WorldWideScience

Sample records for protocol showed significant

  1. Carboplatin Hypersensitivity Reactions in Pediatric Low Grade Glioma Are Protocol Specific and Desensitization Shows Poor Efficacy.

    Science.gov (United States)

    Dodgshun, Andrew J; Hansford, Jordan R; Cole, Theresa; Choo, Sharon; Sullivan, Michael J

    2016-01-01

    The use of carboplatin for the treatment of pediatric low grade gliomas (PLGG) is often limited by the development of carboplatin hypersensitivity. Reported rates of carboplatin hypersensitivity reactions vary between 6% and 32% in these patients. Here we report the frequency of carboplatin hypersensitivity reactions depending on the treatment regimen used, and outcomes of carboplatin desensitization. The records of all patients in a single institution who were treated with carboplatin for PLGG were accessed and all patients receiving more than one dose of carboplatin are reported. Thirty four patients with PLGG were treated with carboplatin according to one of the two different regimens. Carboplatin hypersensitivity was documented in 47% of patients, but the frequency differed by treatment protocol. Those patients treated with 4-weekly single agent carboplatin had carboplatin allergy in 8% of cases whereas 68% of those treated with combined carboplatin and vincristine (every three weeks, according to the SIOP 2004 low grade glioma protocol) had carboplatin reactions (OR 23.6, P Desensitization was only successful in two out of 10 patients in whom it was attempted. Hypersensitivity reactions to carboplatin are more common in this cohort than previously reported and rates are protocol-dependent. Desensitization showed limited effectiveness in this cohort. © 2015 Wiley Periodicals, Inc.

  2. Human-directed social behaviour in dogs shows significant heritability.

    Science.gov (United States)

    Persson, M E; Roth, L S V; Johnsson, M; Wright, D; Jensen, P

    2015-04-01

    Through domestication and co-evolution with humans, dogs have developed abilities to attract human attention, e.g. in a manner of seeking assistance when faced with a problem solving task. The aims of this study were to investigate within breed variation in human-directed contact seeking in dogs and to estimate its genetic basis. To do this, 498 research beagles, bred and kept under standardized conditions, were tested in an unsolvable problem task. Contact seeking behaviours recorded included both eye contact and physical interactions. Behavioural data was summarized through a principal component analysis, resulting in four components: test interactions, social interactions, eye contact and physical contact. Females scored significantly higher on social interactions and physical contact and age had an effect on eye contact scores. Narrow sense heritabilities (h(2) ) of the two largest components were estimated at 0.32 and 0.23 but were not significant for the last two components. These results show that within the studied dog population, behavioural variation in human-directed social behaviours was sex dependent and that the utilization of eye contact seeking increased with age and experience. Hence, heritability estimates indicate a significant genetic contribution to the variation found in human-directed social interactions, suggesting that social skills in dogs have a genetic basis, but can also be shaped and enhanced through individual experiences. This research gives the opportunity to further investigate the genetics behind dogs' social skills, which could also play a significant part into research on human social disorders such as autism. © 2015 John Wiley & Sons Ltd and International Behavioural and Neural Genetics Society.

  3. A minimal cost micropropagation protocol for Dianthus caryophyllus L.-- a commercially significant venture.

    Science.gov (United States)

    Pant, Manu

    2016-03-01

    In tissue culture, high production cost of the products restricts their reach. Though tissue culture is a major strength in floriculture it is marred by pricing issues. Hence, we developed a complete regeneration low cost micropropagation protocol for an economically important floriculture crop, carnation (Dianthus caryophyllus L.). Successful regeneration of carnation from nodal explants on cost-efficient medium indicates that psyllium husk, sugar and RO water can effectively replace the conventional medium comprising agar, sucrose and distilled water. The protocol can contribute to increased carnation production at comparatively reduced cost, and there by encourage wide scale adoption by the common growers.

  4. Examining recombinant human TSH primed 131I therapy protocol in patients with metastatic differentiated thyroid carcinoma: comparison with the traditional thyroid hormone withdrawal protocol

    International Nuclear Information System (INIS)

    Rani, Deepa; Kaisar, Sushma; Awasare, Sushma; Kamaldeep; Abhyankar, Amit; Basu, Sandip

    2014-01-01

    difference was not found to be statistically significant (p = 0.301). The mean tumor radiation absorbed dose per mCi was less during the rhTSH protocol (6.04 rad/mCi) than during the thyroid hormone withdrawal protocol (8.68 rad/mCi), and the difference was statistically significant (p = 0.049), though visual analysis of the rhTSH posttherapy scans showed avid concentration of 131 I in the metastatic sites and revealed more lesions in 30 % of the patients compared to the traditional large dose scan and equal number of lesions in 65 % of the patients. Visual analysis of the traditional large dose scan, rhTSH pretreatment scan, and rhTSH posttherapy scans showed that the traditional large dose scan is better compared to the rhTSH 1 mCi scan as it showed more lesions in 19 of 37 patients (51.35 %). rhTSH posttherapy scans were better compared to the traditional large dose scans and rhTSH pretreatment scans. More lesions were seen on rhTSH posttherapy scans in 11 of 37 patients (29.7 %) compared to the traditional large dose scans and in 24 of 37 (64.86 %) patients compared to the rhTSH 1 mCi scans. Our findings demonstrate that the rhTSH primed pretreatment scan undertaken at 24 h after diagnostic dose is suboptimal to evaluate whether a metastatic lesion concentrates 131 I. The majority of these lesions demonstrated radioiodine accumulation in the posttreatment scan. Quality of life as assessed using EORTC QOL-3 forms clearly showed that rhTSH improved the quality of life of patients compared to the thyroid hormone withdrawal protocol. Functional scale and global health status were significantly better in the rhTSH protocol compared to the thyroid hormone withdrawal protocol (p 131 I therapy with the rhTSH protocol was shorter (2 days, range 2-8 days) compared to the thyroid hormone withdrawal protocol (3 days, range 1-8 days) and the difference was found to be statistically significant (p = 0.007). The mean serum creatinine level was significantly lower in the rhTSH protocol

  5. Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    Woo-Yong Choi

    2009-01-01

    Full Text Available We propose the efficient reliable multicast MAC protocol based on the connectivity information among the recipients. Enhancing the BMMM (Batch Mode Multicast MAC protocol, the reliable multicast MAC protocol significantly reduces the RAK (Request for ACK frame transmissions in a reasonable computational time and enhances the MAC performance. By the analytical performance analysis, the throughputs of the BMMM protocol and our proposed MAC protocol are derived. Numerical examples show that our proposed MAC protocol increases the reliable multicast MAC performance for IEEE 802.11 wireless LANs.

  6. Examining recombinant human TSH primed {sup 131}I therapy protocol in patients with metastatic differentiated thyroid carcinoma: comparison with the traditional thyroid hormone withdrawal protocol

    Energy Technology Data Exchange (ETDEWEB)

    Rani, Deepa; Kaisar, Sushma; Awasare, Sushma; Kamaldeep; Abhyankar, Amit; Basu, Sandip [Bhabha Atomic Research Centre (BARC), Radiation Medicine Centre, Mumbai (India)

    2014-09-15

    the difference was not found to be statistically significant (p = 0.301). The mean tumor radiation absorbed dose per mCi was less during the rhTSH protocol (6.04 rad/mCi) than during the thyroid hormone withdrawal protocol (8.68 rad/mCi), and the difference was statistically significant (p = 0.049), though visual analysis of the rhTSH posttherapy scans showed avid concentration of {sup 131}I in the metastatic sites and revealed more lesions in 30 % of the patients compared to the traditional large dose scan and equal number of lesions in 65 % of the patients. Visual analysis of the traditional large dose scan, rhTSH pretreatment scan, and rhTSH posttherapy scans showed that the traditional large dose scan is better compared to the rhTSH 1 mCi scan as it showed more lesions in 19 of 37 patients (51.35 %). rhTSH posttherapy scans were better compared to the traditional large dose scans and rhTSH pretreatment scans. More lesions were seen on rhTSH posttherapy scans in 11 of 37 patients (29.7 %) compared to the traditional large dose scans and in 24 of 37 (64.86 %) patients compared to the rhTSH 1 mCi scans. Our findings demonstrate that the rhTSH primed pretreatment scan undertaken at 24 h after diagnostic dose is suboptimal to evaluate whether a metastatic lesion concentrates {sup 131}I. The majority of these lesions demonstrated radioiodine accumulation in the posttreatment scan. Quality of life as assessed using EORTC QOL-3 forms clearly showed that rhTSH improved the quality of life of patients compared to the thyroid hormone withdrawal protocol. Functional scale and global health status were significantly better in the rhTSH protocol compared to the thyroid hormone withdrawal protocol (p < 0.001). The mean symptom scale score was significantly higher in the thyroid hormone withdrawal protocol (45.25) compared to the rhTSH protocol (13.59) (p < 0.001). Of the 20 patients, 4 (20 %) had more than 25 % increase in the TG value on follow-up. The median hospital stay of

  7. Latency correction of event-related potentials between different experimental protocols

    Science.gov (United States)

    Iturrate, I.; Chavarriaga, R.; Montesano, L.; Minguez, J.; Millán, JdR

    2014-06-01

    Objective. A fundamental issue in EEG event-related potentials (ERPs) studies is the amount of data required to have an accurate ERP model. This also impacts the time required to train a classifier for a brain-computer interface (BCI). This issue is mainly due to the poor signal-to-noise ratio and the large fluctuations of the EEG caused by several sources of variability. One of these sources is directly related to the experimental protocol or application designed, and may affect the amplitude or latency of ERPs. This usually prevents BCI classifiers from generalizing among different experimental protocols. In this paper, we analyze the effect of the amplitude and the latency variations among different experimental protocols based on the same type of ERP. Approach. We present a method to analyze and compensate for the latency variations in BCI applications. The algorithm has been tested on two widely used ERPs (P300 and observation error potentials), in three experimental protocols in each case. We report the ERP analysis and single-trial classification. Main results. The results obtained show that the designed experimental protocols significantly affect the latency of the recorded potentials but not the amplitudes. Significance. These results show how the use of latency-corrected data can be used to generalize the BCIs, reducing the calibration time when facing a new experimental protocol.

  8. The Importance of the Montreal Protocol in Protecting the Earth's Hydroclimate

    Science.gov (United States)

    Seager, R.; Wu, Y.; Polvani, L. M.

    2012-12-01

    The 1987 Montreal Protocol regulating emissions of ozone depleting chlorofluorocarbons (CFCs) was motivated primarily by the harm to human health and ecosystems arising from increased exposure to ultraviolet-B (UV-B) radiation associated with depletion from the ozone layer. It is now known that the Montreal Protocol has reduced global warming since CFCs are greenhouse gases (GHGs). In this paper we show that the Montreal Protocol also significantly protects the Earth's hydroclimate, even though this was also not a motivating factor in the decision-making that led to the Protocol. General Circulation Model (GCM) results show that in the coming decade (2020-29), under the 'World Avoided' scenario of no regulations on CFC emissions, the subtropical dry zones would in general get drier, and the middle and high latitude regions wetter. This change is similar, in both pattern and magnitude, to that in the coming decade caused by projected increases in carbon dioxide concentrations. This implies that because of the Montreal Protocol, and the ozone depletion and global warming associated with CFCs thus avoided, the hydrological cycle changes in the coming decade will be significantly less than what they otherwise would have been.

  9. An Energy-Efficient Link Layer Protocol for Reliable Transmission over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Iqbal Adnan

    2009-01-01

    Full Text Available In multihop wireless networks, hop-by-hop reliability is generally achieved through positive acknowledgments at the MAC layer. However, positive acknowledgments introduce significant energy inefficiencies on battery-constrained devices. This inefficiency becomes particularly significant on high error rate channels. We propose to reduce the energy consumption during retransmissions using a novel protocol that localizes bit-errors at the MAC layer. The proposed protocol, referred to as Selective Retransmission using Virtual Fragmentation (SRVF, requires simple modifications to the positive-ACK-based reliability mechanism but provides substantial improvements in energy efficiency. The main premise of the protocol is to localize bit-errors by performing partial checksums on disjoint parts or virtual fragments of a packet. In case of error, only the corrupted virtual fragments are retransmitted. We develop stochastic models of the Simple Positive-ACK-based reliability, the previously-proposed Packet Length Optimization (PLO protocol, and the SRVF protocol operating over an arbitrary-order Markov wireless channel. Our analytical models show that SRVF provides significant theoretical improvements in energy efficiency over existing protocols. We then use bit-error traces collected over different real networks to empirically compare the proposed and existing protocols. These experimental results further substantiate that SRVF provides considerably better energy efficiency than Simple Positive-ACK and Packet Length Optimization protocols.

  10. Implementing the Kyoto protocol : why JI and CDM show more promise than international emissions trading

    NARCIS (Netherlands)

    Woerdman, E.

    The Kyoto protocol allows developed countries to achieve cost-effective greenhouse gas emission reductions abroad by means of international emissions trading (IET), joint implementation (JI) and the clean development mechanism (CDM). The article argues that JI and CDM projects will be more

  11. Performance evaluation of spatial vector routing protocol for wireless sensor networks

    International Nuclear Information System (INIS)

    Baloch, J.; Jokhio, I.

    2012-01-01

    WSNs (Wireless Sensor Networks) is an emerging area of research. Researchers worldwide are working on the issues faced by sensor nodes. Communication has been a major issue in wireless networks and the problem is manifolds in WSN s because of the limited resources. The routing protocol in such networks plays a pivotal role, as an effective routing protocol could significantly reduce the energy consumed in transmitting and receiving data packets throughout a network. In this paper the performance of SVR (Spatial Vector Routing) an energy efficient, location aware routing protocol is compared with the existing location aware protocols. The results from the simulation trials show the performance of SVR. (author)

  12. Performance Evaluation of Spatial Vector Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Javed Ali Baloch

    2012-10-01

    Full Text Available WSNs (Wireless Sensor Networks is an emerging area of research. Researchers worldwide are working on the issues faced by sensor nodes. Communication has been a major issue in wireless networks and the problem is manifolds in WSNs because of the limited resources. The routing protocol in such networks plays a pivotal role, as an effective routing protocol could significantly reduce the energy consumed in transmitting and receiving data packets throughout a network. In this paper the performance of SVR (Spatial Vector Routing an energy efficient, location aware routing protocol is compared with the existing location aware protocols. The results from the simulation trials show the performance of SVR.

  13. A clip-based protocol for breast boost radiotherapy provides clear target visualisation and demonstrates significant volume reduction over time

    Energy Technology Data Exchange (ETDEWEB)

    Lewis, Lorraine [Department of Radiation Oncology, Northern Sydney Cancer Centre, Royal North Shore Hospital, Sydney, New South Wales (Australia); Cox, Jennifer [Department of Radiation Oncology, Northern Sydney Cancer Centre, Royal North Shore Hospital, Sydney, New South Wales (Australia); Faculty of Health Sciences, University of Sydney, Sydney, New South Wales (Australia); Morgia, Marita [Department of Radiation Oncology, Northern Sydney Cancer Centre, Royal North Shore Hospital, Sydney, New South Wales (Australia); Atyeo, John [Faculty of Health Sciences, University of Sydney, Sydney, New South Wales (Australia); Lamoury, Gillian [Department of Radiation Oncology, Northern Sydney Cancer Centre, Royal North Shore Hospital, Sydney, New South Wales (Australia)

    2015-09-15

    The clinical target volume (CTV) for early stage breast cancer is difficult to clearly identify on planning computed tomography (CT) scans. Surgical clips inserted around the tumour bed should help to identify the CTV, particularly if the seroma has been reabsorbed, and enable tracking of CTV changes over time. A surgical clip-based CTV delineation protocol was introduced. CTV visibility and its post-operative shrinkage pattern were assessed. The subjects were 27 early stage breast cancer patients receiving post-operative radiotherapy alone and 15 receiving post-operative chemotherapy followed by radiotherapy. The radiotherapy alone (RT/alone) group received a CT scan at median 25 days post-operatively (CT1rt) and another at 40 Gy, median 68 days (CT2rt). The chemotherapy/RT group (chemo/RT) received a CT scan at median 18 days post-operatively (CT1ch), a planning CT scan at median 126 days (CT2ch), and another at 40 Gy (CT3ch). There was no significant difference (P = 0.08) between the initial mean CTV for each cohort. The RT/alone cohort showed significant CTV volume reduction of 38.4% (P = 0.01) at 40 Gy. The Chemo/RT cohort had significantly reduced volumes between CT1ch: median 54 cm{sup 3} (4–118) and CT2ch: median 16 cm{sup 3}, (2–99), (P = 0.01), but no significant volume reduction thereafter. Surgical clips enable localisation of the post-surgical seroma for radiotherapy targeting. Most seroma shrinkage occurs early, enabling CT treatment planning to take place at 7 weeks, which is within the 9 weeks recommended to limit disease recurrence.

  14. A clip-based protocol for breast boost radiotherapy provides clear target visualisation and demonstrates significant volume reduction over time

    International Nuclear Information System (INIS)

    Lewis, Lorraine; Cox, Jennifer; Morgia, Marita; Atyeo, John; Lamoury, Gillian

    2015-01-01

    The clinical target volume (CTV) for early stage breast cancer is difficult to clearly identify on planning computed tomography (CT) scans. Surgical clips inserted around the tumour bed should help to identify the CTV, particularly if the seroma has been reabsorbed, and enable tracking of CTV changes over time. A surgical clip-based CTV delineation protocol was introduced. CTV visibility and its post-operative shrinkage pattern were assessed. The subjects were 27 early stage breast cancer patients receiving post-operative radiotherapy alone and 15 receiving post-operative chemotherapy followed by radiotherapy. The radiotherapy alone (RT/alone) group received a CT scan at median 25 days post-operatively (CT1rt) and another at 40 Gy, median 68 days (CT2rt). The chemotherapy/RT group (chemo/RT) received a CT scan at median 18 days post-operatively (CT1ch), a planning CT scan at median 126 days (CT2ch), and another at 40 Gy (CT3ch). There was no significant difference (P = 0.08) between the initial mean CTV for each cohort. The RT/alone cohort showed significant CTV volume reduction of 38.4% (P = 0.01) at 40 Gy. The Chemo/RT cohort had significantly reduced volumes between CT1ch: median 54 cm 3 (4–118) and CT2ch: median 16 cm 3 , (2–99), (P = 0.01), but no significant volume reduction thereafter. Surgical clips enable localisation of the post-surgical seroma for radiotherapy targeting. Most seroma shrinkage occurs early, enabling CT treatment planning to take place at 7 weeks, which is within the 9 weeks recommended to limit disease recurrence

  15. ASAP: A MAC Protocol for Dense and Time-Constrained RFID Systems

    Directory of Open Access Journals (Sweden)

    Kyounghwan Lee

    2007-08-01

    Full Text Available We introduce a novel medium access control (MAC protocol for radio frequency identification (RFID systems which exploits the statistical information collected at the reader. The protocol, termed adaptive slotted ALOHA protocol (ASAP, is motivated by the need to significantly improve the total read time performance of the currently suggested MAC protocols for RFID systems. In order to accomplish this task, ASAP estimates the dynamic tag population and adapts the frame size in the subsequent round via a simple policy that maximizes an appropriately defined efficiency function. We demonstrate that ASAP provides significant improvement in total read time performance over the current RFID MAC protocols. We next extend the design to accomplish reliable performance of ASAP in realistic scenarios such as the existence of constraints on frame size, and mobile RFID systems where tags move at constant velocity in the reader's field. We also consider the case where tags may fail to respond because of a physical breakdown or a temporary malfunction, and show the robustness in those scenarios as well.

  16. Body Composition Changes after Weight-Loss Interventions among Obese Females: A Comparison of Three Protocols

    Directory of Open Access Journals (Sweden)

    Nayera E. Hassan

    2014-12-01

    Full Text Available AIM: To evaluate body composition changes after use of three different types of obesity management protocols: dietary measures and physical activity; acupuncture or laser acupuncture with healthy diet; aiming at achieving stable weight loss among obese Egyptian females. METHODS:  A randomized longitudinal prospective study included 76 obese adult females; aged 26 up to 55 years. Anthropometric, body composition, ultrasonographic and biochemical assessments were done. RESULTS: The three types of obesity management protocols showed significant improvement in body composition (decrease in fat% and increases in FFM and TBW and visceral fat by US. However, nutritional intervention showed highly significant improvement in the skin fold thickness at triceps and biceps sites and peripheral adiposity index.  Acupuncture intervention showed highly significant improvement in fasting blood glucose (decreased and lipid profile (decreased triglycerides, total cholesterol and LDL, and increased HDL. Laser intervention showed highly significant improvement in all the skin fold thickness and some parameters of lipid profile (decreased total cholesterol and LDL. CONCLUSIONS: The three obesity management protocols have significant effect on body composition, but acupuncture has the best effect in improving the lipid profile and fasting blood sugar. In addition, Laser intervention was recommended to improve skin fold thickness and subcutaneous fat.

  17. Evaluation of an app-based stress protocol

    Directory of Open Access Journals (Sweden)

    Noeh Claudius

    2016-09-01

    Full Text Available Stress is a major influence on the quality of life in our fast-moving society. This paper describes a standardized and contemporary protocol that is capable of inducing moderate psychological stress in a laboratory setting. Furthermore, it evaluates its effects on physiological biomarkers. The protocol called “THM-Stresstest” mainly consists of a rest period (30 min, an app-based stress test under the surveillance of an audience (4 min and a regeneration period (32 min. We investigated 12 subjects to evaluate the developed protocol. We could show significant changes in heart rate variability, electromyography, electro dermal activity and salivary cortisol and α-amylase. From this data we conclude that the THM-Stresstest can serve as a psychobiological tool for provoking responses in the cardiovascular-, the endocrine and exocrine system as well as the sympathetic part of the central nervous system.

  18. A Mac Protocol Implementation for Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Jamila Bhar

    2015-01-01

    Full Text Available IEEE 802.15.4 is an important standard for Low Rate Wireless Personal Area Network (LRWPAN. The IEEE 802.15.4 presents a flexible MAC protocol that provides good efficiency for data transmission by adapting its parameters according to characteristics of different applications. In this research work, some restrictions of this standard are explained and an improvement of traffic efficiency by optimizing MAC layer is proposed. Implementation details for several blocks of communication system are carefully modeled. The protocol implementation is done using VHDL language. The analysis gives a full understanding of the behavior of the MAC protocol with regard to backoff delay, data loss probability, congestion probability, slot effectiveness, and traffic distribution for terminals. Two ideas are proposed and tested to improve efficiency of CSMA/CA mechanism for IEEE 802.15.4 MAC Layer. Primarily, we dynamically adjust the backoff exponent (BE according to queue level of each node. Secondly, we vary the number of consecutive clear channel assessment (CCA for packet transmission. We demonstrate also that slot compensation provided by the enhanced MAC protocol can greatly avoid unused slots. The results show the significant improvements expected by our approach among the IEEE 802.15.4 MAC standards. Synthesis results show also hardware performances of our proposed architecture.

  19. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  20. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  1. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  2. Deployment Strategies and Clustering Protocols Efficiency

    Directory of Open Access Journals (Sweden)

    Chérif Diallo

    2017-06-01

    Full Text Available Wireless sensor networks face significant design challenges due to limited computing and storage capacities and, most importantly, dependence on limited battery power. Energy is a critical resource and is often an important issue to the deployment of sensor applications that claim to be omnipresent in the world of future. Thus optimizing the deployment of sensors becomes a major constraint in the design and implementation of a WSN in order to ensure better network operations. In wireless networking, clustering techniques add scalability, reduce the computation complexity of routing protocols, allow data aggregation and then enhance the network performance. The well-known MaxMin clustering algorithm was previously generalized, corrected and validated. Then, in a previous work we have improved MaxMin by proposing a Single- node Cluster Reduction (SNCR mechanism which eliminates single-node clusters and then improve energy efficiency. In this paper, we show that MaxMin, because of its original pathological case, does not support the grid deployment topology, which is frequently used in WSN architectures. The unreliability feature of the wireless links could have negative impacts on Link Quality Indicator (LQI based clustering protocols. So, in the second part of this paper we show how our distributed Link Quality based d- Clustering Protocol (LQI-DCP has good performance in both stable and high unreliable link environments. Finally, performance evaluation results also show that LQI-DCP fully supports the grid deployment topology and is more energy efficient than MaxMin.

  3. Deterministic secure communication protocol without using entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

  4. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  5. A Cryptographic Moving-Knife Cake-Cutting Protocol

    Directory of Open Access Journals (Sweden)

    Yoshifumi Manabe

    2012-02-01

    Full Text Available This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum.

  6. Group covariant protocols for quantum string commitment

    International Nuclear Information System (INIS)

    Tsurumaru, Toyohiro

    2006-01-01

    We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next using this result, we prove that for every irreducible representation of a finite group, there always exists a corresponding nontrivial QSC protocol which reaches a level of security impossible to achieve classically

  7. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  8. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Aquino de Muro, Marilena; Rapley, Ralph

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  9. An Accurate Link Correlation Estimator for Improving Wireless Protocol Performance

    Science.gov (United States)

    Zhao, Zhiwei; Xu, Xianghua; Dong, Wei; Bu, Jiajun

    2015-01-01

    Wireless link correlation has shown significant impact on the performance of various sensor network protocols. Many works have been devoted to exploiting link correlation for protocol improvements. However, the effectiveness of these designs heavily relies on the accuracy of link correlation measurement. In this paper, we investigate state-of-the-art link correlation measurement and analyze the limitations of existing works. We then propose a novel lightweight and accurate link correlation estimation (LACE) approach based on the reasoning of link correlation formation. LACE combines both long-term and short-term link behaviors for link correlation estimation. We implement LACE as a stand-alone interface in TinyOS and incorporate it into both routing and flooding protocols. Simulation and testbed results show that LACE: (1) achieves more accurate and lightweight link correlation measurements than the state-of-the-art work; and (2) greatly improves the performance of protocols exploiting link correlation. PMID:25686314

  10. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  11. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  12. Improving Anomaly Detection for Text-Based Protocols by Exploiting Message Structures

    Directory of Open Access Journals (Sweden)

    Christian M. Mueller

    2010-12-01

    Full Text Available Service platforms using text-based protocols need to be protected against attacks. Machine-learning algorithms with pattern matching can be used to detect even previously unknown attacks. In this paper, we present an extension to known Support Vector Machine (SVM based anomaly detection algorithms for the Session Initiation Protocol (SIP. Our contribution is to extend the amount of different features used for classification (feature space by exploiting the structure of SIP messages, which reduces the false positive rate. Additionally, we show how combining our approach with attribute reduction significantly improves throughput.

  13. Relationships of clinical protocols and reconstruction kernels with image quality and radiation dose in a 128-slice CT scanner: Study with an anthropomorphic and water phantom

    International Nuclear Information System (INIS)

    Paul, Jijo; Krauss, B.; Banckwitz, R.; Maentele, W.; Bauer, R.W.; Vogl, T.J.

    2012-01-01

    Research highlights: ► Clinical protocol, reconstruction kernel, reconstructed slice thickness, phantom diameter or the density of material it contains directly affects the image quality of DSCT. ► Dual energy protocol shows the lowest DLP compared to all other protocols examined. ► Dual-energy fused images show excellent image quality and the noise is same as that of single- or high-pitch mode protocol images. ► Advanced CT technology improves image quality and considerably reduce radiation dose. ► An important finding is the comparatively higher DLP of the dual-source high-pitch protocol compared to other single- or dual-energy protocols. - Abstract: Purpose: The aim of this study was to explore the relationship of scanning parameters (clinical protocols), reconstruction kernels and slice thickness with image quality and radiation dose in a DSCT. Materials and methods: The chest of an anthropomorphic phantom was scanned on a DSCT scanner (Siemens Somatom Definition flash) using different clinical protocols, including single- and dual-energy modes. Four scan protocols were investigated: 1) single-source 120 kV, 110 mA s, 2) single-source 100 kV, 180 mA s, 3) high-pitch 120 kV, 130 mA s and 4) dual-energy with 100/Sn140 kV, eff.mA s 89, 76. The automatic exposure control was switched off for all the scans and the CTDIvol selected was in between 7.12 and 7.37 mGy. The raw data were reconstructed using the reconstruction kernels B31f, B80f and B70f, and slice thicknesses were 1.0 mm and 5.0 mm. Finally, the same parameters and procedures were used for the scanning of water phantom. Friedman test and Wilcoxon-Matched-Pair test were used for statistical analysis. Results: The DLP based on the given CTDIvol values showed significantly lower exposure for protocol 4, when compared to protocol 1 (percent difference 5.18%), protocol 2 (percent diff. 4.51%), and protocol 3 (percent diff. 8.81%). The highest change in Hounsfield Units was observed with dual

  14. Pregnancy outcome of “delayed start” GnRH antagonist protocol versus GnRH antagonist protocol in poor responders: A clinical trial study

    Directory of Open Access Journals (Sweden)

    Abbas Aflatoonian

    2017-08-01

    Full Text Available Background: Management of poor-responding patients is still major challenge in assisted reproductive techniques (ART. Delayed-start GnRH antagonist protocol is recommended to these patients, but little is known in this regards. Objective: The goal of this study was assessment of delayed-start GnRH antagonist protocol in poor responders, and in vitro fertilization (IVF outcomes. Materials and Methods: This randomized clinical trial included sixty infertile women with Bologna criteria for ovarian poor responders who were candidate for IVF. In case group (n=30, delayed-start GnRH antagonist protocol administered estrogen priming followed by early follicular-phase GnRH antagonist treatment for 7 days before ovarian stimulation with gonadotropin. Control group (n=30 treated with estrogen priming antagonist protocol. Finally, endometrial thickness, the rates of oocytes maturation, , embryo formation, and pregnancy were compared between two groups. Results: Rates of implantation, chemical, clinical, and ongoing pregnancy in delayed-start cycles were higher although was not statistically significant. Endometrial thickness was significantly higher in case group. There were no statistically significant differences in the rates of oocyte maturation, embryo formation, and IVF outcomes between two groups. Conclusion: There is no significant difference between delayed-start GnRH antagonist protocol versus GnRH antagonist protocol.

  15. Hybrid Long-Distance Entanglement Distribution Protocol

    DEFF Research Database (Denmark)

    Brask, J.B.; Rigas, I.; Polzik, E.S.

    2010-01-01

    We propose a hybrid (continuous-discrete variable) quantum repeater protocol for long-distance entanglement distribution. Starting from states created by single-photon detection, we show how entangled coherent state superpositions can be generated by means of homodyne detection. We show that near......-deterministic entanglement swapping with such states is possible using only linear optics and homodyne detectors, and we evaluate the performance of our protocol combining these elements....

  16. Intelligent routing protocol for ad hoc wireless network

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2006-05-01

    A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage

  17. Fibrillary glomerulonephritis associated with monoclonal gammopathy of undetermined significance showing lambda-type Bence Jones protein.

    Science.gov (United States)

    Nagao, Tomoaki; Okura, Takafumi; Miyoshi, Ken-Ichi; Watanabe, Sanae; Manabe, Seiko; Kurata, Mie; Irita, Jun; Fukuoka, Tomikazu; Higaki, Jitsuo

    2005-09-01

    A 79-year-old woman was admitted to our hospital because of leg edema due to a nephrotic syndrome. Urinary and serum immunoelectrophoresis showed positive for the lambda type of Bence Jones protein. A bone marrow aspiration test revealed mild plasmacytosis (6.4% of the total cells). These findings confirmed her diagnosis of monoclonal gammopathy of undetermined significance (MGUS). Her renal biopsy specimen revealed mild mesangial cell proliferation and an increase in the mesangial matrix. Immunofluorescence studies showed positive staining for IgG, IgA, C3, and kappa and lambda light chains in the capillary wall and mesangium area. Electron microscopy showed that the electron deposits in the thickened basement membrane were formed by randomly arranged 16- to 18-nm nonbranching fibrils. A Congo red stain for amyloid was negative. These findings corresponded with the diagnosis of fibrillary glomerulonephritis. Therefore, this case showed a rare combination of fibrillary glomerulonephritis and MGUS.

  18. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  19. Accuracy of prehospital triage protocols in selecting severely injured patients: A systematic review.

    Science.gov (United States)

    van Rein, Eveline A J; Houwert, R Marijn; Gunning, Amy C; Lichtveld, Rob A; Leenen, Luke P H; van Heijl, Mark

    2017-08-01

    Prehospital trauma triage ensures proper transport of patients at risk of severe injury to hospitals with an appropriate corresponding level of trauma care. Incorrect triage results in undertriage and overtriage. The American College of Surgeons Committee on Trauma recommends an undertriage rate below 5% and an overtriage rate below 50% for prehospital trauma triage protocols. To find the most accurate prehospital trauma triage protocol, a clear overview of all currently available protocols and corresponding outcomes is necessary. The aim of this systematic review was to evaluate the current literature on all available prehospital trauma triage protocols and determine accuracy of protocol-based triage quality in terms of sensitivity and specificity. A search of Pubmed, Embase, and Cochrane Library databases was performed to identify all studies describing prehospital trauma triage protocols before November 2016. The search terms included "trauma," "trauma center," or "trauma system" combined with "triage," "undertriage," or "overtriage." All studies describing protocol-based triage quality were reviewed. To assess the quality of these type of studies, a new critical appraisal tool was developed. In this review, 21 articles were included with numbers of patients ranging from 130 to over 1 million. Significant predictors for severe injury were: vital signs, suspicion of certain anatomic injuries, mechanism of injury, and age. Sensitivity ranged from 10% to 100%; specificity from 9% to 100%. Nearly all protocols had a low sensitivity, thereby failing to identify severely injured patients. Additionally, the critical appraisal showed poor quality of the majority of included studies. This systematic review shows that nearly all protocols are incapable of identifying severely injured patients. Future studies of high methodological quality should be performed to improve prehospital trauma triage protocols. Systematic review, level III.

  20. Entanglement distillation protocols and number theory

    International Nuclear Information System (INIS)

    Bombin, H.; Martin-Delgado, M.A.

    2005-01-01

    We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set Z D n associated with Bell diagonal states is a module rather than a vector space. We find that a partition of Z D n into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D. When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively

  1. Design and Implementation of a Secure Modbus Protocol

    Science.gov (United States)

    Fovino, Igor Nai; Carcano, Andrea; Masera, Marcelo; Trombetta, Alberto

    The interconnectivity of modern and legacy supervisory control and data acquisition (SCADA) systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This paper describes a secure version of the Modbus SCADA protocol that incorporates integrity, authentication, non-repudiation and anti-replay mechanisms. Experimental results using a power plant testbed indicate that the augmented protocol provides good security functionality without significant overhead.

  2. 4-step 4-h carboplatin desensitization protocol for patients with gynecological malignancies showing platinum hypersensitivity: a retrospective study.

    Science.gov (United States)

    Takase, Naoto; Matsumoto, Koji; Onoe, Takuma; Kitao, Akihito; Tanioka, Maki; Kikukawa, Yoshitaka; Yamaguchi, Satoshi; Fujiwara, Kiyoshi; Negoro, Shunichi

    2015-06-01

    Platinum agents are essential for treating gynecological malignancies, particularly ovarian cancer. However, multiple carboplatin doses may cause hypersensitivity reactions (HSRs). Carboplatin desensitization prevents life-threatening HSRs and promotes the successful completion of planned chemotherapy. Since January 2010, carboplatin desensitization was performed at our institution. Solutions with 1/1000, 1/100, and 1/10 dilutions of carboplatin and an undiluted solution were prepared in 250 mL of 5% glucose. Each solution was administered as a 1-h intravenous infusion (4-step 4-h protocol). This retrospective analysis was approved by the institutional review board. From January 2010 to December 2013, 20 patients with gynecological malignancies (median age 62 years, range 43-74 years) received desensitization treatment. The International Federation of Gynecology and Obstetrics stages at presentation were I, II, III, and IV in 1, 1, 15, 13 patients, respectively. During first-line and second-line treatments, 3 and 17 patients, respectively, experienced carboplatin-induced HSRs. The median carboplatin cycle number was 11 (range 2-16). In the first desensitization cycle, 17 (85%) patients completed treatment without adverse events, 2 experienced Grade 1 HSRs but completed treatment, and 1 experienced Grade 3 HSR and discontinued treatment. The first desensitization cycle completion rate was 95%. Of 83 desensitization cycles administered, 79 (95.2%) were completed. No treatment-related deaths occurred. Most patients completed the planned chemotherapy. Our protocol could be conducted safely with shorter duration and simpler procedures than previous protocols. Carboplatin desensitization seems beneficial for patients with a history of carboplatin-induced HSRs; however, the risk of HSR recurrence still remains. Desensitization should therefore be performed only by well-trained staff.

  3. IEEE 802.11 Wireless LANs: Performance Analysis and Protocol Refinement

    Directory of Open Access Journals (Sweden)

    Chatzimisios P.

    2005-01-01

    Full Text Available The IEEE 802.11 protocol is emerging as a widely used standard and has become the most mature technology for wireless local area networks (WLANs. In this paper, we focus on the tuning of the IEEE 802.11 protocol parameters taking into consideration, in addition to throughput efficiency, performance metrics such as the average packet delay, the probability of a packet being discarded when it reaches the maximum retransmission limit, the average time to drop a packet, and the packet interarrival time. We present an analysis, which has been validated by simulation that is based on a Markov chain model commonly used in the literature. We further study the improvement on these performance metrics by employing suitable protocol parameters according to the specific communication needs of the IEEE 802.11 protocol for both basic access and RTS/CTS access schemes. We show that the use of a higher initial contention window size does not considerably degrade performance in small networks and performs significantly better in any other scenario. Moreover, we conclude that the combination of a lower maximum contention window size and a higher retry limit considerably improves performance. Results indicate that the appropriate adjustment of the protocol parameters enhances performance and improves the services that the IEEE 802.11 protocol provides to various communication applications.

  4. An one-time-pad key communication protocol with entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We present an one-time-pad key communication protocol that allows secure direct communication with entanglement. Alice can send message to Bob in a deterministic manner by using local measurements and public communication. The theoretical efficiency of this protocol is double compared with BB84 protocol. We show this protocol is unconditional secure under arbitrary quantum attack. And we discuss that this protocol can be perfectly implemented with current technologies.

  5. Extraction protocols for orthodontic treatment: A retrospective study

    Directory of Open Access Journals (Sweden)

    Vaishnevi N Thirunavukkarasu

    2016-01-01

    Full Text Available Background and Objectives: Various extraction protocols have been followed for successful orthodontic treatment. The purpose of this study was to evaluate the extraction protocols in patients who had previously undergone orthodontic treatment and also who had reported for continuing orthodontic treatment from other clinics. Materials and Methods: One hundred thirty eight patients who registered for orthodontic treatment at the Faculty of Dentistry were divided into 10 extraction protocols based on the Orthodontic treatment protocol given by Janson et al. and were evaluated for statistical significance. Results: The descriptive statistics of the study revealed a total of 40 (29% patients in protocol 1, 43 (31.2% in protocol 2, 18 (13% in protocol 3, 16 (11.6% in protocol 5, and 12 (8.7% in Type 3 category of protocol 9. The Type 3 category in protocol 9 was statistically significant compared to other studies. Midline shift and collapse of the arch form were noticed in these individuals. Conclusion: Extraction of permanent teeth such as canine and lateral incisors without rational reasons could have devastating consequences on the entire occlusion. The percentage of cases wherein extraction of permanent teeth in the crowded region was adopted as a treatment option instead of orthodontic treatment is still prevalent in dental practice. The shortage of orthodontists in Malaysia, the long waiting period, and lack of subjective need for orthodontic treatment at an earlier age group were the reasons for the patient's to choose extraction of the mal-aligned teeth such as the maxillary canine or maxillary lateral incisors.

  6. A case for evaluating sensor network protocols concurrently

    KAUST Repository

    Gnawali, Omprakash; Guibas, Leonidas; Levis, Philip

    2010-01-01

    Researchers typically evaluate and compare protocols on the testbeds by running them one at a time. This methodology ignores the variation in link qualities and wireless environment across these experiments. These variations can introduce significant noise in the results. Evaluating two protocols concurrently, however, suffers from inter-protocol interactions. These interactions can perturb performance even under very light load, especially timing and timing sensitive protocols. We argue that the benefits of running protocols concurrently greatly outweigh the disadvantages. Protocols rarely run in isolation in real networks, and so considering such interactions is valuable. Although the wireless environment is still uncontrolled, concurrent evaluations make comparisons fair and more statistically sound. Through experiments on two testbeds, we make the case for evaluating and comparing low data-rate sensor network protocols by running them concurrently. Copyright 2010 ACM.

  7. Energy Reduction Multipath Routing Protocol for MANET Using Recoil Technique

    Directory of Open Access Journals (Sweden)

    Rakesh Kumar Sahu

    2018-04-01

    Full Text Available In Mobile Ad-hoc networks (MANET, power conservation and utilization is an acute problem and has received significant attention from academics and industry in recent years. Nodes in MANET function on battery power, which is a rare and limited energy resource. Hence, its conservation and utilization should be done judiciously for the effective functioning of the network. In this paper, a novel protocol namely Energy Reduction Multipath Routing Protocol for MANET using Recoil Technique (AOMDV-ER is proposed, which conserves the energy along with optimal network lifetime, routing overhead, packet delivery ratio and throughput. It performs better than any other AODV based algorithms, as in AOMDV-ER the nodes transmit packets to their destination smartly by using a varying recoil off time technique based on their geographical location. This concept reduces the number of transmissions, which results in the improvement of network lifetime. In addition, the local level route maintenance reduces the additional routing overhead. Lastly, the prediction based link lifetime of each node is estimated which helps in reducing the packet loss in the network. This protocol has three subparts: an optimal route discovery algorithm amalgamation with the residual energy and distance mechanism; a coordinated recoiled nodes algorithm which eliminates the number of transmissions in order to reduces the data redundancy, traffic redundant, routing overhead, end to end delay and enhance the network lifetime; and a last link reckoning and route maintenance algorithm to improve the packet delivery ratio and link stability in the network. The experimental results show that the AOMDV-ER protocol save at least 16% energy consumption, 12% reduction in routing overhead, significant achievement in network lifetime and packet delivery ratio than Ad hoc on demand multipath distance vector routing protocol (AOMDV, Ad hoc on demand multipath distance vector routing protocol life

  8. Understanding protocol performance: impact of test performance.

    Science.gov (United States)

    Turner, Robert G

    2013-01-01

    This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as

  9. Recursion vs. Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2005-01-01

    We use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek's spect...... of messages in the sense of Amadio, Lugiez and Vanackere. We conclude by showing that reachability analysis for a replicative variant of the protocol becomes decidable....

  10. Search and nonsearch protocols for radiographic consultation

    International Nuclear Information System (INIS)

    Swensson, R.G.; Theodore, G.H.

    1989-01-01

    Six radiologists, acting as film reviewers, used two different consultation protocols to differentiate among 292 ambiguous findings on chest films: 120 simulated nodules and 172 normal findings (previous readers' false-positive reports of nodules). The non-search protocol identified each finding (by location), and reviewers rated its likelihood as a nodule. The search protocol, which asked reviewers to report and rate all locations regarded as possible nodules on each film, assigned a default negative rating to any unreported finding (nodule or normal). Receiver operator characteristic analyses demonstrated a significantly higher accuracy for each reviewer's search- protocol discriminations between these nodules and confusing normal findings

  11. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  12. Kyoto Protocol: trade versus the environment

    International Nuclear Information System (INIS)

    Loose, H.

    2001-01-01

    Could the signatories to the Kyoto Protocol find themselves up against the WTO? This paper examines how the climate change agreement could conflict with trade rules, and shows that there are potentially serious conflicts in the interface between the WTO and the Kyoto Protocol. It argues for dialogue and debate before it is too late. (author)

  13. Interactive verification of Markov chains: Two distributed protocol case studies

    Directory of Open Access Journals (Sweden)

    Johannes Hölzl

    2012-12-01

    Full Text Available Probabilistic model checkers like PRISM only check probabilistic systems of a fixed size. To guarantee the desired properties for an arbitrary size, mathematical analysis is necessary. We show for two case studies how this can be done in the interactive proof assistant Isabelle/HOL. The first case study is a detailed description of how we verified properties of the ZeroConf protocol, a decentral address allocation protocol. The second case study shows the more involved verification of anonymity properties of the Crowds protocol, an anonymizing protocol.

  14. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    International Nuclear Information System (INIS)

    Soares, M. R.; Maia, A. F.; Batista, W. O. G.; Lara, P. A.

    2014-08-01

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  15. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    Energy Technology Data Exchange (ETDEWEB)

    Soares, M. R.; Maia, A. F. [Universidade Federal de Sergipe, Departamento de Fisica, Cidade Universitaria Prof. Jose Aloisio de Campos, Marechal Rondon s/n, Jardim Rosa Elze, 49-100000 Sao Cristovao, Sergipe (Brazil); Batista, W. O. G. [Instituto Federal da Bahia, Rua Emidio dos Santos s/n, Barbalho, Salvador, 40301015 Bahia (Brazil); Lara, P. A., E-mail: wilsonottobatista@gmail.com [Instituto de Pesquisas Energeticas e Nucleares / CNEN, Av. Lineu Prestes 2242, Cidade Universitaria, 05508-000 Sao Paulo (Brazil)

    2014-08-15

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  16. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  17. Secure Certificateless Authentication and Road Message Dissemination Protocol in VANETs

    Directory of Open Access Journals (Sweden)

    Haowen Tan

    2018-01-01

    Full Text Available As a crucial component of Internet-of-Thing (IoT, vehicular ad hoc networks (VANETs have attracted increasing attentions from both academia and industry fields in recent years. With the extensive VANETs deployment in transportation systems of more and more countries, drivers’ driving experience can be drastically improved. In this case, the real-time road information needs to be disseminated to the correlated vehicles. However, due to inherent wireless communicating characteristics of VANETs, authentication and group key management strategies are indispensable for security assurance. Furthermore, effective road message dissemination mechanism is of significance. In this paper, we address the above problems by developing a certificateless authentication and road message dissemination protocol. In our design, certificateless signature and the relevant feedback mechanism are adopted for authentication and group key distribution. Subsequently, message evaluating and ranking strategy is introduced. Security analysis shows that our protocol achieves desirable security properties. Additionally, performance analysis demonstrates that the proposed protocol is efficient compared with the state of the art.

  18. A Comparative Study On The Action Potential Simulation (APS Therapy And The Routine Physiotherapy Protocol In Knee Osteoarthritisin Elderly People

    Directory of Open Access Journals (Sweden)

    Abbas Rahimi

    2012-04-01

    Full Text Available Background and Aim: Knee osteoarthritis is the most common cause for which the elderly people refere to physiotherapy outpatient clinics. This study aimed to investigate the effects of the Action Potential Stimulation (APS Therapy and the routine physiotherapy (PT protocol on relieving pain and swelling as well as the duration of the relief period in patients with knee osteoarthritis. Materials and Methods: 69 patients (62 females & 7 males with knee osteoarthritis were recruited in this study. The subjects were divided into two groups including APS Therapy (n=37, mean age: 55±13 years old and the routine PT protocol (n=32, mean age: 61±14 years old groups. A 10-session treatment period was carried out for each group; and their pain and swelling were measured at the first, fifth and tenth sessions and also one-month after the last session (follow up. The swelling was measured using measuring the circumference of the knee on the patella, 5 Cm above and 5 Cm below the patella. The routine PT protocol consisted of hot pack, ultrasound, TENS and exercise; and the APS therapy protocol included hot pack, APS Therapy and the same exercise. During the follow up, 50 out of 61 subjects were called on the phone and any pain changes were recorded.Results: In terms of swelling, the results showed significant reduction just on the patella only in the APS Therapy group (P<0.05. Visual Analogue Pain Scale (VAPS indicated a significant pain reduction in both groups. However, the APS Therapy group showed significantly pain reduction at the end of sessions five, ten and the follow up session (P<0.05. It was also revealed that while routine PT subjects showed no significant pain changes between the tenth and the follow up session, a gradual pain reduction was seen in the APS therapy group during this period (P<0.05. A gradual dosage reduction was recorded only in the APS therapy group, indicating a slight correlation with pain reduction (r=0.4.Conclusion: The

  19. Benchmarking pediatric cranial CT protocols using a dose tracking software system: a multicenter study

    Energy Technology Data Exchange (ETDEWEB)

    Bondt, Timo de; Parizel, Paul M. [Antwerp University Hospital and University of Antwerp, Department of Radiology, Antwerp (Belgium); Mulkens, Tom [H. Hart Hospital, Department of Radiology, Lier (Belgium); Zanca, Federica [GE Healthcare, DoseWatch, Buc (France); KU Leuven, Imaging and Pathology Department, Leuven (Belgium); Pyfferoen, Lotte; Casselman, Jan W. [AZ St. Jan Brugge-Oostende AV Hospital, Department of Radiology, Brugge (Belgium)

    2017-02-15

    To benchmark regional standard practice for paediatric cranial CT-procedures in terms of radiation dose and acquisition parameters. Paediatric cranial CT-data were retrospectively collected during a 1-year period, in 3 different hospitals of the same country. A dose tracking system was used to automatically gather information. Dose (CTDI and DLP), scan length, amount of retakes and demographic data were stratified by age and clinical indication; appropriate use of child-specific protocols was assessed. In total, 296 paediatric cranial CT-procedures were collected. Although the median dose of each hospital was below national and international diagnostic reference level (DRL) for all age categories, statistically significant (p-value < 0.001) dose differences among hospitals were observed. The hospital with lowest dose levels showed smallest dose variability and used age-stratified protocols for standardizing paediatric head exams. Erroneous selection of adult protocols for children still occurred, mostly in the oldest age-group. Even though all hospitals complied with national and international DRLs, dose tracking and benchmarking showed that further dose optimization and standardization is possible by using age-stratified protocols for paediatric cranial CT. Moreover, having a dose tracking system revealed that adult protocols are still applied for paediatric CT, a practice that must be avoided. (orig.)

  20. Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs with Extended Service Range

    Science.gov (United States)

    Choi, Woo-Yong

    2011-11-01

    In this paper, we propose the efficient reliable multicast MAC protocol by which the AP (Access Point) can transmit reliably its multicast data frames to the recipients in the AP's one-hop or two-hop transmission range. The AP uses the STAs (Stations) that are directly associated with itself as the relays for the data delivery to the remote recipients that cannot be reached directly from itself. Based on the connectivity information among the recipients, the reliable multicast MAC protocol optimizes the number of the RAK (Request for ACK) frame transmissions in a reasonable computational time. Numerical examples show that our proposed MAC protocol significantly enhances the MAC performance compared with the BMMM (Batch Mode Multicast MAC) protocol that is extended to support the recipients that are in the AP's one-hop or two-hop transmission range in IEEE 802.11 wireless LANs.

  1. An Energy and Application Scenario Aware Active RFID Protocol

    Directory of Open Access Journals (Sweden)

    Nilsson Björn

    2010-01-01

    Full Text Available The communication protocol used is a key issue in order to make the most of the advantages of active RFID technologies. In this paper we introduce a carrier sense medium access data communication protocol that dynamically adjusts its back-off algorithm to best suit the actual application at hand. Based on a simulation study of the effect on tag energy cost, read-out delay, and message throughput incurred by some typical back-off algorithms in a CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance active RFID protocol, we conclude that by dynamic tuning of the initial contention window size and back-off interval coefficient, tag energy consumption and read-out delay can be significantly lowered. We show that it is possible to decrease the energy consumption per tag payload delivery with more than 10 times, resulting in a 50% increase in tag battery lifetime. We also discuss the advantage of being able to predict the number of tags present at the RFID-reader as well as ways of doing it.

  2. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols.

    Science.gov (United States)

    Campagne, Fabien

    2008-02-29

    The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79-0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86-0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these protocols can fully substitute

  3. Development of high-reliable real-time communication network protocol for SMART

    Energy Technology Data Exchange (ETDEWEB)

    Song, Ki Sang; Kim, Young Sik [Korea National University of Education, Chongwon (Korea); No, Hee Chon [Korea Advanced Institute of Science and Technology, Taejon (Korea)

    1999-04-01

    In this research, we first define protocol subsets for SMART(System-integrated Modular Advanced Reactor) communication network based on the requirement of SMART MMIS transmission delay and traffic requirements and OSI(Open System Interconnection) 7 layers' network protocol functions. Also, current industrial purpose LAN protocols are analyzed and the applicability of commercialized protocols are checked. For the suitability test, we have applied approximated SMART data traffic and maximum allowable transmission delay requirement. With the simulation results, we conclude that IEEE 802.5 and FDDI which is an ANSI standard, is the most suitable for SMART. We further analyzed the FDDI and token ring protocols for SMART and nuclear plant network environment including IEEE 802.4, IEEE 802.5, and ARCnet. The most suitable protocol for SMART is FDDI and FDDI MAC and RMT protocol specifications have been verified with LOTOS and the verification results show that FDDI MAC and RMT satisfy the reachability and liveness, but does not show deadlock and livelock. Therefore, we conclude that FDDI MAC and RMT is highly reliable protocol for SMART MMIS network. After that, we consider the stacking fault of IEEE 802.5 token ring protocol and propose a fault tolerant MAM(Modified Active Monitor) protocol. The simulation results show that the MAM protocol improves lower priority traffic service rate when stacking fault occurs. Therefore, proposed MAM protocol can be applied to SMART communication network for high reliability and hard real-time communication purpose in data acquisition and inter channel network. (author). 37 refs., 79 figs., 39 tabs.

  4. Nucleic acid protocols: Extraction and optimization

    Directory of Open Access Journals (Sweden)

    Saeed El-Ashram

    2016-12-01

    Full Text Available Yield and quality are fundamental features for any researchers during nucleic acid extraction. Here, we describe a simplified, semi-unified, effective, and toxic material free protocol for extracting DNA and RNA from different prokaryotic and eukaryotic sources exploiting the physical and chemical properties of nucleic acids. Furthermore, this protocol showed that DNA and RNA are under triple protection (i.e. EDTA, SDS and NaCl during lysis step, and this environment is improper for RNase to have DNA liberated of RNA and even for DNase to degrade the DNA. Therefore, the complete removal of RNA under RNase influence is achieved when RNase is added after DNA extraction, which gives optimal quality with any protocols. Similarly, DNA contamination in an isolated RNA is degraded by DNase to obtain high-quality RNA. Our protocol is the protocol of choice in terms of simplicity, recovery time, environmental safety, amount, purity, PCR and RT-PCR applicability.

  5. Standardization of a Videofluoroscopic Swallow Study Protocol to Investigate Dysphagia in Dogs.

    Science.gov (United States)

    Harris, R A; Grobman, M E; Allen, M J; Schachtel, J; Rawson, N E; Bennett, B; Ledyayev, J; Hopewell, B; Coates, J R; Reinero, C R; Lever, T E

    2017-03-01

    Videofluoroscopic swallow study (VFSS) is the gold standard for diagnosis of dysphagia in veterinary medicine but lacks standardized protocols that emulate physiologic feeding practices. Age impacts swallow function in humans but has not been evaluated by VFSS in dogs. To develop a protocol with custom kennels designed to allow free-feeding of 3 optimized formulations of contrast media and diets that address limitations of current VFSS protocols. We hypothesized that dogs evaluated by a free-feeding VFSS protocol would show differences in objective swallow metrics based on age. Healthy juvenile, adult, and geriatric dogs (n = 24). Prospective, experimental study. Custom kennels were developed to maintain natural feeding behaviors during VFSS. Three food consistencies (thin liquid, pureed food, and dry kibble) were formulated with either iohexol or barium to maximize palatability and voluntary prehension. Dogs were evaluated by 16 swallow metrics and compared across age groups. Development of a standardized VFSS protocol resulted in successful collection of swallow data in healthy dogs. No significant differences in swallow metrics were observed among age groups. Substantial variability was observed in healthy dogs when evaluated under these physiologic conditions. Features typically attributed to pathologic states, such as gastric reflux, were seen in healthy dogs. Development of a VFSS protocol that reflects natural feeding practices may allow emulation of physiology resulting in clinical signs of dysphagia. Age did not result in significant changes in swallow metrics, but additional studies are needed, particularly in light of substantial normal variation. Copyright © 2017 The Authors. Journal of Veterinary Internal Medicine published by Wiley Periodicals, Inc. on behalf of the American College of Veterinary Internal Medicine.

  6. Optical code-division multiple-access protocol with selective retransmission

    Science.gov (United States)

    Mohamed, Mohamed A. A.; Shalaby, Hossam M. H.; El-Badawy, El-Sayed A.

    2006-05-01

    An optical code-division multiple-access (OCDMA) protocol based on selective retransmission technique is proposed. The protocol is modeled using a detailed state diagram and is analyzed using equilibrium point analysis (EPA). Both traditional throughput and average delay are used to examine its performance for several network parameters. In addition, the performance of the proposed protocol is compared to that of the R3T protocol, which is based on a go-back-n technique. Our results show that a higher performance is achieved by the proposed protocol at the expense of system complexity.

  7. Delivery room management of very low birth weight infants in Germany, Austria and Switzerland - a comparison of protocols

    Directory of Open Access Journals (Sweden)

    Roehr CC

    2010-11-01

    Full Text Available Abstract Background Surveys from the USA, Australia and Spain have shown significant inter-institutional variation in delivery room (DR management of very low birth weight infants (VLBWI, Objective To investigate protocols for DR management of VLBWI in Germany, Austria and Switzerland and to compare these with the 2005 ILCOR guidelines. Methods DR management protocols were surveyed in a prospective, questionnaire-based survey in 2008. Results were compared between countries and between academic and non-academic units. Protocols were compared to the 2005 ILCOR guidelines. Results In total, 190/249 units (76% replied. Protocols for DR management existed in 94% of units. Statistically significant differences between countries were found regarding provision of 24 hr in house neonatal service; presence of a designated resuscitation area; devices for respiratory support; use of pressure-controlled manual ventilation devices; volume control by respirator; and dosage of Surfactant. There were no statistically significant differences regarding application and monitoring of supplementary oxygen, or targeted saturation levels, or for the use of sustained inflations. Comparison of academic and non-academic hospitals showed no significant differences, apart from the targeted saturation levels (SpO2 at 10 min. of life. Comparison with ILCOR guidelines showed good adherence to the 2005 recommendations. Summary Delivery room management in German, Austrian and Swiss neonatal units was commonly based on written protocols. Only minor differences were found regarding the DR setup, devices used and the targeted ranges for SpO2 and FiO2. DR management was in good accordance with 2005 ILCOR guidelines, some units already incorporated evidence beyond the ILCOR statement into their routine practice.

  8. A feeding protocol for delivery of agents to assess development in Varroa mites.

    Directory of Open Access Journals (Sweden)

    Ana R Cabrera

    Full Text Available A novel feeding protocol for delivery of bio-active agents to Varroa mites was developed by providing mites with honey bee larva hemolymph supplemented with cultured insect cells and selected materials delivered on a fibrous cotton substrate. Mites were starved, fed on treated hemolymph to deliver selected agents and then returned to bee larvae. Transcript levels of two reference genes, actin and glyceraldehyde 3-phosphate dehydrogenase (GAPDH, as well as for nine selected genes involved in reproductive processes showed that the starvation and feeding protocol periods did not pose a high level of stress to the mites as transcript levels remained comparable between phoretic mites and those completing the protocol. The feeding protocol was used to deliver molecules such as hormone analogs or plasmids. Mites fed with Tebufenozide, an ecdysone analog, had higher transcript levels of shade than untreated or solvent treated mites. In order to extend this feeding protocol, cultured insect cells were incorporated to a final ratio of 1 part cells and 2 parts hemolymph. Although supplementation with Bombyx mori Bm5 cells increased the amount of hemolymph consumed per mite, there was a significant decrease in the percentage of mites that fed and survived. On the other hand, Drosophila melanogaster S2 cells reduced significantly the percentage of mites that fed and survived as well as the amount of hemolymph consumed. The feeding protocol provides a dynamic platform with which to challenge the Varroa mite to establish efficacy of control agents for this devastating honey bee pest.

  9. Whole-Body Magnetic Resonance Angiography at 3 Tesla Using a Hybrid Protocol in Patients with Peripheral Arterial Disease

    International Nuclear Information System (INIS)

    Nielsen, Yousef W.; Eiberg, Jonas P.; Logager, Vibeke B.; Schroeder, Torben V.; Just, Sven; Thomsen, Henrik S.

