WorldWideScience

Sample records for protocol significantly increased

  1. Longer repetition duration increases muscle activation and blood lactate response in matched resistance training protocols

    Directory of Open Access Journals (Sweden)

    Hugo Cesar Martins-Costa

    2016-03-01

    Full Text Available Abstract This study analyzed the effect of different repetition durations on electromyographic and blood lactate responses of the bench press exercise. Fifteen recreationally trained male volunteers completed two training protocols, matched for intensity (% one-repetition maximum; 1RM, number of sets, number of repetitions, and rest intervals. One of the protocols was performed with a repetition duration of 4 s (2 s concentric: 2 s eccentric; 2:2 protocol, whereas the second protocol had a repetition duration of 6 s (2 s concentric: 4 s eccentric; 2:4 protocol. The results showed higher normalized integrated electromyography (pectoralis major and triceps brachii for the 2:4 protocol. Blood lactate concentration was also higher in the 2:4 protocol across all sets. These results show that adding 2 s to the eccentric action in matched training protocols increases muscle activation and blood lactate response, which reinforces the notion that increasing repetition duration is an alternative load progression in resistance training.

  2. A minimal cost micropropagation protocol for Dianthus caryophyllus L.-- a commercially significant venture.

    Science.gov (United States)

    Pant, Manu

    2016-03-01

    In tissue culture, high production cost of the products restricts their reach. Though tissue culture is a major strength in floriculture it is marred by pricing issues. Hence, we developed a complete regeneration low cost micropropagation protocol for an economically important floriculture crop, carnation (Dianthus caryophyllus L.). Successful regeneration of carnation from nodal explants on cost-efficient medium indicates that psyllium husk, sugar and RO water can effectively replace the conventional medium comprising agar, sucrose and distilled water. The protocol can contribute to increased carnation production at comparatively reduced cost, and there by encourage wide scale adoption by the common growers.

  3. PROTOCOLS FOR INCREASING THE LIFETIME OF NODES OF AD HOC WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    B.Malarkodi

    2010-03-01

    Full Text Available Power consumption of nodes in ad hoc networks is a critical issue as they predominantly operate on batteries. In order to improve the lifetime of an ad hoc network, all the nodes must be utilized evenly and the power required for connections must be minimized. Energy management deals with the process of managing energy resources by means of controlling the battery discharge, adjusting the transmission power and scheduling of power sources so as to increase the lifetime of the nodes of an ad hoc wireless network. In this paper, two protocols are proposed to improve the lifetime of the nodes. The first protocol assumes smart battery packages with L cells and uses dynamic programming (DP to optimally select the set of cells used to satisfy a request for power. The second one proposes a MAC layer protocol denoted as Power Aware medium Access Control (PAMAC protocol which enables the network layer to select a route with minimum total power requirement among the possible routes between a source and a destination provided all nodes in the routes have battery capacity above a threshold. The life time of the nodes using the DP based scheduling policy is found through simulation and compared with that obtained using the techniques reported in the literature. It is found that DP based policy increases the lifetime of the mobile nodes by a factor of 1.15 to 1.8. The life expectancy, the average power consumption and throughput of the network using PAMAC protocol are computed through simulation and compared with that of the other MAC layer protocols 802.11, MACA, and CSMA. Besides this, the life expectancy and average power consumption of the network for different values of threshold are also compared. From the simulation results, it is observed that PAMAC consumes the least power and provides the longest lifetime among the various MAC Layer protocols. Moreover, using PAMAC as the MAC layer protocol, the performance obtained using different routing layer

  4. Augmented Quadruple-Phase Contrast Media Administration and Triphasic Scan Protocol Increases Image Quality at Reduced Radiation Dose During Computed Tomography Urography.

    Science.gov (United States)

    Saade, Charbel; Mohamad, May; Kerek, Racha; Hamieh, Nadine; Alsheikh Deeb, Ibrahim; El-Achkar, Bassam; Tamim, Hani; Abdul Razzak, Farah; Haddad, Maurice; Abi-Ghanem, Alain S; El-Merhi, Fadi

    The aim of this article was to investigate the opacification of the renal vasculature and the urogenital system during computed tomography urography by using a quadruple-phase contrast media in a triphasic scan protocol. A total of 200 patients with possible urinary tract abnormalities were equally divided between 2 protocols. Protocol A used the conventional single bolus and quadruple-phase scan protocol (pre, arterial, venous, and delayed), retrospectively. Protocol B included a quadruple-phase contrast media injection with a triphasic scan protocol (pre, arterial and combined venous, and delayed), prospectively. Each protocol used 100 mL contrast and saline at a flow rate of 4.5 mL. Attenuation profiles and contrast-to-noise ratio of the renal arteries, veins, and urogenital tract were measured. Effective radiation dose calculation, data analysis by independent sample t test, receiver operating characteristic, and visual grading characteristic analyses were performed. In arterial circulation, only the inferior interlobular arteries in both protocols showed a statistical significance (P contrast-to-noise ratio than protocol A (protocol B: 22.68 ± 13.72; protocol A: 14.75 ± 5.76; P contrast media and triphasic scan protocol usage increases the image quality at a reduced radiation dose.

  5. Transabdominal cerclage: the significance of dual pathology and increased preterm delivery.

    Science.gov (United States)

    Farquharson, Roy G; Topping, Joanne; Quenby, Siobhan M

    2005-10-01

    Transabdominal cerclage is a recognised treatment for cervical weakness with a history of recurrent mid-trimester loss and a failed elective vaginal suture. The emergence of dual pathology, such as antiphospholipid syndrome and bacterial vaginosis, is associated with an increased risk of preterm delivery (RR 2.34, 95% CI 1.15-5.8). The first 40 cases are described where strict adherence to an investigation protocol and consistent treatment plan has been implemented.

  6. Understanding protocol performance: impact of test performance.

    Science.gov (United States)

    Turner, Robert G

    2013-01-01

    This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as

  7. Gas revenue increasingly significant

    International Nuclear Information System (INIS)

    Megill, R.E.

    1991-01-01

    This paper briefly describes the wellhead prices of natural gas compared to crude oil over the past 70 years. Although natural gas prices have never reached price parity with crude oil, the relative value of a gas BTU has been increasing. It is one of the reasons that the total amount of money coming from natural gas wells is becoming more significant. From 1920 to 1955 the revenue at the wellhead for natural gas was only about 10% of the money received by producers. Most of the money needed for exploration, development, and production came from crude oil. At present, however, over 40% of the money from the upstream portion of the petroleum industry is from natural gas. As a result, in a few short years natural gas may become 50% of the money revenues generated from wellhead production facilities

  8. Design and Implementation of a Secure Modbus Protocol

    Science.gov (United States)

    Fovino, Igor Nai; Carcano, Andrea; Masera, Marcelo; Trombetta, Alberto

    The interconnectivity of modern and legacy supervisory control and data acquisition (SCADA) systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This paper describes a secure version of the Modbus SCADA protocol that incorporates integrity, authentication, non-repudiation and anti-replay mechanisms. Experimental results using a power plant testbed indicate that the augmented protocol provides good security functionality without significant overhead.

  9. The effect of personalized versus standard patient protocols for radiostereometric analysis (RSA)

    DEFF Research Database (Denmark)

    Muharemovic, O; Troelsen, A; Thomsen, M G

    2018-01-01

    INTRODUCTION: Increasing pressure in the clinic requires a more standardized approach to radiostereometric analysis (RSA) imaging. The aim of this study was to investigate whether implementation of personalized RSA patient protocols could increase image quality and decrease examination time...... imaging. Radiographers in the control group used a standard RSA protocol. RESULTS: At three months, radiographers in the case group significantly reduced (p .... No significant improvements were found in the control group at any time point. CONCLUSION: There is strong evidence that personalized RSA patient protocols have a positive effect on image quality and radiation dose savings. Implementation of personal patient protocols as a RSA standard will contribute...

  10. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  11. Inhibition of angiotensin-converting enzyme increases oestradiol production in ewes submitted to oestrous synchronization protocol.

    Science.gov (United States)

    Costa, A s; Junior, A S; Viana, G E N; Muratori, M C S; Reis, A M; Costa, A P R

    2014-10-01

    This study aimed at evaluating the effects of angiotensin-converting enzyme inhibitor (enalapril) and angiotensin II antagonist (valsartan) on the oestradiol and progesterone production in ewes submitted to oestrous synchronization protocol. The animals were weighed and randomly divided into three groups (n = 7). A pre-experiment conducted to verify the effectiveness and toxicity of enalapril (0.5 mg/kg LW) and valsartan (2.2 mg/kg LW) showed that, in the doses used, these drugs were effective in reducing blood pressure without producing toxic effects. In the experiment, all animals were subjected to oestrous synchronization protocol during 12 days. On D10, D11 and D12, animals received saline, enalapril or valsartan (same doses of the pre-experiment), according to the group randomly divided. The hormonal analysis showed an increase in oestradiol on the last day of the protocol (D12) in animals that received enalapril (p progesterone in any of the treatments. It is concluded that valsartan and enalapril are safe and effective subcutaneously for use in sheep and that the angiotensin-converting enzyme (ACE) inhibition with enalapril leads to an increase in oestradiol production near ovulation without changing the concentration of progesterone. This shows that ACE inhibition may be a useful tool in reproductive biotechnologies involving induction and synchronization of oestrus and ovulation in sheep. © 2014 Blackwell Verlag GmbH.

  12. Development of a neuromuscular electrical stimulation protocol for sprint training.

    Science.gov (United States)

    Russ, David W; Clark, Brian C; Krause, Jodi; Hagerman, Fredrick C

    2012-09-01

    Sprint training is associated with several beneficial adaptations in skeletal muscle, including an enhancement of sarcoplasmic reticulum (SR) Ca(2+) release. Unfortunately, several patient populations (e.g., the elderly, those with cardiac dysfunction) that might derive great benefit from sprint exercise are unlikely to tolerate it. The purpose of this report was to describe the development of a tolerable neuromuscular electrical stimulation (NMES) protocol that induces skeletal muscle adaptations similar to those observed with sprint training. Our NMES protocol was modeled after a published sprint exercise protocol and used a novel electrode configuration and stimulation sequence to provide adequate training stimulus while maintaining subject tolerance. Nine young, healthy subjects (four men) began and completed the training protocol of the knee extensor muscles. All subjects completed the protocol, with ratings of discomfort far less than those reported in studies of traditional NMES. Training induced significant increases in SR Ca(2+) release and citrate synthase activity (~16% and 32%, respectively), but SR Ca(2+) uptake did not change. The percentage of myosin heavy chain IIx isoform was decreased significantly after training. At the whole muscle level, neither central activation nor maximum voluntary isometric contraction force were significantly altered, although isometric force did exhibit a trend toward an increase (~3%, P = 0.055). Surprisingly, the NMES training produced a significant increase in muscle cross-sectional area (~3%, P = 0.04). It seems that an appropriately designed NMES protocol can mimic many of the benefits of sprint exercise training, with a low overall time commitment and training volume. These findings suggest that NMES has the potential to bring the benefits of sprint exercise to individuals who are unable to tolerate traditional sprint training.

  13. Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    Woo-Yong Choi

    2009-01-01

    Full Text Available We propose the efficient reliable multicast MAC protocol based on the connectivity information among the recipients. Enhancing the BMMM (Batch Mode Multicast MAC protocol, the reliable multicast MAC protocol significantly reduces the RAK (Request for ACK frame transmissions in a reasonable computational time and enhances the MAC performance. By the analytical performance analysis, the throughputs of the BMMM protocol and our proposed MAC protocol are derived. Numerical examples show that our proposed MAC protocol increases the reliable multicast MAC performance for IEEE 802.11 wireless LANs.

  14. Analysis of Security Protocols by Annotations

    DEFF Research Database (Denmark)

    Gao, Han

    . The development of formal techniques, e.g. control flow analyses, that can check various security properties, is an important tool to meet this challenge. This dissertation contributes to the development of such techniques. In this dissertation, security protocols are modelled in the process calculus LYSA......The trend in Information Technology is that distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great...... deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal. It has long been a challenge to determine conclusively whether a given protocol is secure or not...

  15. The Importance of the Montreal Protocol in Protecting the Earth's Hydroclimate

    Science.gov (United States)

    Seager, R.; Wu, Y.; Polvani, L. M.

    2012-12-01

    The 1987 Montreal Protocol regulating emissions of ozone depleting chlorofluorocarbons (CFCs) was motivated primarily by the harm to human health and ecosystems arising from increased exposure to ultraviolet-B (UV-B) radiation associated with depletion from the ozone layer. It is now known that the Montreal Protocol has reduced global warming since CFCs are greenhouse gases (GHGs). In this paper we show that the Montreal Protocol also significantly protects the Earth's hydroclimate, even though this was also not a motivating factor in the decision-making that led to the Protocol. General Circulation Model (GCM) results show that in the coming decade (2020-29), under the 'World Avoided' scenario of no regulations on CFC emissions, the subtropical dry zones would in general get drier, and the middle and high latitude regions wetter. This change is similar, in both pattern and magnitude, to that in the coming decade caused by projected increases in carbon dioxide concentrations. This implies that because of the Montreal Protocol, and the ozone depletion and global warming associated with CFCs thus avoided, the hydrological cycle changes in the coming decade will be significantly less than what they otherwise would have been.

  16. HIGH-VELOCITY RESISTANCE EXERCISE PROTOCOLS IN OLDER WOMEN: EFFECTS ON CARDIOVASCULAR RESPONSE

    Directory of Open Access Journals (Sweden)

    Rodrigo P. da Silva

    2007-12-01

    Full Text Available Acute cardiovascular responses to different high-velocity resistance exercise protocols were compared in untrained older women. Twelve apparently healthy volunteers (62.6 ± 2.9 y performed three different protocols in the bench press (BP. All protocols involved three sets of 10 repetitions performed with a 10RM load and 2 minutes of rest between sets. The continuous protocol (CP involved ten repetitions with no pause between repetitions. The discontinuous protocols were performed with a pause of five (DP5 or 15 (DP15 seconds between the fifth and sixth repetitions. Heart rate (HR, systolic blood pressure (SBP, rate pressure product (RPP, Rating of Perceived Exertion (RPE, and blood lactate (BLa were assessed at baseline and at the end of all exercise sets. Factorial ANOVA was used to compare the cardiovascular response among different protocols. Compared to baseline, HR and RPP were significantly (p < 0.05 higher after the third set in all protocols. HR and RPP were significantly (p < 0.05 lower in DP5 and DP15 compared with CP for the BP exercise. Compared to baseline, RPE increased significantly (p < 0.05 with each subsequent set in all protocols. Blood lactate concentration during DP5 and DP15 was significantly lower than CP. It appears that discontinuous high-velocity resistance exercise has a lower cardiovascular demand than continuous resistance exercise in older women

  17. MR efficiency using automated MRI-desktop eProtocol

    Science.gov (United States)

    Gao, Fei; Xu, Yanzhe; Panda, Anshuman; Zhang, Min; Hanson, James; Su, Congzhe; Wu, Teresa; Pavlicek, William; James, Judy R.

    2017-03-01

    MRI protocols are instruction sheets that radiology technologists use in routine clinical practice for guidance (e.g., slice position, acquisition parameters etc.). In Mayo Clinic Arizona (MCA), there are over 900 MR protocols (ranging across neuro, body, cardiac, breast etc.) which makes maintaining and updating the protocol instructions a labor intensive effort. The task is even more challenging given different vendors (Siemens, GE etc.). This is a universal problem faced by all the hospitals and/or medical research institutions. To increase the efficiency of the MR practice, we designed and implemented a web-based platform (eProtocol) to automate the management of MRI protocols. It is built upon a database that automatically extracts protocol information from DICOM compliant images and provides a user-friendly interface to the technologists to create, edit and update the protocols. Advanced operations such as protocol migrations from scanner to scanner and capability to upload Multimedia content were also implemented. To the best of our knowledge, eProtocol is the first MR protocol automated management tool used clinically. It is expected that this platform will significantly improve the radiology operations efficiency including better image quality and exam consistency, fewer repeat examinations and less acquisition errors. These protocols instructions will be readily available to the technologists during scans. In addition, this web-based platform can be extended to other imaging modalities such as CT, Mammography, and Interventional Radiology and different vendors for imaging protocol management.

  18. Increasing organ donation via anticipated regret (INORDAR: protocol for a randomised controlled trial

    Directory of Open Access Journals (Sweden)

    O'Carroll Ronan E

    2012-03-01

    Full Text Available Abstract Background Throughout the world there is an insufficient supply of donor organs to meet the demand for organ transplantations. This paper presents a protocol for a randomised controlled trial, testing whether a simple, theory-based anticipated regret manipulation leads to a significant increase in posthumous organ donor registrations. Methods We will use a between-groups, prospective randomised controlled design. A random sample of 14,520 members of the adult Scottish general public will be contacted via post. These participants will be randomly allocated into 1 of the 4 conditions. The no questionnaire control (NQC group will simply receive a letter and donor registration form. The questionnaire control (QC arm will receive a questionnaire measuring their emotions and non-cognitive affective attitudes towards organ donation. The theory of planned behavior (TPB group will complete the emotions and affective attitudes questionnaire plus additional items assessing their cognitive attitudes towards organ donation, perceived control over registration and how they think significant others view this action. Finally, the anticipated regret (AR group will complete the same indices as the TPB group, plus two additional anticipated regret items. These items will assess the extent to which the participant anticipates regret for not registering as an organ donor in the near future. The outcome variable will be NHS Blood and Transplant verified registrations as an organ donor within 6 months of receiving our postal intervention. Discussion This study will assess whether simply asking people to reflect on the extent to which they may anticipate regret for not registering as an organ donor increases organ donor registration 6 months later. If successful, this simple and easy to administer theory-based intervention has the potential to save lives and money for the NHS by reducing the number of people receiving treatments such as dialysis. This

  19. A clinical protocol to increase chewing and assess mastication in children with feeding disorders.

    Science.gov (United States)

    Volkert, Valerie M; Peterson, Kathryn M; Zeleny, Jason R; Piazza, Cathleen C

    2014-09-01

    Children with feeding disorders often cannot or do not chew when presented with table food. Children with chewing deficits also often swallow the bite before masticating it appropriately, which we will refer to as early swallowing. In the current study, we evaluated a clinical protocol to increase chews per bite, assess mastication, and eliminate early swallowing with three children with feeding disorders. The current study adds to a small body of literature on chewing and mastication of children with feeding disorders. Suggestions for future research are also discussed. © The Author(s) 2014.

  20. Increased Body Mass Index during Therapy for Childhood Acute Lymphoblastic Leukemia: A Significant and Underestimated Complication

    Directory of Open Access Journals (Sweden)

    Helen C. Atkinson

    2015-01-01

    Full Text Available Objective & Design. We undertook a retrospective review of children diagnosed with acute lymphoblastic leukemia (ALL and treated with modern COG protocols (n=80 to determine longitudinal changes in body mass index (BMI and the prevalence of obesity compared with a healthy reference population. Results. At diagnosis, the majority of patients (77.5% were in the healthy weight category. During treatment, increases in BMI z-scores were greater for females than males; the prevalence of obesity increased from 10.3% to 44.8% (P<0.004 for females but remained relatively unchanged for males (9.8% to 13.7%, P=0.7. Longitudinal analysis using linear mixed-effects identified associations between BMI z-scores and time-dependent interactions with sex (P=0.0005, disease risk (P<0.0001, age (P=0.0001, and BMI z-score (P<0.0001 at diagnosis and total dose of steroid during maintenance (P=0.01. Predicted mean BMI z-scores at the end of therapy were greater for females with standard risk ALL irrespective of age at diagnosis and for males younger than 4 years of age at diagnosis with standard risk ALL. Conclusion. Females treated on standard risk protocols and younger males may be at greatest risk of becoming obese during treatment for ALL. These subgroups may benefit from intervention strategies to manage BMI during treatment for ALL.

  1. Anti-Mullerian hormone-tailored stimulation protocols improve outcomes whilst reducing adverse effects and costs of IVF.

    Science.gov (United States)

    Yates, A P; Rustamov, O; Roberts, S A; Lim, H Y N; Pemberton, P W; Smith, A; Nardo, L G

    2011-09-01

    Anti-Müllerian hormone (AMH) is increasingly used to quantify ovarian reserve, but it has not yet realized its full clinical potential in assisted reproduction technology. We investigated the possible benefits of using novel, stratified ovarian hyperstimulation protocols, tailored to individual AMH levels, compared with conventional stimulation. Retrospective data were collected from 769 women (first cycle of IVF, using fresh embryos), in a UK tertiary care unit: 346 women using conventional stimulation protocols; 423 women treated under new AMH-tailored protocols. Embryo transfer rates increased significantly (79-87%: P= 0.002) after the introduction of AMH-tailored stimulation protocols. Pregnancy rate per cycle started and live birth rate also increased significantly compared with conventionally treated women (17.9-27.7%, P= 0.002 and 15.9-23.9%, P = 0.007, respectively). Moreover, in the AMH group, the incidence of the ovarian hyperstimulation syndrome (OHSS) fell significantly (6.9-2.3%, P = 0.002) and failed fertilization fell from 7.8 to 4.5%. The cost of fertility drug treatment fell by 29% per patient and the overall cost of clinical management of OHSS fell by 43% in the AMH group. GnRH antagonist protocols, introduced as part of AMH-tailored treatment, may have contributed to the observed improvements: however, within the AMH-tailored group, the live birth rate was not significantly different between agonist and antagonist-treated groups. Although large, prospective, multicentre studies are indicated, we have clearly demonstrated that individualized, AMH-guided, controlled ovarian hyperstimulation protocols significantly improved positive clinical outcomes, reduced the incidence of complications and reduced the financial burden associated with assisted reproduction.

  2. The effect of personalized versus standard patient protocols for radiostereometric analysis (RSA).

    Science.gov (United States)

    Muharemovic, O; Troelsen, A; Thomsen, M G; Kallemose, T; Gosvig, K K

    2018-05-01

    Increasing pressure in the clinic requires a more standardized approach to radiostereometric analysis (RSA) imaging. The aim of this study was to investigate whether implementation of personalized RSA patient protocols could increase image quality and decrease examination time and the number of exposure repetitions. Forty patients undergoing primary total hip arthroplasty were equally randomized to either a case or a control group. Radiographers in the case group were assisted by personalized patient protocols containing information about each patient's post-operative RSA imaging. Radiographers in the control group used a standard RSA protocol. At three months, radiographers in the case group significantly reduced (p RSA patient protocols have a positive effect on image quality and radiation dose savings. Implementation of personal patient protocols as a RSA standard will contribute to the reduction of examination time, thus ensuring a cost benefit for department and patient safety. Copyright © 2017 The College of Radiographers. Published by Elsevier Ltd. All rights reserved.

  3. Peak oxygen uptake in a sprint interval testing protocol vs. maximal oxygen uptake in an incremental testing protocol and their relationship with cross-country mountain biking performance.

    Science.gov (United States)

    Hebisz, Rafał; Hebisz, Paulina; Zatoń, Marek; Michalik, Kamil

    2017-04-01

    In the literature, the exercise capacity of cyclists is typically assessed using incremental and endurance exercise tests. The aim of the present study was to confirm whether peak oxygen uptake (V̇O 2peak ) attained in a sprint interval testing protocol correlates with cycling performance, and whether it corresponds to maximal oxygen uptake (V̇O 2max ) determined by an incremental testing protocol. A sample of 28 trained mountain bike cyclists executed 3 performance tests: (i) incremental testing protocol (ITP) in which the participant cycled to volitional exhaustion, (ii) sprint interval testing protocol (SITP) composed of four 30 s maximal intensity cycling bouts interspersed with 90 s recovery periods, (iii) competition in a simulated mountain biking race. Oxygen uptake, pulmonary ventilation, work, and power output were measured during the ITP and SITP with postexercise blood lactate and hydrogen ion concentrations collected. Race times were recorded. No significant inter-individual differences were observed in regards to any of the ITP-associated variables. However, 9 individuals presented significantly increased oxygen uptake, pulmonary ventilation, and work output in the SITP compared with the remaining cyclists. In addition, in this group of 9 cyclists, oxygen uptake in SITP was significantly higher than in ITP. After the simulated race, this group of 9 cyclists achieved significantly better competition times (99.5 ± 5.2 min) than the other cyclists (110.5 ± 6.7 min). We conclude that mountain bike cyclists who demonstrate higher peak oxygen uptake in a sprint interval testing protocol than maximal oxygen uptake attained in an incremental testing protocol demonstrate superior competitive performance.

  4. Acute effects of various weighted bat warm-up protocols on bat velocity.

    Science.gov (United States)

    Reyes, G Francis; Dolny, Dennis

    2009-10-01

    Although research has provided evidence of increased muscular performance following a facilitation set of resistance exercise, this has not been established for use prior to measuring baseball bat velocity. The purpose of this study was to determine the effectiveness of selected weighted bat warm-up protocols to enhance bat velocity in collegiate baseball players. Nineteen collegiate baseball players (age = 20.15 +/- 1.46 years) were tested for upper-body strength by a 3-repetition maximum (RM) bench press (mean = 97.98 +/- 14.54 kg) and mean bat velocity. Nine weighted bat warm-up protocols, utilizing 3 weighted bats (light = 794 g; standard = 850 g; heavy = 1,531 g) were swung in 3 sets of 6 repetitions in different orders. A control trial involved the warm-up protocol utilizing only the standard bat. Pearson product correlation revealed a significant relationship between 3RM strength and pretest bat velocity (r = 0.51, p = 0.01). Repeated measures analysis of variance (ANOVA) revealed no significant treatment effects of warm-up protocol on bat velocity. However, the order of standard, light, heavy bat sequence resulted in the greatest increase in bat velocity (+6.03%). These results suggest that upper-body muscle strength influences bat velocity. It appears that the standard, light, heavy warm-up order may provide the greatest benefit to increase subsequent bat velocity and may warrant use in game situations.

  5. Upper Limb Static-Stretching Protocol Decreases Maximal Concentric Jump Performance

    Directory of Open Access Journals (Sweden)

    Paulo H. Marchetti

    2014-12-01

    Full Text Available The purpose of the present study was to evaluate the acute effects of an upper limb static-stretching (SS protocol on the maximal concentric jump performance. We recruited 25 young healthy, male, resistance trained individuals (stretched group, n = 15 and control group, n = 10 in this study. The randomized between group experimental protocol consisted of a three trials of maximal concentric jump task, before and after a SS of the upper limb. Vertical ground reaction forces (vGRF and surface electromyography (sEMG of both gastrocnemius lateralis (GL and vastus lateralis (VL were acquired. An extensive SS was employed consisting of ten stretches of 30 seconds, with 15 seconds of rest, and 70-90% of the point of discomfort (POD. ANOVA (2x2 (group x condition was used for shoulder joint range of motion (ROM, vGRF and sEMG. A significant interaction for passive ROM of the shoulder joint revealed significant increases between pre- and post-SS protocol (p < 0.001. A significant interaction demonstrated decreased peak force and an increased peak propulsion duration between pre- and post-stretching only for stretch group (p = 0.021, and p = 0.024, respectively. There was a significant main effect between groups (stretch and control for peak force for control group (p = 0.045. Regarding sEMG variables, there were no significant differences between groups (control versus stretched or condition (pre-stretching versus post-stretching for the peak amplitude of RMS and IEMG for both muscles (VL and GL. In conclusion, an acute extensive SS can increase the shoulder ROM, and negatively affect both the propulsion duration and peak force of the maximal concentric jump, without providing significant changes in muscle activation.

  6. Difference between early versus delayed postoperative physical rehabilitation protocol following arthroscopic rotator cuff repair

    Directory of Open Access Journals (Sweden)

    Samar M Fawzy

    2016-01-01

    Conclusion Significant improvement in pain, ROM, and function after arthroscopic rotator cuff repair was seen at 1 year postoperatively, regardless of early or delayed postoperative rehabilitation protocols. However, early motion increases pain scores and may increase the possibility of rotator cuff retear but with early regain of ROM. A delayed rehabilitation protocol with immobilization for 6 weeks would be better for tendon healing without risk for retear or joint stiffness and easily convalescence with less postoperative pain.

  7. Implementing an Oxygen Supplementation and Monitoring Protocol on Inpatient Pediatric Bronchiolitis: An Exercise in Deimplementation

    Directory of Open Access Journals (Sweden)

    Brian LeCleir

    2017-01-01

    Full Text Available Aim. Our goal in this study is to evaluate the effectiveness of our oxygen (O2 protocol to reduce length of stay (LOS for children hospitalized with bronchiolitis. Methods. In this retrospective cohort study, the outcomes of children ≤ 24 months old that were admitted with bronchiolitis and placed on the O2 protocol were compared to historical controls. The primary outcome was hospital length of stay. Secondary outcomes were duration of O2 supplementation, rates of pediatric intensive care unit transfer, and readmission. Results. Groups were not significantly different in age, gender, and rates of respiratory distress score assessment. Significantly more severely ill patients were in the O2 protocol group. There were no significant differences between control and O2 protocol groups with regard to mean LOS, rates of pediatric intensive care unit transfer, or seven-day readmission rates. By multiple regression analysis, the use of the O2 protocol was associated with a nearly 20% significant decrease in the length of hospitalization (p=0.030. Conclusion. Use of O2 supplementation protocol increased LOS in the more ill patients with bronchiolitis but decreased overall LOS by having a profound effect on patients with mild bronchiolitis.

  8. Increased Arctic Deposition of Persistent Compounds as a Result of the Montreal Protocol

    Science.gov (United States)

    Young, C.; Pickard, H. M.; De Silva, A. O.; Spencer, C.; Criscitiello, A. S.; Muir, D.; Sharp, M. J.

    2017-12-01

    Perfluorocarboxylic acids (PFCAs) are among the diverse groups of compounds characterized as persistent organic pollutants. They are toxic, resistant to environmental degradation, and adversely impact human and environmental health. PFCAs with four or fewer carbons, short-chain PFCAs (scPFCAs), are of particular interest because of their increasing levels in the environment, toxicity to plants, and potential for accumulation in some aquatic ecosystems, making them an emerging environmental concern. A minor source of scPFCAs to the Arctic has been shown to be atmospheric transformation of fluoropolymer precursors, followed by deposition. Additional potential sources of scPFCAs to the Arctic are chlorofluorocarbon (CFC)-replacement compounds. Through analysis of an ice core from the Canadian High Arctic, we show that Montreal Protocol-mandated introduction of CFC-replacement compounds for the heat-transfer industry has led to increasing inputs of these scPFCAs to the remote environment. Flux measurements for scPFCAs as a class of contaminants have only been reported in a couple studies to date. Here, we provide the first multi-decadal temporal record of scPFCA deposition, demonstrating a dramatic increase in deposition resulting from emission of CFC-replacements. These results bring to the forefront a need for a holistic approach to environmental risk assessment that considers impacts of replacement substances and degradation products.

  9. Optimizing the high-resolution manometry (HRM) study protocol.

    Science.gov (United States)

    Patel, A; Ding, A; Mirza, F; Gyawali, C P

    2015-02-01

    Intolerance of the esophageal manometry catheter may prolong high-resolution manometry (HRM) studies and increase patient distress. We assessed the impact of obtaining the landmark phase at the end of the study when the patient has acclimatized to the HRM catheter. 366 patients (mean age 55.4 ± 0.8 years, 62.0% female) undergoing esophageal HRM over a 1-year period were studied. The standard protocol consisted of the landmark phase, 10 5 mL water swallows 20-30 s apart, and multiple rapid swallows where 4-6 2 mL swallows were administered in rapid succession. The modified protocol consisted of the landmark phase at the end of the study after test swallows. Study duration, technical characteristics, indications, and motor findings were compared between standard and modified protocols. Of the 366 patients, 89.6% underwent the standard protocol (study duration 12.9 ± 0.3 min). In 10.4% with poor catheter tolerance undergoing the modified protocol, study duration was significantly longer (15.6 ± 1.0 min, p = 0.004) despite similar duration of study maneuvers. Only elevated upper esophageal sphincter basal pressures at the beginning of the study segregated modified protocol patients. The 95th percentile time to landmark phase in the standard protocol patients was 6.1 min; as many as 31.4% of modified protocol patients could not obtain their first study maneuver within this period (p = 0.0003). Interpretation was not impacted by shifting the landmark phase to the end of the study. Modification of the HRM study protocol with the landmark phase obtained at the end of the study optimizes study duration without compromising quality. © 2014 John Wiley & Sons Ltd.

  10. Extravascular Lung Water Does Not Increase in Hypovolemic Patients after a Fluid-Loading Protocol Guided by the Stroke Volume Variation

    Directory of Open Access Journals (Sweden)

    Carlos Ferrando

    2012-01-01

    Full Text Available Introduction. Circulatory failure secondary to hypovolemia is a common situation in critical care patients. Volume replacement is the first option for the treatment of hypovolemia. A possible complication of volume loading is pulmonary edema, quantified at the bedside by the measurement of extravascular lung water index (ELWI. ELWI predicts progression to acute lung injury (ALI in patients with risk factors for developing it. The aim of this study was to assess whether fluid loading guided by the stroke volume variation (SVV, in patients presumed to be hypovolemic, increased ELWI or not. Methods. Prospective study of 17 consecutive postoperative, fully mechanically ventilated patients diagnosed with circulatory failure secondary to presumed hypovolemia were included. Cardiac index (CI, ELWI, SVV, and global end-diastolic volume index (GEDI were determined using the transpulmonary thermodilution technique during the first 12 hours after fluid loading. Volume replacement was done with a strict hemodynamic protocol. Results. Fluid loading produced a significant increase in CI and a decrease in SVV. ELWI did not increase. No correlation was found between the amount of fluids administered and the change in ELWI. Conclusion. Fluid loading guided by SVV in hypovolemic and fully mechanically ventilated patients in sinus rhythm does not increase ELWI.

  11. Creatine Kinase and Lactate Dehydrogenase Responses After Different Resistance and Aerobic Exercise Protocols

    Directory of Open Access Journals (Sweden)

    Callegari Gustavo A.

    2017-08-01

    Full Text Available The aim of this study was to investigate the responses of creatine kinase (CK and lactate dehydrogenase (LDH after performing different resistance and aerobic exercise protocols. Twelve recreationally trained men (age, 23.2 ± 5.6 years; body mass, 84.3 ± 9.3 kg; body height, 178.9 ± 4.5 cm; and BMI, 26.3 ± 2.3 kg·m2 volunteered to participate in this study. All subjects were randomly assigned to four experimental protocols (crossover: (a aerobic training at 60% of VO2max, (b aerobic training at 80% of VO2max, (c a resistance exercise (RE session with a bi-set protocol, and (d an RE session with a multiple sets protocol. Blood samples were collected before, immediately after and 24 hours following the experimental protocols. After 24 hours, there was a significant increase in CK for the 80% of VO2max protocol vs. the bi-set RE session (p = 0.016. Immediately after the protocols, we observed a significant increase in LDH among certain groups compared to others, as follows: multiple sets RE session vs. 60% of VO2max, bi-set RE session vs. 60% of VO2max, multiple sets RE session vs. 80% of VO2max, and bi-set RE session vs. 80% of VO2max (p = 0.008, p = 0.013; p = 0.002, p = 0.004, respectively. In conclusion, aerobic exercise performed at 80% of VO2max appears to elevate plasma CK levels more than bi-set RE sessions. However, the bi-set and multiple sets RE sessions appeared to trigger greater levels of blood LDH compared to aerobic protocols performed at 60% and 80% of VO2max.

  12. Resource use and costs of type 2 diabetes patients receiving managed or protocolized primary care: a controlled clinical trial.

    Science.gov (United States)

    van der Heijden, Amber A W A; de Bruijne, Martine C; Feenstra, Talitha L; Dekker, Jacqueline M; Baan, Caroline A; Bosmans, Judith E; Bot, Sandra D M; Donker, Gé A; Nijpels, Giel

    2014-06-25

    The increasing prevalence of diabetes is associated with increased health care use and costs. Innovations to improve the quality of care, manage the increasing demand for health care and control the growth of health care costs are needed. The aim of this study is to evaluate the care process and costs of managed, protocolized and usual care for type 2 diabetes patients from a societal perspective. In two distinct regions of the Netherlands, both managed and protocolized diabetes care were implemented. Managed care was characterized by centralized organization, coordination, responsibility and centralized annual assessment. Protocolized care had a partly centralized organizational structure. Usual care was characterized by a decentralized organizational structure. Using a quasi-experimental control group pretest-posttest design, the care process (guideline adherence) and costs were compared between managed (n = 253), protocolized (n = 197), and usual care (n = 333). We made a distinction between direct health care costs, direct non-health care costs and indirect costs. Multivariate regression models were used to estimate differences in costs adjusted for confounding factors. Because of the skewed distribution of the costs, bootstrapping methods (5000 replications) with a bias-corrected and accelerated approach were used to estimate 95% confidence intervals (CI) around the differences in costs. Compared to usual and protocolized care, in managed care more patients were treated according to diabetes guidelines. Secondary health care use was higher in patients under usual care compared to managed and protocolized care. Compared to usual care, direct costs were significantly lower in managed care (€-1.181 (95% CI: -2.597 to -334)) while indirect costs were higher (€ 758 (95% CI: -353 to 2.701), although not significant. Direct, indirect and total costs were lower in protocolized care compared to usual care (though not significantly). Compared to usual care, managed

  13. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  14. Examining recombinant human TSH primed {sup 131}I therapy protocol in patients with metastatic differentiated thyroid carcinoma: comparison with the traditional thyroid hormone withdrawal protocol

    Energy Technology Data Exchange (ETDEWEB)

    Rani, Deepa; Kaisar, Sushma; Awasare, Sushma; Kamaldeep; Abhyankar, Amit; Basu, Sandip [Bhabha Atomic Research Centre (BARC), Radiation Medicine Centre, Mumbai (India)

    2014-09-15

    the difference was not found to be statistically significant (p = 0.301). The mean tumor radiation absorbed dose per mCi was less during the rhTSH protocol (6.04 rad/mCi) than during the thyroid hormone withdrawal protocol (8.68 rad/mCi), and the difference was statistically significant (p = 0.049), though visual analysis of the rhTSH posttherapy scans showed avid concentration of {sup 131}I in the metastatic sites and revealed more lesions in 30 % of the patients compared to the traditional large dose scan and equal number of lesions in 65 % of the patients. Visual analysis of the traditional large dose scan, rhTSH pretreatment scan, and rhTSH posttherapy scans showed that the traditional large dose scan is better compared to the rhTSH 1 mCi scan as it showed more lesions in 19 of 37 patients (51.35 %). rhTSH posttherapy scans were better compared to the traditional large dose scans and rhTSH pretreatment scans. More lesions were seen on rhTSH posttherapy scans in 11 of 37 patients (29.7 %) compared to the traditional large dose scans and in 24 of 37 (64.86 %) patients compared to the rhTSH 1 mCi scans. Our findings demonstrate that the rhTSH primed pretreatment scan undertaken at 24 h after diagnostic dose is suboptimal to evaluate whether a metastatic lesion concentrates {sup 131}I. The majority of these lesions demonstrated radioiodine accumulation in the posttreatment scan. Quality of life as assessed using EORTC QOL-3 forms clearly showed that rhTSH improved the quality of life of patients compared to the thyroid hormone withdrawal protocol. Functional scale and global health status were significantly better in the rhTSH protocol compared to the thyroid hormone withdrawal protocol (p < 0.001). The mean symptom scale score was significantly higher in the thyroid hormone withdrawal protocol (45.25) compared to the rhTSH protocol (13.59) (p < 0.001). Of the 20 patients, 4 (20 %) had more than 25 % increase in the TG value on follow-up. The median hospital stay of

  15. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Aquino de Muro, Marilena; Rapley, Ralph

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  16. Pulmonary CT angiography protocol adapted to the hemodynamic effects of pregnancy.

    LENUS (Irish Health Repository)

    Ridge, Carole A

    2012-02-01

    OBJECTIVE: The purpose of this study was to compare the image quality of a standard pulmonary CT angiography (CTA) protocol with a pulmonary CTA protocol optimized for use in pregnant patients with suspected pulmonary embolism (PE). MATERIALS AND METHODS: Forty-five consecutive pregnant patients with suspected PE were retrospectively included in the study: 25 patients (group A) underwent standard-protocol pulmonary CTA and 20 patients (group B) were imaged using a protocol modified for pregnancy. The modified protocol used a shallow inspiration breath-hold and a high concentration, high rate of injection, and high volume of contrast material. Objective image quality and subjective image quality were evaluated by measuring pulmonary arterial enhancement, determining whether there was transient interruption of the contrast bolus by unopacified blood from the inferior vena cava (IVC), and assessing diagnostic adequacy. RESULTS: Objective and subjective image quality were significantly better for group B-that is, for the group who underwent the CTA protocol optimized for pregnancy. Mean pulmonary arterial enhancement and the percentage of studies characterized as adequate for diagnosis were higher in group B than in group A: 321 +\\/- 148 HU (SD) versus 178 +\\/- 67 HU (p = 0.0001) and 90% versus 64% (p = 0.05), respectively. Transient interruption of contrast material by unopacified blood from the IVC was observed more frequently in group A (39%) than in group B (10%) (p = 0.05). CONCLUSION: A pulmonary CTA protocol optimized for pregnancy significantly improved image quality by increasing pulmonary arterial opacification, improving diagnostic adequacy, and decreasing transient interruption of the contrast bolus by unopacified blood from the IVC.

  17. Cost savings using a protocol approach to manage anemia in a hemodialysis unit.

    Science.gov (United States)

    Charlesworth, Emily C; Richardson, Robert M; Battistella, Marisa

    2014-01-01

    National guidelines recommend using anemia management protocols to guide treatment. The objective of this study was to determine if an anemia management protocol would improve hemoglobin (Hgb) indices in hemodialysis patients and to measure whether the protocol would reduce the use and cost of darbepoetin alfa (DBO) and intravenous (IV) iron in hemodialysis patients. An anemia management protocol was created and implemented for hemodialysis patients at our institution. A retrospective observational review of the use of DBO and IV iron as well as changes in Hgb, transferrin saturation and ferritin in 174 patients was conducted 6 months before and after implementation of the anemia protocol. The number of Hgb measurements in the target range increased from 44.3 to 46.0% (p = 0.48) after protocol implementation. The mean weekly dose of DBO was reduced from 34.56 ± 31.12 to 31.11 ± 28.64 μg post-protocol implementation (p = 0.011), which translated to a cost savings of USD 41,649 over 6 months. The mean monthly IV iron dose also decreased from 139.56 ± 98.83 to 97.65 ± 79.05 mg (p DBO and iron agents while increasing the number of patients in the target Hgb range, which led to significant cost savings in the treatment of anemia.

  18. Effect of a feed/fast protocol on pH in the proximal equine stomach.

    Science.gov (United States)

    Husted, L; Sanchez, L C; Baptiste, K E; Olsen, S N

    2009-09-01

    Risk factors for the development of gastric squamous ulcers include various management procedures, such as intermittent feed deprivation that can occur during weight management regimens or stall and dry lot confinement. To investigate the effect of intermittent feed deprivation relative to continuous feed intake on proximal intragastric pH, specifically in the region of the squamous mucosa of the lesser curvature. In 6 horses, pH electrodes were placed just inside of the oesophageal sphincter in the stomach for each of two 72 h protocols (A and B) in a randomised, cross-over design. Protocol A consisted of 12 h fed, 12 h fasted, 24 h fed and 24 h fasted, in sequence. Protocol B consisted of 72 h fed. During the fed periods of each protocol, horses had ad libitum access to coastal Bermuda hay and were fed sweet feed (1 kg, b.i.d.). Horses had ad libitum access to water at all times. Proximal intragastric pH was significantly lower during protocol A, than during protocol B. However, hourly mean pH was significantly different only during the day and evening hours between protocols. During protocol B, mean proximal pH decreased significantly from 03.00 to 09.00 compared to 19.00 to 23.00 h. A moderate positive correlation of hay intake vs. proximal gastric pH could be established. Intermittent feed deprivation decreased proximal gastric pH in horses relative to those horses for which feed was not restricted. However, the effect was only significant when fasting occurred during the day and evening hours, as a nocturnal decrease in pH occurred simultaneously in the fed horses. Episodes of daytime feed deprivation should be avoided if possible, as proximal gastric acid exposure rapidly increases during such events.

  19. Evaluation of the Implementation of a Rapid Response Treatment Protocol for Patients with Acute Onset Stroke: Can We Increase the Number of Patients Treated and Shorten the Time Needed

    Directory of Open Access Journals (Sweden)

    Rajiv Advani

    2014-06-01

    Full Text Available Aims: This study aims to evaluate the implementation of a rapid response treatment protocol for patients presenting with acute onset ischemic stroke. Improvements of routines surrounding the admission and treatment of patients with intravenous thrombolysis (IVT, such as door-to-needle (DTN times, and increasing the numbers of patients treated are discussed. Methods: We conducted a retrospective analysis of all patients (n = 320 treated with IVT for acute onset ischemic stroke at the Stavanger University Hospital, Norway, between 2003 and 2012. In 2009, a succession of changes to pre- and intra-hospital routines were made as well as an improvement in the education of primary health care physicians, nurses and paramedics involved in the treatment of acute onset stroke patients (rapid response treatment protocol. Analyses of DTN times, onset-to-needle times and the number of patients treated per year were carried out to ascertain the effect of the changes made. The primary aim was to analyze DTN times to look for any changes, and the secondary aim was to analyze changes in the number of patients treated per year. Results: In the years after the implementation of the rapid treatment protocol, we saw an improvement in the median DTN time with a decrease from 73 to 50 min in the first year (p = 0.03, a decrease of 45 min in the second year (p = 0.01 and a decrease of 31 min in the third year (p Conclusions: The implementation of the rapid treatment protocol for acute onset ischemic stroke patients led to a significant decrease in the DTN time at our center. These improvements also produced an increase in the number of patients treated per year. The extension of the therapeutic window from 3 to 4.5 h for the use of intravenous recombinant tissue plasminogen activator also played a role in the increased treatment numbers.

  20. Increasing walking in patients with intermittent claudication: Protocol for a randomised controlled trial

    Directory of Open Access Journals (Sweden)

    O'Carroll Ronan E

    2010-10-01

    Full Text Available Abstract Background People with intermittent claudication are at increased risk of death from heart attack and stroke compared to matched controls. Surgery for intermittent claudication is for symptom management and does not reduce the risk of cardiovascular morbidity and mortality. Increasing physical activity can reduce claudication symptoms and may improve cardiovascular health. This paper presents the pilot study protocol for a randomised controlled trial to test whether a brief psychological intervention leads to increased physical activity, improvement in quality of life, and a reduction in the demand for surgery, for patients with intermittent claudication. Methods/Design We aim to recruit 60 patients newly diagnosed with intermittent claudication, who will be randomised into two groups. The control group will receive usual care, and the treatment group will receive usual care and a brief 2-session psychological intervention to modify illness and walking beliefs and develop a walking action plan. The primary outcome will be walking, measured by pedometer. Secondary outcomes will include quality of life and uptake of surgery for symptom management. Participants will be followed up after (a 4 months, (b 1 year and (c 2 years. Discussion This study will assess the acceptability and efficacy of a brief psychological intervention to increase walking in patients with intermittent claudication, both in terms of the initiation, and maintenance of behaviour change. This is a pilot study, and the results will inform the design of a larger multi-centre trial. Trial Registration Current Controlled Trials ISRCTN28051878

  1. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  2. Body Composition Changes after Weight-Loss Interventions among Obese Females: A Comparison of Three Protocols

    Directory of Open Access Journals (Sweden)

    Nayera E. Hassan

    2014-12-01

    Full Text Available AIM: To evaluate body composition changes after use of three different types of obesity management protocols: dietary measures and physical activity; acupuncture or laser acupuncture with healthy diet; aiming at achieving stable weight loss among obese Egyptian females. METHODS:  A randomized longitudinal prospective study included 76 obese adult females; aged 26 up to 55 years. Anthropometric, body composition, ultrasonographic and biochemical assessments were done. RESULTS: The three types of obesity management protocols showed significant improvement in body composition (decrease in fat% and increases in FFM and TBW and visceral fat by US. However, nutritional intervention showed highly significant improvement in the skin fold thickness at triceps and biceps sites and peripheral adiposity index.  Acupuncture intervention showed highly significant improvement in fasting blood glucose (decreased and lipid profile (decreased triglycerides, total cholesterol and LDL, and increased HDL. Laser intervention showed highly significant improvement in all the skin fold thickness and some parameters of lipid profile (decreased total cholesterol and LDL. CONCLUSIONS: The three obesity management protocols have significant effect on body composition, but acupuncture has the best effect in improving the lipid profile and fasting blood sugar. In addition, Laser intervention was recommended to improve skin fold thickness and subcutaneous fat.

  3. Pregnancy outcome of “delayed start” GnRH antagonist protocol versus GnRH antagonist protocol in poor responders: A clinical trial study

    Directory of Open Access Journals (Sweden)

    Abbas Aflatoonian

    2017-08-01

    Full Text Available Background: Management of poor-responding patients is still major challenge in assisted reproductive techniques (ART. Delayed-start GnRH antagonist protocol is recommended to these patients, but little is known in this regards. Objective: The goal of this study was assessment of delayed-start GnRH antagonist protocol in poor responders, and in vitro fertilization (IVF outcomes. Materials and Methods: This randomized clinical trial included sixty infertile women with Bologna criteria for ovarian poor responders who were candidate for IVF. In case group (n=30, delayed-start GnRH antagonist protocol administered estrogen priming followed by early follicular-phase GnRH antagonist treatment for 7 days before ovarian stimulation with gonadotropin. Control group (n=30 treated with estrogen priming antagonist protocol. Finally, endometrial thickness, the rates of oocytes maturation, , embryo formation, and pregnancy were compared between two groups. Results: Rates of implantation, chemical, clinical, and ongoing pregnancy in delayed-start cycles were higher although was not statistically significant. Endometrial thickness was significantly higher in case group. There were no statistically significant differences in the rates of oocyte maturation, embryo formation, and IVF outcomes between two groups. Conclusion: There is no significant difference between delayed-start GnRH antagonist protocol versus GnRH antagonist protocol.

  4. RadNet: Open network protocol for radiation data

    International Nuclear Information System (INIS)

    Rees, B.; Olson, K.; Beckes-Talcott, J.; Kadner, S.; Wenderlich, T.; Hoy, M.; Doyle, W.; Koskelo, M.

    1998-01-01

    Safeguards instrumentation is increasingly being incorporated into remote monitoring applications. In the past, vendors of radiation monitoring instruments typically provided the tools for uploading the monitoring data to a host. However, the proprietary nature of communication protocols lends itself to increased computer support needs and increased installation expenses. As a result, a working group of suppliers and customers of radiation monitoring instruments defined an open network protocol for transferring packets on a local area network from radiation monitoring equipment to network hosts. The protocol was termed RadNet. While it is now primarily used for health physics instruments, RadNet's flexibility and strength make it ideal for remote monitoring of nuclear materials. The incorporation of standard, open protocols ensures that future work will not render present work obsolete; because RadNet utilizes standard Internet protocols, and is itself a non-proprietary standard. The use of industry standards also simplifies the development and implementation of ancillary services, e.g. E-main generation or even pager systems

  5. Efficacy and safety of an insulin infusion protocol in a surgical ICU.

    Science.gov (United States)

    Taylor, Beth E; Schallom, Marilyn E; Sona, Carrie S; Buchman, Timothy G; Boyle, Walter A; Mazuski, John E; Schuerer, Douglas E; Thomas, James M; Kaiser, Christy; Huey, Way Y; Ward, Myrna R; Zack, Jeanne E; Coopersmith, Craig M

    2006-01-01

    Hyperglycemia is associated with complications in the surgical intensive care unit. The purpose of this study was to determine the efficacy and safety of nurse-driven insulin infusion protocols in lowering blood glucose (BG) in critical illness. All patients in a 24-bed surgical intensive care unit who required i.v. insulin infusions during 3 noncontiguous 6-month periods from 2002 to 2004 were evaluated. In the preintervention phase, 71 patients received a physician-initiated insulin infusion without a developed protocol. They were compared with 95 patients who received a nurse-driven insulin infusion protocol with a target BG of 120 to 150 mg/dL and to 119 patients who received a more stringent protocol with a target BG of 80 to 110 mg/dL. There was a stepwise decrease in average daily BG levels, from 190 to 163 to 132 mg/dL (p < 0.001). The less stringent protocol decreased the time to achieve a BG level < 150 mg/dL from 14.1 to 7.4 hours compared with physician-driven management (p < 0.05) resulting in similar time on an insulin infusion (53 versus 48 hours). The more intensive protocol brought BG levels < 150 mg/dL in 7.2 hours and < 111 mg/dL in 13.6 hours, but increased the length of time a patient was on an insulin infusion to 77 hours. The incidence of severe hypoglycemia (BG < 40 mg/dL) was statistically similar between the groups, ranging between 1.1% and 3.4%. Implementation of a nurse-driven protocol led to more rapid and more effective BG control in critically ill surgical patients compared with physician management. Tighter BG control can be obtained without a significant increase in hypoglycemia, although this is associated with increased time on an insulin infusion.

  6. Robot training of upper limb in multiple sclerosis: comparing protocols with or without manipulative task components.

    Science.gov (United States)

    Carpinella, Ilaria; Cattaneo, Davide; Bertoni, Rita; Ferrarin, Maurizio

    2012-05-01

    In this pilot study, we compared two protocols for robot-based rehabilitation of upper limb in multiple sclerosis (MS): a protocol involving reaching tasks (RT) requiring arm transport only and a protocol requiring both objects' reaching and manipulation (RMT). Twenty-two MS subjects were assigned to RT or RMT group. Both protocols consisted of eight sessions. During RT training, subjects moved the handle of a planar robotic manipulandum toward circular targets displayed on a screen. RMT protocol required patients to reach and manipulate real objects, by moving the robotic arm equipped with a handle which left the hand free for distal tasks. In both trainings, the robot generated resistive and perturbing forces. Subjects were evaluated with clinical and instrumental tests. The results confirmed that MS patients maintained the ability to adapt to the robot-generated forces and that the rate of motor learning increased across sessions. Robot-therapy significantly reduced arm tremor and improved arm kinematics and functional ability. Compared to RT, RMT protocol induced a significantly larger improvement in movements involving grasp (improvement in Grasp ARAT sub-score: RMT 77.4%, RT 29.5%, p=0.035) but not precision grip. Future studies are needed to evaluate if longer trainings and the use of robotic handles would significantly improve also fine manipulation.

  7. Sixteen-Day Bedrest Significantly Increases Plasma Colloid Osmotic Pressure

    Science.gov (United States)

    Hargens, Alan R.; Hsieh, S. T.; Murthy, G.; Ballard, R. E.; Convertino, V. A.; Wade, Charles E. (Technical Monitor)

    1994-01-01

    Upon exposure to microgravity, astronauts lose up to 10% of their total plasma volume, which may contribute to orthostatic intolerance after space flight. Because plasma colloid osmotic pressure (COP) is a primary factor maintaining plasma volume, our objective was to measure time course changes in COP during microgravity simulated by 6 deg. head-down tilt (HDT). Seven healthy male subjects (30-55 years of age) were placed in HDT for 16 days. For the purpose of another study, three of the seven subjects were chosen to exercise on a cycle ergometer on day 16. Blood samples were drawn immediately before bedrest on day 14 of bedrest, 18-24 hours following exercise while all subjects were still in HDT and 1 hour following bedrest termination. Plasma COP was measured in all 20 microliter EDTA-treated samples using an osmometer fitted with a PM 30 membrane. Data were analyzed with paired and unpaired t-tests. Plasma COP on day 14 of bedrest (29.9 +/- 0.69 mmHg) was significantly higher (p less than 0.005) than the control, pre-bedrest value (23.1 +/- 0.76 mmHg). At one hour of upright recovery after HDT, plasma COP remained significantly elevated (exercise: 26.9 +/- 0.87 mmHg; no exercise: 26.3 +/- 0.85 mmHg). Additionally, exercise had no significant effect on plasma COP 18-24 hours following exercise (exercise: 27.8 +/- 1.09 mmHg; no exercise: 27.1 +/- 0.78 mmHg). Our results demonstrate that plasma COP increases significantly with microgravity simulated by HDT. However, preliminary results indicate exercise during HDT does not significantly affect plasma COP.

  8. Desensitization protocols and their outcome.

    Science.gov (United States)

    Marfo, Kwaku; Lu, Amy; Ling, Min; Akalin, Enver

    2011-04-01

    In the last decade, transplantation across previously incompatible barriers has increasingly become popular because of organ donor shortage, availability of better methods of detecting and characterizing anti-HLA antibodies, ease of diagnosis, better understanding of antibody-mediated rejection, and the availability of effective regimens. This review summarizes all manuscripts published since the first publication in 2000 on desensitized patients and discusses clinical outcomes including acute and chronic antibody-mediated rejection rate, the new agents available, kidney paired exchange programs, and the future directions in sensitized patients. There were 21 studies published between 2000 and 2010, involving 725 patients with donor-specific anti-HLA antibodies (DSAs) who underwent kidney transplantation with different desensitization protocols. All studies were single center and retrospective. The patient and graft survival were 95% and 86%, respectively, at a 2-year median follow-up. Despite acceptable short-term patient and graft survivals, acute rejection rate was 36% and acute antibody-mediated rejection rate was 28%, which is significantly higher than in nonsensitized patients. Recent studies with longer follow-up of those patients raised concerns about long-term success of desensitization protocols. The studies utilizing protocol biopsies in desensitized patients also reported higher subclinical and chronic antibody-mediated rejection. An association between the strength of DSAs determined by median fluorescence intensity values of Luminex single-antigen beads and risk of rejection was observed. Two new agents, bortezomib, a proteasome inhibitor, and eculizumab, an anti-complement C5 antibody, were recently introduced to desensitization protocols. An alternative intervention is kidney paired exchange, which should be considered first for sensitized patients. © 2011 by the American Society of Nephrology

  9. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  10. A Review of Vehicle to Vehicle Communication Protocols for VANETs in the Urban Environment

    Directory of Open Access Journals (Sweden)

    Irshad Ahmed Abbasi

    2018-01-01

    Full Text Available Vehicular Ad-hoc Networks (VANETs have been gaining significant attention from the research community due to their increasing importance for building an intelligent transportation system. The characteristics of VANETs, such as high mobility, network partitioning, intermittent connectivity and obstacles in city environments, make routing a challenging task. Due to these characteristics of VANETs, the performance of a routing protocol is degraded. The position-based routing is considered to be the most significant approach in VANETs. In this paper, we present a brief review of most significant position based unicast routing protocols designed for vehicle to vehicle communications in the urban environment. We provide them with their working features for exchanging information between vehicular nodes. We describe their pros and cons. This study also provides a comparison of the vehicle to vehicle communication based routing protocols. The comparative study is based on some significant factors such as mobility, traffic density, forwarding techniques and method of junction selection mechanism, and strategy used to handle a local optimum situation. It also provides the simulation based study of existing dynamic junction selection routing protocols and a static junction selection routing protocol. It provides a profound insight into the routing techniques suggested in this area and the most valuable solutions to advance VANETs. More importantly, it can be used as a source of references to other researchers in finding literature that is relevant to routing in VANETs.

  11. Extraction protocols for orthodontic treatment: A retrospective study

    Directory of Open Access Journals (Sweden)

    Vaishnevi N Thirunavukkarasu

    2016-01-01

    Full Text Available Background and Objectives: Various extraction protocols have been followed for successful orthodontic treatment. The purpose of this study was to evaluate the extraction protocols in patients who had previously undergone orthodontic treatment and also who had reported for continuing orthodontic treatment from other clinics. Materials and Methods: One hundred thirty eight patients who registered for orthodontic treatment at the Faculty of Dentistry were divided into 10 extraction protocols based on the Orthodontic treatment protocol given by Janson et al. and were evaluated for statistical significance. Results: The descriptive statistics of the study revealed a total of 40 (29% patients in protocol 1, 43 (31.2% in protocol 2, 18 (13% in protocol 3, 16 (11.6% in protocol 5, and 12 (8.7% in Type 3 category of protocol 9. The Type 3 category in protocol 9 was statistically significant compared to other studies. Midline shift and collapse of the arch form were noticed in these individuals. Conclusion: Extraction of permanent teeth such as canine and lateral incisors without rational reasons could have devastating consequences on the entire occlusion. The percentage of cases wherein extraction of permanent teeth in the crowded region was adopted as a treatment option instead of orthodontic treatment is still prevalent in dental practice. The shortage of orthodontists in Malaysia, the long waiting period, and lack of subjective need for orthodontic treatment at an earlier age group were the reasons for the patient's to choose extraction of the mal-aligned teeth such as the maxillary canine or maxillary lateral incisors.

  12. Applying the Intervention Mapping protocol to develop a kindergarten-based, family-involved intervention to increase European preschool children's physical activity levels: the ToyBox-study.

    Science.gov (United States)

    De Craemer, M; De Decker, E; De Bourdeaudhuij, I; Verloigne, M; Duvinage, K; Koletzko, B; Ibrügger, S; Kreichauf, S; Grammatikaki, E; Moreno, L; Iotova, V; Socha, P; Szott, K; Manios, Y; Cardon, G

    2014-08-01

    Although sufficient physical activity is beneficial for preschoolers' health, activity levels in most preschoolers are low. As preschoolers spend a considerable amount of time at home and at kindergarten, interventions should target both environments to increase their activity levels. The aim of the current paper was to describe the six different steps of the Intervention Mapping protocol towards the systematic development and implementation of the physical activity component of the ToyBox-intervention. This intervention is a kindergarten-based, family-involved intervention implemented across six European countries. Based on the results of literature reviews and focus groups with parents/caregivers and kindergarten teachers, matrices of change objectives were created. Then, theory-based methods and practical strategies were selected to develop intervention materials at three different levels: (i) individual level (preschoolers); (ii) interpersonal level (parents/caregivers) and (iii) organizational level (teachers). This resulted in a standardized intervention with room for local and cultural adaptations in each participating country. Although the Intervention Mapping protocol is a time-consuming process, using this systematic approach may lead to an increase in intervention effectiveness. The presented matrices of change objectives are useful for future programme planners to develop and implement an intervention based on the Intervention Mapping protocol to increase physical activity levels in preschoolers. © 2014 World Obesity.

  13. Effect of various practical warm-up protocols on acute lower-body power.

    Science.gov (United States)

    Buttifant, David; Hrysomallis, Con

    2015-03-01

    The purpose of this study was to compare the acute effect of box squats with barbell (BBSquat), box squats with elastic resistance bands (BandSquat), and static stretches (SStretch) on external power during a 20-kg weighted jump squat. Twelve male athletes performed each of the 3 warm-up protocols on separate occasions in a randomized order. Weighted jump squat power was assessed using a linear position transducer attached to the bar of a Smith machine. Jump power was measured pre-warm-up and 5 and 10 minutes post-warm-up protocol. The BBSquat protocol involved 3 sets of 3RM, BandSquat involved 3 sets of 3 repetitions using highest resistance elastic bands, and the SStretch protocol comprises two 30-second stretches for muscles of the lower limbs. Jump power significantly increased from pre-warm-up to 5 and 10 minutes post-warm-up for both the BandSquat and BBSquat protocols. There was no statistical difference in power values between BandSquat and BBSquat. Power output significantly decreased from pre-warm-up to 5 and 10 minutes post-warm-up for the SStretch protocol. The BandSquat was just as effective as BBSquat in augmenting acute jump power. The SStretch was detrimental to jump performance. A practical warm-up using relatively inexpensive and portable equipment such as elastic resistance bands was just as effective as a warm-up protocol that requires more substantial and less transportable equipment such as a squat rack and associated free weights. The BandSquat warm-up may be considered more accessible for athletes at various competition levels.

  14. A case for evaluating sensor network protocols concurrently

    KAUST Repository

    Gnawali, Omprakash; Guibas, Leonidas; Levis, Philip

    2010-01-01

    Researchers typically evaluate and compare protocols on the testbeds by running them one at a time. This methodology ignores the variation in link qualities and wireless environment across these experiments. These variations can introduce significant noise in the results. Evaluating two protocols concurrently, however, suffers from inter-protocol interactions. These interactions can perturb performance even under very light load, especially timing and timing sensitive protocols. We argue that the benefits of running protocols concurrently greatly outweigh the disadvantages. Protocols rarely run in isolation in real networks, and so considering such interactions is valuable. Although the wireless environment is still uncontrolled, concurrent evaluations make comparisons fair and more statistically sound. Through experiments on two testbeds, we make the case for evaluating and comparing low data-rate sensor network protocols by running them concurrently. Copyright 2010 ACM.

  15. Significance in the increase of women psychiatrists in Korea.

    Science.gov (United States)

    Kim, Ha Kyoung; Kim, Soo In

    2008-01-01

    The number of female doctors has increased in Korea; 18.9% (13,083) of the total medical doctors registered (69,097) were women in 2006, compared to 13.6% (2,216) in 1975. The proportion of female doctors will jump up by 2010 considering that nearly 40% of the medical students are women as of today. This trend has had strong influence on the field of psychiatry; the percentage of women psychiatrists rose from 1.6 (6)% to 18% (453), from 1975 to 2006 and now women residents comprise 39% (206) of all. This is not only a reflection of a social phenomenon of the increase in professional women but also attributed to some specific characteristics of the psychiatry. Psychiatric practice may come more natural to women. While clinical activities of women psychiatrists are expanding, there are few women leaders and much less women are involving in academic activities in this field as yet. Though there is less sexual discrimination in the field of psychiatry, women psychiatrists are still having a lot of difficulties in balancing work and family matters. Many women psychiatrists also report they've ever felt an implied discrimination in their careers. In this study, we are to identify the characteristics of women psychiatrists and to explore the significance of the increase in women psychiatrists in Korea and the situation in which they are.

  16. A Higher-Calorie Refeeding Protocol Does Not Increase Adverse Outcomes in Adult Patients with Eating Disorders.

    Science.gov (United States)

    Matthews, Kylie; Hill, Jan; Jeffrey, Shane; Patterson, Susan; Davis, Amanda; Ward, Warren; Palmer, Michelle; Capra, Sandra

    2018-04-12

    Patients with eating disorders (EDs) are often considered a high-risk population to refeed. Current research advises using "start low, go slow" refeeding methods (∼1,000 kcal/day, advancing ∼500 kcal/day every 3 to 4 days) in adult patients with severe EDs to prevent the development of refeeding syndrome (RFS), typically characterized by decreases in serum electrolyte levels and fluid shifts. To compare the incidence of RFS and related outcomes using a low-calorie protocol (LC) (1,000 kcal) or a higher-calorie protocol (HC) (1,500 kcal) in medically compromised adult patients with EDs. This was a retrospective pre-test-post-test study. One hundred and nineteen participants with EDs, medically admitted to a tertiary hospital in Brisbane, Australia, between December 2010 and January 2017, were included (LC: n=26, HC: n=93). The HC refeeding protocol was implemented in September 2013. Differences in prevalence of electrolyte disturbances, hypoglycemia, edema, and RFS diagnoses were examined. χ 2 tests, Kruskal-Wallis H test, analysis of variance, and independent t tests were used to compare data between the two protocols. Descriptors were similar between groups (LC: 28±9 years, 96% female, 85% with anorexia nervosa, 31% admitted primarily because of clinical symptoms of exacerbated ED vs HC: 27±9 years, 97% female, 84% with anorexia nervosa, 44% admitted primarily because of clinical symptoms of exacerbated ED, P>0.05). Participants refed using the LC protocol had higher incidence rates of hypoglycemia (LC: 31% vs HC: 10%, P=0.012), with no statistical or clinical differences in electrolyte disturbances (LC: 65% vs HC: 45%, P=0.079), edema (LC: 8% vs HC: 6%, P=0.722) or diagnosed RFS (LC: 4% vs HC: 1%, P=0.391). A higher-calorie refeeding protocol appears to be safe, with no differences in rates of electrolyte disturbances or clinically diagnosed RFS and a lower incidence of hypoglycemia. Future research examining higher-calorie intakes, similar to those

  17. Energy-Aware RFID Anti-Collision Protocol.

    Science.gov (United States)

    Arjona, Laura; Simon, Hugo Landaluce; Ruiz, Asier Perallos

    2018-06-11

    The growing interest in mobile devices is transforming wireless identification technologies. Mobile and battery-powered Radio Frequency Identification (RFID) readers, such as hand readers and smart phones, are are becoming increasingly attractive. These RFID readers require energy-efficient anti-collision protocols to minimize the tag collisions and to expand the reader's battery life. Furthermore, there is an increasing interest in RFID sensor networks with a growing number of RFID sensor tags. Thus, RFID application developers must be mindful of tag anti-collision protocols. Energy-efficient protocols involve a low reader energy consumption per tag. This work presents a thorough study of the reader energy consumption per tag and analyzes the main factor that affects this metric: the frame size update strategy. Using the conclusion of this analysis, the anti-collision protocol Energy-Aware Slotted Aloha (EASA) is presented to decrease the energy consumption per tag. The frame size update strategy of EASA is configured to minimize the energy consumption per tag. As a result, EASA presents an energy-aware frame. The performance of the proposed protocol is evaluated and compared with several state of the art Aloha-based anti-collision protocols based on the current RFID standard. Simulation results show that EASA, with an average of 15 mJ consumed per tag identified, achieves a 6% average improvement in the energy consumption per tag in relation to the strategies of the comparison.

