WorldWideScience

Sample records for protocol wais wide

  1. Accessing HEP Collaboration documents using WWW and WAIS

    International Nuclear Information System (INIS)

    Nguyen, T.D.; Buckley-Geer, E.; Ritchie, D.J.

    1995-09-01

    WAIS stands for Wide Area Information Server. It is a distributed information retrieval system. A WAIS system has a client-server architecture which consists of clients talking to a server via a TCP/IP network using the ANSI standard Z39-50 VI protocol. A freely available version (FreeWAIS) is supported by the Clearinghouse for Networked Information Discovery and Retrieval, also known as CNIDR. FreeWAIS-sf, which is the software the authors are using at Fermilab, is an extension of FreeWAIS. FreeWAIS-sf supports all the functionalities which FreeWAIS offers as well as additional indexing and searching capabilities for structured fields. World Wide Web (WWW) was originally developed by Tim Berners-Lee at CERN and is now the backbone for serving information on Internet. Here, the authors describe a system for accessing HEP collaboration documents using WWW and WAIS

  2. Accessing HEP Collaboration documents using WWW and WAIS

    Energy Technology Data Exchange (ETDEWEB)

    Nguyen, T.D.; Buckley-Geer, E.; Ritchie, D.J.

    1995-09-01

    WAIS stands for Wide Area Information Server. It is a distributed information retrieval system. A WAIS system has a client-server architecture which consists of clients talking to a server via a TCP/IP network using the ANSI standard Z39-50 VI protocol. A freely available version (FreeWAIS) is supported by the Clearinghouse for Networked Information Discovery and Retrieval, also known as CNIDR. FreeWAIS-sf, which is the software the authors are using at Fermilab, is an extension of FreeWAIS. FreeWAIS-sf supports all the functionalities which FreeWAIS offers as well as additional indexing and searching capabilities for structured fields. World Wide Web (WWW) was originally developed by Tim Berners-Lee at CERN and is now the backbone for serving information on Internet. Here, the authors describe a system for accessing HEP collaboration documents using WWW and WAIS.

  3. The “Wireless Sensor Networks for City-Wide Ambient Intelligence (WISE-WAI)” Project

    Science.gov (United States)

    Casari, Paolo; Castellani, Angelo P.; Cenedese, Angelo; Lora, Claudio; Rossi, Michele; Schenato, Luca; Zorzi, Michele

    2009-01-01

    This paper gives a detailed technical overview of some of the activities carried out in the context of the “Wireless Sensor networks for city-Wide Ambient Intelligence (WISE-WAI)” project, funded by the Cassa di Risparmio di Padova e Rovigo Foundation, Italy. The main aim of the project is to demonstrate the feasibility of large-scale wireless sensor network deployments, whereby tiny objects integrating one or more environmental sensors (humidity, temperature, light intensity), a microcontroller and a wireless transceiver are deployed over a large area, which in this case involves the buildings of the Department of Information Engineering at the University of Padova. We will describe how the network is organized to provide full-scale automated functions, and which services and applications it is configured to provide. These applications include long-term environmental monitoring, alarm event detection and propagation, single-sensor interrogation, localization and tracking of objects, assisted navigation, as well as fast data dissemination services to be used, e.g., to rapidly re-program all sensors over-the-air. The organization of such a large testbed requires notable efforts in terms of communication protocols and strategies, whose design must pursue scalability, energy efficiency (while sensors are connected through USB cables for logging and debugging purposes, most of them will be battery-operated), as well as the capability to support applications with diverse requirements. These efforts, the description of a subset of the results obtained so far, and of the final objectives to be met are the scope of the present paper. PMID:22408513

  4. WAIS Searching of the Current Contents Database

    Science.gov (United States)

    Banholzer, P.; Grabenstein, M. E.