    2009-01-01

    The purpose of this study was to determine the diagnostic performance of 3T whole-body magnetic resonance angiography (WB-MRA) using a hybrid protocol in comparison with a standard protocol in patients with peripheral arterial disease (PAD). In 26 consecutive patients with PAD two different protocols were used for WB-MRA: a standard sequential protocol (n = 13) and a hybrid protocol (n = 13). WB-MRA was performed using a gradient echo sequence, body coil for signal reception, and gadoterate meglumine as contrast agent (0.3 mmol/kg body weight). Two blinded observers evaluated all WB-MRA examinations with regard to presence of stenoses, as well as diagnostic quality and degree of venous contamination in each of the four stations used in WB-MRA. Digital subtraction angiography served as the method of reference. Sensitivity for detecting significant arterial disease (luminal narrowing ≥ 50%) using standard-protocol WB-MRA for the two observers was 0.63 (95%CI: 0.51-0.73) and 0.66 (0.58-0.78). Specificities were 0.94 (0.91-0.97) and 0.96 (0.92-0.98), respectively. In the hybrid protocol WB-MRA sensitivities were 0.75 (0.64-0.84) and 0.70 (0.58-0.8), respectively. Specificities were 0.93 (0.88-0.96) and 0.95 (0.91-0.97). Interobserver agreement was good using both the standard and the hybrid protocol, with κ = 0.62 (0.44-0.67) and κ = 0.70 (0.59-0.79), respectively. WB-MRA quality scores were significantly higher in the lower leg using the hybrid protocol compared to standard protocol (p = 0.003 and p = 0.03, observers 1 and 2). Distal venous contamination scores were significantly lower with the hybrid protocol (p = 0.02 and p = 0.01, observers 1 and 2). In conclusion, hybrid-protocol WB-MRA shows a better diagnostic performance than standard protocol WB-MRA at 3 T in patients with PAD.

  10. Benchmarking pediatric cranial CT protocols using a dose tracking software system: a multicenter study.

    Science.gov (United States)

    De Bondt, Timo; Mulkens, Tom; Zanca, Federica; Pyfferoen, Lotte; Casselman, Jan W; Parizel, Paul M

    2017-02-01

    To benchmark regional standard practice for paediatric cranial CT-procedures in terms of radiation dose and acquisition parameters. Paediatric cranial CT-data were retrospectively collected during a 1-year period, in 3 different hospitals of the same country. A dose tracking system was used to automatically gather information. Dose (CTDI and DLP), scan length, amount of retakes and demographic data were stratified by age and clinical indication; appropriate use of child-specific protocols was assessed. In total, 296 paediatric cranial CT-procedures were collected. Although the median dose of each hospital was below national and international diagnostic reference level (DRL) for all age categories, statistically significant (p-value benchmarking showed that further dose optimization and standardization is possible by using age-stratified protocols for paediatric cranial CT. Moreover, having a dose tracking system revealed that adult protocols are still applied for paediatric CT, a practice that must be avoided. • Significant differences were observed in the delivered dose between age-groups and hospitals. • Using age-adapted scanning protocols gives a nearly linear dose increase. • Sharing dose-data can be a trigger for hospitals to reduce dose levels.

  11. Comparison of microdose GnRH agonist protocol with GnRH antagonist / letrazole protocol in patients with poor ovarian response

    Directory of Open Access Journals (Sweden)

    Yiğit Çakıroğlu

    2013-09-01

    Full Text Available Objective: To compare microdose GnRH agonist (MDL protocol with GnRH antagonist/letrazole (AL protocol in patients with poor ovarian response. Design: Randomised clinical trial. Setting: Kocaeli University Assisted Reproductive Centre Interventions: POR was diagnosed according to ESHRE Bologna criteria in case of presence of 2 out of 3 criteria. In the MDL group (n=27, 40µg/0.2 cc subcutaneous leuprolid acetate was given two times a day starting on the first day of menstrual cycle. On the second day of the cycle, gonadotrophin stimulation was started at 450-600 IU and/or 150 IU human menopausal gonadotrophin (hMG along with leuprolid. In the AL group (n=28, 5 mg letrazole was given for 5 days starting on the second day of the spontaneous cycle and after the 5th day of the cycle, 450-600 IU and/or 150 IU hMG was given. Main Outcome Measures: To compare the outcomes of MDL protocol with AL protocol in patients with poor ovarian response. Results: Stimulation days, total gonadotrophin dose (IU, peak E2 (pg/ml levels, and endometrial thickness were found to be statistically significantly lower in the AL group. While no cases of cycle cancellation was detected in the MDL group, statistically significantly higher rates of cycle cancellation (%35.7, p<0.001 was detected in the AL group. No statistically significant differences were detected in total oocyte numbers (3.7±2.9 vs 2.7±2.2, number of transferred embryos (1.4±0.5 vs 1.4±1.9, pregnancy rates (3/27 (%11.1 vs 2/28 (%7.1 and implantation rates (3/36 (%8.3 vs 2/22 (%9.1 in between the groups. Comment: Although AL protocol is not superior to MDL protocol in poor ovarian response patients, it may be used as an alternative protocol.

  12. HIGH-VELOCITY RESISTANCE EXERCISE PROTOCOLS IN OLDER WOMEN: EFFECTS ON CARDIOVASCULAR RESPONSE

    Directory of Open Access Journals (Sweden)

    Rodrigo P. da Silva

    2007-12-01

    Full Text Available Acute cardiovascular responses to different high-velocity resistance exercise protocols were compared in untrained older women. Twelve apparently healthy volunteers (62.6 ± 2.9 y performed three different protocols in the bench press (BP. All protocols involved three sets of 10 repetitions performed with a 10RM load and 2 minutes of rest between sets. The continuous protocol (CP involved ten repetitions with no pause between repetitions. The discontinuous protocols were performed with a pause of five (DP5 or 15 (DP15 seconds between the fifth and sixth repetitions. Heart rate (HR, systolic blood pressure (SBP, rate pressure product (RPP, Rating of Perceived Exertion (RPE, and blood lactate (BLa were assessed at baseline and at the end of all exercise sets. Factorial ANOVA was used to compare the cardiovascular response among different protocols. Compared to baseline, HR and RPP were significantly (p < 0.05 higher after the third set in all protocols. HR and RPP were significantly (p < 0.05 lower in DP5 and DP15 compared with CP for the BP exercise. Compared to baseline, RPE increased significantly (p < 0.05 with each subsequent set in all protocols. Blood lactate concentration during DP5 and DP15 was significantly lower than CP. It appears that discontinuous high-velocity resistance exercise has a lower cardiovascular demand than continuous resistance exercise in older women

  13. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  14. Symbolic Model Checking and Analysis for E-Commerce Protocol

    Institute of Scientific and Technical Information of China (English)

    WEN Jing-Hua; ZHANG Mei; LI Xiang

    2005-01-01

    A new approach is proposed for analyzing non-repudiation and fairness of e-commerce protocols. The authentication e-mail protocol CMP1 is modeled as finite state machine and analyzed in two vital aspects - non-repudiation and fairness using SMV. As a result, the CMP1 protocol is not fair and we have improved it. This result shows that it is effective to analyze and check the new features of e-commerce protocols using SMV model checker

  15. Re-examining the security of blind quantum signature protocols

    International Nuclear Information System (INIS)

    Wang Mingming; Chen Xiubo; Niu Xinxin; Yang Yixian

    2012-01-01

    Recently, blind quantum signature (BQS) protocols have been proposed with the help of a third-party verifier. However, our research shows that some of the BQS protocols are unable to complete the blind signature task fairly if the verifier is dishonest. Indeed, these protocols can be viewed as variants of the classical digital signature scheme of symmetric-key cryptography. If nobody is trusted in such protocols, digital signature cannot be implemented since disagreements cannot be solved fairly.

  16. A slotted access control protocol for metropolitan WDM ring networks

    Science.gov (United States)

    Baziana, P. A.; Pountourakis, I. E.

    2009-03-01

    In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.

  17. Improving the security of quantum protocols via commit-and-open

    NARCIS (Netherlands)

    I.B. Damgård (Ivan); S. Fehr (Serge); C. Luneman; L. Salvail (Louis); C. Schaffner (Christian)

    2009-01-01

    htmlabstractWe consider two-party quantum protocols starting with a transmission of some random BB84 qubits followed by classical messages. We show a general compiler improving the security of such protocols: if the original protocol is secure against an almost honest adversary, then the

  18. Data Exchange Protocol in Repsail

    Directory of Open Access Journals (Sweden)

    Gucma Maciej

    2017-12-01

    Full Text Available Article presents implantation and theoretical considerations of data exchange protocol developed for the RepSail project, where main objective was design and building innovative hybrid yacht. One of problems during the design process was improper functioning of data exchange protocols that were available in the commercially available devices to mention navigation purpose NMEA183 or 2000 as well as automation dedicated ones (CAN and similar. Author shows the basis of the dedicated format of exchange for in board devices.

  19. Eavesdropping on the two-way quantum communication protocols with invisible photons

    Energy Technology Data Exchange (ETDEWEB)

    Cai Qingyu [State Key Laboratory of Magnetics Resonance and Atomic and Molecular Physics, Wuhan Institution of Physics and Mathematics, Chinese Academy of Sciences, Wuhan 430071 (China)]. E-mail: qycai@wipm.ac.cn

    2006-02-20

    The crucial issue of quantum communication protocol is its security. In this Letter, we show that all the deterministic and direct two-way quantum communication protocols, sometimes called ping-pong (PP) protocols, are insecure when an eavesdropper uses the invisible photon to eavesdrop on the communication. With our invisible photon eavesdropping (IPE) scheme, the eavesdropper can obtain full information of the communication with zero risk of being detected. We show that this IPE scheme can be implemented experimentally with current technology. Finally, a possible improvement of PP communication protocols security is proposed00.

  20. Eavesdropping on the two-way quantum communication protocols with invisible photons

    International Nuclear Information System (INIS)

    Cai Qingyu

    2006-01-01

    The crucial issue of quantum communication protocol is its security. In this Letter, we show that all the deterministic and direct two-way quantum communication protocols, sometimes called ping-pong (PP) protocols, are insecure when an eavesdropper uses the invisible photon to eavesdrop on the communication. With our invisible photon eavesdropping (IPE) scheme, the eavesdropper can obtain full information of the communication with zero risk of being detected. We show that this IPE scheme can be implemented experimentally with current technology. Finally, a possible improvement of PP communication protocols security is proposed

  1. Emission trading and Kyoto's protocol: discussions concerning rules and international coordination

    International Nuclear Information System (INIS)

    Baron, R.

    2000-01-01

    The Kyoto Protocol of the Climate Convention introduced the possibility to trade greenhouse gas emission reductions among industrialized countries, as a means to reduce the total cost of achieving the agreed emission goals. The rules for this international co-ordination regime are still debated, even if its principle is generally agreed. This article, written before the negotiation in the Hague, summarizes how the notion of emission trading made its way in the Framework Convention on Climate Change. The authors show what economic gains could realistically be expected from emission trading, based on macro-economic modelling results and a simulation of trading in the conditions of the Kyoto Protocol. They stress the critical contribution that emission trading could make, provided that the Protocol's environmental basis is not undermined. In the end, the negotiation collapsed over this issue. Beyond this near-term obstacle, the international emission trading system represents a significant progress towards an efficient resolution of man-made global climate change. (author)

  2. MR efficiency using automated MRI-desktop eProtocol

    Science.gov (United States)

    Gao, Fei; Xu, Yanzhe; Panda, Anshuman; Zhang, Min; Hanson, James; Su, Congzhe; Wu, Teresa; Pavlicek, William; James, Judy R.

    2017-03-01

    MRI protocols are instruction sheets that radiology technologists use in routine clinical practice for guidance (e.g., slice position, acquisition parameters etc.). In Mayo Clinic Arizona (MCA), there are over 900 MR protocols (ranging across neuro, body, cardiac, breast etc.) which makes maintaining and updating the protocol instructions a labor intensive effort. The task is even more challenging given different vendors (Siemens, GE etc.). This is a universal problem faced by all the hospitals and/or medical research institutions. To increase the efficiency of the MR practice, we designed and implemented a web-based platform (eProtocol) to automate the management of MRI protocols. It is built upon a database that automatically extracts protocol information from DICOM compliant images and provides a user-friendly interface to the technologists to create, edit and update the protocols. Advanced operations such as protocol migrations from scanner to scanner and capability to upload Multimedia content were also implemented. To the best of our knowledge, eProtocol is the first MR protocol automated management tool used clinically. It is expected that this platform will significantly improve the radiology operations efficiency including better image quality and exam consistency, fewer repeat examinations and less acquisition errors. These protocols instructions will be readily available to the technologists during scans. In addition, this web-based platform can be extended to other imaging modalities such as CT, Mammography, and Interventional Radiology and different vendors for imaging protocol management.

  3. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol\\'s perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain\\'s fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  4. Citrobacter rodentium is an unstable pathogen showing evidence of significant genomic flux.

    Directory of Open Access Journals (Sweden)

    Nicola K Petty

    2011-04-01

    Full Text Available Citrobacter rodentium is a natural mouse pathogen that causes attaching and effacing (A/E lesions. It shares a common virulence strategy with the clinically significant human A/E pathogens enteropathogenic E. coli (EPEC and enterohaemorrhagic E. coli (EHEC and is widely used to model this route of pathogenesis. We previously reported the complete genome sequence of C. rodentium ICC168, where we found that the genome displayed many characteristics of a newly evolved pathogen. In this study, through PFGE, sequencing of isolates showing variation, whole genome transcriptome analysis and examination of the mobile genetic elements, we found that, consistent with our previous hypothesis, the genome of C. rodentium is unstable as a result of repeat-mediated, large-scale genome recombination and because of active transposition of mobile genetic elements such as the prophages. We sequenced an additional C. rodentium strain, EX-33, to reveal that the reference strain ICC168 is representative of the species and that most of the inactivating mutations were common to both isolates and likely to have occurred early on in the evolution of this pathogen. We draw parallels with the evolution of other bacterial pathogens and conclude that C. rodentium is a recently evolved pathogen that may have emerged alongside the development of inbred mice as a model for human disease.

  5. Design and implementation of an intrusion detection system based on IPv6 protocol

    Science.gov (United States)

    Liu, Bin; Li, Zhitang; Li, Yao; Li, Zhanchun

    2005-11-01

    Network intrusion detection systems (NIDS) are important parts of network security architecture. Although many NIDS have been proposed, there is little effort to expand the current set of NIDS to support IPv6 protocol. This paper presents the design and implementation of a Network-based Intrusion Detection System that supports both IPv6 protocol and IPv4 protocol. It characters rules based logging to perform content pattern matching and detect a variety of attacks and probes from IPv4 and IPv6.There are four primary subsystems to make it up: packet capture, packet decoder, detection engine, and logging and alerting subsystem. A new approach to packet capture that combined NAPI with MMAP is proposed in this paper. The test results show that the efficiency of packet capture can be improved significantly by this method. Several new attack tools for IPv6 have been developed for intrusion detection evaluation. Test shows that more than 20 kinds of IPv6 attacks can be detected by this system and it also has a good performance under heavy traffic load.

  6. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  7. A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem.

    Science.gov (United States)

    Zhao, Zhenguo

    2014-05-01

    With the fast advancement of the wireless communication technology and the widespread use of medical systems, the radio frequency identification (RFID) technology has been widely used in healthcare environments. As the first important protocol for ensuring secure communication in healthcare environment, the RFID authentication protocols derive more and more attentions. Most of RFID authentication protocols are based on hash function or symmetric cryptography. To get more security properties, elliptic curve cryptosystem (ECC) has been used in the design of RFID authentication protocol. Recently, Liao and Hsiao proposed a new RFID authentication protocol using ECC and claimed their protocol could withstand various attacks. In this paper, we will show that their protocol suffers from the key compromise problem, i.e. an adversary could get the private key stored in the tag. To enhance the security, we propose a new RFID authentication protocol using ECC. Detailed analysis shows the proposed protocol not only could overcome weaknesses in Liao and Hsiao's protocol but also has the same performance. Therefore, it is more suitable for healthcare environments.

  8. Effect of two complex training protocols of back squats in blood indicators of muscular damage in military athletes.

    Science.gov (United States)

    Ojeda, Álvaro Huerta; Ríos, Luis Chirosa; Barrilao, Rafael Guisado; Ríos, Ignacio Chirosa; Serrano, Pablo Cáceres

    2016-05-01

    [Purpose] The aim of this study was to determine the variations in the blood muscular damage indicators post application of two complex training programs for back squats. [Subjects and Methods] Seven military athletes were the subjects of this study. The study had a quasi-experimental cross-over intra-subject design. Two complex training protocols were applied, and the variables to be measured were cortisol, metabolic creatine kinase, and total creatine kinase. For the statistical analysis, Student's t-test was used. [Results] Twenty-four hours post effort, a significant decrease in cortisol level was shown for both protocols; however, the metabolic creatine kinase and total creatine kinase levels showed a significant increase. [Conclusion] Both protocols lowered the indicator of main muscular damage in the blood supply (cortisol). This proved that the work weight did not generate significant muscular damage in the 24-hour post-exercise period.

  9. On consensus through communication without a commonly known protocol

    OpenAIRE

    Tsakas Elias; Voorneveld Mark

    2010-01-01

    The present paper extends the standard model of pairwise communication among Bayesianagents to cases where the structure of the communication protocol is not commonly known.We show that, even under strict conditions on the structure of the protocols and the nature of the transmitted signals, a consensus may never be reached if very little asymmetric information about the protocol is introduced.

  10. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  11. Quantum protocols for transference of proof of zero-knowledge systems

    OpenAIRE

    Nascimento, Jose Claudio do; Ramos, Rubens Viana

    2007-01-01

    Zero-knowledge proof system is an important protocol that can be used as a basic block for construction of other more complex cryptographic protocols. An intrinsic characteristic of a zero-knowledge systems is the assumption that is impossible for the verifier to show to a third part that he has interacted with the prover. However, it has been shown that using quantum correlations the impossibility of transferring proofs can be successfully attacked. In this work we show two new protocols for...

  12. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  13. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  14. Evaluation of svr: a wireless sensor network routing protocol

    International Nuclear Information System (INIS)

    Baloch, J.; Khanzada, T.J.S.

    2014-01-01

    The advancement in technology has made it possible to create small in size, low cost sensor nodes. However, the small size and low cost of such nodes comesat at price that is, reduced processing power, low memory and significantly small battery energy storage. WSNs (Wireless Sensor Networks) are inherently ad hoc in nature and are assumed to work in the toughest terrain. The network lifetime plays a pivotal role in a wireless sensor network. A long network lifetime, could be achieved by either making significant changes in these low cost devices, which is not a feasible solution or by improving the means of communication throughout the network. The communication in such networks could be improved by employing energy efficient routing protocols, to route the data throughout the network. In this paper the SVR (Spatial Vector Routing) protocol is compared against the most common WSN routing protocols, and from the results it could be inferred that the SVR protocol out performs its counterparts. The protocol provides an energy efficient means of communication in the network. (author)

  15. Assessment of Grade of Dysphonia and Correlation With Quality of Life Protocol.

    Science.gov (United States)

    Spina, Ana Lúcia; Crespo, Agrício Nubiato

    2017-03-01

    The main objective of this study is to check the correlation between vocal self-assessment and results of the Voice-Related Quality of Life (V-RQOL) protocol, and whether there is a correlation between perceptual vocal assessment made by voice therapists and the results from the V-RQOL protocol. The study included 245 subjects with vocal complaints. This was a prospective analytical clinical study. Vocal perceptual assessment of each subject with dysphonia was made by three voice therapists, followed by self-assessment made by the subjects themselves, and the application of the V-RQOL protocol. The results have shown poor level of agreement between vocal assessment made by the voice therapists and self-assessment made by the subjects. The statistical analysis indicated that the results of V-RQOL protocol showed significant correlation with the vocal assessment made by the voice therapists and the self-assessment by the subjects. The agreement between the assessments was low and variable; age, gender, professional voice use, and clinical laryngoscopic diagnosis did not influence the agreement level. Protocol V-RQOL is sensitive to vocal assessment made by the voice therapists and self-assessment made by the patient. Copyright © 2017 The Voice Foundation. Published by Elsevier Inc. All rights reserved.

  16. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  17. Space Link Extension Protocol Emulation for High-Throughput, High-Latency Network Connections

    Science.gov (United States)

    Tchorowski, Nicole; Murawski, Robert

    2014-01-01

    New space missions require higher data rates and new protocols to meet these requirements. These high data rate space communication links push the limitations of not only the space communication links, but of the ground communication networks and protocols which forward user data to remote ground stations (GS) for transmission. The Consultative Committee for Space Data Systems, (CCSDS) Space Link Extension (SLE) standard protocol is one protocol that has been proposed for use by the NASA Space Network (SN) Ground Segment Sustainment (SGSS) program. New protocol implementations must be carefully tested to ensure that they provide the required functionality, especially because of the remote nature of spacecraft. The SLE protocol standard has been tested in the NASA Glenn Research Center's SCENIC Emulation Lab in order to observe its operation under realistic network delay conditions. More specifically, the delay between then NASA Integrated Services Network (NISN) and spacecraft has been emulated. The round trip time (RTT) delay for the continental NISN network has been shown to be up to 120ms; as such the SLE protocol was tested with network delays ranging from 0ms to 200ms. Both a base network condition and an SLE connection were tested with these RTT delays, and the reaction of both network tests to the delay conditions were recorded. Throughput for both of these links was set at 1.2Gbps. The results will show that, in the presence of realistic network delay, the SLE link throughput is significantly reduced while the base network throughput however remained at the 1.2Gbps specification. The decrease in SLE throughput has been attributed to the implementation's use of blocking calls. The decrease in throughput is not acceptable for high data rate links, as the link requires constant data a flow in order for spacecraft and ground radios to stay synchronized, unless significant data is queued a the ground station. In cases where queuing the data is not an option

  18. Normalization of cortical thickness measurements across different T1 magnetic resonance imaging protocols by novel W-Score standardization.

    Science.gov (United States)

    Chung, Jinyong; Yoo, Kwangsun; Lee, Peter; Kim, Chan Mi; Roh, Jee Hoon; Park, Ji Eun; Kim, Sang Joon; Seo, Sang Won; Shin, Jeong-Hyeon; Seong, Joon-Kyung; Jeong, Yong

    2017-10-01

    The use of different 3D T1-weighted magnetic resonance (T1 MR) imaging protocols induces image incompatibility across multicenter studies, negating the many advantages of multicenter studies. A few methods have been developed to address this problem, but significant image incompatibility still remains. Thus, we developed a novel and convenient method to improve image compatibility. W-score standardization creates quality reference values by using a healthy group to obtain normalized disease values. We developed a protocol-specific w-score standardization to control the protocol effect, which is applied to each protocol separately. We used three data sets. In dataset 1, brain T1 MR images of normal controls (NC) and patients with Alzheimer's disease (AD) from two centers, acquired with different T1 MR protocols, were used (Protocol 1 and 2, n = 45/group). In dataset 2, data from six subjects, who underwent MRI with two different protocols (Protocol 1 and 2), were used with different repetition times, echo times, and slice thicknesses. In dataset 3, T1 MR images from a large number of healthy normal controls (Protocol 1: n = 148, Protocol 2: n = 343) were collected for w-score standardization. The protocol effect and disease effect on subjects' cortical thickness were analyzed before and after the application of protocol-specific w-score standardization. As expected, different protocols resulted in differing cortical thickness measurements in both NC and AD subjects. Different measurements were obtained for the same subject when imaged with different protocols. Multivariate pattern difference between measurements was observed between the protocols. Classification accuracy between two protocols was nearly 90%. After applying protocol-specific w-score standardization, the differences between the protocols substantially decreased. Most importantly, protocol-specific w-score standardization reduced both univariate and multivariate differences in the images while

  19. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    We present our work on using abstract models for formally analysing cryptographic protocols: First, we present an ecient method for verifying trace-based authenticity properties of protocols using nonces, symmetric encryption, and asymmetric encryption. The method is based on a type system...... of Gordon et al., which we modify to support fully-automated type inference. Tests conducted via an implementation of our algorithm found it to be very ecient. Second, we show how privacy may be captured in a symbolic model using an equivalencebased property and give a formal denition. We formalise...

  20. Two-party quantum key agreement protocols under collective noise channel

    Science.gov (United States)

    Gao, Hao; Chen, Xiao-Guang; Qian, Song-Rong

    2018-06-01

    Recently, quantum communication has become a very popular research field. The quantum key agreement (QKA) plays an important role in the field of quantum communication, based on its unconditional security in terms of theory. Among all kinds of QKA protocols, QKA protocols resisting collective noise are widely being studied. In this paper, we propose improved two-party QKA protocols resisting collective noise and present a feasible plan for information reconciliation. Our protocols' qubit efficiency has achieved 26.67%, which is the best among all the two-party QKA protocols against collective noise, thus showing that our protocol can improve the transmission efficiency of quantum key agreement.

  1. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung; Kazandjieva, Maria A.; Jain, Mayank; Levis, Philip

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol's perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain's fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  2. Effects of a Short Drilling Implant Protocol on Osteotomy Site Temperature and Drill Torque.

    Science.gov (United States)

    Mihali, Sorin G; Canjau, Silvana; Cernescu, Anghel; Bortun, Cristina M; Wang, Hom-Lay; Bratu, Emanuel

    2018-02-01

    To establish a protocol for reducing the drilling sequence during implant site preparation based on temperature and insertion torque. The traditional conventional drilling sequence (used several drills with 0.6-mm increment each time) was compared with the proposed short drilling protocol (only used 2 drills: initial and final drill). One hundred drilling osteotomies were performed in bovine and porcine bones. Sets of 2 osteotomy sites were created in 5 bone densities using 2 types of drilling protocols. Thermographic pictures were captured throughout all drilling procedures and analyzed using ThermaCAM Researcher Professional 2.10. Torque values were determined during drilling by measuring electrical input and drill speed. There were statistically significant differences in bone temperature between the conventional and short drilling protocols during implant site preparation (analysis of variance P = 0.0008). However, there were no significant differences between the 2 types of drilling protocols for both implant diameters. Implant site preparation time was significantly reduced when using the short drilling protocol compared with the conventional drilling protocol (P drilling protocol proposed herein may represent a safe approach for implant site preparation.

  3. Quantum protocol for cheat-sensitive weak coin flipping.

    Science.gov (United States)

    Spekkens, R W; Rudolph, Terry

    2002-11-25

    We present a quantum protocol for the task of weak coin flipping. We find that, for one choice of parameters in the protocol, the maximum probability of a dishonest party winning the coin flip if the other party is honest is 1/sqrt[2]. We also show that if parties restrict themselves to strategies wherein they cannot be caught cheating, their maximum probability of winning can be even smaller. As such, the protocol offers additional security in the form of cheat sensitivity.

  4. [Effect of a multidisciplinar protocol on the clinical results obtained after bariatric surgery].

    Science.gov (United States)

    Cánovas Gaillemin, B; Sastre Martos, J; Moreno Segura, G; Llamazares Iglesias, O; Familiar Casado, C; Abad de Castro, S; López Pardo, R; Sánchez-Cabezudo Muñoz, M A

    2011-01-01

    Bariatric surgery has been shown to be an effective therapy for weight loss in patients with severe obesity, and the implementation of a multidisciplinar management protocol is recommended. To assess the usefulness of the implementation of a management protocol in obesity surgery based on the Spanish Consensus Document of the SEEDO. Retrospective comparative study of the outcomes in patients previously operated (51 patients) and after the implementation of the protocol (66 patients). The following data were gathered: anthropometry, pre-and post-surgery comorbidities, post-surgical nutritional and surgical complications, validated Quality of Life questionnaire, and dietary habits. Withdrawals (l7.6%) and alcoholism (5.8%) were higher in patients pre- versus post-implementation of the protocol (4.5% vs. 3%, respectively), the differences being statistically significant. The mortality rate was 2% in the pre-protocol group and 0% in the postprotocol group. The dietary habits were better in the post-protocol group, the pre-protocol group presenting a higher percentage of feeding-behavior disorders (5.1%) although not reaching a statistical significance. The improvement in quality of life was higher in the post-protocol group for all items, but only reaching statistical significance in sexual activity (p = 0.004). In the pre-protocol group, 70.5% of the patients had more than one nutritional complication vs. 32.8% in the post-protocol group (p 50% in 81.3% in the pre-protocol group vs. 74.8% in the pos-protocol group) or the comorbidities. Bariatric surgery achieves excellent outcomes in weight loss, comorbidities, and quality of life, but presents nutritional, surgical, and psychiatric complications that require a protocol-based and multidisciplinary approach. Our protocol improves the outcomes regarding the withdrawal rates, feeding-behavior disorders, dietary habits, nutritional complications, and quality of life.

  5. Control room envelope unfiltered air inleakage test protocols

    International Nuclear Information System (INIS)

    Lagus, P.L.; Grot, R.A.

    1997-01-01

    In 1983, the Advisory Committee on Reactor Safeguards (ACRS) recommended that the US NRC develop a control room HVAC performance testing protocol. To date no such protocol has been forthcoming. Beginning in mid-1994, an effort was funded by NRC under a Small Business Innovation Research (SBIR) grant to develop several simplified test protocols based on the principles of tracer gas testing in order to measure the total unfiltered inleakage entering a CRE during emergency mode operation of the control room ventilation system. These would allow accurate assessment of unfiltered air inleakage as required in SRP 6.4. The continuing lack of a standard protocol is unfortunate since one of the significant parameters required to calculate operator dose is the amount of unfiltered air inleakage into the control room. Often it is assumed that, if the Control Room Envelope (CRE) is maintained at +1/8 in. w.g. differential pressure relative to the surroundings, no significant unfiltered inleakage can occur it is further assumed that inleakage due to door openings is the only source of unfiltered air. 23 refs., 13 figs., 2 tabs

  6. Control room envelope unfiltered air inleakage test protocols

    Energy Technology Data Exchange (ETDEWEB)

    Lagus, P.L. [Lagus Applied Technology, San Diego, CA (United States); Grot, R.A. [Lagus Applied Technology, Olney, MD (United States)

    1997-08-01

    In 1983, the Advisory Committee on Reactor Safeguards (ACRS) recommended that the US NRC develop a control room HVAC performance testing protocol. To date no such protocol has been forthcoming. Beginning in mid-1994, an effort was funded by NRC under a Small Business Innovation Research (SBIR) grant to develop several simplified test protocols based on the principles of tracer gas testing in order to measure the total unfiltered inleakage entering a CRE during emergency mode operation of the control room ventilation system. These would allow accurate assessment of unfiltered air inleakage as required in SRP 6.4. The continuing lack of a standard protocol is unfortunate since one of the significant parameters required to calculate operator dose is the amount of unfiltered air inleakage into the control room. Often it is assumed that, if the Control Room Envelope (CRE) is maintained at +1/8 in. w.g. differential pressure relative to the surroundings, no significant unfiltered inleakage can occur it is further assumed that inleakage due to door openings is the only source of unfiltered air. 23 refs., 13 figs., 2 tabs.

  7. Two-party secret key distribution via a modified quantum secret sharing protocol.

    Science.gov (United States)

    Grice, W P; Evans, P G; Lawrie, B; Legré, M; Lougovski, P; Ray, W; Williams, B P; Qi, B; Smith, A M

    2015-03-23

    We present and demonstrate a novel protocol for distributing secret keys between two and only two parties based on N-party single-qubit Quantum Secret Sharing (QSS). We demonstrate our new protocol with N = 3 parties using phase-encoded photons. We show that any two out of N parties can build a secret key based on partial information from each other and with collaboration from the remaining N - 2 parties. Our implementation allows for an accessible transition between N-party QSS and arbitrary two party QKD without modification of hardware. In addition, our approach significantly reduces the number of resources such as single photon detectors, lasers and dark fiber connections needed to implement QKD.

  8. Conversion of a general quantum stabilizer code to an entanglement distillation protocol

    Energy Technology Data Exchange (ETDEWEB)

    Matsumoto, Ryutaroh [Department of Communications and Integrated Systems, Tokyo Institute of Technology, Tokyo 152-8552 (Japan)

    2003-07-25

    We show how to convert a quantum stabilizer code to a one- or two-way entanglement distillation protocol. The proposed conversion method is a generalization of those of Shor-Preskill and Nielsen-Chuang. The recurrence protocol and the quantum privacy amplification protocol are equivalent to the protocols converted from [[2, 1

  9. Conversion of a general quantum stabilizer code to an entanglement distillation protocol

    International Nuclear Information System (INIS)

    Matsumoto, Ryutaroh

    2003-01-01

    We show how to convert a quantum stabilizer code to a one- or two-way entanglement distillation protocol. The proposed conversion method is a generalization of those of Shor-Preskill and Nielsen-Chuang. The recurrence protocol and the quantum privacy amplification protocol are equivalent to the protocols converted from [[2, 1

  10. A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS

    Directory of Open Access Journals (Sweden)

    U. Latha

    2013-08-01

    Full Text Available The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints information. The proposed system comprised of three phases namely, fingerprint reconstruction, feature extraction and development of trigon based security protocol. In fingerprint reconstruction, the different crack variance level finger prints images are reconstructed by the M-band Dual Tree Complex Wavelet Transform (DTCWT. After that features are extracted by binarization. A set of finger print images are utilized to evaluate the performance of security protocol and the result from this process guarantees the healthiness of the proposed trigon based security protocol. The implementation results show the effectiveness of proposed trigon based security protocol in protecting the finger print information and the achieved improvement in image reconstruction and the security process.

  11. Typing and compositionality for security protocols: A generalization to the geometric fragment

    DEFF Research Database (Denmark)

    Almousa, Omar; Mödersheim, Sebastian Alexander; Modesti, Paolo

    2015-01-01

    We integrate, and improve upon, prior relative soundness results of two kinds. The first kind are typing results showing that any security protocol that fulfils a number of sufficient conditions has an attack if it has a well-typed attack. The second kind considers the parallel composition of pro...... of protocols, showing that when running two protocols in parallel allows for an attack, then at least one of the protocols has an attack in isolation. The most important generalization over previous work is the support for all security properties of the geometric fragment.......We integrate, and improve upon, prior relative soundness results of two kinds. The first kind are typing results showing that any security protocol that fulfils a number of sufficient conditions has an attack if it has a well-typed attack. The second kind considers the parallel composition...

  12. Evaluation of condyle defects using different reconstruction protocols of cone-beam computed tomography

    International Nuclear Information System (INIS)

    Bastos, Luana Costa; Campos, Paulo Sergio Flores; Ramos-Perez, Flavia Maria de Moraes; Pontual, Andrea dos Anjos; Almeida, Solange Maria

    2013-01-01

    This study was conducted to investigate how well cone-beam computed tomography (CBCT) can detect simulated cavitary defects in condyles, and to test the influence of the reconstruction protocols. Defects were created with spherical diamond burs (numbers 1013, 1016, 3017) in superior and / or posterior surfaces of twenty condyles. The condyles were scanned, and cross-sectional reconstructions were performed with nine different protocols, based on slice thickness (0.2, 0.6, 1.0 mm) and on the filters (original image, Sharpen Mild, S9) used. Two observers evaluated the defects, determining their presence and location. Statistical analysis was carried out using simple Kappa coefficient and McNemar’s test to check inter- and intra-rater reliability. The chi-square test was used to compare the rater accuracy. Analysis of variance (Tukey's test) assessed the effect of the protocols used. Kappa values for inter- and intra-rater reliability demonstrate almost perfect agreement. The proportion of correct answers was significantly higher than that of errors for cavitary defects on both condyle surfaces (p < 0.01). Only in identifying the defects located on the posterior surface was it possible to observe the influence of the 1.0 mm protocol thickness and no filter, which showed a significantly lower value. Based on the results of the current study, the technique used was valid for identifying the existence of cavities in the condyle surface. However, the protocol of a 1.0 mm-thick slice and no filter proved to be the worst method for identifying the defects on the posterior surface. (author)

  13. Evaluation of condyle defects using different reconstruction protocols of cone-beam computed tomography

    Energy Technology Data Exchange (ETDEWEB)

    Bastos, Luana Costa; Campos, Paulo Sergio Flores, E-mail: bastosluana@ymail.com [Universidade Federal da Bahia (UFBA), Salvador, BA (Brazil). Fac. de Odontologia. Dept. de Radiologia Oral e Maxilofacial; Ramos-Perez, Flavia Maria de Moraes [Universidade Federal de Pernambuco (UFPE), Recife, PE (Brazil). Fac. de Odontologia. Dept. de Clinica e Odontologia Preventiva; Pontual, Andrea dos Anjos [Universidade Federal de Pernambuco (UFPE), Camaragibe, PE (Brazil). Fac. de Odontologia. Dept. de Radiologia Oral; Almeida, Solange Maria [Universidade Estadual de Campinas (UNICAMP), Piracicaba, SP (Brazil). Fac. de Odontologia. Dept. de Radiologia Oral

    2013-11-15

    This study was conducted to investigate how well cone-beam computed tomography (CBCT) can detect simulated cavitary defects in condyles, and to test the influence of the reconstruction protocols. Defects were created with spherical diamond burs (numbers 1013, 1016, 3017) in superior and / or posterior surfaces of twenty condyles. The condyles were scanned, and cross-sectional reconstructions were performed with nine different protocols, based on slice thickness (0.2, 0.6, 1.0 mm) and on the filters (original image, Sharpen Mild, S9) used. Two observers evaluated the defects, determining their presence and location. Statistical analysis was carried out using simple Kappa coefficient and McNemar’s test to check inter- and intra-rater reliability. The chi-square test was used to compare the rater accuracy. Analysis of variance (Tukey's test) assessed the effect of the protocols used. Kappa values for inter- and intra-rater reliability demonstrate almost perfect agreement. The proportion of correct answers was significantly higher than that of errors for cavitary defects on both condyle surfaces (p < 0.01). Only in identifying the defects located on the posterior surface was it possible to observe the influence of the 1.0 mm protocol thickness and no filter, which showed a significantly lower value. Based on the results of the current study, the technique used was valid for identifying the existence of cavities in the condyle surface. However, the protocol of a 1.0 mm-thick slice and no filter proved to be the worst method for identifying the defects on the posterior surface. (author)

  14. Studying protocol-based pain management in the emergency department

    Directory of Open Access Journals (Sweden)

    Akkamahadevi Patil

    2017-01-01

    Full Text Available Background: Majority of the patients presenting to emergency department (ED have pain. ED oligoanalgesia remains a challenge. Aims: This study aims to study the effect of implementing a protocol-based pain management in the ED on (1 time to analgesia and (2 adequacy of analgesia obtained. Settings and Design: Cross-sectional study in the ED. Methods: Patients aged 18–65 years of age with pain of numeric rating scale (NRS ≥4 were included. A series of 100 patients presenting before introduction of the protocol-based pain management were grouped “pre-protocol,” and managed as per existing practice. Following this, a protocol for management of all patients presenting to ED with pain was implemented. Another series of 100 were grouped as “post-protocol” and managed as per the new pain management protocol. The data of patients from both the groups were collected and analyzed. Statistical Analysis Used: Descriptive statistical tests such as percentage, mean and standard deviation and inferential statistical tests such as Pearson coefficient, Student's t-test were applied. Differences were interpreted as significant when P < 0.05. Results: Mean time to administer analgesic was significantly lesser in the postprotocol group (preprotocol 20.30 min vs. postprotocol 13.05 min; P < 0.001. There was significant difference in the pain relief achieved (change in NRS between the two groups, with greater pain relief achieved in the postprotocol group (preprotocol group 4.6800 vs. postprotocol group 5.3600; P < 0.001. Patients' rating of pain relief (assessed on E5 scale was significantly higher in the postprotocol group (preprotocol 3.91 vs. postprotocol 4.27; P = 0.001. Patients' satisfaction (North American Spine Society scale with the overall treatment was also compared and found to be significantly higher in postprotocol group (mean: preprotocol 1.59 vs. postprotocol 1.39; P = 0.008. Conclusion: Protocol-based pain management provided timely and

  15. A new testing protocol for zirconia dental implants.

    Science.gov (United States)

    Sanon, Clarisse; Chevalier, Jérôme; Douillard, Thierry; Cattani-Lorente, Maria; Scherrer, Susanne S; Gremillard, Laurent

    2015-01-01

    Based on the current lack of standards concerning zirconia dental implants, we aim at developing a protocol to validate their functionality and safety prior their clinical use. The protocol is designed to account for the specific brittle nature of ceramics and the specific behavior of zirconia in terms of phase transformation. Several types of zirconia dental implants with different surface textures (porous, alveolar, rough) were assessed. The implants were first characterized in their as-received state by Scanning Electron Microscopy (SEM), Focused Ion Beam (FIB), X-Ray Diffraction (XRD). Fracture tests following a method adapted from ISO 14801 were conducted to evaluate their initial mechanical properties. Accelerated aging was performed on the implants, and XRD monoclinic content measured directly at their surface instead of using polished samples as in ISO 13356. The implants were then characterized again after aging. Implants with an alveolar surface presented large defects. The protocol shows that such defects compromise the long-term mechanical properties. Implants with a porous surface exhibited sufficient strength but a significant sensitivity to aging. Even if associated to micro cracking clearly observed by FIB, aging did not decrease mechanical strength of the implants. As each dental implant company has its own process, all zirconia implants may behave differently, even if the starting powder is the same. Especially, surface modifications have a large influence on strength and aging resistance, which is not taken into account by the current standards. Protocols adapted from this work could be useful. Copyright © 2014 Academy of Dental Materials. Published by Elsevier Ltd. All rights reserved.

  16. On the Security of the Ping-Pong Protocol

    OpenAIRE

    Bostroem, Kim; Felbinger, Timo

    2007-01-01

    We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous.

  17. On the security of the ping-pong protocol

    International Nuclear Information System (INIS)

    Bostroem, Kim; Felbinger, Timo

    2008-01-01

    We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous

  18. On the security of the ping-pong protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bostroem, Kim [Psychologisches Institut II, Universitaet Muenster, 48149 Muenster (Germany); Felbinger, Timo [Institut fuer Physik, Universitaet Potsdam, 14469 Potsdam (Germany)], E-mail: tjf@qipc.org

    2008-05-26

    We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous.

  19. On the Composition of Public-Coin Zero-Knowledge Protocols

    Science.gov (United States)

    2011-05-31

    only languages in BPP have public-coin black-box zero-knowledge protocols that are secure under an unbounded (polynomial) number of parallel...only languages in BPP have public-coin black-box zero-knowledge protocols that are secure under an unbounded (polynomial) number of parallel repetitions...and Krawczyk [GK96b] show that only languages in BPP have constant-round public-coin (stand-alone) black-box ZK protocols with negligible soundness

  20. Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario

    Directory of Open Access Journals (Sweden)

    Yanan Chen

    2018-01-01

    Full Text Available Vehicle-to-infrastructure (V2I communication enables moving vehicles to upload real-time data about road surface situation to the Internet via fixed roadside units (RSU. Thanks to the resource restriction of mobile vehicles, fog computation-enhanced V2I communication scenario has received increasing attention recently. However, how to aggregate the sensed data from vehicles securely and efficiently still remains open to the V2I communication scenario. In this paper, a light-weight and anonymous aggregation protocol is proposed for the fog computing-based V2I communication scenario. With the proposed protocol, the data collected by the vehicles can be efficiently obtained by the RSU in a privacy-preserving manner. Particularly, we first suggest a certificateless aggregate signcryption (CL-A-SC scheme and prove its security in the random oracle model. The suggested CL-A-SC scheme, which is of independent interest, can achieve the merits of certificateless cryptography and signcryption scheme simultaneously. Then we put forward the anonymous aggregation protocol for V2I communication scenario as one extension of the suggested CL-A-SC scheme. Security analysis demonstrates that the proposed aggregation protocol achieves desirable security properties. The performance comparison shows that the proposed protocol significantly reduces the computation and communication overhead compared with the up-to-date protocols in this field.

  1. Real-Time Fault Tolerant Networking Protocols

    National Research Council Canada - National Science Library

    Henzinger, Thomas A

    2004-01-01

    We made significant progress in the areas of video streaming, wireless protocols, mobile ad-hoc and sensor networks, peer-to-peer systems, fault tolerant algorithms, dependability and timing analysis...

  2. Quantum deterministic key distribution protocols based on the authenticated entanglement channel

    International Nuclear Information System (INIS)

    Zhou Nanrun; Wang Lijun; Ding Jie; Gong Lihua

    2010-01-01

    Based on the quantum entanglement channel, two secure quantum deterministic key distribution (QDKD) protocols are proposed. Unlike quantum random key distribution (QRKD) protocols, the proposed QDKD protocols can distribute the deterministic key securely, which is of significant importance in the field of key management. The security of the proposed QDKD protocols is analyzed in detail using information theory. It is shown that the proposed QDKD protocols can safely and effectively hand over the deterministic key to the specific receiver and their physical implementation is feasible with current technology.

  3. Quantum deterministic key distribution protocols based on the authenticated entanglement channel

    Energy Technology Data Exchange (ETDEWEB)

    Zhou Nanrun; Wang Lijun; Ding Jie; Gong Lihua [Department of Electronic Information Engineering, Nanchang University, Nanchang 330031 (China)], E-mail: znr21@163.com, E-mail: znr21@hotmail.com

    2010-04-15

    Based on the quantum entanglement channel, two secure quantum deterministic key distribution (QDKD) protocols are proposed. Unlike quantum random key distribution (QRKD) protocols, the proposed QDKD protocols can distribute the deterministic key securely, which is of significant importance in the field of key management. The security of the proposed QDKD protocols is analyzed in detail using information theory. It is shown that the proposed QDKD protocols can safely and effectively hand over the deterministic key to the specific receiver and their physical implementation is feasible with current technology.

  4. The impact of an ED-only full-capacity protocol.

    Science.gov (United States)

    Watase, Taketo; Fu, Rongwei; Foster, Denise; Langley, Denise; Handel, Daniel A

    2012-10-01

    The objective of this study was to assess the impact of an emergency department (ED)-only full-capacity protocol and diversion, controlling for patient volumes and other potential confounding factors. This was a preintervention and postintervention cohort study using data 12 months before and 12 months after the implementation of the protocol. During the implementation period, attending physicians and charge nurses were educated with clear and simple figures on the criteria for the initiation of the new protocol. A multiple logistic regression model was used to compare ambulance diversion between the 2 periods. The proportion of days when the ED went on diversion at least once during a 24-hour period was 60.4% during the preimplementation period and 20% in the postimplementation periods (P model, the use of the new protocol was significantly associated with decreased odds of diversion rate in the postimplementation period (odds ratio, 0.32; 95% confidence interval, 0.21-0.48). Our predivert/full-capacity protocol is a simple and generalizable strategy that can be implemented within the boundaries of the ED and is significantly associated with a decreased diversion rate. Copyright © 2012 Elsevier Inc. All rights reserved.

  5. Motivationally Significant Stimuli Show Visual Prior Entry: Evidence for Attentional Capture

    Science.gov (United States)

    West, Greg L.; Anderson, Adam A. K.; Pratt, Jay

    2009-01-01

    Previous studies that have found attentional capture effects for stimuli of motivational significance do not directly measure initial attentional deployment, leaving it unclear to what extent these items produce attentional capture. Visual prior entry, as measured by temporal order judgments (TOJs), rests on the premise that allocated attention…

  6. Comparison of two cooling protocols for llama semen: with and without collagenase and seminal plasma in the medium.

    Science.gov (United States)

    Carretero, M I; Giuliano, S M; Arraztoa, C C; Santa Cruz, R C; Fumuso, F G; Neild, D M

    2017-08-01

    Seminal plasma (SP) of South American Camelids could interfere with the interaction of spermatozoa with the extenders; therefore it becomes necessary to improve semen management using enzymatic treatment. Our objective was to compare two cooling protocols for llama semen. Twelve ejaculates were incubated in 0.1% collagenase and then were divided into two aliquots. One was extended in lactose and egg yolk (LEY) (Protocol A: collagenase and SP present). The other aliquot was centrifuged, and the pellet was resuspended in LEY (Protocol B: collagenase and SP absent). Both samples were maintained at 5°C during 24 hr. Routine and DNA evaluations were carried out in raw and cooled semen. Both cooling protocols maintained sperm viability, membrane function and DNA fragmentation, with Protocol A showing a significantly lowered total and progressive motility (p semen samples prior to either cooling or freeze-thawing. © 2016 Blackwell Verlag GmbH.

  7. Modelling and Verification of Web Services Business Activity Protocol

    DEFF Research Database (Denmark)

    Ravn, Anders Peter; Srba, Jiri; Vighio, Saleem

    2011-01-01

    WS-Business Activity specification defines two coordination protocols in order to ensure a consistent agreement on the outcome of long-running distributed applications. We use the model checker Uppaal to analyse the Business Agreement with Coordination Completion protocol type. Our analyses show ...

  8. Cryptographic protocol security analysis based on bounded constructing algorithm

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    An efficient approach to analyzing cryptographic protocols is to develop automatic analysis tools based on formal methods. However, the approach has encountered the high computational complexity problem due to reasons that participants of protocols are arbitrary, their message structures are complex and their executions are concurrent. We propose an efficient automatic verifying algorithm for analyzing cryptographic protocols based on the Cryptographic Protocol Algebra (CPA) model proposed recently, in which algebraic techniques are used to simplify the description of cryptographic protocols and their executions. Redundant states generated in the analysis processes are much reduced by introducing a new algebraic technique called Universal Polynomial Equation and the algorithm can be used to verify the correctness of protocols in the infinite states space. We have implemented an efficient automatic analysis tool for cryptographic protocols, called ACT-SPA, based on this algorithm, and used the tool to check more than 20 cryptographic protocols. The analysis results show that this tool is more efficient, and an attack instance not offered previously is checked by using this tool.

  9. Development of a neuromuscular electrical stimulation protocol for sprint training.

    Science.gov (United States)

    Russ, David W; Clark, Brian C; Krause, Jodi; Hagerman, Fredrick C

    2012-09-01

    Sprint training is associated with several beneficial adaptations in skeletal muscle, including an enhancement of sarcoplasmic reticulum (SR) Ca(2+) release. Unfortunately, several patient populations (e.g., the elderly, those with cardiac dysfunction) that might derive great benefit from sprint exercise are unlikely to tolerate it. The purpose of this report was to describe the development of a tolerable neuromuscular electrical stimulation (NMES) protocol that induces skeletal muscle adaptations similar to those observed with sprint training. Our NMES protocol was modeled after a published sprint exercise protocol and used a novel electrode configuration and stimulation sequence to provide adequate training stimulus while maintaining subject tolerance. Nine young, healthy subjects (four men) began and completed the training protocol of the knee extensor muscles. All subjects completed the protocol, with ratings of discomfort far less than those reported in studies of traditional NMES. Training induced significant increases in SR Ca(2+) release and citrate synthase activity (~16% and 32%, respectively), but SR Ca(2+) uptake did not change. The percentage of myosin heavy chain IIx isoform was decreased significantly after training. At the whole muscle level, neither central activation nor maximum voluntary isometric contraction force were significantly altered, although isometric force did exhibit a trend toward an increase (~3%, P = 0.055). Surprisingly, the NMES training produced a significant increase in muscle cross-sectional area (~3%, P = 0.04). It seems that an appropriately designed NMES protocol can mimic many of the benefits of sprint exercise training, with a low overall time commitment and training volume. These findings suggest that NMES has the potential to bring the benefits of sprint exercise to individuals who are unable to tolerate traditional sprint training.

  10. Analysis of Security Protocols by Annotations

    DEFF Research Database (Denmark)

    Gao, Han

    . The development of formal techniques, e.g. control flow analyses, that can check various security properties, is an important tool to meet this challenge. This dissertation contributes to the development of such techniques. In this dissertation, security protocols are modelled in the process calculus LYSA......The trend in Information Technology is that distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great...... deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal. It has long been a challenge to determine conclusively whether a given protocol is secure or not...

  11. Demarcation of Security in Authentication Protocols

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security analysis of communication protocols is a slippery business; many “secure” protocols later turn out to be insecure. Among many, two complains are more frequent: inadequate definition of security and unstated assumptions in the security model. In our experience, one principal cause...... for such state of affairs is an apparent overlap of security and correctness, which may lead to many sloppy security definitions and security models. Although there is no inherent need to separate security and correctness requirements, practically, such separation is significant. It makes security analysis...... easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...

  12. Quantum secret sharing protocol using modulated doubly entangled photons

    International Nuclear Information System (INIS)

    Chuan, Wang; Yong, Zhang

    2009-01-01

    In this paper, we propose a quantum secret sharing protocol utilizing polarization modulated doubly entangled photon pairs. The measurement devices are constructed. By modulating the polarizations of entangled photons, the boss could encode secret information on the initial state and share the photons with different members to realize the secret sharing process. This protocol shows the security against intercept-resend attack and dishonest member cheating. The generalized quantum secret sharing protocol is also discussed. (general)

  13. A Gossip-based Energy Efficient Protocol for Robust In-network Aggregation in Wireless Sensor Networks

    Science.gov (United States)

    Fauji, Shantanu

    We consider the problem of energy efficient and fault tolerant in--network aggregation for wireless sensor networks (WSNs). In-network aggregation is the process of aggregation while collecting data from sensors to the base station. This process should be energy efficient due to the limited energy at the sensors and tolerant to the high failure rates common in sensor networks. Tree based in--network aggregation protocols, although energy efficient, are not robust to network failures. Multipath routing protocols are robust to failures to a certain degree but are not energy efficient due to the overhead in the maintenance of multiple paths. We propose a new protocol for in-network aggregation in WSNs, which is energy efficient, achieves high lifetime, and is robust to the changes in the network topology. Our protocol, gossip--based protocol for in-network aggregation (GPIA) is based on the spreading of information via gossip. GPIA is not only adaptive to failures and changes in the network topology, but is also energy efficient. Energy efficiency of GPIA comes from all the nodes being capable of selective message reception and detecting convergence of the aggregation early. We experimentally show that GPIA provides significant improvement over some other competitors like the Ridesharing, Synopsis Diffusion and the pure version of gossip. GPIA shows ten fold, five fold and two fold improvement over the pure gossip, the synopsis diffusion and Ridesharing protocols in terms of network lifetime, respectively. Further, GPIA retains gossip's robustness to failures and improves upon the accuracy of synopsis diffusion and Ridesharing.

  14. The effect of personalized versus standard patient protocols for radiostereometric analysis (RSA)

    DEFF Research Database (Denmark)

    Muharemovic, O; Troelsen, A; Thomsen, M G

    2018-01-01

    INTRODUCTION: Increasing pressure in the clinic requires a more standardized approach to radiostereometric analysis (RSA) imaging. The aim of this study was to investigate whether implementation of personalized RSA patient protocols could increase image quality and decrease examination time...... imaging. Radiographers in the control group used a standard RSA protocol. RESULTS: At three months, radiographers in the case group significantly reduced (p .... No significant improvements were found in the control group at any time point. CONCLUSION: There is strong evidence that personalized RSA patient protocols have a positive effect on image quality and radiation dose savings. Implementation of personal patient protocols as a RSA standard will contribute...

  15. Security of modified Ping-Pong protocol in noisy and lossy channel.

    Science.gov (United States)

    Han, Yun-Guang; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Guo, Guang-Can; Han, Zheng-Fu

    2014-05-12

    The "Ping-Pong" (PP) protocol is a two-way quantum key protocol based on entanglement. In this protocol, Bob prepares one maximally entangled pair of qubits, and sends one qubit to Alice. Then, Alice performs some necessary operations on this qubit and sends it back to Bob. Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven. In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove the security of this modified PP protocol against collective attacks when the noisy and lossy channel is taken into account. Simulation results show that our protocol is practical.

  16. Improvement of burn pain management through routine pain monitoring and pain management protocol.

    Science.gov (United States)

    Yang, Hyeong Tae; Hur, Giyeun; Kwak, In-Suk; Yim, Haejun; Cho, Yong Suk; Kim, Dohern; Hur, Jun; Kim, Jong Hyun; Lee, Boung Chul; Seo, Cheong Hoon; Chun, Wook

    2013-06-01

    Pain management is an important aspect of burn management. We developed a routine pain monitoring system and pain management protocol for burn patients. The purpose of this study is to evaluate the effectiveness of our new pain management system. From May 2011 to November 2011, the prospective study was performed with 107 burn patients. We performed control group (n=58) data analysis and then developed the pain management protocol and monitoring system. Next, we applied our protocol to patients and performed protocol group (n=49) data analysis, and compared this to control group data. Data analysis was performed using the Numeric Rating Scale (NRS) of background pain and procedural pain, Clinician-Administered PTSD Scale (CAPS), Hamilton Depression Rating Scale (HDRS), State-Trait Anxiety Inventory Scale (STAIS), and Holmes and Rahe Stress Scale (HRSS). The NRS of background pain for the protocol group was significantly decreased compared to the control group (2.8±2.0 versus 3.9±1.9), and the NRS of procedural pain of the protocol group was significantly decreased compared to the control group (4.8±2.8 versus 3.7±2.5). CAPS and HDRS were decreased in the protocol group, but did not have statistical significance. STAIS and HRSS were decreased in the protocol group, but only the STAIS had statistical significance. Our new pain management system was effective in burn pain management. However, adequate pain management can only be accomplished by a continuous and thorough effort. Therefore, pain control protocol and pain monitoring systems need to be under constant revision and improvement using creative ideas and approaches. Copyright © 2012 Elsevier Ltd and ISBI. All rights reserved.

  17. Impersonation attack on a quantum secure direct communication and authentication protocol with improvement

    Science.gov (United States)

    Amerimehr, Ali; Hadain Dehkordi, Massoud

    2018-03-01

    We analyze the security of a quantum secure direct communication and authentication protocol based on single photons. We first give an impersonation attack on the protocol. The cryptanalysis shows that there is a gap in the authentication procedure of the protocol so that an opponent can reveal the secret information by an undetectable attempt. We then propose an improvement for the protocol and show it closes the gap by applying a mutual authentication procedure. In the improved protocol single photons are transmitted once in a session, so it is easy to implement as the primary protocol. Furthermore, we use a novel technique for secret order rearrangement of photons by which not only quantum storage is eliminated also a secret key can be reused securely. So the new protocol is applicable in practical approaches like embedded system devices.

  18. The interventional effect of new drugs combined with the Stupp protocol on glioblastoma: A network meta-analysis.

    Science.gov (United States)

    Li, Mei; Song, Xiangqi; Zhu, Jun; Fu, Aijun; Li, Jianmin; Chen, Tong

    2017-08-01

    New therapeutic agents in combination with the standard Stupp protocol (a protocol about the temozolomide combined with radiotherapy treatment with glioblastoma was research by Stupp R in 2005) were assessed to evaluate whether they were superior to the Stupp protocol alone, to determine the optimum treatment regimen for patients with newly diagnosed glioblastoma. We implemented a search strategy to identify studies in the following databases: PubMed, Cochrane Library, EMBASE, CNKI, CBM, Wanfang, and VIP, and assessed the quality of extracted data from the trials included. Statistical software was used to perform network meta-analysis. The use of novel therapeutic agents in combination with the Stupp protocol were all shown to be superior than the Stupp protocol alone for the treatment of newly diagnosed glioblastoma, ranked as follows: cilengitide 2000mg/5/week, bevacizumab in combination with irinotecan, nimotuzumab, bevacizumab, cilengitide 2000mg/2/week, cytokine-induced killer cell immunotherapy, and the Stupp protocol. In terms of serious adverse effects, the intervention group showed a 29% increase in the incidence of adverse events compared with the control group (patients treated only with Stupp protocol) with a statistically significant difference (RR=1.29; 95%CI 1.17-1.43; P<0.001). The most common adverse events were thrombocytopenia, lymphopenia, neutropenia, pneumonia, nausea, and vomiting, none of which were significantly different between the groups except for neutropenia, pneumonia, and embolism. All intervention drugs evaluated in our study were superior to the Stupp protocol alone when used in combination with it. However, we could not conclusively confirm whether cilengitide 2000mg/5/week was the optimum regime, as only one trial using this protocol was included in our study. Copyright © 2017. Published by Elsevier B.V.