  18. A shortened protocol for assessing cognitive bias in rats.

    Science.gov (United States)

    Brydges, Nichola M; Hall, Lynsey

    2017-07-15

    Reliable measurement of affective state in animals is a significant goal of animal welfare. Such measurements would also improve the validity of pre-clinical mental health research which relies on animal models. However, at present, affective states in animals are inaccessible to direct measurement. In humans, changes in cognitive processing can give reliable indications of emotional state. Therefore, similar techniques are increasingly being used to gain proxy measures of affective states in animals. In particular, the 'cognitive bias' assay has gained popularity in recent years. Major disadvantages of this technique include length of time taken for animals to acquire the task (typically several weeks), negative experiences associated with task training, and issues of motivation. Here we present a shortened cognitive bias protocol using only positive reinforcers which must actively be responded to. The protocol took an average of 4days to complete, and produced similar results to previous, longer methods (minimum 30days). Specifically, rats housed in standard laboratory conditions demonstrated negative cognitive biases when presented with ambiguous stimuli, and took longer to make a decision when faced with an ambiguous stimulus. Compared to previous methods, this protocol is significantly shorter (average 4days vs. minimum 30days), utilises only positive reinforcers to avoid inducing negative affective states, and requires active responses to all cues, avoiding potential confounds of motivational state. We have successfully developed a shortened cognitive bias protocol, suitable for use with laboratory rats. Copyright © 2017 The Author(s). Published by Elsevier B.V. All rights reserved.

  19. Safety of protocol violations in acute stroke tPA administration.

    Science.gov (United States)

    Lyerly, Michael J; Albright, Karen C; Boehme, Amelia K; Bavarsad Shahripour, Reza; Houston, James T; Rawal, Pawan V; Kapoor, Niren; Alvi, Muhammad; Sisson, April; Alexandrov, Anne W; Alexandrov, Andrei V

    2014-01-01

    Intravenous (IV) tissue plasminogen activator remains the only approved therapy for acute ischemic stroke (AIS) in the United States; however, less than 10% of patients receive treatment. This is partially because of the large number of contraindications, narrow treatment window, and physician reluctance to deviate from these criteria. We retrospectively analyzed consecutive patients who received IV thrombolysis at our stroke center for National Institute of Neurological Disorders and Stroke (NINDS) protocol violations and rates of symptomatic intracerebral hemorrhage (sICH). Other outcome variables included systemic hemorrhage, modified Rankin Scale at discharge, and discharge disposition. A total of 212 patients were identified in our stroke registry between 2009 and 2011 and included in the analysis. Protocol violations occurred in 76 patients (36%). The most common violations were thrombolysis beyond 3 hours (26%), aggressive blood pressure management (15%), elevated prothrombin time (PT) or partial thromboplastin time (PTT) (6.6%), minor or resolving deficits (4.2%), unclear time of onset (3.9%), and stroke within 3 months (3%). There were no significant differences in any of the safety outcomes or discharge disposition between patients with or without protocol violations. Controlling for age, National Institutes of Health Stroke Scale on admission, and glucose on admission, there was no significant increase in sICH (odds ratio: 3.8; 95% confidence interval: .37-38.72) in the patients who had protocol violations. Despite more than one third of patients receiving thrombolysis with protocol violations, overall rates of hemorrhage remained low and did not differ from those who did not have violations. Our data support the need to expand access to thrombolysis in AIS patients. Published by Elsevier Inc.

  20. Search and nonsearch protocols for radiographic consultation

    International Nuclear Information System (INIS)

    Swensson, R.G.; Theodore, G.H.

    1989-01-01

    Six radiologists, acting as film reviewers, used two different consultation protocols to differentiate among 292 ambiguous findings on chest films: 120 simulated nodules and 172 normal findings (previous readers' false-positive reports of nodules). The non-search protocol identified each finding (by location), and reviewers rated its likelihood as a nodule. The search protocol, which asked reviewers to report and rate all locations regarded as possible nodules on each film, assigned a default negative rating to any unreported finding (nodule or normal). Receiver operator characteristic analyses demonstrated a significantly higher accuracy for each reviewer's search- protocol discriminations between these nodules and confusing normal findings

  1. Secure Certificateless Authentication and Road Message Dissemination Protocol in VANETs

    Directory of Open Access Journals (Sweden)

    Haowen Tan

    2018-01-01

    Full Text Available As a crucial component of Internet-of-Thing (IoT, vehicular ad hoc networks (VANETs have attracted increasing attentions from both academia and industry fields in recent years. With the extensive VANETs deployment in transportation systems of more and more countries, drivers’ driving experience can be drastically improved. In this case, the real-time road information needs to be disseminated to the correlated vehicles. However, due to inherent wireless communicating characteristics of VANETs, authentication and group key management strategies are indispensable for security assurance. Furthermore, effective road message dissemination mechanism is of significance. In this paper, we address the above problems by developing a certificateless authentication and road message dissemination protocol. In our design, certificateless signature and the relevant feedback mechanism are adopted for authentication and group key distribution. Subsequently, message evaluating and ranking strategy is introduced. Security analysis shows that our protocol achieves desirable security properties. Additionally, performance analysis demonstrates that the proposed protocol is efficient compared with the state of the art.

  2. Development and Pilot Implementation of a Search Protocol to Improve Patient Safety on a Psychiatric Inpatient Unit.

    Science.gov (United States)

    Abela-Dimech, Frances; Johnston, Kim; Strudwick, Gillian

    A mental health organization in Ontario, Canada, noted an increase in unsafe items entering locked inpatient units. The purpose of this project was to develop and implement a search protocol to improve patient, staff, and visitor safety by preventing unsafe items from entering a locked inpatient unit. Under the guidance of a clinical nurse specialist, an interprofessional team used the Failure Mode and Effects Analysis framework to identify what items were considered unsafe, how these unsafe items were entering the unit, and what strategies could be used to prevent these items from entering the unit. A standardized search protocol was identified as a strategy to prevent items from entering the unit. The standardized search protocol was developed and piloted on 1 unit. To support the search protocol, an interprofessional team created a poster using a mnemonic aid to educate patients, staff, and visitors about which items could not be brought onto the unit. Educational sessions on the search protocol were provided for staff. The difference between the number of incidents before and after the implementation of the search protocol was statistically significant. Safety on an inpatient unit was increased as incidents of unsafe items entering the unit decreased.

  3. Examining recombinant human TSH primed 131I therapy protocol in patients with metastatic differentiated thyroid carcinoma: comparison with the traditional thyroid hormone withdrawal protocol

    International Nuclear Information System (INIS)

    Rani, Deepa; Kaisar, Sushma; Awasare, Sushma; Kamaldeep; Abhyankar, Amit; Basu, Sandip

    2014-01-01

    Recombinant human thyroid-stimulating hormone (rhTSH)-based protocol is a promising recent development in the management of differentiated thyroid carcinoma (DTC). The objectives of this prospective study were: (1) to assess the feasibility and efficacy of the rhTSH primed 131 I therapy protocol in patients with DTC with distant metastatic disease, (2) to perform lesional dosimetry in this group of patients compared to the traditional protocol, (3) to document the practical advantages (patient symptoms and hospital stay) of the rhTSH protocol compared to the traditional thyroid hormone withdrawal protocol, (4) to document and record any adverse effect of this strategy, (5) to compare the renal function parameters, and (6) to compare the serum TSH values achieved in either of the protocols in this group of patients. The study included 37 patients with metastatic DTC having lung or skeletal metastases or both. A comparison of lesional radiation absorbed dose, hospital stay, renal function tests, and symptom profile was undertaken between the traditional thyroid hormone withdrawal protocol and rhTSH-based therapy protocol. Dosimetric calculations of metastatic lesions were performed using lesion uptake and survey meter readings for calculation of effective half-life. Non-contrast-enhanced CT was used for assessment of tumor volume. Quality of life was assessed using the European Organization for Research and Treatment of Cancer (EORTC) QOL forms. A comparison of pretreatment withdrawal thyroglobulin (TG) was done with the withdrawal TG level 3 months after treatment. The mean effective half-life of 131 I in metastatic lesions was less during the rhTSH protocol (29.49 h) compared to the thyroid hormone withdrawal protocol (35.48 h), but the difference was not statistically significant (p = 0.056). The mean 24-h % uptake of the lesions during the traditional protocol (4.84 %) was slightly higher than the 24-h % uptake during the rhTSH protocol (3.56 %), but the

  4. An Energy and Application Scenario Aware Active RFID Protocol

    Directory of Open Access Journals (Sweden)

    Nilsson Björn

    2010-01-01

    Full Text Available The communication protocol used is a key issue in order to make the most of the advantages of active RFID technologies. In this paper we introduce a carrier sense medium access data communication protocol that dynamically adjusts its back-off algorithm to best suit the actual application at hand. Based on a simulation study of the effect on tag energy cost, read-out delay, and message throughput incurred by some typical back-off algorithms in a CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance active RFID protocol, we conclude that by dynamic tuning of the initial contention window size and back-off interval coefficient, tag energy consumption and read-out delay can be significantly lowered. We show that it is possible to decrease the energy consumption per tag payload delivery with more than 10 times, resulting in a 50% increase in tag battery lifetime. We also discuss the advantage of being able to predict the number of tags present at the RFID-reader as well as ways of doing it.

  5. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols.

    Science.gov (United States)

    Campagne, Fabien

    2008-02-29

    The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79-0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86-0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these protocols can fully substitute

  6. An Energy Efficient Protocol For The Internet Of Things

    Science.gov (United States)

    Venčkauskas, Algimantas; Jusas, Nerijus; Kazanavičius, Egidijus; Štuikys, Vytautas

    2015-01-01

    The Internet of Things (IoT) is a technological revolution that represents the future of computing and communications. One of the most important challenges of IoT is security: protection of data and privacy. The SSL protocol is the de-facto standard for secure Internet communications. The extra energy cost of encrypting and authenticating of the application data with SSL is around 15%. For IoT devices, where energy resources are limited, the increase in the cost of energy is a very significant factor. In this paper we present the energy efficient SSL protocol which ensures the maximum bandwidth and the required level of security with minimum energy consumption. The proper selection of the security level and CPU multiplier, can save up to 85% of the energy required for data encryption.

  7. The impact of a chest tube management protocol on the outcome of trauma patients with tube thoracostomy.

    Science.gov (United States)

    de Abreu, Emanuelle Maria Sávio; Machado, Carla Jorge; Pastore Neto, Mario; de Rezende Neto, João Baptista; Sanches, Marcelo Dias

    2015-01-01

    to investigate the effect of standardized interventions in the management of tube thoracostomy patients and to assess the independent effect of each intervention. A chest tube management protocol was assessed in a retrospective cohort study. The tube thoracostomy protocol (TTP) was implemented in August 2012, and consisted of: antimicrobial prophylaxis, chest tube insertion in the operating room (OR), admission post chest tube thoracostomy (CTT) in a hospital floor separate from the emergency department (ED), and daily respiratory therapy (RT) sessions post-CTT. The inclusion criteria were, hemodynamic stability, patients between the ages of 15 and 59 years, and injury severity score (ISS) chest wall, lung, and pleura. During the study period 92 patients were managed according to the standardized protocol. The outcomes of those patients were compared to 99 patients treated before the TTP. Multivariate logistic regression analysis was performed to assess the independent effect of each variable of the protocol on selected outcomes. Demographics, injury severity, and trauma mechanisms were similar among the groups. As expected, protocol compliance increased after the implementation of the TTP. There was a significant reduction (pchest tube days. Respiratory therapy was independently linked to significant reduction (pchest tube insertion was associated with significant (ptrauma patients.

  8. THE SMALL BUT SIGNIFICANT AND NONTRANSITORY INCREASE IN PRICES (SSNIP TEST

    Directory of Open Access Journals (Sweden)

    Liviana Niminet

    2008-12-01

    Full Text Available The Small but Significant Nontransitory Increase in Price Test was designed to define the relevant market by concepts of product, geographical area and time. This test, also called the ,,hypothetical monopolistic test” is the subject of many researches both economical and legal as it deals with economic concepts as well as with legally aspects.

  9. A feeding protocol for delivery of agents to assess development in Varroa mites.

    Directory of Open Access Journals (Sweden)

    Ana R Cabrera

    Full Text Available A novel feeding protocol for delivery of bio-active agents to Varroa mites was developed by providing mites with honey bee larva hemolymph supplemented with cultured insect cells and selected materials delivered on a fibrous cotton substrate. Mites were starved, fed on treated hemolymph to deliver selected agents and then returned to bee larvae. Transcript levels of two reference genes, actin and glyceraldehyde 3-phosphate dehydrogenase (GAPDH, as well as for nine selected genes involved in reproductive processes showed that the starvation and feeding protocol periods did not pose a high level of stress to the mites as transcript levels remained comparable between phoretic mites and those completing the protocol. The feeding protocol was used to deliver molecules such as hormone analogs or plasmids. Mites fed with Tebufenozide, an ecdysone analog, had higher transcript levels of shade than untreated or solvent treated mites. In order to extend this feeding protocol, cultured insect cells were incorporated to a final ratio of 1 part cells and 2 parts hemolymph. Although supplementation with Bombyx mori Bm5 cells increased the amount of hemolymph consumed per mite, there was a significant decrease in the percentage of mites that fed and survived. On the other hand, Drosophila melanogaster S2 cells reduced significantly the percentage of mites that fed and survived as well as the amount of hemolymph consumed. The feeding protocol provides a dynamic platform with which to challenge the Varroa mite to establish efficacy of control agents for this devastating honey bee pest.

  10. "Not just another Wii training": a graded Wii protocol to increase physical fitness in adolescent girls with probable developmental coordination disorder-a pilot study.

    Science.gov (United States)

    Bonney, Emmanuel; Rameckers, Eugene; Ferguson, Gillian; Smits-Engelsman, Bouwien

    2018-02-22

    Adolescents with low motor competence participate less in physical activity and tend to exhibit decreased physical fitness compared to their peers with high motor competence. It is therefore essential to identify new methods of enhancing physical fitness in this population. Active video games (AVG) have been shown to improve motor performance, yet investigations of its impact on physical fitness are limited. The objective of this study was to examine the impact of the graded Wii protocol in adolescent girls with probable Developmental Coordination Disorder (p-DCD). A single-group pre-post design was conducted to assess the impact of a newly developed Wii protocol in adolescent girls attending school in a low income community of Cape Town, South Africa. Sixteen participants (aged 13-16 years) with p-DCD (≤16th percentile on the MABC-2 test) were recruited. Participants received 45 min Wii training for 14 weeks. Outcome measures included the six-minute walk distance and repeated sprint ability. Information on heart rate, enjoyment and perceived exertion ratings were also collected. Significant improvements in aerobic and anaerobic fitness were observed. The participants reported high enjoyment scores and low perceived exertion ratings. The graded Wii protocol was easily adaptable and required little resources (space, equipment and expertise) to administer. The findings provide preliminary evidence to support the use of the graded Wii protocol for promoting physical fitness in adolescent girls with p-DCD. Further studies are needed to confirm these results and to validate the clinical efficacy of the protocol in a larger sample with a more robust design.

  11. The Development of Korea Additional Protocol System

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yeo, Jin Kyun

    2008-01-01

    The Agreement between the Republic of Korea (ROK) and the IAEA for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Safeguards Agreement) entered into force on 14 November 1975. The Additional Protocol to the Safeguards Agreement (the Additional Protocol) was signed on 21 June 1999 and entered into force on 19 February 2004. ROK has been submitting annual updated reports of initial declaration on every May 15th since August 2004. Additional protocol reports were submitted through Protocol Reporter provided by IAEA. Annual declarations were simply uploaded and stored in the Accounting Information Treatment System of KINAC, which did not provide data analysis and management function. There have been demands for improvement to handle ever-increasing information. KAPS (Korea Additional Protocol System) has been developed to assist and administrate the additional protocol related works effectively. The new system enables integrated management including composition of additional protocol report and version control, periodical update of related information, results of IAEA complementary access to each facility

  12. Increased frequency of retinopathy of prematurity over the last decade and significant regional differences.

    Science.gov (United States)

    Holmström, Gerd; Tornqvist, Kristina; Al-Hawasi, Abbas; Nilsson, Åsa; Wallin, Agneta; Hellström, Ann

    2018-03-01

    Retinopathy of prematurity (ROP) causes childhood blindness globally in prematurely born infants. Although increased levels of oxygen supply lead to increased survival and reduced frequency of cerebral palsy, increased incidence of ROP is reported. With the help of a Swedish register for ROP, SWEDROP, national and regional incidences of ROP and frequencies of treatment were evaluated from 2008 to 2015 (n = 5734), as well as before and after targets of provided oxygen changed from 85-89% to 91-95% in 2014. Retinopathy of prematurity (ROP) was found in 31.9% (1829/5734) of all infants with a gestational age (GA) of <31 weeks at birth and 5.7% of the infants (329/5734) had been treated for ROP. Analyses of the national data revealed an increased incidence of ROP during the 8-year study period (p = 0.003), but there was no significant increase in the frequency of treatment. There were significant differences between the seven health regions of Sweden, regarding both incidence of ROP and frequency of treatment (p < 0.001). Comparison of regional data before and after the new oxygen targets revealed a significant increase in treated ROP in one region [OR: 2.24 (CI: 1.11-4.49), p = 0.024] and a borderline increase in one other [OR: 3.08 (CI: 0.99-9.60), p = 0.052]. The Swedish national ROP register revealed an increased incidence of ROP during an 8-year period and significant regional differences regarding the incidence of ROP and frequency of treatment. © 2017 Acta Ophthalmologica Scandinavica Foundation. Published by John Wiley & Sons Ltd.

  13. Safety of a DVT chemoprophylaxis protocol following traumatic brain injury: a single center quality improvement initiative.

    Science.gov (United States)

    Nickele, Christopher M; Kamps, Timothy K; Medow, Joshua E

    2013-04-01

    significant deep venous thrombosis (DVT) was 6.9 % (6 of 87). Three protocol patients (3.45 %) went to the operating room for surgery after the initiation of PTP; none of these patients had a measurable change in hemorrhage size on head CT. The change in percentage of patients receiving PTP was significantly increased by the protocol (p average days to first PTP dose trended down with institution of the protocol, this change was not statistically significant. A PTP protocol in the NSICU is useful in controlling the number of complications from DVT and pulmonary embolism while avoiding additional IH. This protocol, based on a published body of literature, allowed for VTE rates similar to published rates, while having no PTP-related hemorrhage expansion. The protocol significantly changed physician behavior, increasing the percentage of patients receiving PTP during their hospitalization; whether long-term patient outcomes are affected is a potential goal for future study.

  14. Benchmarking pediatric cranial CT protocols using a dose tracking software system: a multicenter study.

    Science.gov (United States)

    De Bondt, Timo; Mulkens, Tom; Zanca, Federica; Pyfferoen, Lotte; Casselman, Jan W; Parizel, Paul M

    2017-02-01

    To benchmark regional standard practice for paediatric cranial CT-procedures in terms of radiation dose and acquisition parameters. Paediatric cranial CT-data were retrospectively collected during a 1-year period, in 3 different hospitals of the same country. A dose tracking system was used to automatically gather information. Dose (CTDI and DLP), scan length, amount of retakes and demographic data were stratified by age and clinical indication; appropriate use of child-specific protocols was assessed. In total, 296 paediatric cranial CT-procedures were collected. Although the median dose of each hospital was below national and international diagnostic reference level (DRL) for all age categories, statistically significant (p-value benchmarking showed that further dose optimization and standardization is possible by using age-stratified protocols for paediatric cranial CT. Moreover, having a dose tracking system revealed that adult protocols are still applied for paediatric CT, a practice that must be avoided. • Significant differences were observed in the delivered dose between age-groups and hospitals. • Using age-adapted scanning protocols gives a nearly linear dose increase. • Sharing dose-data can be a trigger for hospitals to reduce dose levels.

  15. Comparison of microdose GnRH agonist protocol with GnRH antagonist / letrazole protocol in patients with poor ovarian response

    Directory of Open Access Journals (Sweden)

    Yiğit Çakıroğlu

    2013-09-01

    Full Text Available Objective: To compare microdose GnRH agonist (MDL protocol with GnRH antagonist/letrazole (AL protocol in patients with poor ovarian response. Design: Randomised clinical trial. Setting: Kocaeli University Assisted Reproductive Centre Interventions: POR was diagnosed according to ESHRE Bologna criteria in case of presence of 2 out of 3 criteria. In the MDL group (n=27, 40µg/0.2 cc subcutaneous leuprolid acetate was given two times a day starting on the first day of menstrual cycle. On the second day of the cycle, gonadotrophin stimulation was started at 450-600 IU and/or 150 IU human menopausal gonadotrophin (hMG along with leuprolid. In the AL group (n=28, 5 mg letrazole was given for 5 days starting on the second day of the spontaneous cycle and after the 5th day of the cycle, 450-600 IU and/or 150 IU hMG was given. Main Outcome Measures: To compare the outcomes of MDL protocol with AL protocol in patients with poor ovarian response. Results: Stimulation days, total gonadotrophin dose (IU, peak E2 (pg/ml levels, and endometrial thickness were found to be statistically significantly lower in the AL group. While no cases of cycle cancellation was detected in the MDL group, statistically significantly higher rates of cycle cancellation (%35.7, p<0.001 was detected in the AL group. No statistically significant differences were detected in total oocyte numbers (3.7±2.9 vs 2.7±2.2, number of transferred embryos (1.4±0.5 vs 1.4±1.9, pregnancy rates (3/27 (%11.1 vs 2/28 (%7.1 and implantation rates (3/36 (%8.3 vs 2/22 (%9.1 in between the groups. Comment: Although AL protocol is not superior to MDL protocol in poor ovarian response patients, it may be used as an alternative protocol.

  16. Increasing fall risk awareness using wearables: A fall risk awareness protocol.

    Science.gov (United States)

    Danielsen, Asbjørn; Olofsen, Hans; Bremdal, Bernt Arild

    2016-10-01

    Each year about a third of elderly aged 65 or older experience a fall. Many of these falls may have been avoided if fall risk assessment and prevention tools where available in a daily living situation. We identify what kind of information is relevant for doing fall risk assessment and prevention using wearable sensors in a daily living environment by investigating current research, distinguishing between prospective and context-aware fall risk assessment and prevention. Based on our findings, we propose a fall risk awareness protocol as a fall prevention tool integrating both wearables and ambient sensing technology into a single platform. Copyright © 2016. Published by Elsevier Inc.

  17. The impact of protocol on nurses' role stress: a longitudinal perspective.

    Science.gov (United States)

    Dodd-McCue, Diane; Tartaglia, Alexander; Veazey, Kenneth W; Streetman, Pamela S

    2005-04-01

    The study examined the impact of a protocol directed at increasing organ donation on the role stress and work attitudes of critical care nurses involved in potential organ donation cases. The research examined whether the protocol could positively affect nurses' perceptions of role stress, and if so, could the work environment improvements be sustained over time. The Family Communication Coordinator (FCC) protocol promotes effective communication during potential organ donation cases using a multidisciplinary team approach. Previous research found it associated with improved donation outcomes and with improved perceptions of role stress by critical care nurses. However, the previous study lacked methodological rigor necessary to determine causality and sustainability over time. The study used a quasi-experimental prospective longitudinal design. The sample included critical care nurses who had experience with potential organ donation cases with the protocol. Survey data were collected at 4 points over 2 years. Surveys used previously validated and reliable measures of role stress (role ambiguity, role conflict, role overload) and work attitudes (commitment, satisfaction). Interviews supplemented these data. The nurses' perceptions of role stress associated with potential organ donation cases dramatically dropped after the protocol was implemented. All measures of role stress, particularly role ambiguity and role conflict, showed statistically significant and sustained improvement. Nurses' professional, unit, and hospital commitment and satisfaction reflect an increasingly positive workplace. The results demonstrate that the FCC protocol positively influenced the workplace through its impact on role stress over the first 2 years following its implementation. The findings suggest that similar protocols may be appropriate in improving the critical care environment by reducing the stress and uncertainty of professionals involved in other end-of-life situations. However

  18. Evaluation of Significance of Diffusely Increased Bilateral Renal Uptake on Bone Scan

    International Nuclear Information System (INIS)

    Sung, Mi Sook; Yang, Woo Jin; Byun, Jae Young; Park, Jung Mi; Shinn, Kyung Sub; Bahk, Yong Whee

    1990-01-01

    Unexpected renal abnormality can be detected on bone scan using 99m Tc-MDP. The purpose of the study is to evaluate the diagnostic significance of diffusely increased bilateral renal uptake on bone scan. 1,500 bone scan were reviewed and 43 scans which showed diffusely increased bilateral renal uptake were selected for analysis. Laboratory findings for renal and liver function tests including routine urinalysis were reviewed in 43 patients. 26 of 43 case showed abnormality in urinalysis and renal function study. 20 of 43 cases showed abnormal liver function study and 3 of these cases were diagnosed as hepatorenal syndrome later. 13 of those 20 cases had liver cirrhosis with or without hepatoma. 12 of 43 cases showed abnormality both in renal and liver function studies. 2 of 43 cases showed diffusely increased bilateral renal uptake after chemotherapy for cancer but not on previous scans before chemotherapy. 2 of 43 cases showed hypercalcaemia and 8 of 43 cases had multifocal bone uptake due to metastasis or benign bone lesion. But the latter showed no hypercalcaemia at all. There was no significant correlation between increased renal uptake and MDP uptake in soft tissue other than kidneys. This study raised the possibility that the impaired liver and/or renal function may result in diffuse increase of bilateral renal uptake of MDP of unknown mechanism. It seems to need further study on this correlation.

  19. Evaluation of Significance of Diffusely Increased Bilateral Renal Uptake on Bone Scan

    Energy Technology Data Exchange (ETDEWEB)

    Sung, Mi Sook; Yang, Woo Jin; Byun, Jae Young; Park, Jung Mi; Shinn, Kyung Sub; Bahk, Yong Whee [Catholic University College of Medicine, Seoul (Korea, Republic of)

    1990-03-15

    Unexpected renal abnormality can be detected on bone scan using {sup 99m}Tc-MDP. The purpose of the study is to evaluate the diagnostic significance of diffusely increased bilateral renal uptake on bone scan. 1,500 bone scan were reviewed and 43 scans which showed diffusely increased bilateral renal uptake were selected for analysis. Laboratory findings for renal and liver function tests including routine urinalysis were reviewed in 43 patients. 26 of 43 case showed abnormality in urinalysis and renal function study. 20 of 43 cases showed abnormal liver function study and 3 of these cases were diagnosed as hepatorenal syndrome later. 13 of those 20 cases had liver cirrhosis with or without hepatoma. 12 of 43 cases showed abnormality both in renal and liver function studies. 2 of 43 cases showed diffusely increased bilateral renal uptake after chemotherapy for cancer but not on previous scans before chemotherapy. 2 of 43 cases showed hypercalcaemia and 8 of 43 cases had multifocal bone uptake due to metastasis or benign bone lesion. But the latter showed no hypercalcaemia at all. There was no significant correlation between increased renal uptake and MDP uptake in soft tissue other than kidneys. This study raised the possibility that the impaired liver and/or renal function may result in diffuse increase of bilateral renal uptake of MDP of unknown mechanism. It seems to need further study on this correlation.

  20. St. John's wort significantly increased the systemic exposure and toxicity of methotrexate in rats

    International Nuclear Information System (INIS)

    Yang, Shih-Ying; Juang, Shin-Hun; Tsai, Shang-Yuan; Chao, Pei-Dawn Lee; Hou, Yu-Chi

    2012-01-01

    St. John's wort (SJW, Hypericum perforatum) is one of the popular nutraceuticals for treating depression. Methotrexate (MTX) is an immunosuppressant with narrow therapeutic window. This study investigated the effect of SJW on MTX pharmacokinetics in rats. Rats were orally given MTX alone and coadministered with 300 and 150 mg/kg of SJW, and 25 mg/kg of diclofenac, respectively. Blood was withdrawn at specific time points and serum MTX concentrations were assayed by a specific monoclonal fluorescence polarization immunoassay method. The results showed that 300 mg/kg of SJW significantly increased the AUC 0−t and C max of MTX by 163% and 60%, respectively, and 150 mg/kg of SJW significantly increased the AUC 0−t of MTX by 55%. In addition, diclofenac enhanced the C max of MTX by 110%. The mortality of rats treated with SJW was higher than that of controls. In conclusion, coadministration of SJW significantly increased the systemic exposure and toxicity of MTX. The combined use of MTX with SJW would need to be with caution. -- Highlights: ► St. John's wort significantly increased the AUC 0−t and C max of methotrexate. ► Coadministration of St. John's wort increased the exposure and toxicity of methotrexate. ► The combined use of methotrexate with St. John's wort will need to be with caution.

  1. Protocol optimization in chest CT scans of child

    Energy Technology Data Exchange (ETDEWEB)

    Abrao L, L. T.; Amaral de O, F.; Prata M, A. [Biomedical Engineering Center, Centro Federal de Educacao Tecnologica de Minas Gerais, 30421-169, Belo Horizonte, Minas Gerais (Brazil); Bustos F, M., E-mail: luanaabrao@gmail.com [Universidad Federal de Minas Gerais, Department of Nuclear Engineering, Av. Pres. Antonio Carlos 6627, Pampulha, 31270-901 Belo Horizonte, Minas Gerais (Brazil)

    2017-10-15

    The dissemination of Computed Tomography (CT), a radiodiagnostic technique, has significant increase in the patient dose. In the last years, this technique has shown a high growth due to clinical cases of medical emergencies, neoplasm and pediatric traumas. Dose measurement is important to correlate with the deleterious effects of radiation on the organism and radiation future effects is related with stochastic risks due to tissue radiosensitivity, allied to the life expectancy of the child. In this work, a cylindrical phantom, representing an adult chest made of polymethylmethacrylate (PMMA), was used and a new born chest phantom with a shape oblong was developed based on the dimensions of a typical newborn. In a Ge CT scanner, Discovery model, with 64 channels, the central slice of the phantoms were irradiated successively in order to obtain dose measurements using an ionizing pencil camera. Based in the measurements, dose index was calculated (CTDI{sub vol}). The radiological service chest protocol using a voltage of 120 kV was used for scanning 10 cm of the central area of the adult and newborn phantom, in helical mode. An acquisition of images was performed using this radiological service chest protocol to compare with the protocol optimized. In the newborn phantom was also used protocols optimized using a voltage of 120 and 80 kV. The voltage of 80 kV has the lowest dose index for the pediatric object phantom. This work allowed the comparison between absorbed dose variations by the pediatric phantom changing the X-ray tube supply voltage. This dose variation has shown how important is specific protocols for children. (Author)

  2. Protocol optimization in chest CT scans of child

    International Nuclear Information System (INIS)

    Abrao L, L. T.; Amaral de O, F.; Prata M, A.; Bustos F, M.

    2017-10-01

    The dissemination of Computed Tomography (CT), a radiodiagnostic technique, has significant increase in the patient dose. In the last years, this technique has shown a high growth due to clinical cases of medical emergencies, neoplasm and pediatric traumas. Dose measurement is important to correlate with the deleterious effects of radiation on the organism and radiation future effects is related with stochastic risks due to tissue radiosensitivity, allied to the life expectancy of the child. In this work, a cylindrical phantom, representing an adult chest made of polymethylmethacrylate (PMMA), was used and a new born chest phantom with a shape oblong was developed based on the dimensions of a typical newborn. In a Ge CT scanner, Discovery model, with 64 channels, the central slice of the phantoms were irradiated successively in order to obtain dose measurements using an ionizing pencil camera. Based in the measurements, dose index was calculated (CTDI vol ). The radiological service chest protocol using a voltage of 120 kV was used for scanning 10 cm of the central area of the adult and newborn phantom, in helical mode. An acquisition of images was performed using this radiological service chest protocol to compare with the protocol optimized. In the newborn phantom was also used protocols optimized using a voltage of 120 and 80 kV. The voltage of 80 kV has the lowest dose index for the pediatric object phantom. This work allowed the comparison between absorbed dose variations by the pediatric phantom changing the X-ray tube supply voltage. This dose variation has shown how important is specific protocols for children. (Author)

  3. A technology training protocol for meeting QSEN goals: Focusing on meaningful learning.

    Science.gov (United States)

    Luo, Shuhong; Kalman, Melanie

    2018-01-01

    The purpose of this paper is to describe and discuss how we designed and developed a 12-step technology training protocol. The protocol is meant to improve meaningful learning in technology education so that nursing students are able to meet the informatics requirements of Quality and Safety Education in Nursing competencies. When designing and developing the training protocol, we used a simplified experiential learning model that addressed the core features of meaningful learning: to connect new knowledge with students' prior knowledge and real-world workflow. Before training, we identified students' prior knowledge and workflow tasks. During training, students learned by doing, reflected on their prior computer skills and workflow, designed individualized procedures for integration into their workflow, and practiced the self-designed procedures in real-world settings. The trainer was a facilitator who provided a meaningful learning environment, asked the right questions to guide reflective conversation, and offered scaffoldings at critical moments. This training protocol could significantly improve nurses' competencies in using technologies and increase their desire to adopt new technologies. © 2017 Wiley Periodicals, Inc.

  4. Implementing a pain management nursing protocol for orthopaedic surgical patients: Results from a PAIN OUT project.

    Science.gov (United States)

    Cui, Cui; Wang, Ling-Xiao; Li, Qi; Zaslansky, Ruth; Li, Li

    2018-04-01

    To investigate the effect of introducing a standardised pain management nursing protocol in orthopaedic patients undergoing surgery. Postoperative pain is a common phenomenon but is still undertreated in hospitalised patients. Nurses' lack of sufficient knowledge and skills about pain management may be a contributing factor to poor outcomes. An interventional, separate sample pre- and post-test. A pain management nursing protocol was introduced and a handbook and training sessions regarding management of postsurgical pain were provided to the nurses on a Joint Orthopaedic ward at a university-affiliated general hospital in Guangzhou, China. Before and after the intervention, nurses' knowledge about pain management and attitudes were assessed, and perioperative management practices and pain-related patient-reported outcomes were evaluated. Sixteen and 15 registered nurses, and 77 and 71 patients participated in the study before and after the intervention, respectively. Nurses' scores related to knowledge and skills increased significantly after the protocol was introduced but were still insufficient with regard to pharmacological-related items. The proportion of patients receiving a combined opioid and nonopioid increased after the intervention. Clinically significant changes were observed in some patient-reported outcomes, such as worst pain since surgery, percentage of time experiencing severe pain, and pain interference with activities out of bed. There were significant changes in nonpharmacological methods administered by nurses to patients or used by patients to relieve pain. Implementation of a pain management nursing protocol combined with education in one surgical ward was associated with nurses' increased knowledge and attitudes regarding pain, a change in some management practices, and improvement in a number of pain-related patient-reported outcomes. It was feasible to develop and implement a standardised pain management nursing protocol and use it in the

  5. A protocol of early aggressive acceleration of tube feeding increases ileus without perceptible benefit in severely burned patients.

    Science.gov (United States)

    Kesey, Jennifer; Dissanaike, Sharmila

    2013-01-01

    Optimal nutrition is essential to the recovery of burned patients. The authors evaluated the efficacy of an aggressive nutrition delivery protocol. The following protocol was implemented: initiation of tube feeds within 4 hours, acceleration to goal rate within 8 hours, and tolerance of gastric residual volumes of 400 ml. Patients on the protocol formed the study group whereas patients admitted immediately before implementation served as controls for a study period of 7 days after admission. Outcome variables included ileus, prokinetic medication use, intensive care unit and overall length of stay, ventilator days and mortality. Variables were compared using bivariate analysis. The 42 study subjects and 34 controls were similar at baseline. Time to initiation was similar (6.8 vs 9.4 hours; P = .226), however, goal rate was achieved much sooner in the study group (11.2 vs 20.9 hours; P protocol was successfully implemented and resulted in early achievement of goal tube feed rates. However, this resulted in tube feed intolerance as manifested by more cases of clinical ileus.

  6. Comparison of two neonatal indomethacin protocols: efficacy and outcome for patent ductus arteriosus closure.

    Science.gov (United States)

    Rosito, G; Sum, K; Chorne, N

    2010-10-01

    Indomethacin, a non-selective inhibitor of prostaglandin synthesis, is the gold standard treatment for patent ductus arteriosus (PDA). Indomethacin has been shown to permanently close the ductus and when given prophylactically, it reduces the incidence of PDA (1, 2). This study compares PDA closure and surgical ligation rates between patients using two different indomethacin administration protocols. This is a retrospective comparison analysis of 72 neonates, who received one of two indomethacin administration protocols. Our previous protocol suggested an initial dose of 0·2 mg/kg followed by two 0·1 mg/kg, with doses infused over 4 h and a 24-h dosing interval. A new potentially more useful protocol using the same mg/kg dose regimen but with doses infused over 30 min and a 12-h dosing interval, was evaluated. Each neonate was allowed three courses of treatment before surgical ligation was performed for persistent PDA. There were no statistically significant differences between the two protocol groups when comparing percentages of neonates with gestational age≤28 weeks, birth weight≤1000 g, male gender or receiving indomethacin for the indication of PDA prophylaxis vs. treatment. There was a trend towards a higher PDA closure rate and subsequently a lower PDA ligation rate in the new protocol when compared with the previous protocol. In this small population of premature neonates, there was a trend, but no significant difference, towards increasing PDA closure and lower surgical ligation rates in neonates given indomethacin with more frequent dosing and shorter infusion time. A well-powered randomized controlled trial is now needed. Copyright © 2010 The Authors. JCPT © 2010 Blackwell Publishing Ltd.

  7. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol\\'s perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain\\'s fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  8. Acute effects of short and long duration dynamic stretching protocols on muscle strength

    Directory of Open Access Journals (Sweden)

    Christiano Francisco dos Santos

    Full Text Available Objective Compare the acute effects of dynamic stretching protocols on the isokinetic performance of the quadriceps and hamstring muscles at two velocities in adult males.Methodology Included the participation of 14 males (21 ± 2.6 years; 178 ± 0.4 cm; 73.2 ± 20.9 kg were assessed using an isokinetic dynamometer before and after following a short or long-duration dynamic stretching protocol or a control protocol. The results were assessed by a two-way ANOVA and a Scheffé’s post hoc test at a 5% significance level.Results No difference was found in the variables assessed at 180°/s after LDDS. At 60°/s, LDDS reduced the power of the knee flexors. The control protocol reduced the power of the knee flexors and increased the power of the extensors. At 60°/s, the work of the knee flexors exhibited a reduction after LDDS. The control protocol resulted in a reduction in the work of the flexors. The peak torque angle exhibited a reduction in the extensors and flexors after LDDS and SDDS.Conclusion Dynamic stretching did not cause any change in the peak torque, which points to its possible use in activities involving velocity and muscle strength. The executing dynamic stretching before physical activities such as running and high-intensity sports might be beneficial by promoting increases in heart rate and in body temperature.

  9. Hydrofluorocarbon (HFC) Scenarios, Climate Effects and the Montreal Protocol

    Science.gov (United States)

    Velders, G. J. M.; Fahey, D. W.; Daniel, J. S.

    2016-12-01

    The Montreal Protocol has reduced the use of ozone-depleting substances by more than 95% from its peak levels in the 1980s. As a direct result the use of hydrofluorocarbons (HFCs) as substitute compounds has increased significantly. National regulations to limit HFC use have been adopted recently in the European Union, Japan and USA, and four proposals have been submitted to amend the Montreal Protocol to substantially reduce growth in HFC use. The Parties of the Montreal Protocol have discussed these proposals during their meetings in 2016. The effects of the national regulations and Montreal Protocol amendment proposals on climate forcings and surface temperatures will be presented. Global scenarios of HFC emissions reach 4.0-5.3 GtCO2-eq yr-1 in 2050, which corresponds to a projected growth from 2015 to 2050 which is 9% to 29% of that for CO2 over the same time period. In 2050, in percent of global HFC emissions, China ( 30%), India and the rest of Asia ( 25%), Middle East and northern Africa ( 10%), and USA ( 10%) are the principal source regions; and refrigeration and stationary air conditioning are the major use sectors. Calculated baseline emissions are reduced by 90% in 2050 by implementing the North America Montreal Protocol amendment proposal. This corresponds to a reduction in surface temperature attributed to HFCs from 0.1 oC to 0.04 oC in 2050 and from 0.3-0.4 oC to 0.02 oC in 2100.

  10. An Energy-Efficient Link Layer Protocol for Reliable Transmission over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Iqbal Adnan

    2009-01-01

    Full Text Available In multihop wireless networks, hop-by-hop reliability is generally achieved through positive acknowledgments at the MAC layer. However, positive acknowledgments introduce significant energy inefficiencies on battery-constrained devices. This inefficiency becomes particularly significant on high error rate channels. We propose to reduce the energy consumption during retransmissions using a novel protocol that localizes bit-errors at the MAC layer. The proposed protocol, referred to as Selective Retransmission using Virtual Fragmentation (SRVF, requires simple modifications to the positive-ACK-based reliability mechanism but provides substantial improvements in energy efficiency. The main premise of the protocol is to localize bit-errors by performing partial checksums on disjoint parts or virtual fragments of a packet. In case of error, only the corrupted virtual fragments are retransmitted. We develop stochastic models of the Simple Positive-ACK-based reliability, the previously-proposed Packet Length Optimization (PLO protocol, and the SRVF protocol operating over an arbitrary-order Markov wireless channel. Our analytical models show that SRVF provides significant theoretical improvements in energy efficiency over existing protocols. We then use bit-error traces collected over different real networks to empirically compare the proposed and existing protocols. These experimental results further substantiate that SRVF provides considerably better energy efficiency than Simple Positive-ACK and Packet Length Optimization protocols.

  11. Effect of two complex training protocols of back squats in blood indicators of muscular damage in military athletes.

    Science.gov (United States)

    Ojeda, Álvaro Huerta; Ríos, Luis Chirosa; Barrilao, Rafael Guisado; Ríos, Ignacio Chirosa; Serrano, Pablo Cáceres

    2016-05-01

    [Purpose] The aim of this study was to determine the variations in the blood muscular damage indicators post application of two complex training programs for back squats. [Subjects and Methods] Seven military athletes were the subjects of this study. The study had a quasi-experimental cross-over intra-subject design. Two complex training protocols were applied, and the variables to be measured were cortisol, metabolic creatine kinase, and total creatine kinase. For the statistical analysis, Student's t-test was used. [Results] Twenty-four hours post effort, a significant decrease in cortisol level was shown for both protocols; however, the metabolic creatine kinase and total creatine kinase levels showed a significant increase. [Conclusion] Both protocols lowered the indicator of main muscular damage in the blood supply (cortisol). This proved that the work weight did not generate significant muscular damage in the 24-hour post-exercise period.

  12. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  13. Evaluation of svr: a wireless sensor network routing protocol

    International Nuclear Information System (INIS)

    Baloch, J.; Khanzada, T.J.S.

    2014-01-01

    The advancement in technology has made it possible to create small in size, low cost sensor nodes. However, the small size and low cost of such nodes comesat at price that is, reduced processing power, low memory and significantly small battery energy storage. WSNs (Wireless Sensor Networks) are inherently ad hoc in nature and are assumed to work in the toughest terrain. The network lifetime plays a pivotal role in a wireless sensor network. A long network lifetime, could be achieved by either making significant changes in these low cost devices, which is not a feasible solution or by improving the means of communication throughout the network. The communication in such networks could be improved by employing energy efficient routing protocols, to route the data throughout the network. In this paper the SVR (Spatial Vector Routing) protocol is compared against the most common WSN routing protocols, and from the results it could be inferred that the SVR protocol out performs its counterparts. The protocol provides an energy efficient means of communication in the network. (author)

  14. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  15. Access Protocol For An Industrial Optical Fibre LAN

    Science.gov (United States)

    Senior, John M.; Walker, William M.; Ryley, Alan

    1987-09-01

    A structure for OSI levels 1 and 2 of a local area network suitable for use in a variety of industrial environments is reported. It is intended that the LAN will utilise optical fibre technology at the physical level and a hybrid of dynamically optimisable token passing and CSMA/CD techniques at the data link (IEEE 802 medium access control - logical link control) level. An intelligent token passing algorithm is employed which dynamically allocates tokens according to the known upper limits on the requirements of each device. In addition a system of stochastic tokens is used to increase efficiency when the stochastic traffic is significant. The protocol also allows user-defined priority systems to be employed and is suitable for distributed or centralised implementation. The results of computer simulated performance characteristics for the protocol using a star-ring topology are reported which demonstrate its ability to perform efficiently with the device and traffic loads anticipated within an industrial environment.

  16. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung; Kazandjieva, Maria A.; Jain, Mayank; Levis, Philip

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol's perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain's fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  17. Radiation dose reduction in CT-guided periradicular injections in lumbar spine: Feasibility of a new institutional protocol for improved patient safety

    Directory of Open Access Journals (Sweden)

    Artner Juraj

    2012-08-01

    Full Text Available Abstract Background Image guided spinal injections are successfully used in the management of low back pain and sciatica. The main benefit of CT-guided injections is the safe, fast and precise needle placement, but the radiation exposure remains a serious concern. The purpose of the study was to test a new institutional low-dose protocol for CT-guided periradicular injections in lumbar spine to reduce radiation exposure while increasing accuracy and safety for the patients. Methods We performed a retrospective analysis of a prospective database during a 4-month period (Oct-Dec 2011 at a German University hospital using a newly established low-dose-CT-protocol for periradicular injections in patients suffering from lumbar disc herniation and nerve root entrapment. Inclusion criteria were acute or chronic nerve root irritation due to lumbar disc hernia, age over 18, compliance and informed consent. Excluded were patients suffering from severe obesity (BMI > 30, coagulopathy, allergy to injected substances, infection and non-compliant patients. Outcome parameters consisted of the measured dose length product (mGycm2, the amount of scans, age, gender, BMI and the peri-interventional complications. The results were compared to 50 patients, treated in the standard-interventional CT-protocol for spinal injections, performed in June-Oct 2011, who met the above mentioned inclusion criteria. Results A total amount of 100 patients were enrolled in the study. A significant radiation dose reduction (average 85.31% was achieved using the institutional low-dose protocol compared to standard intervention mode in CT-guided periradicular injections in lumbar spine. Using the low-dose protocol did not increase the complications rate in the analyzed cohort. Conclusions Low-dose-CT-protocols for lumbar perineural injections significantly reduce the exposure to radiation of non-obese patients without an increase of complications. This increases long-time patient

  18. Effects of a Short Drilling Implant Protocol on Osteotomy Site Temperature and Drill Torque.

    Science.gov (United States)

    Mihali, Sorin G; Canjau, Silvana; Cernescu, Anghel; Bortun, Cristina M; Wang, Hom-Lay; Bratu, Emanuel

    2018-02-01

    To establish a protocol for reducing the drilling sequence during implant site preparation based on temperature and insertion torque. The traditional conventional drilling sequence (used several drills with 0.6-mm increment each time) was compared with the proposed short drilling protocol (only used 2 drills: initial and final drill). One hundred drilling osteotomies were performed in bovine and porcine bones. Sets of 2 osteotomy sites were created in 5 bone densities using 2 types of drilling protocols. Thermographic pictures were captured throughout all drilling procedures and analyzed using ThermaCAM Researcher Professional 2.10. Torque values were determined during drilling by measuring electrical input and drill speed. There were statistically significant differences in bone temperature between the conventional and short drilling protocols during implant site preparation (analysis of variance P = 0.0008). However, there were no significant differences between the 2 types of drilling protocols for both implant diameters. Implant site preparation time was significantly reduced when using the short drilling protocol compared with the conventional drilling protocol (P drilling protocol proposed herein may represent a safe approach for implant site preparation.

  19. [Effect of a multidisciplinar protocol on the clinical results obtained after bariatric surgery].

    Science.gov (United States)

    Cánovas Gaillemin, B; Sastre Martos, J; Moreno Segura, G; Llamazares Iglesias, O; Familiar Casado, C; Abad de Castro, S; López Pardo, R; Sánchez-Cabezudo Muñoz, M A

    2011-01-01

    Bariatric surgery has been shown to be an effective therapy for weight loss in patients with severe obesity, and the implementation of a multidisciplinar management protocol is recommended. To assess the usefulness of the implementation of a management protocol in obesity surgery based on the Spanish Consensus Document of the SEEDO. Retrospective comparative study of the outcomes in patients previously operated (51 patients) and after the implementation of the protocol (66 patients). The following data were gathered: anthropometry, pre-and post-surgery comorbidities, post-surgical nutritional and surgical complications, validated Quality of Life questionnaire, and dietary habits. Withdrawals (l7.6%) and alcoholism (5.8%) were higher in patients pre- versus post-implementation of the protocol (4.5% vs. 3%, respectively), the differences being statistically significant. The mortality rate was 2% in the pre-protocol group and 0% in the postprotocol group. The dietary habits were better in the post-protocol group, the pre-protocol group presenting a higher percentage of feeding-behavior disorders (5.1%) although not reaching a statistical significance. The improvement in quality of life was higher in the post-protocol group for all items, but only reaching statistical significance in sexual activity (p = 0.004). In the pre-protocol group, 70.5% of the patients had more than one nutritional complication vs. 32.8% in the post-protocol group (p 50% in 81.3% in the pre-protocol group vs. 74.8% in the pos-protocol group) or the comorbidities. Bariatric surgery achieves excellent outcomes in weight loss, comorbidities, and quality of life, but presents nutritional, surgical, and psychiatric complications that require a protocol-based and multidisciplinary approach. Our protocol improves the outcomes regarding the withdrawal rates, feeding-behavior disorders, dietary habits, nutritional complications, and quality of life.

  20. New logistics protocols for distributed interactive simulation

    Science.gov (United States)

    Taylor, Darrin; Morrison, John; Katz, Warren; Felton, Erik; Herman, Deborah A.

    1995-06-01

    In today's environment, the transportation and maintenance of military forces is nearly as important as combat operations. Rapid deployment to regions of low-intensity conflict will become a very common training scenario for the U.S. military. Thus it is desirable to apply distributed simulation technology to train logistics personnel in their combat support roles. Currently, distributed interactive simulation (DIS) only contains rudimentary logistics protocols. This paper introduces new protocols designed to handle the logistics problem. The Newtonian protocol takes a physics-based approach to modeling interactions on the simulation network. This protocol consists of a family of protocol data units (PDUs) which are used to communicate forces in different circumstances. The protocol implements a small set of physical relations. This represents a flexible and general mechanism to describe battlefield interactions between network entities. The migratory object protocol (MOP) family addresses the transfer of control. General mechanisms provide the means to simulate resupply, repair, and maintenance of entities at any level of abstraction (individual soldier to division). It can also increase the fidelity of mine laying, enable handover of weapons for terminal guidance, allow for the distribution of aggregate-level simulation entities, provide capabilities for the simulation of personnel, etc.

  1. Control room envelope unfiltered air inleakage test protocols

    International Nuclear Information System (INIS)

    Lagus, P.L.; Grot, R.A.

    1997-01-01

    In 1983, the Advisory Committee on Reactor Safeguards (ACRS) recommended that the US NRC develop a control room HVAC performance testing protocol. To date no such protocol has been forthcoming. Beginning in mid-1994, an effort was funded by NRC under a Small Business Innovation Research (SBIR) grant to develop several simplified test protocols based on the principles of tracer gas testing in order to measure the total unfiltered inleakage entering a CRE during emergency mode operation of the control room ventilation system. These would allow accurate assessment of unfiltered air inleakage as required in SRP 6.4. The continuing lack of a standard protocol is unfortunate since one of the significant parameters required to calculate operator dose is the amount of unfiltered air inleakage into the control room. Often it is assumed that, if the Control Room Envelope (CRE) is maintained at +1/8 in. w.g. differential pressure relative to the surroundings, no significant unfiltered inleakage can occur it is further assumed that inleakage due to door openings is the only source of unfiltered air. 23 refs., 13 figs., 2 tabs

  2. Control room envelope unfiltered air inleakage test protocols

    Energy Technology Data Exchange (ETDEWEB)

    Lagus, P.L. [Lagus Applied Technology, San Diego, CA (United States); Grot, R.A. [Lagus Applied Technology, Olney, MD (United States)

    1997-08-01

    In 1983, the Advisory Committee on Reactor Safeguards (ACRS) recommended that the US NRC develop a control room HVAC performance testing protocol. To date no such protocol has been forthcoming. Beginning in mid-1994, an effort was funded by NRC under a Small Business Innovation Research (SBIR) grant to develop several simplified test protocols based on the principles of tracer gas testing in order to measure the total unfiltered inleakage entering a CRE during emergency mode operation of the control room ventilation system. These would allow accurate assessment of unfiltered air inleakage as required in SRP 6.4. The continuing lack of a standard protocol is unfortunate since one of the significant parameters required to calculate operator dose is the amount of unfiltered air inleakage into the control room. Often it is assumed that, if the Control Room Envelope (CRE) is maintained at +1/8 in. w.g. differential pressure relative to the surroundings, no significant unfiltered inleakage can occur it is further assumed that inleakage due to door openings is the only source of unfiltered air. 23 refs., 13 figs., 2 tabs.

  3. Association between increase in vertical ground reaction force loading rate and pain level in women with patellofemoral pain after a patellofemoral joint loading protocol.

    Science.gov (United States)

    Briani, Ronaldo Valdir; Pazzinatto, Marcella Ferraz; Waiteman, Marina Cabral; de Oliveira Silva, Danilo; de Azevedo, Fábio Mícolis

    2018-04-11

    The etiology of patellofemoral pain (PFP) is thought to be the result of increased patellofemoral joint (PFJ) load and aberrant lower extremity mechanics, including altered vertical ground reaction forces (VGRF). However, few studies have investigated the association between an increase in pain and VGRF loading rates in the context of PFP. Thus, this study aimed to investigate the immediate effects of PFJ loading on pain and VGRF loading rate, and to see if there is a link between modification of both pain and VGRF loading rate during stair negotiation. Thirty-four women with PFP underwent VGRF analysis during stair negotiation under two conditions: with (condition 2) and without (condition 1) being previously submitted to a PFJ loading protocol in order to or not to exacerbate their knee pain, respectively. The VGRF loading rates were significantly higher in condition 2 (Mean ± standard deviation (SD)=4.0±0.6N/s) compared to condition 1 (Mean±SD=3.6±0.5N/s) during stair ascent and during stair descent (Mean±SD: condition 1=6.3±1.1N/s; condition 2=7.0±1.4N/s). In addition, VGRF loading rates were higher during stair descent compared to stair ascent in both conditions. There were significant correlations between the increase in pain and VGRF loading rate during both tasks. There seemed to be an important relation between the increase in pain and VGRF loading rates in women with PFP. Based on these findings, interventions aimed at reducing VGRF loading rates are important in the context of PFP. Copyright © 2018 Elsevier B.V. All rights reserved.

  4. A clip-based protocol for breast boost radiotherapy provides clear target visualisation and demonstrates significant volume reduction over time

    Energy Technology Data Exchange (ETDEWEB)

    Lewis, Lorraine [Department of Radiation Oncology, Northern Sydney Cancer Centre, Royal North Shore Hospital, Sydney, New South Wales (Australia); Cox, Jennifer [Department of Radiation Oncology, Northern Sydney Cancer Centre, Royal North Shore Hospital, Sydney, New South Wales (Australia); Faculty of Health Sciences, University of Sydney, Sydney, New South Wales (Australia); Morgia, Marita [Department of Radiation Oncology, Northern Sydney Cancer Centre, Royal North Shore Hospital, Sydney, New South Wales (Australia); Atyeo, John [Faculty of Health Sciences, University of Sydney, Sydney, New South Wales (Australia); Lamoury, Gillian [Department of Radiation Oncology, Northern Sydney Cancer Centre, Royal North Shore Hospital, Sydney, New South Wales (Australia)

    2015-09-15

    The clinical target volume (CTV) for early stage breast cancer is difficult to clearly identify on planning computed tomography (CT) scans. Surgical clips inserted around the tumour bed should help to identify the CTV, particularly if the seroma has been reabsorbed, and enable tracking of CTV changes over time. A surgical clip-based CTV delineation protocol was introduced. CTV visibility and its post-operative shrinkage pattern were assessed. The subjects were 27 early stage breast cancer patients receiving post-operative radiotherapy alone and 15 receiving post-operative chemotherapy followed by radiotherapy. The radiotherapy alone (RT/alone) group received a CT scan at median 25 days post-operatively (CT1rt) and another at 40 Gy, median 68 days (CT2rt). The chemotherapy/RT group (chemo/RT) received a CT scan at median 18 days post-operatively (CT1ch), a planning CT scan at median 126 days (CT2ch), and another at 40 Gy (CT3ch). There was no significant difference (P = 0.08) between the initial mean CTV for each cohort. The RT/alone cohort showed significant CTV volume reduction of 38.4% (P = 0.01) at 40 Gy. The Chemo/RT cohort had significantly reduced volumes between CT1ch: median 54 cm{sup 3} (4–118) and CT2ch: median 16 cm{sup 3}, (2–99), (P = 0.01), but no significant volume reduction thereafter. Surgical clips enable localisation of the post-surgical seroma for radiotherapy targeting. Most seroma shrinkage occurs early, enabling CT treatment planning to take place at 7 weeks, which is within the 9 weeks recommended to limit disease recurrence.

  5. A clip-based protocol for breast boost radiotherapy provides clear target visualisation and demonstrates significant volume reduction over time

    International Nuclear Information System (INIS)

    Lewis, Lorraine; Cox, Jennifer; Morgia, Marita; Atyeo, John; Lamoury, Gillian

    2015-01-01

    The clinical target volume (CTV) for early stage breast cancer is difficult to clearly identify on planning computed tomography (CT) scans. Surgical clips inserted around the tumour bed should help to identify the CTV, particularly if the seroma has been reabsorbed, and enable tracking of CTV changes over time. A surgical clip-based CTV delineation protocol was introduced. CTV visibility and its post-operative shrinkage pattern were assessed. The subjects were 27 early stage breast cancer patients receiving post-operative radiotherapy alone and 15 receiving post-operative chemotherapy followed by radiotherapy. The radiotherapy alone (RT/alone) group received a CT scan at median 25 days post-operatively (CT1rt) and another at 40 Gy, median 68 days (CT2rt). The chemotherapy/RT group (chemo/RT) received a CT scan at median 18 days post-operatively (CT1ch), a planning CT scan at median 126 days (CT2ch), and another at 40 Gy (CT3ch). There was no significant difference (P = 0.08) between the initial mean CTV for each cohort. The RT/alone cohort showed significant CTV volume reduction of 38.4% (P = 0.01) at 40 Gy. The Chemo/RT cohort had significantly reduced volumes between CT1ch: median 54 cm 3 (4–118) and CT2ch: median 16 cm 3 , (2–99), (P = 0.01), but no significant volume reduction thereafter. Surgical clips enable localisation of the post-surgical seroma for radiotherapy targeting. Most seroma shrinkage occurs early, enabling CT treatment planning to take place at 7 weeks, which is within the 9 weeks recommended to limit disease recurrence

  6. Electronic Voting Protocol Using Identity-Based Cryptography

    Directory of Open Access Journals (Sweden)

    Gina Gallegos-Garcia

    2015-01-01

    Full Text Available Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC, which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE. With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI. Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  7. Electronic Voting Protocol Using Identity-Based Cryptography.

    Science.gov (United States)

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  8. Studying protocol-based pain management in the emergency department

    Directory of Open Access Journals (Sweden)

    Akkamahadevi Patil

    2017-01-01

    Full Text Available Background: Majority of the patients presenting to emergency department (ED have pain. ED oligoanalgesia remains a challenge. Aims: This study aims to study the effect of implementing a protocol-based pain management in the ED on (1 time to analgesia and (2 adequacy of analgesia obtained. Settings and Design: Cross-sectional study in the ED. Methods: Patients aged 18–65 years of age with pain of numeric rating scale (NRS ≥4 were included. A series of 100 patients presenting before introduction of the protocol-based pain management were grouped “pre-protocol,” and managed as per existing practice. Following this, a protocol for management of all patients presenting to ED with pain was implemented. Another series of 100 were grouped as “post-protocol” and managed as per the new pain management protocol. The data of patients from both the groups were collected and analyzed. Statistical Analysis Used: Descriptive statistical tests such as percentage, mean and standard deviation and inferential statistical tests such as Pearson coefficient, Student's t-test were applied. Differences were interpreted as significant when P < 0.05. Results: Mean time to administer analgesic was significantly lesser in the postprotocol group (preprotocol 20.30 min vs. postprotocol 13.05 min; P < 0.001. There was significant difference in the pain relief achieved (change in NRS between the two groups, with greater pain relief achieved in the postprotocol group (preprotocol group 4.6800 vs. postprotocol group 5.3600; P < 0.001. Patients' rating of pain relief (assessed on E5 scale was significantly higher in the postprotocol group (preprotocol 3.91 vs. postprotocol 4.27; P = 0.001. Patients' satisfaction (North American Spine Society scale with the overall treatment was also compared and found to be significantly higher in postprotocol group (mean: preprotocol 1.59 vs. postprotocol 1.39; P = 0.008. Conclusion: Protocol-based pain management provided timely and

  9. Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario

    Directory of Open Access Journals (Sweden)

    Yanan Chen

    2018-01-01

    Full Text Available Vehicle-to-infrastructure (V2I communication enables moving vehicles to upload real-time data about road surface situation to the Internet via fixed roadside units (RSU. Thanks to the resource restriction of mobile vehicles, fog computation-enhanced V2I communication scenario has received increasing attention recently. However, how to aggregate the sensed data from vehicles securely and efficiently still remains open to the V2I communication scenario. In this paper, a light-weight and anonymous aggregation protocol is proposed for the fog computing-based V2I communication scenario. With the proposed protocol, the data collected by the vehicles can be efficiently obtained by the RSU in a privacy-preserving manner. Particularly, we first suggest a certificateless aggregate signcryption (CL-A-SC scheme and prove its security in the random oracle model. The suggested CL-A-SC scheme, which is of independent interest, can achieve the merits of certificateless cryptography and signcryption scheme simultaneously. Then we put forward the anonymous aggregation protocol for V2I communication scenario as one extension of the suggested CL-A-SC scheme. Security analysis demonstrates that the proposed aggregation protocol achieves desirable security properties. The performance comparison shows that the proposed protocol significantly reduces the computation and communication overhead compared with the up-to-date protocols in this field.

  10. WDM Network and Multicasting Protocol Strategies

    Directory of Open Access Journals (Sweden)

    Pinar Kirci

    2014-01-01

    Full Text Available Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM, it is easier to take the advantage of optical networks and optical burst switching (OBS and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET and Just In Time (JIT reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes.

  11. Real-Time Fault Tolerant Networking Protocols

    National Research Council Canada - National Science Library

    Henzinger, Thomas A

    2004-01-01

    We made significant progress in the areas of video streaming, wireless protocols, mobile ad-hoc and sensor networks, peer-to-peer systems, fault tolerant algorithms, dependability and timing analysis...

  12. Quantum deterministic key distribution protocols based on the authenticated entanglement channel

    International Nuclear Information System (INIS)

    Zhou Nanrun; Wang Lijun; Ding Jie; Gong Lihua

    2010-01-01

    Based on the quantum entanglement channel, two secure quantum deterministic key distribution (QDKD) protocols are proposed. Unlike quantum random key distribution (QRKD) protocols, the proposed QDKD protocols can distribute the deterministic key securely, which is of significant importance in the field of key management. The security of the proposed QDKD protocols is analyzed in detail using information theory. It is shown that the proposed QDKD protocols can safely and effectively hand over the deterministic key to the specific receiver and their physical implementation is feasible with current technology.

  13. Quantum deterministic key distribution protocols based on the authenticated entanglement channel

    Energy Technology Data Exchange (ETDEWEB)

    Zhou Nanrun; Wang Lijun; Ding Jie; Gong Lihua [Department of Electronic Information Engineering, Nanchang University, Nanchang 330031 (China)], E-mail: znr21@163.com, E-mail: znr21@hotmail.com

    2010-04-15

    Based on the quantum entanglement channel, two secure quantum deterministic key distribution (QDKD) protocols are proposed. Unlike quantum random key distribution (QRKD) protocols, the proposed QDKD protocols can distribute the deterministic key securely, which is of significant importance in the field of key management. The security of the proposed QDKD protocols is analyzed in detail using information theory. It is shown that the proposed QDKD protocols can safely and effectively hand over the deterministic key to the specific receiver and their physical implementation is feasible with current technology.

  14. to the Question of IPv6-protocol Logical Characteristics Properties Using in order to Increase of the Security Level of the Russian Federation National Information Technology Infrastructure

    Directory of Open Access Journals (Sweden)

    Dmitry Anatolevich Melnikov

    2014-02-01

    Full Text Available This paper proposes a method of IPv6-protocol logical characteristics using in order to increase the security level of the Russian Federation national information technology infrastructure and the global information society.

  15. Continuous background light significantly increases flashing-light enhancement of photosynthesis and growth of microalgae.

    Science.gov (United States)

    Abu-Ghosh, Said; Fixler, Dror; Dubinsky, Zvy; Iluz, David

    2015-01-01

    Under specific conditions, flashing light enhances the photosynthesis rate in comparison to continuous illumination. Here we show that a combination of flashing light and continuous background light with the same integrated photon dose as continuous or flashing light alone can be used to significantly enhance photosynthesis and increase microalgae growth. To test this hypothesis, the green microalga Dunaliella salina was exposed to three different light regimes: continuous light, flashing light, and concomitant application of both. Algal growth was compared under three different integrated light quantities; low, intermediate, and moderately high. Under the combined light regime, there was a substantial increase in all algal growth parameters, with an enhanced photosynthesis rate, within 3days. Our strategy demonstrates a hitherto undescribed significant increase in photosynthesis and algal growth rates, which is beyond the increase by flashing light alone. Copyright © 2015 Elsevier Ltd. All rights reserved.

  16. Breast-cancer-associated metastasis is significantly increased in a model of autoimmune arthritis.

    Science.gov (United States)

    Das Roy, Lopamudra; Pathangey, Latha B; Tinder, Teresa L; Schettini, Jorge L; Gruber, Helen E; Mukherjee, Pinku

    2009-01-01

    Sites of chronic inflammation are often associated with the establishment and growth of various malignancies including breast cancer. A common inflammatory condition in humans is autoimmune arthritis (AA) that causes inflammation and deformity of the joints. Other systemic effects associated with arthritis include increased cellular infiltration and inflammation of the lungs. Several studies have reported statistically significant risk ratios between AA and breast cancer. Despite this knowledge, available for a decade, it has never been questioned if the site of chronic inflammation linked to AA creates a milieu that attracts tumor cells to home and grow in the inflamed bones and lungs which are frequent sites of breast cancer metastasis. To determine if chronic inflammation induced by autoimmune arthritis contributes to increased breast cancer-associated metastasis, we generated mammary gland tumors in SKG mice that were genetically prone to develop AA. Two breast cancer cell lines, one highly metastatic (4T1) and the other non-metastatic (TUBO) were used to generate the tumors in the mammary fat pad. Lung and bone metastasis and the associated inflammatory milieu were evaluated in the arthritic versus the non-arthritic mice. We report a three-fold increase in lung metastasis and a significant increase in the incidence of bone metastasis in the pro-arthritic and arthritic mice compared to non-arthritic control mice. We also report that the metastatic breast cancer cells augment the severity of arthritis resulting in a vicious cycle that increases both bone destruction and metastasis. Enhanced neutrophilic and granulocytic infiltration in lungs and bone of the pro-arthritic and arthritic mice and subsequent increase in circulating levels of proinflammatory cytokines, such as macrophage colony stimulating factor (M-CSF), interleukin-17 (IL-17), interleukin-6 (IL-6), vascular endothelial growth factor (VEGF), and tumor necrosis factor-alpha (TNF-alpha) may contribute

  17. Breast cancer-associated metastasis is significantly increased in a model of autoimmune arthritis

    Science.gov (United States)

    Das Roy, Lopamudra; Pathangey, Latha B; Tinder, Teresa L; Schettini, Jorge L; Gruber, Helen E; Mukherjee, Pinku

    2009-01-01

    Introduction Sites of chronic inflammation are often associated with the establishment and growth of various malignancies including breast cancer. A common inflammatory condition in humans is autoimmune arthritis (AA) that causes inflammation and deformity of the joints. Other systemic effects associated with arthritis include increased cellular infiltration and inflammation of the lungs. Several studies have reported statistically significant risk ratios between AA and breast cancer. Despite this knowledge, available for a decade, it has never been questioned if the site of chronic inflammation linked to AA creates a milieu that attracts tumor cells to home and grow in the inflamed bones and lungs which are frequent sites of breast cancer metastasis. Methods To determine if chronic inflammation induced by autoimmune arthritis contributes to increased breast cancer-associated metastasis, we generated mammary gland tumors in SKG mice that were genetically prone to develop AA. Two breast cancer cell lines, one highly metastatic (4T1) and the other non-metastatic (TUBO) were used to generate the tumors in the mammary fat pad. Lung and bone metastasis and the associated inflammatory milieu were evaluated in the arthritic versus the non-arthritic mice. Results We report a three-fold increase in lung metastasis and a significant increase in the incidence of bone metastasis in the pro-arthritic and arthritic mice compared to non-arthritic control mice. We also report that the metastatic breast cancer cells augment the severity of arthritis resulting in a vicious cycle that increases both bone destruction and metastasis. Enhanced neutrophilic and granulocytic infiltration in lungs and bone of the pro-arthritic and arthritic mice and subsequent increase in circulating levels of proinflammatory cytokines, such as macrophage colony stimulating factor (M-CSF), interleukin-17 (IL-17), interleukin-6 (IL-6), vascular endothelial growth factor (VEGF), and tumor necrosis factor

  18. An Improved 6LoWPAN Hierarchical Routing Protocol

    Directory of Open Access Journals (Sweden)

    Xue Li

    2015-10-01

    Full Text Available IETF 6LoWPAN working group is engaged in the IPv6 protocol stack research work based on IEEE802.15.4 standard. In this working group, the routing protocol is one of the important research contents. In the 6LoWPAN, HiLow is a well-known layered routing protocol. This paper puts forward an improved hierarchical routing protocol GHiLow by improving HiLow parent node selection and path restoration strategy. GHiLow improves the parent node selection by increasing the choice of parameters. Simutaneously, it also improves path recovery by analysing different situations to recovery path. Therefore, GHiLow contributes to the ehancement of network performance and the decrease of network energy consumption.