    The Homer E. Newell Memorial Library of NASA's Goddard Space Flight Center is developing capabilities to permit Goddard personnel to access electronic resources of the Library via the Internet. The Library's support services contractor, Maxima Corporation, and their subcontractor, SANAD Support Technologies have recently developed a World Wide Web Home Page (http://www-library.gsfc.nasa.gov) to provide the primary means of access. The first searchable database to be made available through the HomePage to Goddard employees is Current Contents, from the Institute for Scientific Information (ISI). The initial implementation includes coverage of articles from the last few months of 1992 to present. These records are augmented with abstracts and references, and often are more robust than equivalent records in bibliographic databases that currently serve the astronomical community. Maxima/SANAD selected Wais Incorporated's WAIS product with which to build the interface to Current Contents. This system allows access from Macintosh, IBM PC, and Unix hosts, which is an important feature for Goddard's multiplatform environment. The forms interface is structured to allow both fielded (author, article title, journal name, id number, keyword, subject term, and citation) and unfielded WAIS searches. The system allows a user to: Retrieve individual journal article records. Retrieve Table of Contents of specific issues of journals. Connect to articles with similar subject terms or keywords. Connect to other issues of the same journal in the same year. Browse journal issues from an alphabetical list of indexed journal names.

  5. Independent Examination of the Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV): What Does the WAIS-IV Measure?

    Science.gov (United States)

    Benson, Nicholas; Hulac, David M.; Kranzler, John H.

    2010-01-01

    Published empirical evidence for the Wechsler Adult Intelligence Scale--Fourth Edition (WAIS-IV) does not address some essential questions pertaining to the applied practice of intellectual assessment. In this study, the structure and cross-age invariance of the latest WAIS-IV revision were examined to (a) elucidate the nature of the constructs…

  6. Independent examination of the Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV): what does the WAIS-IV measure?

    Science.gov (United States)

    Benson, Nicholas; Hulac, David M; Kranzler, John H

    2010-03-01

    Published empirical evidence for the Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV) does not address some essential questions pertaining to the applied practice of intellectual assessment. In this study, the structure and cross-age invariance of the latest WAIS-IV revision were examined to (a) elucidate the nature of the constructs measured and (b) determine whether the same constructs are measured across ages. Results suggest that a Cattell-Horn-Carroll (CHC)-inspired structure provides a better description of test performance than the published scoring structure does. Broad CHC abilities measured by the WAIS-IV include crystallized ability (Gc), fluid reasoning (Gf), visual processing (Gv), short-term memory (Gsm), and processing speed (Gs), although some of these abilities are measured more comprehensively than are others. Additionally, the WAIS-IV provides a measure of quantitative reasoning (QR). Results also suggest a lack of cross-age invariance resulting from age-related differences in factor loadings. Formulas for calculating CHC indexes and suggestions for interpretation are provided. PsycINFO Database Record (c) 2010 APA, all rights reserved.

  7. Application of hierarchical genetic models to Raven and WAIS subtests: a Dutch twin study

    NARCIS (Netherlands)

    Rijsdijk, F.V.; Vernon, P.A.; Boomsma, D.I.

    2002-01-01

    Hierarchical models of intelligence are highly informative and widely accepted. Application of these models to twin data, however, is sparse. This paper addresses the question of how a genetic hierarchical model fits the Wechsler Adult Intelligence Scale (WAIS) subtests and the Raven Standard

  8. Math anxiety differentially affects WAIS-IV arithmetic performance in undergraduates.

    Science.gov (United States)

    Buelow, Melissa T; Frakey, Laura L

    2013-06-01

    Previous research has shown that math anxiety can influence the math performance level; however, to date, it is unknown whether math anxiety influences performance on working memory tasks during neuropsychological evaluation. In the present study, 172 undergraduate students completed measures of math achievement (the Math Computation subtest from the Wide Range Achievement Test-IV), math anxiety (the Math Anxiety Rating Scale-Revised), general test anxiety (from the Adult Manifest Anxiety Scale-College version), and the three Working Memory Index tasks from the Wechsler Adult Intelligence Scale-IV Edition (WAIS-IV; Digit Span [DS], Arithmetic, Letter-Number Sequencing [LNS]). Results indicated that math anxiety predicted performance on Arithmetic, but not DS or LNS, above and beyond the effects of gender, general test anxiety, and math performance level. Our findings suggest that math anxiety can negatively influence WAIS-IV working memory subtest scores. Implications for clinical practice include the utilization of LNS in individuals expressing high math anxiety.

  9. A Comparison of the Interest Accuracy of Two Short Forms of the WAIS-R.

    Science.gov (United States)

    Cella, David F.; And Others

    1985-01-01

    Examined relative efficacy of two short forms of Wechsler Adult Intelligence Scale-Revised (WAIS-R) with respect to accurate subtest profile scatter (N=50). Subtest scores of both split-half Satz-Mogel short form and criterion referenced Modified WAIS-R (WAIS-RM) short form were found to differ significantly from full-length WAIS-R subtest scores.…

  10. Working alliance inventory applied to virtual and augmented reality (WAI-VAR): psychometrics and therapeutic outcomes.

