. CD is one of the most commonly performed surgical procedures, and adoption of ERAS protocols following CD might benefit patients and the health-care system. We aimed to determine which Serbian hospitals reported ERAS protocols, which elements of ERAS protocols were used in CD patients, and whether ERAS and non-ERAS hospitals differed. The survey was sent to all hospitals with obstetric services and 46 of 49 responded. The questionnaire asked whether ERAS protocols had been formally adopted for surgical patients and about their use in CD patients. Specific questions on elements described in other obstetric ERAS protocols for CD included preoperative patient preparation, type of anesthesia and temperature monitoring used for CD, maternal/neonatal contact, and time to discharge. ERAS protocols are used in 24% of surveyed hospitals, 84% admit the patient the day before elective CDs, 87% use a maternal bowel preparation morning on the day of CD, and 80% administer maternal deep venous thrombosis prophylaxis. Only 33% remove IV in the first postoperative day, and 89% of women do not eat solid food until the day following their CD. Neuraxial anesthesia is used in 46% of elective CDs in ERAS hospitals compared to 9% in non-ERAS hospitals (P < 0.01, and neuraxial narcotics for post CD analgesia are given more often in ERAS hospitals. Thirty-six percentage of ERAS patients are discharged within 3 days vs. none in the non-ERAS group. Few elements of ERAS protocols reported from other centers outside Serbia are employed in Serbian hospitals performing CD. Despite significant changes that have been made recently in CD care, enhanced recovery after CD could be significantly improved in Serbian hospitals.

  14. Orthodontic treatment outcomes obtained by application of a finishing protocol

    Directory of Open Access Journals (Sweden)

    Alvaro Carvajal-Flórez

    2016-04-01

    Full Text Available ABSTRACT Objective: To evaluate the results of a finishing protocol implemented in patients treated in the Orthodontics graduate program at Universidad de Antioquia. Evaluation was carried out by means of the criteria set by the Objective Grading System (OGS of the American Board of Orthodontics (ABO. Methods: Cast models and panoramic radiographs of 34 patients were evaluated. The intervention group (IG consisted of 17 patients (19.88 ± 4.4 years old treated under a finishing protocol. This protocol included training in finishing, application of a finishing guide, brackets repositioning and patient's follow-up. Results of the IG were compared to a control group of 17 patients (21.88 ± 7.0 years old selected by stratified randomization without finishing intervention (CG. Results: The scores for both CG and IG were 38.00 ± 9.0 and 31.41 ± 9.6 (p = 0.048, respectively. The score improved significantly in the IG group, mainly regarding marginal ridges (CG: 5.59 ± 2.2; IG: 3.65 ± 1.8 (p = 0.009 and root angulation (CG: 7.59 ± 2.8; IG: 4.88 ± 2.6 (p = 0.007. Criteria that did not improve, but had the highest scores were: alignment (CG: 6.35 ± 2.7; IG: 6.82 ± 2.8 (p = 0.62 and buccolingual inclination (CG: 3.6 ± 5.88; IG: 5.29 ± 3.9 (p = 0.65. Conclusions: Standardization and implementation of a finishing protocol contributed to improve clinical performance in the Orthodontics graduate program, as expressed by occlusal outcomes. Greater emphasis should be given on the finishing phase to achieve lower scores in the ABO grading system.

  15. A Cryptographic Moving-Knife Cake-Cutting Protocol

    Directory of Open Access Journals (Sweden)

    Yoshifumi Manabe

    2012-02-01

    Full Text Available This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum.

  16. Welfare Quality assessment protocol for laying hens = Welfare Quality assessment protocol voor leghennen

    NARCIS (Netherlands)

    Niekerk, van T.G.C.M.; Gunnink, H.; Reenen, van C.G.

    2012-01-01

    Results of a study on the Welfare Quality® assessment protocol for laying hens. It reports the development of the integration of welfare assessment as scores per criteria as well as simplification of the Welfare Quality® assessment protocol. Results are given from assessment of 122 farms.

  17. Electric Power Monthly, August 1990. [Glossary included

    Energy Technology Data Exchange (ETDEWEB)

    1990-11-29

    The Electric Power Monthly (EPM) presents monthly summaries of electric utility statistics at the national, Census division, and State level. The purpose of this publication is to provide energy decisionmakers with accurate and timely information that may be used in forming various perspectives on electric issues that lie ahead. Data includes generation by energy source (coal, oil, gas, hydroelectric, and nuclear); generation by region; consumption of fossil fuels for power generation; sales of electric power, cost data; and unusual occurrences. A glossary is included.

  18. Electrochemical cell structure including an ionomeric barrier

    Science.gov (United States)

    Lambert, Timothy N.; Hibbs, Michael

    2017-06-20

    An apparatus includes an electrochemical half-cell comprising: an electrolyte, an anode; and an ionomeric barrier positioned between the electrolyte and the anode. The anode may comprise a multi-electron vanadium phosphorous alloy, such as VP.sub.x, wherein x is 1-5. The electrochemical half-cell is configured to oxidize the vanadium and phosphorous alloy to release electrons. A method of mitigating corrosion in an electrochemical cell includes disposing an ionomeric barrier in a path of electrolyte or ion flow to an anode and mitigating anion accumulation on the surface of the anode.

  19. Isolators Including Main Spring Linear Guide Systems

    Science.gov (United States)

    Goold, Ryan (Inventor); Buchele, Paul (Inventor); Hindle, Timothy (Inventor); Ruebsamen, Dale Thomas (Inventor)

    2017-01-01

    Embodiments of isolators, such as three parameter isolators, including a main spring linear guide system are provided. In one embodiment, the isolator includes first and second opposing end portions, a main spring mechanically coupled between the first and second end portions, and a linear guide system extending from the first end portion, across the main spring, and toward the second end portion. The linear guide system expands and contracts in conjunction with deflection of the main spring along the working axis, while restricting displacement and rotation of the main spring along first and second axes orthogonal to the working axis.