  19. A SURVEY ON MULTICAST ROUTING PROTOCOLS FOR PERFORMANCE EVALUATION IN WIRELESS SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    A. Suruliandi

    2015-03-01

    Full Text Available Multicast is a process used to transfer same message to multiple receivers at the same time. This paper presents the simulation and analysis of the performance of six different multicast routing protocols for Wireless Sensor Network (WSN. They are On Demand Multicast Routing Protocol (ODMRP, Protocol for Unified Multicasting through Announcement (PUMA, Multicast Adhoc On demand Distance Vector Protocol (MAODV, Overlay Boruvka-based Adhoc Multicast Protocol (OBAMP, Application Layer Multicast Algorithm (ALMA and enhanced version of ALMA (ALMA-H for WSN. Among them, ODMRP, MAODV and PUMA are reactive protocols while OBAMP, ALMA and ALMA-H are proactive protocols. This paper compares the performance of these protocols with common parameters such as Throughput, Reliability, End-to-End delay and Packet Delivery Ratio (PDR with increasing the numbers of nodes and increasing the speed of the nodes. The main objective of this work is to select the efficient multicast routing protocol for WSN among six multicast routing protocol based on relative strength and weakness of each protocol. The summary of above six multicast routing protocols is presented with a table of different performance characteristics. Experimental result shows that ODMRP attains higher throughput, reliability and higher packet delivery ratio than other multicast routing protocol, while incurring far less end-to-end delay.

  20. The impact of an ED-only full-capacity protocol.

    Science.gov (United States)

    Watase, Taketo; Fu, Rongwei; Foster, Denise; Langley, Denise; Handel, Daniel A

    2012-10-01

    The objective of this study was to assess the impact of an emergency department (ED)-only full-capacity protocol and diversion, controlling for patient volumes and other potential confounding factors. This was a preintervention and postintervention cohort study using data 12 months before and 12 months after the implementation of the protocol. During the implementation period, attending physicians and charge nurses were educated with clear and simple figures on the criteria for the initiation of the new protocol. A multiple logistic regression model was used to compare ambulance diversion between the 2 periods. The proportion of days when the ED went on diversion at least once during a 24-hour period was 60.4% during the preimplementation period and 20% in the postimplementation periods (P model, the use of the new protocol was significantly associated with decreased odds of diversion rate in the postimplementation period (odds ratio, 0.32; 95% confidence interval, 0.21-0.48). Our predivert/full-capacity protocol is a simple and generalizable strategy that can be implemented within the boundaries of the ED and is significantly associated with a decreased diversion rate. Copyright © 2012 Elsevier Inc. All rights reserved.

  1. Development of a dynamic quality assurance testing protocol for multisite clinical trial DCE-CT accreditation

    Energy Technology Data Exchange (ETDEWEB)

    Driscoll, B. [Department of Radiation Physics, Princess Margaret Cancer Center, 610 University Avenue, Toronto, Ontario M5G 2M9 (Canada); Keller, H. [Department of Radiation Physics, Princess Margaret Cancer Center, 610 University Avenue, Toronto, Ontario M5G 2M9, Canada and Department of Radiation Oncology, University of Toronto, 150 College Street, Toronto, Ontario M5S 3E2 (Canada); Jaffray, D.; Coolens, C. [Department of Radiation Physics, Princess Margaret Cancer Center, 610 University Avenue, Toronto, Ontario M5G 2M9 (Canada); Department of Radiation Oncology, University of Toronto, 150 College Street, Toronto, Ontario M5S 3E2 (Canada); Techna Institute, University Health Network, 124-100 College Street, Toronto, Ontario M5G 1L5 (Canada)

    2013-08-15

    Purpose: Credentialing can have an impact on whether or not a clinical trial produces useful quality data that is comparable between various institutions and scanners. With the recent increase of dynamic contrast enhanced-computed tomography (DCE-CT) usage as a companion biomarker in clinical trials, effective quality assurance, and control methods are required to ensure there is minimal deviation in the results between different scanners and protocols at various institutions. This paper attempts to address this problem by utilizing a dynamic flow imaging phantom to develop and evaluate a DCE-CT quality assurance (QA) protocol.Methods: A previously designed flow phantom, capable of producing predictable and reproducible time concentration curves from contrast injection was fully validated and then utilized to design a DCE-CT QA protocol. The QA protocol involved a set of quantitative metrics including injected and total mass error, as well as goodness of fit comparison to the known truth concentration curves. An additional region of interest (ROI) sensitivity analysis was also developed to provide additional details on intrascanner variability and determine appropriate ROI sizes for quantitative analysis. Both the QA protocol and ROI sensitivity analysis were utilized to test variations in DCE-CT results using different imaging parameters (tube voltage and current) as well as alternate reconstruction methods and imaging techniques. The developed QA protocol and ROI sensitivity analysis was then applied at three institutions that were part of clinical trial involving DCE-CT and results were compared.Results: The inherent specificity of robustness of the phantom was determined through calculation of the total intraday variability and determined to be less than 2.2 ± 1.1% (total calculated output contrast mass error) with a goodness of fit (R{sup 2}) of greater than 0.99 ± 0.0035 (n= 10). The DCE-CT QA protocol was capable of detecting significant deviations from

  2. Analysis of limiting information characteristics of quantum-cryptography protocols

    International Nuclear Information System (INIS)

    Sych, D V; Grishanin, Boris A; Zadkov, Viktor N

    2005-01-01

    The problem of increasing the critical error rate of quantum-cryptography protocols by varying a set of letters in a quantum alphabet for space of a fixed dimensionality is studied. Quantum alphabets forming regular polyhedra on the Bloch sphere and the continual alphabet equally including all the quantum states are considered. It is shown that, in the absence of basis reconciliation, a protocol with the tetrahedral alphabet has the highest critical error rate among the protocols considered, while after the basis reconciliation, a protocol with the continual alphabet possesses the highest critical error rate. (quantum optics and quantum computation)

  3. Starting Ovsynch protocol on day 6 of first postpartum estrous cycle increased fertility in dairy cows by affecting ovarian response during heat stress.

    Science.gov (United States)

    Dirandeh, E

    2014-10-01

    The objective was to compare fertility in cows using an Ovsynch protocol starting on day 6 of first postpartum estrous cycle with an Ovsynch protocol initiated at random stages of the estrous cycle during heat stress (temperature-humidity index (THI)=77-83). Cows (n=459) at the beginning of the lactation period were randomly assigned to time-of-ovulation synchronization treatments: (1) control, Ovsynch (first GnRH treatment, PGF2α treatment 7 days later, second GnRH treatment 56 h later, and TAI 16 h later), initiated at random stages of the estrous cycle (40 ± 2 days postpartum, n=224) and (2) Ovsynch initiated on day 6 of first postpartum estrous cycle (estrus=day 0) based on detection of the first estrus after day 30 postpartum (O6, 35 ± 2 postpartum, n=235). Statistical analyses were conducted using SAS. The percentage of cows responding to the initial GnRH injection using the Ovsynch protocol was greater with the O6 treatment compared to the control treatment (60.4% compared with 52.6%). The percentage of cows having a corpus luteum (CL) on the day of the PGF2α injection was not different among treatments (control=87.0% and O6=90.2%, respectively). Also more cows in the O6 treatment group responded to the second GnRH injection of the Ovsynch protocol compared with control treatments (82.5% compared with 75.8%). Treatment affected the percentage of cows diagnosed pregnant at 32 ± 0.7 days and 60 ± 3 days after the resynchronized timing of AI but pregnancy losses (5.3% compared with 6.8%) did not differ between treatment groups. It is concluded that initiating the Ovsynch protocol 6 days after estrus during the first 40 days postpartum resulted in a greater pregnancy rate at the synchronized estrus and increased fertility compared with control cows during heat stress. Copyright © 2014 Elsevier B.V. All rights reserved.

  4. Follicular synchronization using transdermal estradiol patch and GnRH antagonists in the luteal phase; does it increase oocyte yield in poor responders to gonadotropin stimulation for in vitro fertilization (IVF)? A comparative study with microdose flare-up protocol.

    Science.gov (United States)

    Ata, Baris; Zeng, Xing; Son, Weon Y; Holzer, Hananel; Tan, Seang L

    2011-11-01

    The aim of this retrospective study was to compare the oocyte yield with the luteal estradiol patch (LPA) - GnRH antagonist and microdose (MD) flare-up protocols in anticipated poor responders. Fifty-seven women who underwent IVF treatment following stimulation with LPA or MD protocols at McGill Reproductive Centre were matched for age and markers of ovarian reserve. Numbers of oocytes collected (6 vs 7), mature oocytes collected (5 vs 5), and oocyte maturation rates (72% vs 74%) were similar. The numbers of good quality embryos available (2 vs 1) and embryos transferred (3 vs 3) were likewise similar. Embryo implantation rate of 16.7% and clinical pregnancy rate of 38.9% achieved in the LPA group were almost 50% higher than the corresponding figures at 10.3% and 22.2% in the MD group; however, the differences were not statistically significant (p > 0.05 for all comparisons). Although the results do not suggest an increased oocyte yield or follicular synchronization with the LPA protocol, the observed trend toward higher embryo implantation and clinical pregnancy rates requires further research.

  5. Demarcation of Security in Authentication Protocols

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security analysis of communication protocols is a slippery business; many “secure” protocols later turn out to be insecure. Among many, two complains are more frequent: inadequate definition of security and unstated assumptions in the security model. In our experience, one principal cause...... for such state of affairs is an apparent overlap of security and correctness, which may lead to many sloppy security definitions and security models. Although there is no inherent need to separate security and correctness requirements, practically, such separation is significant. It makes security analysis...... easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...

  6. Adaptive enhancement of learning protocol in hippocampal cultured networks grown on multielectrode arrays

    Science.gov (United States)

    Pimashkin, Alexey; Gladkov, Arseniy; Mukhina, Irina; Kazantsev, Victor

    2013-01-01

    Learning in neuronal networks can be investigated using dissociated cultures on multielectrode arrays supplied with appropriate closed-loop stimulation. It was shown in previous studies that weakly respondent neurons on the electrodes can be trained to increase their evoked spiking rate within a predefined time window after the stimulus. Such neurons can be associated with weak synaptic connections in nearby culture network. The stimulation leads to the increase in the connectivity and in the response. However, it was not possible to perform the learning protocol for the neurons on electrodes with relatively strong synaptic inputs and responding at higher rates. We proposed an adaptive closed-loop stimulation protocol capable to achieve learning even for the highly respondent electrodes. It means that the culture network can reorganize appropriately its synaptic connectivity to generate a desired response. We introduced an adaptive reinforcement condition accounting for the response variability in control stimulation. It significantly enhanced the learning protocol to a large number of responding electrodes independently on its base response level. We also found that learning effect preserved after 4–6 h after training. PMID:23745105

  7. High-Performance CCSDS AOS Protocol Implementation in FPGA

    Science.gov (United States)

    Clare, Loren P.; Torgerson, Jordan L.; Pang, Jackson

    2010-01-01

    The Consultative Committee for Space Data Systems (CCSDS) Advanced Orbiting Systems (AOS) space data link protocol provides a framing layer between channel coding such as LDPC (low-density parity-check) and higher-layer link multiplexing protocols such as CCSDS Encapsulation Service, which is described in the following article. Recent advancement in RF modem technology has allowed multi-megabit transmission over space links. With this increase in data rate, the CCSDS AOS protocol implementation needs to be optimized to both reduce energy consumption and operate at a high rate.

  8. Improvement of burn pain management through routine pain monitoring and pain management protocol.

    Science.gov (United States)

    Yang, Hyeong Tae; Hur, Giyeun; Kwak, In-Suk; Yim, Haejun; Cho, Yong Suk; Kim, Dohern; Hur, Jun; Kim, Jong Hyun; Lee, Boung Chul; Seo, Cheong Hoon; Chun, Wook

    2013-06-01

    Pain management is an important aspect of burn management. We developed a routine pain monitoring system and pain management protocol for burn patients. The purpose of this study is to evaluate the effectiveness of our new pain management system. From May 2011 to November 2011, the prospective study was performed with 107 burn patients. We performed control group (n=58) data analysis and then developed the pain management protocol and monitoring system. Next, we applied our protocol to patients and performed protocol group (n=49) data analysis, and compared this to control group data. Data analysis was performed using the Numeric Rating Scale (NRS) of background pain and procedural pain, Clinician-Administered PTSD Scale (CAPS), Hamilton Depression Rating Scale (HDRS), State-Trait Anxiety Inventory Scale (STAIS), and Holmes and Rahe Stress Scale (HRSS). The NRS of background pain for the protocol group was significantly decreased compared to the control group (2.8±2.0 versus 3.9±1.9), and the NRS of procedural pain of the protocol group was significantly decreased compared to the control group (4.8±2.8 versus 3.7±2.5). CAPS and HDRS were decreased in the protocol group, but did not have statistical significance. STAIS and HRSS were decreased in the protocol group, but only the STAIS had statistical significance. Our new pain management system was effective in burn pain management. However, adequate pain management can only be accomplished by a continuous and thorough effort. Therefore, pain control protocol and pain monitoring systems need to be under constant revision and improvement using creative ideas and approaches. Copyright © 2012 Elsevier Ltd and ISBI. All rights reserved.

  9. The interventional effect of new drugs combined with the Stupp protocol on glioblastoma: A network meta-analysis.

    Science.gov (United States)

    Li, Mei; Song, Xiangqi; Zhu, Jun; Fu, Aijun; Li, Jianmin; Chen, Tong

    2017-08-01

    New therapeutic agents in combination with the standard Stupp protocol (a protocol about the temozolomide combined with radiotherapy treatment with glioblastoma was research by Stupp R in 2005) were assessed to evaluate whether they were superior to the Stupp protocol alone, to determine the optimum treatment regimen for patients with newly diagnosed glioblastoma. We implemented a search strategy to identify studies in the following databases: PubMed, Cochrane Library, EMBASE, CNKI, CBM, Wanfang, and VIP, and assessed the quality of extracted data from the trials included. Statistical software was used to perform network meta-analysis. The use of novel therapeutic agents in combination with the Stupp protocol were all shown to be superior than the Stupp protocol alone for the treatment of newly diagnosed glioblastoma, ranked as follows: cilengitide 2000mg/5/week, bevacizumab in combination with irinotecan, nimotuzumab, bevacizumab, cilengitide 2000mg/2/week, cytokine-induced killer cell immunotherapy, and the Stupp protocol. In terms of serious adverse effects, the intervention group showed a 29% increase in the incidence of adverse events compared with the control group (patients treated only with Stupp protocol) with a statistically significant difference (RR=1.29; 95%CI 1.17-1.43; P<0.001). The most common adverse events were thrombocytopenia, lymphopenia, neutropenia, pneumonia, nausea, and vomiting, none of which were significantly different between the groups except for neutropenia, pneumonia, and embolism. All intervention drugs evaluated in our study were superior to the Stupp protocol alone when used in combination with it. However, we could not conclusively confirm whether cilengitide 2000mg/5/week was the optimum regime, as only one trial using this protocol was included in our study. Copyright © 2017. Published by Elsevier B.V.

  10. Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols

    International Nuclear Information System (INIS)

    Gerber, Naamit Kurshan; Wexler, Leonard H.; Singer, Samuel; Alektiar, Kaled M.; Keohan, Mary Louise; Shi, Weiji; Zhang, Zhigang; Wolden, Suzanne

    2013-01-01

    Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low risk, 61 (44%) at intermediate risk, and 44 (32%) at high risk. Forty-six percent were treated on or according to a prospective RMS protocol. The 5-year rate of overall survival (OS) was 45% for patients with nonmetastatic disease. The failure rates at 5 years for patients with nonmetastatic disease were 34% for local failure and 42% for distant failure. Among patients with nonmetastatic disease (n=94), significant factors associated with OS were histologic diagnosis, site, risk group, age, and protocol treatment. On multivariate analysis, risk group and protocol treatment were significant after adjustment for age. The 5-year OS was 54% for protocol patients versus 36% for nonprotocol patients. Conclusions: Survival in adult patients with nonmetastatic disease was significantly improved for those treated on RMS protocols, most of which are now open to adults

  11. Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Gerber, Naamit Kurshan [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wexler, Leonard H. [Department of Pediatrics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Singer, Samuel [Department of Surgery, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Alektiar, Kaled M. [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Keohan, Mary Louise [Department of Medicine, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Shi, Weiji; Zhang, Zhigang [Department of Epidemiology and Biostatistics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wolden, Suzanne, E-mail: woldens@mskcc.org [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)

    2013-05-01

    Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low risk, 61 (44%) at intermediate risk, and 44 (32%) at high risk. Forty-six percent were treated on or according to a prospective RMS protocol. The 5-year rate of overall survival (OS) was 45% for patients with nonmetastatic disease. The failure rates at 5 years for patients with nonmetastatic disease were 34% for local failure and 42% for distant failure. Among patients with nonmetastatic disease (n=94), significant factors associated with OS were histologic diagnosis, site, risk group, age, and protocol treatment. On multivariate analysis, risk group and protocol treatment were significant after adjustment for age. The 5-year OS was 54% for protocol patients versus 36% for nonprotocol patients. Conclusions: Survival in adult patients with nonmetastatic disease was significantly improved for those treated on RMS protocols, most of which are now open to adults.

  12. Protocol: An updated integrated methodology for analysis of metabolites and enzyme activities of ethylene biosynthesis

    Directory of Open Access Journals (Sweden)

    Geeraerd Annemie H

    2011-06-01

    Full Text Available Abstract Background The foundations for ethylene research were laid many years ago by researchers such as Lizada, Yang and Hoffman. Nowadays, most of the methods developed by them are still being used. Technological developments since then have led to small but significant improvements, contributing to a more efficient workflow. Despite this, many of these improvements have never been properly documented. Results This article provides an updated, integrated set of protocols suitable for the assembly of a complete picture of ethylene biosynthesis, including the measurement of ethylene itself. The original protocols for the metabolites 1-aminocyclopropane-1-carboxylic acid and 1-(malonylaminocyclopropane-1-carboxylic acid have been updated and downscaled, while protocols to determine in vitro activities of the key enzymes 1-aminocyclopropane-1-carboxylate synthase and 1-aminocyclopropane-1-carboxylate oxidase have been optimised for efficiency, repeatability and accuracy. All the protocols described were optimised for apple fruit, but have been proven to be suitable for the analysis of tomato fruit as well. Conclusions This work collates an integrated set of detailed protocols for the measurement of components of the ethylene biosynthetic pathway, starting from well-established methods. These protocols have been optimised for smaller sample volumes, increased efficiency, repeatability and accuracy. The detailed protocol allows other scientists to rapidly implement these methods in their own laboratories in a consistent and efficient way.

  13. Evaluation of an adult insulin infusion protocol at an academic medical center.

    Science.gov (United States)

    Petrov, Katerina I; Burns, Tammy L; Drincic, Andjela

    2012-05-01

    Acknowledging evidence of possible detrimental effects of tightly controlled blood glucose levels, the American Association of Clinical Endocrinologists and the American Diabetes Association published a consensus statement recommending less strict control for most diabetic patients. As a result of these recommendations, our academic center at Creighton University Medical Center revised its adult insulin infusion protocol to target blood glucose levels ranging from 120 to 180 mg/dL for regular (standard) glycemic control and 80 to 120 mg/dL for tight control; previous targets had ranged from 80 to 180 mg/dL and 70 to 110 mg/dL, respectively. The primary objective was to evaluate the time that blood glucose values were within the target range for patients receiving the new protocol, compared with patients receiving the previous protocol. Our study was designed to evaluate the effectiveness and safety of the revised protocol. Using a retrospective chart review, we collected data for 4 months from patients on the old insulin protocol (May to August 2009) and for 4 months from patients on the new protocol (September to December 2009). Secondary endpoints included the number of hypoglycemic episodes (blood glucose below 70 mg/dL) and severe hypoglycemic episodes (blood glucose 40 mg/dL or lower) experienced by patients receiving the new insulin protocol compared with those receiving the former protocol. Patient characteristics were similar at baseline. Blood glucose values stayed within the target range for a significantly shorter time with the new protocol than with the former protocol (44.6% vs. 56.8%, respectively; P protocol. No statistically significant differences in hypoglycemia were observed after the protocol was changed. Hypoglycemia occurred in 31% of the former-protocol patients compared with 18% of the revised-protocol patients. Severe hypoglycemia was experienced by 2.1% of patients on the old protocol and by 3.1% of patients on the new protocol. Rates of

  14. Increasing girls’ physical activity during an organised youth sport basketball program: a randomised controlled trial protocol

    Science.gov (United States)

    2014-01-01

    Background Participation in organised youth sports (OYS) has been recommended as an opportunity to increase young peoples’ moderate-to-vigorous physical activity (MVPA) levels. Participants, however, spend a considerable proportion of time during OYS inactive. The purpose of this study, therefore, was to investigate whether coaches who attended coach education sessions (where education on increasing MVPA and decreasing inactivity during training was delivered) can increase players’ MVPA during training sessions over a 5-day basketball program compared to coaches who did not receive coach education sessions. Methods/design A convenience sample of 80 female players and 8 coaches were recruited into the UWS School Holiday Basketball Program in Greater Western Sydney, Australia. A two-arm, parallel-group randomised controlled trial was employed to investigate whether coaches who attended 2 coach education sessions (compared with a no-treatment control) can increase their players’ MVPA during training sessions over a 5-day basketball program. Objectively measured physical activity, directly observed lesson context and leader behaviour, player motivation, players’ perceived autonomy support, and coaching information (regarding training session planning, estimations on player physical activity and lesson context during training, perceived ability to modify training sessions, perceived importance of physical activity during training, intention to increase physical activity/reduce inactivity, and likelihood of increasing physical activity/reducing inactivity) were assessed at baseline (day 1) and at follow-up (day 5). Linear mixed models will be used to analyse between arm differences in changes from baseline to follow-up on all outcomes. Discussion The current trial protocol describes, to our knowledge, the first trial conducted in an OYS context to investigate the efficacy of an intervention, relative to a control, in increasing MVPA. This study’s findings will

  15. Caffeine increases anaerobic work and restores cycling performance following a protocol designed to lower endogenous carbohydrate availability.

    Directory of Open Access Journals (Sweden)

    Marcos David Silva-Cavalcante

    Full Text Available The purpose this study was to examine the effects of caffeine ingestion on performance and energy expenditure (anaerobic and aerobic contribution during a 4-km cycling time trial (TT performed after a carbohydrate (CHO availability-lowering exercise protocol. After preliminary and familiarization trials, seven amateur cyclists performed three 4-km cycling TT in a double-blind, randomized and crossover design. The trials were performed either after no previous exercise (CON, or after a CHO availability-lowering exercise protocol (DEP performed in the previous evening, followed by either placebo (DEP-PLA or 5 mg.kg(-1 of caffeine intake (DEP-CAF 1 hour before the trial. Performance was reduced (-2.1% in DEP-PLA vs CON (421.0±12.3 vs 412.4±9.7 s. However, performance was restored in DEP-CAF (404.6±17.1 s compared with DEP-PLA, while no differences were found between DEP-CAF and CON. The anaerobic contribution was increased in DEP-CAF compared with both DEP-PLA and CON (67.4±14.91, 47. 3±14.6 and 55.3±14.0 W, respectively, and this was more pronounced in the first 3 km of the trial. Similarly, total anaerobic work was higher in DEP-CAF than in the other conditions. The integrated electromyographic activity, plasma lactate concentration, oxygen uptake, aerobic contribution and total aerobic work were not different between the conditions. The reduction in performance associated with low CHO availability is reversed with caffeine ingestion due to a higher anaerobic contribution, suggesting that caffeine could access an anaerobic "reserve" that is not used under normal conditions.

  16. Caffeine Increases Anaerobic Work and Restores Cycling Performance following a Protocol Designed to Lower Endogenous Carbohydrate Availability

    Science.gov (United States)

    Silva-Cavalcante, Marcos David; Correia-Oliveira, Carlos Rafaell; Santos, Ralmony Alcantara; Lopes-Silva, João Paulo; Lima, Hessel Marani; Bertuzzi, Romulo; Duarte, Marcos; Bishop, David John; Lima-Silva, Adriano Eduardo

    2013-01-01

    The purpose this study was to examine the effects of caffeine ingestion on performance and energy expenditure (anaerobic and aerobic contribution) during a 4-km cycling time trial (TT) performed after a carbohydrate (CHO) availability-lowering exercise protocol. After preliminary and familiarization trials, seven amateur cyclists performed three 4-km cycling TT in a double-blind, randomized and crossover design. The trials were performed either after no previous exercise (CON), or after a CHO availability-lowering exercise protocol (DEP) performed in the previous evening, followed by either placebo (DEP-PLA) or 5 mg.kg−1 of caffeine intake (DEP-CAF) 1 hour before the trial. Performance was reduced (−2.1%) in DEP-PLA vs CON (421.0±12.3 vs 412.4±9.7 s). However, performance was restored in DEP-CAF (404.6±17.1 s) compared with DEP-PLA, while no differences were found between DEP-CAF and CON. The anaerobic contribution was increased in DEP-CAF compared with both DEP-PLA and CON (67.4±14.91, 47. 3±14.6 and 55.3±14.0 W, respectively), and this was more pronounced in the first 3 km of the trial. Similarly, total anaerobic work was higher in DEP-CAF than in the other conditions. The integrated electromyographic activity, plasma lactate concentration, oxygen uptake, aerobic contribution and total aerobic work were not different between the conditions. The reduction in performance associated with low CHO availability is reversed with caffeine ingestion due to a higher anaerobic contribution, suggesting that caffeine could access an anaerobic “reserve” that is not used under normal conditions. PMID:23977198

  17. Data aggregation in wireless sensor networks using the SOAP protocol

    International Nuclear Information System (INIS)

    Al-Yasiri, A; Sunley, A

    2007-01-01

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks

  18. Data aggregation in wireless sensor networks using the SOAP protocol

    Energy Technology Data Exchange (ETDEWEB)

    Al-Yasiri, A; Sunley, A [School of Computing, Science and Engineering, University of Salford, Greater Manchester, M5 4WT (United Kingdom)

    2007-07-15

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks.

  19. Anxiety-induced plasma norepinephrine augmentation increases reactive oxygen species formation by monocytes in essential hypertension.

    Science.gov (United States)

    Yasunari, Kenichi; Matsui, Tokuzo; Maeda, Kensaku; Nakamura, Munehiro; Watanabe, Takanori; Kiriike, Nobuo

    2006-06-01

    An association between anxiety and depression and increased blood pressure (BP) and cardiovascular disease risk has not been firmly established. We examined the hypothesis that anxiety and depression lead to increased plasma catecholamines and to production of reactive oxygen species (ROS) by mononuclear cells (MNC) in hypertensive individuals. We also studied the role of BP in this effect. In Protocol 1, a cross-sectional study was performed in 146 hypertensive patients to evaluate whether anxiety and depression affect BP and ROS formation by MNC through increasing plasma catecholamines. In Protocol 2, a 6-month randomized controlled trial using a subtherapeutic dose of the alpha(1)-adrenergic receptor antagonist doxazosin (1 mg/day) versus placebo in 86 patients with essential hypertension was performed to determine whether the increase in ROS formation by MNC was independent of BP. In Protocol 1, a significant relationship was observed between the following: trait anxiety and plasma norepinephrine (r = 0.32, P anxiety may increase plasma norepinephrine and increase ROS formation by MNC independent of BP in hypertensive patients.

  20. Emulation Platform for Cyber Analysis of Wireless Communication Network Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Van Leeuwen, Brian P. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Eldridge, John M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Wireless networking and mobile communications is increasing around the world and in all sectors of our lives. With increasing use, the density and complexity of the systems increase with more base stations and advanced protocols to enable higher data throughputs. The security of data transported over wireless networks must also evolve with the advances in technologies enabling more capable wireless networks. However, means for analysis of the effectiveness of security approaches and implementations used on wireless networks are lacking. More specifically a capability to analyze the lower-layer protocols (i.e., Link and Physical layers) is a major challenge. An analysis approach that incorporates protocol implementations without the need for RF emissions is necessary. In this research paper several emulation tools and custom extensions that enable an analysis platform to perform cyber security analysis of lower layer wireless networks is presented. A use case of a published exploit in the 802.11 (i.e., WiFi) protocol family is provided to demonstrate the effectiveness of the described emulation platform.

  1. Information-theoretic security proof for quantum-key-distribution protocols

    International Nuclear Information System (INIS)

    Renner, Renato; Gisin, Nicolas; Kraus, Barbara

    2005-01-01

    We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found. Using this technique, we investigate a general class of QKD protocols with one-way classical post-processing. We show that, in order to analyze the full security of these protocols, it suffices to consider collective attacks. Indeed, we give new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute. As an illustration of our results, we analyze the Bennett-Brassard 1984, the six-state, and the Bennett 1992 protocols with one-way error correction and privacy amplification. Surprisingly, the performance of these protocols is increased if one of the parties adds noise to the measurement data before the error correction. In particular, this additional noise makes the protocols more robust against noise in the quantum channel

  2. Information-theoretic security proof for quantum-key-distribution protocols

    Science.gov (United States)

    Renner, Renato; Gisin, Nicolas; Kraus, Barbara

    2005-07-01

    We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found. Using this technique, we investigate a general class of QKD protocols with one-way classical post-processing. We show that, in order to analyze the full security of these protocols, it suffices to consider collective attacks. Indeed, we give new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute. As an illustration of our results, we analyze the Bennett-Brassard 1984, the six-state, and the Bennett 1992 protocols with one-way error correction and privacy amplification. Surprisingly, the performance of these protocols is increased if one of the parties adds noise to the measurement data before the error correction. In particular, this additional noise makes the protocols more robust against noise in the quantum channel.

  3. A chronic toxicity test protocol using Caridina nilotica (Decapoda ...

    African Journals Online (AJOL)

    Salinization of freshwater resources is an increasing global problem, yet there is a paucity of chronic salinity tolerance data linked to very few chronic toxicity test protocols. This research aimed to generate a chronic toxicity test protocol and protective salinity tolerance data for the indigenous South African freshwater shrimp ...

  4. An electronic specimen collection protocol schema (eSCPS). Document architecture for specimen management and the exchange of specimen collection protocols between biobanking information systems.

    Science.gov (United States)

    Eminaga, O; Semjonow, A; Oezguer, E; Herden, J; Akbarov, I; Tok, A; Engelmann, U; Wille, S

    2014-01-01

    The integrity of collection protocols in biobanking is essential for a high-quality sample preparation process. However, there is not currently a well-defined universal method for integrating collection protocols in the biobanking information system (BIMS). Therefore, an electronic schema of the collection protocol that is based on Extensible Markup Language (XML) is required to maintain the integrity and enable the exchange of collection protocols. The development and implementation of an electronic specimen collection protocol schema (eSCPS) was performed at two institutions (Muenster and Cologne) in three stages. First, we analyzed the infrastructure that was already established at both the biorepository and the hospital information systems of these institutions and determined the requirements for the sufficient preparation of specimens and documentation. Second, we designed an eSCPS according to these requirements. Finally, a prospective study was conducted to implement and evaluate the novel schema in the current BIMS. We designed an eSCPS that provides all of the relevant information about collection protocols. Ten electronic collection protocols were generated using the supplementary Protocol Editor tool, and these protocols were successfully implemented in the existing BIMS. Moreover, an electronic list of collection protocols for the current studies being performed at each institution was included, new collection protocols were added, and the existing protocols were redesigned to be modifiable. The documentation time was significantly reduced after implementing the eSCPS (5 ± 2 min vs. 7 ± 3 min; p = 0.0002). The eSCPS improves the integrity and facilitates the exchange of specimen collection protocols in the existing open-source BIMS.

  5. Implementing an ultrasound-based protocol for diagnosingappendicitis while maintaining diagnostic accuracy

    International Nuclear Information System (INIS)

    Van Atta, Angela J.; Baskin, Henry J.; Maves, Connie K.; Dansie, David M.; Rollins, Michael D.; Bolte, Robert G.; Mundorff, Michael B.; Andrews, Seth P.

    2015-01-01

    The use of ultrasound to diagnose appendicitis in children is well-documented but not universally employed outside of pediatric academic centers, especially in the United States. Various obstacles make it difficult for institutions and radiologists to abandon a successful and accurate CT-based imaging protocol in favor of a US-based protocol. To describe how we overcame barriers to implementing a US-based appendicitis protocol among a large group of nonacademic private-practice pediatric radiologists while maintaining diagnostic accuracy and decreasing medical costs. A multidisciplinary team of physicians (pediatric surgery, pediatric emergency medicine and pediatric radiology) approved an imaging protocol using US as the primary modality to evaluate suspected appendicitis with CT for equivocal cases. The protocol addressed potential bias against US and accommodated for institutional limitations of radiologist and sonographer experience and availability. Radiologists coded US reports according to the probability of appendicitis. Radiology reports were compared with clinical outcomes to assess diagnostic accuracy. During the study period, physicians from each group were apprised of the interim US protocol accuracy results. Problematic cases were discussed openly. A total of 512 children were enrolled and underwent US for evaluation of appendicitis over a 30-month period. Diagnostic accuracy was comparable to published results for combined US/CT protocols. Comparing the first 12 months to the last 12 months of the study period, the proportion of children achieving an unequivocal US result increased from 30% (51/169) to 53% (149/282) and the proportion of children undergoing surgery based solely on US findings increased from 55% (23/42) to 84% (92/109). Overall, 63% (325/512) of patients in the protocol did not require a CT. Total patient costs were reduced by $30,182 annually. We overcame several barriers to implementing a US protocol. During the study period our

  6. Implementing an ultrasound-based protocol for diagnosingappendicitis while maintaining diagnostic accuracy

    Energy Technology Data Exchange (ETDEWEB)

    Van Atta, Angela J. [University of Utah School of Medicine, Salt Lake City, UT (United States); Baskin, Henry J.; Maves, Connie K.; Dansie, David M. [Primary Children' s Hospital, Department of Radiology, Salt Lake City, UT (United States); Rollins, Michael D. [University of Utah School of Medicine, Department of Surgery, Division of Pediatric Surgery, Salt Lake City, UT (United States); Bolte, Robert G. [University of Utah School of Medicine, Department of Pediatrics, Division of Pediatric Emergency Medicine, Salt Lake City, UT (United States); Mundorff, Michael B.; Andrews, Seth P. [Primary Children' s Hospital, Systems Improvement, Salt Lake City, UT (United States)

    2015-05-01

    The use of ultrasound to diagnose appendicitis in children is well-documented but not universally employed outside of pediatric academic centers, especially in the United States. Various obstacles make it difficult for institutions and radiologists to abandon a successful and accurate CT-based imaging protocol in favor of a US-based protocol. To describe how we overcame barriers to implementing a US-based appendicitis protocol among a large group of nonacademic private-practice pediatric radiologists while maintaining diagnostic accuracy and decreasing medical costs. A multidisciplinary team of physicians (pediatric surgery, pediatric emergency medicine and pediatric radiology) approved an imaging protocol using US as the primary modality to evaluate suspected appendicitis with CT for equivocal cases. The protocol addressed potential bias against US and accommodated for institutional limitations of radiologist and sonographer experience and availability. Radiologists coded US reports according to the probability of appendicitis. Radiology reports were compared with clinical outcomes to assess diagnostic accuracy. During the study period, physicians from each group were apprised of the interim US protocol accuracy results. Problematic cases were discussed openly. A total of 512 children were enrolled and underwent US for evaluation of appendicitis over a 30-month period. Diagnostic accuracy was comparable to published results for combined US/CT protocols. Comparing the first 12 months to the last 12 months of the study period, the proportion of children achieving an unequivocal US result increased from 30% (51/169) to 53% (149/282) and the proportion of children undergoing surgery based solely on US findings increased from 55% (23/42) to 84% (92/109). Overall, 63% (325/512) of patients in the protocol did not require a CT. Total patient costs were reduced by $30,182 annually. We overcame several barriers to implementing a US protocol. During the study period our

  7. The Protocol of Choice for Treatment of Snake Bite

    Directory of Open Access Journals (Sweden)

    Afshin Mohammad Alizadeh

    2016-01-01

    Full Text Available The aim of the current study is to compare three different methods of treatment of snake bite to determine the most efficient one. To unify the protocol of snake bite treatment in our center, we retrospectively reviewed files of the snake-bitten patients who had been referred to us between 2010 and 2014. They were contacted for follow-up using phone calls. Demographic and on-arrival characteristics, protocol used for treatment (WHO/Haddad/GF, and outcome/complications were evaluated. Patients were entered into one of the protocol groups and compared. Of a total of 63 patients, 56 (89% were males. Five, 19, and 28 patients were managed by Haddad, WHO, or GF protocols, respectively. Eleven patients had fallen into both GF and WHO protocols and were excluded. Serum sickness was significantly more common when WHO protocol was used while 100% of the compartment syndromes and 71% of deformities had been reported after GF protocol. The most important complications were considered to be deformity, compartment syndrome, and amputation and were more frequent after the use of WHO and GF protocols (23.1% versus 76.9%; none in Haddad; P = NS. Haddad protocol seems to be the best for treatment of snake-bitten patients in our region. However, this cannot be strictly concluded because of the limited sample size and nonsignificant P values.

  8. Trends in the number and the quality of trial protocols involving children submitted to a French Institutional Review Board

    Directory of Open Access Journals (Sweden)

    Isabelle Gautier

    2017-08-01

    Full Text Available Abstract Background There is a great need for high quality clinical research for children. The European Pediatric Regulation aimed to improve the quality of clinical trials in order to increase the availability of treatments for children. The main purpose of this study was to assess the evolution of both the number and the quality of pediatric trial protocols that were submitted to a French Institutional Review Board (IRB00009118 before and after the initiation of the EU Pediatric Regulation. Methods All protocols submitted to the IRB00009118 between 2003 and 2014 and conducting research on subjects under eighteen years of age were eligible. The quality of randomized clinical trials was assessed according to the guidelines developed by the Enhancing the QUAlity and Transparency Of health Research (EQUATOR Network and ranked using the Jadad score. Results Out of 622 protocols submitted to the Institutional Review Board (IRB, 21% (133/622 included children. Among these 133 pediatric protocols, the number of submitted pediatric protocols doubled between the two studied periods. From 2003 to 2008, 47 protocols including 21 institutionally sponsored were submitted to the IRB and from 2009 until 2014, 86 protocols including 48 institutionally sponsored were submitted. No significant trend was observed on the quality of RCTs. The overall median score of RCTs on the Jadad scale was high (3.5, 70.0% of protocols had a Jadad score ≥ 3, and 30.0% had a score < 3. Conclusion Following the EU Pediatric Regulation, the number of pediatric protocols submitted to the IRB00009118 tends to increase, but no change was noticed regarding their quality.

  9. No significant effect of transcranial direct current stimulation (tDCS) found on simple motor reaction time comparing 15 different simulation protocols.

    Science.gov (United States)

    Horvath, Jared Cooney; Carter, Olivia; Forte, Jason D

    2016-10-01

    Research exploring the behavioral impact of transcranial direct current stimulation (tDCS) over M1 has produced homogenous results. The most common explanations to address this homogeneity concerns the differential impact of varied tDCS parameters (such as stimulation intensity or electrode montage). To explore this, we systematically examined the effects of 15 different tDCS protocols on a well-elucidated neurobehavioral system: simple visual motor reaction time (smRT). For the initial phase of this study, 150 healthy participants were randomly assigned to one of 5 experimental groups (2mA anodal, 2mA cathodal, 1mA anodal, 1mA cathodal, or sham) across 3 different conditions (orbitofrontal, bilateral, or extracephalic reference electrode location). The active electrode was always placed over M1 and tDCS lasted for 20min. Starting ~5min prior to stimulation and running continuously for ~30min, participants were repeatedly presented with a visual cue centered on a computer monitor and asked to press a response button as quickly as possible at stimulus onset (stimuli number: 100 pre-, 400 during-, and 100-post stimulation - interstimulus interval: 1-3s). Ex-gaussian distribution curves, miss, and error rates were determined for each normalized batch of 100 RTs and compared using a two-way ANOVA. As the largest group differences were seen with 2mA anodal (compared to sham) stimulation using an orbitofrontal montage, an additional 60 healthy participants were recruited to further test for significance in this condition. No significant impact of tDCS was seen on any parameter of smRT distribution, error rate, or miss rate, regardless of polarity, stimulation intensity, electrode montage, or stimulation-to-task relationship. Our results suggest that tDCS over M1 might not have a predictable or reliable effect on short duration smRT. Our results raise interesting questions regarding the mechanisms by which tDCS might modulate more complex motor behaviors. Additional

  10. A Passive Testing Approach for Protocols in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xiaoping Che

    2015-11-01

    Full Text Available Smart systems are today increasingly developed with the number of wireless sensor devices drastically increasing. They are implemented within several contexts throughout our environment. Thus, sensed data transported in ubiquitous systems are important, and the way to carry them must be efficient and reliable. For that purpose, several routing protocols have been proposed for wireless sensor networks (WSN. However, one stage that is often neglected before their deployment is the conformance testing process, a crucial and challenging step. Compared to active testing techniques commonly used in wired networks, passive approaches are more suitable to the WSN environment. While some works propose to specify the protocol with state models or to analyze them with simulators and emulators, we here propose a logic-based approach for formally specifying some functional requirements of a novel WSN routing protocol. We provide an algorithm to evaluate these properties on collected protocol execution traces. Further, we demonstrate the efficiency and suitability of our approach by its application into common WSN functional properties, as well as specific ones designed from our own routing protocol. We provide relevant testing verdicts through a real indoor testbed and the implementation of our protocol. Furthermore, the flexibility, genericity and practicability of our approach have been proven by the experimental results.

  11. Evaluation of a Progressive Mobility Protocol in Postoperative Cardiothoracic Surgical Patients.

    Science.gov (United States)

    Floyd, Shawn; Craig, Sarah W; Topley, Darla; Tullmann, Dorothy

    2016-01-01

    Cardiothoracic surgical patients are at high risk for complications related to immobility, such as increased intensive care and hospital length of stay, intensive care unit readmission, pressure ulcer development, and deep vein thrombosis/pulmonary embolus. A progressive mobility protocol was started in the thoracic cardiovascular intensive care unit in a rural academic medical center. The purpose of the progressive mobility protocol was to increase mobilization of postoperative patients and decrease complications related to immobility in this unique patient population. A matched-pairs design was used to compare a randomly selected sample of the preintervention group (n = 30) to a matched postintervention group (n = 30). The analysis compared outcomes including intensive care unit and hospital length of stay, intensive care unit readmission occurrence, pressure ulcer prevalence, and deep vein thrombosis/pulmonary embolism prevalence between the 2 groups. Although this comparison does not achieve statistical significance (P mobility. This study has implications for nursing, hospital administration, and therapy services with regard to staffing and cost savings related to fewer complications of immobility. Future studies with a larger sample size and other populations are warranted.

  12. Enhanced just-in-time plus protocol for optical burst switching networks

    Science.gov (United States)

    Rodrigues, Joel J. P. C.; Gregório, José M. B.; Vasilakos, Athanasios V.

    2010-07-01

    We propose a new one-way resource reservation protocol for optical burst switching (OBS) networks, called Enhanced Just-in-Time Plus (E-JIT+). The protocol is described in detail, and its formal specification is presented, following an extended finite state machine approach. The performance evaluation of E-JIT+ is analyzed in comparison with other proposed OBS protocols (JIT+ and E-JIT) for the following network topologies: rings; degree-two, degree-three, and degree-four chordal rings; mesh-torus; NSFNET; ARPANET; FCCN-NET; and the European Optical Network. We evaluate and compare the performance of the different protocols in terms of burst loss probability, taking into account the most important OBS network parameters. It was shown that E-JIT+ performs better than available one-way resource reservation protocols for all the evaluated network topologies. Moreover, the scalability of E-JIT+ was observed, and when the network traffic increases, the burst loss probability also increases, leading to a worse network performance.

  13. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  14. Ocean Optics Protocols for Satellite Ocean Color Sensor Validation. Revised

    Science.gov (United States)

    Fargion, Giulietta S.; Mueller, James L.

    2000-01-01

    The document stipulates protocols for measuring bio-optical and radiometric data for the Sensor Intercomparison and Merger for Biological and Interdisciplinary Oceanic Studies (SIMBIOS) Project activities and algorithm development. This document supersedes the earlier version (Mueller and Austin 1995) published as Volume 25 in the SeaWiFS Technical Report Series. This document marks a significant departure from, and improvement on, theformat and content of Mueller and Austin (1995). The authorship of the protocols has been greatly broadened to include experts specializing in some key areas. New chapters have been added to provide detailed and comprehensive protocols for stability monitoring of radiometers using portable sources, abovewater measurements of remote-sensing reflectance, spectral absorption measurements for discrete water samples, HPLC pigment analysis and fluorometric pigment analysis. Protocols were included in Mueller and Austin (1995) for each of these areas, but the new treatment makes significant advances in each topic area. There are also new chapters prescribing protocols for calibration of sun photometers and sky radiance sensors, sun photometer and sky radiance measurements and analysis, and data archival. These topic areas were barely mentioned in Mueller and Austin (1995).

  15. An efficient multi-carrier position-based packet forwarding protocol for wireless sensor networks

    KAUST Repository

    Bader, Ahmed

    2012-01-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. However, as the node density grows, the overhead incurred in the process of relay selection grows significantly. As such, end-to-end performance in terms of energy and latency is adversely impacted. With the motivation of developing a packet forwarding mechanism that is tolerant to variation in node density, an alternative position-based protocol is proposed in this paper. In contrast to existing beaconless protocols, the proposed protocol is designed such that it eliminates the need for potential relays to undergo a relay selection process. Rather, any eligible relay may decide to forward the packet ahead, thus significantly reducing the underlying overhead. The operation of the proposed protocol is empowered by exploiting favorable features of orthogonal frequency division multiplexing (OFDM) at the physical layer. The end-to-end performance of the proposed protocol is evaluated against existing beaconless position-based protocols analytically and as well by means of simulations. The proposed protocol is demonstrated in this paper to be more efficient. In particular, it is shown that for the same amount of energy the proposed protocol transports one bit from source to destination much quicker. © 2012 IEEE.

  16. Protocol for Quantification of Defects in Natural Fibres for Composites

    DEFF Research Database (Denmark)

    Mortensen, Ulrich Andreas; Madsen, Bo

    2014-01-01

    Natural bast-type plant fibres are attracting increasing interest for being used for structural composite applications where high quality fibres with good mechanical properties are required. A protocol for the quantification of defects in natural fibres is presented. The protocol is based...

  17. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  18. Comparative Analysis of Different Protocols to Manage Large Scale Networks

    OpenAIRE

    Anil Rao Pimplapure; Dr Jayant Dubey; Prashant Sen

    2013-01-01

    In recent year the numbers, complexity and size is increased in Large Scale Network. The best example of Large Scale Network is Internet, and recently once are Data-centers in Cloud Environment. In this process, involvement of several management tasks such as traffic monitoring, security and performance optimization is big task for Network Administrator. This research reports study the different protocols i.e. conventional protocols like Simple Network Management Protocol and newly Gossip bas...

  19. Latency correction of event-related potentials between different experimental protocols

    Science.gov (United States)

    Iturrate, I.; Chavarriaga, R.; Montesano, L.; Minguez, J.; Millán, JdR

    2014-06-01

    Objective. A fundamental issue in EEG event-related potentials (ERPs) studies is the amount of data required to have an accurate ERP model. This also impacts the time required to train a classifier for a brain-computer interface (BCI). This issue is mainly due to the poor signal-to-noise ratio and the large fluctuations of the EEG caused by several sources of variability. One of these sources is directly related to the experimental protocol or application designed, and may affect the amplitude or latency of ERPs. This usually prevents BCI classifiers from generalizing among different experimental protocols. In this paper, we analyze the effect of the amplitude and the latency variations among different experimental protocols based on the same type of ERP. Approach. We present a method to analyze and compensate for the latency variations in BCI applications. The algorithm has been tested on two widely used ERPs (P300 and observation error potentials), in three experimental protocols in each case. We report the ERP analysis and single-trial classification. Main results. The results obtained show that the designed experimental protocols significantly affect the latency of the recorded potentials but not the amplitudes. Significance. These results show how the use of latency-corrected data can be used to generalize the BCIs, reducing the calibration time when facing a new experimental protocol.

  20. Significant increase of surface ozone at a rural site, north of eastern China

    Directory of Open Access Journals (Sweden)

    Z. Ma

    2016-03-01

    Full Text Available Ozone pollution in eastern China has become one of the top environmental issues. Quantifying the temporal trend of surface ozone helps to assess the impacts of the anthropogenic precursor reductions and the likely effects of emission control strategies implemented. In this paper, ozone data collected at the Shangdianzi (SDZ regional atmospheric background station from 2003 to 2015 are presented and analyzed to obtain the variation in the trend of surface ozone in the most polluted region of China, north of eastern China or the North China Plain. A modified Kolmogorov–Zurbenko (KZ filter method was performed on the maximum daily average 8 h (MDA8 concentrations of ozone to separate the contributions of different factors from the variation of surface ozone and remove the influence of meteorological fluctuations on surface ozone. Results reveal that the short-term, seasonal and long-term components of ozone account for 36.4, 57.6 and 2.2 % of the total variance, respectively. The long-term trend indicates that the MDA8 has undergone a significant increase in the period of 2003–2015, with an average rate of 1.13 ± 0.01 ppb year−1 (R2 = 0.92. It is found that meteorological factors did not significantly influence the long-term variation of ozone and the increase may be completely attributed to changes in emissions. Furthermore, there is no significant correlation between the long-term O3 and NO2 trends. This study suggests that emission changes in VOCs might have played a more important role in the observed increase of surface ozone at SDZ.

  1. ASAP: A MAC Protocol for Dense and Time-Constrained RFID Systems

    Directory of Open Access Journals (Sweden)

    Kyounghwan Lee

    2007-08-01

    Full Text Available We introduce a novel medium access control (MAC protocol for radio frequency identification (RFID systems which exploits the statistical information collected at the reader. The protocol, termed adaptive slotted ALOHA protocol (ASAP, is motivated by the need to significantly improve the total read time performance of the currently suggested MAC protocols for RFID systems. In order to accomplish this task, ASAP estimates the dynamic tag population and adapts the frame size in the subsequent round via a simple policy that maximizes an appropriately defined efficiency function. We demonstrate that ASAP provides significant improvement in total read time performance over the current RFID MAC protocols. We next extend the design to accomplish reliable performance of ASAP in realistic scenarios such as the existence of constraints on frame size, and mobile RFID systems where tags move at constant velocity in the reader's field. We also consider the case where tags may fail to respond because of a physical breakdown or a temporary malfunction, and show the robustness in those scenarios as well.

  2. Magnetic resonance imaging protocols for paediatric neuroradiology

    International Nuclear Information System (INIS)

    Saunders, Dawn E.; Thompson, Clare; Gunny, Roxanne; Jones, Rod; Cox, Tim; Chong, Wui Khean

    2007-01-01

    Increasingly, radiologists are encouraged to have protocols for all imaging studies and to include imaging guidelines in care pathways set up by the referring clinicians. This is particularly advantageous in MRI where magnet time is limited and a radiologist's review of each patient's images often results in additional sequences and longer scanning times without the advantage of improvement in diagnostic ability. The difficulties of imaging small children and the challenges presented to the radiologist as the brain develops are discussed. We present our protocols for imaging the brain and spine of children based on 20 years experience of paediatric neurological MRI. The protocols are adapted to suit children under the age of 2 years, small body parts and paediatric clinical scenarios. (orig.)

  3. Comparison of the ultrashort gonadotropin-releasing hormone agonist-antagonist protocol with microdose flare -up protocol in poor responders: a preliminary study.

    Science.gov (United States)

    Berker, Bülent; Duvan, Candan İltemir; Kaya, Cemil; Aytaç, Ruşen; Satıroğlu, Hakan

    2010-01-01

    To determine the potential effect of the ultrashort gonadotropin-releasing hormone (GnRH) agonist/GnRH antagonist protocol versus the microdose GnRH agonist protocol in poor responders undergoing intracytoplasmic sperm injection (ICSI). The patients in the Agonist-Antagonist Group (n=41) were administered the ultrashort GnRH-agonist/ antagonist protocol, while the patients in the Microdose Group (n=41) were stimulated according to the microdose flare-up protocol. The mean number of mature oocytes retrieved was the primary outcome measure. Fertilization rate, implantation rate per embryo and clinical pregnancy rates were secondary outcome measures. There was no differenc between the mean number of mature oocytes retrieved in the two groups. There were also no statistical differences between the two groups in terms of peak serum E2 level, canceled cycles, endometrial thickness on hCG day, number of 2 pronucleus and number of embryos transferred. However, the total gonadotropin consumption and duration of stimulation were significantly higher with the Agonist-Antagonist Group compared with the Microdose Group. The implantation and clinical pregnancy rates were similar between the two groups. Despite the high dose of gonadotropin consumption and longer duration of stimulation with the ultrashort GnRH agonist/ antagonist protocol, it seems that the Agonist-Antagonist Protocol is not inferior to the microdose protocol in poor responders undergoing ICSI.

  4. A mechanical protocol to replicate impact in walking footwear.

    Science.gov (United States)

    Price, Carina; Cooper, Glen; Graham-Smith, Philip; Jones, Richard

    2014-01-01

    Impact testing is undertaken to quantify the shock absorption characteristics of footwear. The current widely reported mechanical testing method mimics the heel impact in running and therefore applies excessive energy to walking footwear. The purpose of this study was to modify the ASTM protocol F1614 (Procedure A) to better represent walking gait. This was achieved by collecting kinematic and kinetic data while participants walked in four different styles of walking footwear (trainer, oxford shoe, flip-flop and triple-density sandal). The quantified heel-velocity and effective mass at ground-impact were then replicated in a mechanical protocol. The kinematic data identified different impact characteristics in the footwear styles. Significantly faster heel velocity towards the floor was recorded walking in the toe-post sandals (flip-flop and triple-density sandal) compared with other conditions (e.g. flip-flop: 0.36±0.05 ms(-1) versus trainer: 0.18±0.06 ms(-1)). The mechanical protocol was adapted by altering the mass and drop height specific to the data captured for each shoe (e.g. flip-flop: drop height 7 mm, mass 16.2 kg). As expected, the adapted mechanical protocol produced significantly lower peak force and accelerometer values than the ASTM protocol (pfootwear style specific. Copyright © 2014 Elsevier B.V. All rights reserved.

  5. Cost effectiveness of a protocol using palivizumab in preterm infants

    Directory of Open Access Journals (Sweden)

    Yolanda Hernández-Gago

    2017-03-01

    risk, while many of them have associated risk factors you vary as have school-age siblings, rural residence, parental smoking, poor educational background of parents, lack of artificial feeding and family history of allergy. Conclusions: The consensus protocol has not been a significant increase in hospitalization rates in preterm infants <32 weeks gestational age patients. In those <35 has been observed a higher rate of hospitalization, with a very unfavorable cost-effectiveness for all clinical scenarios valued relationship.

  6. Evaluating Protocol Lifecycle Time Intervals in HIV/AIDS Clinical Trials

    Science.gov (United States)

    Schouten, Jeffrey T.; Dixon, Dennis; Varghese, Suresh; Cope, Marie T.; Marci, Joe; Kagan, Jonathan M.

    2014-01-01

    Background Identifying efficacious interventions for the prevention and treatment of human diseases depends on the efficient development and implementation of controlled clinical trials. Essential to reducing the time and burden of completing the clinical trial lifecycle is determining which aspects take the longest, delay other stages, and may lead to better resource utilization without diminishing scientific quality, safety, or the protection of human subjects. Purpose In this study we modeled time-to-event data to explore relationships between clinical trial protocol development and implementation times, as well as identify potential correlates of prolonged development and implementation. Methods We obtained time interval and participant accrual data from 111 interventional clinical trials initiated between 2006 and 2011 by NIH’s HIV/AIDS Clinical Trials Networks. We determined the time (in days) required to complete defined phases of clinical trial protocol development and implementation. Kaplan-Meier estimates were used to assess the rates at which protocols reached specified terminal events, stratified by study purpose (therapeutic, prevention) and phase group (pilot/phase I, phase II, and phase III/ IV). We also examined several potential correlates to prolonged development and implementation intervals. Results Even though phase grouping did not determine development or implementation times of either therapeutic or prevention studies, overall we observed wide variation in protocol development times. Moreover, we detected a trend toward phase III/IV therapeutic protocols exhibiting longer developmental (median 2 ½ years) and implementation times (>3years). We also found that protocols exceeding the median number of days for completing the development interval had significantly longer implementation. Limitations The use of a relatively small set of protocols may have limited our ability to detect differences across phase groupings. Some timing effects

  7. Implementation of a baby doll therapy protocol for people with dementia: Innovative practice.

    Science.gov (United States)

    Braden, Barbara A; Gaspar, Phyllis M

    2015-09-01

    Dementia is exhibited by both emotional and physical states such as agitation. Chemical restraints, often used for agitated behaviors, are not always effective and produce untoward effects. Baby doll therapy is a nonpharmacologic therapy that can affect agitated behavior in dementia patients, yet a protocol for the therapy did not exist. An implementation protocol for doll therapy for those with dementia was developed and implemented with 16 residents in a dementia care center. Outcomes were measurements of the impact of the dolls on six areas of the resident's behavior and their reactions to the doll. Participants had an increase in level of happiness, activity/liveliness, interaction with staff and others, and ease of giving care. There was also a reduction in the level of anxiety. The increase in happiness was a statistically significant outcome. Baby doll therapy is an effective nonpharmacological approach for improving the well-being of patients with moderate to severe dementia. © The Author(s) 2014.

  8. Restrictive blood transfusion protocol in liver resection patients reduces blood transfusions with no increase in patient morbidity.

    Science.gov (United States)

    Wehry, John; Cannon, Robert; Scoggins, Charles R; Puffer, Lisa; McMasters, Kelly M; Martin, Robert C G

    2015-02-01

    Management of anemia in surgical oncology patients remains one of the key quality components in overall care and cost. Continued reports demonstrate the effects of hospital transfusion, which has been demonstrated to lead to a longer length of stay, more complications, and possibly worse overall oncologic outcomes. The hypothesis for this study was that a dedicated restrictive transfusion protocol in patients undergoing hepatectomy would lead to less overall blood transfusion with no increase in overall morbidity. A cohort study was performed using our prospective database from January 2000 to June 2013. September 2011 served as the separation point for the date of operation criteria because this marked the implementation of more restrictive blood transfusion guidelines. A total of 186 patients undergoing liver resection were reviewed. The restrictive blood transfusion guidelines reduced the percentage of patients that received blood from 31.0% before January 9, 2011 to 23.3% after this date (P = .03). The liver procedure that was most consistently associated with higher levels of transfusion was a right lobectomy (16%). Prior surgery and endoscopic stent were the 2 preoperative interventions associated with receiving blood. Patients who received blood before and after the restrictive period had similar predictive factors: major hepatectomies, higher intraoperative blood loss, lower preoperative hemoglobin level, older age, prior systemic chemotherapy, and lower preoperative nutritional parameters (all P blood did not have worse overall progression-free survival or overall survival. A restrictive blood transfusion protocol reduces the incidence of blood transfusions and the number of packed red blood cells transfused. Patients who require blood have similar preoperative and intraoperative factors that cannot be mitigated in oncology patients. Restrictive use of blood transfusions can reduce cost and does adversely affect patients undergoing liver resection

  9. DESIGN OF CAUCUS MEDIUM ACCESS CONTROL (C-MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS IN SMART GRIDS

    Directory of Open Access Journals (Sweden)

    JEETU SHARMA

    2017-10-01

    Full Text Available A Caucus-based medium access control protocol (C-MAC is proposed to reduce the end to end delay and battery consumption of the sensor nodes deployed in the monitoring of various smart grid regions, such as substation, pole and wires, perimeter security, real time and non-real-time monitoring using wireless sensor networks. The objective is to prolong the network lifetime and to reduce the end to end delay by mitigating the energy-hole problem and by eliminating bottlenecks significantly by using caucus based efficient synchronization techniques in multi-hop square grid topology of the wireless sensor networks (WSNs. The protocol self-reliantly and adaptively schedules node’s wake-up times, decreases idle listening and collisions, increases network throughput, and extends network lifetime. It induces a low duty cycle for adjusting wake-up times of sensor nodes. The appropriate selection of active and sleep time slots and next hop relay nodes are proposed to minimize the data transmission latency and to reduce battery consumption to increase the network lifetime. The uniform and synchronized transmission of the data packets is of prime importance to improve the network performance. Simulation results justify that the proposed C-MAC protocol increases the network lifetime, successful data transmission ratio along-with the reduction in end to end delay. The objective of this paper is to envisage benefits and utilization of C-MAC protocol for WSNs deployed in smart grids and to draw the attention of researchers in this area.

  10. Biocoder: A programming language for standardizing and automating biology protocols.

    Science.gov (United States)

    Ananthanarayanan, Vaishnavi; Thies, William

    2010-11-08

    Published descriptions of biology protocols are often ambiguous and incomplete, making them difficult to replicate in other laboratories. However, there is increasing benefit to formalizing the descriptions of protocols, as laboratory automation systems (such as microfluidic chips) are becoming increasingly capable of executing them. Our goal in this paper is to improve both the reproducibility and automation of biology experiments by using a programming language to express the precise series of steps taken. We have developed BioCoder, a C++ library that enables biologists to express the exact steps needed to execute a protocol. In addition to being suitable for automation, BioCoder converts the code into a readable, English-language description for use by biologists. We have implemented over 65 protocols in BioCoder; the most complex of these was successfully executed by a biologist in the laboratory using BioCoder as the only reference. We argue that BioCoder exposes and resolves ambiguities in existing protocols, and could provide the software foundations for future automation platforms. BioCoder is freely available for download at http://research.microsoft.com/en-us/um/india/projects/biocoder/. BioCoder represents the first practical programming system for standardizing and automating biology protocols. Our vision is to change the way that experimental methods are communicated: rather than publishing a written account of the protocols used, researchers will simply publish the code. Our experience suggests that this practice is tractable and offers many benefits. We invite other researchers to leverage BioCoder to improve the precision and completeness of their protocols, and also to adapt and extend BioCoder to new domains.

  11. Cluster protocols in Underwater Sensor Networks: a Research Review

    Directory of Open Access Journals (Sweden)

    K. Ovaliadis

    2014-07-01

    Full Text Available Underwater Wireless Sensor Networks (UWSN have different characteristics in relation to terrestrial wireless sensor networks; such as limited bandwidth capacity, high propagation delays and limited battery power. Although there has been much work completed in developing protocols and models for terrestrial networks, these are rarely applicable for underwater sensor networks. Up to today major efforts have been made for designing efficient protocols while considering the underwater communication characteristics. An important issue on this research area is the construction of an efficient clustering algorithm. Clustering in the context of UWSN is important as it contributes a great deal towards the efficient use of energy resources. This paper reviews the most significant cluster based protocols proposed for UWSN. Major performance issues of these protocols with respect to the network conditions such as packet delivery ratio, average packet delay, node mobility effect and energy consumption are examined. The advantages and disadvantages of each protocol are also pointed out.

  12. The Impact of Firefighter Personal Protective Equipment and Treadmill Protocol on Maximal Oxygen Uptake

    Science.gov (United States)

    Lee, Joo-Young; Bakri, Ilham; Kim, Jung-Hyun; Son, Su-Young; Tochihara, Yutaka

    2015-01-01

    This study investigated the effects of firefighter personal protective equipment (PPE) on the determination of maximal oxygen uptake (VO2max) while using two different treadmill protocols: a progressive incline protocol (PIP) and a progressive speed protocol (PSP), with three clothing conditions (Light-light clothing; Boots-PPE with rubber boots; Shoes-PPE with running shoes). Bruce protocol with Light was performed for a reference test. Results showed there was no difference in VO2max between Bruce Light, PIP Light, and PSP Light. However, VO2max was reduced in Boots and Shoes with shortened maximal performance time (7 and 6 min reduced for PIP Boots and Shoes, respectively; 11 and 9 min reduced for PSP Boots and Shoes, respectively), whereas the increasing rate of VO2 in Boots and Shoes during submaximal exercise was greater compared with Light. Wearing firefighter boots compared with wearing running shoes also significantly affected submaximal VO2 but not VO2max. These results suggest that firefighters’ maximal performance determined from a typical VO2max test without wearing PPE may overestimate the actual performance capability of firefighters wearing PPE. PMID:23668854

  13. Nursing Music Protocol and Postoperative Pain.

    Science.gov (United States)

    Poulsen, Michael J; Coto, Jeffrey

    2018-04-01

    Pain has always been a major concern for patients and nurses during the postoperative period. Therapies, medicines, and protocols have been developed to improve pain and anxiety but have undesirable risks to the patient. Complementary and alternative medicine therapies have been studied but have not been applied as regular protocols in the hospital setting. Music is one type of complementary and alternative medicine therapy that has been reported to have favorable results on reducing postoperative pain, anxiety, and opioid usage. However, music lacks a protocol that nurses can implement during the perioperative process. This paper is an in-depth literature review assessing a best practice recommendation and protocol that establishes a consensus in the use of music therapy. The results suggest that music therapy may consist of calming, soft tones of 60-80 beats per minute for at least 15-30 minutes at least twice daily during the pre- and postoperative periods. It is suggested that music only be used in conjunction with standards of care and not as the primary intervention of pain or anxiety. This evidence suggests that proper use of music therapy can significantly reduce surgical pain. Implementing these protocols and allowing the freedom of nursing staff to use them may lead to greater reductions in surgical pain and anxiety and a reduction in opioid use. Copyright © 2017 American Society for Pain Management Nursing. Published by Elsevier Inc. All rights reserved.

  14. [Fewer breech deliveries after implementation of a modified cephalic version protocol].

    Science.gov (United States)

    Kuppens, Simone M I; Francois, Anne M H; Hasaart, Tom H M; van der Donk, Maria W P; Pop, Victor J M

    2010-01-01

    To investigate the effect of implementation of a number of process policy guidelines (protocol), on the success rate of external cephalic version (ECV) for breech presentation. Prospective study. During a 3-year period (2004-2006) a standardized protocol for an ECV consultation was developed, evaluated and adapted. After implementing this modified protocol as 'process policy guidelines', the effect on the rate of successful ECV was prospectively evaluated during the period 1 January 2007-31 July 2008. Success was defined as cephalic presentation (ultrasound) immediately after ECV. A secondary outcome measure was the elective caesarean section rate for breech presentation. The rate of successful ECV increased significantly from 47% (110/236 pregnant women) in the period January 2004-December 2006 to 61% (85/139, p = 0.006) in the period January 2007-July 2008. Patient characteristics were similar in both groups, with the exception of 2 subgroups of term of version. The increase was preferentially found in nulliparous and multiparous women with frank breech. Nulliparity, frank breech, anterior placenta and low birth weight were associated with a lower success rate of ECV. The term of pregnancy at which ECV was performed did not seem to affect the success rate. Implementing the process policy guidelines increased the number of cephalic presentations at delivery and decreased the rate of elective caesarean sections for breech presentation from 39% to 27% (p = 0.03). The number needed to treat to prevent 1 elective caesarean section by ECV according to the process policy guidelines was 8. After implementation of the process policy guidelines, the success rate of ECV increased considerably. The rate of elective caesarean section for breech presentation declined. These findings are in favour of establishing specialized ECV centres in the Netherlands.

  15. Study of accent-based music speech protocol development for improving voice problems in stroke patients with mixed dysarthria.