    Science.gov (United States)

    Miragall, Marta; Baños, Rosa M; Cebolla, Ausiàs; Botella, Cristina

    2015-01-01

    This study examines the psychometric properties of the Working Alliance Inventory-Short (WAI-S) adaptation to Virtual Reality (VR) and Augmented Reality (AR) therapies (WAI-VAR). The relationship between the therapeutic alliance (TA) with VR and AR and clinically significant change (CSC) is also explored. Seventy-five patients took part in this study (74.7% women, M age = 34.41). Fear of flying and adjustment disorder patients received VR therapy, and cockroach phobia patients received AR therapy. Psychometric properties, CSC, one-way ANOVA, Spearman's Correlations and Multiple Regression were calculated. The WAI-VAR showed a unidimensional structure, high internal consistency and adequate convergent validity. "Not changed" patients scored lower on the WAI-VAR than "improved" and "recovered" patients. Correlation between the WAI-VAR and CSC was moderate. The best fitting model for predicting CSC was a linear combination of the TA with therapist (WAI-S) and the TA with VR and AR (WAI-VAR), due to the latter variable slightly increased the percentage of variability accounted for in CSC. The WAI-VAR is the first validated instrument to measure the TA with VR and AR in research and clinical practice. This study reveals the importance of the quality of the TA with technologies in achieving positive outcomes in the therapy.

  11. Psychometric properties of the Thai version of the work ability index (Thai WAI).

    Science.gov (United States)

    Kaewboonchoo, Orawan; Ratanasiripong, Paul

    2015-01-01

    The purpose of this research was to develop and test the psychometric properties of the Thai version of the Work Ability Index (WAI). Forward translation and back-translation of the WAI were performed by seven bilingual professionals to ensure that the Thai WAI was culturally relevant and conceptually accurate. To ensure generalizability of the Thai WAI, a sample of 2,744 Thai workers from 19 different enterprises in five regions of Thailand completed the Thai version of the WAI along with the General Health Questionnaire. The 19 enterprises were from the following industries: canned food, snack food, cooking oil, footwear, pharmaceutical, ceramics, toy, steel, petrochemical, and auto parts. The results from exploratory factor analysis supported a 3-factor model, accounting for 53.49% of the total variance. The results also provided evidence for adequate test-retest reliability and internal consistency of the Thai WAI. The internal consistency of the Thai WAI was found to be slightly low due to the newness of the concept of work ability, which is not a common term used in the Thai language; therefore, explanation of the meaning of work ability is needed to increase understanding of workers. By providing early recognition of workers' health risks as well as risks of early termination, the WAI can help Thai human resources managers respond better to the needs of workers and be proactive in their efforts to retain workers in their organizations. Occupational health professionals could also utilize the WAI to evaluate the work ability of Thai workers in order to help organizations recognize early signs of their workers' health risks and possible early terminations and respond appropriately.

  12. External validity of the Indonesian Wechsler Adult Intelligence Scale - Fourth edition (WAIS-IV-ID)

    NARCIS (Netherlands)

    Suwartono, C.; Hidajat, L.L.; Halim, M.S.; Hendriks, M.P.H.; Kessels, R.P.C.

    2016-01-01

    The Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV-ID) has been adapted and proved to be valid for its internal structure for Indonesian population. The same structure found as in the American WAIS-IV (WAIS-IV-US; Suwartono, Hendriks, Hidajat, Halim, & Kessels, 2015). Despite its strong

  13. Test Review: Advanced Clinical Solutions for WAIS-IV and WMS-IV

    Science.gov (United States)

    Chu, Yiting; Lai, Mark H. C.; Xu, Yining; Zhou, Yuanyuan

    2012-01-01

    The authors review the "Advanced Clinical Solutions for WAIS-IV and WMS-IV". The "Advanced Clinical Solutions (ACS) for the Wechsler Adult Intelligence Scale-Fourth Edition" (WAIS-IV; Wechsler, 2008) and the "Wechsler Memory Scale-Fourth Edition" (WMS-IV; Wechsler, 2009) was published by Pearson in 2009. It is a…

  14. Structural Validity of the Dutch-Language Version of the WAIS-III in a Psychiatric Sample

    NARCIS (Netherlands)

    Heijden, P.T. van der; Bos, P. van den; Mol, B.A.W.; Kessels, R.P.C.