  20. Nursing Music Protocol and Postoperative Pain.

    Science.gov (United States)

    Poulsen, Michael J; Coto, Jeffrey

    2018-04-01

    Pain has always been a major concern for patients and nurses during the postoperative period. Therapies, medicines, and protocols have been developed to improve pain and anxiety but have undesirable risks to the patient. Complementary and alternative medicine therapies have been studied but have not been applied as regular protocols in the hospital setting. Music is one type of complementary and alternative medicine therapy that has been reported to have favorable results on reducing postoperative pain, anxiety, and opioid usage. However, music lacks a protocol that nurses can implement during the perioperative process. This paper is an in-depth literature review assessing a best practice recommendation and protocol that establishes a consensus in the use of music therapy. The results suggest that music therapy may consist of calming, soft tones of 60-80 beats per minute for at least 15-30 minutes at least twice daily during the pre- and postoperative periods. It is suggested that music only be used in conjunction with standards of care and not as the primary intervention of pain or anxiety. This evidence suggests that proper use of music therapy can significantly reduce surgical pain. Implementing these protocols and allowing the freedom of nursing staff to use them may lead to greater reductions in surgical pain and anxiety and a reduction in opioid use. Copyright © 2017 American Society for Pain Management Nursing. Published by Elsevier Inc. All rights reserved.

  1. WDM Network and Multicasting Protocol Strategies

    Directory of Open Access Journals (Sweden)

    Pinar Kirci

    2014-01-01

    Full Text Available Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM, it is easier to take the advantage of optical networks and optical burst switching (OBS and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET and Just In Time (JIT reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes.

  2. A Lightweight Protocol for Secure Video Streaming.

    Science.gov (United States)

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  3. Supporting Adaptation of Wireless Communication Protocols

    International Nuclear Information System (INIS)

    Dhomeja, L.D.; Soomro, I.A.; Malkani, Y.A.

    2016-01-01

    Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants) come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity), Bluetooth, IrDA (Infrared), etc. In order for pervasive devices to interact with each other, they need to have matching (alike) communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth) from what the server has (e.g. WiFi), connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange), L2CAP (Logical Link Control and Adaptation Protocol), RFCOM (Radio Frequency Communication) and WiFi protocol and can run on (J2MW (Java 2 Micro Edition) enabled mobile phones which support both Bluetooth and WiFi capabilities. (author)

  4. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  5. Decellularization of placentas: establishing a protocol

    Directory of Open Access Journals (Sweden)

    L.C.P.C. Leonel

    2017-11-01

    Full Text Available Biological biomaterials for tissue engineering purposes can be produced through tissue and/or organ decellularization. The remaining extracellular matrix (ECM must be acellular and preserve its proteins and physical features. Placentas are organs of great interest because they are discarded after birth and present large amounts of ECM. Protocols for decellularization are tissue-specific and have not been established for canine placentas yet. This study aimed at analyzing a favorable method for decellularization of maternal and fetal portions of canine placentas. Canine placentas were subjected to ten preliminary tests to analyze the efficacy of parameters such as the type of detergents, freezing temperatures and perfusion. Two protocols were chosen for further analyses using histology, scanning electron microscopy, immunofluorescence and DNA quantification. Sodium dodecyl sulfate (SDS was the most effective detergent for cell removal. Freezing placentas before decellularization required longer periods of incubation in different detergents. Both perfusion and immersion methods were capable of removing cells. Placentas decellularized using Protocol I (1% SDS, 5 mM EDTA, 50 mM TRIS, and 0.5% antibiotic preserved the ECM structure better, but Protocol I was less efficient to remove cells and DNA content from the ECM than Protocol II (1% SDS, 5 mM EDTA, 0.05% trypsin, and 0.5% antibiotic.

  6. A More Efficient Contextuality Distillation Protocol

    Science.gov (United States)

    Meng, Hui-xian; Cao, Huai-xin; Wang, Wen-hua; Fan, Ya-jing; Chen, Liang

    2018-03-01

    Based on the fact that both nonlocality and contextuality are resource theories, it is natural to ask how to amplify them more efficiently. In this paper, we present a contextuality distillation protocol which produces an n-cycle box B ∗ B ' from two given n-cycle boxes B and B '. It works efficiently for a class of contextual n-cycle ( n ≥ 4) boxes which we termed as "the generalized correlated contextual n-cycle boxes". For any two generalized correlated contextual n-cycle boxes B and B ', B ∗ B ' is more contextual than both B and B '. Moreover, they can be distilled toward to the maximally contextual box C H n as the times of iteration goes to infinity. Among the known protocols, our protocol has the strongest approximate ability and is optimal in terms of its distillation rate. What is worth noting is that our protocol can witness a larger set of nonlocal boxes that make communication complexity trivial than the protocol in Brunner and Skrzypczyk (Phys. Rev. Lett. 102, 160403 2009), this might be helpful for exploring the problem that why quantum nonlocality is limited.

  7. Efficient Communication Protocols for Deciding Edit Distance

    DEFF Research Database (Denmark)

    Jowhari, Hossein

    2012-01-01

    In this paper we present two communication protocols on computing edit distance. In our first result, we give a one-way protocol for the following Document Exchange problem. Namely given x ∈ Σn to Alice and y ∈ Σn to Bob and integer k to both, Alice sends a message to Bob so that he learns x...... or truthfully reports that the edit distance between x and y is greater than k. For this problem, we give a randomized protocol in which Alice transmits at most O ˜ (klog 2 n) bits and each party’s time complexity is O ˜ (nlogn+k 2 log 2 n) . Our second result is a simultaneous protocol for edit distance over...... permutations. Here Alice and Bob both send a message to a third party (the referee) who does not have access to the input strings. Given the messages, the referee decides if the edit distance between x and y is at most k or not. For this problem we give a protocol in which Alice and Bob run a O...

  8. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  9. A class-chest for deriving transport protocols

    Energy Technology Data Exchange (ETDEWEB)

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  10. Implementation of two-party protocols in the noisy-storage model

    International Nuclear Information System (INIS)

    Wehner, Stephanie; Curty, Marcos; Schaffner, Christian; Lo, Hoi-Kwong

    2010-01-01

    The noisy-storage model allows the implementation of secure two-party protocols under the sole assumption that no large-scale reliable quantum storage is available to the cheating party. No quantum storage is thereby required for the honest parties. Examples of such protocols include bit commitment, oblivious transfer, and secure identification. Here, we provide a guideline for the practical implementation of such protocols. In particular, we analyze security in a practical setting where the honest parties themselves are unable to perform perfect operations and need to deal with practical problems such as errors during transmission and detector inefficiencies. We provide explicit security parameters for two different experimental setups using weak coherent, and parametric down-conversion sources. In addition, we analyze a modification of the protocols based on decoy states.