    Science.gov (United States)

    Kim, Soo Ji; Jo, Uiri

    2013-01-01

    Based on the anatomical and functional commonality between singing and speech, various types of musical elements have been employed in music therapy research for speech rehabilitation. This study was to develop an accent-based music speech protocol to address voice problems of stroke patients with mixed dysarthria. Subjects were 6 stroke patients with mixed dysarthria and they received individual music therapy sessions. Each session was conducted for 30 minutes and 12 sessions including pre- and post-test were administered for each patient. For examining the protocol efficacy, the measures of maximum phonation time (MPT), fundamental frequency (F0), average intensity (dB), jitter, shimmer, noise to harmonics ratio (NHR), and diadochokinesis (DDK) were compared between pre and post-test and analyzed with a paired sample t-test. The results showed that the measures of MPT, F0, dB, and sequential motion rates (SMR) were significantly increased after administering the protocol. Also, there were statistically significant differences in the measures of shimmer, and alternating motion rates (AMR) of the syllable /K$\\inve$/ between pre- and post-test. The results indicated that the accent-based music speech protocol may improve speech motor coordination including respiration, phonation, articulation, resonance, and prosody of patients with dysarthria. This suggests the possibility of utilizing the music speech protocol to maximize immediate treatment effects in the course of a long-term treatment for patients with dysarthria.

  16. Variability in donation after cardiac death protocols: a national survey.

    Science.gov (United States)

    Fugate, Jennifer E; Stadtler, Maria; Rabinstein, Alejandro A; Wijdicks, Eelco F M

    2011-02-27

    As donation after cardiac death practices expand, the number of institutional policies is increasing. We contacted organ procurement organizations throughout the United States and requested protocols in hospitals in their donor service areas. Sixty-four protocols were obtained with representation from 16 different states. The terminology and recommended practices varied substantially. The methods for death determination were not specified in 28 (44%) protocols. Most adhered to a 2- to 5-min observation time between circulatory arrest and organ procurement, but 10 (16%) provided no information. This variability reveals a need to define a uniform standard in donation after cardiac death protocols and death determination practices.

  17. The effectiveness of workplace interventions to increase physical activity and decrease sedentary behaviour in adults: protocol for a systematic review.

    Science.gov (United States)

    Loitz, Christina C; Potter, Robert J; Walker, Jessica L; McLeod, Nicole C; Johnston, Nora J

    2015-12-12

    A physically active lifestyle plays a preventative role in the development of various chronic diseases and mental health conditions. Unfortunately, few adults achieve the minimum amount of physical activity and spend excessive time sitting. Developing targeted interventions to increase active living among adults is an important endeavour for public health. One plausible context to reach adults is the workplace. This systematic review aims to review the effectiveness of workplace interventions on increasing physical activity and decreasing sedentary behaviour in the workplace. An advisory group of practitioners will work in collaboration with the research team to inform the systematic review and knowledge mobilization. Fifteen electronic databases will be searched to identify studies examining the effectiveness of workplace interventions on physical activity and sedentary behaviour. All experimental designs and observational studies (non-experimental intervention studies) meeting the study criteria will be included. Studies examining generally healthy, employed, adult participants will be included for the review. Interventions will focus on increasing physical activity and/or decreasing sedentary behaviour from the individual to policy level. The primary outcome variables will be reported or observed physical activity and/or sedentary behaviour in the workplace. Secondary outcomes will include variables ranging from return on investment to quality of life. Study quality will be assessed for risk of bias following the protocol identified in the Cochrane Handbook for Systematic Reviews of Interventions and supplemented by the guidelines developed by the Cochrane Effective Practice and Organisation of Care group, using RevMan. The quality of the evidence will be assessed using the Grading of Recommendations, Assessment, Development and Evaluation approach. Meta-analyses, forest plots, and harvest plots will be used where appropriate to assess the direction, size, and

  18. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  19. Impact of Sleep Telemedicine Protocol in Management of Sleep Apnea: A 5-Year VA Experience.

    Science.gov (United States)

    Baig, Mirza M; Antonescu-Turcu, Andrea; Ratarasarn, Kavita

    2016-05-01

    There is growing evidence that demonstrates an important role for telemedicine technologies in enhancing healthcare delivery. A comprehensive sleep telemedicine protocol was implemented at the Veterans Administration Medical Center (VAMC), Milwaukee, WI, in 2008 in an effort to improve access to sleep specialty care. The telemedicine protocol relied heavily on sleep specialist interventions based on chart review (electronic consult [e-consult]). This was done in response to long wait time for sleep clinic visits as well as delayed sleep study appointments. Since 2008 all consults are screened by sleep service to determine the next step in intervention. Based on chart review, the following steps are undertaken: (1) eligibility for portable versus in-lab sleep study is determined, and a sleep study order is placed accordingly, (2) positive airway pressure (PAP) therapy is prescribed for confirmed sleep apnea, and (3) need for in-person evaluation in the sleep clinic is determined, and the visit is scheduled. This study summarizes the 5-year trend in various aspects of access to sleep care after implementation of sleep telemedicine protocol at the Milwaukee VAMC. This is a retrospective system efficiency study. The electronic medical record was interrogated 5 years after starting the sleep telemedicine protocol to study annual trends in the following outcomes: (1) interval between sleep consult and prescription of PAP equipment, (2) total sleep consults, and (3) sleep clinic wait time. Two part-time sleep physicians provided sleep-related care at the Milwaukee VAMC between 2008 and 2012. During this period, the interval between sleep consult and PAP prescription decreased from ≥60 days to ≤7 days. This occurred in spite of an increase in total sleep consults and sleep studies. There was also a significant increase in data downloads, indicating overall improved follow-up. There was no change in clinic wait time of ≥60 days. Implementation of a sleep telemedicine

  20. Analysis of the LTE Access Reservation Protocol for Real-Time Traffic

    DEFF Research Database (Denmark)

    Thomsen, Henning; Kiilerich Pratas, Nuno; Stefanovic, Cedomir

    2013-01-01

    LTE is increasingly seen as a system for serving real-time Machine-to-Machine (M2M) communication needs. The asynchronous M2M user access in LTE is obtained through a two-phase access reservation protocol (contention and data phase). Existing analysis related to these protocols is based...... of the two-phase LTE reservation protocol and asses its performance, when assumptions (1) and (2) do not hold....

  1. The impact of a massive transfusion protocol (1:1:1) on major hepatic injuries: does it increase abdominal wall closure rates?

    Science.gov (United States)

    Ball, Chad G; Dente, Christopher J; Shaz, Beth; Wyrzykowski, Amy D; Nicholas, Jeffrey M; Kirkpatrick, Andrew W; Feliciano, David V

    2013-10-01

    Massive transfusion protocols (MTPs) using high plasma and platelet ratios for exsanguinating trauma patients are increasingly popular. Major liver injuries often require massive resuscitations and immediate hemorrhage control. Current published literature describes outcomes among patients with mixed patterns of injury. We sought to identify the effects of an MTP on patients with major liver trauma. Patients with grade 3, 4 or 5 liver injuries who required a massive blood component transfusion were analyzed. We compared patients with high plasma:red blood cell:platelet ratio (1:1:1) transfusions (2007-2009) with patients injured before the creation of an institutional MTP (2005-2007). Among 60 patients with major hepatic injuries, 35 (58%) underwent resuscitation after the implementation of an MTP. Patient and injury characteristics were similar between cohorts. Implementation of the MTP significantly improved plasma: red blood cell:platelet ratios and decreased crystalloid fluid resuscitation (p = 0.026). Rapid improvement in early acidosis and coagulopathy was superior with an MTP (p = 0.009). More patients in the MTP group also underwent primary abdominal fascial closure during their hospital stay (p = 0.021). This was most evident with grade 4 injuries (89% vs. 14%). The mean time to fascial closure was 4.2 days. The overall survival rate for all major liver injuries was not affected by an MTP (p = 0.61). The implementation of a formal MTP using high plasma and platelet ratios resulted in a substantial increase in abdominal wall approximation. This occurred concurrently to a decrease in the delivered volume of crystalloid fluid.

  2. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  3. A Novel Load Balancing Scheme for Multipath Routing Protocol in MANET

    Directory of Open Access Journals (Sweden)

    Kokilamani Mounagurusamy

    2016-09-01

    Full Text Available The recent advancements in information and communication technology create a great demand for multipath routing protocols. In MANET, nodes can be arbitrarily located and can move freely at any given time. The topology of MANET can change rapidly and unpredictably. Because wireless link capacities are usually limited, congestion is possible in MANETs. Hence, balancing the load in a MANET is important since nodes with high load will deplete their batteries quickly, thereby increasing the probability of disconnecting or partitioning the network. To overcome these, the multipath protocol should be aware of load at route discovery phase. The main objective of the proposed article is to balance the load on a node and to extend the lifetime of the node due to the congestion, energy depletion and link failures. This article describes a novel load and congestion aware scheme called Path Efficient Ad-hoc On-demand Multipath Distance Vector (PE-AOMDV protocol to increase the performance of routing process in MANET in terms of congestion, end-to-end delay and load balancing. A new threshold value and a counter variable are introduced to limit the number of communication paths passing over a node in route discovery phase. For every new request the counter variable is incremented by one and the threshold value is compared to see whether the maximum number of connections has been reached or not. The proposed method is network simulator ns-2 and it is found that there is a significant improvement in the proposed scheme. It reduces the energy consumption, average end-to-end delay and normalized routing overhead. Also the proposed scheme increases packet delivery ratio, throughput and minimizes routing overheads.

  4. Marketing Strategy Telkom Internet Protocol Televison (IPTV) to Increase Subscribers Number for Area Operation Bandung

    OpenAIRE

    Alby, Pradipta Wismaya; Purwanegara, Mustika Sufiati; Desiana, Krisnati

    2012-01-01

    Business transformation transfigured fromvoice communication to multimedia (Voice, Data andVideo) is not inevitable in the current telecommunicationsindustry. Telkom develops IPTV (Internet ProtocolTelevision) as an effort to revitalize the Fixed Wirelinebusiness in the middle of the changing landscape of thetelecommunications industry. This IPTV service utilizesthe existing network of fixed wire telephone network(Fixed Wireline). On this technology, one cable can be usedfor various data tran...

  5. Quantum protocols within Spekkens' toy model

    Science.gov (United States)

    Disilvestro, Leonardo; Markham, Damian

    2017-05-01

    Quantum mechanics is known to provide significant improvements in information processing tasks when compared to classical models. These advantages range from computational speedups to security improvements. A key question is where these advantages come from. The toy model developed by Spekkens [R. W. Spekkens, Phys. Rev. A 75, 032110 (2007), 10.1103/PhysRevA.75.032110] mimics many of the features of quantum mechanics, such as entanglement and no cloning, regarded as being important in this regard, despite being a local hidden variable theory. In this work, we study several protocols within Spekkens' toy model where we see it can also mimic the advantages and limitations shown in the quantum case. We first provide explicit proofs for the impossibility of toy bit commitment and the existence of a toy error correction protocol and consequent k -threshold secret sharing. Then, defining a toy computational model based on the quantum one-way computer, we prove the existence of blind and verified protocols. Importantly, these two last quantum protocols are known to achieve a better-than-classical security. Our results suggest that such quantum improvements need not arise from any Bell-type nonlocality or contextuality, but rather as a consequence of steering correlations.

  6. IoT real time data acquisition using MQTT protocol

    Science.gov (United States)

    Atmoko, R. A.; Riantini, R.; Hasin, M. K.

    2017-05-01

    The Internet of Things (IoT) provides ease to monitor and to gain sensor data through the Internet [1]. The need of high quality data is increasing to the extent that data monitoring and acquisition system in real time is required, such as smart city or telediagnostic in medical areas [2]. Therefore, an appropriate communication protocol is required to resolve these problems. Lately, researchers have developed a lot of communication protocols for IoT, of which each has advantages and disadvantages. This study proposes the utilization of MQTT as a communication protocol, which is one of data communication protocols for IoT. This study used temperature and humidity sensors because the physical parameters are often needed as parameters of environment condition [3]. Data acquisition was done in real-time and stored in MySQL database. This study is also completed by interface web-based and mobile for online monitoring. This result of this study is the enhancement of data quality and reliability using MQTT protocol.

  7. St. John's wort significantly increased the systemic exposure and toxicity of methotrexate in rats

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Shih-Ying [Graduate Institute of Pharmaceutical Chemistry, China Medical University, Taichung, Taiwan (China); Juang, Shin-Hun [Graduate Institute of Pharmaceutical Chemistry, China Medical University, Taichung, Taiwan (China); Department of Medical Research, China Medical University Hospital, Taichung, Taiwan (China); Tsai, Shang-Yuan; Chao, Pei-Dawn Lee [School of Pharmacy, China Medical University, Taichung, Taiwan (China); Hou, Yu-Chi, E-mail: hou5133@gmail.com [School of Pharmacy, China Medical University, Taichung, Taiwan (China); Department of Medical Research, China Medical University Hospital, Taichung, Taiwan (China)

    2012-08-15

    St. John's wort (SJW, Hypericum perforatum) is one of the popular nutraceuticals for treating depression. Methotrexate (MTX) is an immunosuppressant with narrow therapeutic window. This study investigated the effect of SJW on MTX pharmacokinetics in rats. Rats were orally given MTX alone and coadministered with 300 and 150 mg/kg of SJW, and 25 mg/kg of diclofenac, respectively. Blood was withdrawn at specific time points and serum MTX concentrations were assayed by a specific monoclonal fluorescence polarization immunoassay method. The results showed that 300 mg/kg of SJW significantly increased the AUC{sub 0−t} and C{sub max} of MTX by 163% and 60%, respectively, and 150 mg/kg of SJW significantly increased the AUC{sub 0−t} of MTX by 55%. In addition, diclofenac enhanced the C{sub max} of MTX by 110%. The mortality of rats treated with SJW was higher than that of controls. In conclusion, coadministration of SJW significantly increased the systemic exposure and toxicity of MTX. The combined use of MTX with SJW would need to be with caution. -- Highlights: ► St. John's wort significantly increased the AUC{sub 0−t} and C{sub max} of methotrexate. ► Coadministration of St. John's wort increased the exposure and toxicity of methotrexate. ► The combined use of methotrexate with St. John's wort will need to be with caution.

  8. Safeguards Implementation Guide for States with Small Quantities Protocols

    International Nuclear Information System (INIS)

    2013-01-01

    The International Atomic Energy Agency (IAEA) works to enhance the contribution of nuclear energy for peace and prosperity around the world, while helping to ensure that nuclear material is not diverted to nuclear weapons or other nuclear explosive devices. In implementing safeguards, the IAEA plays an instrumental independent verification role, providing credible assurances that States' safeguards commitments are being respected. Most of the world's non-nuclear-weapon States (NNWSs) have concluded comprehensive safeguards agreements (CSAs) with the IAEA, pursuant to the Treaty on the Non- Proliferation of Nuclear Weapons (NPT). The IAEA and States are required to cooperate in the implementation of such agreements. Effective cooperation demonstrates a State's commitment to the peaceful use of nuclear energy and furthers the State's national interests by reducing the risk of unauthorized use of nuclear material. Over 100 NNWSs party to the NPT have very limited quantities of nuclear material and have concluded protocols to their CSAs which hold in abeyance many procedures in Part II of a CSA. These protocols are referred to as 'small quantities protocols' or 'SQPs' and remain in effect as long as the State meets certain eligibility criteria. The purpose of an SQP is to reduce the burden of safeguards implementation for States with little or no nuclear activities, while retaining the integrity of the safeguards system. States with SQPs have very important obligations they must fulfil under their CSAs. In 1997, as part of the IAEA's efforts to strengthen its safeguards system, the Model Additional Protocol to the Agreement(s) between State(s) and the International Atomic Energy Agency for the Application of Safeguards was developed to provide the IAEA with broader access to information and locations, thus significantly increasing the IAEA's ability to provide assurance of the absence of undeclared nuclear material and activities in States. Many States with SQPs have

  9. Turkish support to Kyoto Protocol: A reality or just an illusion

    International Nuclear Information System (INIS)

    Erdogdu, Erkan

    2010-01-01

    The long-term increase in Earth's temperature is known as the global warming or the greenhouse effect. Taking into account the fact that the ice age only involved a global temperature variation of around 4 C, it is clear climate change is arguably one of the greatest environmental threats the world is facing today. The impacts of disruptive change leading to catastrophic events such as storms, droughts, sea level rise and floods are already being felt across the world. In this context, the signing of the Kyoto Protocol in 1997 has been argued to be a historic step in reversing the inexorable increase in the emission of the greenhouse gases. The primary achievement of the Protocol has been so-called commitment of countries referred in the Annex I of the Protocol to reduce their emission of GHGs some 5% below their country specific 1990 level. On February 5, 2009, Turkish Parliament ratified an agreement to sign the Kyoto Protocol after intense pressure from both the European Union and international environmental organizations; however, so far it has not taken any step to bring about real reductions in emissions. In short, Turkey simply signed but ignored the Protocol. Present paper investigates Turkish position vis-a-vis Kyoto Protocol and critically questions Turkish policies in that area. (author)

  10. Stress-first protocol for myocardial perfusion SPECT imaging with semiconductor cameras: high diagnostic performances with significant reduction in patient radiation doses

    International Nuclear Information System (INIS)

    Perrin, Mathieu; Claudin, Marine; Veran, Nicolas; Morel, Olivier; Besseau, Cyril; Boutley, Henri; Djaballah, Wassila; Poussier, Sylvain; Verger, Antoine; Moulin, Frederic; Imbert, Laetitia; Karcher, Gilles; Marie, Pierre-Yves

    2015-01-01

    Effective doses of 14 mSv or higher are currently being attained in patients having stress and rest myocardial perfusion imaging (MPI) single photon emission computed tomography (SPECT) performed on the same day with conventional protocols. This study aimed to assess the actual reduction in effective doses as well as diagnostic performances for MPI routinely planned with: (1) high-sensitivity cadmium zinc telluride (CZT) cameras, (2) very low injected activities and (3) a stress-first protocol where the normality of stress images may lead to avoiding rest imaging. During a 1-year period, 2,845 patients had MPI on a CZT camera, a single-day stress-first protocol and low injected activities (120 MBq of 99m Tc-sestamibi at stress for 75 kg body weight and threefold higher at rest). The ability to detect > 50 % coronary stenosis was assessed in a subgroup of 149 patients who also had coronary angiography, while the normalcy rate was assessed in a subgroup of 128 patients with a low pretest likelihood of coronary artery disease (<10 %). Overall, 33 % of patients had abnormal MPI of which 34 % were women and 34 % were obese. The mean effective doses and the percentage of exams involving only stress images were: (1) 3.53 ± 2.10 mSv and 37 % in the overall population, (2) 4.83 ± 1.56 mSv and 5 % in the subgroup with angiography and (3) 1.96 ± 1.52 mSv and 71 % in the low-probability subgroup. Sensitivity and global accuracy for identifying the 106 patients with coronary stenosis were 88 and 80 %, respectively, while the normalcy rate was 97 %. When planned with a low-dose stress-first protocol on a CZT camera, MPI provides high diagnostic performances and a dramatic reduction in patient radiation doses. This reduction is even greater in low-risk subgroups with high rates of normal stress images, thus allowing the mean radiation dose to be balanced against cardiac risk in targeted populations. (orig.)

  11. Increasing Participation and Compliance in International Climate Change Agreements

    International Nuclear Information System (INIS)

    Barrett, S.; Stavins, R.

    2002-11-01

    Scientific and economic consensus increasingly points to the need for a credible and cost-effective approach to address the threat of global climate change, but the Kyoto Protocol to the U.N. Framework Convention on Climate Change appears incapable of inducing significant participation and compliance. We assess the Protocol and thirteen alternative policy architectures that have been proposed, with particular attention to their respective abilities to induce participation and compliance. We find that those approaches that offer cost-effective mitigation are unlikely to induce significant participation and compliance, while those approaches that are likely to enjoy a reasonably high level of implementation by sovereign states are sorely lacking in terms of their anticipated cost effectiveness. The feasible set of policy architectures is thus limited to second-best alternatives. Much more attention needs to be given - both by scholarly research and by international negotiations - to aspects of future international climate agreements that will affect the degrees of participation and compliance that can reasonably be expected to be forthcoming

  12. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  13. Comparison of MANET Routing Protocols in Different Traffic and Mobility Models

    Directory of Open Access Journals (Sweden)

    J. Baraković

    2010-06-01

    Full Text Available Routing protocol election in MANET (Mobile Ad Hoc Network is a great challenge, because of its frequent topology changes and routing overhead. This paper compares performances of three routing protocols: Destination Sequenced Distance Vector (DSDV, Ad Hoc Ondemand Distance Vector (AODV and Dynamic Source Routing (DSR, based on results analysis obtained using simulations with different load and mobility scenarios performed with Network Simulator version 2 (NS-2. In low load and low mobility scenarios routing protocols perform in a similar manner. However, with mobility and load increasing DSR outperforms AODV and DSDV protocols.

  14. Blending protocol effect in structural properties of PA6/ABS nanocomposites compatibilized with SAN-MA

    International Nuclear Information System (INIS)

    Castro, Lucas D.C. de; Oliveira, Amanda D.; Pessan, Luiz Antonio

    2015-01-01

    Nanocomposites based on polyamide 6 (PA6) and acrylonitrile-butadiene-styrene (ABS) compatibilized with styrene acrylonitrile-co-maleic anhydride were prepared using different blending protocols in a twin screw extruder. Specimen were prepared though injection molding. The organoclay (OMMT) incorporation and blending sequence effect on structural properties were investigated. X-ray diffraction analysis (XRD) indicates a complete exfoliated structure for all samples. Rheological measurements show an increasing in nanocomposites complex viscosities and storage modulus values when compared with the ternary blend. However, no significant effects in the rheological behavior were observed due the blending sequence. Differential scanning calorimetry (DSC) measurements suggests the incorporation of OMMT and different blending protocols may influence the polyamide polymorphism and degree of crystallinity. (author)

  15. Performance evaluation of spatial vector routing protocol for wireless sensor networks

    International Nuclear Information System (INIS)

    Baloch, J.; Jokhio, I.

    2012-01-01

    WSNs (Wireless Sensor Networks) is an emerging area of research. Researchers worldwide are working on the issues faced by sensor nodes. Communication has been a major issue in wireless networks and the problem is manifolds in WSN s because of the limited resources. The routing protocol in such networks plays a pivotal role, as an effective routing protocol could significantly reduce the energy consumed in transmitting and receiving data packets throughout a network. In this paper the performance of SVR (Spatial Vector Routing) an energy efficient, location aware routing protocol is compared with the existing location aware protocols. The results from the simulation trials show the performance of SVR. (author)

  16. Performance Evaluation of Spatial Vector Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Javed Ali Baloch

    2012-10-01

    Full Text Available WSNs (Wireless Sensor Networks is an emerging area of research. Researchers worldwide are working on the issues faced by sensor nodes. Communication has been a major issue in wireless networks and the problem is manifolds in WSNs because of the limited resources. The routing protocol in such networks plays a pivotal role, as an effective routing protocol could significantly reduce the energy consumed in transmitting and receiving data packets throughout a network. In this paper the performance of SVR (Spatial Vector Routing an energy efficient, location aware routing protocol is compared with the existing location aware protocols. The results from the simulation trials show the performance of SVR.

  17. Protocol for concomitant temporomandibular joint custom-fitted total joint reconstruction and orthognathic surgery utilizing computer-assisted surgical simulation.

    Science.gov (United States)

    Movahed, Reza; Teschke, Marcus; Wolford, Larry M

    2013-12-01

    Clinicians who address temporomandibular joint (TMJ) pathology and dentofacial deformities surgically can perform the surgery in 1 stage or 2 separate stages. The 2-stage approach requires the patient to undergo 2 separate operations and anesthesia, significantly prolonging the overall treatment. However, performing concomitant TMJ and orthognathic surgery (CTOS) in these cases requires careful treatment planning and surgical proficiency in the 2 surgical areas. This article presents a new treatment protocol for the application of computer-assisted surgical simulation in CTOS cases requiring reconstruction with patient-fitted total joint prostheses. The traditional and new CTOS protocols are described and compared. The new CTOS protocol helps decrease the preoperative workup time and increase the accuracy of model surgery. Copyright © 2013 American Association of Oral and Maxillofacial Surgeons. Published by Elsevier Inc. All rights reserved.

  18. The HPA photon protocol and proposed electron protocol

    International Nuclear Information System (INIS)

    Pitchford, W.G.

    1985-01-01

    The Hospital Physicists Association (HPA) photon dosimetry protocol has been produced and was published in 1983. Revised values of some components of Csub(lambda) and refinements introduced into the theory in the last few years have enabled new Csub(lambda) values to be produced. The proposed HPA electron protocol is at present in draft form and will be published shortly. Both protocels are discussed. (Auth.)

  19. Structured Transition Protocol for Children with Cystinosis

    Directory of Open Access Journals (Sweden)

    Rupesh Raina

    2017-08-01

    Full Text Available The transition from pediatric to adult medical services has a greater impact on the care of adolescents or young adults with chronic diseases such as cystinosis. This transition period is a time of psychosocial development and new responsibilities placing these patients at increased risk of non-adherence. This can lead to serious adverse effects such as graft loss and progression of the disease. Our transition protocol will provide patients, families, physicians, and all those involved a structured guide to transitioning cystinosis patients. This structured protocol depends on four areas of competency: Recognition, Insight, Self-reliance, and Establishment of healthy habits (RISE. This protocol has not been tested and therefore challenges not realized. With a focus on medical, social, and educational/vocational aspects, we aim to improve transition for cystinosis patients in all aspects of their lives.

  20. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation

    Directory of Open Access Journals (Sweden)

    Triana Mugia Rahayu

    2015-06-01

    Full Text Available The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

  1. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.

    Science.gov (United States)

    Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen

    2011-01-01

    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.

  2. Efficacy of post operative adjuvant therapy with human interferon beta, MCNU and radiation (IMR) for malignant glioma: comparison among three protocols

    International Nuclear Information System (INIS)

    Hatano, N.; Wakabayashi, T.; Kajita, Y.; Mizuno, M.; Ohno, T.; Nakayashiki, N.; Takemura, A.; Yoshida, J.

    2000-01-01

    In order to develop ultimate adjuvant therapy for malignant gliomas, we analyzed 77 patients with malignant gliomas (29 anaplastic astrocytomas (AAs) and 48 glioblastoma multiformes (GMs)) treated by three protocols of IMR therapy (human interferon-beta (HuIFN-β), MCNU and radiation). In protocol 1 (n = 45 : AA = 13, GM = 32), 1 x 10 6 IU of HuIFN-β was administrated intravenously once a day for 7 days. On day 2, MCNU was administrated at a dose of 2 mg/kg b.w. intravenously and from day 3, radiation was started in five weekly fractions of 2 Gy for 6 weeks. Total dose was 60 Gy. Protocol 2 (n = 19 : AA = 11, GM = 8) was comparable with protocol 1 except HuIFN-β was administrated twice a day at a dose of 1 x 10 6 IU each. Protocol 3 (n = 13 : AA = 5, GM = 8) differed from protocol 2 only in a high dose-hyperfractionated radiation which was given twice a day at a dose of 1.5 Gy each and for a total dose of 66 Gy. Antitumor effects were evaluated by survival and response rate determined by decrease of tumor size. Significant improvement was obtained in patients with AAs by protocol 2 and 3. Response rates of patients with AAs and GMs were 46.2 % and 50 % in protocol 1, 63.6 % and 50 % in protocol 2, and 80 % and 50 % in protocol 3, respectively. One and two year survival rates in AAs were 46.4 % and 34.8 % in protocol 1, both 75 % in protocol 2, and both 100 % in protocol 3. Survival rates in GMs were not different among them. Except of radiation necrosis, which was observed in 38.5 % of the patients under protocol 3, there was no significant difference in the adverse effects among the three protocols. In the present study, the efficacy of IMR therapy for patients with malignant gliomas, especially for AAs, was confirmed. We conclude that twice a day administrations of HuIFN-β in combination with a high dose-hyperfractionated radiation provide increased efficacy in IMR therapy. (author)

  3. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  4. Evaluation of an app-based stress protocol

    Directory of Open Access Journals (Sweden)

    Noeh Claudius

    2016-09-01

    Full Text Available Stress is a major influence on the quality of life in our fast-moving society. This paper describes a standardized and contemporary protocol that is capable of inducing moderate psychological stress in a laboratory setting. Furthermore, it evaluates its effects on physiological biomarkers. The protocol called “THM-Stresstest” mainly consists of a rest period (30 min, an app-based stress test under the surveillance of an audience (4 min and a regeneration period (32 min. We investigated 12 subjects to evaluate the developed protocol. We could show significant changes in heart rate variability, electromyography, electro dermal activity and salivary cortisol and α-amylase. From this data we conclude that the THM-Stresstest can serve as a psychobiological tool for provoking responses in the cardiovascular-, the endocrine and exocrine system as well as the sympathetic part of the central nervous system.

  5. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  6. Using environmental engineering to increase hand hygiene compliance: a cross-over study protocol.

    Science.gov (United States)

    Schmidtke, Kelly Ann; Aujla, Navneet; Marshall, Tom; Hussain, Abid; Hodgkinson, Gerard P; Arheart, Kristopher; Marti, Joachim; Birnbach, David J; Vlaev, Ivo

    2017-09-11

    Compliance with hand hygiene recommendations in hospital is typically less than 50%. Such low compliance inevitably contributes to hospital-acquired infections that negatively affect patients' well-being and hospitals' finances. The design of the present study is predicated on the assumption that most people who fail to clean their hands are not doing so intentionally, they just forget. The present study will test whether psychological priming can be used to increase the number of people who clean their hands on entering a ward. Here, we present the protocol for this study. The study will use a randomised cross-over design. During the study, each of four wards will be observed during four conditions: olfactory prime, visual prime, both primes and neither prime. Each condition will be experienced for 42 days followed by a 7-day washout period (total duration of trial=189 days). We will record the number of people who enter each ward and whether they clean their hands during observation sessions, the amount of cleaning material used from the dispensers each week and the number of hospital-acquired infections that occur in each period. The outcomes will be compared using a regression analysis. Following the initial trail, the most effective priming condition will be rolled out for 3 months in all the wards. Research ethics approval was obtained from the South Central-Oxford C Research Ethics Committee (16/SC/0554), the Health Regulatory Authority and the sponsor. ISRCTN (15397624); Edge ID 86357. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  7. Gene probes : principles and protocols [Methods in molecular biology, v. 179

    National Research Council Canada - National Science Library

    Rapley, Ralph; Aquino de Muro, Marilena

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  8. 557 Test and Manage Protocol for 841 Patients Requiring Iodinated Contrast Media (Icm) in Pediatrics

    Science.gov (United States)

    Diaz, Maria Cristina; Lavrut, Alberto Jorge; Spinelli, Silvia Susana

    2012-01-01

    Background ICM's adverse effects are quite frequent and potentially serious. The use of protocols to test and manage patients receiving ICM could help to decrease the adverse effects because they advise against the studies or prescribe the administration of premedication; however, its use in pediatrics is still limited. We describe the results of the use of a test and management protocol for pediatric patients requiring ICM. Methods All the patients of a pediatric hospital prescribed with ICM between 31st January 2008 and 5th March 2011 were included. The following variables have been analyzed: age, sex, type of study to be performed, diagnoses and hospitalized or outpatient, risk (regular, increased or non-advised) and the presence of adverse reactions. We also analyzed the relation between risk and age, sex and condition (chi cuadrado o t test). Significance level P < 0.05. Results We included 841 patients (56.9% male, age = 92.7 ± 24.5 months, 60% hospitalized). The most frequent test was chest Tc (36%) and the most frequent diagnosis was solid tumors (25%). Patients with increased risk were significantly lower than those with regular risk (75.7 ± 69.7 months vs 109.7 ± 61.6, P < 0.001). During the research period there were no adverse effects. Conclusions The classification of risk groups by this Goverment Buenos Aires City protocols allows a rational management of the patients requiring ICM and minimize the adverse effects.

  9. Comparison of mild and microdose GnRH agonist flare protocols on IVF outcome in poor responders.

    Science.gov (United States)

    Karimzadeh, Mohammad Ali; Mashayekhy, Mehri; Mohammadian, Farnaz; Moghaddam, Fatemeh Mansoori

    2011-05-01

    To compare the IVF outcome of clomiphene citrate/gonadotropin/antagonist (mild protocol) and microdose GnRH agonist flare protocols for poor responders undergoing in vitro fertilization. 159 poor responder patients were randomized and ovarian stimulation was performed with clomiphene citrate, gonadotropin and antagonist (group I) or microdose GnRH agonist flare (group II) protocols. Main outcome was clinical pregnancy rate and secondary outcomes were doses of gonadotropin administration and duration of stimulation. There were no significant differences in age, causes of infertility, basal FSH, BMI, duration of infertility, E(2) level on the day of hCG injection in both groups. Although the cancellation, fertilization, and clinical pregnancy rates were similar in both groups, the endometrial thickness, number of retrieved oocytes, mature oocytes and implantation rate were significantly higher in mild protocol. The doses of gonadotropin administration and duration of stimulation were significantly lower in mild protocol. We recommend mild protocol in assisted reproductive technology cycles for poor responders based on our results regarding less doses of used gonadotropin and a shorter duration of stimulation.

  10. Quantification of circulating endothelial progenitor cells using the modified ISHAGE protocol.

    Directory of Open Access Journals (Sweden)

    Caroline Schmidt-Lucke

    2010-11-01

    Full Text Available Circulating endothelial progenitor cells (EPC, involved in endothelial regeneration, neovascularisation, and determination of prognosis in cardiovascular disease can be characterised with functional assays or using immunofluorescence and flow cytometry. Combinations of markers, including CD34+KDR+ or CD133+KDR+, are used. This approach, however may not consider all characteristics of EPC. The lack of a standardised protocol with regards to reagents and gating strategies may account for the widespread inter-laboratory variations in quantification of EPC. We, therefore developed a novel protocol adapted from the standardised so-called ISHAGE protocol for enumeration of haematopoietic stem cells to enable comparison of clinical and laboratory data.In 25 control subjects, 65 patients with coronary artery disease (CAD; 40 stable CAD, 25 acute coronary syndrome/acute myocardial infarction (ACS, EPC were quantified using the following approach: Whole blood was incubated with CD45, KDR, and CD34. The ISHAGE sequential strategy was used, and finally, CD45(dimCD34(+ cells were quantified for KDR. A minimum of 100 CD34(+ events were collected. For comparison, CD45(+CD34(+ and CD45(-CD34(+ were analysed simultaneously. The number of CD45(dimCD34(+KDR(+ cells only were significantly higher in healthy controls compared to patients with CAD or ACS (p = 0.005 each, p<0.001 for trend. An inverse correlation of CD45(dimCD34(+KDR(+ with disease activity (r = -0.475, p<0.001 was confirmed. Only CD45(dimCD34(+KDR(+ correlated inversely with the number of diseased coronaries (r = -0.344; p<0.005. In a second study, a 4-week de-novo treatment of atorvastatin in stable CAD evoked an increase only of CD45(dimCD34(+KDR(+ EPC (p<0.05. CD45(+CD34(+KDR(+ and CD45(-CD34(+KDR(+ were indifferent between the three groups.Our newly established protocol adopted from the standardised ISHAGE protocol achieved higher accuracy in EPC enumeration confirming previous

  11. Effects of triploidy incidence on clinical outcomes for IVF-ET cycles in different ovarian stimulation protocols.

    Science.gov (United States)

    Li, Mingzhao; Xue, Xia; Zhang, Silin; Li, Wei; Zhao, Xiaoli; Ren, Wenjuan; Shi, Juanzi

    2015-10-01

    To discuss the relationship between triploidy incidence and clinical outcomes of embryos derived from normally fertilized oocytes from the same cohort for in vitro fertilization-embryo transfer (IVF-ET) cycles in different ovarian stimulation protocol. This study included 2070 in vitro fertilization (IVF) cycles with long-term protocol, 802 IVF cycles with ultra short-term protocol and 508 IVF-D (in vitro fertilization by donor semen) cycles with long-term protocol from January 2013 to September 2014. According to the different 3PN rate, patients were divided into three groups as follows: Group 1 included patients with 0% 3PN zygotes, Group 2 included patients with 1-25% 3PN zygotes and Group 3 included patients with >25% 3PN zygotes. female age, no. of retrieved oocytes, normal fertilization rate, day-3 grade I + II embryos rate, day-3 grade I + II + III embryos rate, implantation rate, pregnancy rate and early abortion rate. Triploidy cycle incidence rate in IVF and IVF-D cycles with long-term protocol were significantly higher than in IVF cycles with ultra short-term protocol (p  0.05). In three protocols, normal fertilization rate in 3PN = 0% and 3PN = 1-25% groups were significantly higher compared to 3PN > 25% group (p cycles with long-term protocol, the day-3 grade I + II embryos, implantation and pregnancy rate in 3PN > 25% group were significantly lower than other two groups (p  0.05). In IVF cycles with ultra short-term protocol, there were no significant differences found in day-3 grade I + II embryos, day-3 grade I + II + III embryos, implantation, pregnancy and early abortion rate (p > 0.05). In IVF-D cycles with long-term protocol, the day-3 grade I + II embryos, day-3 grade I + II + III embryos and implantation rate in 3PN > 25% group were significantly lower than other two groups (p  0.05). We observed that high proportion of triploid zygotes made a negative effect on

  12. A new quantum sealed-bid auction protocol with secret order in post-confirmation

    Science.gov (United States)

    Wang, Jing-Tao; Chen, Xiu-Bo; Xu, Gang; Meng, Xiang-Hua; Yang, Yi-Xian

    2015-10-01

    A new security protocol for quantum sealed-bid auction is proposed to resist the collusion attack from some malicious bidders. The most significant feature of this protocol is that bidders prepare their particles with secret order in post-confirmation for encoding bids. In addition, a new theorem and its proof are given based on the theory of combinatorial mathematics, which can be used as evaluation criteria for the collusion attack. It is shown that the new protocol is immune to the collusion attack and meets the demand for a secure auction. Compared with those previous protocols, the security, efficiency and availability of the proposed protocol are largely improved.

  13. Thoraco-abdominal high-pitch dual-source CT angiography: Experimental evaluation of injection protocols with an anatomical human vascular phantom

    Energy Technology Data Exchange (ETDEWEB)

    Puippe, Gilbert D., E-mail: gilbert.puippe@usz.ch [Institute for Diagnostic and Interventional Radiology, University Hospital Zurich, Switzerland Raemistrasse 100, CH-8091 Zurich (Switzerland); Winklehner, Anna [Institute for Diagnostic and Interventional Radiology, University Hospital Zurich, Switzerland Raemistrasse 100, CH-8091 Zurich (Switzerland); Hasenclever, Peter; Plass, André [Division of Cardiac and Vascular Surgery, University Hospital Zurich, Switzerland Raemistrasse 100, CH-8091 Zurich (Switzerland); Frauenfelder, Thomas; Baumueller, Stephan [Institute for Diagnostic and Interventional Radiology, University Hospital Zurich, Switzerland Raemistrasse 100, CH-8091 Zurich (Switzerland)

    2012-10-15

    Objective: To experimentally evaluate three different contrast injection protocols at thoraco-abdominal high-pitch dual-source computed tomography angiography (CTA), with regard to level and homogeneity of vascular enhancement at different cardiac outputs. Materials and methods: A uniphasic, a biphasic as well as an individually tailored contrast protocol were tested using a human vascular phantom. Each protocol was scanned at 5 different cardiac outputs (3–5 L/min, steps of 0.5 L/min) using an extracorporeal cardiac pump. Vascular enhancement of the thoraco-abdominal aorta was measured every 5 cm. Overall mean enhancement of each protocol and mean enhancement for each cardiac output within each protocol were calculated. Enhancement homogeneity along the z-axis was evaluated for each cardiac output and protocol. Results: Overall mean enhancement was significantly higher in the uniphasic than in the other two protocols (all p < .05), whereas the difference between the biphasic and tailored protocol was not significant (p = .76). Mean enhancement among each of the 5 cardiac outputs within each protocol was significantly different (all p < .05). Only within the tailored protocol mean enhancement differed not significantly at cardiac outputs of 3.5 L/min vs. 5 L/min (484 ± 25 HU vs. 476 ± 19 HU, p = .14) and 4 vs. 5 L/min (443 ± 49 HU vs. 476 ± 19 HU, p = .05). Both, uniphasic and tailored protocol yielded homogenous enhancement at all cardiac outputs, whereas the biphasic protocol failed to achieve homogenous enhancement. Conclusion: This phantom study suggests that diagnostic and homogenous enhancement at thoraco-abdominal high-pitch dual-source CTA is feasible with either a uniphasic or an individually tailored contrast protocol.

  14. Intelligent routing protocol for ad hoc wireless network

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2006-05-01

    A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage

  15. A secure distributed logistic regression protocol for the detection of rare adverse drug events.

    Science.gov (United States)

    El Emam, Khaled; Samet, Saeed; Arbuckle, Luk; Tamblyn, Robyn; Earle, Craig; Kantarcioglu, Murat

    2013-05-01

    There is limited capacity to assess the comparative risks of medications after they enter the market. For rare adverse events, the pooling of data from multiple sources is necessary to have the power and sufficient population heterogeneity to detect differences in safety and effectiveness in genetic, ethnic and clinically defined subpopulations. However, combining datasets from different data custodians or jurisdictions to perform an analysis on the pooled data creates significant privacy concerns that would need to be addressed. Existing protocols for addressing these concerns can result in reduced analysis accuracy and can allow sensitive information to leak. To develop a secure distributed multi-party computation protocol for logistic regression that provides strong privacy guarantees. We developed a secure distributed logistic regression protocol using a single analysis center with multiple sites providing data. A theoretical security analysis demonstrates that the protocol is robust to plausible collusion attacks and does not allow the parties to gain new information from the data that are exchanged among them. The computational performance and accuracy of the protocol were evaluated on simulated datasets. The computational performance scales linearly as the dataset sizes increase. The addition of sites results in an exponential growth in computation time. However, for up to five sites, the time is still short and would not affect practical applications. The model parameters are the same as the results on pooled raw data analyzed in SAS, demonstrating high model accuracy. The proposed protocol and prototype system would allow the development of logistic regression models in a secure manner without requiring the sharing of personal health information. This can alleviate one of the key barriers to the establishment of large-scale post-marketing surveillance programs. We extended the secure protocol to account for correlations among patients within sites through

  16. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  17. Abbreviated Combined MR Protocol: A New Faster Strategy for Characterizing Breast Lesions.

    Science.gov (United States)

    Moschetta, Marco; Telegrafo, Michele; Rella, Leonarda; Stabile Ianora, Amato Antonio; Angelelli, Giuseppe

    2016-06-01

    The use of an abbreviated magnetic resonance (MR) protocol has been recently proposed for cancer screening. The aim of our study is to evaluate the diagnostic accuracy of an abbreviated MR protocol combining short TI inversion recovery (STIR), turbo-spin-echo (TSE)-T2 sequences, a pre-contrast T1, and a single intermediate (3 minutes after contrast injection) post-contrast T1 sequence for characterizing breast lesions. A total of 470 patients underwent breast MR examination for screening, problem solving, or preoperative staging. Two experienced radiologists evaluated both standard and abbreviated protocols in consensus. Sensitivity, specificity, positive predictive value (PPV), negative predictive value (NPV), and diagnostic accuracy for both protocols were calculated (with the histological findings and 6-month ultrasound follow-up as the reference standard) and compared with the McNemar test. The post-processing and interpretation times for the MR images were compared with the paired t test. In 177 of 470 (38%) patients, the MR sequences detected 185 breast lesions. Standard and abbreviated protocols obtained sensitivity, specificity, diagnostic accuracy, PPV, and NPV values respectively of 92%, 92%, 92%, 68%, and 98% and of 89%, 91%, 91%, 64%, and 98% with no statistically significant difference (P < .0001). The mean post-processing and interpretation time were, respectively, 7 ± 1 minutes and 6 ± 3.2 minutes for the standard protocol and 1 ± 1.2 minutes and 2 ± 1.2 minutes for the abbreviated protocol, with a statistically significant difference (P < .01). An abbreviated combined MR protocol represents a time-saving tool for radiologists and patients with the same diagnostic potential as the standard protocol in patients undergoing breast MRI for screening, problem solving, or preoperative staging. Copyright © 2016 Elsevier Inc. All rights reserved.

  18. Minimal stimulation protocol using letrozole versus microdose flare up GnRH agonist protocol in women with poor ovarian response undergoing ICSI.

    Science.gov (United States)

    Mohsen, Iman Abdel; El Din, Rasha Ezz

    2013-02-01

    To compare the IVF outcomes of letrozole/antagonist and microdose GnRH agonist flare up protocols in poor ovarian responders undergoing intracytoplasmic sperm injection. A randomized controlled trial was performed in patients with one or more previous failed IVF cycles in which four or less oocytes were retrieved when the gonadotrophin starting dose was at least 300 IU/day. Sixty patients were randomized by computer-generated list to receive either letrozole/antagonist (mild stimulation) n = 30 or GnRH-a protocol (microdose flare) n = 30. Both groups were similar with respect to background and hormonal characteristics (age, duration of infertility, BMI, FSH, LH and E2). The clinical pregnancy rate per cycle was similar in both groups (13.3 vs. 16.6%; OR = 0.769; 95% CI = 0.185, 3.198). The doses of used gonadotropins and the number of stimulation days were significantly lower in the letrozole/antagonist protocol. The peak E2 level on the day of hCG, the endometrial thickness, the retrieved oocytes, the number of fertilized oocytes, the number of transferred embryos and the cancellation rate were statistically similar in both groups. The letrozole/antagonist protocol is a cost-effective and patient-friendly protocol that may be used in poor ovarian responders for IVF/ICSI.

  19. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  20. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  1. A Hierarchical Energy Efficient Reliable Transport Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Prabhudutta Mohanty

    2014-12-01

    Full Text Available The two important requirements for many Wireless Senor Networks (WSNs are prolonged network lifetime and end-to-end reliability. The sensor nodes consume more energy during data transmission than the data sensing. In WSN, the redundant data increase the energy consumption, latency and reduce reliability during data transmission. Therefore, it is important to support energy efficient reliable data transport in WSNs. In this paper, we present a Hierarchical Energy Efficient Reliable Transport Protocol (HEERTP for the data transmission within the WSN. This protocol maximises the network lifetime by controlling the redundant data transmission with the co-ordination of Base Station (BS. The proposed protocol also achieves end-to-end reliability using a hop-by-hop acknowledgement scheme. We evaluate the performance of the proposed protocol through simulation. The simulation results reveal that our proposed protocol achieves better performance in terms of energy efficiency, latency and reliability than the existing protocols.

  2. ACUTE EFFECTS OF A RESISTED DYNAMIC WARM-UP PROTOCOL ON JUMPING PERFORMANCE

    Science.gov (United States)

    Cilli, M; Yildiz, S; Saglam, T; Camur, MH

    2014-01-01

    This study aimed to investigate the kinematic and kinetic changes when resistance is applied in horizontal and vertical directions, produced by using different percentages of body weight, caused by jumping movements during a dynamic warm-up. The group of subjects consisted of 35 voluntary male athletes (19 basketball and 16 volleyball players; age: 23.4 ± 1.4 years, training experience: 9.6 ± 2.7 years; height: 177.2 ± 5.7 cm, body weight: 69.9 ± 6.9 kg) studying Physical Education, who had a jump training background and who were training for 2 hours, on 4 days in a week. A dynamic warm-up protocol containing seven specific resistance movements with specific resistance corresponding to different percentages of body weight (2%, 4%, 6%, 8%, 10%) was applied randomly on non consecutive days. Effects of different warm-up protocols were assessed by pre-/post- exercise changes in jump height in the countermovement jump (CMJ) and the squat jump (SJ) measured using a force platform and changes in hip and knee joint angles at the end of the eccentric phase measured using a video camera. A significant increase in jump height was observed in the dynamic resistance warm-up conducted with different percentages of body weight (p 0.05). In jump movements before and after the warm-up, while no significant difference between the vertical ground reaction forces applied by athletes was observed (p > 0.05), in some cases of resistance, a significant reduction was observed in hip and knee joint angles (p jumping movements, as well as an increase in jump height values. As a result, dynamic warm-up exercises could be applicable in cases of resistance corresponding to 6-10% of body weight applied in horizontal and vertical directions in order to increase the jump performance acutely. PMID:25435670

  3. The Nagoya Protocol: Fragmentation or Consolidation?

    Directory of Open Access Journals (Sweden)

    Carmen Richerzhagen

    2014-02-01

    Full Text Available In October, 2010, a protocol on access and benefit-sharing (ABS of genetic resources was adopted, the so-called Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity. Before the adoption of the Nagoya Protocol, the governance architecture of ABS was already characterized by a multifaceted institutional environment. The use of genetic resources is confronted with many issues (conservation, research and development, intellectual property rights, food security, health issues, climate change that are governed by different institutions and agreements. The Nagoya Protocol contributes to increased fragmentation. However, the question arises whether this new regulatory framework can help to advance the implementation of the ABS provisions of the Convention on Biological Diversity (CBD. This paper attempts to find an answer to that question by following three analytical steps. First, it analyzes the causes of change against the background of theories of institutional change. Second, it aims to assess the typology of the architecture in order to find out if this new set of rules will contribute to a more synergistic, cooperative or conflictive architecture of ABS governance. Third, the paper looks at the problem of “fit” and identifies criteria that can be used to assess the new ABS governance architecture with regard to its effectiveness.

  4. International protocol on volatile organic compounds

    International Nuclear Information System (INIS)

    Gauthier, J.-P.

    1992-01-01

    In August 1991, negotiations between Canada, the USA, and 33 European countries led to an international protocol on reducing the emissions of volatile organic compounds (VOC), which are responsible for serious ozone pollution problems. This was the third transborder pollution agreement developed under the auspices of the United Nations Economic Commission for Europe. Certain aspects of negotiations related to an earlier protocol developed for SO 2 and nitrogen oxide emissions had reappeared during the VOC negotiations, and these aspects are discussed. The VOC protocol proposes three approaches to satisfy basic obligations: reducing VOC emissions of a country by 30%, reducing VOC emissions by 30% in certain regions, and ensuring a freeze in VOC emissions in a country starting on a specified date. The protocol also introduces a new concept, that of zones of tropospheric ozone management. In Canada, plans for management of nitrogen oxides and VOC have been adapted to the ozone problem, and the management plan has been developed by a consultation process involving all sectors of society including industry, environmental groups, and governments. In Canada, it will be sufficient to reduce total VOC emissions by 16% during a first phase and to increase these reductions slightly in the second phase. Special ozone management zones in the Quebec City/Windsor corridor and the Fraser River valley have been established

  5. Energy efficient routing protocols for wireless sensor networks: comparison and future directions

    Directory of Open Access Journals (Sweden)

    Loganathan Murukesan

    2017-01-01

    Full Text Available Wireless sensor network consists of nodes with limited resources. Hence, it is important to design protocols or algorithms which increases energy efficiency in order to improve the network lifetime. In this paper, techniques used in the network layer (routing of the internet protocol stack to achieve energy efficiency are reviewed. Usually, the routing protocols are classified into four main schemes: (1 Network Structure, (2 Communication Model, (3 Topology Based, and (4 Reliable Routing. In this work, only network structure based routing protocols are reviewed due to the page constraint. Besides, this type of protocols are much popular among the researchers since they are fairly simple to implement and produce good results as presented in this paper. Also, the pros and cons of each protocols are presented. Finally, the paper concludes with possible further research directions.

  6. May the Kyoto protocol produce results?

    International Nuclear Information System (INIS)

    Jaureguy-Naudin, M.

    2009-01-01

    A not well managed drastic reduction of greenhouse emissions might result in significant decrease of living standards, but without such reduction efforts, climate change might have five to twenty times higher costs. Thus, while indicating estimated consequences or evolutions of greenhouse emissions and temperature, the author stresses the need of emission reduction. She discusses the role of economic instruments which can be used in policies aimed at the struggle against climate change. She recalls the emission reduction commitments specified in the Kyoto protocol, discusses the present status, operation and results of the international emission trading scheme, the lessons learned after the first years of operation, comments the involvement of emerging countries in relationship with another mechanism defined in the protocol: the Clean Development Mechanism

  7. Intelligent QoS routing algorithm based on improved AODV protocol for Ad Hoc networks

    Science.gov (United States)

    Huibin, Liu; Jun, Zhang

    2016-04-01

    Mobile Ad Hoc Networks were playing an increasingly important part in disaster reliefs, military battlefields and scientific explorations. However, networks routing difficulties are more and more outstanding due to inherent structures. This paper proposed an improved cuckoo searching-based Ad hoc On-Demand Distance Vector Routing protocol (CSAODV). It elaborately designs the calculation methods of optimal routing algorithm used by protocol and transmission mechanism of communication-package. In calculation of optimal routing algorithm by CS Algorithm, by increasing QoS constraint, the found optimal routing algorithm can conform to the requirements of specified bandwidth and time delay, and a certain balance can be obtained among computation spending, bandwidth and time delay. Take advantage of NS2 simulation software to take performance test on protocol in three circumstances and validate the feasibility and validity of CSAODV protocol. In results, CSAODV routing protocol is more adapt to the change of network topological structure than AODV protocol, which improves package delivery fraction of protocol effectively, reduce the transmission time delay of network, reduce the extra burden to network brought by controlling information, and improve the routing efficiency of network.

  8. Use of a patient hand hygiene protocol to reduce hospital-acquired infections and improve nurses' hand washing.

    Science.gov (United States)

    Fox, Cherie; Wavra, Teresa; Drake, Diane Ash; Mulligan, Debbie; Bennett, Yvonne Pacheco; Nelson, Carla; Kirkwood, Peggy; Jones, Louise; Bader, Mary Kay

    2015-05-01

    Critically ill patients are at marked risk of hospital-acquired infections, which increase patients' morbidity and mortality. Registered nurses are the main health care providers of physical care, including hygiene to reduce and prevent hospital-acquired infections, for hospitalized critically ill patients. To investigate a new patient hand hygiene protocol designed to reduce hospital-acquired infection rates and improve nurses' hand-washing compliance in an intensive care unit. A preexperimental study design was used to compare 12-month rates of 2 common hospital-acquired infections, central catheter-associated bloodstream infection and catheter-associated urinary tract infection, and nurses' hand-washing compliance measured before and during use of the protocol. Reductions in 12-month infection rates were reported for both types of infections, but neither reduction was statistically significant. Mean 12-month nurse hand-washing compliance also improved, but not significantly. A hand hygiene protocol for patients in the intensive care unit was associated with reductions in hospital-acquired infections and improvements in nurses' hand-washing compliance. Prevention of such infections requires continuous quality improvement efforts to monitor lasting effectiveness as well as investigation of strategies to eliminate these infections. ©2015 American Association of Critical-Care Nurses.

  9. Behavioural intervention to increase physical activity among patients with coronary heart disease: protocol for a randomised controlled trial.

    Science.gov (United States)

    Alsaleh, Eman; Blake, Holly; Windle, Richard

    2012-12-01

    Although physical activity has significant health benefits in the treatment of patients with coronary heart disease, patients often do not follow prescribed physical activity recommendations. Behavioural strategies have been shown to be efficacious in increasing physical activity among those patients with coronary heart disease who are attending structured cardiac rehabilitation programmes. Research has also shown that tailoring consultation according to patients' needs and sending motivational reminders are successful ways of motivating patients to be physically active. However, there is a lack of evidence for the efficacy of behavioural interventions based on individualised consultation in promoting physical activity among those patients with coronary heart disease who are not attending structured physical activity programmes. This paper outlines the study protocol for a trial which is currently underway, to examine the effect of a behavioural change intervention delivered through individualised consultation calls and motivational reminder text messages on the level of physical activity among patients with coronary heart disease. Two large hospitals in Jordan. Eligible patients aged between 18 and 70 years, who are clinically stable, are able to perform physical activity and who have access to a mobile telephone have been randomly allocated to control or intervention group. Two-group randomised controlled trial. Behavioural intervention will be compared with usual care in increasing physical activity levels among patients with coronary heart disease. The control group (n=85) will receive advice from their doctors about physical activity as they would in usual practice. The intervention group (n=71) will receive the same advice, but will also receive behavioural change intervention (goal-setting, feed-back, self-monitoring) that will be delivered over a period of six months. Intervention will be delivered through individually tailored face-to-face and telephone

  10. Cross-Layer Protocol as a Better Option in Wireless Mesh Network with Respect to Layered-Protocol

    OpenAIRE

    Ahmed Abdulwahab Al-Ahdal; Dr. V. P. Pawar; G. N. Shinde

    2014-01-01

    The Optimal way to improve Wireless Mesh Networks (WMNs) performance is to use a better network protocol, but whether layered-protocol design or cross-layer design is a better option to optimize protocol performance in WMNs is still an on-going research topic. In this paper, we focus on cross-layer protocol as a better option with respect to layered-protocol. The layered protocol architecture (OSI) model divides networking tasks into layers and defines a pocket of services for each layer to b...

  11. Space Network Time Distribution and Synchronization Protocol Development for Mars Proximity Link

    Science.gov (United States)

    Woo, Simon S.; Gao, Jay L.; Mills, David

    2010-01-01

    Time distribution and synchronization in deep space network are challenging due to long propagation delays, spacecraft movements, and relativistic effects. Further, the Network Time Protocol (NTP) designed for terrestrial networks may not work properly in space. In this work, we consider the time distribution protocol based on time message exchanges similar to Network Time Protocol (NTP). We present the Proximity-1 Space Link Interleaved Time Synchronization (PITS) algorithm that can work with the CCSDS Proximity-1 Space Data Link Protocol. The PITS algorithm provides faster time synchronization via two-way time transfer over proximity links, improves scalability as the number of spacecraft increase, lowers storage space requirement for collecting time samples, and is robust against packet loss and duplication which underlying protocol mechanisms provide.

  12. Performance Improvement Based Authentication Protocol for Intervessel Traffic Service Data Exchange Format Protocol Based on U-Navigation System in WoT Environment

    Directory of Open Access Journals (Sweden)

    Byunggil Lee

    2014-01-01

    Full Text Available International Association of Lighthouse Authorities (IALA is developing the standard intersystem VTS exchange format (IVEF protocol for exchange of navigation and vessel information between VTS systems and between VTS and vessels. VTS (vessel traffic system is an important marine traffic monitoring system which is designed to improve the safety and efficiency of navigation and the protection of the marine environment. And the demand of Inter-VTS networking has been increased for realization of e-Navigation as shore side collaboration for maritime safety. And IVEF (inter-VTS data exchange format for inter-VTS network has become a hot research topic of VTS system. Currently, the IVEF developed by the International Association of Lighthouse Authorities (IALA does not include any highly trusted certification technology for the connectors. The output of standardization is distributed as the IALA recommendation V-145, and the protocol is implemented with an open source. The IVEF open source, however, is the code used to check the functions of standard protocols. It is too slow to be used in the field and requires a large memory. And the vessel traffic information requires high security since it is highly protected by the countries. Therefore, this paper suggests the authentication protocol to increase the security of the VTS systems using the main certification server and IVEF.

  13. Radiotherapy QA of the DAHANCA 19 protocol

    DEFF Research Database (Denmark)

    Samsøe, E.; Andersen, E.; Hansen, C. R.

    2015-01-01

    Purpose/Objective: It has been demonstrated that nonadherence to protocol-specified radiotherapy (RT) requirements is associated with reduced survival, local control and potentially increased toxicity [1]. Thus, quality assurance (QA) of RT is important when evaluating the results of clinical...

  14. Enhancing the Detection of Dysmorphic Red Blood Cells and Renal Tubular Epithelial Cells with a Modified Urinalysis Protocol.

    Science.gov (United States)

    Chu-Su, Yu; Shukuya, Kenichi; Yokoyama, Takashi; Lin, Wei-Chou; Chiang, Chih-Kang; Lin, Chii-Wann

    2017-01-11

    Urinary sediment is used to evaluate patients with possible urinary tract diseases. Currently, numerous protocols are applied to detect dysmorphic red blood cells (RBCs) and renal tubular epithelial cells (RTECs) in urinary sediment. However, distinct protocols are used by nephrologists and medical technologists for specimen concentration and observation, which leads to major discrepancies in the differential counts of formed elements such as dysmorphic RBCs and RTECs and might interfere with an accurate clinical diagnosis. To resolve these problems, we first tested a modified urinalysis protocol with an increased relative centrifuge force and concentration factor in 20 biopsy-confirmed glomerulonephritis patients with haematuria. We successfully improved the recovery ratio of dysmorphic RBCs in clinical specimens from 34.7% to 42.0% (P dysmorphic RBCs were detected using a bright field microscope, with results comparable to those using a standard phase contrast microscope. Finally, we applied Sternheimer stain to enhance the contrast of RTECs in the urinary sediments. We concluded that this modified urinalysis protocol significantly enhanced the quality of urinalysis.

  15. Effects of a peracetic acid disinfection protocol on the biocompatibility and biomechanical properties of human patellar tendon allografts.

    Science.gov (United States)

    Lomas, R J; Jennings, L M; Fisher, J; Kearney, J N

    2004-01-01

    Patellar tendon allografts, retrieved from cadaveric human donors, are widely used for replacement of damaged cruciate ligaments. In common with other tissue allografts originating from cadaveric donors, there are concerns regarding the potential for disease transmission from the donor to the recipient. Additionally, retrieval and subsequent processing protocols expose the graft to the risk of environmental contamination. For these reasons, disinfection or sterilisation protocols are necessary for these grafts before they are used clinically. A high-level disinfection protocol, utilising peracetic acid (PAA), has been developed and investigated for its effects on the biocompatibility and biomechanics of the patellar tendon allografts. PAA disinfection did not render the grafts either cytotoxic or liable to provoke an inflammatory response as assessed in vitro . However, the protocol was shown to increase the size of gaps between the tendon fibres in the matrix and render the grafts more susceptible to digestion with collagenase. Biomechanical studies of the tendons showed that PAA treatment had no effect on the ultimate tensile stress or Young's modulus of the tendons, and that ultimate strain was significantly higher in PAA treated tendons.

  16. Management of Energy Consumption on Cluster Based Routing Protocol for MANET

    Science.gov (United States)

    Hosseini-Seno, Seyed-Amin; Wan, Tat-Chee; Budiarto, Rahmat; Yamada, Masashi

    The usage of light-weight mobile devices is increasing rapidly, leading to demand for more telecommunication services. Consequently, mobile ad hoc networks and their applications have become feasible with the proliferation of light-weight mobile devices. Many protocols have been developed to handle service discovery and routing in ad hoc networks. However, the majority of them did not consider one critical aspect of this type of network, which is the limited of available energy in each node. Cluster Based Routing Protocol (CBRP) is a robust/scalable routing protocol for Mobile Ad hoc Networks (MANETs) and superior to existing protocols such as Ad hoc On-demand Distance Vector (AODV) in terms of throughput and overhead. Therefore, based on this strength, methods to increase the efficiency of energy usage are incorporated into CBRP in this work. In order to increase the stability (in term of life-time) of the network and to decrease the energy consumption of inter-cluster gateway nodes, an Enhanced Gateway Cluster Based Routing Protocol (EGCBRP) is proposed. Three methods have been introduced by EGCBRP as enhancements to the CBRP: improving the election of cluster Heads (CHs) in CBRP which is based on the maximum available energy level, implementing load balancing for inter-cluster traffic using multiple gateways, and implementing sleep state for gateway nodes to further save the energy. Furthermore, we propose an Energy Efficient Cluster Based Routing Protocol (EECBRP) which extends the EGCBRP sleep state concept into all idle member nodes, excluding the active nodes in all clusters. The experiment results show that the EGCBRP decreases the overall energy consumption of the gateway nodes up to 10% and the EECBRP reduces the energy consumption of the member nodes up to 60%, both of which in turn contribute to stabilizing the network.

  17. A False-name-Proof Double Auction Protocol for Arbitrary Evaluation Values

    Science.gov (United States)

    Sakurai, Yuko; Yokoo, Makoto

    We develop a new false-name-proof double auction protocol called the Generalized Threshold Price Double auction (GTPD) protocol. False-name-proofness generalizes strategy-proofness by incorporating the possibility of false-name bids, e.g., bids submitted using multiple e-mail addresses. An existing protocol called TPD protocol is false-name-proof but can handle only the cases where marginal utilities of each agent always decrease, while our new GTPD protocol can handle arbitrary evaluation values. When marginal utilities can increase, some bids cannot be divided into a single unit (e.g., an all-or-nothing bid). Due to the existence of such indivisible bids, meeting supply/demand becomes difficult. Furthermore, a seller/buyer can submit a false-name-bid by pretending to be a potential buyer/seller to manipulate allocations and payments. In the GTPD protocol, the auctioneer is required to absorb the supply-demand imbalance up to a given upper-bound. Also, the GTPD incorporate a new false-name-proof one-sided auction protocol that is guaranteed to sell/buy a certain number of units. Simulation results show that when the threshold price is set appropriately, this protocol can obtain a good social surplus, and the number of absorbed units is much smaller than the given upper-bound.

  18. Combination Protocol of Low-Frequency rTMS and Intensive Occupational Therapy for Post-stroke Upper Limb Hemiparesis: a 6-year Experience of More Than 1700 Japanese Patients.

    Science.gov (United States)

    Kakuda, Wataru; Abo, Masahiro; Sasanuma, Jinichi; Shimizu, Masato; Okamoto, Takatsugu; Kimura, Chikou; Kakita, Kiyohito; Hara, Hiroyoshi

    2016-06-01

    Several years ago, we proposed a combination protocol of repetitive transcranial magnetic stimulation (rTMS) and intensive occupational therapy (OT) for upper limb hemiparesis after stroke. Subsequently, the number of patients treated with the protocol has increased in Japan. We aimed to present the latest data on our proposed combination protocol for post-stroke upper limb hemiparesis as a result of a multi-institutional study. After confirming that a patient met the inclusion criteria for the protocol, they were scheduled to receive the 15-day inpatient protocol. In the protocol, two sessions of 20-min rTMS and 120-min occupational therapy were provided daily, except for Sundays and the days of admission/discharge. Motor function of the affected upper limb was evaluated by the Fugl-Meyer assessment (FMA) and Wolf motor function test (WMFT) at admission/discharge and at 4 weeks after discharge if possible. A total of 1725 post-stroke patients were studied (mean age at admission 61.4 ± 13.0 years). The scheduled 15-day protocol was completed by all patients. At discharge, the increase in FMA score, shortening in performance time of WMFT, and increase in functional ability scale (FAS) score of WMFT were significant (FMA score 46.8 ± 12.2 to 50.9 ± 11.4 points, p hemiparesis after stroke, although its efficacy should be confirmed in a randomized controlled study.

  19. [Multidisciplinary protocol for computed tomography imaging and angiographic embolization of splenic injury due to trauma: assessment of pre-protocol and post-protocol outcomes].

    Science.gov (United States)

    Koo, M; Sabaté, A; Magalló, P; García, M A; Domínguez, J; de Lama, M E; López, S

    2011-11-01

    To assess conservative treatment of splenic injury due to trauma, following a protocol for computed tomography (CT) and angiographic embolization. To quantify the predictive value of CT for detecting bleeding and need for embolization. The care protocol developed by the multidisciplinary team consisted of angiography with embolization of lesions revealed by contrast extravasation under CT as well as embolization of grade III-V injuries observed, or grade I-II injuries causing hemodynamic instability and/or need for blood transfusion. We collected data on demographic variables, injury severity score (ISS), angiographic findings, and injuries revealed by CT. Pre-protocol and post-protocol outcomes were compared. The sensitivity and specificity of CT findings were calculated for all patients who required angiographic embolization. Forty-four and 30 angiographies were performed in the pre- and post-protocol periods, respectively. The mean (SD) ISSs in the two periods were 25 (11) and 26 (12), respectively. A total of 24 (54%) embolizations were performed in the pre-protocol period and 28 (98%) after implementation of the protocol. Two and 7 embolizations involved the spleen in the 2 periods, respectively; abdominal laparotomies numbered 32 and 25, respectively, and 10 (31%) vs 4 (16%) splenectomies were performed. The specificity and sensitivity values for contrast extravasation found on CT and followed by embolization were 77.7% and 79.5%. The implementation of this multidisciplinary protocol using CT imaging and angiographic embolization led to a decrease in the number of splenectomies. The protocol allows us to take a more conservative treatment approach.

  20. An improved primer set and amplification protocol with increased specificity and sensitivity targeting the Symbiodinium ITS2 region

    KAUST Repository

    Hume, Benjamin C.C.; Ziegler, Maren; Poulain, Julie; Pochon, Xavier; Romac, Sarah; Boissin, Emilie; de Vargas, Colomban; Planes, Serge; Wincker, Patrick; Voolstra, Christian R.

    2018-01-01

    The Internal Transcribed Spacer 2 (ITS2) rRNA gene is a commonly targeted genetic marker to assess diversity of Symbiodinium, a dinoflagellate genus of algal endosymbionts that is pervasively associated with marine invertebrates, and notably reef-building corals. Here we tested three commonly used ITS2 primer pairs (SYM_VAR_5.8S2/SYM_VAR_REV, ITSintfor2/ITSReverse, and ITS-DINO/ITS2Rev2) with regard to amplification specificity and sensitivity towards Symbiodinium, as well as sub-genera taxonomic bias. We tested these primers over a range of sample types including three coral species, coral surrounding water, reef surface water, and open ocean water to assess their suitability for use in large-scale next generation sequencing projects and to develop a standardised PCR protocol. We found the SYM_VAR_5.8S2/SYM_VAR_REV primers to perform superior to the other tested ITS2 primers. We therefore used this primer pair to develop a standardised PCR protocol. To do this, we tested the effect of PCR-to-PCR variation, annealing temperature, cycle number, and different polymerase systems on the PCR efficacy. The Symbiodinium ITS2 PCR protocol developed here delivers improved specificity and sensitivity towards Symbiodinium with apparent minimal sub-genera taxonomic bias across all sample types. In particular, the protocol’s ability to amplify Symbiodinium from a range of environmental sources will facilitate the study of Symbiodinium populations across biomes.