    2013-01-01

    The Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV; Wechsler, 2008) no longer provides the traditional Verbal IQ and Performance IQ deviation scores. In the current study, we investigated the structural validity of these scores in the scale's predecessor, the WAIS-Third Edition (WAIS-III;

  15. WISC-III e WAIS-III na avaliação da inteligência de cegos WISC-III/WAIS-III en ciegos WISC-III and WAIS-III in intellectual assessment of blind people

    Directory of Open Access Journals (Sweden)

    Elizabeth do Nascimento

    2007-12-01

    Full Text Available Diante da escassez de pesquisas nacionais e de testes psicológicos destinados a avaliar pessoas cegas, desenvolveu-se um estudo psicométrico com as escalas verbais dos testes WISC-III e WAIS-III. Após as adaptações de alguns estímulos e das instruções, os testes foram aplicados em crianças (N = 120 e adultos (N = 52 residentes em Belo Horizonte. Os resultados indicaram que as escalas verbais modificadas apresentam uma boa consistência interna (alfa> 0,80. Além disso, a investigação da validade fatorial identifica a presença clara de apenas um componente. Este componente explica 81% e 64% para o WISC-III e WAIS-III, respectivamente. Conclui-se que as adaptações a que se procedeu não afetaram a estrutura fatorial das escalas. Deste modo, os profissionais poderão utilizar as escalas modificadas para avaliar a inteligência de pessoas cegas.Frente a la escasez de investigaciones nacionales asi como la ausencia de tests psicológicos que evaluen personas ciegas, se ha desarrollado un estudio psicometrico com la escalas verbales del WISC-III y WAIS-III. Posteriormente a las adaptaciones de algunos estímulos y de las instrucciones, las escalas fueron aplicadas a una muestra de niños (n=120 y de adultos (n=52 residentes en la ciudad de Belo Horizonte-Brasil. Los resultados indican que las escalas verbales modificadas presentan una alta fiabilidad (alpha >0,80 asi como la presencia clara de un unico componente responsable por 81% y 64% de la variancia del WIC-III e WAIS-III respectivamente. Se ha concluido que las modificaciones efectuadas no han comprometido la estructura factorial de las escalas verbales. Por tanto, los profesionales psicólogos pueden utilizar las escalas modificadas para la evaluación de la inteligencia de personas portadoras de ceguera.Owing to the almost lack of a national research on psychological testing for the evaluation of blind people, a psychometric study has been developed with the WISC-III and WAIS

  16. Similarity of WISC-R and WAIS-R Scores at Age 16.

    Science.gov (United States)

    Sandoval, Jonathan; And Others

    1988-01-01

    Examined similarity of scores of 30 learning disabled students (aged 16 and 17) on the Wechsler Intelligence Scale for Children-Revised (WISC-R) and the Wechsler Adult Intelligence Scale-Revised (WAIS-R). Results documented similarity between WISC-R and WAIS-R for 16 year-olds who were learning disabled and had average intellectual ability.…

  17. Orthogonal Higher Order Structure and Confirmatory Factor Analysis of the French Wechsler Adult Intelligence Scale (WAIS-III)

    Science.gov (United States)

    Golay, Philippe; Lecerf, Thierry

    2011-01-01

    According to the most widely accepted Cattell-Horn-Carroll (CHC) model of intelligence measurement, each subtest score of the Wechsler Intelligence Scale for Adults (3rd ed.; WAIS-III) should reflect both 1st- and 2nd-order factors (i.e., 4 or 5 broad abilities and 1 general factor). To disentangle the contribution of each factor, we applied a…

  18. Long term survival with whole abdominopelvic irradiation (WAI) in platinum-refractory ovarian cancer

    International Nuclear Information System (INIS)

    Cmelak, Anthony J.; Cox, Richard S.; Kapp, Daniel S.