  19. Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols

    International Nuclear Information System (INIS)

    Gerber, Naamit Kurshan; Wexler, Leonard H.; Singer, Samuel; Alektiar, Kaled M.; Keohan, Mary Louise; Shi, Weiji; Zhang, Zhigang; Wolden, Suzanne

    2013-01-01

    Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low risk, 61 (44%) at intermediate risk, and 44 (32%) at high risk. Forty-six percent were treated on or according to a prospective RMS protocol. The 5-year rate of overall survival (OS) was 45% for patients with nonmetastatic disease. The failure rates at 5 years for patients with nonmetastatic disease were 34% for local failure and 42% for distant failure. Among patients with nonmetastatic disease (n=94), significant factors associated with OS were histologic diagnosis, site, risk group, age, and protocol treatment. On multivariate analysis, risk group and protocol treatment were significant after adjustment for age. The 5-year OS was 54% for protocol patients versus 36% for nonprotocol patients. Conclusions: Survival in adult patients with nonmetastatic disease was significantly improved for those treated on RMS protocols, most of which are now open to adults

  20. Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Gerber, Naamit Kurshan [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wexler, Leonard H. [Department of Pediatrics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Singer, Samuel [Department of Surgery, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Alektiar, Kaled M. [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Keohan, Mary Louise [Department of Medicine, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Shi, Weiji; Zhang, Zhigang [Department of Epidemiology and Biostatistics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wolden, Suzanne, E-mail: woldens@mskcc.org [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)

    2013-05-01

    Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low risk, 61 (44%) at intermediate risk, and 44 (32%) at high risk. Forty-six percent were treated on or according to a prospective RMS protocol. The 5-year rate of overall survival (OS) was 45% for patients with nonmetastatic disease. The failure rates at 5 years for patients with nonmetastatic disease were 34% for local failure and 42% for distant failure. Among patients with nonmetastatic disease (n=94), significant factors associated with OS were histologic diagnosis, site, risk group, age, and protocol treatment. On multivariate analysis, risk group and protocol treatment were significant after adjustment for age. The 5-year OS was 54% for protocol patients versus 36% for nonprotocol patients. Conclusions: Survival in adult patients with nonmetastatic disease was significantly improved for those treated on RMS protocols, most of which are now open to adults.

  1. Communicating systems with UML 2 modeling and analysis of network protocols

    CERN Document Server

    Barrera, David Garduno

    2013-01-01

    This book gives a practical approach to modeling and analyzing communication protocols using UML 2. Network protocols are always presented with a point of view focusing on partial mechanisms and starting models. This book aims at giving the basis needed for anybody to model and validate their own protocols. It follows a practical approach and gives many examples for the description and analysis of well known basic network mechanisms for protocols.The book firstly shows how to describe and validate the main protocol issues (such as synchronization problems, client-server interactions, layer

  2. A Selective-Awakening MAC Protocol for Energy-Efficient Data Forwarding in Linear Sensor Networks

    Directory of Open Access Journals (Sweden)

    Iclia Villordo-Jimenez

    2018-01-01

    Full Text Available We introduce the Selective-Awakening MAC (SA-MAC protocol which is a synchronized duty-cycled protocol with pipelined scheduling for Linear Sensor Networks (LSNs. In the proposed protocol, nodes selectively awake depending on node density and traffic load conditions and on the state of the buffers of the receiving nodes. In order to characterize the performance of the proposed protocol, we present a Discrete-Time Markov Chain-based analysis that is validated through extensive discrete-event simulations. Our results show that SA-MAC significantly outperforms previous proposals in terms of energy consumption, throughput, and packet loss probability. This is particularly true under high node density and high traffic load conditions, which are expected to be common scenarios in the context of IoT applications. We also present an analysis by grade (i.e., the number of hops to the sink, which is located at one end of the LSN that reveals that LSNs exhibit heterogeneous performance depending on the nodes’ grade. Such results can be used as a design guideline for future LSN implementations.

  3. Improving active Mealy machine learning for protocol conformance testing

    NARCIS (Netherlands)

    Aarts, F.; Kuppens, H.; Tretmans, J.; Vaandrager, F.; Verwer, S.

    2014-01-01

    Using a well-known industrial case study from the verification literature, the bounded retransmission protocol, we show how active learning can be used to establish the correctness of protocol implementation I relative to a given reference implementation R. Using active learning, we learn a model M

  4. Energy-Aware RFID Anti-Collision Protocol.

    Science.gov (United States)

    Arjona, Laura; Simon, Hugo Landaluce; Ruiz, Asier Perallos

    2018-06-11

    The growing interest in mobile devices is transforming wireless identification technologies. Mobile and battery-powered Radio Frequency Identification (RFID) readers, such as hand readers and smart phones, are are becoming increasingly attractive. These RFID readers require energy-efficient anti-collision protocols to minimize the tag collisions and to expand the reader's battery life. Furthermore, there is an increasing interest in RFID sensor networks with a growing number of RFID sensor tags. Thus, RFID application developers must be mindful of tag anti-collision protocols. Energy-efficient protocols involve a low reader energy consumption per tag. This work presents a thorough study of the reader energy consumption per tag and analyzes the main factor that affects this metric: the frame size update strategy. Using the conclusion of this analysis, the anti-collision protocol Energy-Aware Slotted Aloha (EASA) is presented to decrease the energy consumption per tag. The frame size update strategy of EASA is configured to minimize the energy consumption per tag. As a result, EASA presents an energy-aware frame. The performance of the proposed protocol is evaluated and compared with several state of the art Aloha-based anti-collision protocols based on the current RFID standard. Simulation results show that EASA, with an average of 15 mJ consumed per tag identified, achieves a 6% average improvement in the energy consumption per tag in relation to the strategies of the comparison.

  5. Peak oxygen uptake in a sprint interval testing protocol vs. maximal oxygen uptake in an incremental testing protocol and their relationship with cross-country mountain biking performance.

    Science.gov (United States)

    Hebisz, Rafał; Hebisz, Paulina; Zatoń, Marek; Michalik, Kamil

    2017-04-01

    In the literature, the exercise capacity of cyclists is typically assessed using incremental and endurance exercise tests. The aim of the present study was to confirm whether peak oxygen uptake (V̇O 2peak ) attained in a sprint interval testing protocol correlates with cycling performance, and whether it corresponds to maximal oxygen uptake (V̇O 2max ) determined by an incremental testing protocol. A sample of 28 trained mountain bike cyclists executed 3 performance tests: (i) incremental testing protocol (ITP) in which the participant cycled to volitional exhaustion, (ii) sprint interval testing protocol (SITP) composed of four 30 s maximal intensity cycling bouts interspersed with 90 s recovery periods, (iii) competition in a simulated mountain biking race. Oxygen uptake, pulmonary ventilation, work, and power output were measured during the ITP and SITP with postexercise blood lactate and hydrogen ion concentrations collected. Race times were recorded. No significant inter-individual differences were observed in regards to any of the ITP-associated variables. However, 9 individuals presented significantly increased oxygen uptake, pulmonary ventilation, and work output in the SITP compared with the remaining cyclists. In addition, in this group of 9 cyclists, oxygen uptake in SITP was significantly higher than in ITP. After the simulated race, this group of 9 cyclists achieved significantly better competition times (99.5 ± 5.2 min) than the other cyclists (110.5 ± 6.7 min). We conclude that mountain bike cyclists who demonstrate higher peak oxygen uptake in a sprint interval testing protocol than maximal oxygen uptake attained in an incremental testing protocol demonstrate superior competitive performance.

  6. Evaluation of an adult insulin infusion protocol at an academic medical center.

    Science.gov (United States)

    Petrov, Katerina I; Burns, Tammy L; Drincic, Andjela

    2012-05-01

    Acknowledging evidence of possible detrimental effects of tightly controlled blood glucose levels, the American Association of Clinical Endocrinologists and the American Diabetes Association published a consensus statement recommending less strict control for most diabetic patients. As a result of these recommendations, our academic center at Creighton University Medical Center revised its adult insulin infusion protocol to target blood glucose levels ranging from 120 to 180 mg/dL for regular (standard) glycemic control and 80 to 120 mg/dL for tight control; previous targets had ranged from 80 to 180 mg/dL and 70 to 110 mg/dL, respectively. The primary objective was to evaluate the time that blood glucose values were within the target range for patients receiving the new protocol, compared with patients receiving the previous protocol. Our study was designed to evaluate the effectiveness and safety of the revised protocol. Using a retrospective chart review, we collected data for 4 months from patients on the old insulin protocol (May to August 2009) and for 4 months from patients on the new protocol (September to December 2009). Secondary endpoints included the number of hypoglycemic episodes (blood glucose below 70 mg/dL) and severe hypoglycemic episodes (blood glucose 40 mg/dL or lower) experienced by patients receiving the new insulin protocol compared with those receiving the former protocol. Patient characteristics were similar at baseline. Blood glucose values stayed within the target range for a significantly shorter time with the new protocol than with the former protocol (44.6% vs. 56.8%, respectively; P protocol. No statistically significant differences in hypoglycemia were observed after the protocol was changed. Hypoglycemia occurred in 31% of the former-protocol patients compared with 18% of the revised-protocol patients. Severe hypoglycemia was experienced by 2.1% of patients on the old protocol and by 3.1% of patients on the new protocol. Rates of

  7. Language, Semantics, and Methods for Security Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico

    events. Methods like strand spaces and the inductive method of Paulson have been designed to support an intensional, event-based, style of reasoning. These methods have successfully tackled a number of protocols though in an ad hoc fashion. They make an informal spring from a protocol to its......-nets. They have persistent conditions and as we show in this thesis, unfold under reasonable assumptions to a more basic kind of nets. We relate SPL-nets to strand spaces and inductive rules, as well as trace languages and event structures so unifying a range of approaches, as well as providing conditions under...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...

  8. RSRP: A Robust Secure Routing Protocol in MANET

    Directory of Open Access Journals (Sweden)

    Sinha Ditipriya

    2014-05-01

    Full Text Available In this paper, we propose a novel algorithm RSRP to build a robust secure routing protocol in mobile ad-hoc networks (MANETs. This algorithm is based on some basic schemes such as RSA_CRT for encryption and decryption of messages; CRT for safety key generation, Shamir’s secret sharing principle for generation of secure routes. Those routes which are free from any malicious node and which belong to the set of disjoint routes between a source-destination pair are considered as probable routes. Shamir’s secret sharing principle is applied on those probable routes to obtain secure routes. Finally, most trustworthy and stable route is selected among those secure routes. Selection of the final route depends on some criteria of the nodes present in a route e.g.: battery power, mobility and trust value. In addition, complexity of key generation is reduced to a large extent by using RSA-CRT instead of RSA. In turn, the routing becomes less expensive and most secure and robust one. Performance of this routing protocol is then compared with non-secure routing protocols (AODV and DSR, secure routing scheme using secret sharing, security routing protocol using ZRP and SEAD depending on basic characteristics of these protocols. All such comparisons show that RSRP shows better performance in terms of computational cost, end-to-end delay and packet dropping in presence of malicious nodes in the MANET, keeping the overhead in terms of control packets same as other secure routing protocols.

  9. Sylvia Plath: a protocol analysis of her last poems.

    Science.gov (United States)

    Leenaars, A A; Wenckstern, S

    1998-01-01

    Personal documents have a significant place in psychological research. Suicide notes, diaries, novels, poems, and so on allow us to better understand the suicidal mind. The works of Sylvia Plath--a poet who killed herself at age 30--are prime examples for such protocol study. This article examines the last 6 months of Plath's poetry, revealing a suicidal malaise. Associating the results to the lives of Cesare Pavese and the case study of Natalie, a Terman-Shneidman subject of the intellectually gifted, the study shows a unit thema that facilitates the process of death. The poems reveal such themes as unbearable pain, loss, and abandonment that likely contributed significantly to death becoming the only solution.

  10. Augmented Quadruple-Phase Contrast Media Administration and Triphasic Scan Protocol Increases Image Quality at Reduced Radiation Dose During Computed Tomography Urography.

    Science.gov (United States)

    Saade, Charbel; Mohamad, May; Kerek, Racha; Hamieh, Nadine; Alsheikh Deeb, Ibrahim; El-Achkar, Bassam; Tamim, Hani; Abdul Razzak, Farah; Haddad, Maurice; Abi-Ghanem, Alain S; El-Merhi, Fadi

    The aim of this article was to investigate the opacification of the renal vasculature and the urogenital system during computed tomography urography by using a quadruple-phase contrast media in a triphasic scan protocol. A total of 200 patients with possible urinary tract abnormalities were equally divided between 2 protocols. Protocol A used the conventional single bolus and quadruple-phase scan protocol (pre, arterial, venous, and delayed), retrospectively. Protocol B included a quadruple-phase contrast media injection with a triphasic scan protocol (pre, arterial and combined venous, and delayed), prospectively. Each protocol used 100 mL contrast and saline at a flow rate of 4.5 mL. Attenuation profiles and contrast-to-noise ratio of the renal arteries, veins, and urogenital tract were measured. Effective radiation dose calculation, data analysis by independent sample t test, receiver operating characteristic, and visual grading characteristic analyses were performed. In arterial circulation, only the inferior interlobular arteries in both protocols showed a statistical significance (P contrast-to-noise ratio than protocol A (protocol B: 22.68 ± 13.72; protocol A: 14.75 ± 5.76; P contrast media and triphasic scan protocol usage increases the image quality at a reduced radiation dose.

  11. An electronic specimen collection protocol schema (eSCPS). Document architecture for specimen management and the exchange of specimen collection protocols between biobanking information systems.

    Science.gov (United States)

    Eminaga, O; Semjonow, A; Oezguer, E; Herden, J; Akbarov, I; Tok, A; Engelmann, U; Wille, S

    2014-01-01

    The integrity of collection protocols in biobanking is essential for a high-quality sample preparation process. However, there is not currently a well-defined universal method for integrating collection protocols in the biobanking information system (BIMS). Therefore, an electronic schema of the collection protocol that is based on Extensible Markup Language (XML) is required to maintain the integrity and enable the exchange of collection protocols. The development and implementation of an electronic specimen collection protocol schema (eSCPS) was performed at two institutions (Muenster and Cologne) in three stages. First, we analyzed the infrastructure that was already established at both the biorepository and the hospital information systems of these institutions and determined the requirements for the sufficient preparation of specimens and documentation. Second, we designed an eSCPS according to these requirements. Finally, a prospective study was conducted to implement and evaluate the novel schema in the current BIMS. We designed an eSCPS that provides all of the relevant information about collection protocols. Ten electronic collection protocols were generated using the supplementary Protocol Editor tool, and these protocols were successfully implemented in the existing BIMS. Moreover, an electronic list of collection protocols for the current studies being performed at each institution was included, new collection protocols were added, and the existing protocols were redesigned to be modifiable. The documentation time was significantly reduced after implementing the eSCPS (5 ± 2 min vs. 7 ± 3 min; p = 0.0002). The eSCPS improves the integrity and facilitates the exchange of specimen collection protocols in the existing open-source BIMS.

  12. Information-theoretic security proof for quantum-key-distribution protocols

    International Nuclear Information System (INIS)

    Renner, Renato; Gisin, Nicolas; Kraus, Barbara

    2005-01-01

    We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found. Using this technique, we investigate a general class of QKD protocols with one-way classical post-processing. We show that, in order to analyze the full security of these protocols, it suffices to consider collective attacks. Indeed, we give new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute. As an illustration of our results, we analyze the Bennett-Brassard 1984, the six-state, and the Bennett 1992 protocols with one-way error correction and privacy amplification. Surprisingly, the performance of these protocols is increased if one of the parties adds noise to the measurement data before the error correction. In particular, this additional noise makes the protocols more robust against noise in the quantum channel

  13. Information-theoretic security proof for quantum-key-distribution protocols

    Science.gov (United States)

    Renner, Renato; Gisin, Nicolas; Kraus, Barbara

    2005-07-01

    We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found. Using this technique, we investigate a general class of QKD protocols with one-way classical post-processing. We show that, in order to analyze the full security of these protocols, it suffices to consider collective attacks. Indeed, we give new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute. As an illustration of our results, we analyze the Bennett-Brassard 1984, the six-state, and the Bennett 1992 protocols with one-way error correction and privacy amplification. Surprisingly, the performance of these protocols is increased if one of the parties adds noise to the measurement data before the error correction. In particular, this additional noise makes the protocols more robust against noise in the quantum channel.

  14. The Protocol of Choice for Treatment of Snake Bite

    Directory of Open Access Journals (Sweden)

    Afshin Mohammad Alizadeh

    2016-01-01

    Full Text Available The aim of the current study is to compare three different methods of treatment of snake bite to determine the most efficient one. To unify the protocol of snake bite treatment in our center, we retrospectively reviewed files of the snake-bitten patients who had been referred to us between 2010 and 2014. They were contacted for follow-up using phone calls. Demographic and on-arrival characteristics, protocol used for treatment (WHO/Haddad/GF, and outcome/complications were evaluated. Patients were entered into one of the protocol groups and compared. Of a total of 63 patients, 56 (89% were males. Five, 19, and 28 patients were managed by Haddad, WHO, or GF protocols, respectively. Eleven patients had fallen into both GF and WHO protocols and were excluded. Serum sickness was significantly more common when WHO protocol was used while 100% of the compartment syndromes and 71% of deformities had been reported after GF protocol. The most important complications were considered to be deformity, compartment syndrome, and amputation and were more frequent after the use of WHO and GF protocols (23.1% versus 76.9%; none in Haddad; P = NS. Haddad protocol seems to be the best for treatment of snake-bitten patients in our region. However, this cannot be strictly concluded because of the limited sample size and nonsignificant P values.

  15. No significant effect of transcranial direct current stimulation (tDCS) found on simple motor reaction time comparing 15 different simulation protocols.

    Science.gov (United States)

    Horvath, Jared Cooney; Carter, Olivia; Forte, Jason D

    2016-10-01

    Research exploring the behavioral impact of transcranial direct current stimulation (tDCS) over M1 has produced homogenous results. The most common explanations to address this homogeneity concerns the differential impact of varied tDCS parameters (such as stimulation intensity or electrode montage). To explore this, we systematically examined the effects of 15 different tDCS protocols on a well-elucidated neurobehavioral system: simple visual motor reaction time (smRT). For the initial phase of this study, 150 healthy participants were randomly assigned to one of 5 experimental groups (2mA anodal, 2mA cathodal, 1mA anodal, 1mA cathodal, or sham) across 3 different conditions (orbitofrontal, bilateral, or extracephalic reference electrode location). The active electrode was always placed over M1 and tDCS lasted for 20min. Starting ~5min prior to stimulation and running continuously for ~30min, participants were repeatedly presented with a visual cue centered on a computer monitor and asked to press a response button as quickly as possible at stimulus onset (stimuli number: 100 pre-, 400 during-, and 100-post stimulation - interstimulus interval: 1-3s). Ex-gaussian distribution curves, miss, and error rates were determined for each normalized batch of 100 RTs and compared using a two-way ANOVA. As the largest group differences were seen with 2mA anodal (compared to sham) stimulation using an orbitofrontal montage, an additional 60 healthy participants were recruited to further test for significance in this condition. No significant impact of tDCS was seen on any parameter of smRT distribution, error rate, or miss rate, regardless of polarity, stimulation intensity, electrode montage, or stimulation-to-task relationship. Our results suggest that tDCS over M1 might not have a predictable or reliable effect on short duration smRT. Our results raise interesting questions regarding the mechanisms by which tDCS might modulate more complex motor behaviors. Additional

  16. Ocean Optics Protocols for Satellite Ocean Color Sensor Validation. Revised

    Science.gov (United States)

    Fargion, Giulietta S.; Mueller, James L.

    2000-01-01

    The document stipulates protocols for measuring bio-optical and radiometric data for the Sensor Intercomparison and Merger for Biological and Interdisciplinary Oceanic Studies (SIMBIOS) Project activities and algorithm development. This document supersedes the earlier version (Mueller and Austin 1995) published as Volume 25 in the SeaWiFS Technical Report Series. This document marks a significant departure from, and improvement on, theformat and content of Mueller and Austin (1995). The authorship of the protocols has been greatly broadened to include experts specializing in some key areas. New chapters have been added to provide detailed and comprehensive protocols for stability monitoring of radiometers using portable sources, abovewater measurements of remote-sensing reflectance, spectral absorption measurements for discrete water samples, HPLC pigment analysis and fluorometric pigment analysis. Protocols were included in Mueller and Austin (1995) for each of these areas, but the new treatment makes significant advances in each topic area. There are also new chapters prescribing protocols for calibration of sun photometers and sky radiance sensors, sun photometer and sky radiance measurements and analysis, and data archival. These topic areas were barely mentioned in Mueller and Austin (1995).

  17. An efficient multi-carrier position-based packet forwarding protocol for wireless sensor networks

    KAUST Repository

    Bader, Ahmed

    2012-01-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. However, as the node density grows, the overhead incurred in the process of relay selection grows significantly. As such, end-to-end performance in terms of energy and latency is adversely impacted. With the motivation of developing a packet forwarding mechanism that is tolerant to variation in node density, an alternative position-based protocol is proposed in this paper. In contrast to existing beaconless protocols, the proposed protocol is designed such that it eliminates the need for potential relays to undergo a relay selection process. Rather, any eligible relay may decide to forward the packet ahead, thus significantly reducing the underlying overhead. The operation of the proposed protocol is empowered by exploiting favorable features of orthogonal frequency division multiplexing (OFDM) at the physical layer. The end-to-end performance of the proposed protocol is evaluated against existing beaconless position-based protocols analytically and as well by means of simulations. The proposed protocol is demonstrated in this paper to be more efficient. In particular, it is shown that for the same amount of energy the proposed protocol transports one bit from source to destination much quicker. © 2012 IEEE.

  18. Eavesdropping on the Bostroem-Filbinger Communication Protocol in Noisy Quantum Channel

    OpenAIRE

    Cai, Qing-yu

    2004-01-01

    We show an eavesdropping scheme on Bostr\\UNICODE{0xf6}m-Felbinger communication protocol (called ping-pong protocol) [Phys. Rev. Lett. 89, 187902 (2002)] in an ideal quantum channel. A measurement attack can be perfectly used to eavesdrop Alice's information instead of a most general quantum operation attack. In a noisy quantum channel, the direct communication is forbidden. We present a quantum key distribution protocol based on the ping-pong protocol, which can be used in a low noisy quantu...

  19. Energy-efficient cooperative protocols for full-duplex relay channels

    KAUST Repository

    Khafagy, Mohammad Galal

    2013-12-01

    In this work, energy-efficient cooperative protocols are studied for full-duplex relaying (FDR) with loopback interference. In these protocols, relay assistance is only sought under certain conditions on the different link outages to ensure effective cooperation. Recently, an energy-efficient selective decode-And-forward protocol was proposed for FDR, and was shown to outperform existing schemes in terms of outage. Here, we propose an incremental selective decode-And-forward protocol that offers additional power savings, while keeping the same outage performance. We compare the performance of the two protocols in terms of the end-to-end signal-to-noise ratio cumulative distribution function via closed-form expressions. Finally, we corroborate our theoretical results with simulation, and show the relative relay power savings in comparison to non-selective cooperation in which the relay cooperates regardless of channel conditions. © 2013 IEEE.

  20. Energy-efficient cooperative protocols for full-duplex relay channels

    KAUST Repository

    Khafagy, Mohammad Galal; Ismail, Amr; Alouini, Mohamed-Slim; Aï ssa, Sonia

    2013-01-01

    In this work, energy-efficient cooperative protocols are studied for full-duplex relaying (FDR) with loopback interference. In these protocols, relay assistance is only sought under certain conditions on the different link outages to ensure effective cooperation. Recently, an energy-efficient selective decode-And-forward protocol was proposed for FDR, and was shown to outperform existing schemes in terms of outage. Here, we propose an incremental selective decode-And-forward protocol that offers additional power savings, while keeping the same outage performance. We compare the performance of the two protocols in terms of the end-to-end signal-to-noise ratio cumulative distribution function via closed-form expressions. Finally, we corroborate our theoretical results with simulation, and show the relative relay power savings in comparison to non-selective cooperation in which the relay cooperates regardless of channel conditions. © 2013 IEEE.

  1. Economic evaluation of an intensive group training protocol compared with usual care physiotherapy in patients with chronic low back pain.

    Science.gov (United States)

    van der Roer, Nicole; van Tulder, Maurits; van Mechelen, Willem; de Vet, Henrica

    2008-02-15

    Economic evaluation from a societal perspective conducted alongside a randomized controlled trial with a follow-up of 52 weeks. To evaluate the cost effectiveness and cost utility of an intensive group training protocol compared with usual care physiotherapy in patients with nonspecific chronic low back pain. The intensive group training protocol combines exercise therapy, back school, and behavioral principles. Two studies found a significant reduction in absenteeism for a graded activity program in occupational health care. This program has not yet been evaluated in a primary care physiotherapy setting. Participating physical therapists in primary care recruited 114 patients with chronic nonspecific low back pain. Eligible patients were randomized to either the protocol group or the guideline group. Outcome measures included functional status (Roland Morris Disability Questionnaire), pain intensity (11-point numerical rating scale), general perceived effect and quality of life (EuroQol-5D). Cost data were measured with cost diaries and included direct and indirect costs related to low back pain. After 52 weeks, the direct health care costs were significantly higher for patients in the protocol group, largely due to the costs of the intervention. The mean difference in total costs amounted to [Euro sign] 233 (95% confidence interval: [Euro sign] -2.185; [Euro sign] 2.764). The cost-effectiveness planes indicated no significant differences in cost effectiveness between the 2 groups. The results of this economic evaluation showed no difference in total costs between the protocol group and the guideline group. The differences in effects were small and not statistically significant. At present, national implementation of the protocol is not recommended.

  2. Comparison of the ultrashort gonadotropin-releasing hormone agonist-antagonist protocol with microdose flare -up protocol in poor responders: a preliminary study.

    Science.gov (United States)

    Berker, Bülent; Duvan, Candan İltemir; Kaya, Cemil; Aytaç, Ruşen; Satıroğlu, Hakan

    2010-01-01

    To determine the potential effect of the ultrashort gonadotropin-releasing hormone (GnRH) agonist/GnRH antagonist protocol versus the microdose GnRH agonist protocol in poor responders undergoing intracytoplasmic sperm injection (ICSI). The patients in the Agonist-Antagonist Group (n=41) were administered the ultrashort GnRH-agonist/ antagonist protocol, while the patients in the Microdose Group (n=41) were stimulated according to the microdose flare-up protocol. The mean number of mature oocytes retrieved was the primary outcome measure. Fertilization rate, implantation rate per embryo and clinical pregnancy rates were secondary outcome measures. There was no differenc between the mean number of mature oocytes retrieved in the two groups. There were also no statistical differences between the two groups in terms of peak serum E2 level, canceled cycles, endometrial thickness on hCG day, number of 2 pronucleus and number of embryos transferred. However, the total gonadotropin consumption and duration of stimulation were significantly higher with the Agonist-Antagonist Group compared with the Microdose Group. The implantation and clinical pregnancy rates were similar between the two groups. Despite the high dose of gonadotropin consumption and longer duration of stimulation with the ultrashort GnRH agonist/ antagonist protocol, it seems that the Agonist-Antagonist Protocol is not inferior to the microdose protocol in poor responders undergoing ICSI.

  3. Robust Multi-unit Auction Protocol against False-name Bids

    Science.gov (United States)

    Yokoo, Makoto; Sakurai, Yuko; Matsubara, Shigeo

    This paper presents a new multi-unit auction protocol (IR protocol) that is robust against false-name bids. Internet auctions have become an integral part of Electronic Commerce and a promising field for applying agent and Artificial Intelligence technologies. Although the Internet provides an excellent infrastructure for executing auctions, the possibility of a new type of cheating called false-name bids has been pointed out. A false-name bid is a bid submitted under a fictitious name. A protocol called LDS has been developed for combinatorial auctions of multiple different items and has proven to be robust against false-name bids. Although we can modify the LDS protocol to handle multi-unit auctions, in which multiple units of an identical item are auctioned, the protocol is complicated and requires the auctioneer to carefully pre-determine the combination of bundles to obtain a high social surplus or revenue. For the auctioneer, our newly developed IR protocol is easier to use than the LDS, since the combination of bundles is automatically determined in a flexible manner according to the declared evaluation values of agents. The evaluation results show that the IR protocol can obtain a better social surplus than that obtained by the LDS protocol.

  4. A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography

    Science.gov (United States)

    Chen, Tien-Ho; Yeh, Hsiu-Lien; Liu, Pin-Chuan; Hsiang, Han-Chen; Shih, Wei-Kuan

    Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.

  5. Optimizing the high-resolution manometry (HRM) study protocol.

    Science.gov (United States)

    Patel, A; Ding, A; Mirza, F; Gyawali, C P

    2015-02-01

    Intolerance of the esophageal manometry catheter may prolong high-resolution manometry (HRM) studies and increase patient distress. We assessed the impact of obtaining the landmark phase at the end of the study when the patient has acclimatized to the HRM catheter. 366 patients (mean age 55.4 ± 0.8 years, 62.0% female) undergoing esophageal HRM over a 1-year period were studied. The standard protocol consisted of the landmark phase, 10 5 mL water swallows 20-30 s apart, and multiple rapid swallows where 4-6 2 mL swallows were administered in rapid succession. The modified protocol consisted of the landmark phase at the end of the study after test swallows. Study duration, technical characteristics, indications, and motor findings were compared between standard and modified protocols. Of the 366 patients, 89.6% underwent the standard protocol (study duration 12.9 ± 0.3 min). In 10.4% with poor catheter tolerance undergoing the modified protocol, study duration was significantly longer (15.6 ± 1.0 min, p = 0.004) despite similar duration of study maneuvers. Only elevated upper esophageal sphincter basal pressures at the beginning of the study segregated modified protocol patients. The 95th percentile time to landmark phase in the standard protocol patients was 6.1 min; as many as 31.4% of modified protocol patients could not obtain their first study maneuver within this period (p = 0.0003). Interpretation was not impacted by shifting the landmark phase to the end of the study. Modification of the HRM study protocol with the landmark phase obtained at the end of the study optimizes study duration without compromising quality. © 2014 John Wiley & Sons Ltd.

  6. A quantum secret-sharing protocol with fairness

    International Nuclear Information System (INIS)

    Liu, Feng; Qin, Su-Juan; Wen, Qiao-Yan

    2014-01-01

    A quantum secret-sharing (QSS) protocol consists of two main phases, called sharing and reconstruction. In the first phase, the dealer selects a secret, divides it into several shares, and sends each participant its share securely with a quantum channel. In the second phase, the participants run an interactive protocol in order to reconstruct the secret. If the participants can communicate via a broadcast channel, they can show their shares and learn the secrets simultaneously. So what happens if the channel is not simultaneous? In this paper, we propose a QSS protocol with cheaters by using partially and maximally entangled states. A secure and fair reconstruction mechanism is designed, in a way that each participant can learn or cannot learn the secret simultaneously. (papers)

  7. Dynamic Channel Slot Allocation Scheme and Performance Analysis of Cyclic Quorum Multichannel MAC Protocol

    Directory of Open Access Journals (Sweden)

    Xing Hu

    2017-01-01

    Full Text Available In high diversity node situation, multichannel MAC protocol can improve the frequency efficiency, owing to fewer collisions compared with single-channel MAC protocol. And the performance of cyclic quorum-based multichannel (CQM MAC protocol is outstanding. Based on cyclic quorum system and channel slot allocation, it can avoid the bottleneck that others suffered from and can be easily realized with only one transceiver. To obtain the accurate performance of CQM MAC protocol, a Markov chain model, which combines the channel-hopping strategy of CQM protocol and IEEE 802.11 distributed coordination function (DCF, is proposed. The results of numerical analysis show that the optimal performance of CQM protocol can be obtained in saturation bound situation. And then we obtain the saturation bound of CQM system by bird swarm algorithm. In addition, to improve the performance of CQM protocol in unsaturation situation, a dynamic channel slot allocation of CQM (DCQM protocol is proposed, based on wavelet neural network. Finally, the performance of CQM protocol and DCQM protocol is simulated by Qualnet platform. And the simulation results show that the analytic and simulation results match very well; the DCQM performs better in unsaturation situation.

  8. A mechanical protocol to replicate impact in walking footwear.

    Science.gov (United States)

    Price, Carina; Cooper, Glen; Graham-Smith, Philip; Jones, Richard

    2014-01-01

    Impact testing is undertaken to quantify the shock absorption characteristics of footwear. The current widely reported mechanical testing method mimics the heel impact in running and therefore applies excessive energy to walking footwear. The purpose of this study was to modify the ASTM protocol F1614 (Procedure A) to better represent walking gait. This was achieved by collecting kinematic and kinetic data while participants walked in four different styles of walking footwear (trainer, oxford shoe, flip-flop and triple-density sandal). The quantified heel-velocity and effective mass at ground-impact were then replicated in a mechanical protocol. The kinematic data identified different impact characteristics in the footwear styles. Significantly faster heel velocity towards the floor was recorded walking in the toe-post sandals (flip-flop and triple-density sandal) compared with other conditions (e.g. flip-flop: 0.36±0.05 ms(-1) versus trainer: 0.18±0.06 ms(-1)). The mechanical protocol was adapted by altering the mass and drop height specific to the data captured for each shoe (e.g. flip-flop: drop height 7 mm, mass 16.2 kg). As expected, the adapted mechanical protocol produced significantly lower peak force and accelerometer values than the ASTM protocol (pfootwear style specific. Copyright © 2014 Elsevier B.V. All rights reserved.

  9. Adherence to, and outcomes of, a galactomannan screening protocol in high-risk hematology patients.

    Science.gov (United States)

    Harricharan, S; Biederman, K; Bombassaro, A M; Lazo-Langner, A; Elsayed, S; Fulford, A; Delport, J A; Xenocostas, A

    2018-04-01

    A twice-weekly galactomannan (gm) screening protocol was implemented in high-risk hematology inpatients. Study objectives were to determine adherence to the protocol, use of selected resources, and patient outcomes. This retrospective cohort study compared outcomes of interest before and after implementation of gm screening. Adults undergoing matched related allogeneic hematopoietic stem-cell transplantation or induction chemotherapy for acute leukemia were eligible. Patients could be enrolled more than once and were evaluated as episodes. Adherence to the gm protocol was assessed in post-implementation episodes. Use of broad-spectrum antifungals (bsafs), consultations (infectious diseases, respirology), and diagnostic procedures (computed tomography imaging, bronchoalveolar lavage) were compared between phases, as were the patient outcomes of all-cause mortality and clinical success (alive and not taking a bsaf). Of 182 episodes consecutively screened, 70 per phase were enrolled. Clinical characteristics and duration of assessment were similar for the phases. Full or partial adherence to the protocol was observed in 61 post-implementation episodes (87%), with full adherence in 40 episodes (57%). More episodes in the pre-implementation phase than in the post-implementation phase involved receipt of bsafs, consultations, and diagnostics (27% vs. 7%, p = 0.02; 46% vs. 26%, p = 0.014; and 46% vs. 31%, p = 0.083 respectively). Although mortality was similar in the two phases, clinical success at the final assessment was observed in fewer pre-implementation than post-implementation episodes (79% vs. 98%, p < 0.001). Implementation of a gm screening protocol was feasible and associated with significantly fewer episodes involving receipt of bsafs and consultations, and with significantly more episodes showing clinical success.

  10. Fungal communities in wheat grain show significant co-existence patterns among species

    DEFF Research Database (Denmark)

    Nicolaisen, M.; Justesen, A. F.; Knorr, K.

    2014-01-01

    identified as ‘core’ OTUs as they were found in all or almost all samples and accounted for almost 99 % of all sequences. The remaining OTUs were only sporadically found and only in small amounts. Cluster and factor analyses showed patterns of co-existence among the core species. Cluster analysis grouped...... the 21 core OTUs into three clusters: cluster 1 consisting of saprotrophs, cluster 2 consisting mainly of yeasts and saprotrophs and cluster 3 consisting of wheat pathogens. Principal component extraction showed that the Fusarium graminearum group was inversely related to OTUs of clusters 1 and 2....

  11. Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment (Extended Version)

    DEFF Research Database (Denmark)

    Almousa, Omar; Mödersheim, Sebastian Alexander; Modesti, Paolo

    We integrate, and improve upon, prior relative soundness results of two kinds. The first kind are typing results showing that if any security protocol that fulfils a number of sufficient conditions has an attack then it has a well-typed attack. The second kind considers the parallel composition o...... of protocols, showing that when running two protocols in parallel allows for an attack, then at least one of the protocols has an attack in isolation. The most important generalization over previous work is the support for all security properties of the geometric fragment.......We integrate, and improve upon, prior relative soundness results of two kinds. The first kind are typing results showing that if any security protocol that fulfils a number of sufficient conditions has an attack then it has a well-typed attack. The second kind considers the parallel composition...

  12. Evaluating Protocol Lifecycle Time Intervals in HIV/AIDS Clinical Trials

    Science.gov (United States)

    Schouten, Jeffrey T.; Dixon, Dennis; Varghese, Suresh; Cope, Marie T.; Marci, Joe; Kagan, Jonathan M.

    2014-01-01

    Background Identifying efficacious interventions for the prevention and treatment of human diseases depends on the efficient development and implementation of controlled clinical trials. Essential to reducing the time and burden of completing the clinical trial lifecycle is determining which aspects take the longest, delay other stages, and may lead to better resource utilization without diminishing scientific quality, safety, or the protection of human subjects. Purpose In this study we modeled time-to-event data to explore relationships between clinical trial protocol development and implementation times, as well as identify potential correlates of prolonged development and implementation. Methods We obtained time interval and participant accrual data from 111 interventional clinical trials initiated between 2006 and 2011 by NIH’s HIV/AIDS Clinical Trials Networks. We determined the time (in days) required to complete defined phases of clinical trial protocol development and implementation. Kaplan-Meier estimates were used to assess the rates at which protocols reached specified terminal events, stratified by study purpose (therapeutic, prevention) and phase group (pilot/phase I, phase II, and phase III/ IV). We also examined several potential correlates to prolonged development and implementation intervals. Results Even though phase grouping did not determine development or implementation times of either therapeutic or prevention studies, overall we observed wide variation in protocol development times. Moreover, we detected a trend toward phase III/IV therapeutic protocols exhibiting longer developmental (median 2 ½ years) and implementation times (>3years). We also found that protocols exceeding the median number of days for completing the development interval had significantly longer implementation. Limitations The use of a relatively small set of protocols may have limited our ability to detect differences across phase groupings. Some timing effects

  13. Performance analysis of routing protocols for IoT

    Science.gov (United States)

    Manda, Sridhar; Nalini, N.

    2018-04-01

    Internet of Things (IoT) is an arrangement of advancements that are between disciplinary. It is utilized to have compelling combination of both physical and computerized things. With IoT physical things can have personal virtual identities and participate in distributed computing. Realization of IoT needs the usage of sensors based on the sector for which IoT is integrated. For instance, in healthcare domain, IoT needs to have integration with wearable sensors used by patients. As sensor devices produce huge amount of data, often called big data, there should be efficient routing protocols in place. To the extent remote systems is worried there are some current protocols, for example, OLSR, DSR and AODV. It additionally tosses light into Trust based routing protocol for low-power and lossy systems (TRPL) for IoT. These are broadly utilized remote directing protocols. As IoT is developing round the corner, it is basic to investigate routing protocols that and evaluate their execution regarding throughput, end to end delay, and directing overhead. The execution experiences can help in settling on very much educated choices while incorporating remote systems with IoT. In this paper, we analyzed different routing protocols and their performance is compared. It is found that AODV showed better performance than other routing protocols aforementioned.

  14. Cluster protocols in Underwater Sensor Networks: a Research Review

    Directory of Open Access Journals (Sweden)

    K. Ovaliadis

    2014-07-01

    Full Text Available Underwater Wireless Sensor Networks (UWSN have different characteristics in relation to terrestrial wireless sensor networks; such as limited bandwidth capacity, high propagation delays and limited battery power. Although there has been much work completed in developing protocols and models for terrestrial networks, these are rarely applicable for underwater sensor networks. Up to today major efforts have been made for designing efficient protocols while considering the underwater communication characteristics. An important issue on this research area is the construction of an efficient clustering algorithm. Clustering in the context of UWSN is important as it contributes a great deal towards the efficient use of energy resources. This paper reviews the most significant cluster based protocols proposed for UWSN. Major performance issues of these protocols with respect to the network conditions such as packet delivery ratio, average packet delay, node mobility effect and energy consumption are examined. The advantages and disadvantages of each protocol are also pointed out.

  15. The impact of protocol on nurses' role stress: a longitudinal perspective.

    Science.gov (United States)

    Dodd-McCue, Diane; Tartaglia, Alexander; Veazey, Kenneth W; Streetman, Pamela S

    2005-04-01

    The study examined the impact of a protocol directed at increasing organ donation on the role stress and work attitudes of critical care nurses involved in potential organ donation cases. The research examined whether the protocol could positively affect nurses' perceptions of role stress, and if so, could the work environment improvements be sustained over time. The Family Communication Coordinator (FCC) protocol promotes effective communication during potential organ donation cases using a multidisciplinary team approach. Previous research found it associated with improved donation outcomes and with improved perceptions of role stress by critical care nurses. However, the previous study lacked methodological rigor necessary to determine causality and sustainability over time. The study used a quasi-experimental prospective longitudinal design. The sample included critical care nurses who had experience with potential organ donation cases with the protocol. Survey data were collected at 4 points over 2 years. Surveys used previously validated and reliable measures of role stress (role ambiguity, role conflict, role overload) and work attitudes (commitment, satisfaction). Interviews supplemented these data. The nurses' perceptions of role stress associated with potential organ donation cases dramatically dropped after the protocol was implemented. All measures of role stress, particularly role ambiguity and role conflict, showed statistically significant and sustained improvement. Nurses' professional, unit, and hospital commitment and satisfaction reflect an increasingly positive workplace. The results demonstrate that the FCC protocol positively influenced the workplace through its impact on role stress over the first 2 years following its implementation. The findings suggest that similar protocols may be appropriate in improving the critical care environment by reducing the stress and uncertainty of professionals involved in other end-of-life situations. However

  16. Nursing Music Protocol and Postoperative Pain.

    Science.gov (United States)

    Poulsen, Michael J; Coto, Jeffrey

    2018-04-01

    Pain has always been a major concern for patients and nurses during the postoperative period. Therapies, medicines, and protocols have been developed to improve pain and anxiety but have undesirable risks to the patient. Complementary and alternative medicine therapies have been studied but have not been applied as regular protocols in the hospital setting. Music is one type of complementary and alternative medicine therapy that has been reported to have favorable results on reducing postoperative pain, anxiety, and opioid usage. However, music lacks a protocol that nurses can implement during the perioperative process. This paper is an in-depth literature review assessing a best practice recommendation and protocol that establishes a consensus in the use of music therapy. The results suggest that music therapy may consist of calming, soft tones of 60-80 beats per minute for at least 15-30 minutes at least twice daily during the pre- and postoperative periods. It is suggested that music only be used in conjunction with standards of care and not as the primary intervention of pain or anxiety. This evidence suggests that proper use of music therapy can significantly reduce surgical pain. Implementing these protocols and allowing the freedom of nursing staff to use them may lead to greater reductions in surgical pain and anxiety and a reduction in opioid use. Copyright © 2017 American Society for Pain Management Nursing. Published by Elsevier Inc. All rights reserved.

  17. The Impact of Firefighter Personal Protective Equipment and Treadmill Protocol on Maximal Oxygen Uptake

    Science.gov (United States)

    Lee, Joo-Young; Bakri, Ilham; Kim, Jung-Hyun; Son, Su-Young; Tochihara, Yutaka

    2015-01-01

    This study investigated the effects of firefighter personal protective equipment (PPE) on the determination of maximal oxygen uptake (VO2max) while using two different treadmill protocols: a progressive incline protocol (PIP) and a progressive speed protocol (PSP), with three clothing conditions (Light-light clothing; Boots-PPE with rubber boots; Shoes-PPE with running shoes). Bruce protocol with Light was performed for a reference test. Results showed there was no difference in VO2max between Bruce Light, PIP Light, and PSP Light. However, VO2max was reduced in Boots and Shoes with shortened maximal performance time (7 and 6 min reduced for PIP Boots and Shoes, respectively; 11 and 9 min reduced for PSP Boots and Shoes, respectively), whereas the increasing rate of VO2 in Boots and Shoes during submaximal exercise was greater compared with Light. Wearing firefighter boots compared with wearing running shoes also significantly affected submaximal VO2 but not VO2max. These results suggest that firefighters’ maximal performance determined from a typical VO2max test without wearing PPE may overestimate the actual performance capability of firefighters wearing PPE. PMID:23668854

  18. Study of accent-based music speech protocol development for improving voice problems in stroke patients with mixed dysarthria.

    Science.gov (United States)

    Kim, Soo Ji; Jo, Uiri

    2013-01-01

    Based on the anatomical and functional commonality between singing and speech, various types of musical elements have been employed in music therapy research for speech rehabilitation. This study was to develop an accent-based music speech protocol to address voice problems of stroke patients with mixed dysarthria. Subjects were 6 stroke patients with mixed dysarthria and they received individual music therapy sessions. Each session was conducted for 30 minutes and 12 sessions including pre- and post-test were administered for each patient. For examining the protocol efficacy, the measures of maximum phonation time (MPT), fundamental frequency (F0), average intensity (dB), jitter, shimmer, noise to harmonics ratio (NHR), and diadochokinesis (DDK) were compared between pre and post-test and analyzed with a paired sample t-test. The results showed that the measures of MPT, F0, dB, and sequential motion rates (SMR) were significantly increased after administering the protocol. Also, there were statistically significant differences in the measures of shimmer, and alternating motion rates (AMR) of the syllable /K$\\inve$/ between pre- and post-test. The results indicated that the accent-based music speech protocol may improve speech motor coordination including respiration, phonation, articulation, resonance, and prosody of patients with dysarthria. This suggests the possibility of utilizing the music speech protocol to maximize immediate treatment effects in the course of a long-term treatment for patients with dysarthria.

  19. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  20. A standardised protocol for texture feature analysis of endoscopic images in gynaecological cancer

    Directory of Open Access Journals (Sweden)

    Pattichis Marios S

    2007-11-01

    approximations to the original images. Within the proposed protocol, for human ROIs, we have found that there is a large number of texture features that showed significant differences between normal and abnormal endometrium. Conclusion This study provides a standardized protocol for avoiding any significant texture feature differences that may arise due to variability in the acquisition procedure or the lack of color correction. After applying the protocol, we have found that significant differences in texture features will only be due to the fact that the features were extracted from different types of tissue (normal vs abnormal.

  1. Quantum protocols within Spekkens' toy model

    Science.gov (United States)

    Disilvestro, Leonardo; Markham, Damian

    2017-05-01

    Quantum mechanics is known to provide significant improvements in information processing tasks when compared to classical models. These advantages range from computational speedups to security improvements. A key question is where these advantages come from. The toy model developed by Spekkens [R. W. Spekkens, Phys. Rev. A 75, 032110 (2007), 10.1103/PhysRevA.75.032110] mimics many of the features of quantum mechanics, such as entanglement and no cloning, regarded as being important in this regard, despite being a local hidden variable theory. In this work, we study several protocols within Spekkens' toy model where we see it can also mimic the advantages and limitations shown in the quantum case. We first provide explicit proofs for the impossibility of toy bit commitment and the existence of a toy error correction protocol and consequent k -threshold secret sharing. Then, defining a toy computational model based on the quantum one-way computer, we prove the existence of blind and verified protocols. Importantly, these two last quantum protocols are known to achieve a better-than-classical security. Our results suggest that such quantum improvements need not arise from any Bell-type nonlocality or contextuality, but rather as a consequence of steering correlations.

  2. Longer repetition duration increases muscle activation and blood lactate response in matched resistance training protocols

    Directory of Open Access Journals (Sweden)

    Hugo Cesar Martins-Costa

    2016-03-01

    Full Text Available Abstract This study analyzed the effect of different repetition durations on electromyographic and blood lactate responses of the bench press exercise. Fifteen recreationally trained male volunteers completed two training protocols, matched for intensity (% one-repetition maximum; 1RM, number of sets, number of repetitions, and rest intervals. One of the protocols was performed with a repetition duration of 4 s (2 s concentric: 2 s eccentric; 2:2 protocol, whereas the second protocol had a repetition duration of 6 s (2 s concentric: 4 s eccentric; 2:4 protocol. The results showed higher normalized integrated electromyography (pectoralis major and triceps brachii for the 2:4 protocol. Blood lactate concentration was also higher in the 2:4 protocol across all sets. These results show that adding 2 s to the eccentric action in matched training protocols increases muscle activation and blood lactate response, which reinforces the notion that increasing repetition duration is an alternative load progression in resistance training.

  3. Privacy-Preserving Meter Report Protocol of Isolated Smart Grid Devices

    Directory of Open Access Journals (Sweden)

    Zhiwei Wang

    2017-01-01

    Full Text Available Smart grid aims to improve the reliability, efficiency, and security of the traditional grid, which allows two-way transmission and efficiency-driven response. However, a main concern of this new technique is that the fine-grained metering data may leak the personal privacy information of the customers. Thus, the data aggregation mechanism for privacy protection is required for the meter report protocol in smart grid. In this paper, we propose an efficient privacy-preserving meter report protocol for the isolated smart grid devices. Our protocol consists of an encryption scheme with additively homomorphic property and a linearly homomorphic signature scheme, where the linearly homomorphic signature scheme is suitable for privacy-preserving data aggregation. We also provide security analysis of our protocol in the context of some typical attacks in smart grid. The implementation of our protocol on the Intel Edison platform shows that our protocol is efficient enough for the physical constrained devices, like smart meters.

  4. Effects of surface-finishing protocols on the roughness, color change, and translucency of different ceramic systems.

    Science.gov (United States)

    Akar, Gülcan Coşkun; Pekkan, Gürel; Çal, Ebru; Eskitaşçıoğlu, Gürcan; Özcan, Mutlu

    2014-08-01

    Surface-finishing protocols have a mechanical impact on ceramic surfaces that could eventually affect surface topography and light scattering. An optimum protocol is needed to avoid damaging the optical properties of ceramics. The purpose of this study was to determine the effects of different surface-finishing protocols on the surface roughness, color change, and translucency of ceramic and metal ceramic restorations. Standardized disk-shaped specimens (1.5 × 10 mm, n=128) were fabricated from 3 different ceramic core materials (aluminum oxide [Al2O3]-AL, zirconium oxide [ZrO2]-ZR, lithium disilicate [Li2Si2O5]-LIT), veneered (V) with dentin ceramics (n=32 per group), and placed in the following groups: ALV, ZRV, and LITV. The metal ceramic group acted as the control (n=32). Four different surface-finishing methods were tested. Airborne-particle abrasion with 50 μm Al2O3, polishing with adjustment kit, polishing with adjustment kit plus diamond polishing paste, and autoglazing (n=8 subgroup) were applied on the veneering ceramics. The specimens were analyzed with a profilometer for surface roughness, and color change and translucency were measured with a clinical spectrophotometer. Statistical analyses were performed with 1-way ANOVA and the Tukey honest significant difference tests (α=.05). Specimens treated with the airborne particle abrasion method showed significantly higher mean profilometer for surface roughness values in all groups (P.05). With the diamond polishing paste method, lower surface roughness values were achieved in the ZRV and metal ceramic groups acted as the control groups. Different surface-finishing methods affected the color change of the ceramic systems, except for ZRV. Surface-finishing protocols significantly affected the translucency values of the ALV, LITV, and metal ceramic groups (Pceramics tested. The airborne-particle abrasion protocol created rougher surfaces and decreased translucency, and color change in zirconia was not

  5. Improved detection of fill-in using sublingual nitroglycerin in technetium-99m tetrofosmin exercise/rest single photon emission computed tomography one day protocol for old myocardial infarction

    International Nuclear Information System (INIS)

    Miyanaga, Hajime; Kunieda, Yasufumi; Oguni, Atsuhiko; Kamitani, Tadaaki; Kawasaki, Shingo; Takahashi, Toru

    1999-01-01

    Twenty-one patients with old myocardial infarction underwent repeated 99m Tc-tetrofosmin ( 99m Tc) exercise/rest same day protocols with and without the administration of sublingual nitroglycerin (NTG) 5 min before the second injection of 99m Tc for rest SPECT. Twelve of these patients also underwent ordinary exercise/redistribution 201 Tl SPECT. The control study protocol images showed decreased uptake of 99m Tc on exercise in 157 of 420 segments and the presence of fill-in at rest in 58 segments. Images obtained with administration of NTG showed decreased uptake of 99m Tc on exercise in 163 of 420 segments and fill-in in 74 segments at rest. The frequency of fill-in was greater in the NTG protocol than in the control protocol. The segments were scored as different grades according to 99m Tc uptake between 2 protocols. Fill-in was only present or more remarkable in 31 segments in the NTG protocol than in the control protocol. Fill-in was only present or more remarkable in 10 segments in the control protocol than in the NTG protocol. In the NTG protocol, the mean defect score of the exercise images, calculated from the bull's eye image automatically, was higher than that of the rest images. The mean severity score of the exercise images, also calculated from the bull's eye image automatically, was likewise higher than that of the rest images, whereas the mean severity score of the stress images and rest images in the control protocol was not significantly different. Moreover, the mean defect score and severity score of the rest images from the NTG protocol were significantly lower than those obtained from the control protocol. Sublingual NTG administration before the injection of 99m Tc-tetrofosmin at the rest study in the one day exercise/rest studies enhanced fill-in, so may enhance the detection of viable myocardium, allowing more informed decisions regarding cardiac revascularization in patients with chronic coronary artery disease. (K.H.)

  6. Stress-first protocol for myocardial perfusion SPECT imaging with semiconductor cameras: high diagnostic performances with significant reduction in patient radiation doses

    International Nuclear Information System (INIS)

    Perrin, Mathieu; Claudin, Marine; Veran, Nicolas; Morel, Olivier; Besseau, Cyril; Boutley, Henri; Djaballah, Wassila; Poussier, Sylvain; Verger, Antoine; Moulin, Frederic; Imbert, Laetitia; Karcher, Gilles; Marie, Pierre-Yves

    2015-01-01

    Effective doses of 14 mSv or higher are currently being attained in patients having stress and rest myocardial perfusion imaging (MPI) single photon emission computed tomography (SPECT) performed on the same day with conventional protocols. This study aimed to assess the actual reduction in effective doses as well as diagnostic performances for MPI routinely planned with: (1) high-sensitivity cadmium zinc telluride (CZT) cameras, (2) very low injected activities and (3) a stress-first protocol where the normality of stress images may lead to avoiding rest imaging. During a 1-year period, 2,845 patients had MPI on a CZT camera, a single-day stress-first protocol and low injected activities (120 MBq of 99m Tc-sestamibi at stress for 75 kg body weight and threefold higher at rest). The ability to detect > 50 % coronary stenosis was assessed in a subgroup of 149 patients who also had coronary angiography, while the normalcy rate was assessed in a subgroup of 128 patients with a low pretest likelihood of coronary artery disease (<10 %). Overall, 33 % of patients had abnormal MPI of which 34 % were women and 34 % were obese. The mean effective doses and the percentage of exams involving only stress images were: (1) 3.53 ± 2.10 mSv and 37 % in the overall population, (2) 4.83 ± 1.56 mSv and 5 % in the subgroup with angiography and (3) 1.96 ± 1.52 mSv and 71 % in the low-probability subgroup. Sensitivity and global accuracy for identifying the 106 patients with coronary stenosis were 88 and 80 %, respectively, while the normalcy rate was 97 %. When planned with a low-dose stress-first protocol on a CZT camera, MPI provides high diagnostic performances and a dramatic reduction in patient radiation doses. This reduction is even greater in low-risk subgroups with high rates of normal stress images, thus allowing the mean radiation dose to be balanced against cardiac risk in targeted populations. (orig.)

  7. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  8. Improvement of the SEP protocol based on community structure of node degree

    Science.gov (United States)

    Li, Donglin; Wei, Suyuan

    2017-05-01

    Analyzing the Stable election protocol (SEP) in wireless sensor networks and aiming at the problem of inhomogeneous cluster-heads distribution and unreasonable cluster-heads selectivity and single hop transmission in the SEP, a SEP Protocol based on community structure of node degree (SEP-CSND) is proposed. In this algorithm, network node deployed by using grid deployment model, and the connection between nodes established by setting up the communication threshold. The community structure constructed by node degree, then cluster head is elected in the community structure. On the basis of SEP, the node's residual energy and node degree is added in cluster-heads election. The information is transmitted with mode of multiple hops between network nodes. The simulation experiments showed that compared to the classical LEACH and SEP, this algorithm balances the energy consumption of the entire network and significantly prolongs network lifetime.

  9. Blending protocol effect in structural properties of PA6/ABS nanocomposites compatibilized with SAN-MA

    International Nuclear Information System (INIS)

    Castro, Lucas D.C. de; Oliveira, Amanda D.; Pessan, Luiz Antonio

    2015-01-01

    Nanocomposites based on polyamide 6 (PA6) and acrylonitrile-butadiene-styrene (ABS) compatibilized with styrene acrylonitrile-co-maleic anhydride were prepared using different blending protocols in a twin screw extruder. Specimen were prepared though injection molding. The organoclay (OMMT) incorporation and blending sequence effect on structural properties were investigated. X-ray diffraction analysis (XRD) indicates a complete exfoliated structure for all samples. Rheological measurements show an increasing in nanocomposites complex viscosities and storage modulus values when compared with the ternary blend. However, no significant effects in the rheological behavior were observed due the blending sequence. Differential scanning calorimetry (DSC) measurements suggests the incorporation of OMMT and different blending protocols may influence the polyamide polymorphism and degree of crystallinity. (author)

  10. Implementing an Oxygen Supplementation and Monitoring Protocol on Inpatient Pediatric Bronchiolitis: An Exercise in Deimplementation

    Directory of Open Access Journals (Sweden)

    Brian LeCleir

    2017-01-01

    Full Text Available Aim. Our goal in this study is to evaluate the effectiveness of our oxygen (O2 protocol to reduce length of stay (LOS for children hospitalized with bronchiolitis. Methods. In this retrospective cohort study, the outcomes of children ≤ 24 months old that were admitted with bronchiolitis and placed on the O2 protocol were compared to historical controls. The primary outcome was hospital length of stay. Secondary outcomes were duration of O2 supplementation, rates of pediatric intensive care unit transfer, and readmission. Results. Groups were not significantly different in age, gender, and rates of respiratory distress score assessment. Significantly more severely ill patients were in the O2 protocol group. There were no significant differences between control and O2 protocol groups with regard to mean LOS, rates of pediatric intensive care unit transfer, or seven-day readmission rates. By multiple regression analysis, the use of the O2 protocol was associated with a nearly 20% significant decrease in the length of hospitalization (p=0.030. Conclusion. Use of O2 supplementation protocol increased LOS in the more ill patients with bronchiolitis but decreased overall LOS by having a profound effect on patients with mild bronchiolitis.

  11. Improving post-stroke dysphagia outcomes through a standardized and multidisciplinary protocol: an exploratory cohort study.

    Science.gov (United States)

    Gandolfi, Marialuisa; Smania, Nicola; Bisoffi, Giulia; Squaquara, Teresa; Zuccher, Paola; Mazzucco, Sara

    2014-12-01

    Stroke is a major cause of dysphagia. Few studies to date have reported on standardized multidisciplinary protocolized approaches to the management of post-stroke dysphagia. The aim of this retrospective cohort study was to evaluate the impact of a standardized multidisciplinary protocol on clinical outcomes in patients with post-stroke dysphagia. We performed retrospective chart reviews of patients with post-stroke dysphagia admitted to the neurological ward of Verona University Hospital from 2004 to 2008. Outcomes after usual treatment for dysphagia (T- group) were compared versus outcomes after treatment under a standardized diagnostic and rehabilitative multidisciplinary protocol (T+ group). Outcome measures were death, pneumonia on X-ray, need for respiratory support, and proportion of patients on tube feeding at discharge. Of the 378 patients admitted with stroke, 84 had dysphagia and were enrolled in the study. A significantly lower risk of in-hospital death (odds ratio [OR] 0.20 [0.53-0.78]), pneumonia (OR 0.33 [0.10-1.03]), need for respiratory support (OR 0.48 [0.14-1.66]), and tube feeding at discharge (OR 0.30 [0.09-0.91]) was recorded for the T+ group (N = 39) as compared to the T- group (N = 45). The adjusted OR showed no difference between the two groups for in-hospital death and tube feeding at discharge. Use of a standardized multidisciplinary protocolized approach to the management of post-stroke dysphagia may significantly reduce rates of aspiration pneumonia, in-hospital mortality, and tube feeding in dysphagic stroke survivors. Consistent with the study's exploratory purposes, our findings suggest that the multidisciplinary protocol applied in this study offers an effective model of management of post-stroke dysphagia.