  11. A Guide to Writing a Qualitative Systematic Review Protocol to Enhance Evidence-Based Practice in Nursing and Health Care.

    Science.gov (United States)

    Butler, Ashleigh; Hall, Helen; Copnell, Beverley

    2016-06-01

    The qualitative systematic review is a rapidly developing area of nursing research. In order to present trustworthy, high-quality recommendations, such reviews should be based on a review protocol to minimize bias and enhance transparency and reproducibility. Although there are a number of resources available to guide researchers in developing a quantitative review protocol, very few resources exist for qualitative reviews. To guide researchers through the process of developing a qualitative systematic review protocol, using an example review question. The key elements required in a systematic review protocol are discussed, with a focus on application to qualitative reviews: Development of a research question; formulation of key search terms and strategies; designing a multistage review process; critical appraisal of qualitative literature; development of data extraction techniques; and data synthesis. The paper highlights important considerations during the protocol development process, and uses a previously developed review question as a working example. This paper will assist novice researchers in developing a qualitative systematic review protocol. By providing a worked example of a protocol, the paper encourages the development of review protocols, enhancing the trustworthiness and value of the completed qualitative systematic review findings. Qualitative systematic reviews should be based on well planned, peer reviewed protocols to enhance the trustworthiness of results and thus their usefulness in clinical practice. Protocols should outline, in detail, the processes which will be used to undertake the review, including key search terms, inclusion and exclusion criteria, and the methods used for critical appraisal, data extraction and data analysis to facilitate transparency of the review process. Additionally, journals should encourage and support the publication of review protocols, and should require reference to a protocol prior to publication of the

  12. TH-C-18A-08: A Management Tool for CT Dose Monitoring, Analysis, and Protocol Review

    International Nuclear Information System (INIS)

    Wang, J; Chan, F; Newman, B; Larson, D; Leung, A; Fleischmann, D; Molvin, L; Marsh, D; Zorich, C; Phillips, L

    2014-01-01

    Purpose: To develop a customizable tool for enterprise-wide managing of CT protocols and analyzing radiation dose information of CT exams for a variety of quality control applications Methods: All clinical CT protocols implemented on the 11 CT scanners at our institution were extracted in digital format. The original protocols had been preset by our CT management team. A commercial CT dose tracking software (DoseWatch,GE healthcare,WI) was used to collect exam information (exam date, patient age etc.), scanning parameters, and radiation doses for all CT exams. We developed a Matlab-based program (MathWorks,MA) with graphic user interface which allows to analyze the scanning protocols with the actual dose estimates, and compare the data to national (ACR,AAPM) and internal reference values for CT quality control. Results: The CT protocol review portion of our tool allows the user to look up the scanning and image reconstruction parameters of any protocol on any of the installed CT systems among about 120 protocols per scanner. In the dose analysis tool, dose information of all CT exams (from 05/2013 to 02/2014) was stratified on a protocol level, and within a protocol down to series level, i.e. each individual exposure event. This allows numerical and graphical review of dose information of any combination of scanner models, protocols and series. The key functions of the tool include: statistics of CTDI, DLP and SSDE, dose monitoring using user-set CTDI/DLP/SSDE thresholds, look-up of any CT exam dose data, and CT protocol review. Conclusion: our inhouse CT management tool provides radiologists, technologists and administration a first-hand near real-time enterprise-wide knowledge on CT dose levels of different exam types. Medical physicists use this tool to manage CT protocols, compare and optimize dose levels across different scanner models. It provides technologists feedback on CT scanning operation, and knowledge on important dose baselines and thresholds

  13. Differences in handgrip strength protocols to identify sarcopenia and frailty - a systematic review.

    Science.gov (United States)

    Sousa-Santos, A R; Amaral, T F

    2017-10-16

    Hand grip strength (HGS) is used for the diagnosis of sarcopenia and frailty. Several factors have been shown to influence HGS values during measurement. Therefore, variations in the protocols used to assess HGS, as part of the diagnosis of sarcopenia and frailty, may lead to the identification of different individuals with low HGS, introducing bias. The aim of this systematic review is to gather all the relevant studies that measured HGS to diagnose sarcopenia and frailty and to identify the differences between the protocols used. A systematic review was carried out following the recommendations of The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) Statement. PubMed and Web of Science were systematically searched, until August 16, 2016. The evidence regarding HGS measurement protocols used to diagnose sarcopenia and frailty was summarised and the most recent protocols regarding the procedure were compared. From the described search 4393 articles were identified. Seventy-two studies were included in this systematic review, in which 37 referred to sarcopenia articles, 33 to frailty and two evaluated both conditions. Most studies presented limited information regarding the protocols used. The majority of the studies included did not describe a complete procedure of HGS measurement. The high heterogeneity between the protocols used, in sarcopenia and frailty studies, create an enormous difficulty in drawing comparative conclusions among them.

  14. 28 CFR 20.32 - Includable offenses.

    Science.gov (United States)

    2010-07-01

    ... Exchange of Criminal History Record Information § 20.32 Includable offenses. (a) Criminal history record... vehicular manslaughter, driving under the influence of drugs or liquor, and hit and run), when unaccompanied by a § 20.32(a) offense. These exclusions may not be applicable to criminal history records...

  15. Including Students with Visual Impairments: Softball

    Science.gov (United States)

    Brian, Ali; Haegele, Justin A.

    2014-01-01

    Research has shown that while students with visual impairments are likely to be included in general physical education programs, they may not be as active as their typically developing peers. This article provides ideas for equipment modifications and game-like progressions for one popular physical education unit, softball. The purpose of these…

  16. Extending flood damage assessment methodology to include ...

    African Journals Online (AJOL)

    Optimal and sustainable flood plain management, including flood control, can only be achieved when the impacts of flood control measures are considered for both the man-made and natural environments, and the sociological aspects are fully considered. Until now, methods/models developed to determine the influences ...

  17. BIOLOGIC AND ECONOMIC EFFECTS OF INCLUDING DIFFERENT ...

    African Journals Online (AJOL)

    The biologic and economic effects of including three agro-industrial by-products as ingredients in turkey poult diets were investigated using 48 turkey poults in a completely randomised design experiment. Diets were formulated to contain the three by-products – wheat offal, rice husk and palm kernel meal, each at 20% level ...