  1. An improved primer set and amplification protocol with increased specificity and sensitivity targeting the Symbiodinium ITS2 region

    KAUST Repository

    Hume, Benjamin C.C.

    2018-05-23

    The Internal Transcribed Spacer 2 (ITS2) rRNA gene is a commonly targeted genetic marker to assess diversity of Symbiodinium, a dinoflagellate genus of algal endosymbionts that is pervasively associated with marine invertebrates, and notably reef-building corals. Here we tested three commonly used ITS2 primer pairs (SYM_VAR_5.8S2/SYM_VAR_REV, ITSintfor2/ITSReverse, and ITS-DINO/ITS2Rev2) with regard to amplification specificity and sensitivity towards Symbiodinium, as well as sub-genera taxonomic bias. We tested these primers over a range of sample types including three coral species, coral surrounding water, reef surface water, and open ocean water to assess their suitability for use in large-scale next generation sequencing projects and to develop a standardised PCR protocol. We found the SYM_VAR_5.8S2/SYM_VAR_REV primers to perform superior to the other tested ITS2 primers. We therefore used this primer pair to develop a standardised PCR protocol. To do this, we tested the effect of PCR-to-PCR variation, annealing temperature, cycle number, and different polymerase systems on the PCR efficacy. The Symbiodinium ITS2 PCR protocol developed here delivers improved specificity and sensitivity towards Symbiodinium with apparent minimal sub-genera taxonomic bias across all sample types. In particular, the protocol’s ability to amplify Symbiodinium from a range of environmental sources will facilitate the study of Symbiodinium populations across biomes.

  2. About the Design of QUIC Firefox Transport Protocol

    Directory of Open Access Journals (Sweden)

    Vraj Pandya

    2017-07-01

    Full Text Available QUIC (Quick UDP Internet Connections Chrome is an experimental transport layer network protocol designed by Jim Roskind at Google, initially implemented in 2012 and announced publicly in 2013. One of the QUIC's goals is to improve performance of connection-oriented web applications that are currently using the Transmission Control Protocol (TCP. To do that, QUIC achieves a reduced latency and a better stream-multiplexing support to avoid network congestion. In 2015, Firefox Mozilla started to work on an equivalent QUIC transport protocol for their browser. This idea was motivated by the differences between Chrome and Firefox. Despite the fact that Mozilla Firefox and Google Chrome are both web browser engines, there are some significant differences between them, such as file hierarchy, open source policies (Firefox is completely, while Chrome is only partial, tabs design, continuous integration, and more. Likewise QUIC Chrome, QUIC Firefox is a new multiplexed and secure transport based on User Datagram Protocol (UDP, designed from the ground up and optimized for Hyper-Text Transfer Protocol 2 (HTTP/2 semantics. While built with HTTP/2 as the primary application protocol, QUIC builds on decades of transport and security experience, and implements mechanisms that make it attractive as a modern general-purpose transport. In addition to describing the main design of QUIC Firefox, this paper will compare Firefox with QUIC Firefox. Our preliminary experimental results support that QUIC Firefox has a faster execution time, less latency time, and a better throughput time than the traditional Firefox.  

  3. The cumulative effect of multiple critical care protocols on length of stay in a geriatric trauma population.

    Science.gov (United States)

    Frederickson, Tiffany A; Renner, Catherine Hackett; Swegle, James R; Sahr, Sheryl M

    2013-01-01

    The elderly individuals are the most rapidly growing cohort within the US population, and a corresponding increase is being seen in elderly trauma patients. Elderly patients are more likely to have a hospital length of stay (LOS) in excess of 10 days. They account for 60% of total ICU days. Length of stay is frequently used as a proxy measure for improvement in injury outcomes, changes in quality of care, and hospital outcomes. Patient care protocols are typically created from evidence-based guidelines that serve to reduce variation in care from patient to patient. Patient care protocols have been found to positively impact patient care with reduced duration of mechanical ventilation, shorter LOS in the ICU and shorter overall hospitalization time, reduced mortality, and reduced health care costs. The following study was designed to assess the impact of the implementation of 4 patient care protocols within an elderly trauma population. We hypothesized that the implementation of these protocols would have a beneficial impact on patient care that could be measured by a decrease in hospital LOS. An archival, retrospective pretest/posttest study was performed on elderly trauma patients. The new protocols helped guide practical changes in care that resulted in a 32% decrease in LOS for our elderly trauma patients which exceeds the 25% decrease found in other studies. Additionally, the "Other" category for each variable was less frequently used in the post-protocol phase than in the pre-protocol phase, suggesting a spillover effect on the level of detail recorded in the patient chart. With less variation in practices in the post-protocol phase, Injury Severity score, and admission systolic blood pressure emerged as significant predictors of LOS.

  4. Protocol-based care: the standardisation of decision-making?

    Science.gov (United States)

    Rycroft-Malone, Jo; Fontenla, Marina; Seers, Kate; Bick, Debra

    2009-05-01

    To explore how protocol-based care affects clinical decision-making. In the context of evidence-based practice, protocol-based care is a mechanism for facilitating the standardisation of care and streamlining decision-making through rationalising the information with which to make judgements and ultimately decisions. However, whether protocol-based care does, in the reality of practice, standardise decision-making is unknown. This paper reports on a study that explored the impact of protocol-based care on nurses' decision-making. Theoretically informed by realistic evaluation and the promoting action on research implementation in health services framework, a case study design using ethnographic methods was used. Two sites were purposively sampled; a diabetic and endocrine unit and a cardiac medical unit. Within each site, data collection included observation, postobservation semi-structured interviews with staff and patients, field notes, feedback sessions and document review. Data were inductively and thematically analysed. Decisions made by nurses in both sites were varied according to many different and interacting factors. While several standardised care approaches were available for use, in reality, a variety of information sources informed decision-making. The primary approach to knowledge exchange and acquisition was person-to-person; decision-making was a social activity. Rarely were standardised care approaches obviously referred to; nurses described following a mental flowchart, not necessarily linked to a particular guideline or protocol. When standardised care approaches were used, it was reported that they were used flexibly and particularised. While the logic of protocol-based care is algorithmic, in the reality of clinical practice, other sources of information supported nurses' decision-making process. This has significant implications for the political goal of standardisation. The successful implementation and judicious use of tools such as

  5. Response to a spill of national significance

    International Nuclear Information System (INIS)

    Jensen, D.S.; Pond, R.; Johnson, M.H.

    1993-01-01

    Responding to a spill of national significance (SONS), such as the 1989 Exxon Valdez spill, requires an augmenting organization to support the local response organization. The US Coast Guard has developed SONS protocol to be better prepared to respond to these infrequent catastrophic spills. A flag-level Coast Guard officer assumes the role of national incident commander (NIC) and federal on-scene coordinator (OSC), and is supported by a national incident task force (NITF). The major role of the NITF is to develop a national response strategy, acquire response resources and allocate them efficiently, and effectively deal with many peripheral national issues. Unified command concepts have been incorporated into the NITF and its primary organizational elements. In addition, frequent training and exercising is essential to keep the SONS protocol's preparedness at an acceptable level

  6. Penicillin allergy: optimizing diagnostic protocols, public health implications, and future research needs.

    Science.gov (United States)

    Macy, Eric

    2015-08-01

    Unverified penicillin allergy is being increasingly recognized as a public health concern. The ideal protocol for verifying true clinically significant IgE-mediated penicillin allergy needs to use only commercially available materials, be well tolerated and easy to perform in both the inpatient and outpatient settings, and minimize false-positive determinations. This review concentrates on articles published in 2013 and 2014 that present new data relating to the diagnosis and management of penicillin allergy. Penicillin allergy can be safely evaluated at this time, in patients with an appropriate clinical history of penicillin allergy, using only penicilloyl-poly-lysine and native penicillin G as skin test reagents, if an oral challenge with amoxicillin 250 mg, followed by 1 h of observation, is given to all skin test negative individuals. Millions of individuals falsely labeled with penicillin allergy need to be evaluated to safely allow them to use penicillin-class antibiotics and avoid morbidity associated with penicillin avoidance. Further research is needed to determine optimal protocol(s). There will still be a 1-2% rate of adverse reactions reported with all future therapeutic penicillin-class antibiotic use, even with optimal methods used to determine acute penicillin tolerance. Only a small minority of these new reactions will be IgE-mediated.

  7. An Enhanced Reservation-Based MAC Protocol for IEEE 802.15.4 Networks

    Science.gov (United States)

    Afonso, José A.; Silva, Helder D.; Macedo, Pedro; Rocha, Luis A.

    2011-01-01

    The IEEE 802.15.4 Medium Access Control (MAC) protocol is an enabling standard for wireless sensor networks. In order to support applications requiring dedicated bandwidth or bounded delay, it provides a reservation-based scheme named Guaranteed Time Slot (GTS). However, the GTS scheme presents some drawbacks, such as inefficient bandwidth utilization and support to a maximum of only seven devices. This paper presents eLPRT (enhanced Low Power Real Time), a new reservation-based MAC protocol that introduces several performance enhancing features in comparison to the GTS scheme. This MAC protocol builds on top of LPRT (Low Power Real Time) and includes various mechanisms designed to increase data transmission reliability against channel errors, improve bandwidth utilization and increase the number of supported devices. A motion capture system based on inertial and magnetic sensors has been used to validate the protocol. The effectiveness of the performance enhancements introduced by each of the new features is demonstrated through the provision of both simulation and experimental results. PMID:22163826

  8. Past and Future of the Kyoto Protocol. Final report

    International Nuclear Information System (INIS)

    Wijen, F.; Zoeteman, K.

    2004-01-01

    The present report reflects findings from a study on the realization of and prospects for the Kyoto Protocol. The purpose of the study was (1) to obtain insights into the factors that enabled the realization of the Kyoto Protocol, in particular the interactions among major parties involved; (2) to assess the future opportunities and threats of the Kyoto Protocol, in particular against the backdrop of an increasingly globalised world. The study was conducted from February up to December 2003 by (a) reviewing the literature, especially publications on the negotiation history of the Kyoto process, the social interactions enabling the realization of the Protocol, analyses of strengths and weaknesses, and future climate regimes; (b) conducting a series of interviews with representatives from government, academia, non-governmental organisations, and business, who have been - directly or indirectly - involved in the Kyoto process; (c) internal discussions,brainstorming and analysing the Protocol's strengths and weaknesses, possible future scenarios (including policy options), and the management of a possible failure of the Kyoto Protocol. The present report reflects and integrates the different sources. The first section deals with the past and the present. It discusses how the Kyoto Protocol could be realized despite the divergent interests, reflects on its architecture, and analyses major strengths and weaknesses. In the second section, we present possible future scenarios. We explore how different combinations of domestic and international commitment provide possible realities that national government may face when crafting climate policy. The third section provides an in-depth analysis of the possible event that the Kyoto Protocol fails. We discuss its definition and policy implications. The final section is reserved for overall conclusions and policy recommendations

  9. Sponge-Like: A New Protocol for Preparing Bacterial Ghosts

    Directory of Open Access Journals (Sweden)

    Amro A. Amara

    2013-01-01

    Full Text Available Bacterial Ghosts (BGs received an increasing interest in the recent years for their promising medicinal and pharmaceutical applications. In this study, for the first time we introduce a new protocol for BGs production. E. coli BL21 (DE3 pLysS (Promega was used as a model to establish a general protocol for BGs preparation. The protocol is based on using active chemical compounds in concentrations less than the Minimum Inhibition Concentration (MIC. Those chemical compounds are SDS, NaOH, and H2O2. Plackett-Burman experimental design was used to map the best conditions for BGs production. Normal and electronic microscopes were used to evaluate the BGs quality (BGQ. Spectrophotometer was used to evaluate the amount of the released protein and DNA. Agarose gel electrophoresis was used to determine the existence of any residue of DNA after each BGs preparation. Viable cells, which existed after running this protocol, were subjected to lysis by inducing the lysozyme gene carried on pLysS plasmid. This protocol is able to produce BGs that can be used in different biotechnological applications.

  10. Estimation of the radiation exposure of a chest pain protocol with ECG-gating in dual-source computed tomography

    International Nuclear Information System (INIS)

    Ketelsen, Dominik; Luetkhoff, Marie H.; Thomas, Christoph; Werner, Matthias; Tsiflikas, Ilias; Reimann, Anja; Kopp, Andreas F.; Claussen, Claus D.; Heuschmid, Martin; Buchgeister, Markus; Burgstahler, Christof

    2009-01-01

    The aim of the study was to evaluate radiation exposure of a chest pain protocol with ECG-gated dual-source computed tomography (DSCT). An Alderson Rando phantom equipped with thermoluminescent dosimeters was used for dose measurements. Exposure was performed on a dual-source computed tomography system with a standard protocol for chest pain evaluation (120 kV, 320 mAs/rot) with different simulated heart rates (HRs). The dose of a standard chest CT examination (120 kV, 160 mAs) was also measured. Effective dose of the chest pain protocol was 19.3/21.9 mSv (male/female, HR 60), 17.9/20.4 mSv (male/female, HR 80) and 14.7/16.7 mSv (male/female, HR 100). Effective dose of a standard chest examination was 6.3 mSv (males) and 7.2 mSv (females). Radiation dose of the chest pain protocol increases significantly with a lower heart rate for both males (p = 0.040) and females (p = 0.044). The average radiation dose of a standard chest CT examination is about 36.5% that of a CT examination performed for chest pain. Using DSCT, the evaluated chest pain protocol revealed a higher radiation exposure compared with standard chest CT. Furthermore, HRs markedly influenced the dose exposure when using the ECG-gated chest pain protocol. (orig.)

  11. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  12. [Analysis of palliative sedation in hospitalised elderly patients: Effectiveness of a protocol].

    Science.gov (United States)

    Mateos-Nozal, Jesús; García-Cabrera, Lorena; Montero Errasquín, Beatriz; Cruz-Jentoft, Alfonso José; Rexach Cano, Lourdes

    2016-01-01

    To measure changes in the practice of palliative sedation during agony in hospitalised elderly patients before and after the implementation of a palliative sedation protocol. A retrospective before-after study was performed in hospitalised patients over 65 years old who received midazolam during hospital admission and died in the hospital in two 3-month periods, before and after the implementation of the protocol. Non-sedative uses of midazolam and patients in intensive care were excluded. Patient and admission characteristics, the consent process, withdrawal of life-sustaining treatments, and the sedation process (refractory symptom treated, drug doses, assessment and use of other drugs) were recorded. Association was analysed using the Chi(2) and Student t tests. A total of 143 patients were included, with no significant differences between groups in demographic characteristics or symptoms. Do not resuscitate (DNR) orders were recorded in approximately 70% of the subjects of each group, and informed consent for sedation was recorded in 91% before vs. 84% after the protocol. Induction and maintenance doses of midazolam followed protocol recommendations in 1.3% before vs 10.4% after the protocol was implemented (P=.02) and adequate rescue doses were used in 1.3% vs 11.9% respectively (P=.01). Midazolam doses were significantly lower (9.86mg vs 18.67mg, Psedation score was used in 8% vs. 12% and the Palliative Care Team was involved in 35.5% and 16.4% of the cases (P=.008) before and after the protocol, respectively. Use of midazolam slightly improved after the implementation of a hospital protocol on palliative sedation. The percentage of adequate sedations and the general process of sedation were mostly unchanged by the protocol. More education and further assessment is needed to gauge the effect of these measures in the future. Copyright © 2015 SEGG. Published by Elsevier Espana. All rights reserved.

  13. Efficacy of 2 finishing protocols in the quality of orthodontic treatment outcome.

    Science.gov (United States)

    Stock, Gregory J; McNamara, James A; Baccetti, Tiziano

    2011-11-01

    The objectives of this prospective clinical study were to evaluate the quality of treatment outcomes achieved with a complex orthodontic finishing protocol involving serpentine wires and a tooth positioner, and to compare it with the outcomes of a standard finishing protocol involving archwire bends used to detail the occlusion near the end of active treatment. The complex finishing protocol sample consisted of 34 consecutively treated patients; 1 week before debonding, their molar bands were removed, and serpentine wires were placed; this was followed by active wear of a tooth positioner for up to 1 month after debonding. The standard finishing protocol group consisted of 34 patients; their dental arches were detailed with archwire bends and vertical elastics. The objective grading system of the American Board of Orthodontics was used to quantify the quality of the finish at each time point. The Wilcoxon signed rank test was used to compare changes in the complex finishing protocol; the Mann-Whitney U test was used to compare changes between groups. The complex finishing protocol group experienced a clinically significant improvement in objective grading system scores after treatment with the positioner. Mild improvement in posterior space closure was noted after molar band removal, but no improvement in the occlusion was observed after placement of the serpentine wires. Patients managed with the complex finishing protocol also had a lower objective grading system score (14.7) at the end of active treatment than did patients undergoing the standard finishing protocol (23.0). Tooth positioners caused a clinically significant improvement in interocclusal contacts, interproximal contacts, and net objective grading system score; mild improvement in posterior band space was noted after molar band removal 1 week before debond. Copyright © 2011 American Association of Orthodontists. Published by Mosby, Inc. All rights reserved.

  14. Energy Reduction Multipath Routing Protocol for MANET Using Recoil Technique

    Directory of Open Access Journals (Sweden)

    Rakesh Kumar Sahu

    2018-04-01

    Full Text Available In Mobile Ad-hoc networks (MANET, power conservation and utilization is an acute problem and has received significant attention from academics and industry in recent years. Nodes in MANET function on battery power, which is a rare and limited energy resource. Hence, its conservation and utilization should be done judiciously for the effective functioning of the network. In this paper, a novel protocol namely Energy Reduction Multipath Routing Protocol for MANET using Recoil Technique (AOMDV-ER is proposed, which conserves the energy along with optimal network lifetime, routing overhead, packet delivery ratio and throughput. It performs better than any other AODV based algorithms, as in AOMDV-ER the nodes transmit packets to their destination smartly by using a varying recoil off time technique based on their geographical location. This concept reduces the number of transmissions, which results in the improvement of network lifetime. In addition, the local level route maintenance reduces the additional routing overhead. Lastly, the prediction based link lifetime of each node is estimated which helps in reducing the packet loss in the network. This protocol has three subparts: an optimal route discovery algorithm amalgamation with the residual energy and distance mechanism; a coordinated recoiled nodes algorithm which eliminates the number of transmissions in order to reduces the data redundancy, traffic redundant, routing overhead, end to end delay and enhance the network lifetime; and a last link reckoning and route maintenance algorithm to improve the packet delivery ratio and link stability in the network. The experimental results show that the AOMDV-ER protocol save at least 16% energy consumption, 12% reduction in routing overhead, significant achievement in network lifetime and packet delivery ratio than Ad hoc on demand multipath distance vector routing protocol (AOMDV, Ad hoc on demand multipath distance vector routing protocol life

  15. Shoulder muscle endurance: the development of a standardized and reliable protocol

    Directory of Open Access Journals (Sweden)

    Roy Jean-Sébastien

    2011-01-01

    Full Text Available Abstract Background Shoulder muscle fatigue has been proposed as a possible link to explain the association between repetitive arm use and the development of rotator cuff disorders. To our knowledge, no standardized clinical endurance protocol has been developed to evaluate the effects of muscle fatigue on shoulder function. Such a test could improve clinical examination of individuals with shoulder disorders. Therefore, the purpose of this study was to establish a reliable protocol for objective assessment of shoulder muscle endurance. Methods An endurance protocol was developed on a stationary dynamometer (Biodex System 3. The endurance protocol was performed in isotonic mode with the resistance set at 50% of each subject's peak torque as measured for shoulder external (ER and internal rotation (IR. Each subject performed 60 continuous repetitions of IR/ER rotation. The endurance protocol was performed by 36 healthy individuals on two separate occasions at least two days apart. Maximal isometric shoulder strength tests were performed before and after the fatigue protocol to evaluate the effects of the endurance protocol and its reliability. Paired t-tests were used to evaluate the reduction in shoulder strength due to the protocol, while intraclass correlation coefficients (ICC and minimal detectable change (MDC were used to evaluate its reliability. Results Maximal isometric strength was significantly decreased after the endurance protocol (P 0.84. Conclusions Changes in muscular performance observed during and after the muscular endurance protocol suggests that the protocol did result in muscular fatigue. Furthermore, this study established that the resultant effects of fatigue of the proposed isotonic protocol were reproducible over time. The protocol was performed without difficulty by all volunteers and took less than 10 minutes to perform, suggesting that it might be feasible for clinical practice. This protocol could be used to induce

  16. The Groningen Protocol - the Jewish perspective.

    Science.gov (United States)

    Gesundheit, Benjamin; Steinberg, Avraham; Blazer, Shraga; Jotkowitz, Alan

    2009-01-01

    Despite significant advances in neonatology, there will always be newborns with serious life-threatening conditions creating most difficult bioethical dilemmas. Active euthanasia for adult patients is one of the most controversial bioethical questions; for severely ill neonates, the issue is even more complex, due to their inability to take part in any decision concerning their future. The Groningen Protocol introduced in 2005 by P.J. Sauer proposes criteria allowing active euthanasia for severely ill, not necessarily terminal, newborns with incurable conditions and poor quality of life in order to spare them unbearable suffering. We discuss the ethical dilemma and ideological foundations of the protocol, the opinions of its defenders and critics, and the dangers involved. The Jewish perspective relating to the subject is presented based on classical Jewish sources, which we trust may enrich modern bioethical debates. In Jewish law, the fetus acquires full legal status only after birth. However, while the lives of terminally ill neonates must in no way be actively destroyed or shortened, there is no obligation to make extraordinary efforts to prolong their lives. Accurate preimplantation or prenatal diagnosis might significantly reduce the incidence of nonviable births, but active killing of infants violates the basic foundations of Jewish law, and opens the 'slippery slope' for uncontrolled abuse. Therefore, we call upon the international medical and bioethical community to reject the Groningen Protocol that permits euthanization and to develop ethical guidelines for the optimal care of severely compromised neonates. Copyright 2009 S. Karger AG, Basel.

  17. The intergroup protocols: Scalable group communication for the internet

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo [Univ. of California, Santa Barbara, CA (United States)

    2000-12-04

    Reliable group ordered delivery of multicast messages in a distributed system is a useful service that simplifies the programming of distributed applications. Such a service helps to maintain the consistency of replicated information and to coordinate the activities of the various processes. With the increasing popularity of the Internet, there is an increasing interest in scaling the protocols that provide this service to the environment of the Internet. The InterGroup protocol suite, described in this dissertation, provides such a service, and is intended for the environment of the Internet with scalability to large numbers of nodes and high latency links. The InterGroup protocols approach the scalability problem from various directions. They redefine the meaning of group membership, allow voluntary membership changes, add a receiver-oriented selection of delivery guarantees that permits heterogeneity of the receiver set, and provide a scalable reliability service. The InterGroup system comprises several components, executing at various sites within the system. Each component provides part of the services necessary to implement a group communication system for the wide-area. The components can be categorized as: (1) control hierarchy, (2) reliable multicast, (3) message distribution and delivery, and (4) process group membership. We have implemented a prototype of the InterGroup protocols in Java, and have tested the system performance in both local-area and wide-area networks.

  18. Dynamic Postural Control in Female Athletes and Nonathletes After a Whole-Body Fatigue Protocol.

    Science.gov (United States)

    Baghbani, Fatemeh; Woodhouse, Linda J; Gaeini, Abbas A

    2016-07-01

    Baghbani, F, Woodhouse, LJ, and Gaeini, AA. Dynamic postural control in female athletes and nonathletes after a whole-body fatigue protocol. J Strength Cond Res 30(7): 1942-1947, 2016-Postural control is a crucial element in regular training of athletes, development of complex technical movement, and injury prevention; however, distributing factor of the postural control such as fatigue has been neglected by athletic trainers in novice and inexperienced athletes. The objective of this study was to compare changes in dynamic postural control of young female athletes and nonathletes after a fatigue protocol. Thirty females (15 athletes and 15 nonathletes) with no orthopedic problems were recruited to participate in this study. All participants completed the pre-SEBT (star excursion balance test) in 8 directions at baseline; then, they performed a 20-minute fatigue protocol after which post-SEBT was measured. Rating of perceived exertion was measured using the Borg scale immediately before, mid-way through (i.e., after the third station), and after performing the fatigue protocol (i.e., immediately before the post-SEBT). Female nonathlete groups had significant differences in dynamic balance performance after fatigue in the medial, posteromedial, and posterior directions (p postural control of the novice with progressing the exercise time. Our findings could also help coaches to develop trainings focused on the 3 directions of medial, posteromedial, and posterior directions and aimed at exercises increasing fatigue resistance.

  19. A Survey of Enhanced Recovery After Surgery Protocols for Cesarean Delivery in Serbia

    Directory of Open Access Journals (Sweden)

    Borislava Pujic

    2018-04-01

    Full Text Available Enhanced recovery after surgery (ERAS protocols have been described for patients undergoing colon surgery. Similar protocols for cesarean delivery (CD have been developed recently. CD is one of the most commonly performed surgical procedures, and adoption of ERAS protocols following CD might benefit patients and the health-care system. We aimed to determine which Serbian hospitals reported ERAS protocols, which elements of ERAS protocols were used in CD patients, and whether ERAS and non-ERAS hospitals differed. The survey was sent to all hospitals with obstetric services and 46 of 49 responded. The questionnaire asked whether ERAS protocols had been formally adopted for surgical patients and about their use in CD patients. Specific questions on elements described in other obstetric ERAS protocols for CD included preoperative patient preparation, type of anesthesia and temperature monitoring used for CD, maternal/neonatal contact, and time to discharge. ERAS protocols are used in 24% of surveyed hospitals, 84% admit the patient the day before elective CDs, 87% use a maternal bowel preparation morning on the day of CD, and 80% administer maternal deep venous thrombosis prophylaxis. Only 33% remove IV in the first postoperative day, and 89% of women do not eat solid food until the day following their CD. Neuraxial anesthesia is used in 46% of elective CDs in ERAS hospitals compared to 9% in non-ERAS hospitals (P < 0.01, and neuraxial narcotics for post CD analgesia are given more often in ERAS hospitals. Thirty-six percentage of ERAS patients are discharged within 3 days vs. none in the non-ERAS group. Few elements of ERAS protocols reported from other centers outside Serbia are employed in Serbian hospitals performing CD. Despite significant changes that have been made recently in CD care, enhanced recovery after CD could be significantly improved in Serbian hospitals.

  20. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  1. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  2. From small to insignificant. Climate impact of the Kyoto Protocol with and without US

    International Nuclear Information System (INIS)

    Hagem, Cathrine; Holtsmark, Bjart

    2001-06-01

    American president George W. Bush has declared that he will not ask the Senate to ratify the Kyoto Protocol. This commentary explores the potential impact of implementing the Kyoto Protocol without the participation of the United States. Because, in practice, the United States would have taken on a relatively large share of the Protocol's abatement commitments, we conclude that implementing the Protocol without the participation of United States will lead to significantly less reductions in global emissions. The international permit price will be considerably lower if the United States does not participate. (author)

  3. Introducing extra NADPH consumption ability significantly increases the photosynthetic efficiency and biomass production of cyanobacteria.

    Science.gov (United States)

    Zhou, Jie; Zhang, Fuliang; Meng, Hengkai; Zhang, Yanping; Li, Yin

    2016-11-01

    Increasing photosynthetic efficiency is crucial to increasing biomass production to meet the growing demands for food and energy. Previous theoretical arithmetic analysis suggests that the light reactions and dark reactions are imperfectly coupled due to shortage of ATP supply, or accumulation of NADPH. Here we hypothesized that solely increasing NADPH consumption might improve the coupling of light reactions and dark reactions, thereby increasing the photosynthetic efficiency and biomass production. To test this hypothesis, an NADPH consumption pathway was constructed in cyanobacterium Synechocystis sp. PCC 6803. The resulting extra NADPH-consuming mutant grew much faster and achieved a higher biomass concentration. Analyses of photosynthesis characteristics showed the activities of photosystem II and photosystem I and the light saturation point of the NADPH-consuming mutant all significantly increased. Thus, we demonstrated that introducing extra NADPH consumption ability is a promising strategy to increase photosynthetic efficiency and to enable utilization of high-intensity lights. Copyright © 2016 International Metabolic Engineering Society. Published by Elsevier Inc. All rights reserved.

  4. Indirect MR venography: contrast medium protocols, postprocessing and combination in diagnosing pulmonary emboli with MRI

    International Nuclear Information System (INIS)

    Kluge, A.; Bachmann, G.; Rominger, M.; Schoenburg, M.

    2004-01-01

    Purpose: Integration of MR venography in a comprehensive MR imaging protocol in patients with suspected pulmonary embolism (PE) and evaluation of contrast media dosage, timing and postprocessing for diagnostic accuracy. Materials and Methods: Fortyeight consecutive inpatients with suspected PE or deep vein thrombosis were examined by MR venography according to one of the following protocols: protocol I: MR venography only, 0.25 mmol/kg bodyweight (BW) Gadopentate dimeglumine(Gd-DTPA) as single dose, bolus timing; protocol II: MR angiography of pulmonary arteries with a cumulative dosage of 0.25 mmol/kg contrast media, modification of coil setting for MR venography without further contrast media application; protocol III: as protocol II but with 0.125 mmol/kg BW, followed by MR venography. Signal-to-noise ratio, contrast-to-noise ratio, number of definable vascular segments and image quality were evaluated. The results were compared to conventional bilateral venography. Results: All MR venography examinations were of diagnostic quality and the examination time was below 10 min. MR venography could be performed in all 48 patients comparted to 43 of 48 patients for conventional venography. Significantly more superficial and deep veins of the leg could be visualized by MR venography (94% compared to 83% for conventional venography). Sensitivity and specificity were 100% and 92%, respectively. Quality differed significantly between 0.125 mmol/kg (protocol III) and 0.25 mmol/kg Gd-DTPA (protocols I and II) while timing did not influence quality (protocol I vs. II). (orig.) [de

  5. Optimization of Saanen sperm genes amplification: evaluation of standardized protocols in genetically uncharacterized rural goats reared under a subtropical environment.

    Science.gov (United States)

    Barbour, Elie K; Saade, Maya F; Sleiman, Fawwak T; Hamadeh, Shady K; Mouneimne, Youssef; Kassaifi, Zeina; Kayali, Ghazi; Harakeh, Steve; Jaber, Lina S; Shaib, Houssam A

    2012-10-01

    The purpose of this research is to optimize quantitatively the amplification of specific sperm genes in reference genomically characterized Saanen goat and to evaluate the standardized protocols applicability on sperms of uncharacterized genome of rural goats reared under subtropical environment for inclusion in future selection programs. The optimization of the protocols in Saanen sperms included three production genes (growth hormone (GH) exons 2, 3, and 4, αS1-casein (CSN1S1), and α-lactalbumin) and two health genes (MHC class II DRB and prion (PrP)). The optimization was based on varying the primers concentrations and the inclusion of a PCR cosolvent (Triton X). The impact of the studied variables on statistically significant increase in the yield of amplicons was noticed in four out of five (80%) optimized protocols, namely in those related to GH, CSN1S1, α-lactalbumin, and PrP genes (P 0.05). The applicability of the optimized protocols of Saanen sperm genes on amplification of uncharacterized rural goat sperms revealed a 100% success in tested individuals for amplification of GH, CSN1S1, α-lactalbumin, and MHC class II DRB genes and a 75% success for the PrP gene. The significant success in applicability of the Saanen quantitatively optimized protocols to other uncharacterized genome of rural goats allows for their inclusion in future selection, targeting the sustainability of this farming system in a subtropical environment and the improvement of the farmers livelihood.

  6. Performance of Differential-Phase-Shift Keying Protocol Applying 1310 nm Up-Conversion Single-Photon Detector

    International Nuclear Information System (INIS)

    Chen-Xu, Feng; Rong-Zhen, Jiao; Wen-Han, Zhang

    2008-01-01

    The performance of the differential-phase-shift keying (DPSK) protocol applying a 1310 nm up-conversion single-photon detector is analysed. The error rate and the communication rate as a function of distance for three quantum key distribution protocols, the Bennett–Brassard 1984, the Bennett–Brassard–Mermin 1992, and the DPSK, are presented. Then we compare the performance of these three protocols using the 1310nm up-conversion detector. We draw the conclusion that the DPSK protocol applying the detector has significant advantage over the other two protocols. Longer transmission distance and lower error rate can be achieved. (general)

  7. Analysis of agreement between cardiac risk stratification protocols applied to participants of a center for cardiac rehabilitation

    Directory of Open Access Journals (Sweden)

    Ana A. S. Santos

    2016-01-01

    Full Text Available ABSTRACT Background Cardiac risk stratification is related to the risk of the occurrence of events induced by exercise. Despite the existence of several protocols to calculate risk stratification, studies indicating that there is similarity between these protocols are still unknown. Objective To evaluate the agreement between the existing protocols on cardiac risk rating in cardiac patients. Method The records of 50 patients from a cardiac rehabilitation program were analyzed, from which the following information was extracted: age, sex, weight, height, clinical diagnosis, medical history, risk factors, associated diseases, and the results from the most recent laboratory and complementary tests performed. This information was used for risk stratification of the patients in the protocols of the American College of Sports Medicine, the Brazilian Society of Cardiology, the American Heart Association, the protocol designed by Frederic J. Pashkow, the American Association of Cardiovascular and Pulmonary Rehabilitation, the Société Française de Cardiologie, and the Sociedad Española de Cardiología. Descriptive statistics were used to characterize the sample and the analysis of agreement between the protocols was calculated using the Kappa coefficient. Differences were considered with a significance level of 5%. Results Of the 21 analyses of agreement, 12 were considered significant between the protocols used for risk classification, with nine classified as moderate and three as low. No agreements were classified as excellent. Different proportions were observed in each risk category, with significant differences between the protocols for all risk categories. Conclusion The agreements between the protocols were considered low and moderate and the risk proportions differed between protocols.

  8. Epistemic Protocols for Distributed Gossiping

    Directory of Open Access Journals (Sweden)

    Krzysztof R. Apt

    2016-06-01

    Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.

  9. An Optimized Protocol to Increase Virus-Induced Gene Silencing Efficiency and Minimize Viral Symptoms in Petunia

    OpenAIRE

    Broderick, Shaun R.; Jones, Michelle L.

    2013-01-01

    Virus-induced gene silencing (VIGS) is used to down-regulate endogenous plant genes. VIGS efficiency depends on viral proliferation and systemic movement throughout the plant. Although tobacco rattle virus (TRV)-based VIGS has been successfully used in petunia (Petunia × hybrida), the protocol has not been thoroughly optimized for efficient and uniform gene down-regulation in this species. Therefore, we evaluated six parameters that improved VIGS in petunia. Inoculation of mechanically wounde...

  10. Knowledge, attitudes, beliefs and behaviour intentions for three bowel management practices in intensive care: effects of a targeted protocol implementation for nursing and medical staff.

    Science.gov (United States)

    Knowles, Serena; Lam, Lawrence T; McInnes, Elizabeth; Elliott, Doug; Hardy, Jennifer; Middleton, Sandy

    2015-01-01

    Bowel management protocols have the potential to minimize complications for critically ill patients. Targeted implementation can increase the uptake of protocols by clinicians into practice. The theory of planned behaviour offers a framework in which to investigate clinicians' intention to perform the behaviour of interest. This study aimed to evaluate the effect of implementing a bowel management protocol on intensive care nursing and medical staffs' knowledge, attitude, subjective norms, perceived behavioural control, behaviour intentions, role perceptions and past behaviours in relation to three bowel management practices. A descriptive before and after survey using a self-administered questionnaire sent to nursing and medical staff working within three intensive care units before and after implementation of our bowel management protocol (pre: May - June 2008; post: Feb - May 2009). Participants had significantly higher knowledge scores post-implementation of our protocol (pre mean score 17.6; post mean score 19.3; p = 0.004). Post-implementation there was a significant increase in: self-reported past behaviour (pre mean score 5.38; post mean score 7.11; p = 0.002) and subjective norms scores (pre mean score 3.62; post mean score 4.18; p = 0.016) for bowel assessment; and behaviour intention (pre mean score 5.22; post mean score 5.65; p = 0.048) for administration of enema. This evaluation, informed by the theory of planned behaviour, has provided useful insights into factors that influence clinician intentions to perform evidence-based bowel management practices in intensive care. Addressing factors such as knowledge, attitudes and beliefs can assist in targeting implementation strategies to positively affect clinician behaviour change. Despite an increase in clinicians' knowledge scores, our implementation strategy did not, however, significantly change clinician behaviour intentions for all three bowel management practices. Further research is

  11. A Robust Open Ascending-price Multi-unit Auction Protocol against False-name Bids

    Science.gov (United States)

    Iwasaki, Atsushi; Yokoo, Makoto; Terada, Kenji

    This paper develops a new ascending-price multi-unit auction protocol that has following characteristics: (i) it has an open format, (ii) sincere bidding is an equilibrium strategy even if the marginal utilities of each agent can increase and agents can submit false-name bids. False-name bids are bids submitted under fictitious names such as multiple e-mail addresses, which can be done easily in the Internet. This is the first protocol that has these two characteristics. We show that our new protocol outperforms an existing protocol, which satisfies (ii), with respect to the social surplus and the seller's revenue.

  12. The costs and cost-effectiveness of an integrated sepsis treatment protocol.

    Science.gov (United States)

    Talmor, Daniel; Greenberg, Dan; Howell, Michael D; Lisbon, Alan; Novack, Victor; Shapiro, Nathan

    2008-04-01

    Sepsis is associated with high mortality and treatment costs. International guidelines recommend the implementation of integrated sepsis protocols; however, the true cost and cost-effectiveness of these are unknown. To assess the cost-effectiveness of an integrated sepsis protocol, as compared with conventional care. Prospective cohort study of consecutive patients presenting with septic shock and enrolled in the institution's integrated sepsis protocol. Clinical and economic outcomes were compared with a historical control cohort. Beth Israel Deaconess Medical Center. Overall, 79 patients presenting to the emergency department with septic shock in the treatment cohort and 51 patients in the control group. An integrated sepsis treatment protocol incorporating empirical antibiotics, early goal-directed therapy, intensive insulin therapy, lung-protective ventilation, and consideration for drotrecogin alfa and steroid therapy. In-hospital treatment costs were collected using the hospital's detailed accounting system. The cost-effectiveness analysis was performed from the perspective of the healthcare system using a lifetime horizon. The primary end point for the cost-effectiveness analysis was the incremental cost per quality-adjusted life year gained. Mortality in the treatment group was 20.3% vs. 29.4% in the control group (p = .23). Implementing an integrated sepsis protocol resulted in a mean increase in cost of approximately $8,800 per patient, largely driven by increased intensive care unit length of stay. Life expectancy and quality-adjusted life years were higher in the treatment group; 0.78 and 0.54, respectively. The protocol was associated with an incremental cost of $11,274 per life-year saved and a cost of $16,309 per quality-adjusted life year gained. In patients with septic shock, an integrated sepsis protocol, although not cost-saving, appears to be cost-effective and compares very favorably to other commonly delivered acute care interventions.

  13. Using semantics for representing experimental protocols.

    Science.gov (United States)

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  14. Climate change scenarios and Technology Transfer Protocols

    International Nuclear Information System (INIS)

    Kypreos, Socrates; Turton, Hal

    2011-01-01

    We apply a specific version of MERGE-ETL, an integrated assessment model, to study global climate policies supported by Technology Transfer Protocols (TTPs). We model a specific formulation of such a TTP where donor countries finance via carbon tax revenues, the diffusion of carbon-free technologies in developing countries (DCs) and quantify its benefits. Industrialized countries profit from increased technology exports, global diffusion of advanced technology (leading to additional technology learning and cost reductions) and reduced climate damages through the likelihood of greater global participation in a new international agreement. DCs experience increased welfare from access to subsidized technology, and profit from the reduction of damages related to climate change and expected secondary benefits of carbon abatement (such as reduced local and regional air pollution). The analysis identifies potential candidate technologies that could be supported under a TTP, and the impact of a TTP on economic development (including the flow of transfer subsidies) and global emissions. Although a TTP may encourage additional participation, such a proposal is only likely to be successful if an increased willingness to pay to avoid climate damages is accepted, first by the present and future generations of the industrialized world and later on, when sufficient economic growth is accumulated, by today's developing countries. - Research Highlights: → Climate policy scenarios are assessed with differentiated commitments in carbon emission control supported by Technology Transfer Protocols. → Donor countries finance, via carbon-tax revenues, the exports of carbon-free technologies in developing countries helping to get a new international agreement. → Developing countries experience increased welfare from access to subsidized technology, and profit from the reduction of damages related to climate change and secondary benefits. → Under Technology Protocols alone and

  15. Development and validation of a remote home safety protocol.

    Science.gov (United States)

    Romero, Sergio; Lee, Mi Jung; Simic, Ivana; Levy, Charles; Sanford, Jon

    2018-02-01

    Environmental assessments and subsequent modifications conducted by healthcare professionals can enhance home safety and promote independent living. However, travel time, expense and the availability of qualified professionals can limit the broad application of this intervention. Remote technology has the potential to increase access to home safety evaluations. This study describes the development and validation of a remote home safety protocol that can be used by a caregiver of an elderly person to video-record their home environment for later viewing and evaluation by a trained professional. The protocol was developed based on literature reviews and evaluations from clinical and content experts. Cognitive interviews were conducted with a group of six caregivers to validate the protocol. The final protocol included step-by-step directions to record indoor and outdoor areas of the home. The validation process resulted in modifications related to safety, clarity of the protocol, readability, visual appearance, technical descriptions and usability. Our final protocol includes detailed instructions that a caregiver should be able to follow to record a home environment for subsequent evaluation by a home safety professional. Implications for Rehabilitation The results of this study have several implications for rehabilitation practice The remote home safety evaluation protocol can potentially improve access to rehabilitation services for clients in remote areas and prevent unnecessary delays for needed care. Using our protocol, a patient's caregiver can partner with therapists to quickly and efficiently evaluate a patient's home before they are released from the hospital. Caregiver narration, which reflects a caregiver's own perspective, is critical to evaluating home safety. In-home safety evaluations, currently not available to all who need them due to access barriers, can enhance a patient's independence and provide a safer home environment.

  16. Improving treatment times for patients with in-hospital stroke using a standardized protocol.

    Science.gov (United States)

    Koge, Junpei; Matsumoto, Shoji; Nakahara, Ichiro; Ishii, Akira; Hatano, Taketo; Sadamasa, Nobutake; Kai, Yasutoshi; Ando, Mitsushige; Saka, Makoto; Chihara, Hideo; Takita, Wataru; Tokunaga, Keisuke; Kamata, Takahiko; Nishi, Hidehisa; Hashimoto, Tetsuya; Tsujimoto, Atsushi; Kira, Jun-Ichi; Nagata, Izumi

    2017-10-15

    Previous reports have shown significant delays in treatment of in-hospital stroke (IHS). We developed and implemented our IHS alert protocol in April 2014. We aimed to determine the influence of implementation of our IHS alert protocol. Our implementation processes comprise the following four main steps: IHS protocol development, workshops for hospital staff to learn about the protocol, preparation of standardized IHS treatment kits, and obtaining feedback in a monthly hospital staff conference. We retrospectively compared protocol metrics and clinical outcomes of patients with IHS treated with intravenous thrombolysis and/or endovascular therapy between before (January 2008-March 2014) and after implementation (April 2014-December 2016). Fifty-five patients were included (pre, 25; post, 30). After the implementation, significant reductions occurred in the median time from stroke recognition to evaluation by a neurologist (30 vs. 13.5min, pvs. 26.5min, pvs. 16min, p=0.02). The median time from first neuroimaging to endovascular therapy had a tendency to decrease (75 vs. 53min, p=0.08). There were no differences in the favorable outcomes (modified Rankin scale score of 0-2) at discharge or the incidence of symptomatic intracranial hemorrhage between the two periods. Our IHS alert protocol implementation saved time in treating patients with IHS without compromising safety. Copyright © 2017 Elsevier B.V. All rights reserved.

  17. Hydrologic effects of large southwestern USA wildfires significantly increase regional water supply: fact or fiction?

    Science.gov (United States)

    Wine, M. L.; Cadol, D.

    2016-08-01

    In recent years climate change and historic fire suppression have increased the frequency of large wildfires in the southwestern USA, motivating study of the hydrological consequences of these wildfires at point and watershed scales, typically over short periods of time. These studies have revealed that reduced soil infiltration capacity and reduced transpiration due to tree canopy combustion increase streamflow at the watershed scale. However, the degree to which these local increases in runoff propagate to larger scales—relevant to urban and agricultural water supply—remains largely unknown, particularly in semi-arid mountainous watersheds co-dominated by winter snowmelt and the North American monsoon. To address this question, we selected three New Mexico watersheds—the Jemez (1223 km2), Mogollon (191 km2), and Gila (4807 km2)—that together have been affected by over 100 wildfires since 1982. We then applied climate-driven linear models to test for effects of fire on streamflow metrics after controlling for climatic variability. Here we show that, after controlling for climatic and snowpack variability, significantly more streamflow discharged from the Gila watershed for three to five years following wildfires, consistent with increased regional water yield due to enhanced infiltration-excess overland flow and groundwater recharge at the large watershed scale. In contrast, we observed no such increase in discharge from the Jemez watershed following wildfires. Fire regimes represent a key difference between the contrasting responses of the Jemez and Gila watersheds with the latter experiencing more frequent wildfires, many caused by lightning strikes. While hydrologic dynamics at the scale of large watersheds were previously thought to be climatically dominated, these results suggest that if one fifth or more of a large watershed has been burned in the previous three to five years, significant increases in water yield can be expected.

  18. Implementation of a more physiological plasma rich in growth factor (PRGF) protocol: Anticoagulant removal and reduction in activator concentration.

    Science.gov (United States)

    Anitua, Eduardo; Prado, Roberto; Troya, María; Zalduendo, Mar; de la Fuente, María; Pino, Ander; Muruzabal, Francisco; Orive, Gorka

    2016-07-01

    Plasma rich in growth factors (PRGF) is a biological therapy that uses patient's own growth factors for promoting tissue regeneration. Given the current European regulatory framework in which anticoagulant solution in blood extraction tubes could be considered as a medicinal product, a new PRGF protocol has been developed. The actual protocol (PRGF-A) and the new one (PRGF-B) have been performed and compared under Good Laboratory Practices. PRGF-A protocol uses extraction tubes with 0.9 mL of trisodium citrate as anticoagulant and 50 μL of calcium chloride/mL PRGF to activate it. The PRGF-B reduces the amount of sodium citrate and calcium chloride to 0.4 mL and to 20 μL, respectively. Basic hematological parameters, platelet function, the scaffold obtaining process, growth factors content, and the biological effect were compared between both PRGF obtaining protocols. PRGF-B protocol led to a statistically significant higher enrichment and recovery of platelets regarding to the PRGF-A. Hypotonic stress response by platelets was significantly better in the new protocol. A statistically significant decrease in the basal platelet activation status of PRGF-B compared to PRGF-A was also observed. The duration of the lag phase in the platelet aggregation assay was statistically lower for the PRGF-B protocol. Both the clotting and the clot retraction time were significantly reduced in the B protocol. A higher growth factor concentration was detected in the plasma obtained using the PRGF-B protocol. The new PRGF obtaining protocol, with a reduction in the amount of anticoagulant and activator, has even improved the actual one.

  19. What is the best contrast injection protocol for 64-row multi-detector cardiac computed tomography?

    International Nuclear Information System (INIS)

    Lu Jinguo; Lv Bin; Chen Xiongbiao; Tang Xiang; Jiang Shiliang; Dai Ruping

    2010-01-01

    Objective: To determine the optimal contrast injection protocol for 64-MDCT coronary angiography. Materials and methods: One hundred and fifty consecutive patients scheduled to undergo retrospectively electrocardiographically gated 64-MDCT. Each 30 patients were assigned to use a different contrast protocol: group 1: uniphasic protocol (contrast injection without saline flush); group 2: biphasic protocol (contrast injection with saline flush); group 3A, 3B and 3C: triphasic protocol (contrast media + different saline diluted contrast media + saline flush). Image quality scores and artifacts were compared and evaluated on both transaxial and three-dimensional coronary artery images among each contrast protocol. Results: Among the triphasic protocol groups, group 3A (30%:70% contrast media-saline mixture was used in second phase) used the least contrast media and had the least frequency of streak artifacts, but there were no significant differences in coronary artery attenuation, image quality, visualization right and left heart structures. Among the uniphasic protocol group (group 1), biphasic protocol group (group 2) and triphasic protocol subgroup (group 3A), there were no significant differences in image quality scores of coronary artery (P = 0.18); uniphasic protocol group had the highest frequency of streak artifacts (20 cases) (P < 0.05) and had the most amount contrast media (67.0 ± 5.3 ml); biphasic protocol group had the least amount of contrast media (59.9 ± 4.9 ml) (P < 0.05) and had the highest attenuation of left main coronary artery and right coronary artery (P < 0.01), but had the least amount of clear visualization right heart structure (6 cases); triphasic protocol group (group 3A) had the most amount of clear visualization right heart structures (29 cases) were the most among the three groups (P < 0.05). Conclusion: Biphasic protocol are superior to the traditional uniphasic protocols for using the least total contrast media, having the least

  20. What is the best contrast injection protocol for 64-row multi-detector cardiac computed tomography?

    Energy Technology Data Exchange (ETDEWEB)

    Lu Jinguo [Department of Radiology, Cardiovascular Institute and Fuwai Hospital, Peking Union Medical College and Chinese Academy of Medical Sciences, 167 Beilishi Road, Beijing (China); Lv Bin, E-mail: blu@vip.sina.co [Department of Radiology, Cardiovascular Institute and Fuwai Hospital, Peking Union Medical College and Chinese Academy of Medical Sciences, 167 Beilishi Road, Beijing (China); Chen Xiongbiao; Tang Xiang; Jiang Shiliang; Dai Ruping [Department of Radiology, Cardiovascular Institute and Fuwai Hospital, Peking Union Medical College and Chinese Academy of Medical Sciences, 167 Beilishi Road, Beijing (China)

    2010-08-15

    Objective: To determine the optimal contrast injection protocol for 64-MDCT coronary angiography. Materials and methods: One hundred and fifty consecutive patients scheduled to undergo retrospectively electrocardiographically gated 64-MDCT. Each 30 patients were assigned to use a different contrast protocol: group 1: uniphasic protocol (contrast injection without saline flush); group 2: biphasic protocol (contrast injection with saline flush); group 3A, 3B and 3C: triphasic protocol (contrast media + different saline diluted contrast media + saline flush). Image quality scores and artifacts were compared and evaluated on both transaxial and three-dimensional coronary artery images among each contrast protocol. Results: Among the triphasic protocol groups, group 3A (30%:70% contrast media-saline mixture was used in second phase) used the least contrast media and had the least frequency of streak artifacts, but there were no significant differences in coronary artery attenuation, image quality, visualization right and left heart structures. Among the uniphasic protocol group (group 1), biphasic protocol group (group 2) and triphasic protocol subgroup (group 3A), there were no significant differences in image quality scores of coronary artery (P = 0.18); uniphasic protocol group had the highest frequency of streak artifacts (20 cases) (P < 0.05) and had the most amount contrast media (67.0 {+-} 5.3 ml); biphasic protocol group had the least amount of contrast media (59.9 {+-} 4.9 ml) (P < 0.05) and had the highest attenuation of left main coronary artery and right coronary artery (P < 0.01), but had the least amount of clear visualization right heart structure (6 cases); triphasic protocol group (group 3A) had the most amount of clear visualization right heart structures (29 cases) were the most among the three groups (P < 0.05). Conclusion: Biphasic protocol are superior to the traditional uniphasic protocols for using the least total contrast media, having the least

  1. Montreal Protocol Benefits simulated with CCM SOCOL

    Directory of Open Access Journals (Sweden)

    T. Egorova

    2013-04-01

    Full Text Available Ozone depletion is caused by the anthropogenic increase of halogen-containing species in the atmosphere, which results in the enhancement of the concentration of reactive chlorine and bromine in the stratosphere. To reduce the influence of anthropogenic ozone-depleting substances (ODS, the Montreal Protocol was agreed by Governments in 1987, with several Amendments and Adjustments adopted later. In order to assess the benefits of the Montreal Protocol and its Amendments and Adjustments (MPA on ozone and UV radiation, two different runs of the chemistry-climate model (CCM SOCOL have been carried out. The first run was driven by the emission of ozone depleting substances (ODS prescribed according to the restrictions of the MPA. For the second run we allow the ODS to grow by 3% annually. We find that the MPA would have saved up to 80% of the global annual total ozone by the end of the 21st century. Our calculations also show substantial changes of the stratospheric circulation pattern as well as in surface temperature and precipitations that could occur in the world without MPA implementations. To illustrate the changes in UV radiation at the surface and to emphasise certain features, which can only be seen for some particular regions if the influence of the cloud cover changes is accounted for, we calculate geographical distribution of the erythemally weighted irradiance (Eery. For the no Montreal Protocol simulation Eery increases by factor of 4 to 16 between the 1970s and 2100. For the scenario including the Montreal Protocol it is found that UV radiation starts to decrease in 2000, with continuous decline of 5% to 10% at middle latitudes in the both Northern and Southern Hemispheres.

  2. Safeguards Implementation Guide for States with Small Quantities Protocols (Spanish Edition)

    International Nuclear Information System (INIS)

    2013-01-01

    The International Atomic Energy Agency (IAEA) works to enhance the contribution of nuclear energy for peace and prosperity around the world, while helping to ensure that nuclear material is not diverted to nuclear weapons or other nuclear explosive devices. In implementing safeguards, the IAEA plays an instrumental independent verification role, providing credible assurances that States' safeguards commitments are being respected. Most of the world's non-nuclear-weapon States (NNWSs) have concluded comprehensive safeguards agreements (CSAs) with the IAEA, pursuant to the Treaty on the Non- Proliferation of Nuclear Weapons (NPT). The IAEA and States are required to cooperate in the implementation of such agreements. Effective cooperation demonstrates a State's commitment to the peaceful use of nuclear energy and furthers the State's national interests by reducing the risk of unauthorized use of nuclear material. Over 100 NNWSs party to the NPT have very limited quantities of nuclear material and have concluded protocols to their CSAs which hold in abeyance many procedures in Part II of a CSA. These protocols are referred to as 'small quantities protocols' or 'SQPs' and remain in effect as long as the State meets certain eligibility criteria. The purpose of an SQP is to reduce the burden of safeguards implementation for States with little or no nuclear activities, while retaining the integrity of the safeguards system. States with SQPs have very important obligations they must fulfil under their CSAs. In 1997, as part of the IAEA's efforts to strengthen its safeguards system, the Model Additional Protocol to the Agreement(s) between State(s) and the International Atomic Energy Agency for the Application of Safeguards was developed to provide the IAEA with broader access to information and locations, thus significantly increasing the IAEA's ability to provide assurance of the absence of undeclared nuclear material and activities in States. Many States with SQPs have

  3. Safeguards Implementation Guide for States with Small Quantities Protocols (French Edition)

    International Nuclear Information System (INIS)

    2013-01-01

    The International Atomic Energy Agency (IAEA) works to enhance the contribution of nuclear energy for peace and prosperity around the world, while helping to ensure that nuclear material is not diverted to nuclear weapons or other nuclear explosive devices. In implementing safeguards, the IAEA plays an instrumental independent verification role, providing credible assurances that States' safeguards commitments are being respected. Most of the world's non-nuclear-weapon States (NNWSs) have concluded comprehensive safeguards agreements (CSAs) with the IAEA, pursuant to the Treaty on the Non- Proliferation of Nuclear Weapons (NPT). The IAEA and States are required to cooperate in the implementation of such agreements. Effective cooperation demonstrates a State's commitment to the peaceful use of nuclear energy and furthers the State's national interests by reducing the risk of unauthorized use of nuclear material. Over 100 NNWSs party to the NPT have very limited quantities of nuclear material and have concluded protocols to their CSAs which hold in abeyance many procedures in Part II of a CSA. These protocols are referred to as 'small quantities protocols' or 'SQPs' and remain in effect as long as the State meets certain eligibility criteria. The purpose of an SQP is to reduce the burden of safeguards implementation for States with little or no nuclear activities, while retaining the integrity of the safeguards system. States with SQPs have very important obligations they must fulfil under their CSAs. In 1997, as part of the IAEA's efforts to strengthen its safeguards system, the Model Additional Protocol to the Agreement(s) between State(s) and the International Atomic Energy Agency for the Application of Safeguards was developed to provide the IAEA with broader access to information and locations, thus significantly increasing the IAEA's ability to provide assurance of the absence of undeclared nuclear material and activities in States. Many States with SQPs have

  4. "hCG priming" effect in controlled ovarian stimulation through a long protocol

    Directory of Open Access Journals (Sweden)

    Antsaklis Aris

    2009-08-01

    Full Text Available Abstract Background Recently, it has been demonstrated that, in patients down-regulated by GnRH analogues (GnRHa, a short-term pre-treatment with recombinant LH (rLH, prior to recombinant FSH (rFSH administration, increases the number of small antral follicle prior to FSH stimulation and the yield of normally fertilized embryos. However, no data exist in the literature regarding the potential beneficial effect of "hCG priming" in controlled ovarian hyperstimulation (COH through a long GnRH-a protocol, which binds the same receptor (LH/hCGR, though it is a much more potent compared to LH. The primary aims of this study were to assess the effect of short-term pre-rFSH administration of hCG in women entering an ICSI treatment cycle on follicular development, quality of oocytes and early embryo development. The secondary endpoints were to record the effects on endometrial quality and pregnancy rate. Methods Patients with a history of at least one previous unsuccessful ICSI cycle were randomly assigned into two groups to receive treatment with either a long protocol with rFSH (control group or a long protocol with rFSH and pre-treatment with hCG (hCG group. In particular, in the latter group, a fixed 7 days course of 200 IU/day hCG was administered as soon as pituitary desensitization was confirmed. Results The mean number of oocytes retrieved was not significantly different between the two treatment groups, although the percentage of mature oocytes tended to be higher but not significantly different in hCG-treated patients. The percentage of patients with more than one grade 3 embryos was higher in the pre-treatment group, which also showed a higher pregnancy rate. Conclusion All the above clinical observations, in conjunction with previous data, suggest a point towards a beneficial "hCG priming" effect in controlled ovarian hyperstimulation through a long GnRH-a down-regulation protocol, particularly in patients with previous ART failures.

  5. Knowledge and skill retention of a mobile phone data collection protocol in rural Liberia.

    Science.gov (United States)

    Munro, Michelle L; Lori, Jody R; Boyd, Carol J; Andreatta, Pamela

    2014-01-01

    With a large number of births occurring outside the formal health system, it is difficult to determine the number of pregnant women in rural regions of Liberia. The exponential growth of mobile phone use in developing countries provides a potential avenue for data collection on maternal and child health in such rural, remote regions. A pre-, post-, and one-year posttest design was used to collect data on knowledge and skill retention for 7 essential items required for mobile phone use among traditional birth attendants (TBAs) trained in a short message service (SMS) texting data collection protocol (N = 99) in rural Liberia. Sixty-three participants (63.6% retention) completed the one-year posttest and displayed evidence of statistically significant knowledge and skill retention in 6 of the 7 tasks (P < .005), including the ability to: 1) turn on the phone, 2) use the mobile phone to make a call, 3) recognize that they have coverage, 4) recognize that the mobile phone is charged, 5) create a SMS text message without help, and 6) send a SMS text message without help. The TBAs continued to have difficulty with more complex tasks such as adding minutes to a phone. The mobile phone data-collection protocol proved feasible with TBAs demonstrating knowledge retention in a one-year posttest; however, clinical significance needs further investigation. The protocol increased communication and collaboration among TBAs, certified midwives, and clinic staff. © 2014 by the American College of Nurse-Midwives.

  6. An Accurate Link Correlation Estimator for Improving Wireless Protocol Performance

    Science.gov (United States)

    Zhao, Zhiwei; Xu, Xianghua; Dong, Wei; Bu, Jiajun

    2015-01-01

    Wireless link correlation has shown significant impact on the performance of various sensor network protocols. Many works have been devoted to exploiting link correlation for protocol improvements. However, the effectiveness of these designs heavily relies on the accuracy of link correlation measurement. In this paper, we investigate state-of-the-art link correlation measurement and analyze the limitations of existing works. We then propose a novel lightweight and accurate link correlation estimation (LACE) approach based on the reasoning of link correlation formation. LACE combines both long-term and short-term link behaviors for link correlation estimation. We implement LACE as a stand-alone interface in TinyOS and incorporate it into both routing and flooding protocols. Simulation and testbed results show that LACE: (1) achieves more accurate and lightweight link correlation measurements than the state-of-the-art work; and (2) greatly improves the performance of protocols exploiting link correlation. PMID:25686314

  7. UV Impacts Avoided by the Montreal Protocol

    Science.gov (United States)

    Newman, Paul; McKenzie, Richard

    2010-01-01

    Temporal and geographical variabilities in the future "World Expected" UV environment are compared with the "World Avoided", which would have occurred without the Montreal Protocol on protection of the ozone layer and its subsequent amendments and adjustments. Based on calculations of clear-sky UV irradiances, the effects of the Montreal Protocol have been hugely beneficial to avoid the health risks, such as skin cancer, which are associated with high UV, while there is only a small increase in health risks, such as vitamin D deficiency, that are associated with low UV. However, interactions with climate change may lead to changes in cloud and albedo, and possibly behavioural changes which could also be important.

  8. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  9. Streetlight Control System Based on Wireless Communication over DALI Protocol

    Science.gov (United States)

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-01-01

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed. PMID:27128923

  10. Streetlight Control System Based on Wireless Communication over DALI Protocol.

    Science.gov (United States)

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-04-27

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed.

  11. The impact of a standardised intramuscular sedation protocol for acute behavioural disturbance in the emergency department

    Directory of Open Access Journals (Sweden)

    Downes Michael A

    2010-06-01

    Full Text Available Abstract Background Acute behavioural disturbance (ABD is an increasing problem in emergency departments. This study aimed to determine the impact of a structured intramuscular (IM sedation protocol on the duration of ABD in the emergency department. Methods A historical control study was undertaken comparing 58 patients who required physical restraint and parenteral sedation with the structured IM sedation protocol, to 73 historical controls treated predominantly by intravenous sedation, according to individual clinician preference. The primary outcome was the duration of the ABD defined as the time security staff were required. Secondary outcomes were the requirement for additional sedation, drug related-adverse effects and patient and staff injuries. Results The median duration of the ABD in patients with the new sedation protocol was 21 minutes (IQR: 15 to 35 minutes; Range: 5 to 78 minutes compared to a median duration of 30 minutes (IQR: 15 to 50 minutes; Range: 5 to 135 minutes in the historical controls which was significantly different (p = 0.03. With IM sedation only 27 of 58 patients (47%; 95% CI: 34% to 60% required further sedation compared to 64 of 73 historical controls (88%; 95%CI: 77% to 94%. There were six (10% drug-related adverse events with the new IM protocol [oxygen desaturation (5, oxygen desaturation/airway obstruction (1] compared to 10 (14% in the historical controls [oxygen desaturation (5, hypoventilation (4 and aspiration (1]. Injuries to staff occurred with three patients using the new sedation protocol and in seven of the historical controls. Two patients were injured during the new protocol and two of the historical controls. Conclusion The use of a standardised IM sedation protocol was simple, more effective and as safe for management of ABD compared to predominantly intravenous sedation.

  12. A class-chest for deriving transport protocols

    Energy Technology Data Exchange (ETDEWEB)

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  13. A Geographical Heuristic Routing Protocol for VANETs

    Science.gov (United States)

    Urquiza-Aguiar, Luis; Tripp-Barba, Carolina; Aguilar Igartua, Mónica

    2016-01-01

    Vehicular ad hoc networks (VANETs) leverage the communication system of Intelligent Transportation Systems (ITS). Recently, Delay-Tolerant Network (DTN) routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR) protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation). PMID:27669254

  14. 64-section multidetector CT of the upper abdomen: optimization of a saline chaser injection protocol for improved vascular and parenchymal contrast enhancement

    Energy Technology Data Exchange (ETDEWEB)

    Marin, Daniele [Duke University Medical Center, Department of Radiology, Durham, NC (United States); University of Rome Sapienza, Department of Radiological Sciences, Rome (Italy); Nelson, Rendon C. [Duke University Medical Center, Department of Radiology, Durham, NC (United States); Guerrisi, Antonino; Passariello, Roberto; Catalano, Carlo [University of Rome Sapienza, Department of Radiological Sciences, Rome (Italy); Barnhart, Huiman [Duke University Medical Center, Department of Biostatistics and Bioinformatics, Durham, NC (United States); Schindera, Sebastian T. [University Hospital of Bern, Institute for Diagnostic, Interventional and Pediatric Radiology, Bern (Switzerland)

    2011-09-15

    To prospectively investigate the effect of varying the injection flow rates of a saline chaser on vascular and parenchymal contrast enhancement during abdominal MDCT. 100 consecutive patients were randomly assigned to four injection protocols. A fixed dose of contrast medium was administered followed by no saline (Protocol A) or 50 mL of saline at 2, 4, or 8 mL/s (Protocols B, C, and D). Peak, time-to-peak, and duration of 90% peak enhancement were determined for aorta, pancreas, and liver. Aortic peak enhancement was significantly higher for Protocol D (369.5 HU) compared with Protocols A and B (332.9 HU and 326.0 HU, respectively; P < 0.05). Pancreatic peak enhancement was significantly higher for Protocols C and D (110.6 HU and 110.9 HU, respectively) compared to Protocol A (92.5 HU; P < 0.05). Aortic and pancreatic time-to-peak enhancement occurred significantly later for Protocol D compared with Protocol A (42.8 s vs. 36.1 s [P < 0.001] and 49.7 s vs. 45.3 s [P = 0.003]). Injecting a saline chaser at high flow rates yields significantly higher peak aortic and pancreatic enhancement, with a slight longer time-to-peak enhancement. (orig.)

  15. Increasing the statistical significance of entanglement detection in experiments.

    Science.gov (United States)

    Jungnitsch, Bastian; Niekamp, Sönke; Kleinmann, Matthias; Gühne, Otfried; Lu, He; Gao, Wei-Bo; Chen, Yu-Ao; Chen, Zeng-Bing; Pan, Jian-Wei

    2010-05-28

    Entanglement is often verified by a violation of an inequality like a Bell inequality or an entanglement witness. Considerable effort has been devoted to the optimization of such inequalities in order to obtain a high violation. We demonstrate theoretically and experimentally that such an optimization does not necessarily lead to a better entanglement test, if the statistical error is taken into account. Theoretically, we show for different error models that reducing the violation of an inequality can improve the significance. Experimentally, we observe this phenomenon in a four-photon experiment, testing the Mermin and Ardehali inequality for different levels of noise. Furthermore, we provide a way to develop entanglement tests with high statistical significance.

  16. IEEE 802.11 Wireless LANs: Performance Analysis and Protocol Refinement

    Directory of Open Access Journals (Sweden)

    Chatzimisios P.

    2005-01-01

    Full Text Available The IEEE 802.11 protocol is emerging as a widely used standard and has become the most mature technology for wireless local area networks (WLANs. In this paper, we focus on the tuning of the IEEE 802.11 protocol parameters taking into consideration, in addition to throughput efficiency, performance metrics such as the average packet delay, the probability of a packet being discarded when it reaches the maximum retransmission limit, the average time to drop a packet, and the packet interarrival time. We present an analysis, which has been validated by simulation that is based on a Markov chain model commonly used in the literature. We further study the improvement on these performance metrics by employing suitable protocol parameters according to the specific communication needs of the IEEE 802.11 protocol for both basic access and RTS/CTS access schemes. We show that the use of a higher initial contention window size does not considerably degrade performance in small networks and performs significantly better in any other scenario. Moreover, we conclude that the combination of a lower maximum contention window size and a higher retry limit considerably improves performance. Results indicate that the appropriate adjustment of the protocol parameters enhances performance and improves the services that the IEEE 802.11 protocol provides to various communication applications.

  17. Optimised low-dose multidetector CT protocol for children with cranial deformity

    Energy Technology Data Exchange (ETDEWEB)

    Vazquez, Jose Luis [Complejo Hospitalario Universitario de Vigo, Department of Radiology, Vigo, Pontevedra (Spain); Pombar, Miguel Angel [Complejo Hospitalario Universitario de Santiago, Department of Radiophysics, Santiago de Compostela, La Coruna (Spain); Pumar, Jose Manuel [Complejo Hospitalario Universitario de Santiago, Department of Radiology, Santiago de Compostela, La Coruna (Spain); Campo, Victor Miguel del [Complejo Hospitalario Universitario de Vigo, Department of Public Health, Vigo, Pontevedra (Spain)

    2013-08-15

    To present an optimised low-dose multidetector computed tomography (MDCT) protocol for the study of children with cranial deformity. Ninety-one consecutive MDCT studies were performed in 80 children. Studies were performed with either our standard head CT protocol (group 1, n = 20) or a low-dose cranial deformity protocol (groups 2 and 3). Group 2 (n = 38), initial, and group 3 (n = 33), final and more optimised. All studies were performed in the same 64-MDCT equipment. Cranial deformity protocol was gradationally optimised decreasing kVp, limiting mA range, using automatic exposure control (AEC) and increasing the noise index (NI). Image quality was assessed. Dose indicators such us CT dose index volume (CTDIvol), dose-length product (DLP) and effective dose (E) were used. The optimised low-dose protocol reached the following values: 80 kVp, mA range: 50-150 and NI = 23. We achieved a maximum dose reduction of 10-22 times in the 1- to 12-month-old cranium in regard to the 2004 European guidelines for MDCT. A low-dose MDCT protocol that may be used as the first diagnostic imaging option in clinically selected patients with skull abnormalities. (orig.)