  12. Effect of a feed/fast protocol on pH in the proximal equine stomach.

    Science.gov (United States)

    Husted, L; Sanchez, L C; Baptiste, K E; Olsen, S N

    2009-09-01

    Risk factors for the development of gastric squamous ulcers include various management procedures, such as intermittent feed deprivation that can occur during weight management regimens or stall and dry lot confinement. To investigate the effect of intermittent feed deprivation relative to continuous feed intake on proximal intragastric pH, specifically in the region of the squamous mucosa of the lesser curvature. In 6 horses, pH electrodes were placed just inside of the oesophageal sphincter in the stomach for each of two 72 h protocols (A and B) in a randomised, cross-over design. Protocol A consisted of 12 h fed, 12 h fasted, 24 h fed and 24 h fasted, in sequence. Protocol B consisted of 72 h fed. During the fed periods of each protocol, horses had ad libitum access to coastal Bermuda hay and were fed sweet feed (1 kg, b.i.d.). Horses had ad libitum access to water at all times. Proximal intragastric pH was significantly lower during protocol A, than during protocol B. However, hourly mean pH was significantly different only during the day and evening hours between protocols. During protocol B, mean proximal pH decreased significantly from 03.00 to 09.00 compared to 19.00 to 23.00 h. A moderate positive correlation of hay intake vs. proximal gastric pH could be established. Intermittent feed deprivation decreased proximal gastric pH in horses relative to those horses for which feed was not restricted. However, the effect was only significant when fasting occurred during the day and evening hours, as a nocturnal decrease in pH occurred simultaneously in the fed horses. Episodes of daytime feed deprivation should be avoided if possible, as proximal gastric acid exposure rapidly increases during such events.

  13. End-to-end Configuration of Wireless Realtime Communication over Heterogeneous Protocols

    DEFF Research Database (Denmark)

    Malinowsky, B.; Grønbæk, Jesper; Schwefel, Hans-Peter

    2015-01-01

    This paper describes a wireless real-time communication system design using two Time Division Multiple Access (TDMA) protocols. Messages are subject to prioritization and queuing. For this interoperation scenario, we show a method for end-to-end configuration of protocols and queue sizes. Such co...

  14. The HPA photon protocol and proposed electron protocol

    International Nuclear Information System (INIS)

    Pitchford, W.G.

    1985-01-01

    The Hospital Physicists Association (HPA) photon dosimetry protocol has been produced and was published in 1983. Revised values of some components of Csub(lambda) and refinements introduced into the theory in the last few years have enabled new Csub(lambda) values to be produced. The proposed HPA electron protocol is at present in draft form and will be published shortly. Both protocels are discussed. (Auth.)

  15. A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2009-01-01

    ZigBee is a wireless sensor network standard that defines network and application layers on top of IEEE 802.15.4’s physical and medium access control layers. In the latest version of ZigBee, enhancements are prescribed for the security sublayer but we show in this paper that problems persist....... In particular we show that the End-to-End Application Key Establishment Protocol is flawed and we propose a secure protocol instead. We do so by using formal verification techniques based on static program analysis and process algebras. We present a way of using formal methods in wireless network security......, and propose a secure key establishment protocol for ZigBee networks....

  16. Pulmonary CT angiography protocol adapted to the hemodynamic effects of pregnancy.

    LENUS (Irish Health Repository)

    Ridge, Carole A

    2012-02-01

    OBJECTIVE: The purpose of this study was to compare the image quality of a standard pulmonary CT angiography (CTA) protocol with a pulmonary CTA protocol optimized for use in pregnant patients with suspected pulmonary embolism (PE). MATERIALS AND METHODS: Forty-five consecutive pregnant patients with suspected PE were retrospectively included in the study: 25 patients (group A) underwent standard-protocol pulmonary CTA and 20 patients (group B) were imaged using a protocol modified for pregnancy. The modified protocol used a shallow inspiration breath-hold and a high concentration, high rate of injection, and high volume of contrast material. Objective image quality and subjective image quality were evaluated by measuring pulmonary arterial enhancement, determining whether there was transient interruption of the contrast bolus by unopacified blood from the inferior vena cava (IVC), and assessing diagnostic adequacy. RESULTS: Objective and subjective image quality were significantly better for group B-that is, for the group who underwent the CTA protocol optimized for pregnancy. Mean pulmonary arterial enhancement and the percentage of studies characterized as adequate for diagnosis were higher in group B than in group A: 321 +\\/- 148 HU (SD) versus 178 +\\/- 67 HU (p = 0.0001) and 90% versus 64% (p = 0.05), respectively. Transient interruption of contrast material by unopacified blood from the IVC was observed more frequently in group A (39%) than in group B (10%) (p = 0.05). CONCLUSION: A pulmonary CTA protocol optimized for pregnancy significantly improved image quality by increasing pulmonary arterial opacification, improving diagnostic adequacy, and decreasing transient interruption of the contrast bolus by unopacified blood from the IVC.

  17. A Randomized Trial Comparing Two Tongue-Pressure Resistance Training Protocols for Post-Stroke Dysphagia.

    Science.gov (United States)

    Steele, Catriona M; Bayley, Mark T; Peladeau-Pigeon, Melanie; Nagy, Ahmed; Namasivayam, Ashwini M; Stokely, Shauna L; Wolkin, Talia

    2016-06-01

    The objective of this study was to compare the outcomes of two tongue resistance training protocols. One protocol ("tongue-pressure profile training") emphasized the pressure-timing patterns that are typically seen in healthy swallows by focusing on gradual pressure release and saliva swallowing tasks. The second protocol ("tongue-pressure strength and accuracy training") emphasized strength and accuracy in tongue-palate pressure generation and did not include swallowing tasks. A prospective, randomized, parallel allocation trial was conducted. Of 26 participants who were screened for eligibility, 14 received up to 24 sessions of treatment. Outcome measures of posterior tongue strength, oral bolus control, penetration-aspiration and vallecular residue were made based on videofluoroscopy analysis by blinded raters. Complete data were available for 11 participants. Significant improvements were seen in tongue strength and post-swallow vallecular residue with thin liquids, regardless of treatment condition. Stage transition duration (a measure of the duration of the bolus presence in the pharynx prior to swallow initiation, which had been chosen to capture impairments in oral bolus control) showed no significant differences. Similarly, significant improvements were not seen in median scores on the penetration-aspiration scale. This trial suggests that tongue strength can be improved with resistance training for individuals with tongue weakness following stroke. We conclude that improved penetration-aspiration does not necessarily accompany improvements in tongue strength; however, tongue-pressure resistance training does appear to be effective for reducing thin liquid vallecular residue.

  18. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.

    Science.gov (United States)

    Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen

    2011-01-01

    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.

  19. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  20. On the security of an anonymous roaming protocol in UMTS mobile networks

    Directory of Open Access Journals (Sweden)

    Shuhua Wu

    2012-02-01

    Full Text Available In this communication, we first show that the privacy-preserving roaming protocol recently proposed for mobile networks cannot achieve the claimed security level. Then we suggest an improved protocol to remedy its security problems.

  1. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  2. Differential Sarcomere and Electrophysiological Maturation of Human iPSC-Derived Cardiac Myocytes in Monolayer vs. Aggregation-Based Differentiation Protocols

    Directory of Open Access Journals (Sweden)

    Dorota Jeziorowska

    2017-06-01

    Full Text Available Human induced pluripotent stem cells (iPSCs represent a powerful human model to study cardiac disease in vitro, notably channelopathies and sarcomeric cardiomyopathies. Different protocols for cardiac differentiation of iPSCs have been proposed either based on embroid body formation (3D or, more recently, on monolayer culture (2D. We performed a direct comparison of the characteristics of the derived cardiomyocytes (iPSC-CMs on day 27 ± 2 of differentiation between 3D and 2D differentiation protocols with two different Wnt-inhibitors were compared: IWR1 (inhibitor of Wnt response or IWP2 (inhibitor of Wnt production. We firstly found that the level of Troponin T (TNNT2 expression measured by FACS was significantly higher for both 2D protocols as compared to the 3D protocol. In the three methods, iPSC-CM show sarcomeric structures. However, iPSC-CM generated in 2D protocols constantly displayed larger sarcomere lengths as compared to the 3D protocol. In addition, mRNA and protein analyses reveal higher cTNi to ssTNi ratios in the 2D protocol using IWP2 as compared to both other protocols, indicating a higher sarcomeric maturation. Differentiation of cardiac myocytes with 2D monolayer-based protocols and the use of IWP2 allows the production of higher yield of cardiac myocytes that have more suitable characteristics to study sarcomeric cardiomyopathies.

  3. Diplomacy and Diplomatic Protocol

    Directory of Open Access Journals (Sweden)

    Lect. Ph.D Oana Iucu

    2008-12-01

    Full Text Available The present study aims to observe relationships and determining factors between diplomacyand diplomatic protocol as outlined by historical and contextual analyses. The approach is very dynamic,provided that concepts are able to show their richness, antiquity and polyvalence at the level of connotations,semantics, grammatical and social syntax. The fact that this information is up to date determines anattitude of appreciation and a state of positive contamination.

  4. Gene probes : principles and protocols [Methods in molecular biology, v. 179

    National Research Council Canada - National Science Library

    Rapley, Ralph; Aquino de Muro, Marilena

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  5. Retrospective analysis of prostate cancer patients with implanted gold markers using off-line and adaptive therapy protocols

    International Nuclear Information System (INIS)

    Litzenberg, Dale W.; Balter, James M.; Lam, Kwok L.; Sandler, Howard M.; Ten Haken, Randall K.

    2005-01-01

    3 were significantly worse. The residual 3D error of the gold markers was 1.14 cm and 0.76 cm for the prone and supine patients, respectively. Application of the shrinking-action-level protocol to bony anatomy with an initial action level of 1.0 cm and N max = 5 days decreased the residual systematic offset of the gold markers in 2 of 10 patients. The residual average 3D setup error of the gold markers was 1.2 cm and 1.0 cm for the prone and supine patients, respectively. When applied directly to the gold markers with N max = 5 days, the residual systematic offset of the gold markers decreased in 6 of 10 patients (0.84 cm and 0.67 cm for the prone and supine patients, respectively). In general, between 3 and 5 of the 10 patients showed significant decreases in setup errors with the application of these off-line protocols, and the remaining patients showed no significant improvement or showed significantly larger setup errors, as determined by the residual error of the gold markers. Conclusion: Changes in a prostate cancer patient's systematic and random setup characteristics during the course of therapy often violate the gaussian assumptions of adaptive and off-line correction models. Thus, off-line setup correction procedures, especially those directed at prostate localization using markers, will result in limited benefit to a minority of patients. The relative benefit of on-line localization is still potentially significant if the intrafraction motion is relatively small

  6. Comparison of mild and microdose GnRH agonist flare protocols on IVF outcome in poor responders.

    Science.gov (United States)

    Karimzadeh, Mohammad Ali; Mashayekhy, Mehri; Mohammadian, Farnaz; Moghaddam, Fatemeh Mansoori

    2011-05-01

    To compare the IVF outcome of clomiphene citrate/gonadotropin/antagonist (mild protocol) and microdose GnRH agonist flare protocols for poor responders undergoing in vitro fertilization. 159 poor responder patients were randomized and ovarian stimulation was performed with clomiphene citrate, gonadotropin and antagonist (group I) or microdose GnRH agonist flare (group II) protocols. Main outcome was clinical pregnancy rate and secondary outcomes were doses of gonadotropin administration and duration of stimulation. There were no significant differences in age, causes of infertility, basal FSH, BMI, duration of infertility, E(2) level on the day of hCG injection in both groups. Although the cancellation, fertilization, and clinical pregnancy rates were similar in both groups, the endometrial thickness, number of retrieved oocytes, mature oocytes and implantation rate were significantly higher in mild protocol. The doses of gonadotropin administration and duration of stimulation were significantly lower in mild protocol. We recommend mild protocol in assisted reproductive technology cycles for poor responders based on our results regarding less doses of used gonadotropin and a shorter duration of stimulation.

  7. An Improved PRoPHET Routing Protocol in Delay Tolerant Network

    Directory of Open Access Journals (Sweden)

    Seung Deok Han

    2015-01-01

    Full Text Available In delay tolerant network (DTN, an end-to-end path is not guaranteed and packets are delivered from a source node to a destination node via store-carry-forward based routing. In DTN, a source node or an intermediate node stores packets in buffer and carries them while it moves around. These packets are forwarded to other nodes based on predefined criteria and finally are delivered to a destination node via multiple hops. In this paper, we improve the dissemination speed of PRoPHET (probability routing protocol using history of encounters and transitivity protocol by employing epidemic protocol for disseminating message m, if forwarding counter and hop counter values are smaller than or equal to the threshold values. The performance of the proposed protocol was analyzed from the aspect of delivery probability, average delay, and overhead ratio. Numerical results show that the proposed protocol can improve the delivery probability, average delay, and overhead ratio of PRoPHET protocol by appropriately selecting the threshold forwarding counter and threshold hop counter values.

  8. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Science.gov (United States)

    Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing

    2017-01-01

    Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  9. Effects of triploidy incidence on clinical outcomes for IVF-ET cycles in different ovarian stimulation protocols.

    Science.gov (United States)

    Li, Mingzhao; Xue, Xia; Zhang, Silin; Li, Wei; Zhao, Xiaoli; Ren, Wenjuan; Shi, Juanzi

    2015-10-01

    To discuss the relationship between triploidy incidence and clinical outcomes of embryos derived from normally fertilized oocytes from the same cohort for in vitro fertilization-embryo transfer (IVF-ET) cycles in different ovarian stimulation protocol. This study included 2070 in vitro fertilization (IVF) cycles with long-term protocol, 802 IVF cycles with ultra short-term protocol and 508 IVF-D (in vitro fertilization by donor semen) cycles with long-term protocol from January 2013 to September 2014. According to the different 3PN rate, patients were divided into three groups as follows: Group 1 included patients with 0% 3PN zygotes, Group 2 included patients with 1-25% 3PN zygotes and Group 3 included patients with >25% 3PN zygotes. female age, no. of retrieved oocytes, normal fertilization rate, day-3 grade I + II embryos rate, day-3 grade I + II + III embryos rate, implantation rate, pregnancy rate and early abortion rate. Triploidy cycle incidence rate in IVF and IVF-D cycles with long-term protocol were significantly higher than in IVF cycles with ultra short-term protocol (p  0.05). In three protocols, normal fertilization rate in 3PN = 0% and 3PN = 1-25% groups were significantly higher compared to 3PN > 25% group (p cycles with long-term protocol, the day-3 grade I + II embryos, implantation and pregnancy rate in 3PN > 25% group were significantly lower than other two groups (p  0.05). In IVF cycles with ultra short-term protocol, there were no significant differences found in day-3 grade I + II embryos, day-3 grade I + II + III embryos, implantation, pregnancy and early abortion rate (p > 0.05). In IVF-D cycles with long-term protocol, the day-3 grade I + II embryos, day-3 grade I + II + III embryos and implantation rate in 3PN > 25% group were significantly lower than other two groups (p  0.05). We observed that high proportion of triploid zygotes made a negative effect on

  10. A new quantum sealed-bid auction protocol with secret order in post-confirmation

    Science.gov (United States)

    Wang, Jing-Tao; Chen, Xiu-Bo; Xu, Gang; Meng, Xiang-Hua; Yang, Yi-Xian

    2015-10-01

    A new security protocol for quantum sealed-bid auction is proposed to resist the collusion attack from some malicious bidders. The most significant feature of this protocol is that bidders prepare their particles with secret order in post-confirmation for encoding bids. In addition, a new theorem and its proof are given based on the theory of combinatorial mathematics, which can be used as evaluation criteria for the collusion attack. It is shown that the new protocol is immune to the collusion attack and meets the demand for a secure auction. Compared with those previous protocols, the security, efficiency and availability of the proposed protocol are largely improved.

  11. Thoraco-abdominal high-pitch dual-source CT angiography: Experimental evaluation of injection protocols with an anatomical human vascular phantom

    Energy Technology Data Exchange (ETDEWEB)

    Puippe, Gilbert D., E-mail: gilbert.puippe@usz.ch [Institute for Diagnostic and Interventional Radiology, University Hospital Zurich, Switzerland Raemistrasse 100, CH-8091 Zurich (Switzerland); Winklehner, Anna [Institute for Diagnostic and Interventional Radiology, University Hospital Zurich, Switzerland Raemistrasse 100, CH-8091 Zurich (Switzerland); Hasenclever, Peter; Plass, André [Division of Cardiac and Vascular Surgery, University Hospital Zurich, Switzerland Raemistrasse 100, CH-8091 Zurich (Switzerland); Frauenfelder, Thomas; Baumueller, Stephan [Institute for Diagnostic and Interventional Radiology, University Hospital Zurich, Switzerland Raemistrasse 100, CH-8091 Zurich (Switzerland)

    2012-10-15

    Objective: To experimentally evaluate three different contrast injection protocols at thoraco-abdominal high-pitch dual-source computed tomography angiography (CTA), with regard to level and homogeneity of vascular enhancement at different cardiac outputs. Materials and methods: A uniphasic, a biphasic as well as an individually tailored contrast protocol were tested using a human vascular phantom. Each protocol was scanned at 5 different cardiac outputs (3–5 L/min, steps of 0.5 L/min) using an extracorporeal cardiac pump. Vascular enhancement of the thoraco-abdominal aorta was measured every 5 cm. Overall mean enhancement of each protocol and mean enhancement for each cardiac output within each protocol were calculated. Enhancement homogeneity along the z-axis was evaluated for each cardiac output and protocol. Results: Overall mean enhancement was significantly higher in the uniphasic than in the other two protocols (all p < .05), whereas the difference between the biphasic and tailored protocol was not significant (p = .76). Mean enhancement among each of the 5 cardiac outputs within each protocol was significantly different (all p < .05). Only within the tailored protocol mean enhancement differed not significantly at cardiac outputs of 3.5 L/min vs. 5 L/min (484 ± 25 HU vs. 476 ± 19 HU, p = .14) and 4 vs. 5 L/min (443 ± 49 HU vs. 476 ± 19 HU, p = .05). Both, uniphasic and tailored protocol yielded homogenous enhancement at all cardiac outputs, whereas the biphasic protocol failed to achieve homogenous enhancement. Conclusion: This phantom study suggests that diagnostic and homogenous enhancement at thoraco-abdominal high-pitch dual-source CTA is feasible with either a uniphasic or an individually tailored contrast protocol.

  12. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  13. Abbreviated Combined MR Protocol: A New Faster Strategy for Characterizing Breast Lesions.

    Science.gov (United States)

    Moschetta, Marco; Telegrafo, Michele; Rella, Leonarda; Stabile Ianora, Amato Antonio; Angelelli, Giuseppe

    2016-06-01

    The use of an abbreviated magnetic resonance (MR) protocol has been recently proposed for cancer screening. The aim of our study is to evaluate the diagnostic accuracy of an abbreviated MR protocol combining short TI inversion recovery (STIR), turbo-spin-echo (TSE)-T2 sequences, a pre-contrast T1, and a single intermediate (3 minutes after contrast injection) post-contrast T1 sequence for characterizing breast lesions. A total of 470 patients underwent breast MR examination for screening, problem solving, or preoperative staging. Two experienced radiologists evaluated both standard and abbreviated protocols in consensus. Sensitivity, specificity, positive predictive value (PPV), negative predictive value (NPV), and diagnostic accuracy for both protocols were calculated (with the histological findings and 6-month ultrasound follow-up as the reference standard) and compared with the McNemar test. The post-processing and interpretation times for the MR images were compared with the paired t test. In 177 of 470 (38%) patients, the MR sequences detected 185 breast lesions. Standard and abbreviated protocols obtained sensitivity, specificity, diagnostic accuracy, PPV, and NPV values respectively of 92%, 92%, 92%, 68%, and 98% and of 89%, 91%, 91%, 64%, and 98% with no statistically significant difference (P < .0001). The mean post-processing and interpretation time were, respectively, 7 ± 1 minutes and 6 ± 3.2 minutes for the standard protocol and 1 ± 1.2 minutes and 2 ± 1.2 minutes for the abbreviated protocol, with a statistically significant difference (P < .01). An abbreviated combined MR protocol represents a time-saving tool for radiologists and patients with the same diagnostic potential as the standard protocol in patients undergoing breast MRI for screening, problem solving, or preoperative staging. Copyright © 2016 Elsevier Inc. All rights reserved.

  14. Evaluation of a new system for chest tomosynthesis: aspects of image quality of different protocols determined using an anthropomorphic phantom

    Science.gov (United States)

    Sundin, A; Aspelin, P; Båth, M; Nyrén, S

    2015-01-01

    Objective: To compare the image quality obtained with the different protocols in a new chest digital tomosynthesis (DTS) system. Methods: A chest phantom was imaged with chest X-ray equipment with DTS. 10 protocols were used, and for each protocol, nine acquisitions were performed. Four observers visually rated the quality of the reconstructed section images according to pre-defined quality criteria in four different classes. The data were analysed with visual grading characteristics (VGC) analysis, using the vendor-recommended protocol [12-s acquisition time, source-to-image distance (SID) 180 cm] as reference, and the area under the VGC curve (AUCVGC) was determined for each protocol and class of criteria. Results: Protocols with a smaller swing angle resulted in a lower image quality for the classes of criteria “disturbance” and “homogeneity in nodule” but a higher image quality for the class “structure”. The class “demarcation” showed little dependency on the swing angle. All protocols but one (6.3 s, SID 130 cm) obtained an AUCVGC significantly <0.5 (indicating lower quality than reference) for at least one class of criteria. Conclusion: The study indicates that the DTS protocol with 6.3 s yields image quality similar to that obtained with the vendor-recommended protocol (12 s) but with the clinically important advantage for patients with respiratory impairment of a shorter acquisition time. Advances in knowledge: The study demonstrates that the image quality may be strongly affected by the choice of protocol and that the vendor-recommended protocol may not be optimal. PMID:26118300

  15. Minimal stimulation protocol using letrozole versus microdose flare up GnRH agonist protocol in women with poor ovarian response undergoing ICSI.

    Science.gov (United States)

    Mohsen, Iman Abdel; El Din, Rasha Ezz

    2013-02-01

    To compare the IVF outcomes of letrozole/antagonist and microdose GnRH agonist flare up protocols in poor ovarian responders undergoing intracytoplasmic sperm injection. A randomized controlled trial was performed in patients with one or more previous failed IVF cycles in which four or less oocytes were retrieved when the gonadotrophin starting dose was at least 300 IU/day. Sixty patients were randomized by computer-generated list to receive either letrozole/antagonist (mild stimulation) n = 30 or GnRH-a protocol (microdose flare) n = 30. Both groups were similar with respect to background and hormonal characteristics (age, duration of infertility, BMI, FSH, LH and E2). The clinical pregnancy rate per cycle was similar in both groups (13.3 vs. 16.6%; OR = 0.769; 95% CI = 0.185, 3.198). The doses of used gonadotropins and the number of stimulation days were significantly lower in the letrozole/antagonist protocol. The peak E2 level on the day of hCG, the endometrial thickness, the retrieved oocytes, the number of fertilized oocytes, the number of transferred embryos and the cancellation rate were statistically similar in both groups. The letrozole/antagonist protocol is a cost-effective and patient-friendly protocol that may be used in poor ovarian responders for IVF/ICSI.

  16. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  17. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  18. Clinical applicability and cutoff values for an unstructured neuropsychological assessment protocol for older adults with low formal education.

    Science.gov (United States)

    de Paula, Jonas Jardim; Bertola, Laiss; Ávila, Rafaela Teixeira; Moreira, Lafaiete; Coutinho, Gabriel; de Moraes, Edgar Nunes; Bicalho, Maria Aparecida Camargos; Nicolato, Rodrigo; Diniz, Breno Satler; Malloy-Diniz, Leandro Fernandes

    2013-01-01

    The neuropsychological exam plays a central role in the assessment of elderly patients with cognitive complaints. It is particularly relevant to differentiate patients with mild dementia from those subjects with mild cognitive impairment. Formal education is a critical factor in neuropsychological performance; however, there are few studies that evaluated the psychometric properties, especially criterion related validity, neuropsychological tests for patients with low formal education. The present study aims to investigate the validity of an unstructured neuropsychological assessment protocol for this population and develop cutoff values for clinical use. A protocol composed by the Rey-Auditory Verbal Learning Test, Frontal Assessment Battery, Category and Letter Fluency, Stick Design Test, Clock Drawing Test, Digit Span, Token Test and TN-LIN was administered to 274 older adults (96 normal aging, 85 mild cognitive impairment and 93 mild Alzheimer`s disease) with predominantly low formal education. Factor analysis showed a four factor structure related to Executive Functions, Language/Semantic Memory, Episodic Memory and Visuospatial Abilities, accounting for 65% of explained variance. Most of the tests showed a good sensitivity and specificity to differentiate the diagnostic groups. The neuropsychological protocol showed a significant ecological validity as 3 of the cognitive factors explained 31% of the variance on Instrumental Activities of Daily Living. The study presents evidence of the construct, criteria and ecological validity for this protocol. The neuropsychological tests and the proposed cutoff values might be used for the clinical assessment of older adults with low formal education.

  19. Effects of different circuit training protocols on body mass, fat mass and blood parameters in overweight adults

    Directory of Open Access Journals (Sweden)

    Valentina Contrò

    2017-02-01

    Full Text Available Benefits of exercise are known for a long time, but mechanisms underlying the exercise mode recommendations for specific chronic cardiovascular diseases remain unclear. The aim of this study was to compare the effects of different circuit training protocols in order to determine which is the best for weight loss and for specific overweight- related disorders. Forty-five female sedentary overweight participants from 20 to 50 years (average 31.8±11.2 were enrolled and assigned to three different groups; each group was compared with a control normal-weight group. Three different circuit protocols were randomly assigned to each overweight group: aerobictone- aerobic (ATA, aerobic-circuit-aerobic (ACA and mini-trampoline circuit (MTC, while control group performed a classic circuit weight training (CWT. Every group trained three times per week, for 12 weeks. The results show that ATA group reduced body fat and total body mass more than other groups (P<0.001; P=0.007. ACA group reduced total body mass in significant statistical way (P=0.032, as well as body fat (P<0.001 and low-density lipoprotein cholesterol (P=0.013. In MTC group there was a significant reduction in every parameter we analyzed (total body mass, body fat and lipid profile: P<0.001. CWT group has shown a significant loss only in body fat (P<0.001. Every circuit protocol is optimal for reducing body fat and total body mass: however, MTC protocol has shown the best results on lipid profile.

  20. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  1. A SURVEY ON MULTICAST ROUTING PROTOCOLS FOR PERFORMANCE EVALUATION IN WIRELESS SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    A. Suruliandi

    2015-03-01

    Full Text Available Multicast is a process used to transfer same message to multiple receivers at the same time. This paper presents the simulation and analysis of the performance of six different multicast routing protocols for Wireless Sensor Network (WSN. They are On Demand Multicast Routing Protocol (ODMRP, Protocol for Unified Multicasting through Announcement (PUMA, Multicast Adhoc On demand Distance Vector Protocol (MAODV, Overlay Boruvka-based Adhoc Multicast Protocol (OBAMP, Application Layer Multicast Algorithm (ALMA and enhanced version of ALMA (ALMA-H for WSN. Among them, ODMRP, MAODV and PUMA are reactive protocols while OBAMP, ALMA and ALMA-H are proactive protocols. This paper compares the performance of these protocols with common parameters such as Throughput, Reliability, End-to-End delay and Packet Delivery Ratio (PDR with increasing the numbers of nodes and increasing the speed of the nodes. The main objective of this work is to select the efficient multicast routing protocol for WSN among six multicast routing protocol based on relative strength and weakness of each protocol. The summary of above six multicast routing protocols is presented with a table of different performance characteristics. Experimental result shows that ODMRP attains higher throughput, reliability and higher packet delivery ratio than other multicast routing protocol, while incurring far less end-to-end delay.

  2. Study on Cloud Security Based on Trust Spanning Tree Protocol

    Science.gov (United States)

    Lai, Yingxu; Liu, Zenghui; Pan, Qiuyue; Liu, Jing

    2015-09-01

    Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.

  3. Estimation of the Thurstonian model for the 2-AC protocol

    DEFF Research Database (Denmark)

    Christensen, Rune Haubo Bojesen; Lee, Hye-Seong; Brockhoff, Per B.

    2012-01-01

    . This relationship makes it possible to extract estimates and standard errors of δ and τ from general statistical software, and furthermore, it makes it possible to combine standard regression modelling with the Thurstonian model for the 2-AC protocol. A model for replicated 2-AC data is proposed using cumulative......The 2-AC protocol is a 2-AFC protocol with a “no-difference” option and is technically identical to the paired preference test with a “no-preference” option. The Thurstonian model for the 2-AC protocol is parameterized by δ and a decision parameter τ, the estimates of which can be obtained...... by fairly simple well-known methods. In this paper we describe how standard errors of the parameters can be obtained and how exact power computations can be performed. We also show how the Thurstonian model for the 2-AC protocol is closely related to a statistical model known as a cumulative probit model...

  4. May the Kyoto protocol produce results?

    International Nuclear Information System (INIS)

    Jaureguy-Naudin, M.

    2009-01-01

    A not well managed drastic reduction of greenhouse emissions might result in significant decrease of living standards, but without such reduction efforts, climate change might have five to twenty times higher costs. Thus, while indicating estimated consequences or evolutions of greenhouse emissions and temperature, the author stresses the need of emission reduction. She discusses the role of economic instruments which can be used in policies aimed at the struggle against climate change. She recalls the emission reduction commitments specified in the Kyoto protocol, discusses the present status, operation and results of the international emission trading scheme, the lessons learned after the first years of operation, comments the involvement of emerging countries in relationship with another mechanism defined in the protocol: the Clean Development Mechanism

  5. Efficient Cooperative Protocols for Full-Duplex Relaying over Nakagami-m Fading Channels

    KAUST Repository

    Khafagy, Mohammad Galal

    2015-02-24

    In this work, efficient protocols are studied for full-duplex relaying (FDR) with loopback interference over Nakagami-m block fading channels. Recently, a selective decodeand- forward (DF) protocol was proposed for FDR, and was shown to outperform existing protocols in terms of outage over Rayleigh-fading channels. In this work, we propose an incremental selective DF protocol that offers additional power savings, yet yields the same outage performance. We evaluate their outage performance over independent non-identically distributed Nakagami-m fading links, and study their relative performance in terms of the signal-to-noise ratio cumulative distribution function via closed-form expressions. The offered diversity gain is also derived. In addition, we study their performance relative to their half-duplex counterparts, as well as known non-selective FDR protocols. We corroborate our theoretical results with simulation, and confirm that selective cooperation protocols outperform the known non-selective protocols in terms of outage. Finally, we show that depending on the loopback interference level, the proposed protocols can outperform their half-duplex counterparts when high spectral efficiencies are targeted.

  6. Efficient Cooperative Protocols for Full-Duplex Relaying over Nakagami-m Fading Channels

    KAUST Repository

    Khafagy, Mohammad Galal; Tammam, Amr; Alouini, Mohamed-Slim; Aissa, Sonia

    2015-01-01

    In this work, efficient protocols are studied for full-duplex relaying (FDR) with loopback interference over Nakagami-m block fading channels. Recently, a selective decodeand- forward (DF) protocol was proposed for FDR, and was shown to outperform existing protocols in terms of outage over Rayleigh-fading channels. In this work, we propose an incremental selective DF protocol that offers additional power savings, yet yields the same outage performance. We evaluate their outage performance over independent non-identically distributed Nakagami-m fading links, and study their relative performance in terms of the signal-to-noise ratio cumulative distribution function via closed-form expressions. The offered diversity gain is also derived. In addition, we study their performance relative to their half-duplex counterparts, as well as known non-selective FDR protocols. We corroborate our theoretical results with simulation, and confirm that selective cooperation protocols outperform the known non-selective protocols in terms of outage. Finally, we show that depending on the loopback interference level, the proposed protocols can outperform their half-duplex counterparts when high spectral efficiencies are targeted.

  7. Intelligent Cooperative MAC Protocol for Balancing Energy Consumption

    Science.gov (United States)

    Wu, S.; Liu, K.; Huang, B.; Liu, F.

    To extend the lifetime of wireless sensor networks, we proposed an intelligent balanced energy consumption cooperative MAC protocol (IBEC-CMAC) based on the multi-node cooperative transmission model. The protocol has priority to access high-quality channels for reducing energy consumption of each transmission. It can also balance the energy consumption among cooperative nodes by using high residual energy nodes instead of excessively consuming some node's energy. Simulation results show that IBEC-CMAC can obtain longer network lifetime and higher energy utilization than direct transmission.

  8. Secure and Efficient Protocol for Vehicular Ad Hoc Network with Privacy Preservation

    Directory of Open Access Journals (Sweden)

    Choi Hyoung-Kee

    2011-01-01

    Full Text Available Security is a fundamental issue for promising applications in a VANET. Designing a secure protocol for a VANET that accommodates efficiency, privacy, and traceability is difficult because of the contradictions between these qualities. In this paper, we present a secure yet efficient protocol for a VANET that satisfies these security requirements. Although much research has attempted to address similar issues, we contend that our proposed protocol outperforms other proposals that have been advanced. This claim is based on observations that show that the proposed protocol has such strengths as light computational load, efficient storage management, and dependability.

  9. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Directory of Open Access Journals (Sweden)

    Shameng Wen

    Full Text Available Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  10. Modelling and Initial Validation of the DYMO Routing Protocol for Mobile Ad-Hoc Networks

    DEFF Research Database (Denmark)

    Espensen, Kristian Asbjørn Leth; Kjeldsen, Mads Keblov; Kristensen, Lars Michael

    2008-01-01

    A mobile ad-hoc network (MANET) is an infrastructureless network established by a set of mobile devices using wireless communication. The Dynamic MANET On-demand (DYMO) protocol is a routing protocol for multi-hop communication in MANETs currently under development by the Internet Engineering Task...... Force (IETF). This paper presents a Coloured Petri Net (CPN) model of the mandatory parts of the DYMO protocol, and shows how scenario-based state space exploration has been used to validate key properties of the protocol. Our CPN modelling and verification work has spanned two revisions of the DYMO...... protocol specification and have had direct impact on the most recent version of the protocol specification....

  11. IMHRP: Improved Multi-Hop Routing Protocol for Wireless Sensor Networks

    Science.gov (United States)

    Huang, Jianhua; Ruan, Danwei; Hong, Yadong; Zhao, Ziming; Zheng, Hong

    2017-10-01

    Wireless sensor network (WSN) is a self-organizing system formed by a large number of low-cost sensor nodes through wireless communication. Sensor nodes collect environmental information and transmit it to the base station (BS). Sensor nodes usually have very limited battery energy. The batteries cannot be charged or replaced. Therefore, it is necessary to design an energy efficient routing protocol to maximize the network lifetime. This paper presents an improved multi-hop routing protocol (IMHRP) for homogeneous networks. In the IMHRP protocol, based on the distances to the BS, the CH nodes are divided into internal CH nodes and external CH nodes. The set-up phase of the protocol is based on the LEACH protocol and the minimum distance between CH nodes are limited to a special constant distance, so a more uniform distribution of CH nodes is achieved. In the steady-state phase, the routes of different CH nodes are created on the basis of the distances between the CH nodes. The energy efficiency of communication can be maximized. The simulation results show that the proposed algorithm can more effectively reduce the energy consumption of each round and prolong the network lifetime compared with LEACH protocol and MHT protocol.

  12. Cross-Layer Protocol as a Better Option in Wireless Mesh Network with Respect to Layered-Protocol

    OpenAIRE

    Ahmed Abdulwahab Al-Ahdal; Dr. V. P. Pawar; G. N. Shinde

    2014-01-01

    The Optimal way to improve Wireless Mesh Networks (WMNs) performance is to use a better network protocol, but whether layered-protocol design or cross-layer design is a better option to optimize protocol performance in WMNs is still an on-going research topic. In this paper, we focus on cross-layer protocol as a better option with respect to layered-protocol. The layered protocol architecture (OSI) model divides networking tasks into layers and defines a pocket of services for each layer to b...

  13. A Power-Efficient Access Point Operation for Infrastructure Basic Service Set in IEEE 802.11 MAC Protocol

    Directory of Open Access Journals (Sweden)

    Hua Ye Ming

    2006-01-01

    Full Text Available Infrastructure-based wireless LAN technology has been widely used in today's personal communication environment. Power efficiency and battery management have been the center of attention in the design of handheld devices with wireless LAN capability. In this paper, a hybrid protocol named improved PCF operation is proposed, which intelligently chooses the access point- (AP- assisted DCF (distributed coordinator function and enhanced PCF (point coordinator function transmission mechanism of IEEE 802.11 protocol in an infrastructure-based wireless LAN environment. Received signal strength indicator (RSSI is used to determine the tradeoff between direct mobile-to-mobile transmission and transmission routed by AP. Based on the estimation, mobile stations can efficiently communicate directly instead of being routed through AP if they are in the vicinity of each other. Furthermore, a smart AP protocol is proposed as extension to the improved PCF operation by utilizing the historical end-to-end delay information to decide the waking up time of mobile stations. Simulation results show that using the proposed protocol, energy consumption of mobile devices can be reduced at the cost of slightly longer end-to-end packet delay compared to traditional IEEE 802.11 PCF protocol. However, in a non-time-critical environment, this option can significantly prolong the operation time of mobile devices.

  14. Protocol compliance and time management in blunt trauma resuscitation.

    Science.gov (United States)

    Spanjersberg, W R; Bergs, E A; Mushkudiani, N; Klimek, M; Schipper, I B

    2009-01-01

    To study advanced trauma life support (ATLS) protocol adherence prospectively in trauma resuscitation and to analyse time management of daily multidisciplinary trauma resuscitation at a level 1 trauma centre, for both moderately and severely injured patients. All victims of severe blunt trauma were consecutively included. Patients with a revised trauma score (RTS) of 12 were resuscitated by a "minor trauma" team and patients with an RTS of less than 12 were resuscitated by a "severe trauma" team. Digital video recordings were used to analyse protocol compliance and time management during initial assessment. From 1 May to 1 September 2003, 193 resuscitations were included. The "minor trauma" team assessed 119 patients, with a mean injury severity score (ISS) of 7 (range 1-45). Overall protocol compliance was 42%, ranging from 0% for thoracic percussion to 93% for thoracic auscultation. The median resuscitation time was 45.9 minutes (range 39.7-55.9). The "severe team" assessed 74 patients, with a mean ISS of 22 (range 1-59). Overall protocol compliance was 53%, ranging from 4% for thoracic percussion to 95% for thoracic auscultation. Resuscitation took 34.8 minutes median (range 21.6-44.1). Results showed the current trauma resuscitation to be ATLS-like, with sometimes very low protocol compliance rates. Timing of secondary survey and radiology and thus time efficiency remains a challenge in all trauma patients. To assess the effect of trauma resuscitation protocols on outcome, protocol adherence needs to be improved.

  15. Effects of a peracetic acid disinfection protocol on the biocompatibility and biomechanical properties of human patellar tendon allografts.

    Science.gov (United States)

    Lomas, R J; Jennings, L M; Fisher, J; Kearney, J N

    2004-01-01

    Patellar tendon allografts, retrieved from cadaveric human donors, are widely used for replacement of damaged cruciate ligaments. In common with other tissue allografts originating from cadaveric donors, there are concerns regarding the potential for disease transmission from the donor to the recipient. Additionally, retrieval and subsequent processing protocols expose the graft to the risk of environmental contamination. For these reasons, disinfection or sterilisation protocols are necessary for these grafts before they are used clinically. A high-level disinfection protocol, utilising peracetic acid (PAA), has been developed and investigated for its effects on the biocompatibility and biomechanics of the patellar tendon allografts. PAA disinfection did not render the grafts either cytotoxic or liable to provoke an inflammatory response as assessed in vitro . However, the protocol was shown to increase the size of gaps between the tendon fibres in the matrix and render the grafts more susceptible to digestion with collagenase. Biomechanical studies of the tendons showed that PAA treatment had no effect on the ultimate tensile stress or Young's modulus of the tendons, and that ultimate strain was significantly higher in PAA treated tendons.

  16. Evaluation of image quality and dose in renal colic: comparison of different spiral-CT protocols

    International Nuclear Information System (INIS)

    Rimondini, A.; Mucelli, R.P.; Dalla Palma, L.; De Denaro, M.; Bregant, P.

    2001-01-01

    The aim of this study was to test different technical spiral-CT parameters to obtain optimal image quality with reduced X-ray dose. Images were acquired with a spiral-CT system Philips Tomoscan AVE1, using 250 mA, 120 kV, and 1-s rotational time. Three protocols were tested: protocol A with 5-mm thickness, pitch 1.6, slice reconstruction every 2.5 mm; protocol B with 3-mm thickness, pitch 1.6, slice reconstruction every 1.5 mm; and protocol C with 3-mm thickness, pitch 2, slice reconstruction every 1.5 mm. Two phantoms were employed to evaluate the image quality. Axial images were acquired, then sagittal and coronal images were reconstructed. Finally, the absorbed X-ray dose for each protocol was measured. Regarding image quality, 5-mm-thick images (protocol A) showed greater spatial resolution and lower noise compared with 3-mm-thick images (protocols B and C) on the axial plane; 3-mm reconstructed sagittal and coronal images (protocols B and C) showed an improved image quality compared with 5-mm reformatted images (protocol A). Concerning X-ray dose, the mean dose was: protocol A 19.6±0.8 mGy; protocol B 14.4±0.6 mGy; protocol C 12.5±1.0 mGy. Our study supports the use of thin slices (3 mm) combined with pitch of 1.6 or 2 in renal colic for X-ray dose reduction to the patient and good image quality. (orig.)

  17. [Multidisciplinary protocol for computed tomography imaging and angiographic embolization of splenic injury due to trauma: assessment of pre-protocol and post-protocol outcomes].

    Science.gov (United States)

    Koo, M; Sabaté, A; Magalló, P; García, M A; Domínguez, J; de Lama, M E; López, S

    2011-11-01

    To assess conservative treatment of splenic injury due to trauma, following a protocol for computed tomography (CT) and angiographic embolization. To quantify the predictive value of CT for detecting bleeding and need for embolization. The care protocol developed by the multidisciplinary team consisted of angiography with embolization of lesions revealed by contrast extravasation under CT as well as embolization of grade III-V injuries observed, or grade I-II injuries causing hemodynamic instability and/or need for blood transfusion. We collected data on demographic variables, injury severity score (ISS), angiographic findings, and injuries revealed by CT. Pre-protocol and post-protocol outcomes were compared. The sensitivity and specificity of CT findings were calculated for all patients who required angiographic embolization. Forty-four and 30 angiographies were performed in the pre- and post-protocol periods, respectively. The mean (SD) ISSs in the two periods were 25 (11) and 26 (12), respectively. A total of 24 (54%) embolizations were performed in the pre-protocol period and 28 (98%) after implementation of the protocol. Two and 7 embolizations involved the spleen in the 2 periods, respectively; abdominal laparotomies numbered 32 and 25, respectively, and 10 (31%) vs 4 (16%) splenectomies were performed. The specificity and sensitivity values for contrast extravasation found on CT and followed by embolization were 77.7% and 79.5%. The implementation of this multidisciplinary protocol using CT imaging and angiographic embolization led to a decrease in the number of splenectomies. The protocol allows us to take a more conservative treatment approach.

  18. A False-name-Proof Double Auction Protocol for Arbitrary Evaluation Values

    Science.gov (United States)

    Sakurai, Yuko; Yokoo, Makoto

    We develop a new false-name-proof double auction protocol called the Generalized Threshold Price Double auction (GTPD) protocol. False-name-proofness generalizes strategy-proofness by incorporating the possibility of false-name bids, e.g., bids submitted using multiple e-mail addresses. An existing protocol called TPD protocol is false-name-proof but can handle only the cases where marginal utilities of each agent always decrease, while our new GTPD protocol can handle arbitrary evaluation values. When marginal utilities can increase, some bids cannot be divided into a single unit (e.g., an all-or-nothing bid). Due to the existence of such indivisible bids, meeting supply/demand becomes difficult. Furthermore, a seller/buyer can submit a false-name-bid by pretending to be a potential buyer/seller to manipulate allocations and payments. In the GTPD protocol, the auctioneer is required to absorb the supply-demand imbalance up to a given upper-bound. Also, the GTPD incorporate a new false-name-proof one-sided auction protocol that is guaranteed to sell/buy a certain number of units. Simulation results show that when the threshold price is set appropriately, this protocol can obtain a good social surplus, and the number of absorbed units is much smaller than the given upper-bound.

  19. Desensitization protocols and their outcome.

    Science.gov (United States)

    Marfo, Kwaku; Lu, Amy; Ling, Min; Akalin, Enver

    2011-04-01

    In the last decade, transplantation across previously incompatible barriers has increasingly become popular because of organ donor shortage, availability of better methods of detecting and characterizing anti-HLA antibodies, ease of diagnosis, better understanding of antibody-mediated rejection, and the availability of effective regimens. This review summarizes all manuscripts published since the first publication in 2000 on desensitized patients and discusses clinical outcomes including acute and chronic antibody-mediated rejection rate, the new agents available, kidney paired exchange programs, and the future directions in sensitized patients. There were 21 studies published between 2000 and 2010, involving 725 patients with donor-specific anti-HLA antibodies (DSAs) who underwent kidney transplantation with different desensitization protocols. All studies were single center and retrospective. The patient and graft survival were 95% and 86%, respectively, at a 2-year median follow-up. Despite acceptable short-term patient and graft survivals, acute rejection rate was 36% and acute antibody-mediated rejection rate was 28%, which is significantly higher than in nonsensitized patients. Recent studies with longer follow-up of those patients raised concerns about long-term success of desensitization protocols. The studies utilizing protocol biopsies in desensitized patients also reported higher subclinical and chronic antibody-mediated rejection. An association between the strength of DSAs determined by median fluorescence intensity values of Luminex single-antigen beads and risk of rejection was observed. Two new agents, bortezomib, a proteasome inhibitor, and eculizumab, an anti-complement C5 antibody, were recently introduced to desensitization protocols. An alternative intervention is kidney paired exchange, which should be considered first for sensitized patients. © 2011 by the American Society of Nephrology

  20. About the Design of QUIC Firefox Transport Protocol

    Directory of Open Access Journals (Sweden)

    Vraj Pandya

    2017-07-01

    Full Text Available QUIC (Quick UDP Internet Connections Chrome is an experimental transport layer network protocol designed by Jim Roskind at Google, initially implemented in 2012 and announced publicly in 2013. One of the QUIC's goals is to improve performance of connection-oriented web applications that are currently using the Transmission Control Protocol (TCP. To do that, QUIC achieves a reduced latency and a better stream-multiplexing support to avoid network congestion. In 2015, Firefox Mozilla started to work on an equivalent QUIC transport protocol for their browser. This idea was motivated by the differences between Chrome and Firefox. Despite the fact that Mozilla Firefox and Google Chrome are both web browser engines, there are some significant differences between them, such as file hierarchy, open source policies (Firefox is completely, while Chrome is only partial, tabs design, continuous integration, and more. Likewise QUIC Chrome, QUIC Firefox is a new multiplexed and secure transport based on User Datagram Protocol (UDP, designed from the ground up and optimized for Hyper-Text Transfer Protocol 2 (HTTP/2 semantics. While built with HTTP/2 as the primary application protocol, QUIC builds on decades of transport and security experience, and implements mechanisms that make it attractive as a modern general-purpose transport. In addition to describing the main design of QUIC Firefox, this paper will compare Firefox with QUIC Firefox. Our preliminary experimental results support that QUIC Firefox has a faster execution time, less latency time, and a better throughput time than the traditional Firefox.  

  1. Implementing the WebSocket Protocol Based on Formal Modelling and Automated Code Generation

    DEFF Research Database (Denmark)

    Simonsen, Kent Inge; Kristensen, Lars Michael

    2014-01-01

    with pragmatic annotations for automated code generation of protocol software. The contribution of this paper is an application of the approach as implemented in the PetriCode tool to obtain protocol software implementing the IETF WebSocket protocol. This demonstrates the scalability of our approach to real...... protocols. Furthermore, we perform formal verification of the CPN model prior to code generation, and test the implementation for interoperability against the Autobahn WebSocket test-suite resulting in 97% and 99% success rate for the client and server implementation, respectively. The tests show...

  2. Protocol-based care: the standardisation of decision-making?

    Science.gov (United States)

    Rycroft-Malone, Jo; Fontenla, Marina; Seers, Kate; Bick, Debra

    2009-05-01

    To explore how protocol-based care affects clinical decision-making. In the context of evidence-based practice, protocol-based care is a mechanism for facilitating the standardisation of care and streamlining decision-making through rationalising the information with which to make judgements and ultimately decisions. However, whether protocol-based care does, in the reality of practice, standardise decision-making is unknown. This paper reports on a study that explored the impact of protocol-based care on nurses' decision-making. Theoretically informed by realistic evaluation and the promoting action on research implementation in health services framework, a case study design using ethnographic methods was used. Two sites were purposively sampled; a diabetic and endocrine unit and a cardiac medical unit. Within each site, data collection included observation, postobservation semi-structured interviews with staff and patients, field notes, feedback sessions and document review. Data were inductively and thematically analysed. Decisions made by nurses in both sites were varied according to many different and interacting factors. While several standardised care approaches were available for use, in reality, a variety of information sources informed decision-making. The primary approach to knowledge exchange and acquisition was person-to-person; decision-making was a social activity. Rarely were standardised care approaches obviously referred to; nurses described following a mental flowchart, not necessarily linked to a particular guideline or protocol. When standardised care approaches were used, it was reported that they were used flexibly and particularised. While the logic of protocol-based care is algorithmic, in the reality of clinical practice, other sources of information supported nurses' decision-making process. This has significant implications for the political goal of standardisation. The successful implementation and judicious use of tools such as

  3. Response to a spill of national significance

    International Nuclear Information System (INIS)

    Jensen, D.S.; Pond, R.; Johnson, M.H.

    1993-01-01

    Responding to a spill of national significance (SONS), such as the 1989 Exxon Valdez spill, requires an augmenting organization to support the local response organization. The US Coast Guard has developed SONS protocol to be better prepared to respond to these infrequent catastrophic spills. A flag-level Coast Guard officer assumes the role of national incident commander (NIC) and federal on-scene coordinator (OSC), and is supported by a national incident task force (NITF). The major role of the NITF is to develop a national response strategy, acquire response resources and allocate them efficiently, and effectively deal with many peripheral national issues. Unified command concepts have been incorporated into the NITF and its primary organizational elements. In addition, frequent training and exercising is essential to keep the SONS protocol's preparedness at an acceptable level

  4. LEACH-A: An Adaptive Method for Improving LEACH Protocol

    Directory of Open Access Journals (Sweden)

    Jianli ZHAO

    2014-01-01

    Full Text Available Energy has become one of the most important constraints on wireless sensor networks. Hence, many researchers in this field focus on how to design a routing protocol to prolong the lifetime of the network. The classical hierarchical protocols such as LEACH and LEACH-C have better performance in saving the energy consumption. However, the choosing strategy only based on the largest residue energy or shortest distance will still consume more energy. In this paper an adaptive routing protocol named “LEACH-A” which has an energy threshold E0 is proposed. If there are cluster nodes whose residual energy are greater than E0, the node of largest residual energy is selected to communicated with the base station; When all the cluster nodes energy are less than E0, the node nearest to the base station is select to communication with the base station. Simulations show that our improved protocol LEACH-A performs better than the LEACH and the LEACH-C.

  5. [Analysis of palliative sedation in hospitalised elderly patients: Effectiveness of a protocol].

    Science.gov (United States)

    Mateos-Nozal, Jesús; García-Cabrera, Lorena; Montero Errasquín, Beatriz; Cruz-Jentoft, Alfonso José; Rexach Cano, Lourdes

    2016-01-01

    To measure changes in the practice of palliative sedation during agony in hospitalised elderly patients before and after the implementation of a palliative sedation protocol. A retrospective before-after study was performed in hospitalised patients over 65 years old who received midazolam during hospital admission and died in the hospital in two 3-month periods, before and after the implementation of the protocol. Non-sedative uses of midazolam and patients in intensive care were excluded. Patient and admission characteristics, the consent process, withdrawal of life-sustaining treatments, and the sedation process (refractory symptom treated, drug doses, assessment and use of other drugs) were recorded. Association was analysed using the Chi(2) and Student t tests. A total of 143 patients were included, with no significant differences between groups in demographic characteristics or symptoms. Do not resuscitate (DNR) orders were recorded in approximately 70% of the subjects of each group, and informed consent for sedation was recorded in 91% before vs. 84% after the protocol. Induction and maintenance doses of midazolam followed protocol recommendations in 1.3% before vs 10.4% after the protocol was implemented (P=.02) and adequate rescue doses were used in 1.3% vs 11.9% respectively (P=.01). Midazolam doses were significantly lower (9.86mg vs 18.67mg, Psedation score was used in 8% vs. 12% and the Palliative Care Team was involved in 35.5% and 16.4% of the cases (P=.008) before and after the protocol, respectively. Use of midazolam slightly improved after the implementation of a hospital protocol on palliative sedation. The percentage of adequate sedations and the general process of sedation were mostly unchanged by the protocol. More education and further assessment is needed to gauge the effect of these measures in the future. Copyright © 2015 SEGG. Published by Elsevier Espana. All rights reserved.

  6. Efficacy of 2 finishing protocols in the quality of orthodontic treatment outcome.

    Science.gov (United States)

    Stock, Gregory J; McNamara, James A; Baccetti, Tiziano

    2011-11-01

    The objectives of this prospective clinical study were to evaluate the quality of treatment outcomes achieved with a complex orthodontic finishing protocol involving serpentine wires and a tooth positioner, and to compare it with the outcomes of a standard finishing protocol involving archwire bends used to detail the occlusion near the end of active treatment. The complex finishing protocol sample consisted of 34 consecutively treated patients; 1 week before debonding, their molar bands were removed, and serpentine wires were placed; this was followed by active wear of a tooth positioner for up to 1 month after debonding. The standard finishing protocol group consisted of 34 patients; their dental arches were detailed with archwire bends and vertical elastics. The objective grading system of the American Board of Orthodontics was used to quantify the quality of the finish at each time point. The Wilcoxon signed rank test was used to compare changes in the complex finishing protocol; the Mann-Whitney U test was used to compare changes between groups. The complex finishing protocol group experienced a clinically significant improvement in objective grading system scores after treatment with the positioner. Mild improvement in posterior space closure was noted after molar band removal, but no improvement in the occlusion was observed after placement of the serpentine wires. Patients managed with the complex finishing protocol also had a lower objective grading system score (14.7) at the end of active treatment than did patients undergoing the standard finishing protocol (23.0). Tooth positioners caused a clinically significant improvement in interocclusal contacts, interproximal contacts, and net objective grading system score; mild improvement in posterior band space was noted after molar band removal 1 week before debond. Copyright © 2011 American Association of Orthodontists. Published by Mosby, Inc. All rights reserved.

  7. Internet Core Protocols Help for Network Administrators

    CERN Document Server

    Hall, Eric

    2000-01-01

    If you've ever been responsible for a network, you know that sinkingfeeling: your pager has gone off at 2 a.m., the network is broken, and you can't figure out why by using a dial-in connection from home. You drive into the office, dig out your protocol analyzer, and spend the next fourhours trying to put things back together before the staff shows up for work. When this happens, you often find yourself looking at the low-level guts of the Internet protocols: you're deciphering individual packets, trying to figure out what is (or isn't) happening. Until now, the only real guide to the protoc

  8. Shoulder muscle endurance: the development of a standardized and reliable protocol

    Directory of Open Access Journals (Sweden)

    Roy Jean-Sébastien

    2011-01-01

    Full Text Available Abstract Background Shoulder muscle fatigue has been proposed as a possible link to explain the association between repetitive arm use and the development of rotator cuff disorders. To our knowledge, no standardized clinical endurance protocol has been developed to evaluate the effects of muscle fatigue on shoulder function. Such a test could improve clinical examination of individuals with shoulder disorders. Therefore, the purpose of this study was to establish a reliable protocol for objective assessment of shoulder muscle endurance. Methods An endurance protocol was developed on a stationary dynamometer (Biodex System 3. The endurance protocol was performed in isotonic mode with the resistance set at 50% of each subject's peak torque as measured for shoulder external (ER and internal rotation (IR. Each subject performed 60 continuous repetitions of IR/ER rotation. The endurance protocol was performed by 36 healthy individuals on two separate occasions at least two days apart. Maximal isometric shoulder strength tests were performed before and after the fatigue protocol to evaluate the effects of the endurance protocol and its reliability. Paired t-tests were used to evaluate the reduction in shoulder strength due to the protocol, while intraclass correlation coefficients (ICC and minimal detectable change (MDC were used to evaluate its reliability. Results Maximal isometric strength was significantly decreased after the endurance protocol (P 0.84. Conclusions Changes in muscular performance observed during and after the muscular endurance protocol suggests that the protocol did result in muscular fatigue. Furthermore, this study established that the resultant effects of fatigue of the proposed isotonic protocol were reproducible over time. The protocol was performed without difficulty by all volunteers and took less than 10 minutes to perform, suggesting that it might be feasible for clinical practice. This protocol could be used to induce

  9. [Analyzing consumer preference by using the latest semantic model for verbal protocol].

    Science.gov (United States)

    Tamari, Yuki; Takemura, Kazuhisa

    2012-02-01

    This paper examines consumers' preferences for competing brands by using a preference model of verbal protocols. Participants were 150 university students, who reported their opinions and feelings about McDonalds and Mos Burger (competing hamburger restaurants in Japan). Their verbal protocols were analyzed by using the singular value decomposition method, and the latent decision frames were estimated. The verbal protocols having a large value in the decision frames could be interpreted as showing attributes that consumers emphasize. Based on the estimated decision frames, we predicted consumers' preferences using the logistic regression analysis method. The results indicate that the decision frames projected from the verbal protocol data explained consumers' preferences effectively.

  10. Intensive group training protocol versus guideline physiotherapy for patients with chronic low back pain: a randomised controlled trial.

    Science.gov (United States)

    van der Roer, Nicole; van Tulder, Maurits; Barendse, Johanna; Knol, Dirk; van Mechelen, Willem; de Vet, Henrica

    2008-09-01

    Intensive group training using principles of graded activity has been proven to be effective in occupational care for workers with chronic low back pain. Objective of the study was to compare the effects of an intensive group training protocol aimed at returning to normal daily activities and guideline physiotherapy for primary care patients with non-specific chronic low back pain. The study was designed as pragmatic randomised controlled trial with a setup of 105 primary care physiotherapists in 49 practices and 114 patients with non-specific low back pain of more than 12 weeks duration participated in the study. In the intensive group training protocol exercise therapy, back school and operant-conditioning behavioural principles are combined. Patients were treated during 10 individual sessions along 20 group sessions. Usual care consisted of physiotherapy according to the Dutch guidelines for Low Back Pain. Main outcome measures were functional disability (Roland Morris disability questionnaire), pain intensity, perceived recovery and sick leave because of low back pain assessed at baseline and after 6, 13, 26 and 52 weeks. Both an intention-to-treat analysis and a per-protocol analysis were performed. Multilevel analysis did not show significant differences between both treatment groups on any outcome measures during the complete follow-up period, with one exception. After 26 weeks the protocol group showed more reduction in pain intensity than the guideline group, but this difference was absent after 52 weeks. We finally conclude that an intensive group training protocol was not more effective than usual physiotherapy for chronic low back pain.