  18. Including Children Dependent on Ventilators in School.

    Science.gov (United States)

    Levine, Jack M.

    1996-01-01

    Guidelines for including ventilator-dependent children in school are offered, based on experience with six such students at a New York State school. Guidelines stress adherence to the medical management plan, the school-family partnership, roles of the social worker and psychologist, orientation, transportation, classroom issues, and steps toward…

  19. An one-time-pad key communication protocol with entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We present an one-time-pad key communication protocol that allows secure direct communication with entanglement. Alice can send message to Bob in a deterministic manner by using local measurements and public communication. The theoretical efficiency of this protocol is double compared with BB84 protocol. We show this protocol is unconditional secure under arbitrary quantum attack. And we discuss that this protocol can be perfectly implemented with current technologies.

  20. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols.

    Science.gov (United States)

    Campagne, Fabien

    2008-02-29

    The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79-0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86-0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these protocols can fully substitute

  1. Analysis of Security Protocols by Annotations

    DEFF Research Database (Denmark)

    Gao, Han

    . The development of formal techniques, e.g. control flow analyses, that can check various security properties, is an important tool to meet this challenge. This dissertation contributes to the development of such techniques. In this dissertation, security protocols are modelled in the process calculus LYSA......The trend in Information Technology is that distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great...... deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal. It has long been a challenge to determine conclusively whether a given protocol is secure or not...

  2. Breaking Megrelishvili protocol using matrix diagonalization

    Science.gov (United States)

    Arzaki, Muhammad; Triantoro Murdiansyah, Danang; Adi Prabowo, Satrio

    2018-03-01

    In this article we conduct a theoretical security analysis of Megrelishvili protocol—a linear algebra-based key agreement between two participants. We study the computational complexity of Megrelishvili vector-matrix problem (MVMP) as a mathematical problem that strongly relates to the security of Megrelishvili protocol. In particular, we investigate the asymptotic upper bounds for the running time and memory requirement of the MVMP that involves diagonalizable public matrix. Specifically, we devise a diagonalization method for solving the MVMP that is asymptotically faster than all of the previously existing algorithms. We also found an important counterintuitive result: the utilization of primitive matrix in Megrelishvili protocol makes the protocol more vulnerable to attacks.

  3. Demarcation of Security in Authentication Protocols

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security analysis of communication protocols is a slippery business; many “secure” protocols later turn out to be insecure. Among many, two complains are more frequent: inadequate definition of security and unstated assumptions in the security model. In our experience, one principal cause...... for such state of affairs is an apparent overlap of security and correctness, which may lead to many sloppy security definitions and security models. Although there is no inherent need to separate security and correctness requirements, practically, such separation is significant. It makes security analysis...... easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...

  4. Will OPEC lose from the Kyoto Protocol?

    International Nuclear Information System (INIS)

    Barnett, Jon; Dessai, Suraje; Webber, Michael

    2004-01-01

    A range of energy-economy models forecast losses to members of the Organisation of Petroleum Exporting Countries (OPEC) should the Kyoto Protocol come into force. These forecasts are a powerful influence in the United Nations Framework Convention on Climate Change negotiations. They are used by OPEC to advance the agenda on the impacts of response measures, covertly arguing for compensation for lost oil revenues arising from implementation of the Protocol. This paper discusses this issue, and explores the key assumptions of these models and their uncertainties. Assumptions about carbon leakage, future availability of oil reserves, substitution, innovation, and capital turnover are considered. The paper suggests that losses will not affect OPEC countries equally, and that these losses are not likely to be as substantial as the models forecast. A range of policy measures are proposed to lessen any impact the Protocol may have on OPEC

  5. Structured Transition Protocol for Children with Cystinosis

    Directory of Open Access Journals (Sweden)

    Rupesh Raina

    2017-08-01

    Full Text Available The transition from pediatric to adult medical services has a greater impact on the care of adolescents or young adults with chronic diseases such as cystinosis. This transition period is a time of psychosocial development and new responsibilities placing these patients at increased risk of non-adherence. This can lead to serious adverse effects such as graft loss and progression of the disease. Our transition protocol will provide patients, families, physicians, and all those involved a structured guide to transitioning cystinosis patients. This structured protocol depends on four areas of competency: Recognition, Insight, Self-reliance, and Establishment of healthy habits (RISE. This protocol has not been tested and therefore challenges not realized. With a focus on medical, social, and educational/vocational aspects, we aim to improve transition for cystinosis patients in all aspects of their lives.

  6. The Operation of the Joint Protocol: Theoretical and Practical Implications Revisited

    International Nuclear Information System (INIS)

    Horbach, N.

    2008-01-01

    On 21 September 1988, a Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention was adopted and entered into force on 27 April 1992. The 1988 Joint Protocol (Article II) provides for a mutual extension of the operator's liability under the Paris and Vienna systems: thus, if a nuclear incident occurs for which an operator is liable under both the Vienna Convention and the Joint Protocol, he shall be liable in accordance with the Vienna Convention for nuclear damage suffered not only in the territory of Parties thereto, but also in the territory of Parties to both the Paris Convention and the Joint Protocol; conversely, if an incident occurs for which an operator is liable under both the Paris Convention and the Joint Protocol, there shall be reciprocity. Moreover, the Joint Protocol (Article III) eliminates conflicts of law which might otherwise arise, especially in transport cases, from simultaneous application of the two Conventions. Although the text of the Joint Protocol is quite straightforward, it still has led to different interpretations in legal doctrine concerning Article IV. The main concern is the conflict that might arise in respect of the appropriate designation of the competent court and applicable law in situations were courts of different states might claim exclusive jurisdiction. This depends also on whether the Joint Protocol should be interpreted as eliminating the distinction between Contracting Parties and non-Contracting Parties in respect of the 'functional' relations among Paris and Vienna Contracting Parties, also party to the Joint Protocol, as far as the operative provisions of both Conventions listed in Article IV are concerned (including the provisions on jurisdictional competence). The importance of finding the legally correct interpretation, already complicated in relation to the interpretation of the operation of the Joint Protocol under the unrevised nuclear liability treaties (1960 Paris

  7. Development of a bedside viable ultrasound protocol to quantify appendicular lean tissue mass.

    Science.gov (United States)