  18. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    International Nuclear Information System (INIS)

    Soares, M. R.; Maia, A. F.; Batista, W. O. G.; Lara, P. A.

    2014-08-01

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  19. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    Energy Technology Data Exchange (ETDEWEB)

    Soares, M. R.; Maia, A. F. [Universidade Federal de Sergipe, Departamento de Fisica, Cidade Universitaria Prof. Jose Aloisio de Campos, Marechal Rondon s/n, Jardim Rosa Elze, 49-100000 Sao Cristovao, Sergipe (Brazil); Batista, W. O. G. [Instituto Federal da Bahia, Rua Emidio dos Santos s/n, Barbalho, Salvador, 40301015 Bahia (Brazil); Lara, P. A., E-mail: wilsonottobatista@gmail.com [Instituto de Pesquisas Energeticas e Nucleares / CNEN, Av. Lineu Prestes 2242, Cidade Universitaria, 05508-000 Sao Paulo (Brazil)

    2014-08-15

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  20. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  1. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  2. I-123 IBZM-SPECT: improved acquisition protocol with HR-collimator

    International Nuclear Information System (INIS)

    Sandrock, D.; Ivancevic, V.; Dopichaj-Menge, U.; Gruber, D.; Munz, D.

    2002-01-01

    Aim: Aim of this study was to evaluate the impact of different acquisition and reconstruction protocols on the quality of SPECT diagnostics with I-123 IBZM in patients with diseases of the dopaminergic system. Material and Methods: Overall, 30 patients (19 men, 11 women, aged 22 - 80 years) were studied with SPECT after i.v. injection of 5 mCi (185 MBq) I-123 IBZM. Acquisition was performed 60 min p.i. (protocol A) using a medium energy collimator, a 64 x 64 matrix, 64 projections, step and shoot technique, 5.6 0 and 20 seconds per step with a MultiSPECT2 double-head gamma camera (Siemens). Immediately afterwards, a second acquisition (protocol B, 90 min p.i.) using a high resolution collimator, a 128 x 128 matrix, 60 projections, step and shoot technique, 3 0 and 30 seconds per step was performed. The reconstruction was done in filtered backprojection technique and a Butterworth filter of order 7, in protocol A using a cutoff of 0.5 and in protocol B of 0.4. Finally, the net count ratios of the basal ganglia to the frontal lobe(s) were calculated and compared with the clinical diagnosis. Results: The visual analysis yielded - as expected -a better image quality for protocol B (concordant impression of 3 independent observers) with more accurate delineation of the basal ganglia. The count ratios with protocol B were (mean) 0.19 higher (equivalent to 13 %) than with protocol A. In the group of patients with count ratios > 1.55 there was the highest (and significant) difference between protocols A and B with (mean count ratio difference) 0.32 (equivalent to 20 %). Protocol B also allowed a better differentiation between patients clinically staged normal and abnormal. In patients with unilateral disease, this difference between normal and abnormal was more prominent (in comparison to the contralateral side as well as compared to the reference value [1.5]). The comparison of the count ratios with the clinical data revealed 7 patients with borderline results with

  3. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  4. Comparison of 2 protocols to increase circulating progesterone concentration before timed artificial insemination in lactating dairy cows with or without elevated body temperature.

    Science.gov (United States)

    Pereira, M H C; Wiltbank, M C; Guida, T G; Lopes, F R; Vasconcelos, J L M

    2017-10-01

    Two treatments designed to increase circulating progesterone concentration (P4) during preovulatory follicle development were compared. One treatment used 2 intravaginal P4 implants (controlled internal drug-releasing inserts; CIDR) and the other used a GnRH treatment at beginning of the protocol. Lactating Holstein cows that had been diagnosed as nonpregnant were randomly assigned to receive timed artificial insemination (TAI) following 1 of 2 treatments (n = 1,638 breedings): (1) GnRH: CIDR+ 2 mg of estradiol (E2) benzoate + 100 µg of GnRH on d -11, PGF 2α on d -4, CIDR withdrawal + 1.0 mg of E2-cypionate + PGF 2α ) on d -2, and TAI on d 0; or (2) 2CIDR: 2 CIDR + 2 mg of E2-benzoate on d -11, 1 CIDR withdrawn + PGF 2α on d -4, second CIDR withdrawn + 1.0 mg of E2-cypionate + PGF 2α on d -2, and TAI on d 0. Milk yield was measured daily between d 0 and d 7. Rectal temperature was measured using a digital thermometer at d 0 and 7, and elevated body temperature was defined as an average rectal temperature ≥39.1°C. Pregnancy diagnoses were performed on d 32 and 60 after TAI. We detected no effect of treatments on pregnancy per AI or pregnancy loss regardless of elevated body temperature, body condition score, parity, milk yield, or presence or absence of a corpus luteum (CL) on d -11 or d -4. Pregnancy per AI at 60 d was reduced [elevated body temperature = 22.8% (162/709), no elevated body temperature 34.1% (279/817)] and pregnancy loss tended to increase [elevated body temperature = 20.2% (41/203), no elevated body temperature 14.4% (47/326)] in cows with elevated body temperature. Various physiological measurements associated with greater fertility were also reduced in cows with elevated body temperature, such as percentage of cows with a CL at PGF 2α (decreased 7.9%), ovulatory follicle diameter (decreased 0.51 mm), expression of estrus (decreased 5.1%), and ovulation near TAI (decreased 2.8%) compared with cows without elevated body temperature. A

  5. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    Directory of Open Access Journals (Sweden)

    Srinivas Kanakala

    2014-01-01

    Full Text Available In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing protocol to further reduce the energy consumption. The proposed energy-efficient coding-aware cluster based routing protocol (ECCRP scheme applies network coding at cluster heads to reduce number of transmissions. We also modify the queue management procedure of COPE protocol to further improve coding opportunities. We also use an energy efficient scheme while selecting the cluster head. It helps to increase the life time of the network. We evaluate the performance of proposed energy efficient cluster based protocol using simulation. Simulation results show that the proposed ECCRP algorithm reduces energy consumption and increases life time of the network.

  6. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    Science.gov (United States)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-06-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  7. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    Science.gov (United States)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-03-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  8. Clinical outcomes and mortality before and after implementation of a pediatric sepsis protocol in a limited resource setting: A retrospective cohort study in Bangladesh.

    Directory of Open Access Journals (Sweden)

    Teresa Bleakly Kortz

    Full Text Available Pediatric sepsis has a high mortality rate in limited resource settings. Sepsis protocols have been shown to be a cost-effective strategy to improve morbidity and mortality in a variety of populations and settings. At Dhaka Hospital in Bangladesh, mortality from pediatric sepsis in high-risk children previously approached 60%, which prompted the implementation of an evidenced-based protocol in 2010. The clinical effectiveness of this protocol had not been measured. We hypothesized that implementation of a pediatric sepsis protocol improved clinical outcomes, including reducing mortality and length of hospital stay.This was a retrospective cohort study of children 1-59 months old with a diagnosis of sepsis, severe sepsis or septic shock admitted to Dhaka Hospital from 10/25/2009-10/25/2011. The primary outcome was inpatient mortality pre- and post-protocol implementation. Secondary outcomes included fluid overload, heart failure, respiratory insufficiency, length of hospital stay, and protocol compliance, as measured by antibiotic and fluid bolus administration within 60 minutes of hospital presentation.404 patients were identified by a key-word search of the electronic medical record; 328 patients with a primary diagnosis of sepsis, severe sepsis, or septic shock were included (143 pre- and185 post-protocol in the analysis. Pre- and post-protocol mortality were similar and not statistically significant (32.17% vs. 34.59%, p = 0.72. The adjusted odds ratio (AOR for post-protocol mortality was 1.55 (95% CI, 0.88-2.71. The odds for developing fluid overload were significantly higher post-protocol (AOR 3.45, 95% CI, 2.04-5.85, as were the odds of developing heart failure (AOR 4.52, 95% CI, 1.43-14.29 and having a longer median length of stay (AOR 1.81, 95% CI 1.10-2.96. There was no statistically significant difference in respiratory insufficiency (pre- 65.7% vs. post- 70.3%, p = 0.4 or antibiotic administration between the cohorts (pre- 16.08% vs

  9. A Mac Protocol Implementation for Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Jamila Bhar

    2015-01-01

    Full Text Available IEEE 802.15.4 is an important standard for Low Rate Wireless Personal Area Network (LRWPAN. The IEEE 802.15.4 presents a flexible MAC protocol that provides good efficiency for data transmission by adapting its parameters according to characteristics of different applications. In this research work, some restrictions of this standard are explained and an improvement of traffic efficiency by optimizing MAC layer is proposed. Implementation details for several blocks of communication system are carefully modeled. The protocol implementation is done using VHDL language. The analysis gives a full understanding of the behavior of the MAC protocol with regard to backoff delay, data loss probability, congestion probability, slot effectiveness, and traffic distribution for terminals. Two ideas are proposed and tested to improve efficiency of CSMA/CA mechanism for IEEE 802.15.4 MAC Layer. Primarily, we dynamically adjust the backoff exponent (BE according to queue level of each node. Secondly, we vary the number of consecutive clear channel assessment (CCA for packet transmission. We demonstrate also that slot compensation provided by the enhanced MAC protocol can greatly avoid unused slots. The results show the significant improvements expected by our approach among the IEEE 802.15.4 MAC standards. Synthesis results show also hardware performances of our proposed architecture.

  10. Whole-Body Magnetic Resonance Angiography at 3 Tesla Using a Hybrid Protocol in Patients with Peripheral Arterial Disease

    International Nuclear Information System (INIS)

    Nielsen, Yousef W.; Eiberg, Jonas P.; Logager, Vibeke B.; Schroeder, Torben V.; Just, Sven; Thomsen, Henrik S.

    2009-01-01

    The purpose of this study was to determine the diagnostic performance of 3T whole-body magnetic resonance angiography (WB-MRA) using a hybrid protocol in comparison with a standard protocol in patients with peripheral arterial disease (PAD). In 26 consecutive patients with PAD two different protocols were used for WB-MRA: a standard sequential protocol (n = 13) and a hybrid protocol (n = 13). WB-MRA was performed using a gradient echo sequence, body coil for signal reception, and gadoterate meglumine as contrast agent (0.3 mmol/kg body weight). Two blinded observers evaluated all WB-MRA examinations with regard to presence of stenoses, as well as diagnostic quality and degree of venous contamination in each of the four stations used in WB-MRA. Digital subtraction angiography served as the method of reference. Sensitivity for detecting significant arterial disease (luminal narrowing ≥ 50%) using standard-protocol WB-MRA for the two observers was 0.63 (95%CI: 0.51-0.73) and 0.66 (0.58-0.78). Specificities were 0.94 (0.91-0.97) and 0.96 (0.92-0.98), respectively. In the hybrid protocol WB-MRA sensitivities were 0.75 (0.64-0.84) and 0.70 (0.58-0.8), respectively. Specificities were 0.93 (0.88-0.96) and 0.95 (0.91-0.97). Interobserver agreement was good using both the standard and the hybrid protocol, with κ = 0.62 (0.44-0.67) and κ = 0.70 (0.59-0.79), respectively. WB-MRA quality scores were significantly higher in the lower leg using the hybrid protocol compared to standard protocol (p = 0.003 and p = 0.03, observers 1 and 2). Distal venous contamination scores were significantly lower with the hybrid protocol (p = 0.02 and p = 0.01, observers 1 and 2). In conclusion, hybrid-protocol WB-MRA shows a better diagnostic performance than standard protocol WB-MRA at 3 T in patients with PAD.

  11. Validation of a ramp running protocol for determination of the true VO2max in mice

    Directory of Open Access Journals (Sweden)

    Mohamed Ayachi

    2016-08-01

    Full Text Available In the field of comparative physiology, it remains to be established whether the concept of VO2max is valid in the mouse and, if so, how this value can be accurately determined. In humans, VO2max is generally considered to correspond to the plateau observed when VO2 no longer rises with an increase in workload. In contrast, the concept of VO2peak tends to be used in murine studies. The objectives of the present study were to determine whether (i a continuous ramp protocol yielded a higher VO2peak than a stepwise, incremental protocol, and (ii the VO2peak measured in the ramp protocol corresponded to VO2max. The three protocols (based on intensity-controlled treadmill running until exhaustion with eight female FVB/N mice were performed in random order: (a an incremental protocol that begins at 10 m.min-1 speed and increases by 3 m.min-1 every 3 min. (b a ramp protocol with slow acceleration (3 m.min-2, and (c a ramp protocol with fast acceleration (12 m.min-2. Each protocol was performed with two slopes (0° and 25°. Hence, each mouse performed six exercise tests. We found that the value of VO2peak was protocol-dependent (p 8 mmol.l-1 and a respiratory exchange ratio >1. The total duration of the 3 m.min-2 0° ramp protocol was shorter than that of the incremental protocol. Taken as a whole, our results suggest that VO2max in the mouse is best determined by applying a ramp exercise protocol with slow acceleration and no treadmill slope.

  12. New Heterogeneous Clustering Protocol for Prolonging Wireless Sensor Networks Lifetime

    Directory of Open Access Journals (Sweden)

    Md. Golam Rashed

    2014-06-01

    Full Text Available Clustering in wireless sensor networks is one of the crucial methods for increasing of network lifetime. The network characteristics of existing classical clustering protocols for wireless sensor network are homogeneous. Clustering protocols fail to maintain the stability of the system, especially when nodes are heterogeneous. We have seen that the behavior of Heterogeneous-Hierarchical Energy Aware Routing Protocol (H-HEARP becomes very unstable once the first node dies, especially in the presence of node heterogeneity. In this paper we assume a new clustering protocol whose network characteristics is heterogeneous for prolonging of network lifetime. The computer simulation results demonstrate that the proposed clustering algorithm outperforms than other clustering algorithms in terms of the time interval before the death of the first node (we refer to as stability period. The simulation results also show the high performance of the proposed clustering algorithm for higher values of extra energy brought by more powerful nodes.

  13. A family of multi-party authentication protocols

    NARCIS (Netherlands)

    Cremers, C.J.F.; Mauw, S.

    2006-01-01

    We introduce a family of multi-party authentication protocols and discuss six novel protocols, which are members of this family. The first three generalize the well-known Needham-Schroeder-Lowe public-key protocol, the Needham-Schroeder private-key protocol, and the Bilateral Key Exchange protocol.

  14. The mPED randomized controlled clinical trial: applying mobile persuasive technologies to increase physical activity in sedentary women protocol

    Directory of Open Access Journals (Sweden)

    Fukuoka Yoshimi

    2011-12-01

    Full Text Available Abstract Background Despite the significant health benefits of regular physical activity, approximately half of American adults, particularly women and minorities, do not meet the current physical activity recommendations. Mobile phone technologies are readily available, easily accessible and may provide a potentially powerful tool for delivering physical activity interventions. However, we need to understand how to effectively apply these mobile technologies to increase and maintain physical activity in physically inactive women. The purpose of this paper is to describe the study design and protocol of the mPED (mobile phone based physical activity education randomized controlled clinical trial that examines the efficacy of a 3-month mobile phone and pedometer based physical activity intervention and compares two different 6-month maintenance interventions. Methods A randomized controlled trial (RCT with three arms; 1 PLUS (3-month mobile phone and pedometer based physical activity intervention and 6-month mobile phone diary maintenance intervention, 2 REGULAR (3-month mobile phone and pedometer based physical activity intervention and 6-month pedometer maintenance intervention, and 3 CONTROL (pedometer only, but no intervention will be conducted. A total of 192 physically inactive women who meet all inclusion criteria and successfully complete a 3-week run-in will be randomized into one of the three groups. The mobile phone serves as a means of delivering the physical activity intervention, setting individualized weekly physical activity goals, and providing self-monitoring (activity diary, immediate feedback and social support. The mobile phone also functions as a tool for communication and real-time data capture. The primary outcome is objectively measured physical activity. Discussion If efficacy of the intervention with a mobile phone is demonstrated, the results of this RCT will be able to provide new insights for current behavioral

  15. The mPED randomized controlled clinical trial: applying mobile persuasive technologies to increase physical activity in sedentary women protocol.

    Science.gov (United States)

    Fukuoka, Yoshimi; Komatsu, Judith; Suarez, Larry; Vittinghoff, Eric; Haskell, William; Noorishad, Tina; Pham, Kristin

    2011-12-14

    Despite the significant health benefits of regular physical activity, approximately half of American adults, particularly women and minorities, do not meet the current physical activity recommendations. Mobile phone technologies are readily available, easily accessible and may provide a potentially powerful tool for delivering physical activity interventions. However, we need to understand how to effectively apply these mobile technologies to increase and maintain physical activity in physically inactive women. The purpose of this paper is to describe the study design and protocol of the mPED (mobile phone based physical activity education) randomized controlled clinical trial that examines the efficacy of a 3-month mobile phone and pedometer based physical activity intervention and compares two different 6-month maintenance interventions. A randomized controlled trial (RCT) with three arms; 1) PLUS (3-month mobile phone and pedometer based physical activity intervention and 6-month mobile phone diary maintenance intervention), 2) REGULAR (3-month mobile phone and pedometer based physical activity intervention and 6-month pedometer maintenance intervention), and 3) CONTROL (pedometer only, but no intervention will be conducted). A total of 192 physically inactive women who meet all inclusion criteria and successfully complete a 3-week run-in will be randomized into one of the three groups. The mobile phone serves as a means of delivering the physical activity intervention, setting individualized weekly physical activity goals, and providing self-monitoring (activity diary), immediate feedback and social support. The mobile phone also functions as a tool for communication and real-time data capture. The primary outcome is objectively measured physical activity. If efficacy of the intervention with a mobile phone is demonstrated, the results of this RCT will be able to provide new insights for current behavioral sciences and mHealth. ClinicalTrials.gov#:NCTO1280812.

  16. Implementation of a protocol to reduce occurrence of retained sponges after vaginal delivery.

    Science.gov (United States)

    Lutgendorf, Monica A; Schindler, Lynnett L; Hill, James B; Magann, Everett F; O'Boyle, John D

    2011-06-01

    Retained sponges (gossypiboma) following vaginal delivery are an uncommon occurrence. Although significant morbidity from such an event is unlikely, there are many reported adverse effects, including symptoms of malodorous discharge, loss of confidence in providers and the medical system, and legal claims. To report a protocol intended to reduce the occurrence of retained sponges following vaginal delivery. After identification of limitations with existing delivery room protocols, we developed a sponge count protocol to reduce occurrence of retained vaginal sponges. We report our experience at Naval Medical Center Portsmouth, a large tertiary care military treatment facility with our efforts to implement a sponge count protocol to reduce retained sponges following vaginal delivery. With appropriate pre-implementation training, protocols which incorporate post-delivery vaginal sweep and sponge counts are well accepted by the health care team and can be incorporated into the delivery room routine.

  17. Implementation of a Rapid, Protocol-based TIA Management Pathway.

    Science.gov (United States)

    Jarhult, Susann J; Howell, Melissa L; Barnaure-Nachbar, Isabelle; Chang, Yuchiao; White, Benjamin A; Amatangelo, Mary; Brown, David F; Singhal, Aneesh B; Schwamm, Lee H; Silverman, Scott B; Goldstein, Joshua N

    2018-03-01

    Our goal was to assess whether use of a standardized clinical protocol improves efficiency for patients who present to the emergency department (ED) with symptoms of transient ischemic attack (TIA). We performed a structured, retrospective, cohort study at a large, urban, tertiary care academic center. In July 2012 this hospital implemented a standardized protocol for patients with suspected TIA. The protocol selected high-risk patients for admission and low/intermediate-risk patients to an ED observation unit for workup. Recommended workup included brain imaging, vascular imaging, cardiac monitoring, and observation. Patients were included if clinical providers determined the need for workup for TIA. We included consecutive patients presenting during a six-month period prior to protocol implementation, and those presenting between 6-12 months after implementation. Outcomes included ED length of stay (LOS), hospital LOS, use of neuroimaging, and 90-day risk of stroke or TIA. From 01/2012 to 06/2012, 130 patients were evaluated for TIA symptoms in the ED, and from 01/2013 to 06/2013, 150 patients. The final diagnosis was TIA or stroke in 45% before vs. 41% after (p=0.18). Following the intervention, the inpatient admission rate decreased from 62% to 24% (pTIA among those with final diagnosis of TIA was 3% for both periods. Implementation of a TIA protocol significantly reduced ED LOS and total hospital LOS.

  18. Application of low-dose radiation protocols in survey CT scans

    International Nuclear Information System (INIS)

    Fu Qiang; Liu Ting; Lu Tao; Xu Ke; Zhang Lin

    2009-01-01

    Objective: To characterize the protocols with low-dose radiation in survey CT scans for localization. Methods: Eighty standard adult patients, head and body phantoms were recruited. Default protocols provided by operator's manual setting were that all the tube voltage for head, chest, abdomen and lumbar was 120 kV; the tube currents were 20,10,20 and 40 mA, respectively. Values of kV and mA in the low-dose experiments were optimized according to the device options. For chest and abdomen, the tube position were compared between default (0 degree) and 180 degree. Phantoms were scanned with above protocols, and the radiation doses were measured respectively. Paired t-test were used for comparisons of standard deviation in CT value, noise and exposure surface dose (ESD) between group with default protocols and group with optimized protocols. Results: The optimized protocols in low-dose CT survey scans were 80 kV, 10 mA for head, 80 kV, 10 mA for chest, 80 kV, 10 mA for abdomen and 100 kV, 10 mA for lumbar. The values of ESD for phantom scan in default and optimized protocols were 0.38 mGy/0.16 mGy in head, 0.30 mGy/0.20 mGy in chest, 0.74 mGy/0.30 mGy in abdomen and 0.81 mGy/0.44 mGy in lumbar, respectively. Compared with default protocols, the optimized protocols reduced the radiation doses 59%, 33%, 59% and 46% in head, chest, abdomen and lumbar. When tube position changed from 0 degree to 180 degree, the ESD were 0.24 mGy/0.20 mGy for chest; 0.37 mGy/0.30 mGy for abdomen, and the radiation doses were reduced 20% and 17%. Conclusion: A certain amount of image noise is increased in low-dose protocols, but image quality is still acceptable without problem in CT localization. The reduction of radiation dose and the radiation harm to patients are the superiority. (authors)

  19. Multidisciplinary perioperative protocol in patients undergoing acute high-risk abdominal surgery

    DEFF Research Database (Denmark)

    Tengberg, L. T.; Bay-Nielsen, M.; Bisgaard, T.

    2017-01-01

    Background: Acute high-risk abdominal (AHA) surgery carries a very high risk of morbidity and mortality and represents a massive healthcare burden. The aim of the present study was to evaluate the effect of a standardized multidisciplinary perioperative protocol in patients undergoing AHA surgery...... = 0·004). Conclusion: The introduction of a multidisciplinary perioperative protocol was associated with a significant reduction in postoperative mortality in patients undergoing AHA surgery. NCT01899885 (http://www.clinicaltrials.gov)....

  20. Safeguards Implementation Guide for States with Small Quantities Protocols (French Edition); Guide d'application des garanties pour les Etats ayant des protocoles relatifs aux petites quantites de matieres

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-10-15

    The International Atomic Energy Agency (IAEA) works to enhance the contribution of nuclear energy for peace and prosperity around the world, while helping to ensure that nuclear material is not diverted to nuclear weapons or other nuclear explosive devices. In implementing safeguards, the IAEA plays an instrumental independent verification role, providing credible assurances that States' safeguards commitments are being respected. Most of the world's non-nuclear-weapon States (NNWSs) have concluded comprehensive safeguards agreements (CSAs) with the IAEA, pursuant to the Treaty on the Non- Proliferation of Nuclear Weapons (NPT). The IAEA and States are required to cooperate in the implementation of such agreements. Effective cooperation demonstrates a State's commitment to the peaceful use of nuclear energy and furthers the State's national interests by reducing the risk of unauthorized use of nuclear material. Over 100 NNWSs party to the NPT have very limited quantities of nuclear material and have concluded protocols to their CSAs which hold in abeyance many procedures in Part II of a CSA. These protocols are referred to as 'small quantities protocols' or 'SQPs' and remain in effect as long as the State meets certain eligibility criteria. The purpose of an SQP is to reduce the burden of safeguards implementation for States with little or no nuclear activities, while retaining the integrity of the safeguards system. States with SQPs have very important obligations they must fulfil under their CSAs. In 1997, as part of the IAEA's efforts to strengthen its safeguards system, the Model Additional Protocol to the Agreement(s) between State(s) and the International Atomic Energy Agency for the Application of Safeguards was developed to provide the IAEA with broader access to information and locations, thus significantly increasing the IAEA's ability to provide assurance of the absence of undeclared nuclear material and activities in States. Many States with SQPs have

  1. SU-E-I-68: Practical Considerations On Implementation of the Image Gently Pediatric CT Protocols

    International Nuclear Information System (INIS)

    Zhang, J; Adams, C; Lumby, C; Dillon, J; Woods, E; Richer, E

    2014-01-01

    Purpose: One limitation associated with the Image Gently pediatric CT protocols is practical implementation of the recommended manual techniques. Inconsistency as a result of different practice is a possibility among technologist. An additional concern is the added risk of data error that would result in over or underexposure. The Automatic Exposure Control (AEC) features automatically reduce radiation for children. However, they do not work efficiently for the patients of very small size and relative large size. This study aims to implement the Image Gently pediatric CT protocols in the practical setting while maintaining the use of AEC features for pediatric patients of varying size. Methods: Anthropomorphological abdomen phantoms were scanned in a CT scanner using the Image Gently pediatric protocols, the AEC technique with a fixed adult baseline, and automatic protocols with various baselines. The baselines were adjusted corresponding to patient age, weight and posterioranterior thickness to match the Image Gently pediatric CT manual techniques. CTDIvol was recorded for each examination. Image noise was measured and recorded for image quality comparison. Clinical images were evaluated by pediatric radiologists. Results: By adjusting vendor default baselines used in the automatic techniques, radiation dose and image quality can match those of the Image Gently manual techniques. In practice, this can be achieved by dividing pediatric patients into three major groups for technologist reference: infant, small child, and large child. Further division can be done but will increase the number of CT protocols. For each group, AEC can efficiently adjust acquisition techniques for children. This implementation significantly overcomes the limitation of the Image Gently manual techniques. Conclusion: Considering the effectiveness in clinical practice, Image Gently Pediatric CT protocols can be implemented in accordance with AEC techniques, with adjusted baselines, to

  2. On the need of improved Accelerated Degradation Protocols (ADPs)

    DEFF Research Database (Denmark)

    Pizzutilo, E.; Geiger, S.; Grote, J. P.

    2016-01-01

    protocol covering the whole potential range from 0.6 to 1.5 VRHE. The latter is typically not addressed in literature. This finding is explained by taking into account platinum catalyzed carbon corrosion and transient platinum dissolution. Based on the obtained results, the question is raised...... protocols that are commonly used in the fuel cell community to simulate load cycle and start-stop conditions in proton exchange membrane fuel cells (PEMFCs). In contrast to previous assumptions, claiming a separation between carbon corrosion and platinum dissolution, in both standard protocols platinum...... dissolution and carbon corrosion are present at low rates, which is also reflected by a comparably low ECSA decrease. On the other hand, a huge increase in rate of both processes is observed during transitions from low to high potential regimes experienced by a PEMFC in operation, here studied in a third...

  3. An Online Learning Module to Increase Self-Efficacy and Involvement in Care for Patients With Advanced Lung Cancer: Research Protocol.

    Science.gov (United States)

    Janssen, Anna; Shaw, Tim; Nagrial, Adnan; Pene, Christopher; Rabbets, Melanie; Carlino, Matteo; Zachulski, Clare; Phillips, Jane; Birnbaum, Robert; Gandhi, Tejal; Harnett, Paul

    2016-08-08

    Improving patient care for individuals with lung cancer is a priority due to the increasing burden of the disease globally. One way this can be done is by improving patient self-management capabilities through increasing their self-efficacy. This can improve positive outcomes for patients with chronic conditions and increase their ability to manage the challenges of such illnesses. Unfortunately, patients with chronic conditions often struggle to travel far from home to engage with patient education events, a common means of improving self-efficacy. The development of more accessible tools for improving patient self-efficacy is required to increase quality of life for patients with chronic conditions. To evaluate the feasibility of delivering symptom identification and management information to patients with advanced lung cancer using an online program. This article describes a pre-post test study to evaluate a Qstream online learning platform to improve patient self-efficacy for managing advanced lung cancer symptoms. Undertaking this program should increase participant knowledge about the side-effects they may experience as a result of their treatment and in turn increase help-seeking behavior and self-efficacy for the participant cohort. Quantitative data collected by the Qstream platform on the completion rates of participants will be used as a tool to evaluate the intervention. Additionally, validated scales will be used to collect data on patient self-efficacy. Qualitative data will also be collected via an exit survey and thematic content analysis of semi-structured interviews. The research is in the preliminary stages but thus far a protocol has been approved in support of the project. Additionally, advisory committee members have been identified and initial meetings have been undertaken. Development of new approaches for increasing patient understanding of their care is important to ensure high quality care continues to be delivered in the clinical setting.

  4. Double-loop Learning: A Coaching Protocol for Enhancing Principal Instructional Leadership

    Directory of Open Access Journals (Sweden)

    Gary W. Houchens

    2012-10-01

    Full Text Available Executive coaching has become increasingly commonplace in both the corporate and non-profit sectors as a means of improving professional effectiveness but there is a dearth of empirically-based protocols geared specifically toward the growth needs of school principals. This qualitative case study explores the implementation of a principal coaching protocol using a theories of practice framework based on concepts originally articulated by Argyris and Schön (1974 and further explicated by the authors in previous publications. This study examined the extent to which a coaching protocol based on theories of practice enhanced principals’ self-perceived capacity for reflection and effective instructional leadership. Findings suggest that principals valued the structure, feedback, and reflective dimensions of the protocol and found their confidence level about an important instructional leadership problem – how to support and assist struggling teachers improve their teaching practice – was greatly enhanced. Implications for further iterations of the coaching protocol, as well as future directions of research on principal professional growth, are discussed.

  5. FOG: Fighting the Achilles' Heel of Gossip Protocols with Fountain Codes

    Science.gov (United States)

    Champel, Mary-Luc; Kermarrec, Anne-Marie; Le Scouarnec, Nicolas

    Gossip protocols are well known to provide reliable and robust dissemination protocols in highly dynamic systems. Yet, they suffer from high redundancy in the last phase of the dissemination. In this paper, we combine fountain codes (rateless erasure-correcting codes) together with gossip protocols for a robust and fast content dissemination in large-scale dynamic systems. The use of fountain enables to eliminate the unnecessary redundancy of gossip protocols. We propose the design of FOG, which fully exploits the first exponential growth phase (where the data is disseminated exponentially fast) of gossip protocols while avoiding the need for the shrinking phase by using fountain codes. FOG voluntarily increases the number of disseminations but limits those disseminations to the exponential growth phase. In addition, FOG creates a split-graph overlay that splits the peers between encoders and forwarders. Forwarder peers become encoders as soon as they have received the whole content. In order to benefit even further and quicker from encoders, FOG biases the dissemination towards the most advanced peers to make them complete earlier.

  6. Phytohormone supplementation significantly increases growth of Chlamydomonas reinhardtii cultivated for biodiesel production.

    Science.gov (United States)

    Park, Won-Kun; Yoo, Gursong; Moon, Myounghoon; Kim, Chul Woong; Choi, Yoon-E; Yang, Ji-Won

    2013-11-01

    Cultivation is the most expensive step in the production of biodiesel from microalgae, and substantial research has been devoted to developing more cost-effective cultivation methods. Plant hormones (phytohormones) are chemical messengers that regulate various aspects of growth and development and are typically active at very low concentrations. In this study, we investigated the effect of different phytohormones on microalgal growth and biodiesel production in Chlamydomonas reinhardtii and their potential to lower the overall cost of commercial biofuel production. The results indicated that all five of the tested phytohormones (indole-3-acetic acid, gibberellic acid, kinetin, 1-triacontanol, and abscisic acid) promoted microalgal growth. In particular, hormone treatment increased biomass production by 54 to 69 % relative to the control growth medium (Tris-acetate-phosphate, TAP). Phytohormone treatments also affected microalgal cell morphology but had no effect on the yields of fatty acid methyl esters (FAMEs) as a percent of biomass. We also tested the effect of these phytohormones on microalgal growth in nitrogen-limited media by supplementation in the early stationary phase. Maximum cell densities after addition of phytohormones were higher than in TAP medium, even when the nitrogen source was reduced to 40 % of that in TAP medium. Taken together, our results indicate that phytohormones significantly increased microalgal growth, particularly in nitrogen-limited media, and have potential for use in the development of efficient microalgal cultivation for biofuel production.

  7. A Cryptographic Moving-Knife Cake-Cutting Protocol

    Directory of Open Access Journals (Sweden)

    Yoshifumi Manabe

    2012-02-01

    Full Text Available This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum.

  8. Development of a manualized protocol of massage therapy for clinical trials in osteoarthritis

    Directory of Open Access Journals (Sweden)

    Ali Ather

    2012-10-01

    Full Text Available Abstract Background Clinical trial design of manual therapies may be especially challenging as techniques are often individualized and practitioner-dependent. This paper describes our methods in creating a standardized Swedish massage protocol tailored to subjects with osteoarthritis of the knee while respectful of the individualized nature of massage therapy, as well as implementation of this protocol in two randomized clinical trials. Methods The manualization process involved a collaborative process between methodologic and clinical experts, with the explicit goals of creating a reproducible semi-structured protocol for massage therapy, while allowing some latitude for therapists’ clinical judgment and maintaining consistency with a prior pilot study. Results The manualized protocol addressed identical specified body regions with distinct 30- and 60-min protocols, using standard Swedish strokes. Each protocol specifies the time allocated to each body region. The manualized 30- and 60-min protocols were implemented in a dual-site 24-week randomized dose-finding trial in patients with osteoarthritis of the knee, and is currently being implemented in a three-site 52-week efficacy trial of manualized Swedish massage therapy. In the dose-finding study, therapists adhered to the protocols and significant treatment effects were demonstrated. Conclusions The massage protocol was manualized, using standard techniques, and made flexible for individual practitioner and subject needs. The protocol has been applied in two randomized clinical trials. This manualized Swedish massage protocol has real-world utility and can be readily utilized both in the research and clinical settings. Trial registration Clinicaltrials.gov NCT00970008 (18 August 2009

  9. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... active and adaptive corruptions in the random oracle model. Due to its simplicity, the protocol is extremely efficient and it allows to perform m 1-out-of-n OTs using only: - Computation: (n+1)m+2 exponentiations (mn for the receiver, mn+2 for the sender) and - Communication: 32(m+1) bytes (for the group...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  10. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  11. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  12. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  13. Light-driven photosensitizer uptake increases Candida albicans photodynamic inactivation.

    Science.gov (United States)

    Romano, Renan A; Pratavieira, Sebastião; Silva, Ana P da; Kurachi, Cristina; Guimarães, Francisco E G

    2017-11-01

    Photodynamic Inactivation (PDI) is based on the use of a photosensitizer (PS) and light that results mainly in the production of reactive oxygen species, aiming to produce microorganism cell death. PS incubation time and light dose are key protocol parameters that influence PDI response; the correct choice of them can increase the efficiency of inactivation. The results of this study show that a minor change in the PDI protocol, namely light-driven incubation leads to a higher photosensitizer and more uniform cell uptake inside the irradiated zone. Furthermore, as the uptake increases, the damage caused by PDI also increases. The proposed light-driven incubation prior to the inactivation illumination dose has advantages when compared to the traditional PDI treatments since it can be more selective and effective. Using a violet light as pre-illumination (light-driven incubation) source and a red-light system as PDI source, it was possible to demonstrate that when compared to the traditional protocol of dark incubation, the pre-illuminated cell culture showed an inactivation increase of 7 log units. These in vitro results performed in Candida albicans cells may result in the introduction of a new protocol for PDI. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  14. On TCP-based Session Initiation Protocol (SIP) Server Overload Control

    OpenAIRE

    Shen, Charles; Schulzrinne, Henning

    2010-01-01

    The Session Initiation Protocol (SIP) server overload management has attracted interest since SIP is being widely deployed in the Next Generation Networks (NGN) as a core signaling protocol. Yet all existing SIP overload control work is focused on SIP-over-UDP, despite the fact that TCP is increasingly seen as the more viable choice of SIP transport. This paper answers the following questions: is the existing TCP flow control capable of handling the SIP overload problem? If not, why and how c...

  15. Asymptotic adaptive bipartite entanglement-distillation protocol

    International Nuclear Information System (INIS)

    Hostens, Erik; Dehaene, Jeroen; De Moor, Bart

    2006-01-01

    We present an asymptotic bipartite entanglement-distillation protocol that outperforms all existing asymptotic schemes. This protocol is based on the breeding protocol with the incorporation of two-way classical communication. Like breeding, the protocol starts with an infinite number of copies of a Bell-diagonal mixed state. Breeding can be carried out as successive stages of partial information extraction, yielding the same result: one bit of information is gained at the cost (measurement) of one pure Bell state pair (ebit). The basic principle of our protocol is at every stage to replace measurements on ebits by measurements on a finite number of copies, whenever there are two equiprobable outcomes. In that case, the entropy of the global state is reduced by more than one bit. Therefore, every such replacement results in an improvement of the protocol. We explain how our protocol is organized as to have as many replacements as possible. The yield is then calculated for Werner states

  16. Microdose gonadotropin-releasing hormone agonist flare-up protocol versus multiple dose gonadotropin-releasing hormone antagonist protocol in poor responders undergoing intracytoplasmic sperm injection-embryo transfer cycle.

    Science.gov (United States)

    Kahraman, Korhan; Berker, Bulent; Atabekoglu, Cem Somer; Sonmezer, Murat; Cetinkaya, Esra; Aytac, Rusen; Satiroglu, Hakan

    2009-06-01

    To compare the efficacy of microdose GnRH agonist (GnRH-a) flare-up and multiple dose GnRH antagonist protocols in patients who have a poor response to a long luteal GnRH-a protocol. Prospective, randomized, clinical study. University hospital. Forty-two poor responder patients undergoing intracytoplasmic sperm injection (ICSI)-embryo transfer cycle. Twenty-one patients received microdose leuprolide acetate (LA) (50 microg twice daily) starting on the second day of withdrawal bleeding. The other 21 patients received 0.25 mg of cetrorelix daily when the leading follicle reached 14 mm in diameter. Serum E(2) levels, number of growing follicles and mature oocytes, embryo quality, dose of gonadotropin used, cancellation, fertilization, implantation rate and pregnancy rate (PR). The mean serum E(2) concentration on the day of hCG administration was significantly higher in the microdose GnRH-a group than in the GnRH antagonist group (1,904 vs. 1,362 pg/mL). The clinical PRs per started cycle of microdose GnRH-a and GnRH antagonist groups were 14.2% and 9.5%, respectively. There were no statistically significant differences in the other ovulation induction characteristics, fertilization and implantation rates. Microdose GnRH-a flare-up protocol and multiple dose GnRH antagonist protocol seem to have similar efficacy in improving treatment outcomes of poor responder patients.

  17. Protocol Monitoring Energy Conservation; Protocol Monitoring Energiebesparing

    Energy Technology Data Exchange (ETDEWEB)

    Boonekamp, P.G.M. [ECN Beleidsstudies, Petten (Netherlands); Mannaerts, H. [Centraal Planburea CPB, Den Haag (Netherlands); Tinbergen, W. [Centraal Bureau voor de Statistiek CBS, Den Haag (Netherlands); Vreuls, H.H.J. [Nederlandse onderneming voor energie en milieu Novem, Utrecht (Netherlands); Wesselink, B. [Rijksinstituut voor Volksgezondheid en Milieuhygiene RIVM, Bilthoven (Netherlands)

    2001-12-01

    On request of the Dutch ministry of Economic Affairs five institutes have collaborated to create a 'Protocol Monitoring Energy Conservation', a common method and database to calculate the amount of energy savings realised in past years. The institutes concerned are the Central Bureau of Statistics (CBS), the Netherlands Bureau for Economic Policy Analysis (CPB), the Energy research Centre of the Netherlands (ECN), the National Agency for Energy and Environment (Novem) and the Netherlands Institute of Public Health and the Environment (RIVM). The institutes have agreed upon a clear definition of energy use and energy savings. The demarcation with renewable energy, the saving effects of substitution between energy carriers and the role of import and export of energy have been elaborated. A decomposition method is used to split up the observed change in energy use in a number of effects, on a national and sectoral level. This method includes an analysis of growth effects, effects of structural changes in production and consumption activities and savings on end use or with more efficient conversion processes. To calculate these effects the total energy use is desegregated as much as possible. For each segment a reference energy use is calculated according to the trend in a variable which is supposed to be representative for the use without savings. The difference with the actual energy use is taken as the savings realised. Results are given for the sectors households, industry, agriculture, services and government, transportation and the energy sector; as well as a national figure. A special feature of the protocol method is the application of primary energy use figures in the determination of savings for end users. This means that the use of each energy carrier is increased with a certain amount, according to the conversion losses caused elsewhere in the energy system. The losses concern the base year energy sector and losses abroad for imports of secondary

  18. Impact of a pain protocol including hypnosis in major burns.

    Science.gov (United States)

    Berger, Mette M; Davadant, Maryse; Marin, Christian; Wasserfallen, Jean-Blaise; Pinget, Christophe; Maravic, Philippe; Koch, Nathalie; Raffoul, Wassim; Chiolero, René L

    2010-08-01

    Pain is a major issue after burns even when large doses of opioids are prescribed. The study focused on the impact of a pain protocol using hypnosis on pain intensity, anxiety, clinical course, and costs. All patients admitted to the ICU, aged >18 years, with an ICU stay >24h, accepting to try hypnosis, and treated according to standardized pain protocol were included. Pain was scaled on the Visual Analog Scale (VAS) (mean of daily multiple recordings), and basal and procedural opioid doses were recorded. Clinical outcome and economical data were retrieved from hospital charts and information system, respectively. Treated patients were matched with controls for sex, age, and the burned surface area. Forty patients were admitted from 2006 to 2007: 17 met exclusion criteria, leaving 23 patients, who were matched with 23 historical controls. Altogether patients were 36+/-14 years old and burned 27+/-15%BSA. The first hypnosis session was performed after a median of 9 days. The protocol resulted in the early delivery of higher opioid doses/24h (ppatient. A pain protocol including hypnosis reduced pain intensity, improved opioid efficiency, reduced anxiety, improved wound outcome while reducing costs. The protocol guided use of opioids improved patient care without side effects, while hypnosis had significant psychological benefits.

  19. ASSESSMENT OF RIP-V1 AND OSPF-V2 PROTOCOL WITH CONSIDERATION OF CONVERGENCE CRITERIA AND SENDING PROTOCOLS TRAFFIC

    Directory of Open Access Journals (Sweden)

    Hamed Jelodar

    2014-03-01

    Full Text Available Routing Protocols are underlying principles in networks like internet, transport and mobile. Routing Protocols include a series of rules and algorithms that consider routing metric and select the best way for sending healthy data packets from origin to destination. Dynamic routing protocol compatible to topology has a changeable state. RIP and OSPF are dynamic routing protocol that we consider criteria like convergence and sending protocols traffic assessment RIP first version and OSPF second version. By the test we have done on OPNET stimulation we understood that the OSPF protocol was more efficient than RIP protocol.

  20. Standardization of a Videofluoroscopic Swallow Study Protocol to Investigate Dysphagia in Dogs.

    Science.gov (United States)

    Harris, R A; Grobman, M E; Allen, M J; Schachtel, J; Rawson, N E; Bennett, B; Ledyayev, J; Hopewell, B; Coates, J R; Reinero, C R; Lever, T E

    2017-03-01

    Videofluoroscopic swallow study (VFSS) is the gold standard for diagnosis of dysphagia in veterinary medicine but lacks standardized protocols that emulate physiologic feeding practices. Age impacts swallow function in humans but has not been evaluated by VFSS in dogs. To develop a protocol with custom kennels designed to allow free-feeding of 3 optimized formulations of contrast media and diets that address limitations of current VFSS protocols. We hypothesized that dogs evaluated by a free-feeding VFSS protocol would show differences in objective swallow metrics based on age. Healthy juvenile, adult, and geriatric dogs (n = 24). Prospective, experimental study. Custom kennels were developed to maintain natural feeding behaviors during VFSS. Three food consistencies (thin liquid, pureed food, and dry kibble) were formulated with either iohexol or barium to maximize palatability and voluntary prehension. Dogs were evaluated by 16 swallow metrics and compared across age groups. Development of a standardized VFSS protocol resulted in successful collection of swallow data in healthy dogs. No significant differences in swallow metrics were observed among age groups. Substantial variability was observed in healthy dogs when evaluated under these physiologic conditions. Features typically attributed to pathologic states, such as gastric reflux, were seen in healthy dogs. Development of a VFSS protocol that reflects natural feeding practices may allow emulation of physiology resulting in clinical signs of dysphagia. Age did not result in significant changes in swallow metrics, but additional studies are needed, particularly in light of substantial normal variation. Copyright © 2017 The Authors. Journal of Veterinary Internal Medicine published by Wiley Periodicals, Inc. on behalf of the American College of Veterinary Internal Medicine.

  1. Minimizing transfusion requirements for children undergoing craniosynostosis repair: the CHoR protocol.

    Science.gov (United States)

    Vega, Rafael A; Lyon, Camila; Kierce, Jeannette F; Tye, Gary W; Ritter, Ann M; Rhodes, Jennifer L

    2014-08-01

    Children with craniosynostosis may require cranial vault remodeling to prevent or relieve elevated intracranial pressure and to correct the underlying craniofacial abnormalities. The procedure is typically associated with significant blood loss and high transfusion rates. The risks associated with transfusions are well documented and include transmission of infectious agents, bacterial contamination, acute hemolytic reactions, transfusion-related lung injury, and transfusion-related immune modulation. This study presents the Children's Hospital of Richmond (CHoR) protocol, which was developed to reduce the rate of blood transfusion in infants undergoing primary craniosynostosis repair. A retrospective chart review of pediatric patients treated between January 2003 and Febuary 2012 was performed. The CHoR protocol was instituted in November 2008, with the following 3 components; 1) the use of preoperative erythropoietin and iron therapy, 2) the use of an intraoperative blood recycling device, and 3) acceptance of a lower level of hemoglobin as a trigger for transfusion (protocol implementation served as controls. A total of 60 children were included in the study, 32 of whom were treated with the CHoR protocol. The control (C) and protocol (P) groups were comparable with respect to patient age (7 vs 8.4 months, p = 0.145). Recombinant erythropoietin effectively raised the mean preoperative hemoglobin level in the P group (12 vs 9.7 g/dl, p protocol that includes preoperative administration of recombinant erythropoietin, intraoperative autologous blood recycling, and accepting a lower transfusion trigger significantly decreased transfusion utilization (p < 0.001). A decreased length of stay (p < 0.001) was seen, although the authors did not investigate whether composite transfusion complication reductions led to better outcomes.

  2. The characteristics and prognosis of patients fulfilling the Appropriateness Evaluation Protocol in a medical admission unit; a prospective observational study

    DEFF Research Database (Denmark)

    Brabrand, Mikkel; Knudsen, Torben; Hallas, Jesper

    2011-01-01

    To examine the prognostic significance of fulfilling at least one of the Appropriateness Evaluation Protocol (AEP) criteria.......To examine the prognostic significance of fulfilling at least one of the Appropriateness Evaluation Protocol (AEP) criteria....

  3. Influence of pre-anaesthetic thoracic radiographs on ASA physical status classification and anaesthetic protocols in traumatized dogs and cats

    International Nuclear Information System (INIS)

    Sigrist, N.; Mosing, M.; Iff, I.; Larenza, M.P.; Lang, J.; Spreng, D.

    2008-01-01

    The purpose of this study was to evaluate if pre-anaesthetic thoracic radiographs contribute to the anaesthetic management of trauma patients by comparing American Society of Anesthesiologists Physical Status Classification (ASA grade) with and without information from thoracic radiography findings. Case records of 157 dogs and cats being anaesthetized with or without post-traumatic, pre-anaesthetic chest radiographs were retrospectively evaluated for clinical parameters, radiographic abnormalities and anaesthetic protocol. Animals were retrospectively assigned an ASA grade. ASA grades, clinical signs of respiratory abnormalities and anaesthesia protocols were compared between animals with and without chest radiographs. The group of animals without pre-anaesthetic radiographs was anaesthetized earlier after trauma and showed less respiratory abnormalities at presentation. The retrospectively evaluated ASA grade significantly increased with the information from thoracic radiography. Animals with a higher ASA grade were less frequently mechanically ventilated. Pre-anaesthetic radiographs may provide important information to assess the ASA grade in traumatized patients and may therefore influence the anesthesia protocol

  4. Effects of Modification of Pain Protocol on Incidence of Post Operative Nausea and Vomiting.

    Science.gov (United States)

    Schwarzkopf, Ran; Snir, Nimrod; Sharfman, Zachary T; Rinehart, Joseph B; Calderon, Michael-David; Bahn, Esther; Harrington, Brian; Ahn, Kyle

    2016-01-01

    A Perioperative Surgical Home (PSH) care model applies a standardized multidisciplinary approach to patient care using evidence-based medicine to modify and improve protocols. Analysis of patient outcome measures, such as postoperative nausea and vomiting (PONV), allows for refinement of existing protocols to improve patient care. We aim to compare the incidence of PONV in patients who underwent primary total joint arthroplasty before and after modification of our PSH pain protocol. All total joint replacement PSH (TJR-PSH) patients who underwent primary THA (n=149) or TKA (n=212) in the study period were included. The modified protocol added a single dose of intravenous (IV) ketorolac given in the operating room and oxycodone immediate release orally instead of IV Hydromorphone in the Post Anesthesia Care Unit (PACU). The outcomes were (1) incidence of PONV and (2) average pain score in the PACU. We also examined the effect of primary anesthetic (spinal vs . GA) on these outcomes. The groups were compared using chi-square tests of proportions. The incidence of post-operative nausea in the PACU decreased significantly with the modified protocol (27.4% vs . 38.1%, p=0.0442). There was no difference in PONV based on choice of anesthetic or procedure. Average PACU pain scores did not differ significantly between the two protocols. Simple modifications to TJR-PSH multimodal pain management protocol, with decrease in IV narcotic use, resulted in a lower incidence of postoperative nausea, without compromising average PACU pain scores. This report demonstrates the need for continuous monitoring of PSH pathways and implementation of revisions as needed.

  5. Microplastics in seafood: Benchmark protocol for their extraction and characterization.

    Science.gov (United States)

    Dehaut, Alexandre; Cassone, Anne-Laure; Frère, Laura; Hermabessiere, Ludovic; Himber, Charlotte; Rinnert, Emmanuel; Rivière, Gilles; Lambert, Christophe; Soudant, Philippe; Huvet, Arnaud; Duflos, Guillaume; Paul-Pont, Ika

    2016-08-01

    Pollution of the oceans by microplastics (studies have investigated the level of contamination of marine organisms collected in situ. For extraction and characterization of microplastics in biological samples, the crucial step is the identification of solvent(s) or chemical(s) that efficiently dissolve organic matter without degrading plastic polymers for their identification in a time and cost effective way. Most published papers, as well as OSPAR recommendations for the development of a common monitoring protocol for plastic particles in fish and shellfish at the European level, use protocols containing nitric acid to digest the biological tissues, despite reports of polyamide degradation with this chemical. In the present study, six existing approaches were tested and their effects were compared on up to 15 different plastic polymers, as well as their efficiency in digesting biological matrices. Plastic integrity was evaluated through microscopic inspection, weighing, pyrolysis coupled with gas chromatography and mass spectrometry, and Raman spectrometry before and after digestion. Tissues from mussels, crabs and fish were digested before being filtered on glass fibre filters. Digestion efficiency was evaluated through microscopical inspection of the filters and determination of the relative removal of organic matter content after digestion. Five out of the six tested protocols led to significant degradation of plastic particles and/or insufficient tissue digestion. The protocol using a KOH 10% solution and incubation at 60 °C during a 24 h period led to an efficient digestion of biological tissues with no significant degradation on all tested polymers, except for cellulose acetate. This protocol appeared to be the best compromise for extraction and later identification of microplastics in biological samples and should be implemented in further monitoring studies to ensure relevance and comparison of environmental and seafood product quality studies

  6. Streetlight Control System Based on Wireless Communication over DALI Protocol

    Directory of Open Access Journals (Sweden)

    Francisco José Bellido-Outeiriño

    2016-04-01

    Full Text Available Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed.

  7. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  8. Effects of two aerobic exercise training protocols on parameters of oxidative stress in the blood and liver of obese rats.

    Science.gov (United States)

    Delwing-de Lima, Daniela; Ulbricht, Ariene Sampaio Souza Farias; Werlang-Coelho, Carla; Delwing-Dal Magro, Débora; Joaquim, Victor Hugo Antonio; Salamaia, Eloise Mariani; de Quevedo, Silvana Rodrigues; Desordi, Larissa

    2017-12-08

    We evaluated the effects of moderate-intensity continuous training (MICT) and high-intensity interval training (HIIT) protocols on the alterations in oxidative stress parameters caused by a high-fat diet (HFD), in the blood and liver of rats. The HFD enhanced thiobarbituric acid reactive substances (TBA-RS) and protein carbonyl content, while reducing total sulfhydryl content and catalase (CAT) and glutathione peroxidase (GSH-Px) activities in the blood. Both training protocols prevented an increase in TBA-RS and protein carbonyl content, and prevented a reduction in CAT. HIIT protocol enhanced SOD activity. In the liver, HFD didn't alter TBA-RS, total sulfhydryl content or SOD, but increased protein carbonyl content and CAT and decreased GSH-Px. The exercise protocols prevented the increase in protein carbonyl content and the MICT protocol prevented an alteration in CAT. In conclusion, HFD elicits oxidative stress in the blood and liver and both protocols prevented most of the alterations in the oxidative stress parameters.

  9. Increasing the statistical significance of entanglement detection in experiments

    Energy Technology Data Exchange (ETDEWEB)

    Jungnitsch, Bastian; Niekamp, Soenke; Kleinmann, Matthias; Guehne, Otfried [Institut fuer Quantenoptik und Quanteninformation, Innsbruck (Austria); Lu, He; Gao, Wei-Bo; Chen, Zeng-Bing [Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics, University of Science and Technology of China, Hefei (China); Chen, Yu-Ao; Pan, Jian-Wei [Hefei National Laboratory for Physical Sciences at Microscale and Department of Modern Physics, University of Science and Technology of China, Hefei (China); Physikalisches Institut, Universitaet Heidelberg (Germany)

    2010-07-01

    Entanglement is often verified by a violation of an inequality like a Bell inequality or an entanglement witness. Considerable effort has been devoted to the optimization of such inequalities in order to obtain a high violation. We demonstrate theoretically and experimentally that such an optimization does not necessarily lead to a better entanglement test, if the statistical error is taken into account. Theoretically, we show for different error models that reducing the violation of an inequality can improve the significance. We show this to be the case for an error model in which the variance of an observable is interpreted as its error and for the standard error model in photonic experiments. Specifically, we demonstrate that the Mermin inequality yields a Bell test which is statistically more significant than the Ardehali inequality in the case of a photonic four-qubit state that is close to a GHZ state. Experimentally, we observe this phenomenon in a four-photon experiment, testing the above inequalities for different levels of noise.

  10. [Computerized clinical protocol for occlusion].

    Science.gov (United States)

    Salsench, J; Ferrer, J; Nogueras, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself. In this work we all data collected in the protocol and we give the explanations of each concept.

  11. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  12. 30 : 2: A Game Designed to Promote the Cardiopulmonary Resuscitation Protocol

    Directory of Open Access Journals (Sweden)

    Imma Boada

    2016-01-01

    Full Text Available Cardiopulmonary resuscitation (CPR is a first-aid key survival technique used to stimulate breathing and keep blood flowing to the heart. Its effective administration can significantly increase the survival chances of cardiac arrest victims. We propose 30 : 2, a videogame designed to introduce the main steps of the CPR protocol. It is not intended for certification and training purpose. Driven by the 2010 European Resuscitation Council guidelines we have designed a game composed of eight mini games corresponding to the main steps of the protocol. The player acts as a helper and has to solve a different challenge. We present a detailed description of the game creation process presenting the requirements, the design decisions, and the implementation details. In addition, we present some first impressions of our testing users (25 children, five of each age from 8 to 12 years old and 12 males and 13 females. We evaluated clarity of instructions and three settings of the game: the aesthetics of scenarios, the playability, and the enjoyability of each mini game. All games were well punctuated, and there are no significantly differences between their sex. The proposed game can be a suitable tool to disseminate and promote CPR knowledge.

  13. Evaluation of image-guidance protocols in the treatment of head and neck cancers

    International Nuclear Information System (INIS)

    Zeidan, Omar A.; Langen, Katja M.; Meeks, Sanford L.; Manon, Rafael R.; Wagner, Thomas H.; Willoughby, Twyla R.; Jenkins, D. Wayne; Kupelian, Patrick A.

    2007-01-01

    Purpose: The aim of this study was to assess the residual setup error of different image-guidance (IG) protocols in the alignment of patients with head and neck cancer. The protocols differ in the percentage of treatment fractions that are associated with image guidance. Using data from patients who were treated with daily IG, the residual setup errors for several different protocols are retrospectively calculated. Methods and Materials: Alignment data from 24 patients (802 fractions) treated with daily IG on a helical tomotherapy unit were analyzed. The difference between the daily setup correction and the setup correction that would have been made according to a specific protocol was used to calculate the residual setup errors for each protocol. Results: The different protocols are generally effective in reducing systematic setup errors. Random setup errors are generally not reduced for fractions that are not image guided. As a consequence, if every other treatment is image guided, still about 11% of all treatments (IG and not IG) are subject to three-dimensional setup errors of at least 5 mm. This frequency increases to about 29% if setup errors >3 mm are scored. For various protocols that require 15% to 31% of the treatments to be image guided, from 50% to 60% and from 26% to 31% of all fractions are subject to setup errors >3 mm and >5 mm, respectively. Conclusion: Residual setup errors reduce with increasing frequency of IG during the course of external-beam radiotherapy for head-and-neck cancer patients. The inability to reduce random setup errors for fractions that are not image guided results in notable residual setup errors

  14. Continuous sweep versus discrete step protocols for studying effects of wearable robot assistance magnitude.

    Science.gov (United States)

    Malcolm, Philippe; Rossi, Denise Martineli; Siviy, Christopher; Lee, Sangjun; Quinlivan, Brendan Thomas; Grimmer, Martin; Walsh, Conor J

    2017-07-12

    Different groups developed wearable robots for walking assistance, but there is still a need for methods to quickly tune actuation parameters for each robot and population or sometimes even for individual users. Protocols where parameters are held constant for multiple minutes have traditionally been used for evaluating responses to parameter changes such as metabolic rate or walking symmetry. However, these discrete protocols are time-consuming. Recently, protocols have been proposed where a parameter is changed in a continuous way. The aim of the present study was to compare effects of continuously varying assistance magnitude with a soft exosuit against discrete step conditions. Seven participants walked on a treadmill wearing a soft exosuit that assists plantarflexion and hip flexion. In Continuous-up, peak exosuit ankle moment linearly increased from approximately 0 to 38% of biological moment over 10 min. Continuous-down was the opposite. In Discrete, participants underwent five periods of 5 min with steady peak moment levels distributed over the same range as Continuous-up and Continuous-down. We calculated metabolic rate for the entire Continuous-up and Continuous-down conditions and the last 2 min of each Discrete force level. We compared kinematics, kinetics and metabolic rate between conditions by curve fitting versus peak moment. Reduction in metabolic rate compared to Powered-off was smaller in Continuous-up than in Continuous-down at most peak moment levels, due to physiological dynamics causing metabolic measurements in Continuous-up and Continuous-down to lag behind the values expected during steady-state testing. When evaluating the average slope of metabolic reduction over the entire peak moment range there was no significant difference between Continuous-down and Discrete. Attempting to correct the lag in metabolics by taking the average of Continuous-up and Continuous-down removed all significant differences versus Discrete. For kinematic and

  15. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  16. Group covariant protocols for quantum string commitment

    International Nuclear Information System (INIS)

    Tsurumaru, Toyohiro

    2006-01-01

    We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next using this result, we prove that for every irreducible representation of a finite group, there always exists a corresponding nontrivial QSC protocol which reaches a level of security impossible to achieve classically

  17. Families of quantum fingerprinting protocols

    Science.gov (United States)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  18. Milrinone and homeostasis to treat cerebral vasospasm associated with subarachnoid hemorrhage: the Montreal Neurological Hospital protocol.

    Science.gov (United States)

    Lannes, Marcelo; Teitelbaum, Jeanne; del Pilar Cortés, Maria; Cardoso, Mauro; Angle, Mark

    2012-06-01

    For the treatment of cerebral vasospasm, current therapies have focused on increasing blood flow through blood pressure augmentation, hypervolemia, the use of intra-arterial vasodilators, and angioplasty of proximal cerebral vessels. Through a large case series, we present our experience of treating cerebral vasospasm with a protocol based on maintenance of homeostasis (correction of electrolyte and glucose disturbances, prevention and treatment of hyperthermia, replacement of fluid losses), and the use of intravenous milrinone to improve microcirculation (the Montreal Neurological Hospital protocol). Our objective is to describe the use milrinone in our practice and the neurological outcomes associated with this approach. Large case series based on the review of all patients diagnosed with delayed ischemic neurologic deficits after aneurysmal subarachnoid hemorrhage between April 1999 and April 2006. 88 patients were followed for a mean time of 44.6 months. An intravenous milrinone infusion was used for a mean of 9.8 days without any significant side effects. No medical complications associated with this protocol were observed. There were five deaths; of the surviving patients, 48.9 % were able to go back to their previous baseline and 75 % had a good functional outcome (modified Rankin scale ≤ 2). A protocol using intravenous milrinone, and the maintenance of homeostasis is simple to use and requires less intensive monitoring and resources than the standard triple H therapy. Despite the obvious limitations of this study's design, we believe that it would be now appropriate to proceed with formal prospective studies of this protocol.

  19. Three-Stage Quantum Cryptography Protocol under Collective-Rotation Noise

    Directory of Open Access Journals (Sweden)

    Linsen Wu

    2015-05-01

    Full Text Available Information security is increasingly important as society migrates to the information age. Classical cryptography widely used nowadays is based on computational complexity, which means that it assumes that solving some particular mathematical problems is hard on a classical computer. With the development of supercomputers and, potentially, quantum computers, classical cryptography has more and more potential risks. Quantum cryptography provides a solution which is based on the Heisenberg uncertainty principle and no-cloning theorem. While BB84-based quantum protocols are only secure when a single photon is used in communication, the three-stage quantum protocol is multi-photon tolerant. However, existing analyses assume perfect noiseless channels. In this paper, a multi-photon analysis is performed for the three-stage quantum protocol under the collective-rotation noise model. The analysis provides insights into the impact of the noise level on a three-stage quantum cryptography system.

  20. Generation of insulin-producing cells from human bone marrow-derived mesenchymal stem cells: comparison of three differentiation protocols.

    Science.gov (United States)

    Gabr, Mahmoud M; Zakaria, Mahmoud M; Refaie, Ayman F; Khater, Sherry M; Ashamallah, Sylvia A; Ismail, Amani M; El-Badri, Nagwa; Ghoneim, Mohamed A

    2014-01-01

    Many protocols were utilized for directed differentiation of mesenchymal stem cells (MSCs) to form insulin-producing cells (IPCs). We compared the relative efficiency of three differentiation protocols. Human bone marrow-derived MSCs (HBM-MSCs) were obtained from three insulin-dependent type 2 diabetic patients. Differentiation into IPCs was carried out by three protocols: conophylline-based (one-step protocol), trichostatin-A-based (two-step protocol), and β -mercaptoethanol-based (three-step protocol). At the end of differentiation, cells were evaluated by immunolabeling for insulin production, expression of pancreatic endocrine genes, and release of insulin and c-peptide in response to increasing glucose concentrations. By immunolabeling, the proportion of generated IPCs was modest ( ≃ 3%) in all the three protocols. All relevant pancreatic endocrine genes, insulin, glucagon, and somatostatin, were expressed. There was a stepwise increase in insulin and c-peptide release in response to glucose challenge, but the released amounts were low when compared with those of pancreatic islets. The yield of functional IPCs following directed differentiation of HBM-MSCs was modest and was comparable among the three tested protocols. Protocols for directed differentiation of MSCs need further optimization in order to be clinically meaningful. To this end, addition of an extracellular matrix and/or a suitable template should be attempted.

  1. Role of humidity and other correction factors in the AAPM TG-21 dosimetry protocol

    International Nuclear Information System (INIS)

    Rogers, D.W.; Ross, C.K.

    1988-01-01

    A detailed derivation is presented of the formulas required to determine Ngas and Dmed in the AAPM TG-21 dosimetry protocol. This protocol specifies how to determine the absorbed dose in an electron or photon beam when using exposure or absorbed dose calibrated ion chambers. It is shown that the expression given in TG-21's recent letter of clarification is incorrect. Accounting for humidity correctly increases, by 0.4%, all absorbed dose determinations using an exposure calibrated ion chamber. Taking into account other correction factors in the equation for exposure could also have varying, but significant effects (possibly over 1%). These are the stem scatter correction, the axial nonuniformity correction and the electrode correction for electrodes made of different materials from the wall. Attention is drawn to differences in the definitions of the exposure and absorbed dose calibration factors, Nx and ND, respectively, as supplied by the NBS and the NRCC

  2. Standardized CT protocols and nomenclature: better, but not yet there

    Energy Technology Data Exchange (ETDEWEB)

    Singh, Sarabjeet; Kalra, Mannudeep K. [Harvard Medical School, Department of Radiology, Massachusetts General Hospital, Boston, MA (United States)

    2014-10-15

    Radiation dose associated with CT is an important safety concern in patient care, especially in children. Technical advancements in multidetector-row CT scanner technology offer several advantages for clinical applications; these advancements have considerably increased CT utilization and enhanced the complexity of CT scanning protocols. Furthermore there are several scan manufacturers spearheading these technical advancements, leading to different commercial names causing confusion among the users, especially at imaging sites with scanners from different vendors. Several scientific studies and the National Council on Radiation Protection and Measurements (NCRP) have shown variation in CT radiation doses for same body region and similar scanning protocols. Therefore there is a need for standardization of scanning protocols and nomenclature of scan parameters. The following material reviews the status and challenges in standardization of CT scanning and nomenclature. (orig.)

  3. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  4. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  5. Evaluation of Introduction of a Delayed Cord Clamping Protocol for Premature Neonates in a High-Volume Maternity Center.

    Science.gov (United States)

    Liu, Lilly Y; Feinglass, Joe M; Khan, Janine Y; Gerber, Susan E; Grobman, William A; Yee, Lynn M

    2017-05-01

    To evaluate adherence to a delayed cord clamping protocol for preterm births in the first 2 years after its introduction, perform a quality improvement assessment, and determine neonatal outcomes associated with protocol implementation and adherence. This is a retrospective cohort study of women delivering singleton neonates at 23-32 weeks of gestation in the 2 years before (preprotocol) and 2 years after (postprotocol) introduction of a 30-second delayed cord clamping protocol at a large-volume academic center. This policy was communicated to obstetric and pediatric health care providers and nurses and reinforced with intermittent educational reviews. Barriers to receiving delayed cord clamping were assessed using χ tests and multivariable logistic regression. Neonatal outcomes then were compared between all neonates in the preprotocol period and all neonates in the postprotocol period and between all neonates in the preprotocol period and neonates receiving delayed cord clamping in the postprotocol period using multivariable linear and logistic regression analyses. Of the 427 eligible neonates, 187 were born postprotocol. Of these, 53.5% (n=100) neonates received delayed cord clamping according to the protocol. The rate of delayed cord clamping preprotocol was 0%. Protocol uptake and frequency of delayed cord clamping increased over the 2 years after its introduction. In the postprotocol period, cesarean delivery was the only factor independently associated with failing to receive delayed cord clamping (adjusted odds ratio [OR] 0.49, 95% confidence interval [CI] 0.25-0.96). In comparison with the preprotocol period, those who received delayed cord clamping in the postprotocol period had significantly higher birth hematocrit (β=2.46, P=.007) and fewer blood transfusions in the first week of life (adjusted OR 0.49, 95% CI 0.25-0.96). After introduction of an institutional delayed cord clamping protocol followed by continued health care provider education and

  6. Effectiveness of oxaliplatin desensitization protocols.

    Science.gov (United States)

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  7. Declarative Specification of Fault Tolerant Auction Protocols: The English Auction Case Study

    DEFF Research Database (Denmark)

    Dragoni, Nicola; Gaspari, Mauro

    2012-01-01

    Auction mechanisms are nowadays widely used in electronic commerce Web sites for buying and selling items among different users. The increasing importance of auction protocols in the negotiation phase is not limited to online marketplaces. In fact, the wide applicability of auctions as resource‐a...... about the specification of an English Auction protocol which tolerate crashes of bidding agents and we discuss its properties....