  11. Quantum secret information equal exchange protocol based on dense coding

    Science.gov (United States)

    Jiang, Ying-Hua; Zhang, Shi-Bin; Dai, Jin-Qiao; Shi, Zhi-Ping

    2018-04-01

    In this paper, we design a novel quantum secret information equal exchange protocol, which implements the equal exchange of secret information between the two parties with the help of semi-trusted third party (TP). In the protocol, EPR pairs prepared by the TP are, respectively, distributed to both the communication parties. Then, the two parties perform Pauli operation on each particle and return the new particles to TP, respectively. TP measures each new pair with Bell basis and announces the measurement results. Both parties deduce the secret information of each other according to the result of announcement by TP. Finally, the security analysis shows that this protocol solves the problem about equal exchange of secret information between two parties and verifies the security of semi-trusted TPs. It proves that the protocol can effectively resist glitch attacks, intercept retransmission attacks and entanglement attack.

  12. The Groningen Protocol - the Jewish perspective.

    Science.gov (United States)

    Gesundheit, Benjamin; Steinberg, Avraham; Blazer, Shraga; Jotkowitz, Alan

    2009-01-01

    Despite significant advances in neonatology, there will always be newborns with serious life-threatening conditions creating most difficult bioethical dilemmas. Active euthanasia for adult patients is one of the most controversial bioethical questions; for severely ill neonates, the issue is even more complex, due to their inability to take part in any decision concerning their future. The Groningen Protocol introduced in 2005 by P.J. Sauer proposes criteria allowing active euthanasia for severely ill, not necessarily terminal, newborns with incurable conditions and poor quality of life in order to spare them unbearable suffering. We discuss the ethical dilemma and ideological foundations of the protocol, the opinions of its defenders and critics, and the dangers involved. The Jewish perspective relating to the subject is presented based on classical Jewish sources, which we trust may enrich modern bioethical debates. In Jewish law, the fetus acquires full legal status only after birth. However, while the lives of terminally ill neonates must in no way be actively destroyed or shortened, there is no obligation to make extraordinary efforts to prolong their lives. Accurate preimplantation or prenatal diagnosis might significantly reduce the incidence of nonviable births, but active killing of infants violates the basic foundations of Jewish law, and opens the 'slippery slope' for uncontrolled abuse. Therefore, we call upon the international medical and bioethical community to reject the Groningen Protocol that permits euthanization and to develop ethical guidelines for the optimal care of severely compromised neonates. Copyright 2009 S. Karger AG, Basel.

  13. Performance Evaluation of AODV Routing Protocol in VANET with NS2

    Directory of Open Access Journals (Sweden)

    Divya Rathi

    2017-03-01

    Full Text Available In intelligent transportation systems, the collaboration between vehicles and the road side units is essential to bring these systems to realization. The emerging Vehicular Ad Hoc Network (VANET is becoming more and more important as it provides intelligent transportation application, comfort, safety, entertainment for people in vehicles. In order to provide stable routes and to get good performance in VANET, there is a need of proper routing protocols must be designed. In this paper, we are working with the very well-known ad-hoc on-demand distance vector (AODV routing protocol. The existing Routing protocol AODV-L which is based on the Link expiration time is extended to propose a more reliable AODV-AD which is based on multichannel MAC protocol. For the performance evaluation of routing protocols, a simulation tool ‘NS2’ has been used. Simulation results show that the proposed AODV-AD protocol can achieves better performances in forms of high Route stability, Packet Delivery ratio and packet loss rate than traditional AODV-L and traditional AODV.

  14. A Survey of Enhanced Recovery After Surgery Protocols for Cesarean Delivery in Serbia

    Directory of Open Access Journals (Sweden)

    Borislava Pujic

    2018-04-01

    Full Text Available Enhanced recovery after surgery (ERAS protocols have been described for patients undergoing colon surgery. Similar protocols for cesarean delivery (CD have been developed recently. CD is one of the most commonly performed surgical procedures, and adoption of ERAS protocols following CD might benefit patients and the health-care system. We aimed to determine which Serbian hospitals reported ERAS protocols, which elements of ERAS protocols were used in CD patients, and whether ERAS and non-ERAS hospitals differed. The survey was sent to all hospitals with obstetric services and 46 of 49 responded. The questionnaire asked whether ERAS protocols had been formally adopted for surgical patients and about their use in CD patients. Specific questions on elements described in other obstetric ERAS protocols for CD included preoperative patient preparation, type of anesthesia and temperature monitoring used for CD, maternal/neonatal contact, and time to discharge. ERAS protocols are used in 24% of surveyed hospitals, 84% admit the patient the day before elective CDs, 87% use a maternal bowel preparation morning on the day of CD, and 80% administer maternal deep venous thrombosis prophylaxis. Only 33% remove IV in the first postoperative day, and 89% of women do not eat solid food until the day following their CD. Neuraxial anesthesia is used in 46% of elective CDs in ERAS hospitals compared to 9% in non-ERAS hospitals (P < 0.01, and neuraxial narcotics for post CD analgesia are given more often in ERAS hospitals. Thirty-six percentage of ERAS patients are discharged within 3 days vs. none in the non-ERAS group. Few elements of ERAS protocols reported from other centers outside Serbia are employed in Serbian hospitals performing CD. Despite significant changes that have been made recently in CD care, enhanced recovery after CD could be significantly improved in Serbian hospitals.

  15. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  16. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  17. From small to insignificant. Climate impact of the Kyoto Protocol with and without US

    International Nuclear Information System (INIS)

    Hagem, Cathrine; Holtsmark, Bjart

    2001-06-01

    American president George W. Bush has declared that he will not ask the Senate to ratify the Kyoto Protocol. This commentary explores the potential impact of implementing the Kyoto Protocol without the participation of the United States. Because, in practice, the United States would have taken on a relatively large share of the Protocol's abatement commitments, we conclude that implementing the Protocol without the participation of United States will lead to significantly less reductions in global emissions. The international permit price will be considerably lower if the United States does not participate. (author)

  18. Indirect MR venography: contrast medium protocols, postprocessing and combination in diagnosing pulmonary emboli with MRI

    International Nuclear Information System (INIS)

    Kluge, A.; Bachmann, G.; Rominger, M.; Schoenburg, M.

    2004-01-01

    Purpose: Integration of MR venography in a comprehensive MR imaging protocol in patients with suspected pulmonary embolism (PE) and evaluation of contrast media dosage, timing and postprocessing for diagnostic accuracy. Materials and Methods: Fortyeight consecutive inpatients with suspected PE or deep vein thrombosis were examined by MR venography according to one of the following protocols: protocol I: MR venography only, 0.25 mmol/kg bodyweight (BW) Gadopentate dimeglumine(Gd-DTPA) as single dose, bolus timing; protocol II: MR angiography of pulmonary arteries with a cumulative dosage of 0.25 mmol/kg contrast media, modification of coil setting for MR venography without further contrast media application; protocol III: as protocol II but with 0.125 mmol/kg BW, followed by MR venography. Signal-to-noise ratio, contrast-to-noise ratio, number of definable vascular segments and image quality were evaluated. The results were compared to conventional bilateral venography. Results: All MR venography examinations were of diagnostic quality and the examination time was below 10 min. MR venography could be performed in all 48 patients comparted to 43 of 48 patients for conventional venography. Significantly more superficial and deep veins of the leg could be visualized by MR venography (94% compared to 83% for conventional venography). Sensitivity and specificity were 100% and 92%, respectively. Quality differed significantly between 0.125 mmol/kg (protocol III) and 0.25 mmol/kg Gd-DTPA (protocols I and II) while timing did not influence quality (protocol I vs. II). (orig.) [de

  19. Performance of Differential-Phase-Shift Keying Protocol Applying 1310 nm Up-Conversion Single-Photon Detector

    International Nuclear Information System (INIS)

    Chen-Xu, Feng; Rong-Zhen, Jiao; Wen-Han, Zhang

    2008-01-01

    The performance of the differential-phase-shift keying (DPSK) protocol applying a 1310 nm up-conversion single-photon detector is analysed. The error rate and the communication rate as a function of distance for three quantum key distribution protocols, the Bennett–Brassard 1984, the Bennett–Brassard–Mermin 1992, and the DPSK, are presented. Then we compare the performance of these three protocols using the 1310nm up-conversion detector. We draw the conclusion that the DPSK protocol applying the detector has significant advantage over the other two protocols. Longer transmission distance and lower error rate can be achieved. (general)

  20. Cluster Based Hierarchical Routing Protocol for Wireless Sensor Network

    OpenAIRE

    Rashed, Md. Golam; Kabir, M. Hasnat; Rahim, Muhammad Sajjadur; Ullah, Shaikh Enayet

    2012-01-01

    The efficient use of energy source in a sensor node is most desirable criteria for prolong the life time of wireless sensor network. In this paper, we propose a two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol (CBHRP). We introduce a new concept called head-set, consists of one active cluster head and some other associate cluster heads within a cluster. The head-set members are responsible for control and management of the network. Results show that t...

  1. Analysis of agreement between cardiac risk stratification protocols applied to participants of a center for cardiac rehabilitation

    Directory of Open Access Journals (Sweden)

    Ana A. S. Santos

    2016-01-01

    Full Text Available ABSTRACT Background Cardiac risk stratification is related to the risk of the occurrence of events induced by exercise. Despite the existence of several protocols to calculate risk stratification, studies indicating that there is similarity between these protocols are still unknown. Objective To evaluate the agreement between the existing protocols on cardiac risk rating in cardiac patients. Method The records of 50 patients from a cardiac rehabilitation program were analyzed, from which the following information was extracted: age, sex, weight, height, clinical diagnosis, medical history, risk factors, associated diseases, and the results from the most recent laboratory and complementary tests performed. This information was used for risk stratification of the patients in the protocols of the American College of Sports Medicine, the Brazilian Society of Cardiology, the American Heart Association, the protocol designed by Frederic J. Pashkow, the American Association of Cardiovascular and Pulmonary Rehabilitation, the Société Française de Cardiologie, and the Sociedad Española de Cardiología. Descriptive statistics were used to characterize the sample and the analysis of agreement between the protocols was calculated using the Kappa coefficient. Differences were considered with a significance level of 5%. Results Of the 21 analyses of agreement, 12 were considered significant between the protocols used for risk classification, with nine classified as moderate and three as low. No agreements were classified as excellent. Different proportions were observed in each risk category, with significant differences between the protocols for all risk categories. Conclusion The agreements between the protocols were considered low and moderate and the risk proportions differed between protocols.

  2. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  3. Recursion Versus Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Hüttel, Hans; Srba, Jiri

    2005-01-01

    We use some very recent techniques from process algebra to draw interesting conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbee...

  4. Decidability Issues for Extended Ping-Pong Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2006-01-01

    We use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek...

  5. Effect of various practical warm-up protocols on acute lower-body power.

    Science.gov (United States)

    Buttifant, David; Hrysomallis, Con

    2015-03-01

    The purpose of this study was to compare the acute effect of box squats with barbell (BBSquat), box squats with elastic resistance bands (BandSquat), and static stretches (SStretch) on external power during a 20-kg weighted jump squat. Twelve male athletes performed each of the 3 warm-up protocols on separate occasions in a randomized order. Weighted jump squat power was assessed using a linear position transducer attached to the bar of a Smith machine. Jump power was measured pre-warm-up and 5 and 10 minutes post-warm-up protocol. The BBSquat protocol involved 3 sets of 3RM, BandSquat involved 3 sets of 3 repetitions using highest resistance elastic bands, and the SStretch protocol comprises two 30-second stretches for muscles of the lower limbs. Jump power significantly increased from pre-warm-up to 5 and 10 minutes post-warm-up for both the BandSquat and BBSquat protocols. There was no statistical difference in power values between BandSquat and BBSquat. Power output significantly decreased from pre-warm-up to 5 and 10 minutes post-warm-up for the SStretch protocol. The BandSquat was just as effective as BBSquat in augmenting acute jump power. The SStretch was detrimental to jump performance. A practical warm-up using relatively inexpensive and portable equipment such as elastic resistance bands was just as effective as a warm-up protocol that requires more substantial and less transportable equipment such as a squat rack and associated free weights. The BandSquat warm-up may be considered more accessible for athletes at various competition levels.

  6. Epistemic Protocols for Distributed Gossiping

    Directory of Open Access Journals (Sweden)

    Krzysztof R. Apt

    2016-06-01

    Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.

  7. A Review of Vehicle to Vehicle Communication Protocols for VANETs in the Urban Environment

    Directory of Open Access Journals (Sweden)

    Irshad Ahmed Abbasi

    2018-01-01

    Full Text Available Vehicular Ad-hoc Networks (VANETs have been gaining significant attention from the research community due to their increasing importance for building an intelligent transportation system. The characteristics of VANETs, such as high mobility, network partitioning, intermittent connectivity and obstacles in city environments, make routing a challenging task. Due to these characteristics of VANETs, the performance of a routing protocol is degraded. The position-based routing is considered to be the most significant approach in VANETs. In this paper, we present a brief review of most significant position based unicast routing protocols designed for vehicle to vehicle communications in the urban environment. We provide them with their working features for exchanging information between vehicular nodes. We describe their pros and cons. This study also provides a comparison of the vehicle to vehicle communication based routing protocols. The comparative study is based on some significant factors such as mobility, traffic density, forwarding techniques and method of junction selection mechanism, and strategy used to handle a local optimum situation. It also provides the simulation based study of existing dynamic junction selection routing protocols and a static junction selection routing protocol. It provides a profound insight into the routing techniques suggested in this area and the most valuable solutions to advance VANETs. More importantly, it can be used as a source of references to other researchers in finding literature that is relevant to routing in VANETs.

  8. Using semantics for representing experimental protocols.

    Science.gov (United States)

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  9. A Robust Open Ascending-price Multi-unit Auction Protocol against False-name Bids

    Science.gov (United States)

    Iwasaki, Atsushi; Yokoo, Makoto; Terada, Kenji

    This paper develops a new ascending-price multi-unit auction protocol that has following characteristics: (i) it has an open format, (ii) sincere bidding is an equilibrium strategy even if the marginal utilities of each agent can increase and agents can submit false-name bids. False-name bids are bids submitted under fictitious names such as multiple e-mail addresses, which can be done easily in the Internet. This is the first protocol that has these two characteristics. We show that our new protocol outperforms an existing protocol, which satisfies (ii), with respect to the social surplus and the seller's revenue.

  10. Robot training of upper limb in multiple sclerosis: comparing protocols with or without manipulative task components.

    Science.gov (United States)

    Carpinella, Ilaria; Cattaneo, Davide; Bertoni, Rita; Ferrarin, Maurizio

    2012-05-01

    In this pilot study, we compared two protocols for robot-based rehabilitation of upper limb in multiple sclerosis (MS): a protocol involving reaching tasks (RT) requiring arm transport only and a protocol requiring both objects' reaching and manipulation (RMT). Twenty-two MS subjects were assigned to RT or RMT group. Both protocols consisted of eight sessions. During RT training, subjects moved the handle of a planar robotic manipulandum toward circular targets displayed on a screen. RMT protocol required patients to reach and manipulate real objects, by moving the robotic arm equipped with a handle which left the hand free for distal tasks. In both trainings, the robot generated resistive and perturbing forces. Subjects were evaluated with clinical and instrumental tests. The results confirmed that MS patients maintained the ability to adapt to the robot-generated forces and that the rate of motor learning increased across sessions. Robot-therapy significantly reduced arm tremor and improved arm kinematics and functional ability. Compared to RT, RMT protocol induced a significantly larger improvement in movements involving grasp (improvement in Grasp ARAT sub-score: RMT 77.4%, RT 29.5%, p=0.035) but not precision grip. Future studies are needed to evaluate if longer trainings and the use of robotic handles would significantly improve also fine manipulation.

  11. Improving treatment times for patients with in-hospital stroke using a standardized protocol.

    Science.gov (United States)

    Koge, Junpei; Matsumoto, Shoji; Nakahara, Ichiro; Ishii, Akira; Hatano, Taketo; Sadamasa, Nobutake; Kai, Yasutoshi; Ando, Mitsushige; Saka, Makoto; Chihara, Hideo; Takita, Wataru; Tokunaga, Keisuke; Kamata, Takahiko; Nishi, Hidehisa; Hashimoto, Tetsuya; Tsujimoto, Atsushi; Kira, Jun-Ichi; Nagata, Izumi

    2017-10-15

    Previous reports have shown significant delays in treatment of in-hospital stroke (IHS). We developed and implemented our IHS alert protocol in April 2014. We aimed to determine the influence of implementation of our IHS alert protocol. Our implementation processes comprise the following four main steps: IHS protocol development, workshops for hospital staff to learn about the protocol, preparation of standardized IHS treatment kits, and obtaining feedback in a monthly hospital staff conference. We retrospectively compared protocol metrics and clinical outcomes of patients with IHS treated with intravenous thrombolysis and/or endovascular therapy between before (January 2008-March 2014) and after implementation (April 2014-December 2016). Fifty-five patients were included (pre, 25; post, 30). After the implementation, significant reductions occurred in the median time from stroke recognition to evaluation by a neurologist (30 vs. 13.5min, pvs. 26.5min, pvs. 16min, p=0.02). The median time from first neuroimaging to endovascular therapy had a tendency to decrease (75 vs. 53min, p=0.08). There were no differences in the favorable outcomes (modified Rankin scale score of 0-2) at discharge or the incidence of symptomatic intracranial hemorrhage between the two periods. Our IHS alert protocol implementation saved time in treating patients with IHS without compromising safety. Copyright © 2017 Elsevier B.V. All rights reserved.

  12. Implementation of a more physiological plasma rich in growth factor (PRGF) protocol: Anticoagulant removal and reduction in activator concentration.

    Science.gov (United States)

    Anitua, Eduardo; Prado, Roberto; Troya, María; Zalduendo, Mar; de la Fuente, María; Pino, Ander; Muruzabal, Francisco; Orive, Gorka

    2016-07-01

    Plasma rich in growth factors (PRGF) is a biological therapy that uses patient's own growth factors for promoting tissue regeneration. Given the current European regulatory framework in which anticoagulant solution in blood extraction tubes could be considered as a medicinal product, a new PRGF protocol has been developed. The actual protocol (PRGF-A) and the new one (PRGF-B) have been performed and compared under Good Laboratory Practices. PRGF-A protocol uses extraction tubes with 0.9 mL of trisodium citrate as anticoagulant and 50 μL of calcium chloride/mL PRGF to activate it. The PRGF-B reduces the amount of sodium citrate and calcium chloride to 0.4 mL and to 20 μL, respectively. Basic hematological parameters, platelet function, the scaffold obtaining process, growth factors content, and the biological effect were compared between both PRGF obtaining protocols. PRGF-B protocol led to a statistically significant higher enrichment and recovery of platelets regarding to the PRGF-A. Hypotonic stress response by platelets was significantly better in the new protocol. A statistically significant decrease in the basal platelet activation status of PRGF-B compared to PRGF-A was also observed. The duration of the lag phase in the platelet aggregation assay was statistically lower for the PRGF-B protocol. Both the clotting and the clot retraction time were significantly reduced in the B protocol. A higher growth factor concentration was detected in the plasma obtained using the PRGF-B protocol. The new PRGF obtaining protocol, with a reduction in the amount of anticoagulant and activator, has even improved the actual one.

  13. Experimental Evaluation of Simulation Abstractions for Wireless Sensor Network MAC Protocols

    Directory of Open Access Journals (Sweden)

    G. P. Halkes

    2010-01-01

    Full Text Available The evaluation of MAC protocols for Wireless Sensor Networks (WSNs is often performed through simulation. These simulations necessarily abstract away from reality in many ways. However, the impact of these abstractions on the results of the simulations has received only limited attention. Moreover, many studies on the accuracy of simulation have studied either the physical layer and per link effects or routing protocol effects. To the best of our knowledge, no other work has focused on the study of the simulation abstractions with respect to MAC protocol performance. In this paper, we present the results of an experimental study of two often used abstractions in the simulation of WSN MAC protocols. We show that a simple SNR-based reception model can provide quite accurate results for metrics commonly used to evaluate MAC protocols. Furthermore, we provide an analysis of what the main sources of deviation are and thereby how the simulations can be improved to provide even better results.

  14. The Effect of Different Cleaning Protocols on Post Space: A SEM Study

    Directory of Open Access Journals (Sweden)

    Giuseppe Lo Giudice

    2016-01-01

    Full Text Available Aim. Purpose of the present paper is to analyze the efficiency of different post-space irrigation protocols. Methods. 28 single rooted teeth were endodontically treated. After post-space preparation every sample was assigned to one of three experimental groups and to one control group. In each group different irrigation protocols were performed as follows: EDTA (Group A, 37% orthophosphoric acid (Group B, and EDTA + 37% orthophosphoric acid with ultrasounds activation (Group C. In the control group (Group D the irrigate association was not activated by ultrasounds. Three zones (coronal, middle, and apical of each sample were analyzed by using Scan Electron Microscopy (SEM without any metallization procedures. The presence of smear layer on the canal surface was qualitatively evaluated by applying Serafino’s score with values included between 0 and 2. Results. The results of the research showed how Group C recorded the better results (0.81±0.72. Group A and Group B showed lower mean scores (1.06±0.69 and 1.08±0.77; Group D showed the lowest mean score of 1.30±0.69. The SEM observation analysis demonstrated how the smear layer presence decreased in the crown-apical direction. Conclusions. The different post-space treatments statistically determine significant differences on the dentinal surfaces cleansing. The absence of ultrasonic activation lowers the cleansing efficacy of endocanalar irrigants, showing sensible differences among each post-space zone.

  15. What is the best contrast injection protocol for 64-row multi-detector cardiac computed tomography?

    International Nuclear Information System (INIS)

    Lu Jinguo; Lv Bin; Chen Xiongbiao; Tang Xiang; Jiang Shiliang; Dai Ruping

    2010-01-01

    Objective: To determine the optimal contrast injection protocol for 64-MDCT coronary angiography. Materials and methods: One hundred and fifty consecutive patients scheduled to undergo retrospectively electrocardiographically gated 64-MDCT. Each 30 patients were assigned to use a different contrast protocol: group 1: uniphasic protocol (contrast injection without saline flush); group 2: biphasic protocol (contrast injection with saline flush); group 3A, 3B and 3C: triphasic protocol (contrast media + different saline diluted contrast media + saline flush). Image quality scores and artifacts were compared and evaluated on both transaxial and three-dimensional coronary artery images among each contrast protocol. Results: Among the triphasic protocol groups, group 3A (30%:70% contrast media-saline mixture was used in second phase) used the least contrast media and had the least frequency of streak artifacts, but there were no significant differences in coronary artery attenuation, image quality, visualization right and left heart structures. Among the uniphasic protocol group (group 1), biphasic protocol group (group 2) and triphasic protocol subgroup (group 3A), there were no significant differences in image quality scores of coronary artery (P = 0.18); uniphasic protocol group had the highest frequency of streak artifacts (20 cases) (P < 0.05) and had the most amount contrast media (67.0 ± 5.3 ml); biphasic protocol group had the least amount of contrast media (59.9 ± 4.9 ml) (P < 0.05) and had the highest attenuation of left main coronary artery and right coronary artery (P < 0.01), but had the least amount of clear visualization right heart structure (6 cases); triphasic protocol group (group 3A) had the most amount of clear visualization right heart structures (29 cases) were the most among the three groups (P < 0.05). Conclusion: Biphasic protocol are superior to the traditional uniphasic protocols for using the least total contrast media, having the least

  16. What is the best contrast injection protocol for 64-row multi-detector cardiac computed tomography?

    Energy Technology Data Exchange (ETDEWEB)

    Lu Jinguo [Department of Radiology, Cardiovascular Institute and Fuwai Hospital, Peking Union Medical College and Chinese Academy of Medical Sciences, 167 Beilishi Road, Beijing (China); Lv Bin, E-mail: blu@vip.sina.co [Department of Radiology, Cardiovascular Institute and Fuwai Hospital, Peking Union Medical College and Chinese Academy of Medical Sciences, 167 Beilishi Road, Beijing (China); Chen Xiongbiao; Tang Xiang; Jiang Shiliang; Dai Ruping [Department of Radiology, Cardiovascular Institute and Fuwai Hospital, Peking Union Medical College and Chinese Academy of Medical Sciences, 167 Beilishi Road, Beijing (China)

    2010-08-15

    Objective: To determine the optimal contrast injection protocol for 64-MDCT coronary angiography. Materials and methods: One hundred and fifty consecutive patients scheduled to undergo retrospectively electrocardiographically gated 64-MDCT. Each 30 patients were assigned to use a different contrast protocol: group 1: uniphasic protocol (contrast injection without saline flush); group 2: biphasic protocol (contrast injection with saline flush); group 3A, 3B and 3C: triphasic protocol (contrast media + different saline diluted contrast media + saline flush). Image quality scores and artifacts were compared and evaluated on both transaxial and three-dimensional coronary artery images among each contrast protocol. Results: Among the triphasic protocol groups, group 3A (30%:70% contrast media-saline mixture was used in second phase) used the least contrast media and had the least frequency of streak artifacts, but there were no significant differences in coronary artery attenuation, image quality, visualization right and left heart structures. Among the uniphasic protocol group (group 1), biphasic protocol group (group 2) and triphasic protocol subgroup (group 3A), there were no significant differences in image quality scores of coronary artery (P = 0.18); uniphasic protocol group had the highest frequency of streak artifacts (20 cases) (P < 0.05) and had the most amount contrast media (67.0 {+-} 5.3 ml); biphasic protocol group had the least amount of contrast media (59.9 {+-} 4.9 ml) (P < 0.05) and had the highest attenuation of left main coronary artery and right coronary artery (P < 0.01), but had the least amount of clear visualization right heart structure (6 cases); triphasic protocol group (group 3A) had the most amount of clear visualization right heart structures (29 cases) were the most among the three groups (P < 0.05). Conclusion: Biphasic protocol are superior to the traditional uniphasic protocols for using the least total contrast media, having the least

  17. PROTOCOL OF TREATMENT IN LOW BACK PAIN

    Directory of Open Access Journals (Sweden)

    Alisson Guimbala dos Santos Araujo

    2013-09-01

    Full Text Available Low back pain can be considered as one of the main factors that lead to decreased functional capacity of the human being. Being a frequent dysfunction in people, causing a decrease in quality of life, productivity and functional disability and is associated with important social and economic impact. Therefore the objective of the research was to assess the treatment protocols in low back pain. The study is characterized by being a literature of scientific articles, based on data published in PubMed, SciELO, BIREME and Cochrane from 2000 to 2012. We found eight scientific articles that addressed physical therapy methods in the treatment of low back pain, including a literature review. Related Articles show variation from one to 55 patients in groups, with a total of 185 patients studied. It was concluded then that it hasn’t met a specific treatment that is placed as the most effective for this pathology, although all include electrotherapy, manual therapy, exercise and RPG they show significant results in pain relief, quality of life thereby increasing functionality.

  18. "hCG priming" effect in controlled ovarian stimulation through a long protocol

    Directory of Open Access Journals (Sweden)

    Antsaklis Aris

    2009-08-01

    Full Text Available Abstract Background Recently, it has been demonstrated that, in patients down-regulated by GnRH analogues (GnRHa, a short-term pre-treatment with recombinant LH (rLH, prior to recombinant FSH (rFSH administration, increases the number of small antral follicle prior to FSH stimulation and the yield of normally fertilized embryos. However, no data exist in the literature regarding the potential beneficial effect of "hCG priming" in controlled ovarian hyperstimulation (COH through a long GnRH-a protocol, which binds the same receptor (LH/hCGR, though it is a much more potent compared to LH. The primary aims of this study were to assess the effect of short-term pre-rFSH administration of hCG in women entering an ICSI treatment cycle on follicular development, quality of oocytes and early embryo development. The secondary endpoints were to record the effects on endometrial quality and pregnancy rate. Methods Patients with a history of at least one previous unsuccessful ICSI cycle were randomly assigned into two groups to receive treatment with either a long protocol with rFSH (control group or a long protocol with rFSH and pre-treatment with hCG (hCG group. In particular, in the latter group, a fixed 7 days course of 200 IU/day hCG was administered as soon as pituitary desensitization was confirmed. Results The mean number of oocytes retrieved was not significantly different between the two treatment groups, although the percentage of mature oocytes tended to be higher but not significantly different in hCG-treated patients. The percentage of patients with more than one grade 3 embryos was higher in the pre-treatment group, which also showed a higher pregnancy rate. Conclusion All the above clinical observations, in conjunction with previous data, suggest a point towards a beneficial "hCG priming" effect in controlled ovarian hyperstimulation through a long GnRH-a down-regulation protocol, particularly in patients with previous ART failures.

  19. Introduction to basic immunological methods : Generalities, Principles, Protocols and Variants of basic protocols

    International Nuclear Information System (INIS)

    Mejri, Naceur

    2013-01-01

    This manuscript is dedicated to student of biological sciences. It provides the information necessary to perform practical works, the most commonly used in immunology. During my doctoral and post-doctoral periods, panoply of methods was employed in diverse subjects in my research. Technical means used in my investigations were diverse enough that i could extract a set of techniques that cover most the basic immunological methods. Each chapter of this manuscript contains a fairly complete description of immunological methods. In each topic the basic protocol and its variants were preceded by background information provided in paragraphs concerning the principle and generalities. The emphasis is placed on describing situations in which each method and its variants were used. These basic immunological methods are useful for students and even researchers studying the immune system of human, nice and other species. Different subjects showed not only detailed protocols but also photos or/and shemas used as support to illustrate some knowledge or practical knowledge. I hope that students will find this manual interesting, easy to use contains necessary information to acquire skills in immunological practice. (Author)

  20. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  1. Streetlight Control System Based on Wireless Communication over DALI Protocol

    Science.gov (United States)

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-01-01

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed. PMID:27128923

  2. Streetlight Control System Based on Wireless Communication over DALI Protocol.

    Science.gov (United States)

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-04-27

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed.

  3. A class-chest for deriving transport protocols

    Energy Technology Data Exchange (ETDEWEB)

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  4. 64-section multidetector CT of the upper abdomen: optimization of a saline chaser injection protocol for improved vascular and parenchymal contrast enhancement

    Energy Technology Data Exchange (ETDEWEB)

    Marin, Daniele [Duke University Medical Center, Department of Radiology, Durham, NC (United States); University of Rome Sapienza, Department of Radiological Sciences, Rome (Italy); Nelson, Rendon C. [Duke University Medical Center, Department of Radiology, Durham, NC (United States); Guerrisi, Antonino; Passariello, Roberto; Catalano, Carlo [University of Rome Sapienza, Department of Radiological Sciences, Rome (Italy); Barnhart, Huiman [Duke University Medical Center, Department of Biostatistics and Bioinformatics, Durham, NC (United States); Schindera, Sebastian T. [University Hospital of Bern, Institute for Diagnostic, Interventional and Pediatric Radiology, Bern (Switzerland)

    2011-09-15

    To prospectively investigate the effect of varying the injection flow rates of a saline chaser on vascular and parenchymal contrast enhancement during abdominal MDCT. 100 consecutive patients were randomly assigned to four injection protocols. A fixed dose of contrast medium was administered followed by no saline (Protocol A) or 50 mL of saline at 2, 4, or 8 mL/s (Protocols B, C, and D). Peak, time-to-peak, and duration of 90% peak enhancement were determined for aorta, pancreas, and liver. Aortic peak enhancement was significantly higher for Protocol D (369.5 HU) compared with Protocols A and B (332.9 HU and 326.0 HU, respectively; P < 0.05). Pancreatic peak enhancement was significantly higher for Protocols C and D (110.6 HU and 110.9 HU, respectively) compared to Protocol A (92.5 HU; P < 0.05). Aortic and pancreatic time-to-peak enhancement occurred significantly later for Protocol D compared with Protocol A (42.8 s vs. 36.1 s [P < 0.001] and 49.7 s vs. 45.3 s [P = 0.003]). Injecting a saline chaser at high flow rates yields significantly higher peak aortic and pancreatic enhancement, with a slight longer time-to-peak enhancement. (orig.)

  5. A USER-DEPENDENT PERFECT-SCHEDULING MULTIPLE ACCESS PROTOCOL FOR VOICE-DATA INTEGRATION IN WIRELESS NETWORKDS

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    A novel Multiple Access Control(MAC) protocol-User-dependent Perfect-scheduling Multiple Access(UPMA) protocol,which supports joint transmission of voice and data packets,is proposed.By this protocol,the bandwidth can be allocated dynamically to the uplink and downlink traffic with on-demand assignment and the transmission of Mobile Terminals(MTs) can be perfectly scheduled by means of polling.Meanwhile.a unique frame stucture is designed to guarantee Quality of Service(QoS) in voice traffic supporting.An effective colision resolution algorthm is also proposed to guarantee rapid channel access for activated MTs.Finally,performance of UPMA protocol is evaluated by simulation and compared with MPRMA protocol.Simulation results show that UPMA protocol has better performance.

  6. A USER-DEPENDENT PERFECT-SCHEDULING MULTIPLE ACCESS PROTOCOL FOR VOICE-DATA INTEGRATION IN WIRELESS NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Zhou Yajian; Li Jiandong; Liu Kai

    2002-01-01

    A novel Multiple Access Control (MAC) protocol - User-dependent Perfect-scheduling Multiple Access (UPMA) protocol, which supports joint transmission of voice and data packets,is proposed. By this protocol, the bandwidth can be allocated dynamically to the uplink and downlink traffic with on-demand assignment and the transmission of Mobile Terminals (MTs)can be perfectly scheduled by means of polling. Meanwhile, a unique frame structure is designed to guarantee Quality of Service (QoS) in voice traffic supporting. An effective collision resolution algorithm is also proposed to guarantee rapid channel access for activated MTs. Finally, performance of UPMA protocol is evaluated by simulation and compared with MPRMA protocol.Simulation results show that UPMA protocol has better performance.

  7. Traffic Adaptive MAC Protocols in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Farhan Masud

    2017-01-01

    Full Text Available In Wireless Body Area Networks (WBANs, every healthcare application that is based on physical sensors is responsible for monitoring the vital signs data of patient. WBANs applications consist of heterogeneous and dynamic traffic loads. Routine patient’s observation is described as low-load traffic while an alarming situation that is unpredictable by nature is referred to as high-load traffic. This paper offers a thematic review of traffic adaptive Medium Access Control (MAC protocols in WBANs. First, we have categorized them based on their goals, methods, and metrics of evaluation. The Zigbee standard IEEE 802.15.4 and the baseline MAC IEEE 802.15.6 are also reviewed in terms of traffic adaptive approaches. Furthermore, a comparative analysis of the protocols is made and their performances are analyzed in terms of delay, packet delivery ratio (PDR, and energy consumption. The literature shows that no review work has been done on traffic adaptive MAC protocols in WBANs. This review work, therefore, could add enhancement to traffic adaptive MAC protocols and will stimulate a better way of solving the traffic adaptivity problem.

  8. Modeling and Verification of the Bitcoin Protocol

    Directory of Open Access Journals (Sweden)

    Kaylash Chaudhary

    2015-11-01

    Full Text Available Bitcoin is a popular digital currency for online payments, realized as a decentralized peer-to-peer electronic cash system. Bitcoin keeps a ledger of all transactions; the majority of the participants decides on the correct ledger. Since there is no trusted third party to guard against double spending, and inspired by its popularity, we would like to investigate the correctness of the Bitcoin protocol. Double spending is an important threat to electronic payment systems. Double spending would happen if one user could force a majority to believe that a ledger without his previous payment is the correct one. We are interested in the probability of success of such a double spending attack, which is linked to the computational power of the attacker. This paper examines the Bitcoin protocol and provides its formalization as an UPPAAL model. The model will be used to show how double spending can be done if the parties in the Bitcoin protocol behave maliciously, and with what probability double spending occurs.

  9. A modified FASP protocol for high-throughput preparation of protein samples for mass spectrometry.

    Directory of Open Access Journals (Sweden)

    Jeremy Potriquet

    Full Text Available To facilitate high-throughput proteomic analyses we have developed a modified FASP protocol which improves the rate at which protein samples can be processed prior to mass spectrometry. Adapting the original FASP protocol to a 96-well format necessitates extended spin times for buffer exchange due to the low centrifugation speeds tolerated by these devices. However, by using 96-well plates with a more robust polyethersulfone molecular weight cutoff membrane, instead of the cellulose membranes typically used in these devices, we could use isopropanol as a wetting agent, decreasing spin times required for buffer exchange from an hour to 30 minutes. In a typical work flow used in our laboratory this equates to a reduction of 3 hours per plate, providing processing times similar to FASP for the processing of up to 96 samples per plate. To test whether our modified protocol produced similar results to FASP and other FASP-like protocols we compared the performance of our modified protocol to the original FASP and the more recently described eFASP and MStern-blot. We show that all FASP-like methods, including our modified protocol, display similar performance in terms of proteins identified and reproducibility. Our results show that our modified FASP protocol is an efficient method for the high-throughput processing of protein samples for mass spectral analysis.

  10. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  11. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  12. I-123 IBZM-SPECT: improved acquisition protocol with HR-collimator

    International Nuclear Information System (INIS)

    Sandrock, D.; Ivancevic, V.; Dopichaj-Menge, U.; Gruber, D.; Munz, D.

    2002-01-01

    Aim: Aim of this study was to evaluate the impact of different acquisition and reconstruction protocols on the quality of SPECT diagnostics with I-123 IBZM in patients with diseases of the dopaminergic system. Material and Methods: Overall, 30 patients (19 men, 11 women, aged 22 - 80 years) were studied with SPECT after i.v. injection of 5 mCi (185 MBq) I-123 IBZM. Acquisition was performed 60 min p.i. (protocol A) using a medium energy collimator, a 64 x 64 matrix, 64 projections, step and shoot technique, 5.6 0 and 20 seconds per step with a MultiSPECT2 double-head gamma camera (Siemens). Immediately afterwards, a second acquisition (protocol B, 90 min p.i.) using a high resolution collimator, a 128 x 128 matrix, 60 projections, step and shoot technique, 3 0 and 30 seconds per step was performed. The reconstruction was done in filtered backprojection technique and a Butterworth filter of order 7, in protocol A using a cutoff of 0.5 and in protocol B of 0.4. Finally, the net count ratios of the basal ganglia to the frontal lobe(s) were calculated and compared with the clinical diagnosis. Results: The visual analysis yielded - as expected -a better image quality for protocol B (concordant impression of 3 independent observers) with more accurate delineation of the basal ganglia. The count ratios with protocol B were (mean) 0.19 higher (equivalent to 13 %) than with protocol A. In the group of patients with count ratios > 1.55 there was the highest (and significant) difference between protocols A and B with (mean count ratio difference) 0.32 (equivalent to 20 %). Protocol B also allowed a better differentiation between patients clinically staged normal and abnormal. In patients with unilateral disease, this difference between normal and abnormal was more prominent (in comparison to the contralateral side as well as compared to the reference value [1.5]). The comparison of the count ratios with the clinical data revealed 7 patients with borderline results with

  13. An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography.

    Science.gov (United States)

    Zhang, Zezhong; Qi, Qingqing

    2014-05-01

    Medication errors are very dangerous even fatal since it could cause serious even fatal harm to patients. In order to reduce medication errors, automated patient medication systems using the Radio Frequency Identification (RFID) technology have been used in many hospitals. The data transmitted in those medication systems is very important and sensitive. In the past decade, many security protocols have been proposed to ensure its secure transition attracted wide attention. Due to providing mutual authentication between the medication server and the tag, the RFID authentication protocol is considered as the most important security protocols in those systems. In this paper, we propose a RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography (ECC). The analysis shows the proposed protocol could overcome security weaknesses in previous protocols and has better performance. Therefore, the proposed protocol is very suitable for automated patient medication systems.

  14. Invariant-based reasoning about parameterized security protocols

    NARCIS (Netherlands)

    Mooij, A.J.

    2010-01-01

    We explore the applicability of the programming method of Feijen and van Gasteren to the domain of security protocols. This method addresses the derivation of concurrent programs from a formal specification, and it is based on common notions like invariants and pre- and post-conditions. We show that

  15. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  16. Creatine Kinase and Lactate Dehydrogenase Responses After Different Resistance and Aerobic Exercise Protocols

    Directory of Open Access Journals (Sweden)

    Callegari Gustavo A.

    2017-08-01

    Full Text Available The aim of this study was to investigate the responses of creatine kinase (CK and lactate dehydrogenase (LDH after performing different resistance and aerobic exercise protocols. Twelve recreationally trained men (age, 23.2 ± 5.6 years; body mass, 84.3 ± 9.3 kg; body height, 178.9 ± 4.5 cm; and BMI, 26.3 ± 2.3 kg·m2 volunteered to participate in this study. All subjects were randomly assigned to four experimental protocols (crossover: (a aerobic training at 60% of VO2max, (b aerobic training at 80% of VO2max, (c a resistance exercise (RE session with a bi-set protocol, and (d an RE session with a multiple sets protocol. Blood samples were collected before, immediately after and 24 hours following the experimental protocols. After 24 hours, there was a significant increase in CK for the 80% of VO2max protocol vs. the bi-set RE session (p = 0.016. Immediately after the protocols, we observed a significant increase in LDH among certain groups compared to others, as follows: multiple sets RE session vs. 60% of VO2max, bi-set RE session vs. 60% of VO2max, multiple sets RE session vs. 80% of VO2max, and bi-set RE session vs. 80% of VO2max (p = 0.008, p = 0.013; p = 0.002, p = 0.004, respectively. In conclusion, aerobic exercise performed at 80% of VO2max appears to elevate plasma CK levels more than bi-set RE sessions. However, the bi-set and multiple sets RE sessions appeared to trigger greater levels of blood LDH compared to aerobic protocols performed at 60% and 80% of VO2max.

  17. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    Science.gov (United States)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-06-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  18. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    Science.gov (United States)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-03-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  19. Anti-Mullerian hormone-tailored stimulation protocols improve outcomes whilst reducing adverse effects and costs of IVF.

    Science.gov (United States)

    Yates, A P; Rustamov, O; Roberts, S A; Lim, H Y N; Pemberton, P W; Smith, A; Nardo, L G

    2011-09-01

    Anti-Müllerian hormone (AMH) is increasingly used to quantify ovarian reserve, but it has not yet realized its full clinical potential in assisted reproduction technology. We investigated the possible benefits of using novel, stratified ovarian hyperstimulation protocols, tailored to individual AMH levels, compared with conventional stimulation. Retrospective data were collected from 769 women (first cycle of IVF, using fresh embryos), in a UK tertiary care unit: 346 women using conventional stimulation protocols; 423 women treated under new AMH-tailored protocols. Embryo transfer rates increased significantly (79-87%: P= 0.002) after the introduction of AMH-tailored stimulation protocols. Pregnancy rate per cycle started and live birth rate also increased significantly compared with conventionally treated women (17.9-27.7%, P= 0.002 and 15.9-23.9%, P = 0.007, respectively). Moreover, in the AMH group, the incidence of the ovarian hyperstimulation syndrome (OHSS) fell significantly (6.9-2.3%, P = 0.002) and failed fertilization fell from 7.8 to 4.5%. The cost of fertility drug treatment fell by 29% per patient and the overall cost of clinical management of OHSS fell by 43% in the AMH group. GnRH antagonist protocols, introduced as part of AMH-tailored treatment, may have contributed to the observed improvements: however, within the AMH-tailored group, the live birth rate was not significantly different between agonist and antagonist-treated groups. Although large, prospective, multicentre studies are indicated, we have clearly demonstrated that individualized, AMH-guided, controlled ovarian hyperstimulation protocols significantly improved positive clinical outcomes, reduced the incidence of complications and reduced the financial burden associated with assisted reproduction.

  20. Safety of protocol violations in acute stroke tPA administration.

    Science.gov (United States)

    Lyerly, Michael J; Albright, Karen C; Boehme, Amelia K; Bavarsad Shahripour, Reza; Houston, James T; Rawal, Pawan V; Kapoor, Niren; Alvi, Muhammad; Sisson, April; Alexandrov, Anne W; Alexandrov, Andrei V

    2014-01-01

    Intravenous (IV) tissue plasminogen activator remains the only approved therapy for acute ischemic stroke (AIS) in the United States; however, less than 10% of patients receive treatment. This is partially because of the large number of contraindications, narrow treatment window, and physician reluctance to deviate from these criteria. We retrospectively analyzed consecutive patients who received IV thrombolysis at our stroke center for National Institute of Neurological Disorders and Stroke (NINDS) protocol violations and rates of symptomatic intracerebral hemorrhage (sICH). Other outcome variables included systemic hemorrhage, modified Rankin Scale at discharge, and discharge disposition. A total of 212 patients were identified in our stroke registry between 2009 and 2011 and included in the analysis. Protocol violations occurred in 76 patients (36%). The most common violations were thrombolysis beyond 3 hours (26%), aggressive blood pressure management (15%), elevated prothrombin time (PT) or partial thromboplastin time (PTT) (6.6%), minor or resolving deficits (4.2%), unclear time of onset (3.9%), and stroke within 3 months (3%). There were no significant differences in any of the safety outcomes or discharge disposition between patients with or without protocol violations. Controlling for age, National Institutes of Health Stroke Scale on admission, and glucose on admission, there was no significant increase in sICH (odds ratio: 3.8; 95% confidence interval: .37-38.72) in the patients who had protocol violations. Despite more than one third of patients receiving thrombolysis with protocol violations, overall rates of hemorrhage remained low and did not differ from those who did not have violations. Our data support the need to expand access to thrombolysis in AIS patients. Published by Elsevier Inc.

  1. Impact of the Kyoto Protocol on the Iberian Electricity Market: A scenario analysis

    International Nuclear Information System (INIS)

    Reneses, Javier; Centeno, Efraim

    2008-01-01

    This paper presents an assessment of the impact of the Kyoto Protocol on the Iberian Electricity Market during two periods: the first phase (2005-2007) and the second phase (2008-2012). A market-equilibrium model is used in order to analyze different conditions faced by generation companies. Scenarios involving CO 2 -emission prices, hydro conditions, demand, fuel prices and renewable generation are considered. This valuation will show the significance of CO 2 -emission prices as regards Spanish and Portuguese electricity prices, generation mix, utilities profits and the total CO 2 emissions. Furthermore, the results will illustrate how energy policies implemented by regulators are critical for Spain and Portugal in order to mitigate the negative impact of the Kyoto Protocol. In conclusion, the Iberian electricity system will not be able to reach the Kyoto targets, except in very favorable conditions (CO 2 -emission prices over Euro 15/ton and the implementation of very efficient energy policies)

  2. Evaluation of the efficacy and toxicity of protocol cisplatin, 5-fluorouracil, leucovorin compared to protocol fluorouracil, doxorubicin and mitomycin C in locally advanced and metastatic gastric cancer

    Directory of Open Access Journals (Sweden)

    Andrić Zoran

    2012-01-01

    Full Text Available Introduction. Still there is no consensus on the choice of the most efficient and the least toxic chemotherapy regimen in the treatment of advanced gastric cancer. Nowadays few therapy protocols are available for treating this disease. Objective. Study was conducted to compare the efficacy and toxicity of FAM (flurouracil, doxorubicin, mitomycin C with CDDP and FU/FA (cisplatin, 5-fluorouracil, leucovorin protocols in patients with locally advanced and metastatic gastric cancer. Methods. This randomized study involved a group of 50 patients with locally advanced or metastatic gastric cancer, who had not previously undergone chemotherapy treatment. Progression free survival, overall survival and drug toxicity were evaluated. For statistical analysis chi-square test, Kaplan-Meier curve and the log rank test were used. Results. The overall response rate was 20% in the group treated with FAM and 24% in the group treated with CDDP, FU/FA (4% of patients from each group had complete response, but without significant statistical difference. Median survival was 10.9 months in the FAM group and 11.8 months in CDDP, FU/FA group, with no statistically significant difference. Non-haematological and haematological toxicities of CDDP, FU/FA were considerably less frequent than of FAM, and there was no treatment related deaths in any of the groups. Conclusion. Both investigated regimens demonstrated moderate efficacy. The study shows in favour of justified application of both protocols, while in regard to toxicity CDDP and FU/FA can be recommended as preferable treatment for locally advanced and metastatic gastric cancer. New strategies should be considered for better efficacy in the treatment of advanced gastric cancer. New strategies are necessary with the goal to achieve a better therapeutic effect.

  3. A family of multi-party authentication protocols

    NARCIS (Netherlands)

    Cremers, C.J.F.; Mauw, S.

    2006-01-01

    We introduce a family of multi-party authentication protocols and discuss six novel protocols, which are members of this family. The first three generalize the well-known Needham-Schroeder-Lowe public-key protocol, the Needham-Schroeder private-key protocol, and the Bilateral Key Exchange protocol.

  4. The effect of personalized versus standard patient protocols for radiostereometric analysis (RSA).

    Science.gov (United States)

    Muharemovic, O; Troelsen, A; Thomsen, M G; Kallemose, T; Gosvig, K K

    2018-05-01

    Increasing pressure in the clinic requires a more standardized approach to radiostereometric analysis (RSA) imaging. The aim of this study was to investigate whether implementation of personalized RSA patient protocols could increase image quality and decrease examination time and the number of exposure repetitions. Forty patients undergoing primary total hip arthroplasty were equally randomized to either a case or a control group. Radiographers in the case group were assisted by personalized patient protocols containing information about each patient's post-operative RSA imaging. Radiographers in the control group used a standard RSA protocol. At three months, radiographers in the case group significantly reduced (p RSA patient protocols have a positive effect on image quality and radiation dose savings. Implementation of personal patient protocols as a RSA standard will contribute to the reduction of examination time, thus ensuring a cost benefit for department and patient safety. Copyright © 2017 The College of Radiographers. Published by Elsevier Ltd. All rights reserved.

  5. Efficient protocols for Stirling heat engines at the micro-scale

    Science.gov (United States)

    Muratore-Ginanneschi, Paolo; Schwieger, Kay

    2015-10-01

    We investigate the thermodynamic efficiency of sub-micro-scale Stirling heat engines operating under the conditions described by overdamped stochastic thermodynamics. We show how to construct optimal protocols such that at maximum power the efficiency attains for constant isotropic mobility the universal law η=2 ηC/(4-ηC) , where ηC is the efficiency of an ideal Carnot cycle. We show that these protocols are specified by the solution of an optimal mass transport problem. Such solution can be determined explicitly using well-known Monge-Ampère-Kantorovich reconstruction algorithms. Furthermore, we show that the same law describes the efficiency of heat engines operating at maximum work over short time periods. Finally, we illustrate the straightforward extension of these results to cases when the mobility is anisotropic and temperature dependent.

  6. New Heterogeneous Clustering Protocol for Prolonging Wireless Sensor Networks Lifetime

    Directory of Open Access Journals (Sweden)

    Md. Golam Rashed

    2014-06-01

    Full Text Available Clustering in wireless sensor networks is one of the crucial methods for increasing of network lifetime. The network characteristics of existing classical clustering protocols for wireless sensor network are homogeneous. Clustering protocols fail to maintain the stability of the system, especially when nodes are heterogeneous. We have seen that the behavior of Heterogeneous-Hierarchical Energy Aware Routing Protocol (H-HEARP becomes very unstable once the first node dies, especially in the presence of node heterogeneity. In this paper we assume a new clustering protocol whose network characteristics is heterogeneous for prolonging of network lifetime. The computer simulation results demonstrate that the proposed clustering algorithm outperforms than other clustering algorithms in terms of the time interval before the death of the first node (we refer to as stability period. The simulation results also show the high performance of the proposed clustering algorithm for higher values of extra energy brought by more powerful nodes.

  7. Optical spectroscopy of radiotherapy and photodynamic therapy responses in normal rat skin shows vascular breakdown products

    Science.gov (United States)

    Teles de Andrade, Cintia; Nogueira, Marcelo S.; Kanick, Stephen C.; Marra, Kayla; Gunn, Jason; Andreozzi, Jacqueline; Samkoe, Kimberley S.; Kurachi, Cristina; Pogue, Brian W.

    2016-03-01

    Photodynamic therapy (PDT) and radiotherapy are non-systemic cancer treatment options with different mechanisms of damage. So combining these techniques has been shown to have some synergy, and can mitigate their limitations such as low PDT light penetration or radiotherapy side effects. The present study monitored the induced tissue changes after PDT, radiotherapy, and a combination protocol in normal rat skin, using an optical spectroscopy system to track the observed biophysical changes. The Wistar rats were treated with one of the protocols: PDT followed by radiotherapy, PDT, radiotherapy and radiotherapy followed by PDT. Reflectance spectra were collected in order to observe the effects of these combined therapies, especially targeting vascular response. From the reflectance, information about oxygen saturation, met-hemoglobin and bilirubin concentration, blood volume fraction (BVF) and vessel radius were extracted from model fitting of the spectra. The rats were monitored for 24 hours after treatment. Results showed that there was no significant variation in the vessel size or BVF after the treatments. However, the PDT caused a significant increase in the met-hemoglobin and bilirubin concentrations, indicating an important blood breakdown. These results may provide an important clue on how the damage establishment takes place, helping to understand the effect of the combination of those techniques in order to verify the existence of a known synergistic effect.

  8. Implementation of a protocol to reduce occurrence of retained sponges after vaginal delivery.

    Science.gov (United States)

    Lutgendorf, Monica A; Schindler, Lynnett L; Hill, James B; Magann, Everett F; O'Boyle, John D

    2011-06-01

    Retained sponges (gossypiboma) following vaginal delivery are an uncommon occurrence. Although significant morbidity from such an event is unlikely, there are many reported adverse effects, including symptoms of malodorous discharge, loss of confidence in providers and the medical system, and legal claims. To report a protocol intended to reduce the occurrence of retained sponges following vaginal delivery. After identification of limitations with existing delivery room protocols, we developed a sponge count protocol to reduce occurrence of retained vaginal sponges. We report our experience at Naval Medical Center Portsmouth, a large tertiary care military treatment facility with our efforts to implement a sponge count protocol to reduce retained sponges following vaginal delivery. With appropriate pre-implementation training, protocols which incorporate post-delivery vaginal sweep and sponge counts are well accepted by the health care team and can be incorporated into the delivery room routine.

  9. Implementation of a Rapid, Protocol-based TIA Management Pathway.

    Science.gov (United States)

    Jarhult, Susann J; Howell, Melissa L; Barnaure-Nachbar, Isabelle; Chang, Yuchiao; White, Benjamin A; Amatangelo, Mary; Brown, David F; Singhal, Aneesh B; Schwamm, Lee H; Silverman, Scott B; Goldstein, Joshua N

    2018-03-01

    Our goal was to assess whether use of a standardized clinical protocol improves efficiency for patients who present to the emergency department (ED) with symptoms of transient ischemic attack (TIA). We performed a structured, retrospective, cohort study at a large, urban, tertiary care academic center. In July 2012 this hospital implemented a standardized protocol for patients with suspected TIA. The protocol selected high-risk patients for admission and low/intermediate-risk patients to an ED observation unit for workup. Recommended workup included brain imaging, vascular imaging, cardiac monitoring, and observation. Patients were included if clinical providers determined the need for workup for TIA. We included consecutive patients presenting during a six-month period prior to protocol implementation, and those presenting between 6-12 months after implementation. Outcomes included ED length of stay (LOS), hospital LOS, use of neuroimaging, and 90-day risk of stroke or TIA. From 01/2012 to 06/2012, 130 patients were evaluated for TIA symptoms in the ED, and from 01/2013 to 06/2013, 150 patients. The final diagnosis was TIA or stroke in 45% before vs. 41% after (p=0.18). Following the intervention, the inpatient admission rate decreased from 62% to 24% (pTIA among those with final diagnosis of TIA was 3% for both periods. Implementation of a TIA protocol significantly reduced ED LOS and total hospital LOS.

  10. A shortened protocol for assessing cognitive bias in rats.

    Science.gov (United States)

    Brydges, Nichola M; Hall, Lynsey

    2017-07-15

    Reliable measurement of affective state in animals is a significant goal of animal welfare. Such measurements would also improve the validity of pre-clinical mental health research which relies on animal models. However, at present, affective states in animals are inaccessible to direct measurement. In humans, changes in cognitive processing can give reliable indications of emotional state. Therefore, similar techniques are increasingly being used to gain proxy measures of affective states in animals. In particular, the 'cognitive bias' assay has gained popularity in recent years. Major disadvantages of this technique include length of time taken for animals to acquire the task (typically several weeks), negative experiences associated with task training, and issues of motivation. Here we present a shortened cognitive bias protocol using only positive reinforcers which must actively be responded to. The protocol took an average of 4days to complete, and produced similar results to previous, longer methods (minimum 30days). Specifically, rats housed in standard laboratory conditions demonstrated negative cognitive biases when presented with ambiguous stimuli, and took longer to make a decision when faced with an ambiguous stimulus. Compared to previous methods, this protocol is significantly shorter (average 4days vs. minimum 30days), utilises only positive reinforcers to avoid inducing negative affective states, and requires active responses to all cues, avoiding potential confounds of motivational state. We have successfully developed a shortened cognitive bias protocol, suitable for use with laboratory rats. Copyright © 2017 The Author(s). Published by Elsevier B.V. All rights reserved.

  11. Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-06-01

    Full Text Available Wireless sensor networks (WSNs consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC for WSNs. However, it turned out that Yeh et al.’s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.’s protocol. However, Shi et al.’s improvement introduces other security weaknesses. In this paper, we show that Shi et al.’s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  12. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography.

    Science.gov (United States)

    Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho

    2014-06-10

    Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  13. Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method

    Directory of Open Access Journals (Sweden)

    Hanane Houmani

    2012-01-01

    Full Text Available Most applications in the Internet such as e-banking and e-commerce use the SET and the NSL protocols to protect the communication channel between the client and the server. Then, it is crucial to ensure that these protocols respect some security properties such as confidentiality, authentication, and integrity. In this paper, we analyze the SET and the NSL protocols with respect to the confidentiality (secrecy property. To perform this analysis, we use the interpretation functions-based method. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily-life protocols such as SET and NSL. Also, this method could be used under different assumptions such as a variety of intruder abilities including algebraic properties of cryptographic primitives. The NSL protocol, for instance, is analyzed with and without the homomorphism property. We show also, using the SET protocol, the usefulness of this approach to correct weaknesses and problems discovered during the analysis.

  14. Multidisciplinary perioperative protocol in patients undergoing acute high-risk abdominal surgery

    DEFF Research Database (Denmark)

    Tengberg, L. T.; Bay-Nielsen, M.; Bisgaard, T.

    2017-01-01

    Background: Acute high-risk abdominal (AHA) surgery carries a very high risk of morbidity and mortality and represents a massive healthcare burden. The aim of the present study was to evaluate the effect of a standardized multidisciplinary perioperative protocol in patients undergoing AHA surgery...... = 0·004). Conclusion: The introduction of a multidisciplinary perioperative protocol was associated with a significant reduction in postoperative mortality in patients undergoing AHA surgery. NCT01899885 (http://www.clinicaltrials.gov)....

  15. Thromboprophylaxis in Abdominoplasty: Efficacy and Safety of a Complete Perioperative Protocol

    Directory of Open Access Journals (Sweden)

    Giovanni Francesco Marangi

    2016-07-01

    Full Text Available BackgroundVenous thromboembolism, a spectrum of diseases ranging from deep venous thrombosis to pulmonary embolism, is a major source of morbidity and mortality. The majority of cases described in plastic surgery involve abdominoplasty. Risk assessment and prophylaxis are paramount in such patients. General recommendations were recently developed, but the evidence in the literature was insufficient to prepare exhaustive guidelines regarding the medication, dosage, timing, or length of the prophylaxis.MethodsA thromboprophylaxis protocol was developed for patients undergoing abdominoplasty. The protocol consisted of preoperative, intraoperative, and postoperative measures. Enoxaparin was administered as chemoprophylaxis in selected patients. The study involved 253 patients. The patients were analyzed for age, body mass index, enoxaparin dosage, risk factors, and complications.ResultsDeep venous thrombosis was documented in two cases (0.8%. No pulmonary embolism occurred. Three patients (1.2% presented mild subcutaneous abdominal hematoma within the first postoperative week that spontaneously resorbed with neither aesthetic nor functional complications. Two patients (0.8% presented severe hematoma requiring surgical re-intervention for drainage and hemostasis revision. Statistical analysis showed no significant correlation between enoxaparin dosage and hematoma (P=0.18 or deep venous thrombosis (P=0.61.ConclusionsThe described thromboprophylaxis protocol proved to be effective in the prevention of thrombotic events, with an acceptable risk of hemorrhagic complications. Furthermore, it provides new evidence regarding the currently debated variables of chemoprophylaxis, namely type, dosage, timing, and length.