    Paris, Michael T; Lafleur, Benoit; Dubin, Joel A; Mourtzakis, Marina

    2017-10-01

    Ultrasound is a non-invasive and readily available tool that can be prospectively applied at the bedside to assess muscle mass in clinical settings. The four-site protocol, which images two anatomical sites on each quadriceps, may be a viable bedside method, but its ability to predict musculature has not been compared against whole-body reference methods. Our primary objectives were to (i) compare the four-site protocol's ability to predict appendicular lean tissue mass from dual-energy X-ray absorptiometry; (ii) optimize the predictability of the four-site protocol with additional anatomical muscle thicknesses and easily obtained covariates; and (iii) assess the ability of the optimized protocol to identify individuals with low lean tissue mass. This observational cross-sectional study recruited 96 university and community dwelling adults. Participants underwent ultrasound scans for assessment of muscle thickness and whole-body dual-energy X-ray absorptiometry scans for assessment of appendicular lean tissue. Ultrasound protocols included (i) the nine-site protocol, which images nine anterior and posterior muscle groups in supine and prone positions, and (ii) the four-site protocol, which images two anterior sites on each quadriceps muscle group in a supine position. The four-site protocol was strongly associated (R 2  = 0.72) with appendicular lean tissue mass, but Bland-Altman analysis displayed wide limits of agreement (-5.67, 5.67 kg). Incorporating the anterior upper arm muscle thickness, and covariates age and sex, alongside the four-site protocol, improved the association (R 2  = 0.91) with appendicular lean tissue and displayed narrower limits of agreement (-3.18, 3.18 kg). The optimized protocol demonstrated a strong ability to identify low lean tissue mass (area under the curve = 0.89). The four-site protocol can be improved with the addition of the anterior upper arm muscle thickness, sex, and age when predicting appendicular lean tissue mass

  8. Field validation of protocols developed to evaluate in-line mastitis detection systems.

    Science.gov (United States)

    Kamphuis, C; Dela Rue, B T; Eastwood, C R

    2016-02-01

    This paper reports on a field validation of previously developed protocols for evaluating the performance of in-line mastitis-detection systems. The protocols outlined 2 requirements of these systems: (1) to detect cows with clinical mastitis (CM) promptly and accurately to enable timely and appropriate treatment and (2) to identify cows with high somatic cell count (SCC) to manage bulk milk SCC levels. Gold standard measures, evaluation tests, performance measures, and performance targets were proposed. The current study validated the protocols on commercial dairy farms with automated in-line mastitis-detection systems using both electrical conductivity (EC) and SCC sensor systems that both monitor at whole-udder level. The protocol for requirement 1 was applied on 3 commercial farms. For requirement 2, the protocol was applied on 6 farms; 3 of them had low bulk milk SCC (128×10(3) cells/mL) and were the same farms as used for field evaluation of requirement 1. Three farms with high bulk milk SCC (270×10(3) cells/mL) were additionally enrolled. The field evaluation methodology and results were presented at a workshop including representation from 7 international suppliers of in-line mastitis-detection systems. Feedback was sought on the acceptance of standardized performance evaluation protocols and recommended refinements to the protocols. Although the methodology for requirement 1 was relatively labor intensive and required organizational skills over an extended period, no major issues were encountered during the field validation of both protocols. The validation, thus, proved the protocols to be practical. Also, no changes to the data collection process were recommended by the technology supplier representatives. However, 4 recommendations were made to refine the protocols: inclusion of an additional analysis that ignores small (low-density) clot observations in the definition of CM, extension of the time window from 4 to 5 milkings for timely alerts for CM

  9. Newborn hearing screening protocol in tuscany region.

    Science.gov (United States)

    Berrettini, Stefano; Ghirri, Paolo; Lazzerini, Francesco; Lenzi, Giovanni; Forli, Francesca

    2017-09-20

    Newborn hearing screening has to be considered the first step of a program for the identification, diagnosis, treatment and habilitation/rehabilitation of children with hearing impairment. In Tuscany Region of Italy, the universal newborn hearing screening is mandatory since november 2007. The first guidelines for the execution of the screening have been released in June 2008; then many other Italian regions partially or totally adopted these guidelines. On the basis of the experience from 2008 and according to the recent evidences in the scientific literature, a new screening protocol was released in Tuscany region. The new protocol is an evolution of the previous one. Some issues reported in the previous protocol and in the Joint Committee on Infant Hearing statement published in 2007 were revised, such as the risk factors for auditory neuropathy and for late onset, progressive or acquired hearing loss. The new updated guidelines were submitted to the Sanitary Regional Council and then they have been approved in August 2016. The updated screening protocol is mainly aimed to identify newborns with a congenital moderate-to-profound hearing loss, but it also provides indications for the audiological follow-up of children with risk's factor for progressive or late onset hearing loss; further it provides indications for the audiological surveillance of children at risk for acquired hearing impairment. Then, in the new guidelines the role of the family paediatrician in the newborn hearing screening and audiological follow-up and surveillance is underscored. Finally the new guidelines provide indications for the treatment with hearing aids and cochlear implant, in accordance with the recent Italian Health Technology Assessment (HTA) guidelines. In the paper we report the modality of execution of the universal newborn hearing screening in the Tuscany Region, according to the recently updated protocol. The main features of the protocol and the critical issues are

  10. Photoactive devices including porphyrinoids with coordinating additives

    Science.gov (United States)

    Forrest, Stephen R; Zimmerman, Jeramy; Yu, Eric K; Thompson, Mark E; Trinh, Cong; Whited, Matthew; Diev, Vlacheslav

    2015-05-12

    Coordinating additives are included in porphyrinoid-based materials to promote intermolecular organization and improve one or more photoelectric characteristics of the materials. The coordinating additives are selected from fullerene compounds and organic compounds having free electron pairs. Combinations of different coordinating additives can be used to tailor the characteristic properties of such porphyrinoid-based materials, including porphyrin oligomers. Bidentate ligands are one type of coordinating additive that can form coordination bonds with a central metal ion of two different porphyrinoid compounds to promote porphyrinoid alignment and/or pi-stacking. The coordinating additives can shift the absorption spectrum of a photoactive material toward higher wavelengths, increase the external quantum efficiency of the material, or both.