  8. Prospective trial of angiography and embolization for all grade III to V blunt splenic injuries: nonoperative management success rate is significantly improved.

    Science.gov (United States)

    Miller, Preston R; Chang, Michael C; Hoth, J Jason; Mowery, Nathan T; Hildreth, Amy N; Martin, R Shayn; Holmes, James H; Meredith, J Wayne; Requarth, Jay A

    2014-04-01

    Nonoperative management (NOM) of blunt splenic injury is well accepted. Substantial failure rates in higher injury grades remain common, with one large study reporting rates of 19.6%, 33.3%, and 75% for grades III, IV, and V, respectively. Retrospective data show angiography and embolization can increase salvage rates in these severe injuries. We developed a protocol requiring referral of all blunt splenic injuries, grades III to V, without indication for immediate operation for angiography and embolization. We hypothesized that angiography and embolization of high-grade blunt splenic injury would reduce NOM failure rates in this population. This was a prospective study at our Level I trauma center as part of a performance-improvement project. Demographics, injury characteristics, and outcomes were compared with historic controls. The protocol required all stable patients with grade III to V splenic injuries be referred for angiography and embolization. In historic controls, referral was based on surgeon preference. From January 1, 2010 to December 31, 2012, there were 168 patients with grades III to V spleen injuries admitted; NOM was undertaken in 113 (67%) patients. The protocol was followed in 97 patients, with a failure rate of 5%. Failure rate in the 16 protocol deviations was 25% (p = 0.02). Historic controls from January 1, 2007 to December 31, 2009 were compared with the protocol group. One hundred and fifty-three patients with grade III to V injuries were admitted during this period, 80 (52%) patients underwent attempted NOM. Failure rate was significantly higher than for the protocol group (15%, p = 0.04). Use of a protocol requiring angiography and embolization for all high-grade spleen injuries slated for NOM leads to a significantly decreased failure rate. We recommend angiography and embolization as an adjunct to NOM for all grade III to V splenic injuries. Copyright © 2014 American College of Surgeons. Published by Elsevier Inc. All rights reserved.

  9. Effect of prophylactic polishing protocols on the surface roughness of esthetic restorative materials.

    Science.gov (United States)

    Neme, A L; Frazier, K B; Roeder, L B; Debner, T L

    2002-01-01

    Many polishing protocols have been evaluated in vitro for their effect on the surface roughness of restorative materials. These results have been useful in establishing protocols for in vivo application. However, limited research has focused on the subsequent care and maintenance of esthetic restorations following their placement. This investigation evaluated the effect of five polishing protocols that could be implemented at recall on the surface roughness of five direct esthetic restorative materials. Specimens (n=25) measuring 8 mm diameter x 3 mm thick were fabricated in an acrylic mold using five light-cured resin-based materials (hybrid composite, microfilled composite, packable composite, compomer and resin-modified glass ionomer). After photopolymerization, all specimens were polished with Sof-Lex Disks to produce an initial (baseline) surface finish. All specimens were then polished with one of five prophylactic protocols (Butler medium paste, Butler coarse paste, OneGloss, SuperBuff or OneGloss & SuperBuff). The average surface roughness of each treated specimen was determined from three measurements with a profilometer (Surface 1). Next, all specimens were brushed 60,000 times at 1.5 Hz using a brush-head force of 2 N on a Manly V-8 cross-brushing machine in a 50:50 (w/w) slurry of toothpaste and water. The surface roughness of each specimen was measured after brushing (Surface 2) followed by re-polishing with one of five protocols, then final surface roughness values were determined (Surface 3). The data were analyzed using repeated measures ANOVA. Significant differences (p=0.05) in surface roughness were observed among restorative materials and polishing protocols. The microfilled and hybrid resin composite yielded significantly rougher surfaces than the other three materials following tooth brushing. Prophylactic polishing protocols can be used to restore a smooth surface on resin-based esthetic restorative materials following simulated tooth

  10. Assistance protocol for venous ulcers patients: validation of contents

    Directory of Open Access Journals (Sweden)

    Daniele Vieira Dantas

    2013-07-01

    Full Text Available Venous ulcers require complex treatment and are responsible for significant morbidity and mortality rates. This study aims at identifying aspects validated by the jury for the preparation of an assistance protocol for venous ulcer sufferers. It is a descriptive and quantitative research, with 39 professionals (30 nurses, 7 doctors and two physiotherapists, held at the Onofre Lopes University Hospital, between April and July/2010. Data collection began through a questionnaire checklist. Analysis was performed through Statistical Package for Social Science 15.0, assessing compliance with guidelines. Results were the compositional aspects of the protocol: assessment of patient and lesion history/documentation, wound care/perilesional skin, dressing suggestion, use of antibiotics and pain treatment, surgical treatment/medication, improving venous return and relapse prevention, patient referral, professional training and referral/counter-referral. It was concluded that to compose the protocol, aspects related to diagnosis, treatment and injury prevention must be considered.

  11. Developing optimized CT scan protocols: Phantom measurements of image quality

    International Nuclear Information System (INIS)

    Zarb, Francis; Rainford, Louise; McEntee, Mark F.

    2011-01-01

    Purpose: The increasing frequency of computerized tomography (CT) examinations is well documented, leading to concern about potential radiation risks for patients. However, the consequences of not performing the CT examination and missing injuries and disease are potentially serious, impacting upon correct patient management. The ALARA principle of dose optimization must be employed for all justified CT examinations. Dose indicators displayed on the CT console as either CT dose index (CTDI) and/or dose length product (DLP), are used to indicate dose and can quantify improvements achieved through optimization. Key scan parameters contributing to dose have been identified in previous literature and in previous work by our group. The aim of this study was to optimize the scan parameters of mA; kV and pitch, whilst maintaining image quality and reducing dose. This research was conducted using psychophysical image quality measurements on a CT quality assurance (QA) phantom establishing the impact of dose optimization on image quality parameters. Method: Current CT scan parameters for head (posterior fossa and cerebrum), abdomen and chest examinations were collected from 57% of CT suites available nationally in Malta (n = 4). Current scan protocols were used to image a Catphan 600 CT QA phantom whereby image quality was assessed. Each scan parameter: mA; kV and pitch were systematically reduced until the contrast resolution (CR), spatial resolution (SR) and noise were significantly lowered. The Catphan 600 images, produced by the range of protocols, were evaluated by 2 expert observers assessing CR, SR and noise. The protocol considered as the optimization threshold was just above the setting that resulted in a significant reduction in CR and noise but not affecting SR at the 95% confidence interval. Results: The limit of optimization threshold was determined for each CT suite. Employing optimized parameters, CTDI and DLP were both significantly reduced (p ≤ 0.001) by

  12. Phase Transition in Protocols Minimizing Work Fluctuations

    Science.gov (United States)

    Solon, Alexandre P.; Horowitz, Jordan M.

    2018-05-01

    For two canonical examples of driven mesoscopic systems—a harmonically trapped Brownian particle and a quantum dot—we numerically determine the finite-time protocols that optimize the compromise between the standard deviation and the mean of the dissipated work. In the case of the oscillator, we observe a collection of protocols that smoothly trade off between average work and its fluctuations. However, for the quantum dot, we find that as we shift the weight of our optimization objective from average work to work standard deviation, there is an analog of a first-order phase transition in protocol space: two distinct protocols exchange global optimality with mixed protocols akin to phase coexistence. As a result, the two types of protocols possess qualitatively different properties and remain distinct even in the infinite duration limit: optimal-work-fluctuation protocols never coalesce with the minimal-work protocols, which therefore never become quasistatic.

  13. Simplified protocol for clinical-grade tumor-infiltrating lymphocyte manufacturing with use of the Wave bioreactor

    DEFF Research Database (Denmark)

    Donia, Marco; Larsen, Signe Møllebæk; Met, Ozcan

    2014-01-01

    , a practical and simple protocol of TIL manufacturing with the use of a closed-system bioreactor was developed and implemented at our institution. RESULTS: This protocol enabled significant work load reduction during the most labor-intense step of TIL expansion, and allowed generation of high-quality TIL...

  14. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  15. Analysis of Security Protocols in Embedded Systems

    DEFF Research Database (Denmark)

    Bruni, Alessandro

    Embedded real-time systems have been adopted in a wide range of safety-critical applications—including automotive, avionics, and train control systems—where the focus has long been on safety (i.e., protecting the external world from the potential damage caused by the system) rather than security (i.......e., protecting the system from the external world). With increased connectivity of these systems to external networks the attack surface has grown, and consequently there is a need for securing the system from external attacks. Introducing security protocols in safety critical systems requires careful...... in this direction is to extend saturation-based techniques so that enough state information can be modelled and analysed. Finally, we present a methodology for proving the same security properties in the computational model, by means of typing protocol implementations....

  16. A Distributed Snapshot Protocol for Efficient Artificial Intelligence Computation in Cloud Computing Environments

    Directory of Open Access Journals (Sweden)

    JongBeom Lim

    2018-01-01

    Full Text Available Many artificial intelligence applications often require a huge amount of computing resources. As a result, cloud computing adoption rates are increasing in the artificial intelligence field. To support the demand for artificial intelligence applications and guarantee the service level agreement, cloud computing should provide not only computing resources but also fundamental mechanisms for efficient computing. In this regard, a snapshot protocol has been used to create a consistent snapshot of the global state in cloud computing environments. However, the existing snapshot protocols are not optimized in the context of artificial intelligence applications, where large-scale iterative computation is the norm. In this paper, we present a distributed snapshot protocol for efficient artificial intelligence computation in cloud computing environments. The proposed snapshot protocol is based on a distributed algorithm to run interconnected multiple nodes in a scalable fashion. Our snapshot protocol is able to deal with artificial intelligence applications, in which a large number of computing nodes are running. We reveal that our distributed snapshot protocol guarantees the correctness, safety, and liveness conditions.

  17. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  18. Effectiveness of Various Irrigation Protocols in Removing Calcium Hydroxide from Root Canals

    Directory of Open Access Journals (Sweden)

    Hakan Göktürk

    2018-04-01

    Full Text Available Objective: The purpose of this study was to investigate the removal efficiency of calcium hydroxide (CH by CanalBrush, Vibringe, laser-activated irrigation (LAI, conventional syringe irrigation (CSI, XP-endo Finisher, and passive ultrasonic irrigation (PUI in the root canal walls. Materials and Methods: Ninety-eight human mandibular premolar teeth were prepared. Root canals were filled with CH. The roots were divided into six experimental groups (n=15/group according to the irrigation protocol used: group 1 (CSI, group 2 (Vibringe, group 3 (CanalBrush, group 4 (XP-endo Finisher, group 5 (PUI, and group 6 (LAI. The amount of residual CH in the canal walls for each canal third was scored. Data were analysed by using Kruskal-Wallis and Bonferroni-correction Mann-Whitney U tests. Results: None of the investigated protocols renders the root canal walls free of CH remnants. Significant differences were found between tooth regions in terms of CH removal (p<0.05, and all groups except group 6 (LAI showed more residual CH in the apical region. PUI and LAI eliminated significantly more CH than CSI from the middle and apical thirds of the root canal, respectively. Conclusion: The activation of sodium hypochlorite with various devices increased CH removal at the apical and middle part of the canal. LAI and PUI produce better results in the apical and middle thirds, respectively.

  19. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    Science.gov (United States)

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  20. Maximally efficient protocols for direct secure quantum communication

    Energy Technology Data Exchange (ETDEWEB)

    Banerjee, Anindita [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); Department of Physics and Center for Astroparticle Physics and Space Science, Bose Institute, Block EN, Sector V, Kolkata 700091 (India); Pathak, Anirban, E-mail: anirban.pathak@jiit.ac.in [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); RCPTM, Joint Laboratory of Optics of Palacky University and Institute of Physics of Academy of Science of the Czech Republic, Faculty of Science, Palacky University, 17. Listopadu 12, 77146 Olomouc (Czech Republic)

    2012-10-01

    Two protocols for deterministic secure quantum communication (DSQC) using GHZ-like states have been proposed. It is shown that one of these protocols is maximally efficient and that can be modified to an equivalent protocol of quantum secure direct communication (QSDC). Security and efficiency of the proposed protocols are analyzed and compared. It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. Maximally efficient QSDC protocols are shown to be more efficient than their DSQC counterparts. This additional efficiency arises at the cost of message transmission rate. -- Highlights: ► Two protocols for deterministic secure quantum communication (DSQC) are proposed. ► One of the above protocols is maximally efficient. ► It is modified to an equivalent protocol of quantum secure direct communication (QSDC). ► It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. ► Efficient QSDC protocols are always more efficient than their DSQC counterparts.

  1. Physical Therapy Protocols for Arthroscopic Bankart Repair.

    Science.gov (United States)

    DeFroda, Steven F; Mehta, Nabil; Owens, Brett D

    Outcomes after arthroscopic Bankart repair can be highly dependent on compliance and participation in physical therapy. Additionally, there are many variations in physician-recommended physical therapy protocols. The rehabilitation protocols of academic orthopaedic surgery departments vary widely despite the presence of consensus protocols. Descriptive epidemiology study. Level 3. Web-based arthroscopic Bankart rehabilitation protocols available online from Accreditation Council for Graduate Medical Education (ACGME)-accredited orthopaedic surgery programs were included for review. Individual protocols were reviewed to evaluate for the presence or absence of recommended therapies, goals for completion of ranges of motion, functional milestones, exercise start times, and recommended time to return to sport. Thirty protocols from 27 (16.4%) total institutions were identified out of 164 eligible for review. Overall, 9 (30%) protocols recommended an initial period of strict immobilization. Variability existed between the recommended time periods for sling immobilization (mean, 4.8 ± 1.8 weeks). The types of exercises and their start dates were also inconsistent. Goals to full passive range of motion (mean, 9.2 ± 2.8 weeks) and full active range of motion (mean, 12.2 ± 2.8 weeks) were consistent with other published protocols; however, wide ranges existed within the reviewed protocols as a whole. Only 10 protocols (33.3%) included a timeline for return to sport, and only 3 (10%) gave an estimate for return to game competition. Variation also existed when compared with the American Society of Shoulder and Elbow Therapists' (ASSET) consensus protocol. Rehabilitation protocols after arthroscopic Bankart repair were found to be highly variable. They also varied with regard to published consensus protocols. This discrepancy may lead to confusion among therapists and patients. This study highlights the importance of attending surgeons being very clear and specific with

  2. Space Link Extension Protocol Emulation for High-Throughput, High-Latency Network Connections

    Science.gov (United States)

    Tchorowski, Nicole; Murawski, Robert

    2014-01-01

    New space missions require higher data rates and new protocols to meet these requirements. These high data rate space communication links push the limitations of not only the space communication links, but of the ground communication networks and protocols which forward user data to remote ground stations (GS) for transmission. The Consultative Committee for Space Data Systems, (CCSDS) Space Link Extension (SLE) standard protocol is one protocol that has been proposed for use by the NASA Space Network (SN) Ground Segment Sustainment (SGSS) program. New protocol implementations must be carefully tested to ensure that they provide the required functionality, especially because of the remote nature of spacecraft. The SLE protocol standard has been tested in the NASA Glenn Research Center's SCENIC Emulation Lab in order to observe its operation under realistic network delay conditions. More specifically, the delay between then NASA Integrated Services Network (NISN) and spacecraft has been emulated. The round trip time (RTT) delay for the continental NISN network has been shown to be up to 120ms; as such the SLE protocol was tested with network delays ranging from 0ms to 200ms. Both a base network condition and an SLE connection were tested with these RTT delays, and the reaction of both network tests to the delay conditions were recorded. Throughput for both of these links was set at 1.2Gbps. The results will show that, in the presence of realistic network delay, the SLE link throughput is significantly reduced while the base network throughput however remained at the 1.2Gbps specification. The decrease in SLE throughput has been attributed to the implementation's use of blocking calls. The decrease in throughput is not acceptable for high data rate links, as the link requires constant data a flow in order for spacecraft and ground radios to stay synchronized, unless significant data is queued a the ground station. In cases where queuing the data is not an option

  3. Fault Detection Variants of the CloudBus Protocol for IoT Distributed Embedded Systems

    Directory of Open Access Journals (Sweden)

    BARKALOV, A.

    2017-05-01

    Full Text Available Distributed embedded systems have become larger, more complex and complicated. More often, such systems operate accordingly to the IoT or Industry 4.0 concept. However, large number of end modules operating in the system leads to a significant load and consequently, to an overload of the communication interfaces. The CloudBus protocol is one of the methods which is used for data exchange and concurrent process synchronization in the distributed systems. It allows the significant savings in the amount of transmitted data between end modules, especially when compared with the other protocols used in the industry. Nevertheless, basic version of the protocol does not protect against the system failure in the event of failure of one of the nodes. This paper proposes four novel variants of the CloudBus protocol, which allow the fault detection. The comparison and performance analysis was executed for all proposed CloudBus variants. The verification and behavior analysis of the distributed systems were performed on SoC hardware research platform. Furthermore, a simple test application was proposed.

  4. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  5. Significant increase of Echinococcus multilocularis prevalencein foxes, but no increased predicted risk for humans

    NARCIS (Netherlands)

    Maas, M.; Dam-Deisz, W.D.C.; Roon, van A.M.; Takumi, K.; Giessen, van der J.W.B.

    2014-01-01

    The emergence of the zoonotic tapeworm Echinococcus multilocularis, causative agent ofalveolar echinococcosis (AE), poses a public health risk. A previously designed risk mapmodel predicted a spread of E. multilocularis and increasing numbers of alveolar echinococ-cosis patients in the province of

  6. Smart Traffic Management Protocol Based on VANET architecture

    Directory of Open Access Journals (Sweden)

    Amilcare Francesco Santamaria

    2014-01-01

    Full Text Available Nowadays one of the hottest theme in wireless environments research is the application of the newest technologies to road safety problems and traffic management exploiting the (VANET architecture. In this work, a novel protocol that aims to achieve a better traffic management is proposed. The overal system is able to reduce traffic level inside the city exploiting inter-communication among vehicles and support infrastructures also known as (V2V and (V2I communications. We design a network protocol called (STMP that takes advantages of IEEE 802.11p standard. On each road several sensors system are placed and they are responsible of monitoring. Gathered data are spread in the network exploiting ad-hoc protocol messages. The increasing knowledge about environment conditions make possible to take preventive actions. Moreover, having a realtime monitoring of the lanes it is possible to reveal roads and city blocks congestions in a shorter time. An external entity to the (VANET is responsible to manage traffic and rearrange traffic along the lanes of the city avoiding huge traffic levels.

  7. Welfare Quality assessment protocol for laying hens = Welfare Quality assessment protocol voor leghennen

    NARCIS (Netherlands)

    Niekerk, van T.G.C.M.; Gunnink, H.; Reenen, van C.G.

    2012-01-01

    Results of a study on the Welfare Quality® assessment protocol for laying hens. It reports the development of the integration of welfare assessment as scores per criteria as well as simplification of the Welfare Quality® assessment protocol. Results are given from assessment of 122 farms.

  8. Outcomes of a rapid refeeding protocol in Adolescent Anorexia Nervosa.

    Science.gov (United States)

    Madden, Sloane; Miskovic-Wheatley, Jane; Clarke, Simon; Touyz, Stephen; Hay, Phillipa; Kohn, Michael R

    2015-01-01

    The impact of severe malnutrition and medical instability in adolescent Anorexia Nervosa (AN) on immediate health and long-term development underscores the need for safe and efficient methods of refeeding. Current refeeding guidelines in AN advocate low initial caloric intake with slow increases in energy intake to avoid refeeding syndrome. This study demonstrates the potential for more rapid refeeding to promote initial weight recovery and correct medical instability in adolescent AN. Seventy-eight adolescents with AN (12-18 years), hospitalised in two specialist paediatric eating disorder units, for medical instability (bradycardia, hypotension, hypothermia, orthostatic instability and/or cardiac arrhythmia) were followed during a 2.5 week admission. Patients were refed using a standardised protocol commencing with 24-72 hours of continuous nasogastric feeds (ceased with daytime medical stability) and routine oral phosphate supplementation, followed by nocturnal feeds and a meal plan of 1200-2400 kcal/day aiming for a total caloric intake of 2400-3000 kcal/day. Along with indicators of medical stability, weight, phosphate and glucose levels were recorded. All patients gained weight in week one (M = 2.79 kg, SD = 1.27 kg) and at subsequent measurement points with an average gain of 5.12 kg (SD = 2.96) at 2.5 weeks. No patient developed hypophosphatemia, hypoglycaemia, or stigmata of the refeeding syndrome. The refeeding protocol resulted in immediate weight gain and was well tolerated with no indicators of refeeding syndrome. There were no significant differences in outcomes between the treatment sites, suggesting the protocol is replicable. Australian Clinical Trials Register number: ACTRN012607000009415.

  9. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  10. A slotted access control protocol for metropolitan WDM ring networks

    Science.gov (United States)

    Baziana, P. A.; Pountourakis, I. E.

    2009-03-01

    In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.

  11. Goal-setting protocol in adherence to exercise by Italian adults.

    Science.gov (United States)

    Annesi, James J

    2002-04-01

    A goal-setting protocol, based on research in goal setting and performance and personal construct theory, was tested for its effect on adherence to a new exercise program. The Goal-setting group (n = 50) had significantly less dropout (30%) than the control group (n = 50) (74%). The Goal-setting group also had significantly better attendance (psettings were discussed.

  12. Universally composable protocols with relaxed set-up assumptions

    DEFF Research Database (Denmark)

    Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus

    2004-01-01

    A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally composable (UC) protocols provide this guarantee in a strong sense: A protocol remains secure even when composed concurrently with an unbounded number of ...

  13. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  14. TH-E-209-00: Radiation Dose Monitoring and Protocol Management

    International Nuclear Information System (INIS)

    2016-01-01

    Radiation dose monitoring solutions have opened up new opportunities for medical physicists to be more involved in modern clinical radiology practices. In particular, with the help of comprehensive radiation dose data, data-driven protocol management and informed case follow up are now feasible. Significant challenges remain however and the problems faced by medical physicists are highly heterogeneous. Imaging systems from multiple vendors and a wide range of vintages co-exist in the same department and employ data communication protocols that are not fully standardized or implemented making harmonization complex. Many different solutions for radiation dose monitoring have been implemented by imaging facilities over the past few years. Such systems are based on commercial software, home-grown IT solutions, manual PACS data dumping, etc., and diverse pathways can be used to bring the data to impact clinical practice. The speakers will share their experiences with creating or tailoring radiation dose monitoring/management systems and procedures over the past few years, which vary significantly in design and scope. Topics to cover: (1) fluoroscopic dose monitoring and high radiation event handling from a large academic hospital; (2) dose monitoring and protocol optimization in pediatric radiology; and (3) development of a home-grown IT solution and dose data analysis framework. Learning Objectives: Describe the scope and range of radiation dose monitoring and protocol management in a modern radiology practice Review examples of data available from a variety of systems and how it managed and conveyed. Reflect on the role of the physicist in radiation dose awareness.

  15. TH-E-209-00: Radiation Dose Monitoring and Protocol Management

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2016-06-15

    Radiation dose monitoring solutions have opened up new opportunities for medical physicists to be more involved in modern clinical radiology practices. In particular, with the help of comprehensive radiation dose data, data-driven protocol management and informed case follow up are now feasible. Significant challenges remain however and the problems faced by medical physicists are highly heterogeneous. Imaging systems from multiple vendors and a wide range of vintages co-exist in the same department and employ data communication protocols that are not fully standardized or implemented making harmonization complex. Many different solutions for radiation dose monitoring have been implemented by imaging facilities over the past few years. Such systems are based on commercial software, home-grown IT solutions, manual PACS data dumping, etc., and diverse pathways can be used to bring the data to impact clinical practice. The speakers will share their experiences with creating or tailoring radiation dose monitoring/management systems and procedures over the past few years, which vary significantly in design and scope. Topics to cover: (1) fluoroscopic dose monitoring and high radiation event handling from a large academic hospital; (2) dose monitoring and protocol optimization in pediatric radiology; and (3) development of a home-grown IT solution and dose data analysis framework. Learning Objectives: Describe the scope and range of radiation dose monitoring and protocol management in a modern radiology practice Review examples of data available from a variety of systems and how it managed and conveyed. Reflect on the role of the physicist in radiation dose awareness.

  16. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  17. A strategy and protocol to increase diffusion of energy related innovations into the mainstream of housing associations

    International Nuclear Information System (INIS)

    Egmond, C.; Jonkers, R.; Kok, G.

    2006-01-01

    To reduce human causes of global warming, large scale implementation of innovative products that save energy is necessary. Innovative products first reach the early market actors who are driven by a visionary attitude. Hereafter, the products must reach the much larger mainstream market whose actors are driven by a pragmatic attitude. Many innovations, however, only appeal to the visionary early market and do not meet the more pragmatic needs of the mainstream. For that reason, innovations often fall in a 'chasm' between the early market and the mainstream and fail to reach the mainstream. We developed a strategy and a protocol to aid governmental agencies in influencing the mainstream members of housing associations to adopt energy conservation innovations. Our method is an adaptation of an existing marketing method and applicable to other target groups. The first step in crossing this chasm is to find a niche segment in the mainstream as the starting point for winning the rest of the mainstream. By surveying the target group and analyzing the data, we identified 29 housing associations (234 interviewed) that belong to this niche segment. Identifying the niche segment and its determinants of behaviour is part of our 4-step protocol that leads to adapting the innovative product to meet the needs of the niche and setting up a marketing plan to win the rest of the mainstream

  18. Optimization of a sample processing protocol for recovery of Bacillus anthracis spores from soil

    Science.gov (United States)

    Silvestri, Erin E.; Feldhake, David; Griffin, Dale; Lisle, John T.; Nichols, Tonya L.; Shah, Sanjiv; Pemberton, A; Schaefer III, Frank W

    2016-01-01

    Following a release of Bacillus anthracis spores into the environment, there is a potential for lasting environmental contamination in soils. There is a need for detection protocols for B. anthracis in environmental matrices. However, identification of B. anthracis within a soil is a difficult task. Processing soil samples helps to remove debris, chemical components, and biological impurities that can interfere with microbiological detection. This study aimed to optimize a previously used indirect processing protocol, which included a series of washing and centrifugation steps. Optimization of the protocol included: identifying an ideal extraction diluent, variation in the number of wash steps, variation in the initial centrifugation speed, sonication and shaking mechanisms. The optimized protocol was demonstrated at two laboratories in order to evaluate the recovery of spores from loamy and sandy soils. The new protocol demonstrated an improved limit of detection for loamy and sandy soils over the non-optimized protocol with an approximate matrix limit of detection at 14 spores/g of soil. There were no significant differences overall between the two laboratories for either soil type, suggesting that the processing protocol will be robust enough to use at multiple laboratories while achieving comparable recoveries.

  19. Inter-comparison of NIOSH and IMPROVE protocols for OC and EC determination: implications for inter-protocol data conversion

    Science.gov (United States)

    Wu, Cheng; Huang, X. H. Hilda; Ng, Wai Man; Griffith, Stephen M.; Zhen Yu, Jian

    2016-09-01

    Organic carbon (OC) and elemental carbon (EC) are operationally defined by analytical methods. As a result, OC and EC measurements are protocol dependent, leading to uncertainties in their quantification. In this study, more than 1300 Hong Kong samples were analyzed using both National Institute for Occupational Safety and Health (NIOSH) thermal optical transmittance (TOT) and Interagency Monitoring of Protected Visual Environment (IMPROVE) thermal optical reflectance (TOR) protocols to explore the cause of EC disagreement between the two protocols. EC discrepancy mainly (83 %) arises from a difference in peak inert mode temperature, which determines the allocation of OC4NSH, while the rest (17 %) is attributed to a difference in the optical method (transmittance vs. reflectance) applied for the charring correction. Evidence shows that the magnitude of the EC discrepancy is positively correlated with the intensity of the biomass burning signal, whereby biomass burning increases the fraction of OC4NSH and widens the disagreement in the inter-protocol EC determination. It is also found that the EC discrepancy is positively correlated with the abundance of metal oxide in the samples. Two approaches (M1 and M2) that translate NIOSH TOT OC and EC data into IMPROVE TOR OC and EC data are proposed. M1 uses direct relationship between ECNSH_TOT and ECIMP_TOR for reconstruction: M1 : ECIMP_TOR = a × ECNSH_TOT + b; while M2 deconstructs ECIMP_TOR into several terms based on analysis principles and applies regression only on the unknown terms: M2 : ECIMP_TOR = AECNSH + OC4NSH - (a × PCNSH_TOR + b), where AECNSH, apparent EC by the NIOSH protocol, is the carbon that evolves in the He-O2 analysis stage, OC4NSH is the carbon that evolves at the fourth temperature step of the pure helium analysis stage of NIOSH, and PCNSH_TOR is the pyrolyzed carbon as determined by the NIOSH protocol. The implementation of M1 to all urban site data (without considering seasonal specificity

  20. Modeling and Simulation of a Novel Relay Node Based Secure Routing Protocol Using Multiple Mobile Sink for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Madhumathy Perumal

    2015-01-01

    Full Text Available Data gathering and optimal path selection for wireless sensor networks (WSN using existing protocols result in collision. Increase in collision further increases the possibility of packet drop. Thus there is a necessity to eliminate collision during data aggregation. Increasing the efficiency is the need of the hour with maximum security. This paper is an effort to come up with a reliable and energy efficient WSN routing and secure protocol with minimum delay. This technique is named as relay node based secure routing protocol for multiple mobile sink (RSRPMS. This protocol finds the rendezvous point for optimal transmission of data using a “splitting tree” technique in tree-shaped network topology and then to determine all the subsequent positions of a sink the “Biased Random Walk” model is used. In case of an event, the sink gathers the data from all sources, when they are in the sensing range of rendezvous point. Otherwise relay node is selected from its neighbor to transfer packets from rendezvous point to sink. A symmetric key cryptography is used for secure transmission. The proposed relay node based secure routing protocol for multiple mobile sink (RSRPMS is experimented and simulation results are compared with Intelligent Agent-Based Routing (IAR protocol to prove that there is increase in the network lifetime compared with other routing protocols.

  1. Impact of reduced-radiation dual-energy protocols using 320-detector row computed tomography for analyzing urinary calculus components: initial in vitro evaluation.

    Science.gov (United States)

    Cai, Xiangran; Zhou, Qingchun; Yu, Juan; Xian, Zhaohui; Feng, Youzhen; Yang, Wencai; Mo, Xukai

    2014-10-01

    To evaluate the impact of reduced-radiation dual-energy (DE) protocols using 320-detector row computed tomography on the differentiation of urinary calculus components. A total of 58 urinary calculi were placed into the same phantom and underwent DE scanning with 320-detector row computed tomography. Each calculus was scanned 4 times with the DE protocols using 135 kV and 80 kV tube voltage and different tube current combinations, including 100 mA and 570 mA (group A), 50 mA and 290 mA (group B), 30 mA and 170 mA (group C), and 10 mA and 60 mA (group D). The acquisition data of all 4 groups were then analyzed by stone DE analysis software, and the results were compared with x-ray diffraction analysis. Noise, contrast-to-noise ratio, and radiation dose were compared. Calculi were correctly identified in 56 of 58 stones (96.6%) using group A and B protocols. However, only 35 stones (60.3%) and 16 stones (27.6%) were correctly diagnosed using group C and D protocols, respectively. Mean noise increased significantly and mean contrast-to-noise ratio decreased significantly from groups A to D (P calculus component analysis while reducing patient radiation exposure to 1.81 mSv. Further reduction of tube currents may compromise diagnostic accuracy. Copyright © 2014 Elsevier Inc. All rights reserved.

  2. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis.

    Science.gov (United States)

    Alanazi, Adwan; Elleithy, Khaled

    2015-09-02

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol.

  3. ADAPTIVE GOSSIP BASED PROTOCOL FOR ENERGY EFFICIENT MOBILE ADHOC NETWORK

    Directory of Open Access Journals (Sweden)

    S. Rajeswari

    2012-03-01

    Full Text Available In Gossip Sleep Protocol, network performance is enhanced based on energy resource. But energy conservation is achieved with the reduced throughput. In this paper, it has been proposed a new Protocol for Mobile Ad hoc Network to achieve reliability with energy conservation. Based on the probability (p values, the value of sleep nodes is fixed initially. The probability value can be adaptively adjusted by Remote Activated Switch during the transmission process. The adaptiveness of gossiping probability is determined by the Packet Delivery Ratio. For performance comparison, we have taken Routing overhead, Packet Delivery Ratio, Number of dropped packets and Energy consumption with the increasing number of forwarding nodes. We used UDP based traffic models to analyze the performance of this protocol. We analyzed TCP based traffic models for average end to end delay. We have used the NS-2 simulator.

  4. Generation of Insulin-Producing Cells from Human Bone Marrow-Derived Mesenchymal Stem Cells: Comparison of Three Differentiation Protocols

    Directory of Open Access Journals (Sweden)

    Mahmoud M. Gabr

    2014-01-01

    Full Text Available Introduction. Many protocols were utilized for directed differentiation of mesenchymal stem cells (MSCs to form insulin-producing cells (IPCs. We compared the relative efficiency of three differentiation protocols. Methods. Human bone marrow-derived MSCs (HBM-MSCs were obtained from three insulin-dependent type 2 diabetic patients. Differentiation into IPCs was carried out by three protocols: conophylline-based (one-step protocol, trichostatin-A-based (two-step protocol, and β-mercaptoethanol-based (three-step protocol. At the end of differentiation, cells were evaluated by immunolabeling for insulin production, expression of pancreatic endocrine genes, and release of insulin and c-peptide in response to increasing glucose concentrations. Results. By immunolabeling, the proportion of generated IPCs was modest (≃3% in all the three protocols. All relevant pancreatic endocrine genes, insulin, glucagon, and somatostatin, were expressed. There was a stepwise increase in insulin and c-peptide release in response to glucose challenge, but the released amounts were low when compared with those of pancreatic islets. Conclusion. The yield of functional IPCs following directed differentiation of HBM-MSCs was modest and was comparable among the three tested protocols. Protocols for directed differentiation of MSCs need further optimization in order to be clinically meaningful. To this end, addition of an extracellular matrix and/or a suitable template should be attempted.

  5. A Multiple-Reception Access Protocol with Interruptions with Mixed Priorities in CDMA Networks

    Institute of Scientific and Technical Information of China (English)

    Lu Xiaowen; Zhu Jinkang

    2003-01-01

    A novel access protocol called Multiple-Reception Access Protocol (MRAP) and its modification MRAP/WI are proposed. In this protocol, all colliding users with a common code can be identified by the base station due to the offset of arrival time Thus they can retransmit access requests under the base station's control. Furthermore new arrivals with higher priority level can interrupt the lower retransmission in order to reduce its access delay although it increases the lower priority's delay. Simulation results of MRAP and MRAP/WI are given in order to highlight the superior performance of the proposed approach.

  6. Reduction of cancer risk by optimization of Computed Tomography head protocols: far eastern Cuban experience

    International Nuclear Information System (INIS)

    Miller Clemente, R.; Adame Brooks, D.; Lores Guevara, M.; Perez Diaz, M.; Arias Garlobo, M. L.; Ortega Rodriguez, O.; Nepite Haber, R.; Grinnan Hernandez, O.; Guillama Llosas, A.

    2015-01-01

    The cancer risk estimation constitutes one way for the evaluation of the public health, regarding computed tomography (CT) exposures. Starting from the hypothesis that the optimization of CT protocols would reduce significantly the added cancer risk, the purpose of this research was the application of optimization strategies regarding head CT protocols, in order to reduce the factors affecting the risk of induced cancer. The applied systemic approach included technological and human components, represented by quantitative physical factors. the volumetric kerma indexes, compared with respect to standard, optimized and reference values, were evaluated with multiple means comparison method. The added cancer risk resulted from the application of the methodology for biological effects evaluation, at low doses with low Linear Energy Transfer. Human observers in all scenarios evaluated the image quality. the reduced dose was significantly lower than for standard head protocols and reference levels, where: (1) for pediatric patients, by using an Automatic Exposure Control system, a reduction of 31% compared with standard protocol and ages range of 10-14, and (2) adults, using a Bilateral Filter for images obtained at low doses of 62% from those of standard head protocol. The risk reduction was higher than 25%. The systemic approach used allows the effective identification of factors involved on cancer risk related with exposures to CT. The combination of dose modulation and image restoration with Bilateral Filter, provide a significantly reduction of cancer risk, with acceptable diagnostic image quality. (Author)

  7. A Standardized Shift Handover Protocol: Improving Nurses’ Safe Practice in Intensive Care Units

    Directory of Open Access Journals (Sweden)

    Javad Malekzadeh

    2013-08-01

    Full Text Available Introduction: For maintaining the continuity of care and improving the quality of care, effective inter-shift information communication is necessary. Any handover error can endanger patient safety. Despite the importance of shift handover, there is no standard handover protocol in our healthcare settings. Methods In this one-group pretest-posttest quasi-experimental study conducted in spring and summer of 2011, we recruited a convenience sample of 56 ICU nurses. The Nurses’ Safe Practice Evaluation Checklist was used for data collection. The Content Validity Index and the inter-rater correlation coefficient of the checklist was 0.92 and 89, respectively. We employed the SPSS 11.5 software and the Mc Nemar and paired-samples t test for data analysis. Results: Study findings revealed that nurses’ mean score on the Safe Practice Evaluation Checklist increased significantly from 11.6 (2.7 to 17.0 (1.8 (P < 0.001. Conclusion: using a standard handover protocol for communicating patient’s needs and information improves nurses’ safe practice in the area of basic nursing care.

  8. Cross Layer PHY-MAC Protocol for Wireless Static and Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Chris Blondia

    2008-11-01

    Full Text Available Multihop mobile wireless networks have drawn a lot of attention in recent years thanks to their wide applicability in civil and military environments. Since the existing IEEE 802.11 distributed coordination function (DCF standard does not provide satisfactory access to the wireless medium in multihop mobile networks, we have designed a cross-layer protocol, (CroSs-layer noise aware power driven MAC (SNAPdMac, which consists of two parts. The protocol first concentrates on the flexible adjustment of the upper and lower bounds of the contention window (CW to lower the number of collisions. In addition, it uses a power control scheme, triggered by the medium access control (MAC layer, to limit the waste of energy and also to decrease the number of collisions. Thanks to a noticeable energy conservation and decrease of the number of collisions, it prolongs significantly the lifetime of the network and delays the death of the first node while increasing both the throughput performance and the sending bit rate/throughput fairness among contending flows.

  9. Detection of sentinel lymph nodes in cervical cancer. A comparison of two protocols

    International Nuclear Information System (INIS)

    Kraft, O.; Sevcik, L.; Klat, J.; Koliba, P.; Curik, R.; Kriozva, H.

    2006-01-01

    The aim of this study was lymphatic mapping to identify SLN in cervical cancer (CaCerv) with radioactive colloids, intraoperative detection with patent blue dye (PBD) and gamma probe (GP) and biopsy and comparison of two protocols. In 54 patients with CaCerv before hysterectomy and lymph nodes dissection (LND) we performed preoperative lymphoscintigraphy utilizing 99m Tc-colloid (Nanocoll, SentiScint or Nanocis), activity 40 MBq, on the operation day (30 women) or the day before operation (24 women). Gynaecologists injected 4 peritumoral injections of colloid into the cervix around the tumour. Scintigraphy followed 25-50 minutes (one-day protocol) or 12-19 hours (two-day protocol) after injection. Gynaecologists also injected 4 peritumoral injections of PBD into the cervix around the tumour. All women underwent SLN biopsy and LND (in average 35 lymph nodes were taken) and hysterectomy. SLNs (active and/or blue lymph nodes) were examined by a pathologist [histopathology and immunohistochemistry (IH) with detection of cytokeratine]. No SLN was examined without IH. The gynaecologists withdrew 123 SLNs (on average 2.27/1 patient) and in total 1898 lymph nodes (on average 35/1 patient). In 1 woman the tumour was inoperable. Two-day protocol, which involved scintigraphy, PBD and GP detected SLNs on both sides (45 SLNs) in 17 women (70.8%), SLNs on the one side (6 SLNs) in 3 patients (12.5%) and no SLNs were found in 4 women (16.7%). One-day protocol detected SLNs on both sides in 23 patients (74.1%) - 63 SLNs, in 7 women on one side (25.9%) - 9 SLNs. Metastases in SLNs (with or without metastases in other LN) were found in 21 patients (38.9%) - in 1 woman of stage FIGO IB1, in 1 woman of stage FIGO IB2, in 1 patient of stage FIGO IIIA and in all 18 patients of stage FIGO IIIB. False negative SLN detection was 0%. In SLN detection in patients with CaCerv, all 3 methods - scintigraphy, PBD and GP - should be used, and the success rate of SLN detection increases, although

  10. A comparison of sennosides-based bowel protocols with and without docusate in hospitalized patients with cancer.

    Science.gov (United States)

    Hawley, Philippa Helen; Byeon, Jai Jun

    2008-05-01

    Constipation is a common and distressing condition in patients with cancer, especially those taking opioid analgesics. Many institutions prevent and treat constipation with titrated laxatives, which is known as a bowel protocol. An effective and well-tolerated bowel protocol is a very important component of cancer care, and there is little evidence on which to base selection of the most appropriate agents. This study compares a protocol of the stimulant laxative sennosides alone with a protocol of sennosides plus the stool softener docusate, in hospitalized patients at an oncology center. The docusate-containing protocol had an initial docusate-only step for patients not taking opioids, and four to six 100-mg capsules of docusate sodium in addition to the sennosides for the rest of the protocol. Thirty patients received the sennosides-only (S) protocol and 30 the sennosides plus docusate (DS) protocol. The efficacy and adverse effects of the protocols were monitored for 5-12 days. The two protocols were used sequentially, creating two cohorts, one on each protocol. Eighty percent of patients were taking oral opioids and 72% were admitted for symptom control/supportive care. Over a total of 488 days of observation it was found that the S protocol produced more bowel movements than the DS protocol, and in the symptom control/supportive care patients this difference was statistically significant (p sennosides did not reduce bowel cramps, and was less effective in inducing laxation than the sennosides-only protocol. Further research into the appropriate use of docusate and into the details of bowel protocol design are required.

  11. Comparison of low- and ultralow-dose computed tomography protocols for quantitative lung and airway assessment.

    Science.gov (United States)

    Hammond, Emily; Sloan, Chelsea; Newell, John D; Sieren, Jered P; Saylor, Melissa; Vidal, Craig; Hogue, Shayna; De Stefano, Frank; Sieren, Alexa; Hoffman, Eric A; Sieren, Jessica C

    2017-09-01

    Quantitative computed tomography (CT) measures are increasingly being developed and used to characterize lung disease. With recent advances in CT technologies, we sought to evaluate the quantitative accuracy of lung imaging at low- and ultralow-radiation doses with the use of iterative reconstruction (IR), tube current modulation (TCM), and spectral shaping. We investigated the effect of five independent CT protocols reconstructed with IR on quantitative airway measures and global lung measures using an in vivo large animal model as a human subject surrogate. A control protocol was chosen (NIH-SPIROMICS + TCM) and five independent protocols investigating TCM, low- and ultralow-radiation dose, and spectral shaping. For all scans, quantitative global parenchymal measurements (mean, median and standard deviation of the parenchymal HU, along with measures of emphysema) and global airway measurements (number of segmented airways and pi10) were generated. In addition, selected individual airway measurements (minor and major inner diameter, wall thickness, inner and outer area, inner and outer perimeter, wall area fraction, and inner equivalent circle diameter) were evaluated. Comparisons were made between control and target protocols using difference and repeatability measures. Estimated CT volume dose index (CTDIvol) across all protocols ranged from 7.32 mGy to 0.32 mGy. Low- and ultralow-dose protocols required more manual editing and resolved fewer airway branches; yet, comparable pi10 whole lung measures were observed across all protocols. Similar trends in acquired parenchymal and airway measurements were observed across all protocols, with increased measurement differences using the ultralow-dose protocols. However, for small airways (1.9 ± 0.2 mm) and medium airways (5.7 ± 0.4 mm), the measurement differences across all protocols were comparable to the control protocol repeatability across breath holds. Diameters, wall thickness, wall area fraction

  12. A Study on IP Network Recovery through Routing Protocols

    Directory of Open Access Journals (Sweden)

    K. Karthik

    2016-09-01

    Full Text Available Internet has taken major role in our communication infrastructure. Such that requirement of internet availability and reliability has increasing accordingly. The major network failure reasons are failure of node and failure of link among the nodes. This can reduce the performance of major applications in an IP networks. The network recovery should be fast enough so that service interruption of link or node failure. The new path taken by the diverted traffic can be computed either at the time of failures or before failures. These mechanisms are known as Reactive and Proactive protocols respectively. In this paper, we surveyed reactive and proactive protocols mechanisms for IP network recovery.

  13. Comparison of 2 comprehensive Class II treatment protocols including the bonded Herbst and headgear appliances: a double-blind study of consecutively treated patients at puberty.

    Science.gov (United States)

    Baccetti, Tiziano; Franchi, Lorenzo; Stahl, Franka

    2009-06-01

    The aim of this clinical trial was to compare the effects of 2 protocols for single-phase comprehensive treatment of Class II Division 1 malocclusion (bonded Herbst followed by fixed appliances [BH + FA] vs headgear followed by fixed appliances and Class II elastics [HG + FA]) at the pubertal growth spurt. Fifty-six Class II patients were enrolled in the trial and allocated by personal choice to 2 practices, where they underwent 1 of 2 treatment protocols (28 patients were treated consecutively with BH + FA, and 28 patients were treated consecutively with HG + FA). All patients started treatment at puberty (cervical stage [CS] 3 or CS 4) and completed treatment after puberty (CS 5 or CS 6). Lateral cephalograms were taken before therapy and 6 months after the end of comprehensive therapy, with an average interval of 28 months. Longitudinal observations of a matched group of 28 subjects with untreated Class II malocclusions were compared with the 2 treated groups. Analysis of variance (ANOVA) with post-hoc tests was used for statistical comparisons. Discriminant analysis was applied to identify preferential candidates for the BH + FA protocol on the basis of profile changes (advancement of the soft tissues of the chin). The success rate (full occlusal correction of the malocclusion after treatment) was 92.8% in both treatment groups. The BH + FA group showed a significant increase in mandibular protrusion. The increase in effective mandibular length (Co-Gn) was significantly greater in both treatment groups when compared with natural growth changes in the Class II controls. Significantly greater improvement in sagittal maxillomandibular relationships was found in the BH + FA group. Retrusion of maxillary incisors and mesial movement of mandibular molars were significant in the HG + FA group. The BH + FA group showed significantly greater forward movements of soft-tissue B-point and pogonion compared with both the HG + FA and the control groups. Two pretreatment

  14. Implementation of enteral feeding protocol in an intensive care unit

    DEFF Research Database (Denmark)

    Padar, Martin; Uusvel, Gerli; Starkopf, Liis

    2017-01-01

    AIM: To determine the effects of implementing an enteral feeding protocol on the nutritional delivery and outcomes of intensive care patients. METHODS: An uncontrolled, observational before-and-after study was performed in a tertiary mixed medical-surgical intensive care unit (ICU). In 2013......, a nurse-driven enteral feeding protocol was developed and implemented in the ICU. Nutrition and outcome-related data from patients who were treated in the study unit from 2011-2012 (the Before group) and 2014-2015 (the After group) were obtained from a local electronic database, the national Population...... the groups. Patients in the After group had a lower 90-d (P = 0.026) and 120-d (P = 0.033) mortality. In the After group, enteral nutrition was prescribed less frequently (P = 0.039) on day 1 but significantly more frequently on all days from day 3. Implementation of the feeding protocol resulted in a higher...

  15. Dosimetric evaluation of cone beam computed tomography scanning protocols

    International Nuclear Information System (INIS)

    Soares, Maria Rosangela

    2015-01-01

    It was evaluated the cone beam computed tomography, CBCT scanning protocols, that was introduced in dental radiology at the end of the 1990's, and quickly became a fundamental examination for various procedures. Its main characteristic, the difference of medical CT is the beam shape. This study aimed to calculate the absorbed dose in eight tissues / organs of the head and neck, and to estimate the effective dose in 13 protocols and two techniques (stitched FOV e single FOV) of 5 equipment of different manufacturers of cone beam CT. For that purpose, a female anthropomorphic phantom was used, representing a default woman, in which were inserted thermoluminescent dosimeters at several points, representing organs / tissues with weighting values presented in the standard ICRP 103. The results were evaluated by comparing the dose according to the purpose of the tomographic image. Among the results, there is a difference up to 325% in the effective dose in relation to protocols with the same image goal. In relation to the image acquisition technique, the stitched FOV technique resulted in an effective dose of 5.3 times greater than the single FOV technique for protocols with the same image goal. In the individual contribution, the salivary glands are responsible for 31% of the effective dose in CT exams. The remaining tissues have also a significant contribution, 36%. The results drew attention to the need of estimating the effective dose in different equipment and protocols of the market, besides the knowledge of the radiation parameters and equipment manufacturing engineering to obtain the image. (author)

  16. Changes in rocket salad phytochemicals within the commercial supply chain: Glucosinolates, isothiocyanates, amino acids and bacterial load increase significantly after processing.

    Science.gov (United States)

    Bell, Luke; Yahya, Hanis Nadia; Oloyede, Omobolanle Oluwadamilola; Methven, Lisa; Wagstaff, Carol

    2017-04-15

    Five cultivars of Eruca sativa and a commercial variety of Diplotaxis tenuifolia were grown in the UK (summer) and subjected to commercial growth, harvesting and processing, with subsequent shelf life storage. Glucosinolates (GSL), isothiocyanates (ITC), amino acids (AA), free sugars, and bacterial loads were analysed throughout the supply chain to determine the effects on phytochemical compositions. Bacterial load of leaves increased significantly over time and peaked during shelf life storage. Significant correlations were observed with GSL and AA concentrations, suggesting a previously unknown relationship between plants and endemic leaf bacteria. GSLs, ITCs and AAs increased significantly after processing and during shelf life. The supply chain did not significantly affect glucoraphanin concentrations, and its ITC sulforaphane significantly increased during shelf life in E. sativa cultivars. We hypothesise that commercial processing may increase the nutritional value of the crop, and have added health benefits for the consumer. Copyright © 2016 The Authors. Published by Elsevier Ltd.. All rights reserved.

  17. e-SCP-ECG+ Protocol: An Expansion on SCP-ECG Protocol for Health Telemonitoring—Pilot Implementation

    Directory of Open Access Journals (Sweden)

    George J. Mandellos

    2010-01-01

    Full Text Available Standard Communication Protocol for Computer-assisted Electrocardiography (SCP-ECG provides standardized communication among different ECG devices and medical information systems. This paper extends the use of this protocol in order to be included in health monitoring systems. It introduces new sections into SCP-ECG structure for transferring data for positioning, allergies, and five additional biosignals: noninvasive blood pressure (NiBP, body temperature (Temp, Carbon dioxide (CO2, blood oxygen saturation (SPO2, and pulse rate. It also introduces new tags in existing sections for transferring comprehensive demographic data. The proposed enhanced version is referred to as e-SCP-ECG+ protocol. This paper also considers the pilot implementation of the new protocol as a software component in a Health Telemonitoring System.

  18. Protocol adaptations to conduct Systematic Literature Reviews in Software Engineering: a chronological study

    Directory of Open Access Journals (Sweden)

    Samuel Sepúlveda

    2015-09-01

    Full Text Available Systematic literature reviews (SLR have reached a considerable level of adoption in Software Engineering (SE, how-ever protocol adaptations for its implementation remain tangentially addressed. This work provides a chronological framework for the use and adaptation of the SLR protocol, including its current status. A systematic literature search was performed, reviewing a set of twelve articles being selected in accordance with the inclusion and exclusion criteria between 2004 and 2013, using digital data sources recognized by the SE community. A chronological framework is provided that includes the current state of the protocol adaptations to conduct SLR in SE. The results indicate areas where the quantity and quality of investigations needs to be increased and the identi- fication of the main proposals providing adaptations for the protocol conducting SLR in SE.

  19. [Clinical outcomes and economic analysis of two ovulation induction protocols in patients undergoing repeated IVF/ICSI cycles].

    Science.gov (United States)

    Chen, Xiao; Geng, Ling; Li, Hong

    2014-04-01

    To compare the clinical outcomes and cost-effectiveness of luteal phase down-regulation with gonadotrophin-releasing hormone (GnRH) agonist protocol and GnRH antagonist protocol in patients undergoing repeated in vitro fertilization and intracytoplasmic sperm injection (IVF-ICSI) cycles. A retrospective analysis of clinical outcomes and costs was conducted among 198 patients undergoing repeated IVF-ICSI cycles, including 109 receiving luteal phase down-regulation with GnRH agonist protocol (group A) and 89 receiving GnRH antagonist protocol (group B). The numbers of oocytes retrieved and good embryos, clinical pregnancy rate, abortion rate, the live birth rate, mean total cost, and the cost-effective ratio were compared between the two groups. In patients undergoing repeated IVF-ICSI cycles, the two protocols produced no significant differences in the number of good embryos, clinical pregnancy rate, abortion rate, or twin pregnancy rate. Compared with group B, group A had better clinical outcomes though this difference was not statistically significant. The number of retrieved oocytes was significantly greater and live birth rate significantly higher in group A than in group B (9.13=4.98 vs 7.11=4.74, and 20.2% vs 9.0%, respectively). Compared with group B, group A had higher mean total cost per cycle but lower costs for each oocyte retrieved (2729.11 vs 3038.60 RMB yuan), each good embryo (8867.19 vs 9644.85 RMB yuan), each clinical pregnancy (77598.06 vs 96139.85 RMB yuan). For patients undergoing repeated IVF/ICSI cycle, luteal phase down-regulation with GnRH agonist protocol produces good clinical outcomes with also good cost-effectiveness in spite an unsatisfactory ovarian reserve.

  20. Optimal Scanning Protocols for Dual-Energy CT Angiography in Peripheral Arterial Stents: An in Vitro Phantom Study

    Directory of Open Access Journals (Sweden)

    Abdulrahman Almutairi

    2015-05-01

    Full Text Available Objective: To identify the optimal dual-energy computed tomography (DECT scanning protocol for peripheral arterial stents while achieving a low radiation dose, while still maintaining diagnostic image quality, as determined by an in vitro phantom study. Methods: Dual-energy scans in monochromatic spectral imaging mode were performed on a peripheral arterial phantom with use of three gemstone spectral imaging (GSI protocols, three pitch values, and four kiloelectron volts (keV ranges. A total of 15 stents of different sizes, materials, and designs were deployed in the phantom. Image noise, the signal-to-noise ratio (SNR, different levels of adaptive statistical iterative reconstruction (ASIR, and the four levels of monochromatic energy for DECT imaging of peripheral arterial stents were measured and compared to determine the optimal protocols. Results: A total of 36 scans with 180 datasets were reconstructed from a combination of different protocols. There was a significant reduction of image noise with a higher SNR from monochromatic energy images between 65 and 70 keV in all investigated preset GSI protocols (p < 0.05. In addition, significant effects were found from the main effect analysis for these factors: GSI, pitch, and keV (p = 0.001. In contrast, there was significant interaction on the unstented area between GSI and ASIR (p = 0.015 and a very high significant difference between keV and ASIR (p < 0.001. A radiation dose reduction of 50% was achieved. Conclusions: The optimal scanning protocol and energy level in the phantom study were GSI-48, pitch value 0.984, and 65 keV, which resulted in lower image noise and a lower radiation dose, but with acceptable diagnostic images.

  1. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  2. Triglyceride content in remnant lipoproteins is significantly increased after food intake and is associated with plasma lipoprotein lipase.

    Science.gov (United States)

    Nakajima, Katsuyuki; Tokita, Yoshiharu; Sakamaki, Koji; Shimomura, Younosuke; Kobayashi, Junji; Kamachi, Keiko; Tanaka, Akira; Stanhope, Kimber L; Havel, Peter J; Wang, Tao; Machida, Tetsuo; Murakami, Masami

    2017-02-01

    Previous large population studies reported that non-fasting plasma triglyceride (TG) reflect a higher risk for cardiovascular disease than TG in the fasting plasma. This is suggestive of the presence of higher concentration of remnant lipoproteins (RLP) in postprandial plasma. TG and RLP-TG together with other lipids, lipoproteins and lipoprotein lipase (LPL) in both fasting and postprandial plasma were determined in generally healthy volunteers and in patients with coronary artery disease (CAD) after consuming a fat load or a more typical moderate meal. RLP-TG/TG ratio (concentration) and RLP-TG/RLP-C ratio (particle size) were significantly increased in the postprandial plasma of both healthy controls and CAD patients compared with those in fasting plasma. LPL/RLP-TG ratio demonstrated the interaction correlation between RLP concentration and LPL activity The increased RLP-TG after fat consumption contributed to approximately 90% of the increased plasma TG, while approximately 60% after a typical meal. Plasma LPL in postprandial plasma was not significantly altered after either type of meal. Concentrations of RLP-TG found in the TG along with its particle size are significantly increased in postprandial plasma compared with fasting plasma. Therefore, non-fasting TG determination better reflects the presence of higher RLP concentrations in plasma. Copyright © 2016 The Authors. Published by Elsevier B.V. All rights reserved.

  3. Implementation of a Hydrotherapy Protocol to Improve Postpartum Pain Management.

    Science.gov (United States)

    Batten, Meghann; Stevenson, Eleanor; Zimmermann, Deb; Isaacs, Christine

    2017-03-01

    A growing number of women are seeking alternatives to traditional pharmacologic pain management during birth. While there has been an extensive array of nonpharmacologic options developed for labor, there are limited offerings in the postpartum period. The purpose of this quality improvement project was to implement a hydrotherapy protocol in the early postpartum period to improve pain management for women choosing a nonmedicated birth. The postpartum hydrotherapy protocol was initiated in a certified nurse-midwife (CNM) practice in an urban academic medical center. All women who met criteria were offered a 30-minute warm water immersion bath at one hour postpartum. Pain scores were assessed prior to the bath, at 15 minutes after onset, and again at the conclusion (30 minutes). Women who completed the bath were also asked to complete a brief survey on their experience with postpartum hydrotherapy. In women who used the bath (N = 45), there was a significant reduction in pain scores (P hydrotherapy protocol as an alternative or adjunct to medication for early postpartum pain management that significantly reduced pain and improved the birth experience for those who used it. It offers a nonpharmacologic alternative where there have traditionally been limited options. © 2017 by the American College of Nurse-Midwives.

  4. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  5. A Rule-Based Data Transfer Protocol for On-Demand Data Exchange in Vehicular Environment

    Directory of Open Access Journals (Sweden)

    Liao Hsien-Chou

    2009-01-01

    Full Text Available The purpose of Intelligent Transport System (ITS is mainly to increase the driving safety and efficiency. Data exchange is an important way to achieve the purpose. An on-demand data exchange is especially useful to assist a driver avoiding some emergent events. In order to handle the data exchange under dynamic situations, a rule-based data transfer protocol is proposed in this paper. A set of rules is designed according to the principle of request-forward-reply (RFR. That is, they are used to determine the timing of data broadcasting, forwarding, and replying automatically. Two typical situations are used to demonstrate the operation of rules. One is the front view of a driver occluded by other vehicles. The other is the traffic jam. The proposed protocol is flexible and extensible for unforeseen situations. Three simulation tools were also implemented to demonstrate the feasibility of the protocol and measure the network transmission under high density of vehicles. The simulation results show that the rule-based protocol is efficient on data exchange to increase the driving safety.

  6. Comparison of absorbed dose of two protocols of tomographic scanning in PET/CT exams

    International Nuclear Information System (INIS)

    Paiva, F.G.

    2017-01-01

    Positron Emission Tomography (PET) associated with Computed Tomography (CT) allows the fusion of functional and anatomical images. When compared to other diagnostic techniques, PET-CT subjects patients to higher levels of radiation, because two modalities are used in a single exam. In this study, the doses absorbed in 19 patient organs from the tomographic scan were evaluated. Radiochromic films were correctly positioned in the Alderson anthropomorphic simulator, male version. For evaluation, two whole body scan protocols were compared. For evaluation, two whole body scan protocols were compared. An increase of up to 600% in the absorbed dose in the pituitary was observed when the protocols were compared, with the lowest observed increase of approximately 160% for the liver. It is concluded that the dose from CT in patients submitted to PET-CT scanning is higher in the protocol used for diagnosis. Considering the high cost of PET-CT exam, in many cases it is preferable that the CT examination is of diagnostic quality, and not only for anatomical mapping, an argument based on the Principle of Justification

  7. Reduction in Wound Complications After Total Ankle Arthroplasty Using a Compression Wrap Protocol.

    Science.gov (United States)

    Schipper, Oliver N; Hsu, Andrew R; Haddad, Steven L

    2015-12-01

    The purpose of this study was to evaluate the clinical differences in wound complications after total ankle arthroplasty (TAA) between a cohort of patients that received a compression wrap protocol and a historical control group treated with cast immobilization. Patient charts and postoperative wound pictures were reviewed for 42 patients who underwent a compression wrap protocol and 50 patients who underwent circumferential casting after primary TAA from 2008 to 2013. A blinded reviewer graded each wound using a novel postoperative wound classification system, and recorded whether the wound was completely healed by or after 3 months. A second blinded review was performed to determine intraobserver reliability. Mean patient age was 55 years (range, 24-80) and all patients had at least 6-month follow-up. There were significantly more total wound complications (P = .02) and mild wound complications (P = .02) in the casted group compared to the compression wrap group. There were no significant differences in the number of moderate and severe complications between each group. A significantly higher proportion of TAA incisions took longer than 3 months to heal in the casted group (P = .02). Based on our clinical experience with postoperative wound care after TAA, use of a compression wrap protocol was safe and effective at reducing wound-related complications, and well tolerated by patients. Further prospective, randomized clinical trials are warranted to evaluate the utility and cost-effectiveness of a compression wrap protocol after TAA. © The Author(s) 2015.

  8. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees.

    Science.gov (United States)

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-04-01

    A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  9. Deployment Strategies and Clustering Protocols Efficiency

    Directory of Open Access Journals (Sweden)

    Chérif Diallo

    2017-06-01

    Full Text Available Wireless sensor networks face significant design challenges due to limited computing and storage capacities and, most importantly, dependence on limited battery power. Energy is a critical resource and is often an important issue to the deployment of sensor applications that claim to be omnipresent in the world of future. Thus optimizing the deployment of sensors becomes a major constraint in the design and implementation of a WSN in order to ensure better network operations. In wireless networking, clustering techniques add scalability, reduce the computation complexity of routing protocols, allow data aggregation and then enhance the network performance. The well-known MaxMin clustering algorithm was previously generalized, corrected and validated. Then, in a previous work we have improved MaxMin by proposing a Single- node Cluster Reduction (SNCR mechanism which eliminates single-node clusters and then improve energy efficiency. In this paper, we show that MaxMin, because of its original pathological case, does not support the grid deployment topology, which is frequently used in WSN architectures. The unreliability feature of the wireless links could have negative impacts on Link Quality Indicator (LQI based clustering protocols. So, in the second part of this paper we show how our distributed Link Quality based d- Clustering Protocol (LQI-DCP has good performance in both stable and high unreliable link environments. Finally, performance evaluation results also show that LQI-DCP fully supports the grid deployment topology and is more energy efficient than MaxMin.

  10. Large family of quantum weak coin-flipping protocols

    International Nuclear Information System (INIS)

    Mochon, Carlos

    2005-01-01

    Each classical public-coin protocol for coin flipping is naturally associated with a quantum protocol for weak coin flipping. The quantum protocol is obtained by replacing classical randomness with quantum entanglement and by adding a cheat detection test in the last round that verifies the integrity of this entanglement. The set of such protocols defines a family which contains the protocol with bias 0.192 previously found by the author, as well as protocols with bias as low as 1/6 described herein. The family is analyzed by identifying a set of optimal protocols for every number of messages. In the end, tight lower bounds for the bias are obtained which prove that 1/6 is optimal for all protocols within the family

  11. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  12. Protocol: A simple phenol-based method for 96-well extraction of high quality RNA from Arabidopsis

    Directory of Open Access Journals (Sweden)

    Coustham Vincent

    2011-03-01

    Full Text Available Abstract Background Many experiments in modern plant molecular biology require the processing of large numbers of samples for a variety of applications from mutant screens to the analysis of natural variants. A severe bottleneck to many such analyses is the acquisition of good yields of high quality RNA suitable for use in sensitive downstream applications such as real time quantitative reverse-transcription-polymerase chain reaction (real time qRT-PCR. Although several commercial kits are available for high-throughput RNA extraction in 96-well format, only one non-kit method has been described in the literature using the commercial reagent TRIZOL. Results We describe an unusual phenomenon when using TRIZOL reagent with young Arabidopsis seedlings. This prompted us to develop a high-throughput RNA extraction protocol (HTP96 adapted from a well established phenol:chloroform-LiCl method (P:C-L that is cheap, reliable and requires no specialist equipment. With this protocol 192 high quality RNA samples can be prepared in 96-well format in three hours (less than 1 minute per sample with less than 1% loss of samples. We demonstrate that the RNA derived from this protocol is of high quality and suitable for use in real time qRT-PCR assays. Conclusion The development of the HTP96 protocol has vastly increased our sample throughput, allowing us to fully exploit the large sample capacity of modern real time qRT-PCR thermocyclers, now commonplace in many labs, and develop an effective high-throughput gene expression platform. We propose that the HTP96 protocol will significantly benefit any plant scientist with the task of obtaining hundreds of high quality RNA extractions.

  13. The Kyoto Protocol. An economic appraisal

    International Nuclear Information System (INIS)

    Grubb, M.

    2000-05-01

    This paper examines the overall economics of the Kyoto Protocol on climate change, in three main parts. The first part explores the structure of the Protocol and how this matches against classical economic criteria of an 'optimal' climate change agreement. This discussion also considers the nature of and reasons for shortcomings, and the prospects for its evolution. Given the various flexibilities in the agreement, the Kyoto Protocol is far more economically efficient in its structure than any previous global environmental agreement. The central conclusion is that, from an economic perspective, the Protocol's structure for industrialised country commitments is as good as could reasonably be expected. The second part of the paper explores more closely the economics of the commitments themselves and how they combine with the various flexibilities, briefly reviewing the available literature and using a simple spreadsheet model of how the commitments might combine with trading mechanisms under a range of assumptions. Flexibility is intrinsic and necessary, but it is argued that the allocations to Russia and Ukraine in particular mean that unlimited flexibility could render the Protocol's commitments weaker in their impacts than is economically desirable to address climate change. It is argued that, should this prove to be the case, access to the large surplus in the transition economies could be used as a control valve to limit the costs of the Protocol to within acceptable limits. Finally, the paper considers the issues of developing country involvement in the Kyoto Protocol, and the Protocol's longer-term impact and evolution, including its impact on technological evolution and dissemination and the evolution of future commitments. It is argued that taking account of such issues critically affects views of the Protocol

  14. Improving Anomaly Detection for Text-Based Protocols by Exploiting Message Structures

    Directory of Open Access Journals (Sweden)

    Christian M. Mueller

    2010-12-01

    Full Text Available Service platforms using text-based protocols need to be protected against attacks. Machine-learning algorithms with pattern matching can be used to detect even previously unknown attacks. In this paper, we present an extension to known Support Vector Machine (SVM based anomaly detection algorithms for the Session Initiation Protocol (SIP. Our contribution is to extend the amount of different features used for classification (feature space by exploiting the structure of SIP messages, which reduces the false positive rate. Additionally, we show how combining our approach with attribute reduction significantly improves throughput.

  15. An approach to standardization of urine sediment analysis via suggestion of a common manual protocol.

    Science.gov (United States)

    Ko, Dae-Hyun; Ji, Misuk; Kim, Sollip; Cho, Eun-Jung; Lee, Woochang; Yun, Yeo-Min; Chun, Sail; Min, Won-Ki

    2016-01-01

    The results of urine sediment analysis have been reported semiquantitatively. However, as recent guidelines recommend quantitative reporting of urine sediment, and with the development of automated urine sediment analyzers, there is an increasing need for quantitative analysis of urine sediment. Here, we developed a protocol for urine sediment analysis and quantified the results. Based on questionnaires, various reports, guidelines, and experimental results, we developed a protocol for urine sediment analysis. The results of this new protocol were compared with those obtained with a standardized chamber and an automated sediment analyzer. Reference intervals were also estimated using new protocol. We developed a protocol with centrifugation at 400 g for 5 min, with the average concentration factor of 30. The correlation between quantitative results of urine sediment analysis, the standardized chamber, and the automated sediment analyzer were generally good. The conversion factor derived from the new protocol showed a better fit with the results of manual count than the default conversion factor in the automated sediment analyzer. We developed a protocol for manual urine sediment analysis to quantitatively report the results. This protocol may provide a mean for standardization of urine sediment analysis.