  16. Polypyridylruthenium(II complexes exert in vitro and in vivo nematocidal activity and show significant inhibition of parasite acetylcholinesterases

    Directory of Open Access Journals (Sweden)

    Madhu Sundaraneedi

    2018-04-01

    Full Text Available Over 4.5 billion people are at risk of infection with soil transmitted helminths and there are concerns about the development of resistance to the handful of frontline nematocides in endemic populations. We investigated the anti-nematode efficacy of a series of polypyridylruthenium(II complexes and showed they were active against L3 and adult stages of Trichuris muris, the rodent homologue of the causative agent of human trichuriasis, T. trichiura. One of the compounds, Rubb12-mono, which was among the most potent in its ability to kill L3 (IC50 = 3.1 ± 0.4 μM and adult (IC50 = 5.2 ± 0.3 μM stage worms was assessed for efficacy in a mouse model of trichuriasis by administering 3 consecutive daily oral doses of the drug 3 weeks post infection with the murine whipworm Trichuris muris. Mice treated with Rubb12-mono showed an average 66% reduction (P = 0.015 in faecal egg count over two independent trials. The drugs partially exerted their activity through inhibition of acetylcholinesterases, as worms treated in vitro and in vivo showed significant decreases in the activity of this class of enzymes. Our data show that ruthenium complexes are effective against T. muris, a model gastro-intestinal nematode and soil-transmitted helminth. Further, knowledge of the target of ruthenium drugs can facilitate modification of current compounds to identify analogues which are even more effective and selective against Trichuris and other helminths of human and veterinary importance. Keywords: Acetylcholinesterase, Trichuris muris, Ruthenium complex, Anthelmintic

  17. Quorum system and random based asynchronous rendezvous protocol for cognitive radio ad hoc networks

    Directory of Open Access Journals (Sweden)

    Sylwia Romaszko

    2013-12-01

    Full Text Available This paper proposes a rendezvous protocol for cognitive radio ad hoc networks, RAC2E-gQS, which utilizes (1 the asynchronous and randomness properties of the RAC2E protocol, and (2 channel mapping protocol, based on a grid Quorum System (gQS, and taking into account channel heterogeneity and asymmetric channel views. We show that the combination of the RAC2E protocol with the grid-quorum based channel mapping can yield a powerful RAC2E-gQS rendezvous protocol for asynchronous operation in a distributed environment assuring a rapid rendezvous between the cognitive radio nodes having available both symmetric and asymmetric channel views. We also propose an enhancement of the protocol, which uses a torus QS for a slot allocation, dealing with the worst case scenario, a large number of channels with opposite ranking lists.

  18. Development of a manualized protocol of massage therapy for clinical trials in osteoarthritis

    Directory of Open Access Journals (Sweden)

    Ali Ather

    2012-10-01

    Full Text Available Abstract Background Clinical trial design of manual therapies may be especially challenging as techniques are often individualized and practitioner-dependent. This paper describes our methods in creating a standardized Swedish massage protocol tailored to subjects with osteoarthritis of the knee while respectful of the individualized nature of massage therapy, as well as implementation of this protocol in two randomized clinical trials. Methods The manualization process involved a collaborative process between methodologic and clinical experts, with the explicit goals of creating a reproducible semi-structured protocol for massage therapy, while allowing some latitude for therapists’ clinical judgment and maintaining consistency with a prior pilot study. Results The manualized protocol addressed identical specified body regions with distinct 30- and 60-min protocols, using standard Swedish strokes. Each protocol specifies the time allocated to each body region. The manualized 30- and 60-min protocols were implemented in a dual-site 24-week randomized dose-finding trial in patients with osteoarthritis of the knee, and is currently being implemented in a three-site 52-week efficacy trial of manualized Swedish massage therapy. In the dose-finding study, therapists adhered to the protocols and significant treatment effects were demonstrated. Conclusions The massage protocol was manualized, using standard techniques, and made flexible for individual practitioner and subject needs. The protocol has been applied in two randomized clinical trials. This manualized Swedish massage protocol has real-world utility and can be readily utilized both in the research and clinical settings. Trial registration Clinicaltrials.gov NCT00970008 (18 August 2009

  19. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... active and adaptive corruptions in the random oracle model. Due to its simplicity, the protocol is extremely efficient and it allows to perform m 1-out-of-n OTs using only: - Computation: (n+1)m+2 exponentiations (mn for the receiver, mn+2 for the sender) and - Communication: 32(m+1) bytes (for the group...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  20. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  1. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  2. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  3. Proton Beam Therapy for Hepatocellular Carcinoma: A Comparison of Three Treatment Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Mizumoto, Masashi; Okumura, Toshiyuki; Hashimoto, Takayuki [Proton Medical Research Center, University of Tsukuba, Tsukuba, Ibaraki (Japan); Department of Radiation Oncology, University of Tsukuba, Tsukuba, Ibaraki (Japan); Fukuda, Kuniaki [Department of Gastroenterology, University of Tsukuba, Tsukuba, Ibaraki (Japan); Oshiro, Yoshiko; Fukumitsu, Nobuyoshi [Proton Medical Research Center, University of Tsukuba, Tsukuba, Ibaraki (Japan); Department of Radiation Oncology, University of Tsukuba, Tsukuba, Ibaraki (Japan); Abei, Masato [Department of Gastroenterology, University of Tsukuba, Tsukuba, Ibaraki (Japan); Kawaguchi, Atsushi [Biostatistics Center, Kurume University, Fukuoka (Japan); Hayashi, Yasutaka; Ookawa, Ayako; Hashii, Haruko; Kanemoto, Ayae [Department of Radiation Oncology, University of Tsukuba, Tsukuba, Ibaraki (Japan); Moritake, Takashi [Proton Medical Research Center, University of Tsukuba, Tsukuba, Ibaraki (Japan); Department of Radiation Oncology, University of Tsukuba, Tsukuba, Ibaraki (Japan); Tohno, Eriko [Department of Diagnostic Radiology, University of Tsukuba, Tsukuba, Ibaraki (Japan); Tsuboi, Koji [Proton Medical Research Center, University of Tsukuba, Tsukuba, Ibaraki (Japan); Department of Radiation Oncology, University of Tsukuba, Tsukuba, Ibaraki (Japan); Sakae, Takeji [Proton Medical Research Center, University of Tsukuba, Tsukuba, Ibaraki (Japan); Sakurai, Hideyuki, E-mail: hsakurai@pmrc.tsukuba.ac.jp [Proton Medical Research Center, University of Tsukuba, Tsukuba, Ibaraki (Japan); Department of Radiation Oncology, University of Tsukuba, Tsukuba, Ibaraki (Japan)

    2011-11-15

    Background: Our previous results for treatment of hepatocellular carcinoma (HCC) with proton beam therapy revealed excellent local control with low toxicity. Three protocols were used to avoid late complications such as gastrointestinal ulceration and bile duct stenosis. In this study, we examined the efficacy of these protocols. Methods and Materials: The subjects were 266 patients (273 HCCs) treated by proton beam therapy at University of Tsukuba between January 2001 and December 2007. Three treatment protocols (A, 66 GyE in 10 fractions; B, 72.6 GyE in 22 fractions; and C, 77 GyE in 35 fractions) were used, depending on the tumor location. Results: Of the 266 patients, 104, 95, and 60 patients were treated with protocols A, B, and C, respectively. Seven patients with double lesions underwent two different protocols. The overall survival rates after 1, 3 and 5 years were 87%, 61%, and 48%, respectively (median survival, 4.2 years). Multivariate analysis showed that better liver function, small clinical target volume, and no prior treatment (outside the irradiated field) were associated with good survival. The local control rates after 1, 3, and 5 years were 98%, 87%, and 81%, respectively. Multivariate analysis did not identify any factors associated with good local control. Conclusions: This study showed that proton beam therapy achieved good local control for HCC using each of three treatment protocols. This suggests that selection of treatment schedules based on tumor location may be used to reduce the risk of late toxicity and maintain good treatment efficacy.

  4. Asymptotic adaptive bipartite entanglement-distillation protocol

    International Nuclear Information System (INIS)

    Hostens, Erik; Dehaene, Jeroen; De Moor, Bart

    2006-01-01

    We present an asymptotic bipartite entanglement-distillation protocol that outperforms all existing asymptotic schemes. This protocol is based on the breeding protocol with the incorporation of two-way classical communication. Like breeding, the protocol starts with an infinite number of copies of a Bell-diagonal mixed state. Breeding can be carried out as successive stages of partial information extraction, yielding the same result: one bit of information is gained at the cost (measurement) of one pure Bell state pair (ebit). The basic principle of our protocol is at every stage to replace measurements on ebits by measurements on a finite number of copies, whenever there are two equiprobable outcomes. In that case, the entropy of the global state is reduced by more than one bit. Therefore, every such replacement results in an improvement of the protocol. We explain how our protocol is organized as to have as many replacements as possible. The yield is then calculated for Werner states

  5. Microdose gonadotropin-releasing hormone agonist flare-up protocol versus multiple dose gonadotropin-releasing hormone antagonist protocol in poor responders undergoing intracytoplasmic sperm injection-embryo transfer cycle.

    Science.gov (United States)

    Kahraman, Korhan; Berker, Bulent; Atabekoglu, Cem Somer; Sonmezer, Murat; Cetinkaya, Esra; Aytac, Rusen; Satiroglu, Hakan

    2009-06-01

    To compare the efficacy of microdose GnRH agonist (GnRH-a) flare-up and multiple dose GnRH antagonist protocols in patients who have a poor response to a long luteal GnRH-a protocol. Prospective, randomized, clinical study. University hospital. Forty-two poor responder patients undergoing intracytoplasmic sperm injection (ICSI)-embryo transfer cycle. Twenty-one patients received microdose leuprolide acetate (LA) (50 microg twice daily) starting on the second day of withdrawal bleeding. The other 21 patients received 0.25 mg of cetrorelix daily when the leading follicle reached 14 mm in diameter. Serum E(2) levels, number of growing follicles and mature oocytes, embryo quality, dose of gonadotropin used, cancellation, fertilization, implantation rate and pregnancy rate (PR). The mean serum E(2) concentration on the day of hCG administration was significantly higher in the microdose GnRH-a group than in the GnRH antagonist group (1,904 vs. 1,362 pg/mL). The clinical PRs per started cycle of microdose GnRH-a and GnRH antagonist groups were 14.2% and 9.5%, respectively. There were no statistically significant differences in the other ovulation induction characteristics, fertilization and implantation rates. Microdose GnRH-a flare-up protocol and multiple dose GnRH antagonist protocol seem to have similar efficacy in improving treatment outcomes of poor responder patients.

  6. Impact of a pain protocol including hypnosis in major burns.

    Science.gov (United States)

    Berger, Mette M; Davadant, Maryse; Marin, Christian; Wasserfallen, Jean-Blaise; Pinget, Christophe; Maravic, Philippe; Koch, Nathalie; Raffoul, Wassim; Chiolero, René L

    2010-08-01

    Pain is a major issue after burns even when large doses of opioids are prescribed. The study focused on the impact of a pain protocol using hypnosis on pain intensity, anxiety, clinical course, and costs. All patients admitted to the ICU, aged >18 years, with an ICU stay >24h, accepting to try hypnosis, and treated according to standardized pain protocol were included. Pain was scaled on the Visual Analog Scale (VAS) (mean of daily multiple recordings), and basal and procedural opioid doses were recorded. Clinical outcome and economical data were retrieved from hospital charts and information system, respectively. Treated patients were matched with controls for sex, age, and the burned surface area. Forty patients were admitted from 2006 to 2007: 17 met exclusion criteria, leaving 23 patients, who were matched with 23 historical controls. Altogether patients were 36+/-14 years old and burned 27+/-15%BSA. The first hypnosis session was performed after a median of 9 days. The protocol resulted in the early delivery of higher opioid doses/24h (ppatient. A pain protocol including hypnosis reduced pain intensity, improved opioid efficiency, reduced anxiety, improved wound outcome while reducing costs. The protocol guided use of opioids improved patient care without side effects, while hypnosis had significant psychological benefits.

  7. Energy neutral protocol based on hierarchical routing techniques for energy harvesting wireless sensor network

    Science.gov (United States)

    Muhammad, Umar B.; Ezugwu, Absalom E.; Ofem, Paulinus O.; Rajamäki, Jyri; Aderemi, Adewumi O.

    2017-06-01

    Recently, researchers in the field of wireless sensor networks have resorted to energy harvesting techniques that allows energy to be harvested from the ambient environment to power sensor nodes. Using such Energy harvesting techniques together with proper routing protocols, an Energy Neutral state can be achieved so that sensor nodes can run perpetually. In this paper, we propose an Energy Neutral LEACH routing protocol which is an extension to the traditional LEACH protocol. The goal of the proposed protocol is to use Gateway node in each cluster so as to reduce the data transmission ranges of cluster head nodes. Simulation results show that the proposed routing protocol achieves a higher throughput and ensure the energy neutral status of the entire network.

  8. A Novel Re-keying Function Protocol (NRFP For Wireless Sensor Network Security

    Directory of Open Access Journals (Sweden)

    Naif Alsharabi

    2008-12-01

    Full Text Available This paper describes a novel re-keying function protocol (NRFP for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs, covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.

  9. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security

    Science.gov (United States)

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-01-01

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding innetwork processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks. PMID:27873963

  10. A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security.

    Science.gov (United States)

    Abdullah, Maan Younis; Hua, Gui Wei; Alsharabi, Naif

    2008-12-04

    This paper describes a novel re-keying function protocol (NRFP) for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs), covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.

  11. ASSESSMENT OF RIP-V1 AND OSPF-V2 PROTOCOL WITH CONSIDERATION OF CONVERGENCE CRITERIA AND SENDING PROTOCOLS TRAFFIC

    Directory of Open Access Journals (Sweden)

    Hamed Jelodar

    2014-03-01

    Full Text Available Routing Protocols are underlying principles in networks like internet, transport and mobile. Routing Protocols include a series of rules and algorithms that consider routing metric and select the best way for sending healthy data packets from origin to destination. Dynamic routing protocol compatible to topology has a changeable state. RIP and OSPF are dynamic routing protocol that we consider criteria like convergence and sending protocols traffic assessment RIP first version and OSPF second version. By the test we have done on OPNET stimulation we understood that the OSPF protocol was more efficient than RIP protocol.

  12. Minimizing transfusion requirements for children undergoing craniosynostosis repair: the CHoR protocol.

    Science.gov (United States)

    Vega, Rafael A; Lyon, Camila; Kierce, Jeannette F; Tye, Gary W; Ritter, Ann M; Rhodes, Jennifer L

    2014-08-01

    Children with craniosynostosis may require cranial vault remodeling to prevent or relieve elevated intracranial pressure and to correct the underlying craniofacial abnormalities. The procedure is typically associated with significant blood loss and high transfusion rates. The risks associated with transfusions are well documented and include transmission of infectious agents, bacterial contamination, acute hemolytic reactions, transfusion-related lung injury, and transfusion-related immune modulation. This study presents the Children's Hospital of Richmond (CHoR) protocol, which was developed to reduce the rate of blood transfusion in infants undergoing primary craniosynostosis repair. A retrospective chart review of pediatric patients treated between January 2003 and Febuary 2012 was performed. The CHoR protocol was instituted in November 2008, with the following 3 components; 1) the use of preoperative erythropoietin and iron therapy, 2) the use of an intraoperative blood recycling device, and 3) acceptance of a lower level of hemoglobin as a trigger for transfusion (protocol implementation served as controls. A total of 60 children were included in the study, 32 of whom were treated with the CHoR protocol. The control (C) and protocol (P) groups were comparable with respect to patient age (7 vs 8.4 months, p = 0.145). Recombinant erythropoietin effectively raised the mean preoperative hemoglobin level in the P group (12 vs 9.7 g/dl, p protocol that includes preoperative administration of recombinant erythropoietin, intraoperative autologous blood recycling, and accepting a lower transfusion trigger significantly decreased transfusion utilization (p < 0.001). A decreased length of stay (p < 0.001) was seen, although the authors did not investigate whether composite transfusion complication reductions led to better outcomes.

  13. The characteristics and prognosis of patients fulfilling the Appropriateness Evaluation Protocol in a medical admission unit; a prospective observational study

    DEFF Research Database (Denmark)

    Brabrand, Mikkel; Knudsen, Torben; Hallas, Jesper

    2011-01-01

    To examine the prognostic significance of fulfilling at least one of the Appropriateness Evaluation Protocol (AEP) criteria.......To examine the prognostic significance of fulfilling at least one of the Appropriateness Evaluation Protocol (AEP) criteria....

  14. An active principle of Nigella sativa L., thymoquinone, showing significant antimicrobial activity against anaerobic bacteria.

    Science.gov (United States)

    Randhawa, Mohammad Akram; Alenazy, Awwad Khalaf; Alrowaili, Majed Gorayan; Basha, Jamith

    2017-01-01

    Thymoquinone (TQ) is the major active principle of Nigella sativa seed (black seed) and is known to control many fungi, bacteria, and some viruses. However, the activity of TQ against anaerobic bacteria is not well demonstrated. Anaerobic bacteria can cause severe infections, including diarrhea, aspiration pneumonia, and brain abscess, particularly in immunodeficient individuals. The present study aimed to investigate the in vitro antimicrobial activity of TQ against some anaerobic pathogens in comparison to metronidazole. Standard, ATCC, strains of four anaerobic bacteria ( Clostridium difficile , Clostridium perfringens , Bacteroides fragilis , and Bacteroides thetaiotaomicron ), were initially isolated on special Brucella agar base (with hemin and vitamin K). Then, minimum inhibitory concentrations (MICs) of TQ and metronidazole were determined against these anaerobes when grown in Brucella agar, using serial agar dilution method according to the recommended guidelines for anaerobic organisms instructed by the Clinical and Laboratory Standards Institute. TQ showed a significant antimicrobial activity against anaerobic bacteria although much weaker than metronidazole. MICs of TQ and metronidazole against various anaerobic human pathogens tested were found to be between 10-160 mg/L and 0.19-6.25 mg/L, respectively. TQ controlled the anaerobic human pathogenic bacteria, which supports the use of N. sativa in the treatment of diarrhea in folk medicine. Further investigations are in need for determination of the synergistic effect of TQ in combination with metronidazole and the activity of derivatives of TQ against anaerobic infections.

  15. Agricultural Soil Spectral Response and Properties Assessment: Effects of Measurement Protocol and Data Mining Technique

    Directory of Open Access Journals (Sweden)

    Asa Gholizadeh

    2017-10-01

    Full Text Available Soil spectroscopy has shown to be a fast, cost-effective, environmentally friendly, non-destructive, reproducible and repeatable analytical technique. Soil components, as well as types of instruments, protocols, sampling methods, sample preparation, spectral acquisition techniques and analytical algorithms have a combined influence on the final performance. Therefore, it is important to characterize these differences and to introduce an effective approach in order to minimize the technical factors that alter reflectance spectra and consequent prediction. To quantify this alteration, a joint project between Czech University of Life Sciences Prague (CULS and Tel-Aviv University (TAU was conducted to estimate Cox, pH-H2O, pH-KCl and selected forms of Fe and Mn. Two different soil spectral measurement protocols and two data mining techniques were used to examine seventy-eight soil samples from five agricultural areas in different parts of the Czech Republic. Spectral measurements at both laboratories were made using different ASD spectroradiometers. The CULS protocol was based on employing a contact probe (CP spectral measurement scheme, while the TAU protocol was carried out using a CP measurement method, accompanied with the internal soil standard (ISS procedure. Two spectral datasets, acquired from different protocols, were both analyzed using partial least square regression (PLSR technique as well as the PARACUDA II®, a new data mining engine for optimizing PLSR models. The results showed that spectra based on the CULS setup (non-ISS demonstrated significantly higher albedo intensity and reflectance values relative to the TAU setup with ISS. However, the majority of statistics using the TAU protocol was not noticeably better than the CULS spectra. The paper also highlighted that under both measurement protocols, the PARACUDA II® engine proved to be a powerful tool for providing better results than PLSR. Such initiative is not only a way to

  16. Effects of Modification of Pain Protocol on Incidence of Post Operative Nausea and Vomiting.

    Science.gov (United States)

    Schwarzkopf, Ran; Snir, Nimrod; Sharfman, Zachary T; Rinehart, Joseph B; Calderon, Michael-David; Bahn, Esther; Harrington, Brian; Ahn, Kyle

    2016-01-01

    A Perioperative Surgical Home (PSH) care model applies a standardized multidisciplinary approach to patient care using evidence-based medicine to modify and improve protocols. Analysis of patient outcome measures, such as postoperative nausea and vomiting (PONV), allows for refinement of existing protocols to improve patient care. We aim to compare the incidence of PONV in patients who underwent primary total joint arthroplasty before and after modification of our PSH pain protocol. All total joint replacement PSH (TJR-PSH) patients who underwent primary THA (n=149) or TKA (n=212) in the study period were included. The modified protocol added a single dose of intravenous (IV) ketorolac given in the operating room and oxycodone immediate release orally instead of IV Hydromorphone in the Post Anesthesia Care Unit (PACU). The outcomes were (1) incidence of PONV and (2) average pain score in the PACU. We also examined the effect of primary anesthetic (spinal vs . GA) on these outcomes. The groups were compared using chi-square tests of proportions. The incidence of post-operative nausea in the PACU decreased significantly with the modified protocol (27.4% vs . 38.1%, p=0.0442). There was no difference in PONV based on choice of anesthetic or procedure. Average PACU pain scores did not differ significantly between the two protocols. Simple modifications to TJR-PSH multimodal pain management protocol, with decrease in IV narcotic use, resulted in a lower incidence of postoperative nausea, without compromising average PACU pain scores. This report demonstrates the need for continuous monitoring of PSH pathways and implementation of revisions as needed.

  17. Feasible quantum communication complexity protocol

    International Nuclear Information System (INIS)

    Galvao, Ernesto F.

    2002-01-01

    I show that a simple multiparty communication task can be performed more efficiently with quantum communication than with classical communication, even with low detection efficiency η. The task is a communication complexity problem in which distant parties need to compute a function of the distributed inputs, while minimizing the amount of communication between them. A realistic quantum optical setup is suggested that can demonstrate a five-party quantum protocol with higher-than-classical performance, provided η>0.33

  18. Influence of pre-anaesthetic thoracic radiographs on ASA physical status classification and anaesthetic protocols in traumatized dogs and cats

    International Nuclear Information System (INIS)

    Sigrist, N.; Mosing, M.; Iff, I.; Larenza, M.P.; Lang, J.; Spreng, D.

    2008-01-01

    The purpose of this study was to evaluate if pre-anaesthetic thoracic radiographs contribute to the anaesthetic management of trauma patients by comparing American Society of Anesthesiologists Physical Status Classification (ASA grade) with and without information from thoracic radiography findings. Case records of 157 dogs and cats being anaesthetized with or without post-traumatic, pre-anaesthetic chest radiographs were retrospectively evaluated for clinical parameters, radiographic abnormalities and anaesthetic protocol. Animals were retrospectively assigned an ASA grade. ASA grades, clinical signs of respiratory abnormalities and anaesthesia protocols were compared between animals with and without chest radiographs. The group of animals without pre-anaesthetic radiographs was anaesthetized earlier after trauma and showed less respiratory abnormalities at presentation. The retrospectively evaluated ASA grade significantly increased with the information from thoracic radiography. Animals with a higher ASA grade were less frequently mechanically ventilated. Pre-anaesthetic radiographs may provide important information to assess the ASA grade in traumatized patients and may therefore influence the anesthesia protocol

  19. Microplastics in seafood: Benchmark protocol for their extraction and characterization.

    Science.gov (United States)

    Dehaut, Alexandre; Cassone, Anne-Laure; Frère, Laura; Hermabessiere, Ludovic; Himber, Charlotte; Rinnert, Emmanuel; Rivière, Gilles; Lambert, Christophe; Soudant, Philippe; Huvet, Arnaud; Duflos, Guillaume; Paul-Pont, Ika

    2016-08-01

    Pollution of the oceans by microplastics (studies have investigated the level of contamination of marine organisms collected in situ. For extraction and characterization of microplastics in biological samples, the crucial step is the identification of solvent(s) or chemical(s) that efficiently dissolve organic matter without degrading plastic polymers for their identification in a time and cost effective way. Most published papers, as well as OSPAR recommendations for the development of a common monitoring protocol for plastic particles in fish and shellfish at the European level, use protocols containing nitric acid to digest the biological tissues, despite reports of polyamide degradation with this chemical. In the present study, six existing approaches were tested and their effects were compared on up to 15 different plastic polymers, as well as their efficiency in digesting biological matrices. Plastic integrity was evaluated through microscopic inspection, weighing, pyrolysis coupled with gas chromatography and mass spectrometry, and Raman spectrometry before and after digestion. Tissues from mussels, crabs and fish were digested before being filtered on glass fibre filters. Digestion efficiency was evaluated through microscopical inspection of the filters and determination of the relative removal of organic matter content after digestion. Five out of the six tested protocols led to significant degradation of plastic particles and/or insufficient tissue digestion. The protocol using a KOH 10% solution and incubation at 60 °C during a 24 h period led to an efficient digestion of biological tissues with no significant degradation on all tested polymers, except for cellulose acetate. This protocol appeared to be the best compromise for extraction and later identification of microplastics in biological samples and should be implemented in further monitoring studies to ensure relevance and comparison of environmental and seafood product quality studies

  20. Direct data access protocols benchmarking on DPM

    Science.gov (United States)

    Furano, Fabrizio; Devresse, Adrien; Keeble, Oliver; Mancinelli, Valentina

    2015-12-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring information about any data access protocol to the same monitoring infrastructure that is used to monitor the Xrootd deployments. Our goal is to evaluate under which circumstances the HTTP-based protocols can be good enough for batch or interactive data access. In this contribution we show and discuss the results that our test systems have collected under the circumstances that include ROOT analyses using TTreeCache and stress tests on the metadata performance.

  1. Two-party quantum key agreement protocol with four-particle entangled states

    Science.gov (United States)

    He, Yefeng; Ma, Wenping

    2016-09-01

    Based on four-particle entangled states and the delayed measurement technique, a two-party quantum key agreement protocol is proposed in this paper. In the protocol, two participants can deduce the measurement results of each other’s initial quantum states in terms of the measurement correlation property of four-particle entangled states. According to the corresponding initial quantum states deduced by themselves, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. This guarantees the fair establishment of a shared key. Since each particle in quantum channel is transmitted only once, the protocol is congenitally free from the Trojan horse attacks. The security analysis shows that the protocol not only can resist against both participant and outsider attacks but also has no information leakage problem. Moreover, it has high qubit efficiency.

  2. Streetlight Control System Based on Wireless Communication over DALI Protocol

    Directory of Open Access Journals (Sweden)

    Francisco José Bellido-Outeiriño

    2016-04-01

    Full Text Available Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed.

  3. Comparison of human septal nuclei MRI measurements using automated segmentation and a new manual protocol based on histology

    Science.gov (United States)

    Butler, Tracy; Zaborszky, Laszlo; Pirraglia, Elizabeth; Li, Jinyu; Wang, Xiuyuan Hugh; Li, Yi; Tsui, Wai; Talos, Delia; Devinsky, Orrin; Kuchna, Izabela; Nowicki, Krzysztof; French, Jacqueline; Kuzniecky, Rubin; Wegiel, Jerzy; Glodzik, Lidia; Rusinek, Henry; DeLeon, Mony J.; Thesen, Thomas

    2014-01-01

    Septal nuclei, located in basal forebrain, are strongly connected with hippocampi and important in learning and memory, but have received limited research attention in human MRI studies. While probabilistic maps for estimating septal volume on MRI are now available, they have not been independently validated against manual tracing of MRI, typically considered the gold standard for delineating brain structures. We developed a protocol for manual tracing of the human septal region on MRI based on examination of neuroanatomical specimens. We applied this tracing protocol to T1 MRI scans (n=86) from subjects with temporal epilepsy and healthy controls to measure septal volume. To assess the inter-rater reliability of the protocol, a second tracer used the same protocol on 20 scans that were randomly selected from the 72 healthy controls. In addition to measuring septal volume, maximum septal thickness between the ventricles was measured and recorded. The same scans (n=86) were also analysed using septal probabilistic maps and Dartel toolbox in SPM. Results show that our manual tracing algorithm is reliable, and that septal volume measurements obtained via manual and automated methods correlate significantly with each other (pautomated methods detected significantly enlarged septal nuclei in patients with temporal lobe epilepsy in accord with a proposed compensatory neuroplastic process related to the strong connections between septal nuclei and hippocampi. Septal thickness, which was simple to measure with excellent inter-rater reliability, correlated well with both manual and automated septal volume, suggesting it could serve as an easy-to-measure surrogate for septal volume in future studies. Our results call attention to the important though understudied human septal region, confirm its enlargement in temporal lobe epilepsy, and provide a reliable new manual delineation protocol that will facilitate continued study of this critical region. PMID:24736183

  4. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  5. Sincalide - the final protocol

    International Nuclear Information System (INIS)

    Clarke, E.A.; Notghi, A.; Hesslewood, S.R.; Harding, L.K.

    2002-01-01

    Full text: HIDA biliary studies examine the gallbladder (GB) to give a percentage ejection fraction (EF). Porcine CCK was an accepted agent for stimulating the GB prior to being withdrawn in the UK from 1998. Sincalide (a synthetic CCK) was the suggested replacement. We have tried many administration regimes in an attempt to get results comparable with our established CCK protocols. Dose concentration and length of infusion times have been studied. Initially a dose of 10 ngm/kg/min given over 2 minutes (manufacturer's recommended dose) was used. This gave falsely low ejection fractions. The dose was reduced to 3 ngm/kg/min over 3 minutes as it was felt the higher dose may be causing constriction of the sphincter of Oddi. This gave a slight improvement with 22 % of patients having normal EF (>35 %). The length of infusion was extended to 15 minutes and the dose concentration reduced again to 0.6 ngm/kg/min. 62 % of patients had a normal EF. However, on many of the curves the gallbladder was still contracting on completion of the 15 minute infusion and began to refill immediately after stopping Sincalide. A further change of protocol was indicated. The infusion time was extended to 30 minutes and the dose concentration per minute kept the same. Imaging began at 30 minutes post HIDA injection and continued for a total of 50 minutes. Sincalide infusion began at 35 minutes if a GB was visualized. This protocol has been performed on 17 patients. 53 % of these had a normal result (comparable with a normal rate of 40 % previously established with CCK) with a mean EF of 60 %. The mean EF of patients with abnormal studies was 15 %. Curves showed a plateau by 30 minutes in 94 % of patients indicating that gallbladder contraction was complete. No normal range is available so results were compared with ultrasound (US). All patients who had an abnormal US scan also had abnormal HIDA results. Three patients had a normal US scan and abnormal HIDA study. These are currently

  6. Diagnostic performance of the three-dimensional fast spin echo-Cube sequence in comparison with a conventional imaging protocol in evaluation of the lachrymal drainage system

    International Nuclear Information System (INIS)

    Zhang, Jing; Chen, Lang; Wang, Qiu-Xia; Zhu, Wen-Zhen; Luo, Xin; Peng, Li; Liu, Rong; Xiong, Wei

    2015-01-01

    To compare the three-dimensional (3D)-fast spin-echo (FSE)-Cube with a conventional imaging protocol in evaluation of dacryostenosis. Thirty-three patients with epiphora underwent examinations using Cube magnetic resonance dacryocystography (MRD) and a conventional protocol, which included 3D fast-recovery fast spin-echo (FRFSE) MRD and two-dimensional (2D)-FSE sequences at 3.0 T. Using lachrymal endoscopic findings as the reference standard, we calculated the sensitivity and specificity of both protocols for detecting lachrymal drainage system (LDS) obstruction and their accuracies in depicting the level of obstruction. Comparable coronal and axial images were selected for bot sequences. Two neuroradiologists graded paired images for blurring, artefacts, anatomic details, and overall image quality. The two methods showed no significant difference in sensitivity (89.5 % vs. 94.7 %; p =0.674), specificity (64.3 %; p =1) or accuracy (86.8 %; p =1) in detecting or depicting LDS obstruction. Blurring and artefacts were significantly better on 2D-FSE images (p 0.05). In comparison with the conventional protocol, Cube MRD demonstrates satisfactory image quality and similar diagnostic capability for cases of possible LDS disease. (orig.)

  7. [Computerized clinical protocol for occlusion].

    Science.gov (United States)

    Salsench, J; Ferrer, J; Nogueras, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself. In this work we all data collected in the protocol and we give the explanations of each concept.

  8. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  9. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Liu, Jingwei; Zhang, Lihuan; Sun, Rong

    2016-05-19

    Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.

  10. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Jingwei Liu

    2016-05-01

    Full Text Available Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.

  11. Application of Game Theory Approaches in Routing Protocols for Wireless Networks

    Science.gov (United States)

    Javidi, Mohammad M.; Aliahmadipour, Laya

    2011-09-01

    An important and essential issue for wireless networks is routing protocol design that is a major technical challenge due to the function of the network. Game theory is a powerful mathematical tool that analyzes the strategic interactions among multiple decision makers and the results of researches show that applied game theory in routing protocol lead to improvement the network performance through reduce overhead and motivates selfish nodes to collaborate in the network. This paper presents a review and comparison for typical representatives of routing protocols designed that applied game theory approaches for various wireless networks such as ad hoc networks, mobile ad hoc networks and sensor networks that all of them lead to improve the network performance.

  12. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  13. Families of quantum fingerprinting protocols

    Science.gov (United States)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  14. A Mirror Therapy-Based Action Observation Protocol to Improve Motor Learning After Stroke.

    Science.gov (United States)

    Harmsen, Wouter J; Bussmann, Johannes B J; Selles, Ruud W; Hurkmans, Henri L P; Ribbers, Gerard M

    2015-07-01

    Mirror therapy is a priming technique to improve motor function of the affected arm after stroke. To investigate whether a mirror therapy-based action observation (AO) protocol contributes to motor learning of the affected arm after stroke. A total of 37 participants in the chronic stage after stroke were randomly allocated to the AO or control observation (CO) group. Participants were instructed to perform an upper-arm reaching task as fast and as fluently as possible. All participants trained the upper-arm reaching task with their affected arm alternated with either AO or CO. Participants in the AO group observed mirrored video tapes of reaching movements performed by their unaffected arm, whereas participants in the CO group observed static photographs of landscapes. The experimental condition effect was investigated by evaluating the primary outcome measure: movement time (in seconds) of the reaching movement, measured by accelerometry. Movement time decreased significantly in both groups: 18.3% in the AO and 9.1% in the CO group. Decrease in movement time was significantly more in the AO compared with the CO group (mean difference = 0.14 s; 95% confidence interval = 0.02, 0.26; P = .026). The present study showed that a mirror therapy-based AO protocol contributes to motor learning after stroke. © The Author(s) 2014.

  15. An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States

    Science.gov (United States)

    Liu, Wen-Jie; Xu, Yong; Yang, Ching-Nung; Gao, Pei-Pei; Yu, Wen-Bin

    2018-01-01

    Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. (Quantum Inf. Process. 13(11), 2391-2405, 2014). However, Zhu et al. pointed out that there are some security flaws and proposed an improved version (Quantum Inf. Process. 14(11), 4245-4254, 2015). In this study, we will show Zhu et al.'s improvement still exists some security problems, and its efficiency is not high enough. For solving these problems, we utilize four Pauli operations { I, Z, X, Y} to encode two bits instead of the original two operations { I, X} to encode one bit, and then propose an efficient and secure arbitrary N-party quantum key agreement protocol. In the protocol, the channel checking with decoy single photons is introduced to avoid the eavesdropper's flip attack, and a post-measurement mechanism is used to prevent against the collusion attack. The security analysis shows the present protocol can guarantee the correctness, security, privacy and fairness of quantum key agreement.

  16. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  17. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  18. A Secure and Effective Anonymous Integrity Checking Protocol for Data Storage in Multicloud

    Directory of Open Access Journals (Sweden)

    Lingwei Song

    2015-01-01

    Full Text Available How to verify the integrity of outsourced data is an important problem in cloud storage. Most of previous work focuses on three aspects, which are providing data dynamics, public verifiability, and privacy against verifiers with the help of a third party auditor. In this paper, we propose an identity-based data storage and integrity verification protocol on untrusted cloud. And the proposed protocol can guarantee fair results without any third verifying auditor. The theoretical analysis and simulation results show that our protocols are secure and efficient.

  19. Effectiveness of oxaliplatin desensitization protocols.

    Science.gov (United States)

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  20. Effect of prophylactic polishing protocols on the surface roughness of esthetic restorative materials.

    Science.gov (United States)

    Neme, A L; Frazier, K B; Roeder, L B; Debner, T L

    2002-01-01

    Many polishing protocols have been evaluated in vitro for their effect on the surface roughness of restorative materials. These results have been useful in establishing protocols for in vivo application. However, limited research has focused on the subsequent care and maintenance of esthetic restorations following their placement. This investigation evaluated the effect of five polishing protocols that could be implemented at recall on the surface roughness of five direct esthetic restorative materials. Specimens (n=25) measuring 8 mm diameter x 3 mm thick were fabricated in an acrylic mold using five light-cured resin-based materials (hybrid composite, microfilled composite, packable composite, compomer and resin-modified glass ionomer). After photopolymerization, all specimens were polished with Sof-Lex Disks to produce an initial (baseline) surface finish. All specimens were then polished with one of five prophylactic protocols (Butler medium paste, Butler coarse paste, OneGloss, SuperBuff or OneGloss & SuperBuff). The average surface roughness of each treated specimen was determined from three measurements with a profilometer (Surface 1). Next, all specimens were brushed 60,000 times at 1.5 Hz using a brush-head force of 2 N on a Manly V-8 cross-brushing machine in a 50:50 (w/w) slurry of toothpaste and water. The surface roughness of each specimen was measured after brushing (Surface 2) followed by re-polishing with one of five protocols, then final surface roughness values were determined (Surface 3). The data were analyzed using repeated measures ANOVA. Significant differences (p=0.05) in surface roughness were observed among restorative materials and polishing protocols. The microfilled and hybrid resin composite yielded significantly rougher surfaces than the other three materials following tooth brushing. Prophylactic polishing protocols can be used to restore a smooth surface on resin-based esthetic restorative materials following simulated tooth

  1. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.

    Science.gov (United States)

    Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu

    2016-01-01

    People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.

  2. Security analysis of standards-driven communication protocols for healthcare scenarios.

    Science.gov (United States)

    Masi, Massimiliano; Pugliese, Rosario; Tiezzi, Francesco

    2012-12-01

    The importance of the Electronic Health Record (EHR), that stores all healthcare-related data belonging to a patient, has been recognised in recent years by governments, institutions and industry. Initiatives like the Integrating the Healthcare Enterprise (IHE) have been developed for the definition of standard methodologies for secure and interoperable EHR exchanges among clinics and hospitals. Using the requisites specified by these initiatives, many large scale projects have been set up for enabling healthcare professionals to handle patients' EHRs. The success of applications developed in these contexts crucially depends on ensuring such security properties as confidentiality, authentication, and authorization. In this paper, we first propose a communication protocol, based on the IHE specifications, for authenticating healthcare professionals and assuring patients' safety. By means of a formal analysis carried out by using the specification language COWS and the model checker CMC, we reveal a security flaw in the protocol thus demonstrating that to simply adopt the international standards does not guarantee the absence of such type of flaws. We then propose how to emend the IHE specifications and modify the protocol accordingly. Finally, we show how to tailor our protocol for application to more critical scenarios with no assumptions on the communication channels. To demonstrate feasibility and effectiveness of our protocols we have fully implemented them.

  3. Prospective trial of angiography and embolization for all grade III to V blunt splenic injuries: nonoperative management success rate is significantly improved.

    Science.gov (United States)

    Miller, Preston R; Chang, Michael C; Hoth, J Jason; Mowery, Nathan T; Hildreth, Amy N; Martin, R Shayn; Holmes, James H; Meredith, J Wayne; Requarth, Jay A

    2014-04-01

    Nonoperative management (NOM) of blunt splenic injury is well accepted. Substantial failure rates in higher injury grades remain common, with one large study reporting rates of 19.6%, 33.3%, and 75% for grades III, IV, and V, respectively. Retrospective data show angiography and embolization can increase salvage rates in these severe injuries. We developed a protocol requiring referral of all blunt splenic injuries, grades III to V, without indication for immediate operation for angiography and embolization. We hypothesized that angiography and embolization of high-grade blunt splenic injury would reduce NOM failure rates in this population. This was a prospective study at our Level I trauma center as part of a performance-improvement project. Demographics, injury characteristics, and outcomes were compared with historic controls. The protocol required all stable patients with grade III to V splenic injuries be referred for angiography and embolization. In historic controls, referral was based on surgeon preference. From January 1, 2010 to December 31, 2012, there were 168 patients with grades III to V spleen injuries admitted; NOM was undertaken in 113 (67%) patients. The protocol was followed in 97 patients, with a failure rate of 5%. Failure rate in the 16 protocol deviations was 25% (p = 0.02). Historic controls from January 1, 2007 to December 31, 2009 were compared with the protocol group. One hundred and fifty-three patients with grade III to V injuries were admitted during this period, 80 (52%) patients underwent attempted NOM. Failure rate was significantly higher than for the protocol group (15%, p = 0.04). Use of a protocol requiring angiography and embolization for all high-grade spleen injuries slated for NOM leads to a significantly decreased failure rate. We recommend angiography and embolization as an adjunct to NOM for all grade III to V splenic injuries. Copyright © 2014 American College of Surgeons. Published by Elsevier Inc. All rights reserved.

  4. ABORt: Acknowledgement-Based Opportunistic Routing Protocol for High Data Rate Multichannel WSNs

    Directory of Open Access Journals (Sweden)

    Hamadoun Tall

    2017-10-01

    Full Text Available The ease of deployment and the auto-configuration capabilities of Wireless Sensor Networks (WSNs make them very attractive in different domains like environmental, home automation or heath care applications. The use of multichannel communications in WSNs helps to improve the overall performance of the network. However, in heavy traffic scenarios, routing protocols should be adapted to allow load balancing and to avoid losing data packets due to congestion and queue overflow. In this paper, we present an Acknowledgement-Based Opportunistic Routing (ABORt protocol designed for high data rate multichannel WSNs. It is a low overhead protocol that does not rely on synchronization for control traffic exchange during the operational phase of the network. ABORt is an opportunistic protocol that relies on link layer acknowledgements to disseminate routing metrics, which helps to reduce overhead. The performance of ABORt is evaluated using the Cooja simulator and the obtained results show that ABORt has a high packet delivery ratio with reduced packet end-to-end delay compared to two single channel routing protocols and two multichannel routing protocols that use number of hops and expected transmission count as routing metrics.

  5. A lightweight neighbor-info-based routing protocol for no-base-station taxi-call system.

    Science.gov (United States)

    Zhu, Xudong; Wang, Jinhang; Chen, Yunchao

    2014-01-01

    Since the quick topology change and short connection duration, the VANET has had unstable routing and wireless signal quality. This paper proposes a kind of lightweight routing protocol-LNIB for call system without base station, which is applicable to the urban taxis. LNIB maintains and predicts neighbor information dynamically, thus finding the reliable path between the source and the target. This paper describes the protocol in detail and evaluates the performance of this protocol by simulating under different nodes density and speed. The result of evaluation shows that the performance of LNIB is better than AODV which is a classic protocol in taxi-call scene.

  6. Assistance protocol for venous ulcers patients: validation of contents

    Directory of Open Access Journals (Sweden)

    Daniele Vieira Dantas

    2013-07-01

    Full Text Available Venous ulcers require complex treatment and are responsible for significant morbidity and mortality rates. This study aims at identifying aspects validated by the jury for the preparation of an assistance protocol for venous ulcer sufferers. It is a descriptive and quantitative research, with 39 professionals (30 nurses, 7 doctors and two physiotherapists, held at the Onofre Lopes University Hospital, between April and July/2010. Data collection began through a questionnaire checklist. Analysis was performed through Statistical Package for Social Science 15.0, assessing compliance with guidelines. Results were the compositional aspects of the protocol: assessment of patient and lesion history/documentation, wound care/perilesional skin, dressing suggestion, use of antibiotics and pain treatment, surgical treatment/medication, improving venous return and relapse prevention, patient referral, professional training and referral/counter-referral. It was concluded that to compose the protocol, aspects related to diagnosis, treatment and injury prevention must be considered.

  7. Phase Transition in Protocols Minimizing Work Fluctuations

    Science.gov (United States)

    Solon, Alexandre P.; Horowitz, Jordan M.

    2018-05-01

    For two canonical examples of driven mesoscopic systems—a harmonically trapped Brownian particle and a quantum dot—we numerically determine the finite-time protocols that optimize the compromise between the standard deviation and the mean of the dissipated work. In the case of the oscillator, we observe a collection of protocols that smoothly trade off between average work and its fluctuations. However, for the quantum dot, we find that as we shift the weight of our optimization objective from average work to work standard deviation, there is an analog of a first-order phase transition in protocol space: two distinct protocols exchange global optimality with mixed protocols akin to phase coexistence. As a result, the two types of protocols possess qualitatively different properties and remain distinct even in the infinite duration limit: optimal-work-fluctuation protocols never coalesce with the minimal-work protocols, which therefore never become quasistatic.

  8. Validation of a protocol for the estimation of three-dimensional body center of mass kinematics in sport.

    Science.gov (United States)

    Mapelli, Andrea; Zago, Matteo; Fusini, Laura; Galante, Domenico; Colombo, Andrea; Sforza, Chiarella

    2014-01-01

    Since strictly related to balance and stability control, body center of mass (CoM) kinematics is a relevant quantity in sport surveys. Many methods have been proposed to estimate CoM displacement. Among them, segmental method appears to be suitable to investigate CoM kinematics in sport: human body is assumed as a system of rigid bodies, hence the whole-body CoM is calculated as the weighted average of the CoM of each segment. The number of landmarks represents a crucial choice in the protocol design process: one have to find the proper compromise between accuracy and invasivity. In this study, using a motion analysis system, a protocol based upon the segmental method is validated, adopting an anatomical model comprising 14 landmarks. Two sets of experiments were conducted. Firstly, our protocol was compared to the ground reaction force method (GRF), accounted as a standard in CoM estimation. In the second experiment, we investigated the aerial phase typical of many disciplines, comparing our protocol with: (1) an absolute reference, the parabolic regression of the vertical CoM trajectory during the time of flight; (2) two common approaches to estimate CoM kinematics in gait, known as sacrum and reconstructed pelvis methods. Recognized accuracy indexes proved that the results obtained were comparable to the GRF; what is more, during the aerial phases our protocol showed to be significantly more accurate than the two other methods. The protocol assessed can therefore be adopted as a reliable tool for CoM kinematics estimation in further sport researches. Copyright © 2013 Elsevier B.V. All rights reserved.

  9. Simplified protocol for clinical-grade tumor-infiltrating lymphocyte manufacturing with use of the Wave bioreactor

    DEFF Research Database (Denmark)

    Donia, Marco; Larsen, Signe Møllebæk; Met, Ozcan

    2014-01-01

    , a practical and simple protocol of TIL manufacturing with the use of a closed-system bioreactor was developed and implemented at our institution. RESULTS: This protocol enabled significant work load reduction during the most labor-intense step of TIL expansion, and allowed generation of high-quality TIL...

  10. Model-Checking Driven Design of QoS-Based Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhi Chen

    2015-01-01

    Full Text Available Accurate and reliable routing protocols with Quality of Service (QoS support determine the mission-critical application efficiency in WSNs. This paper proposes a model-checking design driven framework for designing the QoS-based routing protocols of WSNs, which involves the light-weight design process, the timed automata model, and the alternative QoS verification properties. The accurate feedback of continually model checking in the iterative design process effectively stimulates the parameter tuning of the protocols. We demonstrate the straightforward and modular characteristics of the proposed framework in designing a prototype QoS-based routing protocol. The prototype study shows that the model-checking design framework may complement other design methods and ensure the QoS implementation of the QoS-based routing protocol design for WSNs.

  11. Upper Limb Static-Stretching Protocol Decreases Maximal Concentric Jump Performance

    Directory of Open Access Journals (Sweden)

    Paulo H. Marchetti

    2014-12-01

    Full Text Available The purpose of the present study was to evaluate the acute effects of an upper limb static-stretching (SS protocol on the maximal concentric jump performance. We recruited 25 young healthy, male, resistance trained individuals (stretched group, n = 15 and control group, n = 10 in this study. The randomized between group experimental protocol consisted of a three trials of maximal concentric jump task, before and after a SS of the upper limb. Vertical ground reaction forces (vGRF and surface electromyography (sEMG of both gastrocnemius lateralis (GL and vastus lateralis (VL were acquired. An extensive SS was employed consisting of ten stretches of 30 seconds, with 15 seconds of rest, and 70-90% of the point of discomfort (POD. ANOVA (2x2 (group x condition was used for shoulder joint range of motion (ROM, vGRF and sEMG. A significant interaction for passive ROM of the shoulder joint revealed significant increases between pre- and post-SS protocol (p < 0.001. A significant interaction demonstrated decreased peak force and an increased peak propulsion duration between pre- and post-stretching only for stretch group (p = 0.021, and p = 0.024, respectively. There was a significant main effect between groups (stretch and control for peak force for control group (p = 0.045. Regarding sEMG variables, there were no significant differences between groups (control versus stretched or condition (pre-stretching versus post-stretching for the peak amplitude of RMS and IEMG for both muscles (VL and GL. In conclusion, an acute extensive SS can increase the shoulder ROM, and negatively affect both the propulsion duration and peak force of the maximal concentric jump, without providing significant changes in muscle activation.

  12. The Performance of a Second Generation Service Discovery Protocol In Response to Message Loss

    NARCIS (Netherlands)

    Sundramoorthy, V.; van de Glind, G.J.; Hartel, Pieter H.; Scholten, Johan

    We analyze the behavior of FRODO, a second generation service discovery protocol, in response to message loss in the network. Earlier protocols, like UPnP and Jini rely on underlying network layers to enhance their failure recovery. A comparison with UPnP and Jini shows that FRODO performs more

  13. The Performance of a Second Generation Service Discovery Protocol In Response to Message Loss

    NARCIS (Netherlands)

    Sundramoorthy, V.; van de Glind, G.J.; Hartel, Pieter H.; Scholten, Johan

    We analyze the behavior of FRODO, a second generation service discovery protocol, in response to message loss in the network. First generation protocols, like UPnP and Jini rely on underlying network layers to enhance their failure recovery. A comparison with UPnP and Jini shows that FRODO performs

  14. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  15. Protocol optimization in chest CT scans of child

    Energy Technology Data Exchange (ETDEWEB)

    Abrao L, L. T.; Amaral de O, F.; Prata M, A. [Biomedical Engineering Center, Centro Federal de Educacao Tecnologica de Minas Gerais, 30421-169, Belo Horizonte, Minas Gerais (Brazil); Bustos F, M., E-mail: luanaabrao@gmail.com [Universidad Federal de Minas Gerais, Department of Nuclear Engineering, Av. Pres. Antonio Carlos 6627, Pampulha, 31270-901 Belo Horizonte, Minas Gerais (Brazil)

    2017-10-15

    The dissemination of Computed Tomography (CT), a radiodiagnostic technique, has significant increase in the patient dose. In the last years, this technique has shown a high growth due to clinical cases of medical emergencies, neoplasm and pediatric traumas. Dose measurement is important to correlate with the deleterious effects of radiation on the organism and radiation future effects is related with stochastic risks due to tissue radiosensitivity, allied to the life expectancy of the child. In this work, a cylindrical phantom, representing an adult chest made of polymethylmethacrylate (PMMA), was used and a new born chest phantom with a shape oblong was developed based on the dimensions of a typical newborn. In a Ge CT scanner, Discovery model, with 64 channels, the central slice of the phantoms were irradiated successively in order to obtain dose measurements using an ionizing pencil camera. Based in the measurements, dose index was calculated (CTDI{sub vol}). The radiological service chest protocol using a voltage of 120 kV was used for scanning 10 cm of the central area of the adult and newborn phantom, in helical mode. An acquisition of images was performed using this radiological service chest protocol to compare with the protocol optimized. In the newborn phantom was also used protocols optimized using a voltage of 120 and 80 kV. The voltage of 80 kV has the lowest dose index for the pediatric object phantom. This work allowed the comparison between absorbed dose variations by the pediatric phantom changing the X-ray tube supply voltage. This dose variation has shown how important is specific protocols for children. (Author)

  16. Protocol optimization in chest CT scans of child

    International Nuclear Information System (INIS)

    Abrao L, L. T.; Amaral de O, F.; Prata M, A.; Bustos F, M.

    2017-10-01

    The dissemination of Computed Tomography (CT), a radiodiagnostic technique, has significant increase in the patient dose. In the last years, this technique has shown a high growth due to clinical cases of medical emergencies, neoplasm and pediatric traumas. Dose measurement is important to correlate with the deleterious effects of radiation on the organism and radiation future effects is related with stochastic risks due to tissue radiosensitivity, allied to the life expectancy of the child. In this work, a cylindrical phantom, representing an adult chest made of polymethylmethacrylate (PMMA), was used and a new born chest phantom with a shape oblong was developed based on the dimensions of a typical newborn. In a Ge CT scanner, Discovery model, with 64 channels, the central slice of the phantoms were irradiated successively in order to obtain dose measurements using an ionizing pencil camera. Based in the measurements, dose index was calculated (CTDI vol ). The radiological service chest protocol using a voltage of 120 kV was used for scanning 10 cm of the central area of the adult and newborn phantom, in helical mode. An acquisition of images was performed using this radiological service chest protocol to compare with the protocol optimized. In the newborn phantom was also used protocols optimized using a voltage of 120 and 80 kV. The voltage of 80 kV has the lowest dose index for the pediatric object phantom. This work allowed the comparison between absorbed dose variations by the pediatric phantom changing the X-ray tube supply voltage. This dose variation has shown how important is specific protocols for children. (Author)

  17. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    Science.gov (United States)

    Ray, Surjya Sarathi

    . Simulations show that the optimized ADV-MAC provides substantial energy gains (50% to 70% less than other MAC protocols for WSNs such as T-MAC and S-MAC for the scenarios investigated) while faring as well as T-MAC in terms of packet delivery ratio and latency. Although ADV-MAC provides substantial energy gains over S-MAC and T-MAC, it is not optimal in terms of energy savings because contention is done twice -- once in the Advertisement Period and once in the Data Period. In the next part of my research, the second contention in the Data Period is eliminated and the advantages of contention-based and TDMA-based protocols are combined to form Advertisement based Time-division Multiple Access (ATMA), a distributed TDMA-based MAC protocol for WSNs. ATMA utilizes the bursty nature of the traffic to prevent energy waste through advertisements and reservations for data slots. Extensive simulations and qualitative analysis show that with bursty traffic, ATMA outperforms contention-based protocols (S-MAC, T-MAC and ADV-MAC), a TDMA based protocol (TRAMA) and hybrid protocols (Z-MAC and IEEE 802.15.4). ATMA provides energy reductions of up to 80%, while providing the best packet delivery ratio (close to 100%) and latency among all the investigated protocols. Simulations alone cannot reflect many of the challenges faced by real implementations of MAC protocols, such as clock-drift, synchronization, imperfect physical layers, and irregular interference from other transmissions. Such issues may cripple a protocol that otherwise performs very well in software simulations. Hence, to validate my research, I conclude with a hardware implementation of the ATMA protocol on SORA (Software Radio), developed by Microsoft Research Asia. SORA is a reprogrammable Software Defined Radio (SDR) platform that satisfies the throughput and timing requirements of modern wireless protocols while utilizing the rich general purpose PC development environment. Experimental results obtained from the hardware

  18. A DUAL RESERVATION CDMA-BASED MAC PROTOCOL WITH POWER CONTROL FOR AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Jia Min; Chen Huimin; Yuan Yuhua

    2007-01-01

    This paper proposes a new multi-channel Medium Access Control (MAC) protocol named as Dual Reservation Code Division Multiple Access (CDMA) based MAC protocol with Power Control (DRCPC). The code channel is divided into common channel, broadcast channel and several data channels. And dynamic power control mechanism is implemented to reduce near-far interference. Compared with IEEE 802.11 Distributed Coordination Function (DCF) protocol, the results show that the proposed mechanism improves the average throughput and limits the transmission delay efficiently.

  19. Toward Synthesis, Analysis, and Certification of Security Protocols

    Science.gov (United States)

    Schumann, Johann

    2004-01-01

    Implemented security protocols are basically pieces of software which are used to (a) authenticate the other communication partners, (b) establish a secure communication channel between them (using insecure communication media), and (c) transfer data between the communication partners in such a way that these data only available to the desired receiver, but not to anyone else. Such an implementation usually consists of the following components: the protocol-engine, which controls in which sequence the messages of the protocol are sent over the network, and which controls the assembly/disassembly and processing (e.g., decryption) of the data. the cryptographic routines to actually encrypt or decrypt the data (using given keys), and t,he interface to the operating system and to the application. For a correct working of such a security protocol, all of these components must work flawlessly. Many formal-methods based techniques for the analysis of a security protocols have been developed. They range from using specific logics (e.g.: BAN-logic [4], or higher order logics [12] to model checking [2] approaches. In each approach, the analysis tries to prove that no (or at least not a modeled intruder) can get access to secret data. Otherwise, a scenario illustrating the &tack may be produced. Despite the seeming simplicity of security protocols ("only" a few messages are sent between the protocol partners in order to ensure a secure communication), many flaws have been detected. Unfortunately, even a perfect protocol engine does not guarantee flawless working of a security protocol, as incidents show. Many break-ins and security vulnerabilities are caused by exploiting errors in the implementation of the protocol engine or the underlying operating system. Attacks using buffer-overflows are a very common class of such attacks. Errors in the implementation of exception or error handling can open up additional vulnerabilities. For example, on a website with a log-in screen

  20. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    Science.gov (United States)

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  1. Maximally efficient protocols for direct secure quantum communication

    Energy Technology Data Exchange (ETDEWEB)

    Banerjee, Anindita [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); Department of Physics and Center for Astroparticle Physics and Space Science, Bose Institute, Block EN, Sector V, Kolkata 700091 (India); Pathak, Anirban, E-mail: anirban.pathak@jiit.ac.in [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); RCPTM, Joint Laboratory of Optics of Palacky University and Institute of Physics of Academy of Science of the Czech Republic, Faculty of Science, Palacky University, 17. Listopadu 12, 77146 Olomouc (Czech Republic)

    2012-10-01

    Two protocols for deterministic secure quantum communication (DSQC) using GHZ-like states have been proposed. It is shown that one of these protocols is maximally efficient and that can be modified to an equivalent protocol of quantum secure direct communication (QSDC). Security and efficiency of the proposed protocols are analyzed and compared. It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. Maximally efficient QSDC protocols are shown to be more efficient than their DSQC counterparts. This additional efficiency arises at the cost of message transmission rate. -- Highlights: ► Two protocols for deterministic secure quantum communication (DSQC) are proposed. ► One of the above protocols is maximally efficient. ► It is modified to an equivalent protocol of quantum secure direct communication (QSDC). ► It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. ► Efficient QSDC protocols are always more efficient than their DSQC counterparts.