  11. Electric power monthly, September 1990. [Glossary included

    Energy Technology Data Exchange (ETDEWEB)

    1990-12-17

    The purpose of this report is to provide energy decision makers with accurate and timely information that may be used in forming various perspectives on electric issues. The power plants considered include coal, petroleum, natural gas, hydroelectric, and nuclear power plants. Data are presented for power generation, fuel consumption, fuel receipts and cost, sales of electricity, and unusual occurrences at power plants. Data are compared at the national, Census division, and state levels. 4 figs., 52 tabs. (CK)

  12. Nuclear reactor shield including magnesium oxide

    International Nuclear Information System (INIS)

    Rouse, C.A.; Simnad, M.T.

    1981-01-01

    An improvement is described for nuclear reactor shielding of a type used in reactor applications involving significant amounts of fast neutron flux. The reactor shielding includes means providing structural support, neutron moderator material, neutron absorber material and other components, wherein at least a portion of the neutron moderator material is magnesium in the form of magnesium oxide either alone or in combination with other moderator materials such as graphite and iron

  13. Model for safety reports including descriptive examples

    International Nuclear Information System (INIS)

    1995-12-01

    Several safety reports will be produced in the process of planning and constructing the system for disposal of high-level radioactive waste in Sweden. The present report gives a model, with detailed examples, of how these reports should be organized and what steps they should include. In the near future safety reports will deal with the encapsulation plant and the repository. Later reports will treat operation of the handling systems and the repository

  14. Jet-calculus approach including coherence effects

    International Nuclear Information System (INIS)

    Jones, L.M.; Migneron, R.; Narayanan, K.S.S.

    1987-01-01

    We show how integrodifferential equations typical of jet calculus can be combined with an averaging procedure to obtain jet-calculus-based results including the Mueller interference graphs. Results in longitudinal-momentum fraction x for physical quantities are higher at intermediate x and lower at large x than with the conventional ''incoherent'' jet calculus. These results resemble those of Marchesini and Webber, who used a Monte Carlo approach based on the same dynamics

  15. Turf Conversion Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)

    2017-12-05

    This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings as a result of water conservation measures (WCMs) in energy performance contracts associated with converting turfgrass or other water-intensive plantings to water-wise and sustainable landscapes. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.

  16. Outdoor Irrigation Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)

    2017-12-05

    This measurement and verification (M&V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with outdoor irrigation efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M&V plan, and details the procedures to use to determine water savings.

  17. Vicissitudes of Nagoya Protocol in Colombia

    International Nuclear Information System (INIS)

    Rojas Blanco, Diana Lorena

    2013-01-01

    The fair and equitable sharing of benefits arising from the utilization of genetic resources is not only one of the central objectives of the Nagoya Protocol, but also a challenge for communities of scientists, researchers, and indigenous ancestral generally for the educational community. It is therefore essential to know what the real and material implications for the population, the ratification of the Nagoya Protocol, which despite having sufficient justification and argued, highlights the need to develop legal tools, economic, technological and education for proper and fair implementation.

  18. Evolution of a C2 protocol gateway

    CSIR Research Space (South Africa)

    Duvenhage, A

    2008-06-01

    Full Text Available real-time or slower than real-time, depending on the type of link and the data source: The gateway normally reads logged raw protocol data much faster than real-time; a simulation could also start running slower than real-time if it requires too... inherent support for logging and playback of the raw protocol data. From a software architecture perspective, each link has a corresponding link component that is responsible for opening and closing the connection, as well as reading and writing...

  19. Sessions and Separability in Security Protocols

    DEFF Research Database (Denmark)

    Carbone, Marco; Guttman, Joshua

    2013-01-01

    Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any uncomprom......Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any...

  20. A Cyber Security Risk Assessment of Hospital Infrastructure including TLS/SSL and other Threats

    OpenAIRE

    Millar, Stuart

    2016-01-01

    Cyber threats traditionally target governments, financial institutions and businesses. However, of growing concern is the threat to healthcare organizations. This study conducts a cyber security risk assessment of a theoretical hospital environment, to include TLS/SSL, which is an encryption protocol for network communications, plus other physical, logical and human threats. Despite significant budgets in the UK for the NHS, the spend on cyber security appears worryingly low and many hospital...

  1. Addendum to the Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Engebrecht-Metzger, C.; Wilson, E.; Horowitz, S.

    2012-12-01

    As Building America (BA) has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocols (HSP) provides guidance to program partners and managers so that energy savings for new construction and retrofit projects can be compared alongside each other. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  2. Addendum to the Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Engebrecht, C. Metzger [National Renewable Energy Lab. (NREL), Golden, CO (United States); Wilson, E. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Horowitz, S. [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2012-12-01

    As DOE's Building America program has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program’s goals. The House Simulation Protocols (HSP) provide guidance to program partners and managers so that energy savings for new construction and retrofit projects can be compared alongside each other. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  3. Options for the second commitment period of the Kyoto Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Hoehne, Niklas; Phylipsen, Dian; Ullrich, Simone; Blok, Kornelis

    2005-02-15

    This study assesses available options for the second commitment period of the Kyoto Protocol. The study includes the following sections: An introduction, an overview of proposals and establishing a network, analysis of interests of countries, selected country case studies, an overview of the issues to be considered, options for adaptation to climate change, a new approach ''Common but Differentiated Convergence'', an update of the Triptych approach, a comprehensive compromise proposal, the comparison of emission allowances under various approaches and a negotiation strategy for the EU and Germany. (orig.)

  4. Options for the second commitment period of the Kyoto Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Hoehne, Niklas; Phylipsen, Dian; Ullrich, Simone; Blok, Kornelis

    2005-02-15

    This study assesses available options for the second commitment period of the Kyoto Protocol. The study includes the following sections: An introduction, an overview of proposals and establishing a network, analysis of interests of countries, selected country case studies, an overview of the issues to be considered, options for adaptation to climate change, a new approach ''Common but Differentiated Convergence'', an update of the Triptych approach, a comprehensive compromise proposal, the comparison of emission allowances under various approaches and a negotiation strategy for the EU and Germany. (orig.)

  5. [Renal patient's diet: Can fish be included?].