  16. Elder Abuse Identification in the Prehospital Setting: An Examination of State Emergency Medical Services Protocols.

    Science.gov (United States)

    Namboodri, Brooke L; Rosen, Tony; Dayaa, Joseph A; Bischof, Jason J; Ramadan, Nadeem; Patel, Mehul D; Grover, Joseph; Brice, Jane H; Platts-Mills, Timothy F

    2018-03-22

    To describe statewide emergency medical service (EMS) protocols relating to identification, management, and reporting of elder abuse in the prehospital setting. Cross-sectional analysis. Statewide EMS protocols in the United States. Publicly available statewide EMS protocols identified from published literature, http://EMSprotocols.org, and each state's public health website. Protocols were reviewed to determine whether elder abuse was mentioned, elder abuse was defined, potential indicators of elder abuse were listed, management of older adults experiencing abuse was described, and instructions regarding reporting were provided. EMS protocols for child abuse were reviewed in the same manner for the purpose of comparison. Of the 35 publicly available statewide EMS protocols, only 14 (40.0%) mention elder abuse. Of protocols that mention elder abuse, 6 (42.9%) define elder abuse, 10 (71.4%) describe indicators of elder abuse, 8 (57.1%) provide instruction regarding management, and 12 (85.7%) provide instruction regarding reporting. Almost twice as many states met each of these metrics for child abuse. Statewide EMS protocols for elder abuse vary in regard to identification, management, and reporting, with the majority of states having no content on this subject. Expansion and standardization of protocols may increase the identification of elder abuse. © 2018, Copyright the Authors Journal compilation © 2018, The American Geriatrics Society.

  17. Atypical Squamous Cells of Undetermined Significance: Bethesda Classification and Association with Human Papillomavirus

    Directory of Open Access Journals (Sweden)

    Ana Cristina Macêdo Barcelos

    2011-01-01

    Full Text Available Introduction. To analyze patients with atypical squamous cells of undetermined significance (ASCUS through a cytology review and the presence of microbiological agents, with consideration of colposcopy and semiannual tracking. Methods. 103 women with ASCUS were reviewed and reclassified: normal/inflammatory, ASCUS, low-grade squamous intraepithelial lesion (LSIL, or high-grade squamous intraepithelial lesion (HSIL. If ASCUS confirmed, it was subclassified in reactive or neoplastic ASCUS, ASC-US, or ASC-H; and Regione Emilia Romagna Screening Protocol. Patients underwent a colposcopic examination, and test for Candida sp., bacterial vaginosis, Trichomonas vaginalis, and human papillomavirus (HPV were performed. Results. Upon review, ASCUS was diagnosis in 70/103 (67.9%, being 38 (54.2% reactive ASCUS and 32 (45.71% neoplastic ASCUS; 62 (88.5% ASC-US and 8 (11.41% ASC-H. ASCUS (Regione Protocol, respectively 1-5: 15 (21.4%, 19 (27.1%, 3 (27.1%, 16 (22.8%, and 1 (1.4%. A higher number of cases of cervical intraepithelial neoplasia (CIN II/III in the biopsies of patients with ASC-H compared to ASC-US (P=.0021. High-risk HPV test and presence of CIN II/III are more frequent in ASC-H than ASC-US (P=.031. Conclusions. ASC-H is associated with clinically significant disease. High-risk HPV-positive status in the triage for colposcopy of patients with ASC-US is associated with increased of CIN.

  18. Hydrogen peroxide bleaching induces changes in the physical properties of dental restorative materials: Effects of study protocols.

    Science.gov (United States)

    Yu, Hao; Zhang, Chang-Yuan; Wang, Yi-Ning; Cheng, Hui

    2018-03-01

    The purpose of this study was to evaluate the influence of study protocols on the effects of bleaching on the surface roughness, substance loss, flexural strength (FS), flexural modulus (FM), Weibull parameters, and color of 7 restorative materials. The test materials included 4 composite resins, 1 glass-ionomer cement, 1 dental ceramic, and 1 polyacid-modified composite. The specimens were randomly divided into 4 groups (n = 20) according to different study protocols: a bleaching group at 25°C (group 25B), a bleaching group at 37°C (group 37B), a control group at 25°C (group 25C), and a control group at 37°C (group 37C). The specimens in the bleaching group were treated with 40% hydrogen peroxide for 80 min at the respective environmental temperatures. The surface roughness, substance loss, FS, FM, and color of the specimens were measured before and after treatment. FS data were also subjected to Weibull analysis, which was used to estimate of the Weibull modulus (m) and the characteristic strength (σ 0 ). Surface roughness increased and significant color changes were observed for all tested specimens after bleaching treatment, except for the ceramic. After bleaching at 37°C, the polyacid-modified composite showed significantly reduced FS, FM, m, and σ 0 values in comparison to the control specimens stored at 37°C in whole saliva. Significant differences were also found between the 37B and 25B polyacid-modified composite groups in terms of surface roughness, FS, m, σ 0 , and color changes. Varying effects of bleaching on the physical properties of dental restorative materials were observed, and the influences of the study protocols on bleaching effects were found to be material-dependent. The influence of study protocols on the effects of bleaching on the surface roughness, flexural properties, and color of dental restorative materials are material-dependent and should be considered when evaluating the effects of bleaching on dental restorative

  19. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  20. Comparison of luteal estradiol patch and gonadotropin-releasing hormone antagonist suppression protocol before gonadotropin stimulation versus microdose gonadotropin-releasing hormone agonist protocol for patients with a history of poor in vitro fertilization outcomes.

    Science.gov (United States)

    Weitzman, Vanessa N; Engmann, Lawrence; DiLuigi, Andrea; Maier, Donald; Nulsen, John; Benadiva, Claudio

    2009-07-01

    To compare IVF outcomes in poor-responder patients undergoing stimulation after luteal phase E(2) patch/GnRH antagonist (LPG) protocol versus microdose GnRH agonist protocol. Retrospective analysis. University-based IVF center. Forty-five women undergoing ovarian stimulation for IVF using the LPG protocol were compared with 76 women stimulated with the microdose GnRH agonist protocol from May 2005 to April 2006. Cancellation rate, number of oocytes retrieved, and clinical pregnancy rates. The mean number of oocytes (9.1 +/- 4.1 vs. 8.9 +/- 4.3) and mature oocytes (6.7 +/- 3.5 vs. 6.8 +/- 3.1) retrieved were similar, as were the fertilization rates (70.0% +/- 24.2% vs. 69.9% +/- 21.5%) and the number of embryos transferred (2.5 +/- 1.1 vs. 2.7 +/- 1.3). The cancellation rate was not significantly different between the groups (13/45, 28.9% vs. 23/76, 30.3%). Likewise, there were no significant differences among the implantation rate (15.0% vs. 12.5%), clinical pregnancy rate (43.3% vs. 45.1%), and ongoing pregnancy rate per transfer (33.3% vs. 26.0%) between both groups. This study demonstrates that the use of an E(2) patch and a GnRH antagonist during the preceding luteal phase in patients with a history of failed cycles can provide similar IVF outcomes when compared with the microdose GnRH agonist protocol.

  1. Social marketing campaign significantly associated with increases in syphilis testing among gay and bisexual men in San Francisco.

    Science.gov (United States)

    Montoya, Jorge A; Kent, Charlotte K; Rotblatt, Harlan; McCright, Jacque; Kerndt, Peter R; Klausner, Jeffrey D

    2005-07-01

    Between 1999 and 2002, San Francisco experienced a sharp increase in early syphilis among gay and bisexual men. In response, the San Francisco Department of Public Health launched a social marketing campaign to increase testing for syphilis, and awareness and knowledge about syphilis among gay and bisexual men. A convenience sample of 244 gay and bisexual men (18-60 years of age) were surveyed to evaluate the effectiveness of the campaign. Respondents were interviewed to elicit unaided and aided awareness about the campaign, knowledge about syphilis, recent sexual behaviors, and syphilis testing behavior. After controlling for other potential confounders, unaided campaign awareness was a significant correlate of having a syphilis test in the last 6 months (odds ratio, 3.21; 95% confidence interval, 1.30-7.97) compared with no awareness of the campaign. A comparison of respondents aware of the campaign with those not aware also revealed significant increases in awareness and knowledge about syphilis. The Healthy Penis 2002 campaign achieved its primary objective of increasing syphilis testing, and awareness and knowledge about syphilis among gay and bisexual men in San Francisco.

  2. Packet traffic features of IPv6 and IPv4 protocol traffic

    OpenAIRE

    ÇİFLİKLİ, Cebrail; GEZER, Ali; ÖZŞAHİN, Abdullah Tuncay

    2012-01-01

    Nowadays, the IPv6 protocol is in a transition phase in operational networks. The ratio of its traffic volume is increasing day by day. The many provided facilities for IPv6 connection increasethe total IPv6 traffic load. IPv6-over-IPv4 tunnels, pilot programsto provide IPv6 connections, IPv6/IPv4 dual stack operating systems,and free IPv6 tunnel brokers cause the IPv6 protocol to expand quickly. For efficient resource utilization, the characteristics of network traffic should be determ...

  3. BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys

    Directory of Open Access Journals (Sweden)

    Songjie Wei

    2018-01-01

    Full Text Available LEO constellation has received intensive research attention in the field of satellite communication. The existing centralized authentication protocols traditionally used for MEO/GEO satellite networks cannot accommodate LEO satellites with frequent user connection switching. This paper proposes a fast and efficient access verification protocol named BAVP by combining identity-based encryption and blockchain technology. Two different key management schemes with IBE and blockchain, respectively, are investigated, which further enhance the authentication reliability and efficiency in LEO constellation. Experiments on OPNET simulation platform evaluate and demonstrate the effectiveness, reliability, and fast-switching efficiency of the proposed protocol. For LEO networks, BAVP surpasses the well-known existing solutions with significant advantages in both performance and scalability which are supported by theoretical analysis and simulation results.

  4. The effects of a tailored intensive care unit delirium prevention protocol: A randomized controlled trial.

    Science.gov (United States)

    Moon, Kyoung-Ja; Lee, Sun-Mi

    2015-09-01

    A decreased incidence of delirium following the application of non-pharmacologic intervention protocols to several patient populations has been previously reported. However, few studies have been conducted to examine the effects of their application to intensive care unit (ICU) patients. To examine the effects of applying a tailored delirium preventive protocol, developed by the authors, to ICU patients by analyzing its effects on delirium incidence, in-hospital mortality, ICU readmission, and length of ICU stay in a Korean hospital. A single-blind randomized controlled trial. A 1049-bed general hospital with a 105-bed ICU. Sixty and 63 ICU patients were randomly assigned to the intervention and control groups, respectively. The researchers applied the delirium prevention protocol to the intervention group every day for the first 7 days of ICU hospitalization. Delirium incidence, mortality, and re-admission to the ICU during the same hospitalization period were analyzed by logistic regression analysis; the 7- and 30-day in-hospital mortality by Kaplan-Meier survival and Cox proportional hazard regression analysis; and length of ICU stay was assessed by linear regression analysis. Application of the protocol had no significant effect on delirium incidence, in-hospital mortality, re-admission to the ICU, or length of ICU stay. Whereas the risk of 30-day in-hospital mortality was not significantly lower in the intervention than in the control group (OR: 0.33; 95% CI: 0.10-1.09), we found a significantly decreased 7-day in-hospital mortality in the intervention group after protocol application (HR: 0.09; 95% CI: 0.01-0.72). Application of a tailored delirium prevention protocol to acute stage patients during the first 7 days of ICU hospitalization appeared to reduce the 7-day in-hospital risk of mortality only for this patient population. Copyright © 2015 Elsevier Ltd. All rights reserved.

  5. Principles of the new quantum cryptography protocols building

    International Nuclear Information System (INIS)

    Kurochkin, V.; Kurochkin, Yu.

    2009-01-01

    The main aim of the quantum cryptography protocols is the maximal secrecy under the conditions of the real experiment. This work presents the result of the new protocol building with the use of the secrecy maximization. While using some well-known approaches this method has allowed one to achieve completely new results in quantum cryptography. The process of the protocol elaboration develops from the standard BB84 protocol upgrading to the building of completely new protocol with arbitrary large bases number. The secrecy proofs of the elaborated protocol appear to be natural continuation of the protocol building process. This approach reveals possibility to reach extremely high parameters of the protocol. It suits both the restrictions of contemporary technologies and requirements for high bit rate while being absolutely secret

  6. Accuracy of prehospital triage protocols in selecting severely injured patients: A systematic review.

    Science.gov (United States)

    van Rein, Eveline A J; Houwert, R Marijn; Gunning, Amy C; Lichtveld, Rob A; Leenen, Luke P H; van Heijl, Mark

    2017-08-01

    Prehospital trauma triage ensures proper transport of patients at risk of severe injury to hospitals with an appropriate corresponding level of trauma care. Incorrect triage results in undertriage and overtriage. The American College of Surgeons Committee on Trauma recommends an undertriage rate below 5% and an overtriage rate below 50% for prehospital trauma triage protocols. To find the most accurate prehospital trauma triage protocol, a clear overview of all currently available protocols and corresponding outcomes is necessary. The aim of this systematic review was to evaluate the current literature on all available prehospital trauma triage protocols and determine accuracy of protocol-based triage quality in terms of sensitivity and specificity. A search of Pubmed, Embase, and Cochrane Library databases was performed to identify all studies describing prehospital trauma triage protocols before November 2016. The search terms included "trauma," "trauma center," or "trauma system" combined with "triage," "undertriage," or "overtriage." All studies describing protocol-based triage quality were reviewed. To assess the quality of these type of studies, a new critical appraisal tool was developed. In this review, 21 articles were included with numbers of patients ranging from 130 to over 1 million. Significant predictors for severe injury were: vital signs, suspicion of certain anatomic injuries, mechanism of injury, and age. Sensitivity ranged from 10% to 100%; specificity from 9% to 100%. Nearly all protocols had a low sensitivity, thereby failing to identify severely injured patients. Additionally, the critical appraisal showed poor quality of the majority of included studies. This systematic review shows that nearly all protocols are incapable of identifying severely injured patients. Future studies of high methodological quality should be performed to improve prehospital trauma triage protocols. Systematic review, level III.

  7. Analysis of the radius and diameter protocols in terms of pricing telecommunication services

    Directory of Open Access Journals (Sweden)

    Vesna M. Radonjić

    2013-06-01

    functionality are based on the fundamental functionality of the RADIUS protocol and the rest is a result of new solutions and improvements to the existing ideas. The Diameter protocol focuses on the expansion of flexible, advanced routing algorithms, dynamic troubleshooting and safety characteristics of the transport layer. This paper defines the basic packet formats, data transfer mechanisms and error management, methods of communication between individual elements of the architecture and basic security functions. The Diameter protocol architecture is based on the peer-to-peer model. Besides clients and servers, network agents can be the elements of this architecture. The Diameter agent is an element that does not allow authentication / authorization locally, but the server performs this operation, while one node can be both the client and the server simultaneously. The role of agents can be forwarding (Relay Agent, redirection (Redirect Agent, mediation (Proxy Agent and translation (Translation Agent. Since the peer-to-peer model is applied, each Diameter element can establish more connections at the same time. Diameter enables the delivery of attribute value pairs, the possibility of negotiation, error notification, extensibility by adding new commands and attribute value pairs, the basic services necessary for applications such as managing user sessions or accounting.   Comparison of the RADIUS and Diameter protocols   Although at the protocol market for authentication, authorization and accounting, the RADIUS protocol remains the most popular, its popularity and dominance has a decreasing tendency. The main reasons for this are more prominent limitations which are particularly perceived due to new and increasingly popular technology. Therefore, the main issue is about a protocol that will replace RADIUS. The peer-to-peer architecture used by Diameter is much more flexible than the client-server model because in the peer-to-peer architecture every element can be both the

  8. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  9. Fast-track protocols in devascularization for cirrhotic portal hypertension

    Directory of Open Access Journals (Sweden)

    Yang Fei

    2015-06-01

    Full Text Available Summary Introduction/objective: fast-tract surgery (FTS has been rapidly embraced by surgeons as a mechanism for improving patient care and driving down complications and costs. The aim of this study was to determine if any improvement in outcomes occurred after FTS protocol for selective double portazygous disconnection with preserving vagus (SDPDPV compared with non-FTS postoperative care. Methods: patients eligible for SDPDPV in the period January 2012-April 2014 were randomly selected for the FTS group or non-FTS group. A designed protocol was used in the FTS group with emphasis on an interdisciplinary approach. The non-FTS group was treated using previously established standard procedures. The number of postoperative complications, time of functional recovery and duration of hospital stay were recorded. Results: patients in the FTS group (n=59 and non-FTS group (n=57 did not differ in terms of preoperative data and operative details (p>0.05. The FTS procedure led to significantly better control and faster restoration of gastrointestinal functions, food tolerance, rehabilitation and hospital discharge (p<0.05. Postoperative complications, including nausea/vomiting, severe ascites, wound infection, urinary tract infection and pulmonary infection were all significantly lower in the FTS group (p<0.05. According to the postoperative morbidity classification used by Clavien, overall complications and grade I complications were both significantly lower in the FTS group compared with the non-FTS group (p<0.05. Conclusion: adopting the FTS protocol helped to recover gastrointestinal functions, to reduce frequency of postoperative complications and to reduce hospital stay. The FTS strategy is safe and effective in improving postoperative outcomes.

  10. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  11. Additional protocols and regional cooperation on peaceful uses of nuclear energy in northeast Asia

    Energy Technology Data Exchange (ETDEWEB)

    Choe, Kwan Kyoo [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    2004-07-01

    The main object of this article is to clarify the relations between the implementation of the Protocols Additional to Safeguards Agreement (hereinafter referred to as the Additional Protocols) and the feasibility of the regional cooperation on peaceful uses of nuclear energy in Northeast Asia (NEA). The regionalism has a strong tendency to be based in advance on regional cooperation. The regionalism has three main structural elements in its definition: geographical proximity, cultural resemblance, and cooperative attitudes among all the countries concerned. The Additional Protocols allow the IAEA to access to more detailed information and nuclear activities of a State party. The aspect that the Additional Protocols could increase the nuclear transparency will result in ultimately promoting the confidence among the regional nations concerned.

  12. An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Lauritsen, Rasmus; Toft, Tomas

    2014-01-01

    Recent developments in Multi-party Computation (MPC) has resulted in very efficient protocols for dishonest majority in the preprocessing model. In particular, two very promising protocols for Boolean circuits have been proposed by Nielsen et al. (nicknamed TinyOT) and by Damg˚ard and Zakarias...... suggest a modification of MiniMac that achieves increased parallelism at no extra communication cost. This gives an asymptotic improvement of the original protocol as well as an 8-fold speed-up of our implementation. We compare the resulting protocol to TinyOT for the case of secure computation in parallel...... of a large number of AES encryptions and find that it performs better than results reported so far on TinyOT, on the same hardware.p...

  13. Dynamic Anthropometry – Deffning Protocols for Automatic Body Measurement

    Directory of Open Access Journals (Sweden)

    Slavenka Petrak

    2017-12-01

    Full Text Available The paper presents the research on possibilities of protocol development for automatic computer-based determination of measurements on a 3D body model in defined dynamic positions. Initially, two dynamic body positions were defined for the research on dimensional changes of targeted body lengths and surface segments during body movement from basic static position into a selected dynamic body position. The assumption was that during body movement, specifi c length and surface dimensions would change significantly from the aspect of clothing construction and functionality of a garment model. 3D body scanning of a female test sample was performed in basic static and two defined dynamic positions. 3D body models were processed and measurement points were defined as a starting point for the determination of characteristic body measurements. The protocol for automatic computer measurement was defined for every dynamic body position by the systematic set of activities based on determined measurement points. The verification of developed protocols was performed by automatic determination of defined measurements on the test sample and by comparing the results with the conventional manual measurement.

  14. A Practice-Based Evaluation of Distress Screening Protocol Adherence and Medical Service Utilization.

    Science.gov (United States)

    Zebrack, Brad; Kayser, Karen; Bybee, Deborah; Padgett, Lynne; Sundstrom, Laura; Jobin, Chad; Oktay, Julianne

    2017-07-01

    Background: This study examined the extent to which cancer programs demonstrated adherence to their own prescribed screening protocol, and whether adherence to that protocol was associated with medical service utilization. The hypothesis is that higher rates of service utilization are associated with lower rates of adherence to screening protocols. Methods: Oncology social workers at Commission on Cancer-accredited cancer programs reviewed electronic health records (EHRs) in their respective cancer programs during a 2-month period in 2014. Rates of overall adherence to a prescribed distress screening protocol were calculated based on documentation in the EHR that screening adherence and an appropriate clinical response had occurred. We examined documentation of emergency department (ED) use and hospitalization within 2 months after the screening visit. Results: Review of 8,409 EHRs across 55 cancer centers indicated that the overall adherence rate to screening protocols was 62.7%. The highest rates of adherence were observed in Community Cancer Programs (76.3%) and the lowest rates were in NCI-designated Cancer Centers (43.3%). Rates of medical service utilization were significantly higher than expected when overall protocol adherence was lacking. After controlling for patient and institutional characteristics, risk ratios for ED use (0.82) and hospitalization (0.81) suggest that when overall protocol adherence was documented, 18% to 19% fewer patients used these medical services. Conclusions: The observed associations between a mandated psychosocial care protocol and medical service utilization suggest opportunities for operational efficiencies and costs savings. Further investigations of protocol integrity, as well as the clinical care models by which psychosocial care is delivered, are warranted. Copyright © 2017 by the National Comprehensive Cancer Network.

  15. Successful Short Desensitization Treatment Protocol with Narrowband UVB Phototherapy (TL-01) in Polymorphic Light Eruption.

    Science.gov (United States)

    Combalia, A; Fernández-Sartorio, C; Fustà, X; Morgado-Carrasco, D; Podlipnik, S; Aguilera, P

    2017-10-01

    Polymorphic light eruption (PLE) is a common idiopathic photodermatosis that typically presents with pruritic papular or papulovesicular lesions on sun-exposed skin between spring and autumn. In many subjects PLE is mild, and can usually be prevented by the use of broad-spectrum topical sunscreens and a gradual increase in sunlight exposure. However, in some individuals, sunlight exposure results in florid PLE and they often benefit from prophylactic desensitization treatment using phototherapy in early spring, an artificial method that induces a "hardening" phenomenon. To describe and evaluate the efficacy of a short desensitization protocol, based on a one-month-treatment, administered twice a week with narrow band UVB in subjects with severe polymorphic light eruption (PLE). A retrospective, open planned and non-randomized study to assess the efficacy of UVB phototherapy in prevention of polymorphic light eruption. Fifteen subjects diagnosed with severe PLE were treated with the standard protocol in our Photobiology Unit between 2014 and 2015. The effect of hardening was sustained during follow up in 87.5% of desensitization treatments. A statistically significant association (pPLE and the response to treatment was found. The effect of hardening was maintained in the vast majority of subjects, obtaining a good benefit with no PLE episodes during all the summer. We demonstrate that our standard protocol is effective, and produces a successful outcome for the majority of PLE subjects. Our protocol is shorter than those currently applied, being favourable both for the patient and the physician. Copyright © 2017 AEDV. Publicado por Elsevier España, S.L.U. All rights reserved.

  16. An improved protocol for efficient transformation and regeneration of diverse indica rice cultivars

    Directory of Open Access Journals (Sweden)

    Sahoo Khirod K

    2011-12-01

    Full Text Available Abstract Background Rice genome sequencing projects have generated remarkable amount of information about genes and genome architecture having tremendous potential to be utilized in both basic and applied research. Success in transgenics is paving the way for preparing a road map of functional genomics which is expected to correlate action of a gene to a trait in cellular and organismal context. However, the lack of a simple and efficient method for transformation and regeneration is a major constraint for such studies in this important cereal crop. Results In the present study, we have developed an easy, rapid and highly efficient transformation and regeneration protocol using mature seeds as explants and found its successful applicability to a choice of elite indica rice genotypes. We have optimized various steps of transformation and standardized different components of the regeneration medium including growth hormones and the gelling agent. The modified regeneration medium triggers production of large number of shoots from smaller number of calli and promotes their faster growth, hence significantly advantageous over the existing protocols where the regeneration step requires maximum time. Using this protocol, significantly higher transformation efficiency (up to 46% and regeneration frequency (up to 92% for the untransformed calli and 59% for the transformed calli were achieved for the four tested cultivars. We have used this protocol to produce hundreds of independent transgenic lines of different indica rice genotypes. Upon maturity, these transgenic lines were fertile thereby indicating that faster regeneration during tissue culture did not affect their reproductive potential. Conclusions This speedy, yet less labor-intensive, protocol overcomes major limitations associated with genetic manipulation in rice. Moreover, our protocol uses mature seeds as the explant, which can easily be obtained in quantity throughout the year and kept

  17. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  18. Assessment of auditory skills in 140 cochlear implant children using the EARS protocol.

    Science.gov (United States)

    Sainz, Manuel; Skarzynski, Henryk; Allum, John H J; Helms, Jan; Rivas, Adriana; Martin, Jane; Zorowka, Patrick Georg; Phillips, Lucy; Delauney, Joseph; Brockmeyer, Steffi Johanna; Kompis, Martin; Korolewa, Inna; Albegger, Klaus; Zwirner, Petra; Van De Heyning, Paul; D'Haese, Patrick

    2003-01-01

    Auditory performance of cochlear implant (CI) children was assessed with the Listening Progress Profile (LiP) and the Monosyllabic-Trochee-Polysyllabic-Word Test (MTP) following the EARS protocol. Additionally, the 'initial drop' phenomenon, a recently reported decrease of auditory performance occurring immediately after first fitting, was investigated. Patients were 140 prelingually deafened children from various clinics and centers worldwide implanted with a MEDEL COMBI 40/40+. Analysis of LiP data showed a significant increase after 1 month of CI use compared to preoperative scores (p < 0.01). No initial decrease was observed with this test. Analysis of MTP data revealed a significant improvement of word recognition after 6 months (p < 0.01), with a significant temporary decrease after initial fitting (p < 0.01). With both tests, children's auditory skills improved up to 2 years. Amount of improvement was negatively correlated with age at implantation. Copyright 2003 S. Karger AG, Basel

  19. SPP: A data base processor data communications protocol

    Science.gov (United States)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  20. Deterministic secure communication protocol without using entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

  1. Performance Effects of Repetition Specific Gluteal Activation Protocols on Acceleration in Male Rugby Union Players

    Directory of Open Access Journals (Sweden)

    Barry Lorna

    2016-12-01

    Full Text Available Warm-up protocols have the potential to cause an acute enhancement of dynamic sprinting performance. The purpose of this study was to evaluate the effects of three repetition specific gluteal activation warm-up protocols on acceleration performance in male rugby union players. Forty male academy rugby union players were randomly assigned to one of 4 groups (control, 5, 10 or 15 repetition gluteal activation group and performed 10 m sprints at baseline and 30 s, 2, 4, 6 and 8 min after their specific intervention protocol. Five and ten meter sprint times were the dependent variable and dual-beam timing gates were used to record all sprint times. Repeated measures analysis of variance found no significant improvement in 5 and 10 m sprint times between baseline and post warm-up scores (p ≥ 0.05 for all groups. There were no reported significant differences between groups at any of the rest interval time points (p ≥ 0.05. However, when individual responses to the warm-up protocols were analyzed, the 15 repetition gluteal activation group had faster 10 m times post-intervention and this improvement was significant (p = 0.021. These results would indicate that there is no specific rest interval for any of the gluteal interventions that results in a potentiation effect on acceleration performance. However, the individual response analysis would seem to indicate that a 15 repetition gluteal activation warm-up protocol has a potentiating effect on acceleration performance provided that the rest interval is adequately and individually determined.

  2. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  3. Comparison between two treatment protocols with recombinant Human Erythropoietin (rHuEpo in the treatment of late anemia in neonates with Rh-Isoimmunization

    Directory of Open Access Journals (Sweden)

    A.A. Zuppa

    2012-08-01

    Full Text Available Objectve. The Rh-hemolytic disease can lead to a late anemia by hemolytic and hyporigenerative mechanism. We compared the effectiveness of rHuEPO in two care protocols that differ for doses of rHuEPO administrated and for timing of administration. Methods. A cohort of 14 neonates was investigated. The neonates were treated with two different protocols. Protocol A: a dose of 200 U/kg/day of rHuEpo administered subcutaneously starting from the end of the second week of life; Protocol B: a dose of 400 U/kg/day of rHuEpo administered subcutaneously starting from the end of the first week of life. Results. The hematocrit values in the protocol A group decreased during treatment (32,5% vs 25,2%, whereas the hematocrit value in protocol B group remained almost stable (38,7% vs 42,8%. The mean numbers of platelets remained stable in both groups while neutrophils increased in protocol A group and decreased in protocol B (p<0,05. Reticulocyte count increased during treatment in both groups, although only in protocol B group it was statistically significative (p<0,05. Conclusions. Our results suggest a similar efficacy between the two treatment protocols. Increasing doses of rHuEPO do not seem enhancing their effectiveness and the incidence of side effects.

  4. The Impact of a Universal Decolonization Protocol on Hospital-Acquired Methicillin-Resistant Staphylococcus aureus in a Burn Population.

    Science.gov (United States)

    Johnson, Arthur T; Nygaard, Rachel M; Cohen, Ellie M; Fey, Ryan M; Wagner, Anne Lambert

    Hospital-acquired (HA) methicillin-resistant Staphylococcus aureus (MRSA) is a leading cause of HA infections and a significant concern for burn centers. The use of 2% chlorhexidine-impregnated wipes and nasal mupirocin significantly decreases the rate of HA-MRSA in adult intensive care units. The aim of this study was to examine the impact of universal decolonization on the rate of MRSA conversion in an American Burn Association verified adult and pediatric burn center. Universal decolonization protocol consisting of daily chlorhexidine baths and a 5-day course of nasal mupirocin was implemented in the burn unit. MRSA screening both on admission and weekly and contact isolation practices were in place in pre-decolonization and post-decolonization periods. Patient data were analyzed 2 years before and 1 year after implementation of the protocol. The incidence rate of MRSA was significantly decreased after the implementation of the decolonization protocol (11.8 vs 1.0 per 1000 patient days, P burn patients are at greater risk for invasive infection leading to severe complications and death. The prevalence of HA-MRSA at our institution's burn center was significantly decreased after the implementation of a universal decolonization protocol.

  5. Analysis of Security Protocols for Mobile Healthcare.

    Science.gov (United States)

    Wazid, Mohammad; Zeadally, Sherali; Das, Ashok Kumar; Odelu, Vanga

    2016-11-01

    Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient's health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems.

  6. Single-source dual-energy spectral multidetector CT of pancreatic adenocarcinoma: Optimization of energy level viewing significantly increases lesion contrast

    International Nuclear Information System (INIS)

    Patel, B.N.; Thomas, J.V.; Lockhart, M.E.; Berland, L.L.; Morgan, D.E.

    2013-01-01

    V was 31 ± 25 HU (p = 0.007). Conclusion: Significantly increased pancreatic lesion contrast was noted at lower viewing energies using spectral MDCT. Individual patient CNR-optimized energy level images have the potential to improve lesion conspicuity.

  7. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  8. A review of imaging protocols for suspected skeletal dysplasia and a proposal for standardisation

    International Nuclear Information System (INIS)

    Watson, Sarah G.; Calder, Alistair D.; Offiah, Amaka C.; Negus, Samantha

    2015-01-01

    Expert radiology opinions are often requested to aid diagnosis of skeletal dysplasias or dysostoses, but due to variability in the imaging protocols used at different centres the views presented may be considered inadequate or incomplete resulting in diagnostic delays and increased patient and family anxiety. We propose the introduction of a standardised protocol that may be adapted in certain specific situations. (orig.)

  9. A review of imaging protocols for suspected skeletal dysplasia and a proposal for standardisation

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Sarah G. [Royal Surrey County Hospital, Department of Radiology, Surrey (United Kingdom); Calder, Alistair D. [Great Ormond Street Hospital for Children, NHS Foundation Trust, Department of Radiology, London (United Kingdom); Offiah, Amaka C. [Sheffield Children' s NHS Foundation Trust, The University of Sheffield Academic Unit of Child Health, Sheffield (United Kingdom); Negus, Samantha [St George' s Hospital, Department of Radiology, London (United Kingdom)

    2015-11-15

    Expert radiology opinions are often requested to aid diagnosis of skeletal dysplasias or dysostoses, but due to variability in the imaging protocols used at different centres the views presented may be considered inadequate or incomplete resulting in diagnostic delays and increased patient and family anxiety. We propose the introduction of a standardised protocol that may be adapted in certain specific situations. (orig.)

  10. Quantum-key-distribution protocol with pseudorandom bases

    Science.gov (United States)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  11. Hyperbaric oxygen therapy for wound healing in diabetic rats: Varying efficacy after a clinically-based protocol.

    Directory of Open Access Journals (Sweden)

    Johan W van Neck

    Full Text Available Hyperbaric oxygen therapy (HBOT is a clinical treatment in which a patient breathes pure oxygen for a limited period of time at an increased pressure. Although this therapy has been used for decades to assist wound healing, its efficacy for many conditions is unproven and its mechanism of action is not yet fully clarified. This study investigated the effects of HBOT on wound healing using a diabetes-impaired pressure ulcer rat model. Seven weeks after streptozotocin-induced diabetes in rats (n = 55, a pressure ulcer was created on dorsal skin. Subsequently, animals received HBOT during 6 weeks following a standard clinical protocol (HBOT group with varying endpoints up to 42 days post-wounding versus controls without HBOT. Capillary venous oxygen saturation (SO2 showed a significant increase in the HBOT group on day 24; however, this increase was significant at this time point only. The quantity of hemoglobin in the micro-blood vessels (rHB showed a significant decrease in the HBOT group on days 21 and 42, and showed a trend to decrease on day 31. Blood flow in the microcirculation showed a significant increase on days 17, 21 and 31 but a significant decrease on days 24 and 28. Inflammation scoring showed significantly decreased CD68 counts in the HBOT group on day 42, but not in the early stages of wound healing. Animals in the HBOT group showed a trend for an increase in mean wound breaking strength on day 42.

  12. Interoperability and Reliability of Multiplatform MPLS VPN: Comparison of Traffic Engineering with RSVP-TE Protocol and LDP Protocol

    Directory of Open Access Journals (Sweden)

    Nanang Ismail

    2017-10-01

    48% of packet loss per 100 sent packets while on RSVP packet loss percentage is 35.5% per 100 sent packets. Both protocols have interoperability on the third layer of multiplatform MPLS VPN, but on heavy loaded traffic condition, RSVP protocol has better reliability than the LDP protocol.

  13. Radiolabeled annexin V for imaging apoptosis in radiated human follicular thyroid carcinomas - is an individualized protocol necessary?

    Energy Technology Data Exchange (ETDEWEB)

    Grosse, Jirka [Department of Nuclear Medicine, University of Regensburg, 93042 Regensburg (Germany); Department of Clinical Pharmacology and Toxicology, Charite-Universitaetsmedizin Berlin, Campus Benjamin Franklin, 14195 Berlin (Germany)], E-mail: jirka.grosse@klinik.uni-regensburg.de; Grimm, Daniela [Department of Clinical Pharmacology and Toxicology, Charite-Universitaetsmedizin Berlin, Campus Benjamin Franklin, 14195 Berlin (Germany); Department of Pharmacology, University of Aarhus, 8000 Aarhus (Denmark); Westphal, Kriss; Ulbrich, Claudia [Department of Clinical Pharmacology and Toxicology, Charite-Universitaetsmedizin Berlin, Campus Benjamin Franklin, 14195 Berlin (Germany); Moosbauer, Jutta [Department of Nuclear Medicine, University of Regensburg, 93042 Regensburg (Germany); Pohl, Fabian; Koelbl, Oliver [Department of Radiooncology, University of Regensburg, 93042 Regensburg (Germany); Infanger, Manfred [Department of Reconstructive Surgery, Charite-Universitaetsmedizin Berlin, Campus Benjamin Franklin, 12203 Berlin (Germany); Eilles, Christoph; Schoenberger, Johann [Department of Nuclear Medicine, University of Regensburg, 93042 Regensburg (Germany)

    2009-01-15

    Introduction: Induction of apoptosis is a widely used strategy for cancer therapy, but evaluating the degree and success of this therapy still poses a problem. Radiolabeled annexin V has been proposed to be a promising candidate for detecting apoptotic cells in tumors following chemotherapy in vivo. In order to see whether radiolabeled annexin V could be a suitable substance for the noninvasive in vivo detection of apoptosis in thyroid tissue and to establish an optimized study protocol, we investigated two poorly differentiated thyroid carcinoma cell lines: ML-1 and FTC-133. Methods: Apoptosis was evaluated before as well as 2 and 4 days after in vitro irradiation with 30 Gy X-rays. In this study, binding of FITC- and of {sup 125}I-labeled annexin V was measured in comparison to other apoptosis markers such as Bax, caspase-3 and Fas, which were determined by flow cytometry and Western blot analysis with densitometric evaluation. Results: ML-1 and FTC-133 cells showed a significant increase in annexin V binding 48 h after irradiation. Ninety-six hours after irradiation, the annexin V absorption capability of ML-1 cells was still maximal, while the living fraction of FTC-133 increased significantly. The amount of caspase-3 and Bax was clearly increased 48 h after irradiation and had normalized after 96 h in both cell lines. Fas protein concentrations remained unchanged in ML-1 cells but were significantly enhanced in FTC-133 cells. Conclusion: The binding of FITC- and {sup 125}I-labeled annexin V showed a significant accordance. A reliable evaluation of apoptosis induced by radiotherapy in thyroid tumors was possible 48 h after irradiation, when binding of radiolabeled annexin V is most significantly enhanced. Using two poorly differentiated cell lines of thyroid carcinoma, one may expect to find a nearly similar response to external irradiation. In contrast, the cell lines showed a completely contrary response. However, an individualized study protocol for each

  14. Intercept-resend attacks in the Bennett-Brassard 1984 quantum-key-distribution protocol with weak coherent pulses

    International Nuclear Information System (INIS)

    Curty, Marcos; Luetkenhaus, Norbert

    2005-01-01

    Unconditional security proofs of the Bennett-Brassard 1984 protocol of quantum key distribution have been obtained recently. These proofs cover also practical implementations that utilize weak coherent pulses in the four signal polarizations. Proven secure rates leave open the possibility that new proofs or new public discussion protocols will obtain larger rates over increased distance. In this paper we investigate limits to the error rate and signal losses that can be tolerated by future protocols and proofs

  15. Evaluation of condyle defects using different reconstruction protocols of cone-beam computed tomography

    International Nuclear Information System (INIS)

    Bastos, Luana Costa; Campos, Paulo Sergio Flores; Ramos-Perez, Flavia Maria de Moraes; Pontual, Andrea dos Anjos; Almeida, Solange Maria

    2013-01-01

    This study was conducted to investigate how well cone-beam computed tomography (CBCT) can detect simulated cavitary defects in condyles, and to test the influence of the reconstruction protocols. Defects were created with spherical diamond burs (numbers 1013, 1016, 3017) in superior and / or posterior surfaces of twenty condyles. The condyles were scanned, and cross-sectional reconstructions were performed with nine different protocols, based on slice thickness (0.2, 0.6, 1.0 mm) and on the filters (original image, Sharpen Mild, S9) used. Two observers evaluated the defects, determining their presence and location. Statistical analysis was carried out using simple Kappa coefficient and McNemar’s test to check inter- and intra-rater reliability. The chi-square test was used to compare the rater accuracy. Analysis of variance (Tukey's test) assessed the effect of the protocols used. Kappa values for inter- and intra-rater reliability demonstrate almost perfect agreement. The proportion of correct answers was significantly higher than that of errors for cavitary defects on both condyle surfaces (p < 0.01). Only in identifying the defects located on the posterior surface was it possible to observe the influence of the 1.0 mm protocol thickness and no filter, which showed a significantly lower value. Based on the results of the current study, the technique used was valid for identifying the existence of cavities in the condyle surface. However, the protocol of a 1.0 mm-thick slice and no filter proved to be the worst method for identifying the defects on the posterior surface. (author)

  16. Evaluation of condyle defects using different reconstruction protocols of cone-beam computed tomography

    Energy Technology Data Exchange (ETDEWEB)

    Bastos, Luana Costa; Campos, Paulo Sergio Flores, E-mail: bastosluana@ymail.com [Universidade Federal da Bahia (UFBA), Salvador, BA (Brazil). Fac. de Odontologia. Dept. de Radiologia Oral e Maxilofacial; Ramos-Perez, Flavia Maria de Moraes [Universidade Federal de Pernambuco (UFPE), Recife, PE (Brazil). Fac. de Odontologia. Dept. de Clinica e Odontologia Preventiva; Pontual, Andrea dos Anjos [Universidade Federal de Pernambuco (UFPE), Camaragibe, PE (Brazil). Fac. de Odontologia. Dept. de Radiologia Oral; Almeida, Solange Maria [Universidade Estadual de Campinas (UNICAMP), Piracicaba, SP (Brazil). Fac. de Odontologia. Dept. de Radiologia Oral

    2013-11-15

    This study was conducted to investigate how well cone-beam computed tomography (CBCT) can detect simulated cavitary defects in condyles, and to test the influence of the reconstruction protocols. Defects were created with spherical diamond burs (numbers 1013, 1016, 3017) in superior and / or posterior surfaces of twenty condyles. The condyles were scanned, and cross-sectional reconstructions were performed with nine different protocols, based on slice thickness (0.2, 0.6, 1.0 mm) and on the filters (original image, Sharpen Mild, S9) used. Two observers evaluated the defects, determining their presence and location. Statistical analysis was carried out using simple Kappa coefficient and McNemar’s test to check inter- and intra-rater reliability. The chi-square test was used to compare the rater accuracy. Analysis of variance (Tukey's test) assessed the effect of the protocols used. Kappa values for inter- and intra-rater reliability demonstrate almost perfect agreement. The proportion of correct answers was significantly higher than that of errors for cavitary defects on both condyle surfaces (p < 0.01). Only in identifying the defects located on the posterior surface was it possible to observe the influence of the 1.0 mm protocol thickness and no filter, which showed a significantly lower value. Based on the results of the current study, the technique used was valid for identifying the existence of cavities in the condyle surface. However, the protocol of a 1.0 mm-thick slice and no filter proved to be the worst method for identifying the defects on the posterior surface. (author)

  17. Free ammonia pre-treatment of secondary sludge significantly increases anaerobic methane production.

    Science.gov (United States)

    Wei, Wei; Zhou, Xu; Wang, Dongbo; Sun, Jing; Wang, Qilin

    2017-07-01

    Energy recovery in the form of methane from sludge/wastewater is restricted by the poor and slow biodegradability of secondary sludge. An innovative pre-treatment technology using free ammonia (FA, i.e. NH 3 ) was proposed in this study to increase anaerobic methane production. The solubilisation of secondary sludge was significantly increased after FA pre-treatment at up to 680 mg NH 3 -N/L for 1 day, under which the solubilisation (i.e. 0.4 mg SCOD/mg VS; SCOD: soluble chemical oxygen demand; VS: volatile solids) was >10 times higher than that without FA pre-treatment (i.e. 0.03 mg SCOD/mg VS). Biochemical methane potential assays showed that FA pre-treatment at above 250 mg NH 3 -N/L is effective in improving anaerobic methane production. The highest improvement in biochemical methane potential (B 0 ) and hydrolysis rate (k) was achieved at FA concentrations of 420-680 mg NH 3 -N/L, and was determined as approximately 22% (from 160 to 195 L CH 4 /kg VS added) and 140% (from 0.22 to 0.53 d -1 ) compared to the secondary sludge without pre-treatment. More analysis revealed that the FA induced improvement in B 0 and k could be attributed to the rapidly biodegradable substances rather than the slowly biodegradable substances. Economic and environmental analyses showed that the FA-based technology is economically favourable and environmentally friendly. Since this FA technology aims to use the wastewater treatment plants (WWTPs) waste (i.e. anaerobic digestion liquor) to enhance methane production from the WWTPs, it will set an example for the paradigm shift of the WWTPs from 'linear economy' to 'circular economy'. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. A review on transport layer protocol performance for delivering video on an adhoc network

    Science.gov (United States)

    Suherman; Suwendri; Al-Akaidi, Marwan

    2017-09-01

    The transport layer protocol is responsible for the end to end data transmission. Transmission control protocol (TCP) provides a reliable connection and user datagram protocol (UDP) offers fast but unguaranteed data transfer. Meanwhile, the 802.11 (wireless fidelity/WiFi) networks have been widely used as internet hotspots. This paper evaluates TCP, TCP variants and UDP performances for video transmission on an adhoc network. The transport protocol - medium access cross-layer is proposed by prioritizing TCP acknowledgement to reduce delay. The NS-2 evaluations show that the average delays increase linearly for all the evaluated protocols and the average packet losses grow logarithmically. UDP produces the lowest transmission delay; 5.4% and 5.8% lower than TCP and TCP variant, but experiences the highest packet loss. Both TCP and TCP Vegas maintain packet loss as low as possible. The proposed cross-layer successfully decreases TCP and TCP Vegas delay about 0.12 % and 0.15%, although losses remain similar.

  19. Quality improvement initiative: Preventative Surgical Site Infection Protocol in Vascular Surgery.

    Science.gov (United States)

    Parizh, David; Ascher, Enrico; Raza Rizvi, Syed Ali; Hingorani, Anil; Amaturo, Michael; Johnson, Eric

    2018-02-01

    Objective A quality improvement initiative was employed to decrease single institution surgical site infection rate in open lower extremity revascularization procedures. In an attempt to lower patient morbidity, we developed and implemented the Preventative Surgical Site Infection Protocol in Vascular Surgery. Surgical site infections lead to prolonged hospital stays, adjunctive procedure, and additive costs. We employed targeted interventions to address the common risk factors that predispose patients to post-operative complications. Methods Retrospective review was performed between 2012 and 2016 for all surgical site infections after revascularization procedures of the lower extremity. A quality improvement protocol was initiated in January 2015. Primary outcome was the assessment of surgical site infection rate reduction in the pre-protocol vs. post-protocol era. Secondary outcomes evaluated patient demographics, closure method, perioperative antibiotic coverage, and management outcomes. Results Implementation of the protocol decreased the surgical site infection rate from 6.4% to 1.6% p = 0.0137). Patient demographics and comorbidities were assessed and failed to demonstrate a statistically significant difference among the infection and no-infection groups. Wound closure with monocryl suture vs. staple proved to be associated with decreased surgical site infection rate ( p site infections in the vascular surgery population are effective and necessary. Our data suggest that there may be benefit in the incorporation of MRSA and Gram-negative coverage as part of the Surgical Care Improvement Project perioperative guidelines.

  20. Comparison of the effect of two endodontic irrigation protocols on the elimination of bacteria from root canal system: a prospective, randomized clinical trial.

    Science.gov (United States)

    Beus, Christopher; Safavi, Kamran; Stratton, Jeffrey; Kaufman, Blythe

    2012-11-01

    The purpose of this prospective, randomized clinical study was to compare the results of a nonactivated single-irrigation protocol (NAI) that used only 1% NaOCl with a passive ultrasonic multi-irrigation protocol (PUI) that used 1% NaOCl, 17% ethylenediaminetetraacetic acid, and 2% chlorhexidine in rendering canals bacteria free. In addition, the effect of a second-visit instrumentation after intra-appointment calcium hydroxide (CaOH(2)) was also evaluated in bacterial elimination. Fifty patients were recruited with a posterior tooth requiring primary endodontic treatment of apical periodontitis. Standard nonsurgical endodontic therapy was performed on both groups in a 2-visit approach by using calcium hydroxide intracanal medicament. Teeth were randomly treated with the NAI or PUI protocols in the first visit after complete instrumentation. Bacterial cultures were obtained at 4 periods during treatment from the canals: (1) before instrumentation, (2) after irrigation protocol, (3) after CaOH(2) medication, and (4) before obturation. Statistical analysis was performed on data by using the Fisher exact test and multivariate analysis. NAI and PUI rendered canals 80% and 84% bacteria free, respectively, at the end of the first visit. After CaOH(2) medication the total sample (NAI + PUI) had increased to 87% bacteria free, and the second-visit instrumentation resulted in a total of 91% bacteria free. These differences were not significant (P > .05). There was no statistical difference between irrigation methods. Each protocol resulted in a high frequency of negative cultures. This high frequency of negative cultures obtained in 1 visit is most likely related to an increased volume and depth of irrigation compared with previously reported protocols. Copyright © 2012 American Association of Endodontists. Published by Elsevier Inc. All rights reserved.

  1. A new testing protocol for zirconia dental implants.

    Science.gov (United States)

    Sanon, Clarisse; Chevalier, Jérôme; Douillard, Thierry; Cattani-Lorente, Maria; Scherrer, Susanne S; Gremillard, Laurent

    2015-01-01

    Based on the current lack of standards concerning zirconia dental implants, we aim at developing a protocol to validate their functionality and safety prior their clinical use. The protocol is designed to account for the specific brittle nature of ceramics and the specific behavior of zirconia in terms of phase transformation. Several types of zirconia dental implants with different surface textures (porous, alveolar, rough) were assessed. The implants were first characterized in their as-received state by Scanning Electron Microscopy (SEM), Focused Ion Beam (FIB), X-Ray Diffraction (XRD). Fracture tests following a method adapted from ISO 14801 were conducted to evaluate their initial mechanical properties. Accelerated aging was performed on the implants, and XRD monoclinic content measured directly at their surface instead of using polished samples as in ISO 13356. The implants were then characterized again after aging. Implants with an alveolar surface presented large defects. The protocol shows that such defects compromise the long-term mechanical properties. Implants with a porous surface exhibited sufficient strength but a significant sensitivity to aging. Even if associated to micro cracking clearly observed by FIB, aging did not decrease mechanical strength of the implants. As each dental implant company has its own process, all zirconia implants may behave differently, even if the starting powder is the same. Especially, surface modifications have a large influence on strength and aging resistance, which is not taken into account by the current standards. Protocols adapted from this work could be useful. Copyright © 2014 Academy of Dental Materials. Published by Elsevier Ltd. All rights reserved.

  2. Enhanced Recovery After Surgery Protocols in Major Urologic Surgery

    Directory of Open Access Journals (Sweden)

    Natalija Vukovic

    2018-04-01

    Full Text Available The purpose of the reviewThe analysis of the components of enhanced recovery after surgery (ERAS protocols in urologic surgery.Recent findingsERAS protocols has been studied for over 20 years in different surgical procedures, mostly in colorectal surgery. The concept of improving patient care and reducing postoperative complications was also applied to major urologic surgery and especially procedure of radical cystectomy. This procedure is technically challenging, due to a major surgical resection and high postoperative complication rate that may reach 65%. Several clinical pathways were introduced to improve perioperative course and reduce the length of hospital stay. These protocols differ from ERAS modalities in other surgeries. The reasons for this are longer operative time, increased risk of perioperative transfusion and infection, and urinary diversion achieved using transposed intestinal segments. Previous studies in this area analyzed the need for mechanical bowel preparation, postoperative nasogastric tube decompression, as well as the duration of urinary drainage. Furthermore, the attention has also been drawn to perioperative fluid optimization, pain management, and bowel function.SummaryNotwithstanding partial resemblance between the pathways in major urologic surgery and other pelvic surgeries, there are still scarce guidelines for ERAS protocols in urology, which is why further studies should assess the importance of preoperative medical optimization, implementation of thoracic epidural anesthesia and analgesia, and perioperative nutritional management.

  3. Cryptanalysis and improvement of quantum broadcast communication and authentication protocol with a quantum one-time pad

    International Nuclear Information System (INIS)

    Liu Zhi-Hao; Chen Han-Wu

    2016-01-01

    The security of quantum broadcast communication (QBC) and authentication protocol based on Greenberger–Horne–Zeilinger (GHZ) state and quantum one-time pad is analyzed. It is shown that there are some security issues in this protocol. Firstly, an external eavesdropper can take the intercept–measure–resend attack strategy to eavesdrop on 0.369 bit of every bit of the identity string of each receiver without being detected. Meanwhile, 0.524 bit of every bit of the secret message can be eavesdropped on without being detected. Secondly, an inner receiver can take the intercept–measure–resend attack strategy to eavesdrop on half of the identity string of the other’s definitely without being checked. In addition, an alternative attack called the CNOT-operation attack is discussed. As for the multi-party QBC protocol, the attack efficiency increases with the increase of the number of users. Finally, the QBC protocol is improved to a secure one. (paper)

  4. A ton is not always a ton: A road-test of landfill, manure, and afforestation/reforestation offset protocols in the U.S. carbon market

    International Nuclear Information System (INIS)

    Lee, Carrie M.; Lazarus, Michael; Smith, Gordon R.; Todd, Kimberly; Weitz, Melissa

    2013-01-01

    Highlights: • Protocols are the foundation of an offset program. • Using sample projects, we “road test” landfill, manure and afforestation protocols from 5 programs. • For a given project, we find large variation in the volume of offsets generated. • Harmonization of protocols can increase the likelihood that “a ton is a ton”. • Harmonization can enhance prospects for linking emission trading systems. -- Abstract: The outcome of recent international climate negotiations suggests we are headed toward a more fragmented carbon market, with multiple emission trading and offset programs operating in parallel. To effectively harmonize and link across programs, it will be important to ensure that across offset programs and protocols that a “ton is a ton”. In this article, we consider how sample offsets projects in the U.S. carbon market are treated across protocols from five programs: the Clean Development Mechanism, Climate Action Reserve, Chicago Climate Exchange, Regional Greenhouse Gas Initiative, and the U.S. EPA's former program, Climate Leaders. We find that differences among protocols for landfill methane, manure management, and afforestation/reforestation project types in accounting boundary definitions, baseline setting methods, measurement rules, emission factors, and discounts lead to differences in offsets credited that are often significant (e.g. greater than 50%). We suggest opportunities for modification and harmonization of protocols that can improve offset quality and credibility and enhance prospects for future linking of trading units and systems

  5. Hypocapnia and hyperoxia induction using a hyperventilation protocol in electroconvulsive therapy.

    Science.gov (United States)

    de Arriba-Arnau, Aida; Dalmau, Antonia; Salvat-Pujol, Neus; Soria, Virginia; Bocos, Javier; Menchón, José Manuel; Urretavizcaya, Mikel

    Hyperventilation in electroconvulsive therapy sessions has been associated with seizure threshold, seizure characteristics, and cognitive effects. There is no consensus on the optimal procedure of applying hyperventilation manoeuvres during electroconvulsive therapy. Prospective evaluation of the effects of systematic use of hyperventilation manoeuvres with facial mask and capnography (protocolized hyperventilation [pHV]), on ventilation parameters and on seizures. The study included a sample of 130 sessions (65 performed according to hyperventilation standard practice and 65 successive sessions, with pHV) of 35 patients over a period of 10 weeks. The pHV manoeuvres reduced exhaled CO 2 and increased O 2 saturation significantly (Pelectroconvulsive therapy procedure without adding costs. Copyright © 2016 SEP y SEPB. Publicado por Elsevier España, S.L.U. All rights reserved.

  6. Recommended protocol for standardization in collecting and interpreting radiological environmental data

    International Nuclear Information System (INIS)

    Denham, D.H.; Kathren, R.L.

    1989-02-01

    Current reductions in ''allowable'' levels of radiation and radioactive materials in the environment and an increased public awareness of naturally occurring radioactive materials have reinforced the need for consistency in evaluating the radiological environment. A key concern is the identification and interpretation of environmental levels of radiation and radioactive materials resulting from nuclear facility operations. If these levels can be detected and their source(s) identified, then corrective actions can be taken to eliminate or greatly reduce the environmental impacts of the facility operations. In this paper we address the lack of definitive guidance necessary to determine incremental levels of significance (or insignificance), and we propose a series of protocols to achieve more consistent collection and interpretation of radiological environmental data. 8 refs

  7. Implementation of a split-bolus single-pass CT protocol at a UK major trauma centre to reduce excess radiation dose in trauma pan-CT

    International Nuclear Information System (INIS)

    Leung, V.; Sastry, A.; Woo, T.D.; Jones, H.R.

    2015-01-01

    Aim: To quantify the dose reduction and ensure that the use of a split-bolus protocol provided sufficient vascular enhancement. Materials and methods: Between 1 January 2014 and 31 May 2014, both split bolus and traditional two-phase scans were performed on a single CT scanner (SOMATOM Definition AS+, Siemens Healthcare) using a two-pump injector (Medrad Stellant). Both protocols used Siemens' proprietary tube current and tube voltage modulation techniques (CARE dose and CARE kV). The protocols were compared retrospectively to assess the dose–length product (DLP), aortic radiodensity at the level of the coeliac axis and radiodensity of the portal vein. Results: There were 151 trauma CT examinations during this period. Seventy-eight used the split-bolus protocol. Seventy-one had traditional two-phase imaging. One patient was excluded as they were under the age of 18 years. The radiodensity measurements for the portal vein were significantly higher (p<0.001) in the split-bolus protocol. The mean aortic enhancement in both protocols exceeded 250 HU, although the traditional two-phase protocol gave greater arterial enhancement (p<0.001) than the split-bolus protocol. The split-bolus protocol had a significantly lower (p<0.001) DLP with 43.5% reduction in the mean DLP compared to the traditional protocol. Conclusion: Split-bolus CT imaging offers significant dose reduction for this relatively young population while retaining both arterial and venous enhancement. -- Highlights: •We implemented a split bolus pan-CT protocol for trauma CT. •We compared the radiation dose and vascular enhancement of the split bolus protocol to a traditional two phase protocol. •The split bolus protocol had a 43.5% reduction in mean DLP

  8. Insect Venom Immunotherapy: Analysis of the Safety and Tolerance of 3 Buildup Protocols Frequently Used in Spain.

    Science.gov (United States)

    Gutiérrez Fernández, D; Moreno-Ancillo, A; Fernández Meléndez, S; Domínguez-Noche, C; Gálvez Ruiz, P; Alfaya Arias, T; Carballada González, F; Alonso Llamazares, A; Marques Amat, L; Vega Castro, A; Antolín Amérigo, D; Cruz Granados, S; Ruiz León, B; Sánchez Morillas, L; Fernández Sánchez, J; Soriano Gomis, V; Borja Segade, J; Dalmau Duch, G; Guspi Bori, R; Miranda Páez, A

    2016-01-01

    Hymenoptera venom immunotherapy (VIT) is an effective treatment but not one devoid of risk, as both local and systemic adverse reactions may occur, especially in the initial phases. We compared the tolerance to 3 VIT buildup protocols and analyzed risk factors associated with adverse reactions during this phase. We enrolled 165 patients divided into 3 groups based on the buildup protocol used (3, 4, and 9 weeks). The severity of systemic reactions was evaluated according to the World Allergy Organization model. Results were analyzed using exploratory descriptive statistics, and variables were compared using analysis of variance. Adverse reactions were recorded in 53 patients (32%) (43 local and 10 systemic). Local reactions were immediate in 27 patients (63%) and delayed in 16 (37%). The severity of the local reaction was slight/moderate in 15 patients and severe in 13. Systemic reactions were grade 1-2. No significant association was found between the treatment modality and the onset of local or systemic adverse reactions or the type of local reaction. We only found a statistically significant association between severity of the local reaction and female gender. As for the risk factors associated with systemic reactions during the buildup phase, we found no significant differences in values depending on the protocol used or the insect responsible. The buildup protocols compared proved to be safe and did not differ significantly from one another. In the population studied, patients undergoing the 9-week schedule presented no systemic reactions. Therefore, this protocol can be considered the safest approach.

  9. Increased platelet mitochondrial respiration after cardiac arrest and resuscitation as a potential peripheral biosignature of cerebral bioenergetic dysfunction.

    Science.gov (United States)

    Ferguson, Michael A; Sutton, Robert M; Karlsson, Michael; Sjövall, Fredrik; Becker, Lance B; Berg, Robert A; Margulies, Susan S; Kilbaugh, Todd J

    2016-06-01

    Cardiac arrest (CA) results in a sepsis-like syndrome with activation of the innate immune system and increased mitochondrial bioenergetics. To determine if platelet mitochondrial respiration increases following CA in a porcine pediatric model of asphyxia-associated ventricular fibrillation (VF) CA, and if this readily obtained biomarker is associated with decreased brain mitochondrial respiration. CA protocol: 7 min of asphyxia, followed by VF, protocolized titration of compression depth to systolic blood pressure of 90 mmHg and vasopressor administration to a coronary perfusion pressure greater than 20 mmHg. platelet integrated mitochondrial electron transport system (ETS) function evaluated pre- and post-CA/ROSC four hours after return of spontaneous circulation (ROSC). Secondary outcome: correlation of platelet mitochondrial bioenergetics to cerebral bioenergetic function. Platelet maximal oxidative phosphorylation (OXPHOSCI+CII), P respiration through Complex II (OXPHOSCII, P respiration was not due to uncoupling, as the LEAKCI + CII respiration (mitochondrial respiration independent of ATP-production) was unchanged after CA/ROSC. Larger increases in platelet mitochondrial respiratory control ratio (RCR) compared to pre-CA RCR were significantly correlated with lower RCRs in the cortex (P respiration. Platelet mitochondrial respiration is significantly increased four hours after ROSC. Future studies will identify mechanistic relationships between this serum biomarker and altered cerebral bioenergetics function following cardiac arrest.

  10. An Optimal Non-Interactive Message Authentication Protocol

    OpenAIRE

    Pasini, Sylvain; Vaudenay, Serge

    2006-01-01

    Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SAS-based non-interactive message authentication protocols (NIMAP). We start by the analysis of two popular non-interactive message authentication protocols. The first one is based on a collision-resistant hash function and was presented by Balfanz et al. The second protocol is based on a universal hash function family and was proposed by Gehrmann, Mi...

  11. Nucleic acid protocols: Extraction and optimization

    Directory of Open Access Journals (Sweden)

    Saeed El-Ashram

    2016-12-01

    Full Text Available Yield and quality are fundamental features for any researchers during nucleic acid extraction. Here, we describe a simplified, semi-unified, effective, and toxic material free protocol for extracting DNA and RNA from different prokaryotic and eukaryotic sources exploiting the physical and chemical properties of nucleic acids. Furthermore, this protocol showed that DNA and RNA are under triple protection (i.e. EDTA, SDS and NaCl during lysis step, and this environment is improper for RNase to have DNA liberated of RNA and even for DNase to degrade the DNA. Therefore, the complete removal of RNA under RNase influence is achieved when RNase is added after DNA extraction, which gives optimal quality with any protocols. Similarly, DNA contamination in an isolated RNA is degraded by DNase to obtain high-quality RNA. Our protocol is the protocol of choice in terms of simplicity, recovery time, environmental safety, amount, purity, PCR and RT-PCR applicability.

  12. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  13. Bitcoin-NG: A Scalable Blockchain Protocol

    OpenAIRE

    Eyal, Ittay; Gencer, Adem Efe; Sirer, Emin Gun; van Renesse, Robbert

    2015-01-01

    Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is By...

  14. A reliable transmission protocol for ZigBee-based wireless patient monitoring.

    Science.gov (United States)

    Chen, Shyr-Kuen; Kao, Tsair; Chan, Chia-Tai; Huang, Chih-Ning; Chiang, Chih-Yen; Lai, Chin-Yu; Tung, Tse-Hua; Wang, Pi-Chung

    2012-01-01

    Patient monitoring systems are gaining their importance as the fast-growing global elderly population increases demands for caretaking. These systems use wireless technologies to transmit vital signs for medical evaluation. In a multihop ZigBee network, the existing systems usually use broadcast or multicast schemes to increase the reliability of signals transmission; however, both the schemes lead to significantly higher network traffic and end-to-end transmission delay. In this paper, we present a reliable transmission protocol based on anycast routing for wireless patient monitoring. Our scheme automatically selects the closest data receiver in an anycast group as a destination to reduce the transmission latency as well as the control overhead. The new protocol also shortens the latency of path recovery by initiating route recovery from the intermediate routers of the original path. On the basis of a reliable transmission scheme, we implement a ZigBee device for fall monitoring, which integrates fall detection, indoor positioning, and ECG monitoring. When the triaxial accelerometer of the device detects a fall, the current position of the patient is transmitted to an emergency center through a ZigBee network. In order to clarify the situation of the fallen patient, 4-s ECG signals are also transmitted. Our transmission scheme ensures the successful transmission of these critical messages. The experimental results show that our scheme is fast and reliable. We also demonstrate that our devices can seamlessly integrate with the next generation technology of wireless wide area network, worldwide interoperability for microwave access, to achieve real-time patient monitoring.

  15. MODELLING AND VERIFICATION OF KITSAT PACKET COMMUNICATION PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Young-Ro Lee

    1996-06-01

    Full Text Available In this paper, in order to verify KITSAT 1/2 packet communication protocols, we model the AX.25 protocol and PACSAT protocol by using an extended Petri net and then verify the correctness, boundedness, liveness and deadlock freeness of packet protocols by utilizing reachability trees.

  16. Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs with Extended Service Range

    Science.gov (United States)

    Choi, Woo-Yong

    2011-11-01

    In this paper, we propose the efficient reliable multicast MAC protocol by which the AP (Access Point) can transmit reliably its multicast data frames to the recipients in the AP's one-hop or two-hop transmission range. The AP uses the STAs (Stations) that are directly associated with itself as the relays for the data delivery to the remote recipients that cannot be reached directly from itself. Based on the connectivity information among the recipients, the reliable multicast MAC protocol optimizes the number of the RAK (Request for ACK) frame transmissions in a reasonable computational time. Numerical examples show that our proposed MAC protocol significantly enhances the MAC performance compared with the BMMM (Batch Mode Multicast MAC) protocol that is extended to support the recipients that are in the AP's one-hop or two-hop transmission range in IEEE 802.11 wireless LANs.

  17. Game-theoretic perspective of Ping-Pong protocol

    Science.gov (United States)

    Kaur, Hargeet; Kumar, Atul

    2018-01-01

    We analyse Ping-Pong protocol from the point of view of a game. The analysis helps us in understanding the different strategies of a sender and an eavesdropper to gain the maximum payoff in the game. The study presented here characterizes strategies that lead to different Nash equilibriums. We further demonstrate the condition for Pareto optimality depending on the parameters used in the game. Moreover, we also analysed LM05 protocol and compared it with PP protocol from the point of view of a generic two-way QKD game with or without entanglement. Our results provide a deeper understanding of general two-way QKD protocols in terms of the security and payoffs of different stakeholders in the protocol.

  18. Assessment of Grade of Dysphonia and Correlation With Quality of Life Protocol.

    Science.gov (United States)

    Spina, Ana Lúcia; Crespo, Agrício Nubiato

    2017-03-01

    The main objective of this study is to check the correlation between vocal self-assessment and results of the Voice-Related Quality of Life (V-RQOL) protocol, and whether there is a correlation between perceptual vocal assessment made by voice therapists and the results from the V-RQOL protocol. The study included 245 subjects with vocal complaints. This was a prospective analytical clinical study. Vocal perceptual assessment of each subject with dysphonia was made by three voice therapists, followed by self-assessment made by the subjects themselves, and the application of the V-RQOL protocol. The results have shown poor level of agreement between vocal assessment made by the voice therapists and self-assessment made by the subjects. The statistical analysis indicated that the results of V-RQOL protocol showed significant correlation with the vocal assessment made by the voice therapists and the self-assessment by the subjects. The agreement between the assessments was low and variable; age, gender, professional voice use, and clinical laryngoscopic diagnosis did not influence the agreement level. Protocol V-RQOL is sensitive to vocal assessment made by the voice therapists and self-assessment made by the patient. Copyright © 2017 The Voice Foundation. Published by Elsevier Inc. All rights reserved.

  19. An Adaptive Information Quantity-Based Broadcast Protocol for Safety Services in VANET

    Directory of Open Access Journals (Sweden)

    Wenjie Wang

    2016-01-01

    Full Text Available Vehicle-to-vehicle communication plays a significantly important role in implementing safe and efficient road traffic. When disseminating safety messages in the network, the information quantity on safety packets changes over time and space. However, most of existing protocols view each packet the same to disseminate, preventing vehicles from collecting more recent and precise safety information. Hence, an information quantity-based broadcast protocol is proposed in this paper to ensure the efficiency of safety messages dissemination. In particular, we propose the concept of emergency-degree to evaluate packets’ information quantity. Then we present EDCast, an emergency-degree-based broadcast protocol. EDCast differentiates each packet’s priority for accessing the channel based on its emergency-degree so as to provide vehicles with more safety information timely and accurately. In addition, an adaptive scheme is presented to ensure fast dissemination of messages in different network condition. We compare the performance of EDCast with those of three other representative protocols in a typical highway scenario. Simulation results indicate that EDCast achieves higher broadcast efficiency and less redundancy with less delivery delay. What we found demonstrates that it is feasible and necessary for incorporating information quantity of messages in designing an efficient safety message broadcast protocol.

  20. A Survey on the Taxonomy of Cluster-Based Routing Protocols for Homogeneous Wireless Sensor Networks

    Science.gov (United States)

    Naeimi, Soroush; Ghafghazi, Hamidreza; Chow, Chee-Onn; Ishii, Hiroshi

    2012-01-01

    The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided. PMID:22969350