  2. Practical security analysis of a quantum stream cipher by the Yuen 2000 protocol

    International Nuclear Information System (INIS)

    Hirota, Osamu

    2007-01-01

    There exists a great gap between one-time pad with perfect secrecy and conventional mathematical encryption. The Yuen 2000 (Y00) protocol or αη scheme may provide a protocol which covers from the conventional security to the ultimate one, depending on implementations. This paper presents the complexity-theoretic security analysis on some models of the Y00 protocol with nonlinear pseudo-random-number-generator and quantum noise diffusion mapping (QDM). Algebraic attacks and fast correlation attacks are applied with a model of the Y00 protocol with nonlinear filtering like the Toyocrypt stream cipher as the running key generator, and it is shown that these attacks in principle do not work on such models even when the mapping between running key and quantum state signal is fixed. In addition, a security property of the Y00 protocol with QDM is clarified. Consequently, we show that the Y00 protocol has a potential which cannot be realized by conventional cryptography and that it goes beyond mathematical encryption with physical encryption

  3. Physical Therapy Protocols for Arthroscopic Bankart Repair.

    Science.gov (United States)

    DeFroda, Steven F; Mehta, Nabil; Owens, Brett D

    Outcomes after arthroscopic Bankart repair can be highly dependent on compliance and participation in physical therapy. Additionally, there are many variations in physician-recommended physical therapy protocols. The rehabilitation protocols of academic orthopaedic surgery departments vary widely despite the presence of consensus protocols. Descriptive epidemiology study. Level 3. Web-based arthroscopic Bankart rehabilitation protocols available online from Accreditation Council for Graduate Medical Education (ACGME)-accredited orthopaedic surgery programs were included for review. Individual protocols were reviewed to evaluate for the presence or absence of recommended therapies, goals for completion of ranges of motion, functional milestones, exercise start times, and recommended time to return to sport. Thirty protocols from 27 (16.4%) total institutions were identified out of 164 eligible for review. Overall, 9 (30%) protocols recommended an initial period of strict immobilization. Variability existed between the recommended time periods for sling immobilization (mean, 4.8 ± 1.8 weeks). The types of exercises and their start dates were also inconsistent. Goals to full passive range of motion (mean, 9.2 ± 2.8 weeks) and full active range of motion (mean, 12.2 ± 2.8 weeks) were consistent with other published protocols; however, wide ranges existed within the reviewed protocols as a whole. Only 10 protocols (33.3%) included a timeline for return to sport, and only 3 (10%) gave an estimate for return to game competition. Variation also existed when compared with the American Society of Shoulder and Elbow Therapists' (ASSET) consensus protocol. Rehabilitation protocols after arthroscopic Bankart repair were found to be highly variable. They also varied with regard to published consensus protocols. This discrepancy may lead to confusion among therapists and patients. This study highlights the importance of attending surgeons being very clear and specific with

  4. Fault Detection Variants of the CloudBus Protocol for IoT Distributed Embedded Systems

    Directory of Open Access Journals (Sweden)

    BARKALOV, A.

    2017-05-01

    Full Text Available Distributed embedded systems have become larger, more complex and complicated. More often, such systems operate accordingly to the IoT or Industry 4.0 concept. However, large number of end modules operating in the system leads to a significant load and consequently, to an overload of the communication interfaces. The CloudBus protocol is one of the methods which is used for data exchange and concurrent process synchronization in the distributed systems. It allows the significant savings in the amount of transmitted data between end modules, especially when compared with the other protocols used in the industry. Nevertheless, basic version of the protocol does not protect against the system failure in the event of failure of one of the nodes. This paper proposes four novel variants of the CloudBus protocol, which allow the fault detection. The comparison and performance analysis was executed for all proposed CloudBus variants. The verification and behavior analysis of the distributed systems were performed on SoC hardware research platform. Furthermore, a simple test application was proposed.

  5. Effectiveness of Various Irrigation Protocols in Removing Calcium Hydroxide from Root Canals

    Directory of Open Access Journals (Sweden)

    Hakan Göktürk

    2018-04-01

    Full Text Available Objective: The purpose of this study was to investigate the removal efficiency of calcium hydroxide (CH by CanalBrush, Vibringe, laser-activated irrigation (LAI, conventional syringe irrigation (CSI, XP-endo Finisher, and passive ultrasonic irrigation (PUI in the root canal walls. Materials and Methods: Ninety-eight human mandibular premolar teeth were prepared. Root canals were filled with CH. The roots were divided into six experimental groups (n=15/group according to the irrigation protocol used: group 1 (CSI, group 2 (Vibringe, group 3 (CanalBrush, group 4 (XP-endo Finisher, group 5 (PUI, and group 6 (LAI. The amount of residual CH in the canal walls for each canal third was scored. Data were analysed by using Kruskal-Wallis and Bonferroni-correction Mann-Whitney U tests. Results: None of the investigated protocols renders the root canal walls free of CH remnants. Significant differences were found between tooth regions in terms of CH removal (p<0.05, and all groups except group 6 (LAI showed more residual CH in the apical region. PUI and LAI eliminated significantly more CH than CSI from the middle and apical thirds of the root canal, respectively. Conclusion: The activation of sodium hypochlorite with various devices increased CH removal at the apical and middle part of the canal. LAI and PUI produce better results in the apical and middle thirds, respectively.

  6. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  7. A simple Chelex protocol for DNA extraction from Anopheles spp.

    Science.gov (United States)

    Musapa, Mulenga; Kumwenda, Taida; Mkulama, Mtawa; Chishimba, Sandra; Norris, Douglas E; Thuma, Philip E; Mharakurwa, Sungano

    2013-01-09

    . Comparison using DNA quality (ND4) PCR showed 93% sensitivity and 82% specificity for the Chelex approach relative to the established salting out protocol. Corresponding values of sensitivity and specificity were 100% and 78%, respectively, using sibling species identification PCR and 92% and 80%, respectively for P. falciparum detection PCR. There were no significant differences in proportion of samples giving amplicon signal with the Chelex or the regular salting out protocol across all three PCR applications. The Chelex approach required three simple reagents and 37 min to complete, while the salting out protocol entailed 10 different reagents and 2 hr and 47 min' processing time, including an overnight step. Our results show that the Chelex method is comparable to the existing salting out extraction and can be substituted as a simple and sustainable approach in resource-limited settings where a constant reagent supply chain is often difficult to maintain.

  8. Performances of different protocols for exocellular polysaccharides extraction from milk acid gels: Application to yogurt.

    Science.gov (United States)

    Nguyen, An Thi-Binh; Nigen, Michaël; Jimenez, Luciana; Ait-Abderrahim, Hassina; Marchesseau, Sylvie; Picart-Palmade, Laetitia

    2018-01-15

    Dextran or xanthan were used as model exocellular polysaccharides (EPS) to compare the extraction efficiency of EPS from skim milk acid gels using three different protocols. Extraction yields, residual protein concentrations and the macromolecular properties of extracted EPS were determined. For both model EPS, the highest extraction yield (∼80%) was obtained when samples were heated in acidic conditions at the first step of extraction (Protocol 1). Protocols that contained steps of acid/ethanol precipitation without heating (Protocols 2 and 3) show lower extraction yields (∼55%) but allow a better preservation of the EPS macromolecular properties. Changing the pH of acid gels up to 7 before extraction (Protocol 3) improved the extraction yield of anionic EPS without effect on the macromolecular properties of EPS. Protocol 1 was then applied for the quantification of EPS produced during the yogurt fermentation, while Protocol 3 was dedicated to their macromolecular characterization. Copyright © 2017 Elsevier Ltd. All rights reserved.

  9. Development of a new CARD-FISH protocol for quantification of Legionella pneumophila and its application in two hospital cooling towers.

    Science.gov (United States)

    Kirschner, A K T; Rameder, A; Schrammel, B; Indra, A; Farnleitner, A H; Sommer, R

    2012-06-01

    Open cooling towers are frequent sources of infections with Legionella pneumophila. The gold standard for the detection of Leg. pneumophila is based on cultivation lasting up to 10 days and detecting only culturable cells. Alternative fluorescence in situ hybridization (FISH) protocols have been proposed, but they result in faint fluorescence signals and lack specificity because of cross-hybridization with other Legionella species. Our aim was thus to develop a new FISH protocol for rapid and specific detection of Leg. pneumophila in water samples. A novel catalysed reporter deposition FISH (CARD-FISH) protocol for the detection of Leg. pneumophila was developed, which significantly enhanced signal intensity as well as specificity of the probe through the use of a novel competitor probe. The developed protocol was compared with the culture method for monitoring the seasonal development of culturable and nonculturable Leg. pneumophila in two hospital cooling tower systems. Seasonal fluctuations of Leg. pneumophila concentrations detected via CARD-FISH were related to the development of the total bacterial community in both cooling towers, with temperature and biocide as the main factors controlling this development. Our results clearly showed that the majority of the Leg. pneumophila cells were in a nonculturable state. Thus, detection of Leg. pneumophila with culture methods may underestimate the total numbers of Leg. pneumophila present. Rapid, sensitive and specific detection and quantification of Leg. pneumophila in water systems is prerequisite for reliable risk estimation. The new protocol significantly improves current methodology and can be used to monitor and screen for Leg. pneumophila concentrations in cooling towers or other water systems. © 2012 The Authors. Journal of Applied Microbiology © 2012 The Society for Applied Microbiology.

  10. Welfare Quality assessment protocol for laying hens = Welfare Quality assessment protocol voor leghennen

    NARCIS (Netherlands)

    Niekerk, van T.G.C.M.; Gunnink, H.; Reenen, van C.G.

    2012-01-01

    Results of a study on the Welfare Quality® assessment protocol for laying hens. It reports the development of the integration of welfare assessment as scores per criteria as well as simplification of the Welfare Quality® assessment protocol. Results are given from assessment of 122 farms.

  11. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  12. Comparison of two neonatal indomethacin protocols: efficacy and outcome for patent ductus arteriosus closure.

    Science.gov (United States)

    Rosito, G; Sum, K; Chorne, N

    2010-10-01

    Indomethacin, a non-selective inhibitor of prostaglandin synthesis, is the gold standard treatment for patent ductus arteriosus (PDA). Indomethacin has been shown to permanently close the ductus and when given prophylactically, it reduces the incidence of PDA (1, 2). This study compares PDA closure and surgical ligation rates between patients using two different indomethacin administration protocols. This is a retrospective comparison analysis of 72 neonates, who received one of two indomethacin administration protocols. Our previous protocol suggested an initial dose of 0·2 mg/kg followed by two 0·1 mg/kg, with doses infused over 4 h and a 24-h dosing interval. A new potentially more useful protocol using the same mg/kg dose regimen but with doses infused over 30 min and a 12-h dosing interval, was evaluated. Each neonate was allowed three courses of treatment before surgical ligation was performed for persistent PDA. There were no statistically significant differences between the two protocol groups when comparing percentages of neonates with gestational age≤28 weeks, birth weight≤1000 g, male gender or receiving indomethacin for the indication of PDA prophylaxis vs. treatment. There was a trend towards a higher PDA closure rate and subsequently a lower PDA ligation rate in the new protocol when compared with the previous protocol. In this small population of premature neonates, there was a trend, but no significant difference, towards increasing PDA closure and lower surgical ligation rates in neonates given indomethacin with more frequent dosing and shorter infusion time. A well-powered randomized controlled trial is now needed. Copyright © 2010 The Authors. JCPT © 2010 Blackwell Publishing Ltd.

  13. Goal-setting protocol in adherence to exercise by Italian adults.

    Science.gov (United States)

    Annesi, James J

    2002-04-01

    A goal-setting protocol, based on research in goal setting and performance and personal construct theory, was tested for its effect on adherence to a new exercise program. The Goal-setting group (n = 50) had significantly less dropout (30%) than the control group (n = 50) (74%). The Goal-setting group also had significantly better attendance (psettings were discussed.

  14. Quantification of circulating endothelial progenitor cells using the modified ISHAGE protocol.

    Directory of Open Access Journals (Sweden)

    Caroline Schmidt-Lucke

    2010-11-01

    Full Text Available Circulating endothelial progenitor cells (EPC, involved in endothelial regeneration, neovascularisation, and determination of prognosis in cardiovascular disease can be characterised with functional assays or using immunofluorescence and flow cytometry. Combinations of markers, including CD34+KDR+ or CD133+KDR+, are used. This approach, however may not consider all characteristics of EPC. The lack of a standardised protocol with regards to reagents and gating strategies may account for the widespread inter-laboratory variations in quantification of EPC. We, therefore developed a novel protocol adapted from the standardised so-called ISHAGE protocol for enumeration of haematopoietic stem cells to enable comparison of clinical and laboratory data.In 25 control subjects, 65 patients with coronary artery disease (CAD; 40 stable CAD, 25 acute coronary syndrome/acute myocardial infarction (ACS, EPC were quantified using the following approach: Whole blood was incubated with CD45, KDR, and CD34. The ISHAGE sequential strategy was used, and finally, CD45(dimCD34(+ cells were quantified for KDR. A minimum of 100 CD34(+ events were collected. For comparison, CD45(+CD34(+ and CD45(-CD34(+ were analysed simultaneously. The number of CD45(dimCD34(+KDR(+ cells only were significantly higher in healthy controls compared to patients with CAD or ACS (p = 0.005 each, p<0.001 for trend. An inverse correlation of CD45(dimCD34(+KDR(+ with disease activity (r = -0.475, p<0.001 was confirmed. Only CD45(dimCD34(+KDR(+ correlated inversely with the number of diseased coronaries (r = -0.344; p<0.005. In a second study, a 4-week de-novo treatment of atorvastatin in stable CAD evoked an increase only of CD45(dimCD34(+KDR(+ EPC (p<0.05. CD45(+CD34(+KDR(+ and CD45(-CD34(+KDR(+ were indifferent between the three groups.Our newly established protocol adopted from the standardised ISHAGE protocol achieved higher accuracy in EPC enumeration confirming previous

  15. Universally composable protocols with relaxed set-up assumptions

    DEFF Research Database (Denmark)

    Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus

    2004-01-01

    A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally composable (UC) protocols provide this guarantee in a strong sense: A protocol remains secure even when composed concurrently with an unbounded number of ...

  16. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  17. TH-E-209-00: Radiation Dose Monitoring and Protocol Management

    International Nuclear Information System (INIS)

    2016-01-01

    Radiation dose monitoring solutions have opened up new opportunities for medical physicists to be more involved in modern clinical radiology practices. In particular, with the help of comprehensive radiation dose data, data-driven protocol management and informed case follow up are now feasible. Significant challenges remain however and the problems faced by medical physicists are highly heterogeneous. Imaging systems from multiple vendors and a wide range of vintages co-exist in the same department and employ data communication protocols that are not fully standardized or implemented making harmonization complex. Many different solutions for radiation dose monitoring have been implemented by imaging facilities over the past few years. Such systems are based on commercial software, home-grown IT solutions, manual PACS data dumping, etc., and diverse pathways can be used to bring the data to impact clinical practice. The speakers will share their experiences with creating or tailoring radiation dose monitoring/management systems and procedures over the past few years, which vary significantly in design and scope. Topics to cover: (1) fluoroscopic dose monitoring and high radiation event handling from a large academic hospital; (2) dose monitoring and protocol optimization in pediatric radiology; and (3) development of a home-grown IT solution and dose data analysis framework. Learning Objectives: Describe the scope and range of radiation dose monitoring and protocol management in a modern radiology practice Review examples of data available from a variety of systems and how it managed and conveyed. Reflect on the role of the physicist in radiation dose awareness.

  18. TH-E-209-00: Radiation Dose Monitoring and Protocol Management

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2016-06-15

    Radiation dose monitoring solutions have opened up new opportunities for medical physicists to be more involved in modern clinical radiology practices. In particular, with the help of comprehensive radiation dose data, data-driven protocol management and informed case follow up are now feasible. Significant challenges remain however and the problems faced by medical physicists are highly heterogeneous. Imaging systems from multiple vendors and a wide range of vintages co-exist in the same department and employ data communication protocols that are not fully standardized or implemented making harmonization complex. Many different solutions for radiation dose monitoring have been implemented by imaging facilities over the past few years. Such systems are based on commercial software, home-grown IT solutions, manual PACS data dumping, etc., and diverse pathways can be used to bring the data to impact clinical practice. The speakers will share their experiences with creating or tailoring radiation dose monitoring/management systems and procedures over the past few years, which vary significantly in design and scope. Topics to cover: (1) fluoroscopic dose monitoring and high radiation event handling from a large academic hospital; (2) dose monitoring and protocol optimization in pediatric radiology; and (3) development of a home-grown IT solution and dose data analysis framework. Learning Objectives: Describe the scope and range of radiation dose monitoring and protocol management in a modern radiology practice Review examples of data available from a variety of systems and how it managed and conveyed. Reflect on the role of the physicist in radiation dose awareness.

  19. Protocol optimization for in vitro shoot multiplication of Jackfruit ...

    African Journals Online (AJOL)

    Jemal

    2017-01-11

    Jan 11, 2017 ... Protocol optimization for in vitro shoot multiplication of ... shoot length and leaf number, whereby 2 mg/L BAP alone was found to be the best with a mean shoot .... Analysis of variance showed that the interaction between.

  20. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  1. Optimization of a sample processing protocol for recovery of Bacillus anthracis spores from soil

    Science.gov (United States)

    Silvestri, Erin E.; Feldhake, David; Griffin, Dale; Lisle, John T.; Nichols, Tonya L.; Shah, Sanjiv; Pemberton, A; Schaefer III, Frank W

    2016-01-01

    Following a release of Bacillus anthracis spores into the environment, there is a potential for lasting environmental contamination in soils. There is a need for detection protocols for B. anthracis in environmental matrices. However, identification of B. anthracis within a soil is a difficult task. Processing soil samples helps to remove debris, chemical components, and biological impurities that can interfere with microbiological detection. This study aimed to optimize a previously used indirect processing protocol, which included a series of washing and centrifugation steps. Optimization of the protocol included: identifying an ideal extraction diluent, variation in the number of wash steps, variation in the initial centrifugation speed, sonication and shaking mechanisms. The optimized protocol was demonstrated at two laboratories in order to evaluate the recovery of spores from loamy and sandy soils. The new protocol demonstrated an improved limit of detection for loamy and sandy soils over the non-optimized protocol with an approximate matrix limit of detection at 14 spores/g of soil. There were no significant differences overall between the two laboratories for either soil type, suggesting that the processing protocol will be robust enough to use at multiple laboratories while achieving comparable recoveries.

  2. Inter-comparison of NIOSH and IMPROVE protocols for OC and EC determination: implications for inter-protocol data conversion

    Science.gov (United States)

    Wu, Cheng; Huang, X. H. Hilda; Ng, Wai Man; Griffith, Stephen M.; Zhen Yu, Jian

    2016-09-01

    Organic carbon (OC) and elemental carbon (EC) are operationally defined by analytical methods. As a result, OC and EC measurements are protocol dependent, leading to uncertainties in their quantification. In this study, more than 1300 Hong Kong samples were analyzed using both National Institute for Occupational Safety and Health (NIOSH) thermal optical transmittance (TOT) and Interagency Monitoring of Protected Visual Environment (IMPROVE) thermal optical reflectance (TOR) protocols to explore the cause of EC disagreement between the two protocols. EC discrepancy mainly (83 %) arises from a difference in peak inert mode temperature, which determines the allocation of OC4NSH, while the rest (17 %) is attributed to a difference in the optical method (transmittance vs. reflectance) applied for the charring correction. Evidence shows that the magnitude of the EC discrepancy is positively correlated with the intensity of the biomass burning signal, whereby biomass burning increases the fraction of OC4NSH and widens the disagreement in the inter-protocol EC determination. It is also found that the EC discrepancy is positively correlated with the abundance of metal oxide in the samples. Two approaches (M1 and M2) that translate NIOSH TOT OC and EC data into IMPROVE TOR OC and EC data are proposed. M1 uses direct relationship between ECNSH_TOT and ECIMP_TOR for reconstruction: M1 : ECIMP_TOR = a × ECNSH_TOT + b; while M2 deconstructs ECIMP_TOR into several terms based on analysis principles and applies regression only on the unknown terms: M2 : ECIMP_TOR = AECNSH + OC4NSH - (a × PCNSH_TOR + b), where AECNSH, apparent EC by the NIOSH protocol, is the carbon that evolves in the He-O2 analysis stage, OC4NSH is the carbon that evolves at the fourth temperature step of the pure helium analysis stage of NIOSH, and PCNSH_TOR is the pyrolyzed carbon as determined by the NIOSH protocol. The implementation of M1 to all urban site data (without considering seasonal specificity

  3. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis.

    Science.gov (United States)

    Alanazi, Adwan; Elleithy, Khaled

    2015-09-02

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol.

  4. A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function.

    Science.gov (United States)

    Xu, He; Ding, Jie; Li, Peng; Zhu, Feng; Wang, Ruchuan

    2018-03-02

    With the fast development of the Internet of Things, Radio Frequency Identification (RFID) has been widely applied into many areas. Nevertheless, security problems of the RFID technology are also gradually exposed, when it provides life convenience. In particular, the appearance of a large number of fake and counterfeit goods has caused massive loss for both producers and customers, for which the clone tag is a serious security threat. If attackers acquire the complete information of a tag, they can then obtain the unique identifier of the tag by some technological means. In general, because there is no extra identifier of a tag, it is difficult to distinguish an original tag and its clone one. Once the legal tag data is obtained, attackers can be able to clone this tag. Therefore, this paper shows an efficient RFID mutual verification protocol. This protocol is based on the Physical Unclonable Function (PUF) and the lightweight cryptography to achieve efficient verification of a single tag. The protocol includes three process: tag recognition, mutual verification and update. The tag recognition is that the reader recognizes the tag; mutual verification is that the reader and tag mutually verify the authenticity of each other; update is supposed to maintain the latest secret key for the following verification. Analysis results show that this protocol has a good balance between performance and security.

  5. Reduction of cancer risk by optimization of Computed Tomography head protocols: far eastern Cuban experience

    International Nuclear Information System (INIS)

    Miller Clemente, R.; Adame Brooks, D.; Lores Guevara, M.; Perez Diaz, M.; Arias Garlobo, M. L.; Ortega Rodriguez, O.; Nepite Haber, R.; Grinnan Hernandez, O.; Guillama Llosas, A.

    2015-01-01

    The cancer risk estimation constitutes one way for the evaluation of the public health, regarding computed tomography (CT) exposures. Starting from the hypothesis that the optimization of CT protocols would reduce significantly the added cancer risk, the purpose of this research was the application of optimization strategies regarding head CT protocols, in order to reduce the factors affecting the risk of induced cancer. The applied systemic approach included technological and human components, represented by quantitative physical factors. the volumetric kerma indexes, compared with respect to standard, optimized and reference values, were evaluated with multiple means comparison method. The added cancer risk resulted from the application of the methodology for biological effects evaluation, at low doses with low Linear Energy Transfer. Human observers in all scenarios evaluated the image quality. the reduced dose was significantly lower than for standard head protocols and reference levels, where: (1) for pediatric patients, by using an Automatic Exposure Control system, a reduction of 31% compared with standard protocol and ages range of 10-14, and (2) adults, using a Bilateral Filter for images obtained at low doses of 62% from those of standard head protocol. The risk reduction was higher than 25%. The systemic approach used allows the effective identification of factors involved on cancer risk related with exposures to CT. The combination of dose modulation and image restoration with Bilateral Filter, provide a significantly reduction of cancer risk, with acceptable diagnostic image quality. (Author)

  6. Bio-Inspired Energy-Aware Protocol Design for Cooperative Wireless Networks

    DEFF Research Database (Denmark)

    Perrucci, Gian Paolo; Anggraeni, Puri Novelti; Wardana, Satya Ardhy

    2011-01-01

    In this work, bio-inspired cooperation rules are applied to wireless communication networks. The main goal is to derive cooperative behaviour rules to improve the energy consumption of each mobile device. A medium access control (MAC) protocol particularly designed for peer-to-peer communication...... be achieved by this architecture using game theoretic approaches. As an extension, this work explores the impact of the MAC protocol on the power saving capabilities. This result shows that standard MAC mechanisms are not optimised for the considered cooperative setup. A new MAC protocol is proposed...... among cooperative wireless mobile devices is described. The work is based on a novel communication architecture, where a group of mobile devices are connected both to a cellular base station and among them using short-range communication links. A prior work has investigated the energy saving that can...

  7. Insecurity of position-based quantum-cryptography protocols against entanglement attacks

    International Nuclear Information System (INIS)

    Lau, Hoi-Kwan; Lo, Hoi-Kwong

    2011-01-01

    Recently, position-based quantum cryptography has been claimed to be unconditionally secure. On the contrary, here we show that the existing proposals for position-based quantum cryptography are, in fact, insecure if entanglement is shared among two adversaries. Specifically, we demonstrate how the adversaries can incorporate ideas of quantum teleportation and quantum secret sharing to compromise the security with certainty. The common flaw to all current protocols is that the Pauli operators always map a codeword to a codeword (up to an irrelevant overall phase). We propose a modified scheme lacking this property in which the same cheating strategy used to undermine the previous protocols can succeed with a rate of at most 85%. We prove the modified protocol is secure when the shared quantum resource between the adversaries is a two- or three-level system.

  8. A comparison of sennosides-based bowel protocols with and without docusate in hospitalized patients with cancer.

    Science.gov (United States)

    Hawley, Philippa Helen; Byeon, Jai Jun

    2008-05-01

    Constipation is a common and distressing condition in patients with cancer, especially those taking opioid analgesics. Many institutions prevent and treat constipation with titrated laxatives, which is known as a bowel protocol. An effective and well-tolerated bowel protocol is a very important component of cancer care, and there is little evidence on which to base selection of the most appropriate agents. This study compares a protocol of the stimulant laxative sennosides alone with a protocol of sennosides plus the stool softener docusate, in hospitalized patients at an oncology center. The docusate-containing protocol had an initial docusate-only step for patients not taking opioids, and four to six 100-mg capsules of docusate sodium in addition to the sennosides for the rest of the protocol. Thirty patients received the sennosides-only (S) protocol and 30 the sennosides plus docusate (DS) protocol. The efficacy and adverse effects of the protocols were monitored for 5-12 days. The two protocols were used sequentially, creating two cohorts, one on each protocol. Eighty percent of patients were taking oral opioids and 72% were admitted for symptom control/supportive care. Over a total of 488 days of observation it was found that the S protocol produced more bowel movements than the DS protocol, and in the symptom control/supportive care patients this difference was statistically significant (p sennosides did not reduce bowel cramps, and was less effective in inducing laxation than the sennosides-only protocol. Further research into the appropriate use of docusate and into the details of bowel protocol design are required.

  9. Resource use and costs of type 2 diabetes patients receiving managed or protocolized primary care: a controlled clinical trial.

    Science.gov (United States)

    van der Heijden, Amber A W A; de Bruijne, Martine C; Feenstra, Talitha L; Dekker, Jacqueline M; Baan, Caroline A; Bosmans, Judith E; Bot, Sandra D M; Donker, Gé A; Nijpels, Giel

    2014-06-25

    The increasing prevalence of diabetes is associated with increased health care use and costs. Innovations to improve the quality of care, manage the increasing demand for health care and control the growth of health care costs are needed. The aim of this study is to evaluate the care process and costs of managed, protocolized and usual care for type 2 diabetes patients from a societal perspective. In two distinct regions of the Netherlands, both managed and protocolized diabetes care were implemented. Managed care was characterized by centralized organization, coordination, responsibility and centralized annual assessment. Protocolized care had a partly centralized organizational structure. Usual care was characterized by a decentralized organizational structure. Using a quasi-experimental control group pretest-posttest design, the care process (guideline adherence) and costs were compared between managed (n = 253), protocolized (n = 197), and usual care (n = 333). We made a distinction between direct health care costs, direct non-health care costs and indirect costs. Multivariate regression models were used to estimate differences in costs adjusted for confounding factors. Because of the skewed distribution of the costs, bootstrapping methods (5000 replications) with a bias-corrected and accelerated approach were used to estimate 95% confidence intervals (CI) around the differences in costs. Compared to usual and protocolized care, in managed care more patients were treated according to diabetes guidelines. Secondary health care use was higher in patients under usual care compared to managed and protocolized care. Compared to usual care, direct costs were significantly lower in managed care (€-1.181 (95% CI: -2.597 to -334)) while indirect costs were higher (€ 758 (95% CI: -353 to 2.701), although not significant. Direct, indirect and total costs were lower in protocolized care compared to usual care (though not significantly). Compared to usual care, managed

  10. Implementation of enteral feeding protocol in an intensive care unit

    DEFF Research Database (Denmark)

    Padar, Martin; Uusvel, Gerli; Starkopf, Liis

    2017-01-01

    AIM: To determine the effects of implementing an enteral feeding protocol on the nutritional delivery and outcomes of intensive care patients. METHODS: An uncontrolled, observational before-and-after study was performed in a tertiary mixed medical-surgical intensive care unit (ICU). In 2013......, a nurse-driven enteral feeding protocol was developed and implemented in the ICU. Nutrition and outcome-related data from patients who were treated in the study unit from 2011-2012 (the Before group) and 2014-2015 (the After group) were obtained from a local electronic database, the national Population...... the groups. Patients in the After group had a lower 90-d (P = 0.026) and 120-d (P = 0.033) mortality. In the After group, enteral nutrition was prescribed less frequently (P = 0.039) on day 1 but significantly more frequently on all days from day 3. Implementation of the feeding protocol resulted in a higher...

  11. Hydrofluorocarbon (HFC) Scenarios, Climate Effects and the Montreal Protocol

    Science.gov (United States)

    Velders, G. J. M.; Fahey, D. W.; Daniel, J. S.

    2016-12-01

    The Montreal Protocol has reduced the use of ozone-depleting substances by more than 95% from its peak levels in the 1980s. As a direct result the use of hydrofluorocarbons (HFCs) as substitute compounds has increased significantly. National regulations to limit HFC use have been adopted recently in the European Union, Japan and USA, and four proposals have been submitted to amend the Montreal Protocol to substantially reduce growth in HFC use. The Parties of the Montreal Protocol have discussed these proposals during their meetings in 2016. The effects of the national regulations and Montreal Protocol amendment proposals on climate forcings and surface temperatures will be presented. Global scenarios of HFC emissions reach 4.0-5.3 GtCO2-eq yr-1 in 2050, which corresponds to a projected growth from 2015 to 2050 which is 9% to 29% of that for CO2 over the same time period. In 2050, in percent of global HFC emissions, China ( 30%), India and the rest of Asia ( 25%), Middle East and northern Africa ( 10%), and USA ( 10%) are the principal source regions; and refrigeration and stationary air conditioning are the major use sectors. Calculated baseline emissions are reduced by 90% in 2050 by implementing the North America Montreal Protocol amendment proposal. This corresponds to a reduction in surface temperature attributed to HFCs from 0.1 oC to 0.04 oC in 2050 and from 0.3-0.4 oC to 0.02 oC in 2100.

  12. Dosimetric evaluation of cone beam computed tomography scanning protocols

    International Nuclear Information System (INIS)

    Soares, Maria Rosangela

    2015-01-01

    It was evaluated the cone beam computed tomography, CBCT scanning protocols, that was introduced in dental radiology at the end of the 1990's, and quickly became a fundamental examination for various procedures. Its main characteristic, the difference of medical CT is the beam shape. This study aimed to calculate the absorbed dose in eight tissues / organs of the head and neck, and to estimate the effective dose in 13 protocols and two techniques (stitched FOV e single FOV) of 5 equipment of different manufacturers of cone beam CT. For that purpose, a female anthropomorphic phantom was used, representing a default woman, in which were inserted thermoluminescent dosimeters at several points, representing organs / tissues with weighting values presented in the standard ICRP 103. The results were evaluated by comparing the dose according to the purpose of the tomographic image. Among the results, there is a difference up to 325% in the effective dose in relation to protocols with the same image goal. In relation to the image acquisition technique, the stitched FOV technique resulted in an effective dose of 5.3 times greater than the single FOV technique for protocols with the same image goal. In the individual contribution, the salivary glands are responsible for 31% of the effective dose in CT exams. The remaining tissues have also a significant contribution, 36%. The results drew attention to the need of estimating the effective dose in different equipment and protocols of the market, besides the knowledge of the radiation parameters and equipment manufacturing engineering to obtain the image. (author)

  13. Comparison of subareolar injection lymphoscintigraphy with the 1-day and the 2-day protocols for the detection of sentinel lymph nodes in patients with breast cancer

    International Nuclear Information System (INIS)

    Seok, Ju-Won; Kim, In-Ju; Heo, Young-Jun; Yang, You-Jung; Choi, Yoo-Shin; Kim, Beom-Gyu; Park, Seoug-Jun

    2009-01-01

    Lymphoscintigraphy and sentinel node biopsy are used for the detection of axillary lymph node metastasis in breast cancer patients. However, currently there is no standardized technique. For the detection of axillary lymph node metastasis by lymphoscintigraphy and sentinel node biopsy, in patients with breast cancer, we compared the results of subareolar injections administered on the day of surgery (1-day protocol) with injections administered on the day before surgery (2-day protocol). This study included 412 breast cancer patients who underwent surgery between 2001 and 2004. For the 1-day protocol (1 h before surgery) 0.8 ml of Tc-99m Tin-Colloid (37 MBq) was injected in 203 in the subareolar region on the morning of the surgery. For the 2-day protocol (16 h before surgery) 0.8 ml of Tc-99m Tin-Colloid (185 MBq) was injected in 209 patients on the afternoon before surgery. Lymphoscintigraphy was performed in the supine position and sentinel node identification was performed by hand-held gamma probe during surgery. Among 203 patients with the 1-day protocol, 185 cases (91.1%) were identified by sentinel node lymphoscintigraphy, and 182 cases (89.7%) were identified by gamma probe. Among the 209 patients, in the 2-day protocol, 189 cases (90.4%) had the sentinel node identified by lymphoscintigraphy, and 182 cases (87.1%) by the gamma probe. There was no significant difference in the identification rate of the sentinel node between the 1-day and 2-day protocols by lymphoscintigraphy and the gamma probe (p>0.05, p>0.05). The results of the identification of the sentinel node by subareolar injection according to 1-day or 2-day protocol, in breast cancer patients, showed no significant differences. Because the 2-day protocol allows for an adequate amount of time to perform the lymphoscintigraphy, it is a more useful protocol for the identification of sentinel nodes in patients with breast cancer. (author)

  14. Comparison of 2 comprehensive Class II treatment protocols including the bonded Herbst and headgear appliances: a double-blind study of consecutively treated patients at puberty.

    Science.gov (United States)

    Baccetti, Tiziano; Franchi, Lorenzo; Stahl, Franka

    2009-06-01

    The aim of this clinical trial was to compare the effects of 2 protocols for single-phase comprehensive treatment of Class II Division 1 malocclusion (bonded Herbst followed by fixed appliances [BH + FA] vs headgear followed by fixed appliances and Class II elastics [HG + FA]) at the pubertal growth spurt. Fifty-six Class II patients were enrolled in the trial and allocated by personal choice to 2 practices, where they underwent 1 of 2 treatment protocols (28 patients were treated consecutively with BH + FA, and 28 patients were treated consecutively with HG + FA). All patients started treatment at puberty (cervical stage [CS] 3 or CS 4) and completed treatment after puberty (CS 5 or CS 6). Lateral cephalograms were taken before therapy and 6 months after the end of comprehensive therapy, with an average interval of 28 months. Longitudinal observations of a matched group of 28 subjects with untreated Class II malocclusions were compared with the 2 treated groups. Analysis of variance (ANOVA) with post-hoc tests was used for statistical comparisons. Discriminant analysis was applied to identify preferential candidates for the BH + FA protocol on the basis of profile changes (advancement of the soft tissues of the chin). The success rate (full occlusal correction of the malocclusion after treatment) was 92.8% in both treatment groups. The BH + FA group showed a significant increase in mandibular protrusion. The increase in effective mandibular length (Co-Gn) was significantly greater in both treatment groups when compared with natural growth changes in the Class II controls. Significantly greater improvement in sagittal maxillomandibular relationships was found in the BH + FA group. Retrusion of maxillary incisors and mesial movement of mandibular molars were significant in the HG + FA group. The BH + FA group showed significantly greater forward movements of soft-tissue B-point and pogonion compared with both the HG + FA and the control groups. Two pretreatment

  15. The impact of a chest tube management protocol on the outcome of trauma patients with tube thoracostomy.

    Science.gov (United States)

    de Abreu, Emanuelle Maria Sávio; Machado, Carla Jorge; Pastore Neto, Mario; de Rezende Neto, João Baptista; Sanches, Marcelo Dias

    2015-01-01

    to investigate the effect of standardized interventions in the management of tube thoracostomy patients and to assess the independent effect of each intervention. A chest tube management protocol was assessed in a retrospective cohort study. The tube thoracostomy protocol (TTP) was implemented in August 2012, and consisted of: antimicrobial prophylaxis, chest tube insertion in the operating room (OR), admission post chest tube thoracostomy (CTT) in a hospital floor separate from the emergency department (ED), and daily respiratory therapy (RT) sessions post-CTT. The inclusion criteria were, hemodynamic stability, patients between the ages of 15 and 59 years, and injury severity score (ISS) chest wall, lung, and pleura. During the study period 92 patients were managed according to the standardized protocol. The outcomes of those patients were compared to 99 patients treated before the TTP. Multivariate logistic regression analysis was performed to assess the independent effect of each variable of the protocol on selected outcomes. Demographics, injury severity, and trauma mechanisms were similar among the groups. As expected, protocol compliance increased after the implementation of the TTP. There was a significant reduction (pchest tube days. Respiratory therapy was independently linked to significant reduction (pchest tube insertion was associated with significant (ptrauma patients.

  16. An Efficient Causal Group Communication Protocol for Free Scale Peer-to-Peer Networks

    Directory of Open Access Journals (Sweden)

    Grigory Evropeytsev

    2016-08-01

    Full Text Available In peer-to-peer (P2P overlay networks, a group of n (≥2 peer processes have to cooperate with each other. Each peer sends messages to every peer and receives messages from every peer in a group. In group communications, each message sent by a peer is required to be causally delivered to every peer. Most of the protocols designed to ensure causal message order are designed for networks with a plain architecture. These protocols can be adapted to use in free scale and hierarchical topologies; however, the amount of control information is O(n, where n is the number of peers in the system. Some protocols are designed for a free scale or hierarchical networks, but in general they force the whole system to accomplish the same order viewed by a super peer. In this paper, we present a protocol that is specifically designed to work with a free scale peer-to-peer network. By using the information about the network’s architecture and by representing message dependencies on a bit level, the proposed protocol ensures causal message ordering without enforcing super peers order. The designed protocol is simulated and compared with the Immediate Dependency Relation and the Dependency Sequences protocols to show its lower overhead.

  17. e-SCP-ECG+ Protocol: An Expansion on SCP-ECG Protocol for Health Telemonitoring—Pilot Implementation

    Directory of Open Access Journals (Sweden)

    George J. Mandellos

    2010-01-01

    Full Text Available Standard Communication Protocol for Computer-assisted Electrocardiography (SCP-ECG provides standardized communication among different ECG devices and medical information systems. This paper extends the use of this protocol in order to be included in health monitoring systems. It introduces new sections into SCP-ECG structure for transferring data for positioning, allergies, and five additional biosignals: noninvasive blood pressure (NiBP, body temperature (Temp, Carbon dioxide (CO2, blood oxygen saturation (SPO2, and pulse rate. It also introduces new tags in existing sections for transferring comprehensive demographic data. The proposed enhanced version is referred to as e-SCP-ECG+ protocol. This paper also considers the pilot implementation of the new protocol as a software component in a Health Telemonitoring System.

  18. Safety of a DVT chemoprophylaxis protocol following traumatic brain injury: a single center quality improvement initiative.

    Science.gov (United States)

    Nickele, Christopher M; Kamps, Timothy K; Medow, Joshua E

    2013-04-01

    significant deep venous thrombosis (DVT) was 6.9 % (6 of 87). Three protocol patients (3.45 %) went to the operating room for surgery after the initiation of PTP; none of these patients had a measurable change in hemorrhage size on head CT. The change in percentage of patients receiving PTP was significantly increased by the protocol (p average days to first PTP dose trended down with institution of the protocol, this change was not statistically significant. A PTP protocol in the NSICU is useful in controlling the number of complications from DVT and pulmonary embolism while avoiding additional IH. This protocol, based on a published body of literature, allowed for VTE rates similar to published rates, while having no PTP-related hemorrhage expansion. The protocol significantly changed physician behavior, increasing the percentage of patients receiving PTP during their hospitalization; whether long-term patient outcomes are affected is a potential goal for future study.

  19. [Clinical outcomes and economic analysis of two ovulation induction protocols in patients undergoing repeated IVF/ICSI cycles].

    Science.gov (United States)

    Chen, Xiao; Geng, Ling; Li, Hong

    2014-04-01

    To compare the clinical outcomes and cost-effectiveness of luteal phase down-regulation with gonadotrophin-releasing hormone (GnRH) agonist protocol and GnRH antagonist protocol in patients undergoing repeated in vitro fertilization and intracytoplasmic sperm injection (IVF-ICSI) cycles. A retrospective analysis of clinical outcomes and costs was conducted among 198 patients undergoing repeated IVF-ICSI cycles, including 109 receiving luteal phase down-regulation with GnRH agonist protocol (group A) and 89 receiving GnRH antagonist protocol (group B). The numbers of oocytes retrieved and good embryos, clinical pregnancy rate, abortion rate, the live birth rate, mean total cost, and the cost-effective ratio were compared between the two groups. In patients undergoing repeated IVF-ICSI cycles, the two protocols produced no significant differences in the number of good embryos, clinical pregnancy rate, abortion rate, or twin pregnancy rate. Compared with group B, group A had better clinical outcomes though this difference was not statistically significant. The number of retrieved oocytes was significantly greater and live birth rate significantly higher in group A than in group B (9.13=4.98 vs 7.11=4.74, and 20.2% vs 9.0%, respectively). Compared with group B, group A had higher mean total cost per cycle but lower costs for each oocyte retrieved (2729.11 vs 3038.60 RMB yuan), each good embryo (8867.19 vs 9644.85 RMB yuan), each clinical pregnancy (77598.06 vs 96139.85 RMB yuan). For patients undergoing repeated IVF/ICSI cycle, luteal phase down-regulation with GnRH agonist protocol produces good clinical outcomes with also good cost-effectiveness in spite an unsatisfactory ovarian reserve.

  20. Optimal Scanning Protocols for Dual-Energy CT Angiography in Peripheral Arterial Stents: An in Vitro Phantom Study

    Directory of Open Access Journals (Sweden)

    Abdulrahman Almutairi

    2015-05-01

    Full Text Available Objective: To identify the optimal dual-energy computed tomography (DECT scanning protocol for peripheral arterial stents while achieving a low radiation dose, while still maintaining diagnostic image quality, as determined by an in vitro phantom study. Methods: Dual-energy scans in monochromatic spectral imaging mode were performed on a peripheral arterial phantom with use of three gemstone spectral imaging (GSI protocols, three pitch values, and four kiloelectron volts (keV ranges. A total of 15 stents of different sizes, materials, and designs were deployed in the phantom. Image noise, the signal-to-noise ratio (SNR, different levels of adaptive statistical iterative reconstruction (ASIR, and the four levels of monochromatic energy for DECT imaging of peripheral arterial stents were measured and compared to determine the optimal protocols. Results: A total of 36 scans with 180 datasets were reconstructed from a combination of different protocols. There was a significant reduction of image noise with a higher SNR from monochromatic energy images between 65 and 70 keV in all investigated preset GSI protocols (p < 0.05. In addition, significant effects were found from the main effect analysis for these factors: GSI, pitch, and keV (p = 0.001. In contrast, there was significant interaction on the unstented area between GSI and ASIR (p = 0.015 and a very high significant difference between keV and ASIR (p < 0.001. A radiation dose reduction of 50% was achieved. Conclusions: The optimal scanning protocol and energy level in the phantom study were GSI-48, pitch value 0.984, and 65 keV, which resulted in lower image noise and a lower radiation dose, but with acceptable diagnostic images.

  1. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  2. Adaptive Beaconing in Mobility Aware Clustering Based MAC Protocol for Safety Message Dissemination in VANET

    Directory of Open Access Journals (Sweden)

    Nishu Gupta

    2017-01-01

    Full Text Available Majority of research contributions in wireless access in vehicular environment (WAVE/IEEE 802.11p standard focus on life critical safety-related applications. These applications require regular status update of vehicle’s position referred to as beaconing. Periodic beaconing in vehicle to vehicle communication leads to severe network congestion in the communication channel. The condition worsens under high vehicular density where it impacts reliability and upper bound latency of safety messages. In this paper, WAVE compliant enhancement to the existing IEEE 802.11p protocol is presented which targets prioritized delivery of safety messages while simultaneously provisioning the dissemination of nonsafety messages. Proposed scheme relies on dynamic generation of beacons to mitigate channel congestion and inefficient bandwidth utilization by reducing transmission frequency of beacons. Through the use of clustering mechanism, different beaconing frequencies and different data transmission rates are assigned to prioritize vehicular mobility. Through extensive simulation results, the performance of the proposed approach is evaluated in terms of a wide range of quality of service (QoS parameters for two different transmission ranges. Results show that the proposed protocol provides significant enhancement and stability of the clustered topology in vehicular ad hoc network over existing standard and other protocols with similar applications.

  3. Implementation of a Hydrotherapy Protocol to Improve Postpartum Pain Management.

    Science.gov (United States)

    Batten, Meghann; Stevenson, Eleanor; Zimmermann, Deb; Isaacs, Christine

    2017-03-01

    A growing number of women are seeking alternatives to traditional pharmacologic pain management during birth. While there has been an extensive array of nonpharmacologic options developed for labor, there are limited offerings in the postpartum period. The purpose of this quality improvement project was to implement a hydrotherapy protocol in the early postpartum period to improve pain management for women choosing a nonmedicated birth. The postpartum hydrotherapy protocol was initiated in a certified nurse-midwife (CNM) practice in an urban academic medical center. All women who met criteria were offered a 30-minute warm water immersion bath at one hour postpartum. Pain scores were assessed prior to the bath, at 15 minutes after onset, and again at the conclusion (30 minutes). Women who completed the bath were also asked to complete a brief survey on their experience with postpartum hydrotherapy. In women who used the bath (N = 45), there was a significant reduction in pain scores (P hydrotherapy protocol as an alternative or adjunct to medication for early postpartum pain management that significantly reduced pain and improved the birth experience for those who used it. It offers a nonpharmacologic alternative where there have traditionally been limited options. © 2017 by the American College of Nurse-Midwives.

  4. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  5. Improving the efficiency of single and multiple teleportation protocols based on the direct use of partially entangled states

    Energy Technology Data Exchange (ETDEWEB)

    Fortes, Raphael; Rigolin, Gustavo, E-mail: rigolin@ifi.unicamp.br

    2013-09-15

    We push the limits of the direct use of partially pure entangled states to perform quantum teleportation by presenting several protocols in many different scenarios that achieve the optimal efficiency possible. We review and put in a single formalism the three major strategies known to date that allow one to use partially entangled states for direct quantum teleportation (no distillation strategies permitted) and compare their efficiencies in real world implementations. We show how one can improve the efficiency of many direct teleportation protocols by combining these techniques. We then develop new teleportation protocols employing multipartite partially entangled states. The three techniques are also used here in order to achieve the highest efficiency possible. Finally, we prove the upper bound for the optimal success rate for protocols based on partially entangled Bell states and show that some of the protocols here developed achieve such a bound. -- Highlights: •Optimal direct teleportation protocols using directly partially entangled states. •We put in a single formalism all strategies of direct teleportation. •We extend these techniques for multipartite partially entangle states. •We give upper bounds for the optimal efficiency of these protocols.

  6. Reduction in Wound Complications After Total Ankle Arthroplasty Using a Compression Wrap Protocol.

    Science.gov (United States)

    Schipper, Oliver N; Hsu, Andrew R; Haddad, Steven L

    2015-12-01

    The purpose of this study was to evaluate the clinical differences in wound complications after total ankle arthroplasty (TAA) between a cohort of patients that received a compression wrap protocol and a historical control group treated with cast immobilization. Patient charts and postoperative wound pictures were reviewed for 42 patients who underwent a compression wrap protocol and 50 patients who underwent circumferential casting after primary TAA from 2008 to 2013. A blinded reviewer graded each wound using a novel postoperative wound classification system, and recorded whether the wound was completely healed by or after 3 months. A second blinded review was performed to determine intraobserver reliability. Mean patient age was 55 years (range, 24-80) and all patients had at least 6-month follow-up. There were significantly more total wound complications (P = .02) and mild wound complications (P = .02) in the casted group compared to the compression wrap group. There were no significant differences in the number of moderate and severe complications between each group. A significantly higher proportion of TAA incisions took longer than 3 months to heal in the casted group (P = .02). Based on our clinical experience with postoperative wound care after TAA, use of a compression wrap protocol was safe and effective at reducing wound-related complications, and well tolerated by patients. Further prospective, randomized clinical trials are warranted to evaluate the utility and cost-effectiveness of a compression wrap protocol after TAA. © The Author(s) 2015.

  7. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees.

    Science.gov (United States)

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-04-01

    A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  8. A network architecture for precision formation flying using the IEEE 802.11 MAC Protocol

    Science.gov (United States)

    Clare, Loren P.; Gao, Jay L.; Jennings, Esther H.; Okino, Clayton

    2005-01-01

    Precision Formation Flying missions involve the tracking and maintenance of spacecraft in a desired geometric formation. The strong coupling of spacecraft in formation flying control requires inter-spacecraft communication to exchange information. In this paper, we present a network architecture that supports PFF control, from the initial random deployment phase to the final formation. We show that a suitable MAC layer for the application protocol is IEEE's 802.11 MAC protocol. IEEE 802.11 MAC has two modes of operations: DCF and PCF. We show that DCF is suitable for the initial deployment phase while switching to PCF when the spacecraft are in formation improves jitter and throughput. We also consider the effect of routing on protocol performance and suggest when it is profitable to turn off route discovery to achieve better network performance.

  9. Large family of quantum weak coin-flipping protocols

    International Nuclear Information System (INIS)

    Mochon, Carlos

    2005-01-01

    Each classical public-coin protocol for coin flipping is naturally associated with a quantum protocol for weak coin flipping. The quantum protocol is obtained by replacing classical randomness with quantum entanglement and by adding a cheat detection test in the last round that verifies the integrity of this entanglement. The set of such protocols defines a family which contains the protocol with bias 0.192 previously found by the author, as well as protocols with bias as low as 1/6 described herein. The family is analyzed by identifying a set of optimal protocols for every number of messages. In the end, tight lower bounds for the bias are obtained which prove that 1/6 is optimal for all protocols within the family

  10. The Kyoto Protocol. An economic appraisal

    International Nuclear Information System (INIS)

    Grubb, M.

    2000-05-01

    This paper examines the overall economics of the Kyoto Protocol on climate change, in three main parts. The first part explores the structure of the Protocol and how this matches against classical economic criteria of an 'optimal' climate change agreement. This discussion also considers the nature of and reasons for shortcomings, and the prospects for its evolution. Given the various flexibilities in the agreement, the Kyoto Protocol is far more economically efficient in its structure than any previous global environmental agreement. The central conclusion is that, from an economic perspective, the Protocol's structure for industrialised country commitments is as good as could reasonably be expected. The second part of the paper explores more closely the economics of the commitments themselves and how they combine with the various flexibilities, briefly reviewing the available literature and using a simple spreadsheet model of how the commitments might combine with trading mechanisms under a range of assumptions. Flexibility is intrinsic and necessary, but it is argued that the allocations to Russia and Ukraine in particular mean that unlimited flexibility could render the Protocol's commitments weaker in their impacts than is economically desirable to address climate change. It is argued that, should this prove to be the case, access to the large surplus in the transition economies could be used as a control valve to limit the costs of the Protocol to within acceptable limits. Finally, the paper considers the issues of developing country involvement in the Kyoto Protocol, and the Protocol's longer-term impact and evolution, including its impact on technological evolution and dissemination and the evolution of future commitments. It is argued that taking account of such issues critically affects views of the Protocol

  11. A Secure Protocol Based on a Sedentary Agent for Mobile Agent Environments

    OpenAIRE

    Abdelmorhit E. Rhazi; Samuel Pierre; Hanifa Boucheneb

    2007-01-01

    The main challenge when deploying mobile agent environments pertains to security issues concerning mobile agents and their executive platform. This paper proposes a secure protocol which protects mobile agents against attacks from malicious hosts in these environments. Protection is based on the perfect cooperation of a sedentary agent running inside a trusted third host. Results show that the protocol detects several attacks, such as denial of service, incorrect execution and re-execution of...

  12. Different histopathological subtypes of Hodgkin lymphoma show significantly different levels of FDG uptake

    DEFF Research Database (Denmark)

    Hutchings, Martin; Loft, Annika; Hansen, Mads

    2006-01-01

    ) patients, 20.8 g/ml in 11 mixed cellularity (MC) patients, and 19.5 g/ml in four patients with unclassified classical HL (CHL-NOS), (ANOVA, p = 0.011). Out of 780 sites (600 lymph node regions plus 180 organs), 208 sites were found to be affected with HL. Mean SUV(max) was 8.3 g/ml in the 12 sites with NLP......, 11.2 g/ml in the 147 sites affected with NS, 14.6 g/ml in the 36 sites with MC, and 13.1 g/ml in the 13 sites with CHL-NOS (ANOVA, p = 0.002). There is a significant difference in FDG/glucose uptake between the different histopathological subtypes of HL....

  13. A modified protocol for myocardial perfusion SPECT using natural plant extracts for enbancement of biliorg excretion

    International Nuclear Information System (INIS)

    Jeong, Hwan Jeong; Kim, Chang Guhn

    2003-01-01

    For good quality of myocardial perfusion images, an approximately 30 min to 1 hour of waiting time after radiopharmaceutical injection of fatty meal are asked of the patients. The aim of this study was to investigate the shortening of waiting time after radiopharmaceutical injection and improvement of image quality using natural plant extracts that promote bile excretion. Ten volunteers participated in protocol 1 (7 men, 3 women; mean age, 24.1±2.4 years) and protocol 2 (8 men, 2 women; mean age, 26.1±2.9 years), respectively. For the modified method of both protocols, subjects took natural plant extracts 15 minutes before the first injection of 99m Tc MIBI without taking fatty meals. Control (Conventional) methods were performed with intake of a fatty meal 20 to 30 minutes after 99m Tc MIBI injection. As the results of protocol 1 and 2, the ratio of myocardial to lung ratio were not different between modified and conventional method. Liver to lung ratio of modified method showed significantly lower value than that of conventional method. In modified method, myocardial to liver ratio was higher persistently. In protocol 2, natural plant extracts took before the first injection of 99m Tc MIBI exerted accelerating effect of excretion of bile juice into intestine until the end of examination. These results represent that natural plant extracts for facilitation of bile excretion before injection of 99m Tc MIBI may provide better quality of myocardial perfusion images without the need for preparations such as ingestion of fatty meal within the 2 hours compared with conventional method

  14. Hyperbaric oxygen therapy for wound healing in diabetic rats: Varying efficacy after a clinically-based protocol.

    Directory of Open Access Journals (Sweden)

    Johan W van Neck

    Full Text Available Hyperbaric oxygen therapy (HBOT is a clinical treatment in which a patient breathes pure oxygen for a limited period of time at an increased pressure. Although this therapy has been used for decades to assist wound healing, its efficacy for many conditions is unproven and its mechanism of action is not yet fully clarified. This study investigated the effects of HBOT on wound healing using a diabetes-impaired pressure ulcer rat model. Seven weeks after streptozotocin-induced diabetes in rats (n = 55, a pressure ulcer was created on dorsal skin. Subsequently, animals received HBOT during 6 weeks following a standard clinical protocol (HBOT group with varying endpoints up to 42 days post-wounding versus controls without HBOT. Capillary venous oxygen saturation (SO2 showed a significant increase in the HBOT group on day 24; however, this increase was significant at this time point only. The quantity of hemoglobin in the micro-blood vessels (rHB showed a significant decrease in the HBOT group on days 21 and 42, and showed a trend to decrease on day 31. Blood flow in the microcirculation showed a significant increase on days 17, 21 and 31 but a significant decrease on days 24 and 28. Inflammation scoring showed significantly decreased CD68 counts in the HBOT group on day 42, but not in the early stages of wound healing. Animals in the HBOT group showed a trend for an increase in mean wound breaking strength on day 42.

  15. A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Julien Haillot

    2010-01-01

    Full Text Available In content-based communication, information flows towards interested hosts rather than towards specifically set destinations. This new style of communication perfectly fits the needs of applications dedicated to information sharing, news distribution, service advertisement and discovery, etc. In this paper we address the problem of supporting content-based communication in partially or intermittently connected mobile ad hoc networks (MANETs. The protocol we designed leverages on the concepts of opportunistic networking and delay-tolerant networking in order to account for the absence of end-to-end connectivity in disconnected MANETs. The paper provides an overview of the protocol, as well as simulation results that show how this protocol can perform in realistic conditions.

  16. Cost savings using a protocol approach to manage anemia in a hemodialysis unit.

    Science.gov (United States)

    Charlesworth, Emily C; Richardson, Robert M; Battistella, Marisa

    2014-01-01

    National guidelines recommend using anemia management protocols to guide treatment. The objective of this study was to determine if an anemia management protocol would improve hemoglobin (Hgb) indices in hemodialysis patients and to measure whether the protocol would reduce the use and cost of darbepoetin alfa (DBO) and intravenous (IV) iron in hemodialysis patients. An anemia management protocol was created and implemented for hemodialysis patients at our institution. A retrospective observational review of the use of DBO and IV iron as well as changes in Hgb, transferrin saturation and ferritin in 174 patients was conducted 6 months before and after implementation of the anemia protocol. The number of Hgb measurements in the target range increased from 44.3 to 46.0% (p = 0.48) after protocol implementation. The mean weekly dose of DBO was reduced from 34.56 ± 31.12 to 31.11 ± 28.64 μg post-protocol implementation (p = 0.011), which translated to a cost savings of USD 41,649 over 6 months. The mean monthly IV iron dose also decreased from 139.56 ± 98.83 to 97.65 ± 79.05 mg (p DBO and iron agents while increasing the number of patients in the target Hgb range, which led to significant cost savings in the treatment of anemia.

  17. Acute effects of various weighted bat warm-up protocols on bat velocity.

    Science.gov (United States)

    Reyes, G Francis; Dolny, Dennis

    2009-10-01

    Although research has provided evidence of increased muscular performance following a facilitation set of resistance exercise, this has not been established for use prior to measuring baseball bat velocity. The purpose of this study was to determine the effectiveness of selected weighted bat warm-up protocols to enhance bat velocity in collegiate baseball players. Nineteen collegiate baseball players (age = 20.15 +/- 1.46 years) were tested for upper-body strength by a 3-repetition maximum (RM) bench press (mean = 97.98 +/- 14.54 kg) and mean bat velocity. Nine weighted bat warm-up protocols, utilizing 3 weighted bats (light = 794 g; standard = 850 g; heavy = 1,531 g) were swung in 3 sets of 6 repetitions in different orders. A control trial involved the warm-up protocol utilizing only the standard bat. Pearson product correlation revealed a significant relationship between 3RM strength and pretest bat velocity (r = 0.51, p = 0.01). Repeated measures analysis of variance (ANOVA) revealed no significant treatment effects of warm-up protocol on bat velocity. However, the order of standard, light, heavy bat sequence resulted in the greatest increase in bat velocity (+6.03%). These results suggest that upper-body muscle strength influences bat velocity. It appears that the standard, light, heavy warm-up order may provide the greatest benefit to increase subsequent bat velocity and may warrant use in game situations.