    Science.gov (United States)

    Castro González, M I; Maafs Rodríguez, A G; Galindo Gómez, C

    2012-01-01

    Medical and nutritional treatment for renal disease, now a major public health issue, is highly complicated. Nutritional therapy must seek to retard renal dysfunction, maintain an optimal nutritional status and prevent the development of underlying pathologies. To analyze ten fish species to identify those that, because of their low phosphorus content, high biological value protein and elevated n-3 fatty acids EPA and DHA, could be included in renal patient's diet. The following fish species (Litte tunny, Red drum, Spotted eagleray, Escolar, Swordfish, Big-scale pomfret, Cortez flounder, Largemouth blackbass, Periche mojarra, Florida Pompano) were analyzed according to the AOAC and Keller techniques to determine their protein, phosphorus, sodium, potassium, cholesterol, vitamins D(3) and E, and n-3 EPA+DHA content. These results were used to calculate relations between nutrients. The protein in the analyzed species ranged from 16.5 g/100 g of fillet (Largemouth black bass) to 27.2 g/100 g (Red drum); the lowest phosphorus value was 28.6 mg/100 g (Periche mojarra) and the highest 216.3 mg/100 g (Spotted eagle ray). 80% of the fish presented > 100 mg EPA + DHA in 100 g of fillet. By its Phosphorus/gProtein ratio, Escolar and Swordfish could not be included in the renal diet; Little tunny, Escolar, Big-scale pomfret, Largemouth black-bass, Periche mojarra and Florida Pompano presented a lower Phosphorus/EPA + DHA ratio. Florida pompano is the most recommended specie for renal patients, due to its optimal nutrient relations. However, all analyzed species, except Escolar and Swordfish, could be included in renal diets.

  6. MOS modeling hierarchy including radiation effects

    International Nuclear Information System (INIS)

    Alexander, D.R.; Turfler, R.M.

    1975-01-01

    A hierarchy of modeling procedures has been developed for MOS transistors, circuit blocks, and integrated circuits which include the effects of total dose radiation and photocurrent response. The models were developed for use with the SCEPTRE circuit analysis program, but the techniques are suitable for other modern computer aided analysis programs. The modeling hierarchy permits the designer or analyst to select the level of modeling complexity consistent with circuit size, parametric information, and accuracy requirements. Improvements have been made in the implementation of important second order effects in the transistor MOS model, in the definition of MOS building block models, and in the development of composite terminal models for MOS integrated circuits

  7. Drug delivery device including electrolytic pump

    KAUST Repository

    Foulds, Ian G.; Buttner, Ulrich; Yi, Ying

    2016-01-01

    Systems and methods are provided for a drug delivery device and use of the device for drug delivery. In various aspects, the drug delivery device combines a “solid drug in reservoir” (SDR) system with an electrolytic pump. In various aspects an improved electrolytic pump is provided including, in particular, an improved electrolytic pump for use with a drug delivery device, for example an implantable drug delivery device. A catalytic reformer can be incorporated in a periodically pulsed electrolytic pump to provide stable pumping performance and reduced actuation cycle.

  8. Drug delivery device including electrolytic pump

    KAUST Repository

    Foulds, Ian G.

    2016-03-31

    Systems and methods are provided for a drug delivery device and use of the device for drug delivery. In various aspects, the drug delivery device combines a “solid drug in reservoir” (SDR) system with an electrolytic pump. In various aspects an improved electrolytic pump is provided including, in particular, an improved electrolytic pump for use with a drug delivery device, for example an implantable drug delivery device. A catalytic reformer can be incorporated in a periodically pulsed electrolytic pump to provide stable pumping performance and reduced actuation cycle.

  9. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  10. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  11. A Field-Based Testing Protocol for Assessing Gross Motor Skills in Preschool Children: The Children's Activity and Movement in Preschool Study Motor Skills Protocol

    Science.gov (United States)

    Williams, Harriet G.; Pfeiffer, Karin A.; Dowda, Marsha; Jeter, Chevy; Jones, Shaverra; Pate, Russell R.

    2009-01-01

    The purpose of this study was to develop a valid and reliable tool for use in assessing motor skills in preschool children in field-based settings. The development of the Children's Activity and Movement in Preschool Study Motor Skills Protocol included evidence of its reliability and validity for use in field-based environments as part of large…

  12. Energy principle with included boundary conditions

    International Nuclear Information System (INIS)

    Lehnert, B.

    1994-01-01

    Earlier comments by the author on the limitations of the classical form of the extended energy principle are supported by a complementary analysis on the potential energy change arising from free-boundary displacements of a magnetically confined plasma. In the final formulation of the extended principle, restricted displacements, satisfying pressure continuity by means of plasma volume currents in a thin boundary layer, are replaced by unrestricted (arbitrary) displacements which can give rise to induced surface currents. It is found that these currents contribute to the change in potential energy, and that their contribution is not taken into account by such a formulation. A general expression is further given for surface currents induced by arbitrary displacements. The expression is used to reformulate the energy principle for the class of displacements which satisfy all necessary boundary conditions, including that of the pressure balance. This makes a minimization procedure of the potential energy possible, for the class of all physically relevant test functions which include the constraints imposed by the boundary conditions. Such a procedure is also consistent with a corresponding variational calculus. (Author)

  13. Aerosol simulation including chemical and nuclear reactions

    International Nuclear Information System (INIS)

    Marwil, E.S.; Lemmon, E.C.

    1985-01-01

    The numerical simulation of aerosol transport, including the effects of chemical and nuclear reactions presents a challenging dynamic accounting problem. Particles of different sizes agglomerate and settle out due to various mechanisms, such as diffusion, diffusiophoresis, thermophoresis, gravitational settling, turbulent acceleration, and centrifugal acceleration. Particles also change size, due to the condensation and evaporation of materials on the particle. Heterogeneous chemical reactions occur at the interface between a particle and the suspending medium, or a surface and the gas in the aerosol. Homogeneous chemical reactions occur within the aersol suspending medium, within a particle, and on a surface. These reactions may include a phase change. Nuclear reactions occur in all locations. These spontaneous transmutations from one element form to another occur at greatly varying rates and may result in phase or chemical changes which complicate the accounting process. This paper presents an approach for inclusion of these effects on the transport of aerosols. The accounting system is very complex and results in a large set of stiff ordinary differential equations (ODEs). The techniques for numerical solution of these ODEs require special attention to achieve their solution in an efficient and affordable manner. 4 refs

  14. Addressing Stillbirth in India Must Include Men.

    Science.gov (United States)

    Roberts, Lisa; Montgomery, Susanne; Ganesh, Gayatri; Kaur, Harinder Pal; Singh, Ratan