  18. An approach to standardization of urine sediment analysis via suggestion of a common manual protocol.

    Science.gov (United States)

    Ko, Dae-Hyun; Ji, Misuk; Kim, Sollip; Cho, Eun-Jung; Lee, Woochang; Yun, Yeo-Min; Chun, Sail; Min, Won-Ki

    2016-01-01

    The results of urine sediment analysis have been reported semiquantitatively. However, as recent guidelines recommend quantitative reporting of urine sediment, and with the development of automated urine sediment analyzers, there is an increasing need for quantitative analysis of urine sediment. Here, we developed a protocol for urine sediment analysis and quantified the results. Based on questionnaires, various reports, guidelines, and experimental results, we developed a protocol for urine sediment analysis. The results of this new protocol were compared with those obtained with a standardized chamber and an automated sediment analyzer. Reference intervals were also estimated using new protocol. We developed a protocol with centrifugation at 400 g for 5 min, with the average concentration factor of 30. The correlation between quantitative results of urine sediment analysis, the standardized chamber, and the automated sediment analyzer were generally good. The conversion factor derived from the new protocol showed a better fit with the results of manual count than the default conversion factor in the automated sediment analyzer. We developed a protocol for manual urine sediment analysis to quantitatively report the results. This protocol may provide a mean for standardization of urine sediment analysis.

  19. FODA: a novel efficient multiple access protocol for highly dynamic self-organizing networks

    Science.gov (United States)

    Li, Hantao; Liu, Kai; Zhang, Jun

    2005-11-01

    Based on the concept of contention reservation for polling transmission and collision prevention strategy for collision resolution, a fair on-demand access (FODA) protocol for supporting node mobility and multihop architecture in highly dynamic self-organizing networks is proposed. In the protocol, a distributed clustering network architecture formed by self-organizing algorithm and a main idea of reserving channel resources to get polling service are adopted, so that the hidden terminal (HT) and exposed terminal (ET) problems existed in traffic transmission due to multihop architecture and wireless transmission can be eliminated completely. In addition, an improved collision prevention scheme based on binary countdown algorithm (BCA), called fair collision prevention (FCP) algorithm, is proposed to greatly eliminate unfair phenomena existed in contention access of newly active ordinary nodes and completely resolve access collisions. Finally, the performance comparison of the FODA protocol with carrier sense multiple access with collision avoidance (CSMA/CA) and polling protocols by OPNET simulation are presented. Simulation results show that the FODA protocol can overcome the disadvantages of CSMA/CA and polling protocols, and achieve higher throughput, lower average message delay and less average message dropping rate.

  20. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  1. Comparison of luteal estradiol patch and gonadotropin-releasing hormone antagonist suppression protocol before gonadotropin stimulation versus microdose gonadotropin-releasing hormone agonist protocol for patients with a history of poor in vitro fertilization outcomes.

    Science.gov (United States)

    Weitzman, Vanessa N; Engmann, Lawrence; DiLuigi, Andrea; Maier, Donald; Nulsen, John; Benadiva, Claudio

    2009-07-01

    To compare IVF outcomes in poor-responder patients undergoing stimulation after luteal phase E(2) patch/GnRH antagonist (LPG) protocol versus microdose GnRH agonist protocol. Retrospective analysis. University-based IVF center. Forty-five women undergoing ovarian stimulation for IVF using the LPG protocol were compared with 76 women stimulated with the microdose GnRH agonist protocol from May 2005 to April 2006. Cancellation rate, number of oocytes retrieved, and clinical pregnancy rates. The mean number of oocytes (9.1 +/- 4.1 vs. 8.9 +/- 4.3) and mature oocytes (6.7 +/- 3.5 vs. 6.8 +/- 3.1) retrieved were similar, as were the fertilization rates (70.0% +/- 24.2% vs. 69.9% +/- 21.5%) and the number of embryos transferred (2.5 +/- 1.1 vs. 2.7 +/- 1.3). The cancellation rate was not significantly different between the groups (13/45, 28.9% vs. 23/76, 30.3%). Likewise, there were no significant differences among the implantation rate (15.0% vs. 12.5%), clinical pregnancy rate (43.3% vs. 45.1%), and ongoing pregnancy rate per transfer (33.3% vs. 26.0%) between both groups. This study demonstrates that the use of an E(2) patch and a GnRH antagonist during the preceding luteal phase in patients with a history of failed cycles can provide similar IVF outcomes when compared with the microdose GnRH agonist protocol.

  2. Hydrogen peroxide bleaching induces changes in the physical properties of dental restorative materials: Effects of study protocols.

    Science.gov (United States)

    Yu, Hao; Zhang, Chang-Yuan; Wang, Yi-Ning; Cheng, Hui

    2018-03-01

    The purpose of this study was to evaluate the influence of study protocols on the effects of bleaching on the surface roughness, substance loss, flexural strength (FS), flexural modulus (FM), Weibull parameters, and color of 7 restorative materials. The test materials included 4 composite resins, 1 glass-ionomer cement, 1 dental ceramic, and 1 polyacid-modified composite. The specimens were randomly divided into 4 groups (n = 20) according to different study protocols: a bleaching group at 25°C (group 25B), a bleaching group at 37°C (group 37B), a control group at 25°C (group 25C), and a control group at 37°C (group 37C). The specimens in the bleaching group were treated with 40% hydrogen peroxide for 80 min at the respective environmental temperatures. The surface roughness, substance loss, FS, FM, and color of the specimens were measured before and after treatment. FS data were also subjected to Weibull analysis, which was used to estimate of the Weibull modulus (m) and the characteristic strength (σ 0 ). Surface roughness increased and significant color changes were observed for all tested specimens after bleaching treatment, except for the ceramic. After bleaching at 37°C, the polyacid-modified composite showed significantly reduced FS, FM, m, and σ 0 values in comparison to the control specimens stored at 37°C in whole saliva. Significant differences were also found between the 37B and 25B polyacid-modified composite groups in terms of surface roughness, FS, m, σ 0 , and color changes. Varying effects of bleaching on the physical properties of dental restorative materials were observed, and the influences of the study protocols on bleaching effects were found to be material-dependent. The influence of study protocols on the effects of bleaching on the surface roughness, flexural properties, and color of dental restorative materials are material-dependent and should be considered when evaluating the effects of bleaching on dental restorative

  3. BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys

    Directory of Open Access Journals (Sweden)

    Songjie Wei

    2018-01-01

    Full Text Available LEO constellation has received intensive research attention in the field of satellite communication. The existing centralized authentication protocols traditionally used for MEO/GEO satellite networks cannot accommodate LEO satellites with frequent user connection switching. This paper proposes a fast and efficient access verification protocol named BAVP by combining identity-based encryption and blockchain technology. Two different key management schemes with IBE and blockchain, respectively, are investigated, which further enhance the authentication reliability and efficiency in LEO constellation. Experiments on OPNET simulation platform evaluate and demonstrate the effectiveness, reliability, and fast-switching efficiency of the proposed protocol. For LEO networks, BAVP surpasses the well-known existing solutions with significant advantages in both performance and scalability which are supported by theoretical analysis and simulation results.

  4. The effects of a tailored intensive care unit delirium prevention protocol: A randomized controlled trial.

    Science.gov (United States)

    Moon, Kyoung-Ja; Lee, Sun-Mi

    2015-09-01

    A decreased incidence of delirium following the application of non-pharmacologic intervention protocols to several patient populations has been previously reported. However, few studies have been conducted to examine the effects of their application to intensive care unit (ICU) patients. To examine the effects of applying a tailored delirium preventive protocol, developed by the authors, to ICU patients by analyzing its effects on delirium incidence, in-hospital mortality, ICU readmission, and length of ICU stay in a Korean hospital. A single-blind randomized controlled trial. A 1049-bed general hospital with a 105-bed ICU. Sixty and 63 ICU patients were randomly assigned to the intervention and control groups, respectively. The researchers applied the delirium prevention protocol to the intervention group every day for the first 7 days of ICU hospitalization. Delirium incidence, mortality, and re-admission to the ICU during the same hospitalization period were analyzed by logistic regression analysis; the 7- and 30-day in-hospital mortality by Kaplan-Meier survival and Cox proportional hazard regression analysis; and length of ICU stay was assessed by linear regression analysis. Application of the protocol had no significant effect on delirium incidence, in-hospital mortality, re-admission to the ICU, or length of ICU stay. Whereas the risk of 30-day in-hospital mortality was not significantly lower in the intervention than in the control group (OR: 0.33; 95% CI: 0.10-1.09), we found a significantly decreased 7-day in-hospital mortality in the intervention group after protocol application (HR: 0.09; 95% CI: 0.01-0.72). Application of a tailored delirium prevention protocol to acute stage patients during the first 7 days of ICU hospitalization appeared to reduce the 7-day in-hospital risk of mortality only for this patient population. Copyright © 2015 Elsevier Ltd. All rights reserved.

  5. Principles of the new quantum cryptography protocols building

    International Nuclear Information System (INIS)

    Kurochkin, V.; Kurochkin, Yu.

    2009-01-01

    The main aim of the quantum cryptography protocols is the maximal secrecy under the conditions of the real experiment. This work presents the result of the new protocol building with the use of the secrecy maximization. While using some well-known approaches this method has allowed one to achieve completely new results in quantum cryptography. The process of the protocol elaboration develops from the standard BB84 protocol upgrading to the building of completely new protocol with arbitrary large bases number. The secrecy proofs of the elaborated protocol appear to be natural continuation of the protocol building process. This approach reveals possibility to reach extremely high parameters of the protocol. It suits both the restrictions of contemporary technologies and requirements for high bit rate while being absolutely secret

  6. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  7. Fast-track protocols in devascularization for cirrhotic portal hypertension

    Directory of Open Access Journals (Sweden)

    Yang Fei

    2015-06-01

    Full Text Available Summary Introduction/objective: fast-tract surgery (FTS has been rapidly embraced by surgeons as a mechanism for improving patient care and driving down complications and costs. The aim of this study was to determine if any improvement in outcomes occurred after FTS protocol for selective double portazygous disconnection with preserving vagus (SDPDPV compared with non-FTS postoperative care. Methods: patients eligible for SDPDPV in the period January 2012-April 2014 were randomly selected for the FTS group or non-FTS group. A designed protocol was used in the FTS group with emphasis on an interdisciplinary approach. The non-FTS group was treated using previously established standard procedures. The number of postoperative complications, time of functional recovery and duration of hospital stay were recorded. Results: patients in the FTS group (n=59 and non-FTS group (n=57 did not differ in terms of preoperative data and operative details (p>0.05. The FTS procedure led to significantly better control and faster restoration of gastrointestinal functions, food tolerance, rehabilitation and hospital discharge (p<0.05. Postoperative complications, including nausea/vomiting, severe ascites, wound infection, urinary tract infection and pulmonary infection were all significantly lower in the FTS group (p<0.05. According to the postoperative morbidity classification used by Clavien, overall complications and grade I complications were both significantly lower in the FTS group compared with the non-FTS group (p<0.05. Conclusion: adopting the FTS protocol helped to recover gastrointestinal functions, to reduce frequency of postoperative complications and to reduce hospital stay. The FTS strategy is safe and effective in improving postoperative outcomes.

  8. Comparison of IAEA protocols for clinical electron beam dosimetry

    International Nuclear Information System (INIS)

    Novotny, J.; Soukup, M.

    2002-01-01

    control measurements for the last three years were analyzed and compared with those measured during this study. The data show that measured average values for d ref are much stable with time compared to average d max values (average standard deviation of 0,032 and 0,007 [cm] for d max and d ref , respectively). The absorbed doses in reference depths were calculated from measured values using five different methods. Different calibration factors, still used in clinical practice, were employed for calculations of absorbed dose in reference conditions. To compare the doses using both TRS recommendations the ratio D max /D deref was established as well. Estimated uncertainties for individual methods are also included. Summary of absorbed dose determination in electron beams is presented as a dose for 100 MU in the same reference point. One can see that doses, except dose for 20 MeV electrons, are scattered within the range of 2,5% which is less than values for combined uncertainties estimated for individual methods. The large deviation (4,7%) observed for 20 MeV beam can not be explain easily, the only possible factor for the moment is too small field size used for depth dose curves measurement. More detail studies for this energy are carried out now. The replacement of presently used TRS 381 protocol in our country for TRS 398 protocol will not have a significant influence on absorbed dose estimation in clinical practice. Application of dosimetry protocols based on absorbed dose to water standards will considerably reduce the uncertainty of the absorbed dose delivery to a patient as the number of steps involved in correction factors applied is reduced

  9. CaPiTo: protocol stacks for services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    CaPiTo allows the modelling of service-oriented applications using process algebras at three levels of abstraction. The abstract level focuses on the key functionality of the services; the plug-in level shows how to obtain security using standardised protocol stacks; finally, the concrete level...... allows to consider how security is obtained using asymmetric and symmetric cryptographic primitives. The CaPiTo approach therefore caters for a variety of developers that need to cooperate on designing and implementing service-oriented applications. We show how to formally analyse CaPiTo specifications...

  10. Dynamic Anthropometry – Deffning Protocols for Automatic Body Measurement

    Directory of Open Access Journals (Sweden)

    Slavenka Petrak

    2017-12-01

    Full Text Available The paper presents the research on possibilities of protocol development for automatic computer-based determination of measurements on a 3D body model in defined dynamic positions. Initially, two dynamic body positions were defined for the research on dimensional changes of targeted body lengths and surface segments during body movement from basic static position into a selected dynamic body position. The assumption was that during body movement, specifi c length and surface dimensions would change significantly from the aspect of clothing construction and functionality of a garment model. 3D body scanning of a female test sample was performed in basic static and two defined dynamic positions. 3D body models were processed and measurement points were defined as a starting point for the determination of characteristic body measurements. The protocol for automatic computer measurement was defined for every dynamic body position by the systematic set of activities based on determined measurement points. The verification of developed protocols was performed by automatic determination of defined measurements on the test sample and by comparing the results with the conventional manual measurement.

  11. A Practice-Based Evaluation of Distress Screening Protocol Adherence and Medical Service Utilization.

    Science.gov (United States)

    Zebrack, Brad; Kayser, Karen; Bybee, Deborah; Padgett, Lynne; Sundstrom, Laura; Jobin, Chad; Oktay, Julianne

    2017-07-01

    Background: This study examined the extent to which cancer programs demonstrated adherence to their own prescribed screening protocol, and whether adherence to that protocol was associated with medical service utilization. The hypothesis is that higher rates of service utilization are associated with lower rates of adherence to screening protocols. Methods: Oncology social workers at Commission on Cancer-accredited cancer programs reviewed electronic health records (EHRs) in their respective cancer programs during a 2-month period in 2014. Rates of overall adherence to a prescribed distress screening protocol were calculated based on documentation in the EHR that screening adherence and an appropriate clinical response had occurred. We examined documentation of emergency department (ED) use and hospitalization within 2 months after the screening visit. Results: Review of 8,409 EHRs across 55 cancer centers indicated that the overall adherence rate to screening protocols was 62.7%. The highest rates of adherence were observed in Community Cancer Programs (76.3%) and the lowest rates were in NCI-designated Cancer Centers (43.3%). Rates of medical service utilization were significantly higher than expected when overall protocol adherence was lacking. After controlling for patient and institutional characteristics, risk ratios for ED use (0.82) and hospitalization (0.81) suggest that when overall protocol adherence was documented, 18% to 19% fewer patients used these medical services. Conclusions: The observed associations between a mandated psychosocial care protocol and medical service utilization suggest opportunities for operational efficiencies and costs savings. Further investigations of protocol integrity, as well as the clinical care models by which psychosocial care is delivered, are warranted. Copyright © 2017 by the National Comprehensive Cancer Network.

  12. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    International Nuclear Information System (INIS)

    Xie Qi; Hu Bin; Chen Ke-Fei; Liu Wen-Hao; Tan Xiao

    2015-01-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. (paper)

  13. An improved protocol for efficient transformation and regeneration of diverse indica rice cultivars

    Directory of Open Access Journals (Sweden)

    Sahoo Khirod K

    2011-12-01

    Full Text Available Abstract Background Rice genome sequencing projects have generated remarkable amount of information about genes and genome architecture having tremendous potential to be utilized in both basic and applied research. Success in transgenics is paving the way for preparing a road map of functional genomics which is expected to correlate action of a gene to a trait in cellular and organismal context. However, the lack of a simple and efficient method for transformation and regeneration is a major constraint for such studies in this important cereal crop. Results In the present study, we have developed an easy, rapid and highly efficient transformation and regeneration protocol using mature seeds as explants and found its successful applicability to a choice of elite indica rice genotypes. We have optimized various steps of transformation and standardized different components of the regeneration medium including growth hormones and the gelling agent. The modified regeneration medium triggers production of large number of shoots from smaller number of calli and promotes their faster growth, hence significantly advantageous over the existing protocols where the regeneration step requires maximum time. Using this protocol, significantly higher transformation efficiency (up to 46% and regeneration frequency (up to 92% for the untransformed calli and 59% for the transformed calli were achieved for the four tested cultivars. We have used this protocol to produce hundreds of independent transgenic lines of different indica rice genotypes. Upon maturity, these transgenic lines were fertile thereby indicating that faster regeneration during tissue culture did not affect their reproductive potential. Conclusions This speedy, yet less labor-intensive, protocol overcomes major limitations associated with genetic manipulation in rice. Moreover, our protocol uses mature seeds as the explant, which can easily be obtained in quantity throughout the year and kept

  14. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  15. Teleportation protocol with non-ideal conditional local operations

    Energy Technology Data Exchange (ETDEWEB)

    Di Franco, C., E-mail: cdifranco@caesar.ucc.i [Department of Physics, University College Cork, Cork (Ireland); Ballester, D. [School of Mathematics and Physics, Queen' s University, Belfast BT7 1NN (United Kingdom)

    2010-07-12

    We analyze teleportation protocol when some of receiver's conditional operations are more reliable than others and a non-maximally entangled channel is shared by the two parts. We show that the average fidelity of teleportation can be maximized by choosing properly the basis in which the sender performs her two-qubit measurement.

  16. SPP: A data base processor data communications protocol

    Science.gov (United States)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  17. Assessment of auditory skills in 140 cochlear implant children using the EARS protocol.

    Science.gov (United States)

    Sainz, Manuel; Skarzynski, Henryk; Allum, John H J; Helms, Jan; Rivas, Adriana; Martin, Jane; Zorowka, Patrick Georg; Phillips, Lucy; Delauney, Joseph; Brockmeyer, Steffi Johanna; Kompis, Martin; Korolewa, Inna; Albegger, Klaus; Zwirner, Petra; Van De Heyning, Paul; D'Haese, Patrick

    2003-01-01

    Auditory performance of cochlear implant (CI) children was assessed with the Listening Progress Profile (LiP) and the Monosyllabic-Trochee-Polysyllabic-Word Test (MTP) following the EARS protocol. Additionally, the 'initial drop' phenomenon, a recently reported decrease of auditory performance occurring immediately after first fitting, was investigated. Patients were 140 prelingually deafened children from various clinics and centers worldwide implanted with a MEDEL COMBI 40/40+. Analysis of LiP data showed a significant increase after 1 month of CI use compared to preoperative scores (p < 0.01). No initial decrease was observed with this test. Analysis of MTP data revealed a significant improvement of word recognition after 6 months (p < 0.01), with a significant temporary decrease after initial fitting (p < 0.01). With both tests, children's auditory skills improved up to 2 years. Amount of improvement was negatively correlated with age at implantation. Copyright 2003 S. Karger AG, Basel

  18. Performance Effects of Repetition Specific Gluteal Activation Protocols on Acceleration in Male Rugby Union Players

    Directory of Open Access Journals (Sweden)

    Barry Lorna

    2016-12-01

    Full Text Available Warm-up protocols have the potential to cause an acute enhancement of dynamic sprinting performance. The purpose of this study was to evaluate the effects of three repetition specific gluteal activation warm-up protocols on acceleration performance in male rugby union players. Forty male academy rugby union players were randomly assigned to one of 4 groups (control, 5, 10 or 15 repetition gluteal activation group and performed 10 m sprints at baseline and 30 s, 2, 4, 6 and 8 min after their specific intervention protocol. Five and ten meter sprint times were the dependent variable and dual-beam timing gates were used to record all sprint times. Repeated measures analysis of variance found no significant improvement in 5 and 10 m sprint times between baseline and post warm-up scores (p ≥ 0.05 for all groups. There were no reported significant differences between groups at any of the rest interval time points (p ≥ 0.05. However, when individual responses to the warm-up protocols were analyzed, the 15 repetition gluteal activation group had faster 10 m times post-intervention and this improvement was significant (p = 0.021. These results would indicate that there is no specific rest interval for any of the gluteal interventions that results in a potentiation effect on acceleration performance. However, the individual response analysis would seem to indicate that a 15 repetition gluteal activation warm-up protocol has a potentiating effect on acceleration performance provided that the rest interval is adequately and individually determined.

  19. The Study of MSADQ/CDMA Protocol in Voice/Data Integration Packet Networks

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    A new packet medium access protocol, namely, minislot signalingaccess based on distributed queues(MSADQ/CDMA), is proposed in voice and data intergration CDMA networks. The MSADQ protocol is based on distributed queues and collision resolution algorithm. Through proper management of the PN codes, the number of random competition collision reduces greatly, the multiple access interference (MAI) decreases. It has several special access signaling channels to carry the voice and data access request. Each slot is devided into several control minislots (CMSs), in which the Data Terminals (DT) or Voice Terminals (VT) transmit their request. According to the voice and data traffic character, the signaling access structure is proposed. The code assign rules and queue managing rules are also proposed to ensure the QoS requirement of each traffic. Comparisions with other three protocol are developed by simulation, which shows that MSADQ/CDMA protocol occupies less PN codes, but still has very good performance.

  20. Behavioral effects of acclimatization to restraint protocol used for awake animal imaging.

    Science.gov (United States)

    Reed, Michael D; Pira, Ashley S; Febo, Marcelo

    2013-07-15

    Functional MRI in awake rats involves acclimatization to restraint to minimize motion. We designed a study to examine the effects of an acclimatization protocol (5 days of restraint, 60 min per day) on the emission of 22-kHz ultrasonic vocalizations and performance in a forced swim test (FST). Our results showed that USV calls are reduced significantly by days 3, 4 and 5 of acclimatization. Although the rats showed less climbing activity (and more immobility) in FST on day 5 compared to the 1st day of restraint acclimatization, the difference was not detected once the animals were given a 2-week hiatus. Overall, we showed that animals adapt to the restraint over a five-day period; however, restraint may introduce confounding behavioral outcomes that may hinder the interpretation of results derived from awake rat imaging. The present data warrants further testing of the effects of MRI restraint on behavior. Copyright © 2013 Elsevier B.V. All rights reserved.

  1. Infectious Bronchitis Vaccination Protocols for Laying Hens

    Directory of Open Access Journals (Sweden)

    A. Sulaiman

    2011-12-01

    Full Text Available A research was conducted to investigate the effects of vaccination protocols for Infectious Bronchitis (IB on egg production, egg quality, and IB antibody titres of laying hens. Different initial vaccination (Control, VicS eye, VicS spray, VicS water, A3 eye, A3 spray, and A3 water for IB were administered to day-old Isa Brown hens. Half the hens were revaccinated regularly during lay whereas the other hens were not vaccinated. Results showed that initial vaccination treatment had significant effects on hen day egg production and egg quality of egg weight, shell reflectivity, shell breaking strength, shell thickness, albumen height, Haugh Units, and IB antibody titre levels, but had no effect on percentage of shell and yolk colour. Egg weight and shell reflectivity were less favourable in the control hens. In contrast, shell breaking strength and shell thickness were highest for the group that initially received A3 vaccine in water. However, regular revaccination had some deleterious effects on egg production and egg quality. There were no significant effects of revaccination on IB antibody titres. It is concluded that there was little advantage in regularly revaccinating laying hens for IB virus, since they had received appropriate initial vaccination.

  2. The Impact of a Universal Decolonization Protocol on Hospital-Acquired Methicillin-Resistant Staphylococcus aureus in a Burn Population.

    Science.gov (United States)

    Johnson, Arthur T; Nygaard, Rachel M; Cohen, Ellie M; Fey, Ryan M; Wagner, Anne Lambert

    Hospital-acquired (HA) methicillin-resistant Staphylococcus aureus (MRSA) is a leading cause of HA infections and a significant concern for burn centers. The use of 2% chlorhexidine-impregnated wipes and nasal mupirocin significantly decreases the rate of HA-MRSA in adult intensive care units. The aim of this study was to examine the impact of universal decolonization on the rate of MRSA conversion in an American Burn Association verified adult and pediatric burn center. Universal decolonization protocol consisting of daily chlorhexidine baths and a 5-day course of nasal mupirocin was implemented in the burn unit. MRSA screening both on admission and weekly and contact isolation practices were in place in pre-decolonization and post-decolonization periods. Patient data were analyzed 2 years before and 1 year after implementation of the protocol. The incidence rate of MRSA was significantly decreased after the implementation of the decolonization protocol (11.8 vs 1.0 per 1000 patient days, P burn patients are at greater risk for invasive infection leading to severe complications and death. The prevalence of HA-MRSA at our institution's burn center was significantly decreased after the implementation of a universal decolonization protocol.

  3. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Science.gov (United States)

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  4. Pediatric superficial scald burns--reassessment of our follow-up protocol.

    Science.gov (United States)

    Egro, Francesco M; O'Neill, Jennifer K; Briard, Robert; Cubison, Tania C S; Kay, Alan R; Estela, Catalina M; Burge, Timothy S

    2010-01-01

    The most common pediatric burn injury is a superficial scald. The current follow-up protocol for such burns includes review of the patient at 2 weeks postinjury and then 2 months later. The authors decided to review the protocol to assess the need for this second follow-up. A retrospective study reviewed the case notes of patients younger than 16 years at the time of their injury presenting with a scald over 5% TBSA. The progress of healing and scar development up to 5 years follow-up was assessed. This study showed that scalds healing within 2 weeks following injury rarely became hypertrophic. A prospective study was performed over a 10-month period. All children who suffered a superficial partial-thickness scald injury were included. At the 2-week appointment, the need for further follow-up was predicted. The accuracy of this prediction was assessed 2 months later. This study showed that an experienced member of the burns team could reliably predict at 2-week appointment those children who could be safely discharged with no subsequent need for scar management. This study suggests that it will be safe to modify the follow-up protocol, reducing the number of clinic attendances.

  5. PROFILE: Environmental Impact Assessment Under the National Environmental Policy Act and the Protocol on Environmental Protection to the Antarctic Treaty.

    Science.gov (United States)

    Ensminger; McCold; Webb

    1999-07-01

    / Antarctica has been set aside by the international community for protection as a natural reserve and a place for scientific research. Through the Antarctic Treaty of 1961, the signing nations agreed to cooperate in protecting the antarctic environment, in conducting scientific studies, and in abstaining from the exercise of territorial claims. The 1991 signing of the Protocol on Environmental Protection to the Antarctic Treaty (Protocol) by representatives of the 26 nations comprising the Antarctic Treaty Consultative Parties (Parties) significantly strengthened environmental protection measures for the continent. The Protocol required ratification by each of the governments individually prior to official implementation. The US government ratified the Protocol by passage of the Antarctic Science, Tourism, and Conservation Act of 1997. Japan completed the process by ratifying the Protocol on December 15, 1997. US government actions undertaken in Antarctica are subject to the requirements of both the Protocol and the US National Environmental Policy Act (NEPA). There are differences in the scope and intent of the Protocol and NEPA; however, both require environmental impact assessment (EIA) as part of the planning process for proposed actions that have the potential for environmental impacts. In this paper we describe the two instruments and highlight key similarities and differences with particular attention to EIA. Through this comparison of the EIA requirements of NEPA and the Protocol, we show how the requirements of each can be used in concert to provide enhanced environmental protection for the antarctic environment. NEPA applies only to actions of the US government; therefore, because NEPA includes certain desirable attributes that have been refined and clarified through numerous court cases, and because the Protocol is just entering implementation internationally, some recommendations are made for strengthening the procedural requirements of the Protocol

  6. Approximating the Qualitative Vickrey Auction by a Negotiation Protocol

    Science.gov (United States)

    Hindriks, Koen V.; Tykhonov, Dmytro; de Weerdt, Mathijs

    A result of Bulow and Klemperer has suggested that auctions may be a better tool to obtain an efficient outcome than negotiation. For example, some auction mechanisms can be shown to be efficient and strategy-proof. However, they generally also require that the preferences of at least one side of the auction are publicly known. However, sometimes it is very costly, impossible, or undesirable to publicly announce such preferences. It thus is interesting to find methods that do not impose this constraint but still approximate the outcome of the auction. In this paper we show that a multi-round multi-party negotiation protocol may be used to this end if the negotiating agents are capable of learning opponent preferences. The latter condition can be met by current state of the art negotiation technology. We show that this protocol approximates the theoretical outcome predicted by a so-called Qualitative Vickrey auction mechanism (even) on a complex multi-issue domain.

  7. The Development of Korea Additional Protocol System

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yeo, Jin Kyun

    2008-01-01

    The Agreement between the Republic of Korea (ROK) and the IAEA for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Safeguards Agreement) entered into force on 14 November 1975. The Additional Protocol to the Safeguards Agreement (the Additional Protocol) was signed on 21 June 1999 and entered into force on 19 February 2004. ROK has been submitting annual updated reports of initial declaration on every May 15th since August 2004. Additional protocol reports were submitted through Protocol Reporter provided by IAEA. Annual declarations were simply uploaded and stored in the Accounting Information Treatment System of KINAC, which did not provide data analysis and management function. There have been demands for improvement to handle ever-increasing information. KAPS (Korea Additional Protocol System) has been developed to assist and administrate the additional protocol related works effectively. The new system enables integrated management including composition of additional protocol report and version control, periodical update of related information, results of IAEA complementary access to each facility

  8. Analysis of Security Protocols for Mobile Healthcare.

    Science.gov (United States)

    Wazid, Mohammad; Zeadally, Sherali; Das, Ashok Kumar; Odelu, Vanga

    2016-11-01

    Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient's health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems.

  9. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  10. Quantum-key-distribution protocol with pseudorandom bases

    Science.gov (United States)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  11. Modified protocol for genomic DNA extraction from newly plucked feathers of lophura leucomelana hamiltoni (Galliformes) for genetic studies and its endo-restriction analysis

    International Nuclear Information System (INIS)

    Andleeb, S.; Shamim, S.; Minhas, R.A.

    2012-01-01

    A rapid and accurate protocol was used first time to isolate the high-quality genomic DNA from newly plucked feathers of Lophura leucomelana. Two different lysis protocols were used depending on the feather size and it was observed that 55 deg. C for 3 to 4 days showed better results of feathers lysis as compared with the 37 deg. C for overnight with gentle shaking. Purification of genomic DNA was also performed with phenol: chloroform: isoamyl alcohol and 100% absolute ethanol precipitation methods. By using this protocol, a significant amount of high-quality genomic DNA was obtained and the purity of DNA was analyzed through endo-restriction analysis. Genomic DNA isolated with this modified method will be used for Southern blotting and also in several polymerase chain reaction systems devoted to sex determination and paternity testing and the evolutionary relationships among the other pheasants. (author)

  12. Interoperability and Reliability of Multiplatform MPLS VPN: Comparison of Traffic Engineering with RSVP-TE Protocol and LDP Protocol

    Directory of Open Access Journals (Sweden)

    Nanang Ismail

    2017-10-01

    48% of packet loss per 100 sent packets while on RSVP packet loss percentage is 35.5% per 100 sent packets. Both protocols have interoperability on the third layer of multiplatform MPLS VPN, but on heavy loaded traffic condition, RSVP protocol has better reliability than the LDP protocol.

  13. Consensus problem in directed networks of multi-agents via nonlinear protocols

    International Nuclear Information System (INIS)

    Liu Xiwei; Chen Tianping; Lu Wenlian

    2009-01-01

    In this Letter, the consensus problem via distributed nonlinear protocols for directed networks is investigated. Its dynamical behaviors are described by ordinary differential equations (ODEs). Based on graph theory, matrix theory and the Lyapunov direct method, some sufficient conditions of nonlinear protocols guaranteeing asymptotical or exponential consensus are presented and rigorously proved. The main contribution of this work is that for nonlinearly coupled networks, we generalize the results for undirected networks to directed networks. Consensus under pinning control technique is also developed here. Simulations are also given to show the validity of the theories.

  14. Quality improvement initiative: Preventative Surgical Site Infection Protocol in Vascular Surgery.

    Science.gov (United States)

    Parizh, David; Ascher, Enrico; Raza Rizvi, Syed Ali; Hingorani, Anil; Amaturo, Michael; Johnson, Eric

    2018-02-01

    Objective A quality improvement initiative was employed to decrease single institution surgical site infection rate in open lower extremity revascularization procedures. In an attempt to lower patient morbidity, we developed and implemented the Preventative Surgical Site Infection Protocol in Vascular Surgery. Surgical site infections lead to prolonged hospital stays, adjunctive procedure, and additive costs. We employed targeted interventions to address the common risk factors that predispose patients to post-operative complications. Methods Retrospective review was performed between 2012 and 2016 for all surgical site infections after revascularization procedures of the lower extremity. A quality improvement protocol was initiated in January 2015. Primary outcome was the assessment of surgical site infection rate reduction in the pre-protocol vs. post-protocol era. Secondary outcomes evaluated patient demographics, closure method, perioperative antibiotic coverage, and management outcomes. Results Implementation of the protocol decreased the surgical site infection rate from 6.4% to 1.6% p = 0.0137). Patient demographics and comorbidities were assessed and failed to demonstrate a statistically significant difference among the infection and no-infection groups. Wound closure with monocryl suture vs. staple proved to be associated with decreased surgical site infection rate ( p site infections in the vascular surgery population are effective and necessary. Our data suggest that there may be benefit in the incorporation of MRSA and Gram-negative coverage as part of the Surgical Care Improvement Project perioperative guidelines.

  15. A review on transport layer protocol performance for delivering video on an adhoc network

    Science.gov (United States)

    Suherman; Suwendri; Al-Akaidi, Marwan

    2017-09-01

    The transport layer protocol is responsible for the end to end data transmission. Transmission control protocol (TCP) provides a reliable connection and user datagram protocol (UDP) offers fast but unguaranteed data transfer. Meanwhile, the 802.11 (wireless fidelity/WiFi) networks have been widely used as internet hotspots. This paper evaluates TCP, TCP variants and UDP performances for video transmission on an adhoc network. The transport protocol - medium access cross-layer is proposed by prioritizing TCP acknowledgement to reduce delay. The NS-2 evaluations show that the average delays increase linearly for all the evaluated protocols and the average packet losses grow logarithmically. UDP produces the lowest transmission delay; 5.4% and 5.8% lower than TCP and TCP variant, but experiences the highest packet loss. Both TCP and TCP Vegas maintain packet loss as low as possible. The proposed cross-layer successfully decreases TCP and TCP Vegas delay about 0.12 % and 0.15%, although losses remain similar.

  16. Radiolabeled annexin V for imaging apoptosis in radiated human follicular thyroid carcinomas - is an individualized protocol necessary?

    Energy Technology Data Exchange (ETDEWEB)

    Grosse, Jirka [Department of Nuclear Medicine, University of Regensburg, 93042 Regensburg (Germany); Department of Clinical Pharmacology and Toxicology, Charite-Universitaetsmedizin Berlin, Campus Benjamin Franklin, 14195 Berlin (Germany)], E-mail: jirka.grosse@klinik.uni-regensburg.de; Grimm, Daniela [Department of Clinical Pharmacology and Toxicology, Charite-Universitaetsmedizin Berlin, Campus Benjamin Franklin, 14195 Berlin (Germany); Department of Pharmacology, University of Aarhus, 8000 Aarhus (Denmark); Westphal, Kriss; Ulbrich, Claudia [Department of Clinical Pharmacology and Toxicology, Charite-Universitaetsmedizin Berlin, Campus Benjamin Franklin, 14195 Berlin (Germany); Moosbauer, Jutta [Department of Nuclear Medicine, University of Regensburg, 93042 Regensburg (Germany); Pohl, Fabian; Koelbl, Oliver [Department of Radiooncology, University of Regensburg, 93042 Regensburg (Germany); Infanger, Manfred [Department of Reconstructive Surgery, Charite-Universitaetsmedizin Berlin, Campus Benjamin Franklin, 12203 Berlin (Germany); Eilles, Christoph; Schoenberger, Johann [Department of Nuclear Medicine, University of Regensburg, 93042 Regensburg (Germany)

    2009-01-15

    Introduction: Induction of apoptosis is a widely used strategy for cancer therapy, but evaluating the degree and success of this therapy still poses a problem. Radiolabeled annexin V has been proposed to be a promising candidate for detecting apoptotic cells in tumors following chemotherapy in vivo. In order to see whether radiolabeled annexin V could be a suitable substance for the noninvasive in vivo detection of apoptosis in thyroid tissue and to establish an optimized study protocol, we investigated two poorly differentiated thyroid carcinoma cell lines: ML-1 and FTC-133. Methods: Apoptosis was evaluated before as well as 2 and 4 days after in vitro irradiation with 30 Gy X-rays. In this study, binding of FITC- and of {sup 125}I-labeled annexin V was measured in comparison to other apoptosis markers such as Bax, caspase-3 and Fas, which were determined by flow cytometry and Western blot analysis with densitometric evaluation. Results: ML-1 and FTC-133 cells showed a significant increase in annexin V binding 48 h after irradiation. Ninety-six hours after irradiation, the annexin V absorption capability of ML-1 cells was still maximal, while the living fraction of FTC-133 increased significantly. The amount of caspase-3 and Bax was clearly increased 48 h after irradiation and had normalized after 96 h in both cell lines. Fas protein concentrations remained unchanged in ML-1 cells but were significantly enhanced in FTC-133 cells. Conclusion: The binding of FITC- and {sup 125}I-labeled annexin V showed a significant accordance. A reliable evaluation of apoptosis induced by radiotherapy in thyroid tumors was possible 48 h after irradiation, when binding of radiolabeled annexin V is most significantly enhanced. Using two poorly differentiated cell lines of thyroid carcinoma, one may expect to find a nearly similar response to external irradiation. In contrast, the cell lines showed a completely contrary response. However, an individualized study protocol for each

  17. Cost effectiveness of a protocol using palivizumab in preterm infants

    Directory of Open Access Journals (Sweden)

    Yolanda Hernández-Gago

    2017-03-01

    risk, while many of them have associated risk factors you vary as have school-age siblings, rural residence, parental smoking, poor educational background of parents, lack of artificial feeding and family history of allergy. Conclusions: The consensus protocol has not been a significant increase in hospitalization rates in preterm infants <32 weeks gestational age patients. In those <35 has been observed a higher rate of hospitalization, with a very unfavorable cost-effectiveness for all clinical scenarios valued relationship.

  18. Implementation of a split-bolus single-pass CT protocol at a UK major trauma centre to reduce excess radiation dose in trauma pan-CT

    International Nuclear Information System (INIS)

    Leung, V.; Sastry, A.; Woo, T.D.; Jones, H.R.

    2015-01-01

    Aim: To quantify the dose reduction and ensure that the use of a split-bolus protocol provided sufficient vascular enhancement. Materials and methods: Between 1 January 2014 and 31 May 2014, both split bolus and traditional two-phase scans were performed on a single CT scanner (SOMATOM Definition AS+, Siemens Healthcare) using a two-pump injector (Medrad Stellant). Both protocols used Siemens' proprietary tube current and tube voltage modulation techniques (CARE dose and CARE kV). The protocols were compared retrospectively to assess the dose–length product (DLP), aortic radiodensity at the level of the coeliac axis and radiodensity of the portal vein. Results: There were 151 trauma CT examinations during this period. Seventy-eight used the split-bolus protocol. Seventy-one had traditional two-phase imaging. One patient was excluded as they were under the age of 18 years. The radiodensity measurements for the portal vein were significantly higher (p<0.001) in the split-bolus protocol. The mean aortic enhancement in both protocols exceeded 250 HU, although the traditional two-phase protocol gave greater arterial enhancement (p<0.001) than the split-bolus protocol. The split-bolus protocol had a significantly lower (p<0.001) DLP with 43.5% reduction in the mean DLP compared to the traditional protocol. Conclusion: Split-bolus CT imaging offers significant dose reduction for this relatively young population while retaining both arterial and venous enhancement. -- Highlights: •We implemented a split bolus pan-CT protocol for trauma CT. •We compared the radiation dose and vascular enhancement of the split bolus protocol to a traditional two phase protocol. •The split bolus protocol had a 43.5% reduction in mean DLP

  19. A single-aliquot OSL protocol using bracketing regenerative doses to accurately determine equivalent doses in quartz

    CERN Document Server

    Folz, E

    1999-01-01

    In most cases, sediments show inherent heterogeneity in their luminescence behaviours and bleaching histories, and identical aliquots are not available: single-aliquot determination of the equivalent dose (ED) is then the approach of choice and the advantages of using regenerative protocols are outlined. Experiments on five laboratory bleached and dosed quartz samples, following the protocol described by Murray and Roberts (1998. Measurement of the equivalent dose in quartz using a regenerative-dose single aliquot protocol. Radiation Measurements 27, 171-184), showed the hazards of using a single regeneration dose: a 10% variation in the regenerative dose yielded some equivalent dose estimates that differed from the expected value by more than 5%. A protocol is proposed that allows the use of different regenerative doses to bracket the estimated equivalent dose. The measured ED is found to be in excellent agreement with the known value when the main regeneration dose is within 10% of the true equivalent dose.

  20. A single-aliquot OSL protocol using bracketing regenerative doses to accurately determine equivalent doses in quartz

    International Nuclear Information System (INIS)

    Folz, Elise; Mercier, Norbert

    1999-01-01

    In most cases, sediments show inherent heterogeneity in their luminescence behaviours and bleaching histories, and identical aliquots are not available: single-aliquot determination of the equivalent dose (ED) is then the approach of choice and the advantages of using regenerative protocols are outlined. Experiments on five laboratory bleached and dosed quartz samples, following the protocol described by Murray and Roberts (1998. Measurement of the equivalent dose in quartz using a regenerative-dose single aliquot protocol. Radiation Measurements 27, 171-184), showed the hazards of using a single regeneration dose: a 10% variation in the regenerative dose yielded some equivalent dose estimates that differed from the expected value by more than 5%. A protocol is proposed that allows the use of different regenerative doses to bracket the estimated equivalent dose. The measured ED is found to be in excellent agreement with the known value when the main regeneration dose is within 10% of the true equivalent dose

  1. Insect Venom Immunotherapy: Analysis of the Safety and Tolerance of 3 Buildup Protocols Frequently Used in Spain.

    Science.gov (United States)

    Gutiérrez Fernández, D; Moreno-Ancillo, A; Fernández Meléndez, S; Domínguez-Noche, C; Gálvez Ruiz, P; Alfaya Arias, T; Carballada González, F; Alonso Llamazares, A; Marques Amat, L; Vega Castro, A; Antolín Amérigo, D; Cruz Granados, S; Ruiz León, B; Sánchez Morillas, L; Fernández Sánchez, J; Soriano Gomis, V; Borja Segade, J; Dalmau Duch, G; Guspi Bori, R; Miranda Páez, A

    2016-01-01

    Hymenoptera venom immunotherapy (VIT) is an effective treatment but not one devoid of risk, as both local and systemic adverse reactions may occur, especially in the initial phases. We compared the tolerance to 3 VIT buildup protocols and analyzed risk factors associated with adverse reactions during this phase. We enrolled 165 patients divided into 3 groups based on the buildup protocol used (3, 4, and 9 weeks). The severity of systemic reactions was evaluated according to the World Allergy Organization model. Results were analyzed using exploratory descriptive statistics, and variables were compared using analysis of variance. Adverse reactions were recorded in 53 patients (32%) (43 local and 10 systemic). Local reactions were immediate in 27 patients (63%) and delayed in 16 (37%). The severity of the local reaction was slight/moderate in 15 patients and severe in 13. Systemic reactions were grade 1-2. No significant association was found between the treatment modality and the onset of local or systemic adverse reactions or the type of local reaction. We only found a statistically significant association between severity of the local reaction and female gender. As for the risk factors associated with systemic reactions during the buildup phase, we found no significant differences in values depending on the protocol used or the insect responsible. The buildup protocols compared proved to be safe and did not differ significantly from one another. In the population studied, patients undergoing the 9-week schedule presented no systemic reactions. Therefore, this protocol can be considered the safest approach.

  2. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  3. An Optimal Non-Interactive Message Authentication Protocol

    OpenAIRE

    Pasini, Sylvain; Vaudenay, Serge

    2006-01-01

    Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SAS-based non-interactive message authentication protocols (NIMAP). We start by the analysis of two popular non-interactive message authentication protocols. The first one is based on a collision-resistant hash function and was presented by Balfanz et al. The second protocol is based on a universal hash function family and was proposed by Gehrmann, Mi...

  4. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  5. Bitcoin-NG: A Scalable Blockchain Protocol

    OpenAIRE

    Eyal, Ittay; Gencer, Adem Efe; Sirer, Emin Gun; van Renesse, Robbert

    2015-01-01

    Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is By...

  6. A Priority-aware Frequency Domain Polling MAC Protocol for OFDMA-based Networks in Cyber-physical Systems

    Institute of Scientific and Technical Information of China (English)

    Meng Zheng; Junru Lin; Wei Liang; Haibin Yu

    2015-01-01

    Wireless networking in cyber-physical systems(CPSs) is characteristically different from traditional wireless systems due to the harsh radio frequency environment and applications that impose high real-time and reliability constraints.One of the fundamental considerations for enabling CPS networks is the medium access control protocol. To this end, this paper proposes a novel priority-aware frequency domain polling medium access control(MAC) protocol, which takes advantage of an orthogonal frequency-division multiple access(OFDMA)physical layer to achieve instantaneous priority-aware polling.Based on the polling result, the proposed work then optimizes the resource allocation of the OFDMA network to further improve the data reliability. Due to the non-polynomial-complete nature of the OFDMA resource allocation, we propose two heuristic rules,based on which an efficient solution algorithm to the OFDMA resource allocation problem is designed. Simulation results show that the reliability performance of CPS networks is significantly improved because of this work.

  7. Dental-CT: image quality and absorbed radiation dose of different scan protocols

    International Nuclear Information System (INIS)

    Schorn, C.; Alamo, L.; Funke, M.; Grabbe, E.; Visser, H.; Hermann, K.P.

    1999-01-01

    Purpose: To develop a scan protocol for dental-CT which guarantees good image quality at the lowest possible radiation dose. Methods: In an experimental investigation Dental-CT (HSA, GE, Milwaukee, USA) of the mandible of two human skeletons positioned in a water tank were performed in order to define the most advantageous scan protocol. Tube currents ranged from 40 to 200 mA and the scan technique was modified (axial mode or helical mode with pitches of 1 to 3 and corresponding increments of 0.4 to 1.0 mm). 39 patients underwent a dental-CT with decreased current (80 mA) in the helical scan mode (pitch 2, slice thickness 1 mm). Dose measurements were performed for two different scan protocols (A: axial, 130 mAs, B: helical, 80 mA, pitch 2). Results: The preliminary investigations of image quality showed only a minor effect of the applied current. For the helical scan mode, pitches of more than 2 impaired image quality. A low increment had no advantages. There were no disadvantages in clinical practice using protocol B with decreased tube current. Absorbed radiation dose of dental CT performed with protocol B was decreased to one third in comparison to protocol A. Conclusions: A scan protocol with a low tube current (e.g., 80 mA, for a rotation time of 1 s) and a helical scan mode (e.g., for a slice thickness of 1 mm with a pitch of 2 and an increment of 1 mm) is recommended for performing dental-CT. (orig.) [de

  8. MODELLING AND VERIFICATION OF KITSAT PACKET COMMUNICATION PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Young-Ro Lee

    1996-06-01

    Full Text Available In this paper, in order to verify KITSAT 1/2 packet communication protocols, we model the AX.25 protocol and PACSAT protocol by using an extended Petri net and then verify the correctness, boundedness, liveness and deadlock freeness of packet protocols by utilizing reachability trees.

  9. Game-theoretic perspective of Ping-Pong protocol

    Science.gov (United States)

    Kaur, Hargeet; Kumar, Atul

    2018-01-01

    We analyse Ping-Pong protocol from the point of view of a game. The analysis helps us in understanding the different strategies of a sender and an eavesdropper to gain the maximum payoff in the game. The study presented here characterizes strategies that lead to different Nash equilibriums. We further demonstrate the condition for Pareto optimality depending on the parameters used in the game. Moreover, we also analysed LM05 protocol and compared it with PP protocol from the point of view of a generic two-way QKD game with or without entanglement. Our results provide a deeper understanding of general two-way QKD protocols in terms of the security and payoffs of different stakeholders in the protocol.

  10. An Adaptive Information Quantity-Based Broadcast Protocol for Safety Services in VANET

    Directory of Open Access Journals (Sweden)

    Wenjie Wang

    2016-01-01

    Full Text Available Vehicle-to-vehicle communication plays a significantly important role in implementing safe and efficient road traffic. When disseminating safety messages in the network, the information quantity on safety packets changes over time and space. However, most of existing protocols view each packet the same to disseminate, preventing vehicles from collecting more recent and precise safety information. Hence, an information quantity-based broadcast protocol is proposed in this paper to ensure the efficiency of safety messages dissemination. In particular, we propose the concept of emergency-degree to evaluate packets’ information quantity. Then we present EDCast, an emergency-degree-based broadcast protocol. EDCast differentiates each packet’s priority for accessing the channel based on its emergency-degree so as to provide vehicles with more safety information timely and accurately. In addition, an adaptive scheme is presented to ensure fast dissemination of messages in different network condition. We compare the performance of EDCast with those of three other representative protocols in a typical highway scenario. Simulation results indicate that EDCast achieves higher broadcast efficiency and less redundancy with less delivery delay. What we found demonstrates that it is feasible and necessary for incorporating information quantity of messages in designing an efficient safety message broadcast protocol.

  11. Head CT: Image quality improvement with ASIR-V using a reduced radiation dose protocol for children

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyun Gi [Ajou University School of Medicine, Ajou University Medical Center, Department of Radiology, Yeongtong-gu, Suwon (Korea, Republic of); Lee, Ho-Joon; Lee, Seung-Koo; Kim, Myung-Joon [Severance Hospital, Yonsei University College of Medicine, Department of Radiology and Research Institute of Radiological Science, Seodaemun-gu, Seoul (Korea, Republic of); Kim, Hyun Ji [Ajou University School of Medicine, Office of Biostatistics, Department of Humanities and Social Medicine, Yeongtong-gu, Suwon (Korea, Republic of)

    2017-09-15

    To investigate the quality of images reconstructed with adaptive statistical iterative reconstruction V (ASIR-V), using pediatric head CT protocols. A phantom was scanned at decreasing 20% mA intervals using our standard pediatric head CT protocols. Each study was then reconstructed at 10% ASIR-V intervals. After the phantom study, we reduced mA by 10% in the protocol for <3-year-old patients and applied 30% ASIR-V and by 30% in the protocol for 3- to 15-year-old patients and applied 40% ASIR-V. Increasing the percentage of ASIR-V resulted in lower noise and higher contrast-to-noise ratio (CNR) and preserved spatial resolution in the phantom study. Compared to a conventional-protocol, reduced-dose protocol with ASIR-V achieved 12.8% to 34.0% of dose reduction and showed images of lower noise (9.22 vs. 10.73, P = 0.043) and higher CNR in different levels (centrum semiovale, 2.14 vs. 1.52, P = 0.003; basal ganglia, 1.46 vs. 1.07, P = 0.001; and cerebellum, 2.18 vs. 1.33, P < 0.001). Qualitative analysis showed higher gray-white matter differentiation and sharpness and preserved overall diagnostic quality in the images with ASIR-V. Use of ASIR-V allowed a 12.8% to 34.0% dose reduction in each age group with potential to improve image quality. (orig.)

  12. Head CT: Image quality improvement with ASIR-V using a reduced radiation dose protocol for children

    International Nuclear Information System (INIS)

    Kim, Hyun Gi; Lee, Ho-Joon; Lee, Seung-Koo; Kim, Myung-Joon; Kim, Hyun Ji

    2017-01-01

    To investigate the quality of images reconstructed with adaptive statistical iterative reconstruction V (ASIR-V), using pediatric head CT protocols. A phantom was scanned at decreasing 20% mA intervals using our standard pediatric head CT protocols. Each study was then reconstructed at 10% ASIR-V intervals. After the phantom study, we reduced mA by 10% in the protocol for <3-year-old patients and applied 30% ASIR-V and by 30% in the protocol for 3- to 15-year-old patients and applied 40% ASIR-V. Increasing the percentage of ASIR-V resulted in lower noise and higher contrast-to-noise ratio (CNR) and preserved spatial resolution in the phantom study. Compared to a conventional-protocol, reduced-dose protocol with ASIR-V achieved 12.8% to 34.0% of dose reduction and showed images of lower noise (9.22 vs. 10.73, P = 0.043) and higher CNR in different levels (centrum semiovale, 2.14 vs. 1.52, P = 0.003; basal ganglia, 1.46 vs. 1.07, P = 0.001; and cerebellum, 2.18 vs. 1.33, P < 0.001). Qualitative analysis showed higher gray-white matter differentiation and sharpness and preserved overall diagnostic quality in the images with ASIR-V. Use of ASIR-V allowed a 12.8% to 34.0% dose reduction in each age group with potential to improve image quality. (orig.)

  13. Technical Analysis of SSP-21 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-09

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.

  14. Formal analysis of a fair payment protocol

    NARCIS (Netherlands)

    J.G. Cederquist; M.T. Dashti (Mohammad)

    2004-01-01

    textabstractWe formally specify a payment protocol. This protocol is intended for fair exchange of time-sensitive data. Here the ?-CRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free ?-calculus. These properties are then verified

  15. Taxonomy and Analysis of IP Micro-Mobility Protocols in Single and Simultaneous Movements Scenarios

    Directory of Open Access Journals (Sweden)

    G. De Marco

    2007-01-01

    Full Text Available The micro-mobility is an important aspect in mobile communications, where the applications are anywhere and used anytime. One of the problems of micro-mobility is the hand-off latency. In this paper, we analyse two solutions for IP micro-mobility by means of a general taxonomy. The first one is based on the Stream Control Transmission Protocol (SCTP, which allows the dynamic address configuration of an association. The second one is based on the Session Initiation Protocol (SIP, which is the most popular protocol for multimedia communications over IP networks. We show that for the SCTP solution, there is room for further optimisations of the hand-off latency by adding slight changes to the protocol. However, as full end-to-end solution, SCTP is not able to handle simultaneous movement of hosts, whose probability in general cannot be neglected. On the other hand, the SIP can handle both single and simultaneous movements cases, although the hand-off latency can increase with respect to the SCTP solution. We show that for a correct and fast hand-off, the SIP server should be statefull.

  16. Fibred Coalgebraic Logic and Quantum Protocols

    Directory of Open Access Journals (Sweden)

    Daniel Marsden

    2014-12-01

    Full Text Available Motivated by applications in modelling quantum systems using coalgebraic techniques, we introduce a fibred coalgebraic logic. Our approach extends the conventional predicate lifting semantics with additional modalities relating conditions on different fibres. As this fibred setting will typically involve multiple signature functors, the logic incorporates a calculus of modalities enabling the construction of new modalities using various composition operations. We extend the semantics of coalgebraic logic to this setting, and prove that this extension respects behavioural equivalence. We show how properties of the semantics of modalities are preserved under composition operations, and then apply the calculational aspect of our logic to produce an expressive set of modalities for reasoning about quantum systems, building these modalities up from simpler components. We then demonstrate how these modalities can describe some standard quantum protocols. The novel features of our logic are shown to allow for a uniform description of unitary evolution, and support local reasoning such as "Alice's qubit satisfies condition" as is common when discussing quantum protocols.

  17. A novel multi-drug metronomic chemotherapy significantly delays tumor growth in mice.

    Science.gov (United States)

    Tagliamonte, Maria; Petrizzo, Annacarmen; Napolitano, Maria; Luciano, Antonio; Rea, Domenica; Barbieri, Antonio; Arra, Claudio; Maiolino, Piera; Tornesello, Marialina; Ciliberto, Gennaro; Buonaguro, Franco M; Buonaguro, Luigi

    2016-02-24

    The tumor immunosuppressive microenvironment represents a major obstacle to an effective tumor-specific cellular immune response. In the present study, the counterbalance effect of a novel metronomic chemotherapy protocol on such an immunosuppressive microenvironment was evaluated in a mouse model upon sub-cutaneous ectopic implantation of B16 melanoma cells. The chemotherapy consisted of a novel multi-drug cocktail including taxanes and alkylating agents, administered in a daily metronomic fashion. The newly designed strategy was shown to be safe, well tolerated and significantly efficacious. Treated animals showed a remarkable delay in tumor growth and prolonged survival as compared to control group. Such an effect was directly correlated with CD4(+) T cell reduction and CD8(+) T cell increase. Furthermore, a significant reduction in the percentage of both CD25(+)FoxP3(+) and CD25(+)CD127(low) regulatory T cell population was found both in the spleens and in the tumor lesions. Finally, the metronomic chemotherapy induced an intrinsic CD8(+) T cell response specific to B16 naturally expressed Trp2 TAA. The novel multi-drug daily metronomic chemotherapy evaluated in the present study was very effective in counterbalancing the immunosuppressive tumor microenvironment. Consequently, the intrinsic anti-tumor T cell immunity could exert its function, targeting specific TAA and significantly containing tumor growth. Overall, the results show that this represents a promising adjuvant approach to significantly enhance efficacy of intrinsic or vaccine-elicited tumor-specific cellular immunity.

  18. A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing

    Directory of Open Access Journals (Sweden)

    Jue-Sam Chou

    2012-01-01

    Full Text Available Oblivious transfer (OT protocols mainly contain three categories: 1-out-of-2 OT, 1-out-of-n OT, and k-out-of-n OT. In most cases, they are treated as cryptographic primitives and are usually executed without consideration of possible attacks that might frequently occur in an open network, such as an impersonation, replaying, or man-in-the-middle attack. Therefore, when used in certain applications, such as mental poker games and fair contract signings, some extra mechanisms must be combined to ensure the security of the protocol. However, after a combination, we found that very few of the resulting schemes are efficient enough in terms of communicational cost, which is a significant concern for generic commercial transactions. Therefore, we propose a novel k-out-of-n oblivious transfer protocol based on bilinear pairing, which not only satisfies the requirements of a k-out-of-n OT protocol, but also provides mutual authentication to resist malicious attacks. Meanwhile, it is efficient in terms of communication cost.

  19. A technology training protocol for meeting QSEN goals: Focusing on meaningful learning.

    Science.gov (United States)

    Luo, Shuhong; Kalman, Melanie

    2018-01-01

    The purpose of this paper is to describe and discuss how we designed and developed a 12-step technology training protocol. The protocol is meant to improve meaningful learning in technology education so that nursing students are able to meet the informatics requirements of Quality and Safety Education in Nursing competencies. When designing and developing the training protocol, we used a simplified experiential learning model that addressed the core features of meaningful learning: to connect new knowledge with students' prior knowledge and real-world workflow. Before training, we identified students' prior knowledge and workflow tasks. During training, students learned by doing, reflected on their prior computer skills and workflow, designed individualized procedures for integration into their workflow, and practiced the self-designed procedures in real-world settings. The trainer was a facilitator who provided a meaningful learning environment, asked the right questions to guide reflective conversation, and offered scaffoldings at critical moments. This training protocol could significantly improve nurses' competencies in using technologies and increase their desire to adopt new technologies. © 2017 Wiley Periodicals, Inc.

  20. Improving the quality of perinatal mental health: a health visitor-led protocol.

    Science.gov (United States)

    Lewis, Anne; Ilot, Irene; Lekka, Chrysanthi; Oluboyede, Yemi

    2011-02-01

    The mental health of mothers is of significant concern to community practitioners. This paper reports on a case study exploring the success factors of a well established, health visitor-led protocol to identify and treat women with mild to moderate depression. Data were collected through interviews with a purposive sample of 12 community practitioners, a focus group of four health visitors and observation of a multidisciplinary steering group meeting. The protocol was described as an evidence-based tool and safety net that could be used flexibly to support clinical judgments and tailored to individual needs. Success factors included frontline clinician engagement and ownership, continuity of leadership to drive development and maintain momentum, comprehensive and on-going staff training, and strategic support for the protocol as a quality indicator at a time of organisational change. Quality and clinical leadership are continuing policy priorities. The protocol enabled frontline staff to lead a service innovation, providing a standardised multiprofessional approach to women's mental health needs through effective support, advice and treatment that can be measured and quality assured.