    2017-07-01

    Millennium Development Goal 4, to reduce child mortality, can only be achieved by reducing stillbirths globally. A confluence of medical and sociocultural factors contribute to the high stillbirth rates in India. The psychosocial aftermath of stillbirth is a well-documented public health problem, though less is known of the experience for men, particularly outside of the Western context. Therefore, men's perceptions and knowledge regarding reproductive health, as well as maternal-child health are important. Key informant interviews (n = 5) were analyzed and 28 structured interviews were conducted using a survey based on qualitative themes. Qualitative themes included men's dual burden and right to medical and reproductive decision making power. Wives were discouraged from expressing grief and pushed to conceive again. If not successful, particularly if a son was not conceived, a second wife was considered a solution. Quantitative data revealed that men with a history of stillbirths had greater anxiety and depression, perceived less social support, but had more egalitarian views towards women than men without stillbirth experience. At the same time fathers of stillbirths were more likely to be emotionally or physically abusive. Predictors of mental health, attitudes towards women, and perceived support are discussed. Patriarchal societal values, son preference, deficient women's autonomy, and sex-selective abortion perpetuate the risk for future poor infant outcomes, including stillbirth, and compounds the already higher risk of stillbirth for males. Grief interventions should explore and take into account men's perceptions, attitudes, and behaviors towards reproductive decision making.

  15. What parental characteristics can predict child maltreatment at the Emergency Department? Considering expansion of the Hague Protocol

    NARCIS (Netherlands)

    Diderich, H.M.; Dechesne, M.; Fekkes, M.; Verkerk, P.H.; Buitendijk, S.E.; Oudesluys-Murphy, A.M.

    2015-01-01

    The Hague Protocol considers three parental characteristics of Emergency Department adult patients to identify child abuse: (a) domestic violence, (b) intoxication, and (c) suicide attempt or auto mutilation. This study investigated whether additional parental characteristics could be included to

  16. Stage migration after minor changes in histologic estimation of tumor burden in sentinel lymph nodes: the protocol trap

    DEFF Research Database (Denmark)

    Riber-Hansen, Rikke; Nyengaard, Jens R; Hamilton-Dutoit, Stephen J

    2009-01-01

    protocol trap"). This systematical bias makes it difficult to base treatment decisions on semiquantitative metastasis size estimates. Although based on metastatic melanoma, the principles described herein will apply when measuring nodal tumor burden in other metastasizing cancers, including breast...

  17. MSCT renal stone protocol; dose penalty and influence on management decision of patients: Is it really worth the radiation dose?

    Directory of Open Access Journals (Sweden)

    Ahmed Hamimi

    2016-03-01

    Conclusions: Considering time is of the essence; MSCT renal stone protocol using low dose technique is crucial in the management of renal stone in acute setting including the diagnosis and management decision.

  18. A statistical frame based TDMA protocol for human body communication.

    Science.gov (United States)

    Nie, Zedong; Li, Zhao; Huang, Renwei; Liu, Yuhang; Li, Jingzhen; Wang, Lei

    2015-07-09

    Human body communication (HBC) using the human body as the transmission medium, which has been regarded as one of the most promising short-range communications in wireless body area networks (WBAN). Compared to the traditional wireless networks, two challenges are existed in HBC based WBAN. (1) Its sensor nodes should be energy saving since it is inconvenient to replace or recharge the battery on these sensor nodes; (2) the coordinator should be able to react dynamically and rapidly to the burst traffic triggered by sensing events. Those burst traffic conditions include vital physical signal (electrocardiogram, electroencephalogram etc.) monitoring, human motion detection (fall detection, activity monitoring, gesture recognition, motion sensing etc.) and so on. To cope with aforementioned challenges, a statistical frame based TDMA (S-TDMA) protocol with multi-constrained (energy, delay, transmission efficiency and emergency management) service is proposed in this paper. The scenarios where burst traffic is often triggered rapidly with low power consumption and low delay is handled in our proposed S-TDMA. A beacon frame with the contained synchronous and poll information is designed to reduce the possibility of collisions of request frames. A statistical frame which broadcasts the unified scheduling information is adopted to avoid packet collisions, idle listening and overhearing. Dynamic time slot allocation mechanism is presented to manage the burst traffic and reduce the active period in each beacon period. An emergency mechanism is proposed for vital signals to be transmitted. The theory analysis is proceed and the result is evaluated in the hardware platform. To verify its feasibility, S-TDMA was fully implemented on our independently-developed HBC platform where four sensor nodes and a coordinator are fastened on a human body. Experiment results show that S-TDMA costs 89.397 mJ every 20 s when the payload size is 122 bytes, 9.51% lower than Lightweight MAC

  19. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  20. Including gauge corrections to thermal leptogenesis

    Energy Technology Data Exchange (ETDEWEB)

    Huetig, Janine

    2013-05-17

    This thesis provides the first approach of a systematic inclusion of gauge corrections to leading order to the ansatz of thermal leptogenesis. We have derived a complete expression for the integrated lepton number matrix including all resummations needed. For this purpose, a new class of diagram has been invented, namely the cylindrical diagram, which allows diverse investigations into the topic of leptogenesis such as the case of resonant leptogenesis. After a brief introduction of the topic of the baryon asymmetry in the universe and a discussion of its most promising solutions as well as their advantages and disadvantages, we have presented our framework of thermal leptogenesis. An effective model was described as well as the associated Feynman rules. The basis for using nonequilibrium quantum field theory has been built in chapter 3. At first, the main definitions have been presented for equilibrium thermal field theory, afterwards we have discussed the Kadanoff-Baym equations for systems out of equilibrium using the example of the Majorana neutrino. The equations have also been solved in the context of leptogenesis in chapter 4. Since gauge corrections play a crucial role throughout this thesis, we have also repeated the naive ansatz by replacing the free equilibrium propagator by propagators including thermal damping rates due to the Standard Model damping widths for lepton and Higgs fields. It is shown that this leads to a comparable result to the solutions of the Boltzmann equations for thermal leptogenesis. Thus it becomes obvious that Standard Model corrections are not negligible for thermal leptogenesis and therefore need to be included systematically from first principles. In order to achieve this we have started discussing the calculation of ladder rung diagrams for Majorana neutrinos using the HTL and the CTL approach in chapter 5. All gauge corrections are included in this framework and thus it has become the basis for the following considerations