    1996-01-01

    Purpose: To evaluate the efficacy and toxicity of WAI in persistent or recurrent epithelial ovarian carcinoma after initial chemotherapy. Methods and Materials: Between 1970 and 1995, 41 women with persistent or recurrent ovarian carcinoma after initial surgical debulking and chemotherapy were treated with WAI. Median age was 57 years (range 27-75). Initial FIGO stages were I and II - 5 patients (12%), III - 26 (64%), and IV - 10 (24%). Tumor grade was 1 - 4 (10%), II - 16 (39%), and III - 20 (49%). Four to eighteen (median eight) cycles of chemotherapy had been given prior to WAI. Thirty-one patients had received platinum-based regimens, and 22 of these had failed within six months after completion of chemotherapy (platinum-refractory). Prior to WAI, 11 (27%) patients had microscopic residual disease, 21 (51%) had gross residual disease up to 1.5 cm, and 9 (22%) had tumors greater than 1.5 cm in maximal diameter. Median doses of 28 Gy to the abdomen and 48 Gy to the pelvis were delivered using an open-field technique with appropriate liver and kidney shielding. Results: With follow-up of 1 month to 16.5 years, the 5-year actuarial disease specific survival was 47% in all 41 patients, and 49% in 22 platinum-refractory patients. Both disease bulk at WAI (p -4 ) and initial stage (p=0.005) were of prognostic value. Five-year disease specific survivals were stage I and II - 100%, stage III - 55%, and stage IV - 27%. Five-year disease specific survival of all nonbulky (less than 1.5 cm) patients was 40%; 0% for patients with disease greater than 1.5 cm. Five-year disease specific survival for grade I - 66%, II - 59%, and III - 33%. Stage I, II, or III patients with residual disease bulk of 1.5 cm or less before WAI had a 10-year actuarial disease specific survival of 50%. Twelve patients (29%) failed to complete the planned course of WAI due to acute toxicity (most often due to prolonged thrombocytopenia). Late bowel toxicity included obstruction in one patient and

  19. Factors associated with work ability index (WAI) among intensive care units' (ICUs') nurses.

    Science.gov (United States)

    Rostamabadi, Akbar; Zamanian, Zahra; Sedaghat, Zahra

    2017-03-28

    Work ability is a crucial occupational health issue in health care settings where a high physical and psychosocial work capacity is required and a high risk of disabling injuries and illnesses is predictable. This study aims to examine the association between the work ability index (WAI) and individual characterizations, workload, fatigue, and diseases among intensive care units' (ICUs') nurses. The study sample included 214 nurses selected by a random sampling method from a target population consisting of 321 registered nurses working in eight ICUs. Multiple linear regression analysis was used to test the association between WAI scores and each of the independent variables. Results of multivariate analysis revealed a strong and negative association between WAI scores and diseases (B=-5.82, 95% CI=-7.16, -4.48, Pindex (BMI) was significantly and inversely associated with WAI scores. A significant and negative association was also found between WAI scores and dimensions of MFI-20, such as general fatigue (B=-0.31, 95% CI=-0.53, -0.09, P=0.005) and physical fatigue (B=-0.44, 95% CI=-0.65, -0.23, Pwork environment characterized by a well-structured preventive attitude toward controlling diseases, and a well-designed organizational framework toward increasing the level of performance and motivation, reducing the level of fatigue, as well as reducing the workload, is necessary to promote work ability among ICUs' nurses.

  20. Are Cross-National Differences in IQ Profiles Stable? A Comparison of Finnish and U.S. WAIS Norms

    Science.gov (United States)

    Roivainen, Eka

    2013-01-01

    To study the concept of national IQ profile, we compared U.S. and Finnish WAIS, WAIS-R, and WAIS III nonverbal and working memory subtest norms. The U.S. standardization samples had consistently higher scores on the Coding and Digit span subtests, while the Finnish samples had higher scores on the Block design subtest. No stable cross-national…

  1. Work Ability Index (WAI) and its health-related determinants among Iranian farmers working in small farm enterprises.

    Science.gov (United States)

    Rostamabadi, Akbar; Mazloumi, Adel; Rahimi Foroushani, Abbas

    2014-01-01

    This study aimed to determine the Work Ability Index (WAI) and examine the influence of health dimensions and demographic variables on the work ability of Iranian farmers working in small farm enterprises. A cross-sectional study was conducted among 294 male farmers. The WAI and SF-36 questionnaires were used to determine work ability and health status. The effect of demographics variables on the work ability index was investigated with the independent samples t-test and one-way ANOVA. Also, multiple linear regression analysis was used to test the association between the mean WAI score and the SF-36 scales. The mean WAI score was 35.1 (SD=10.6). One-way ANOVA revealed a significant relationship between the mean WAI and age. Multiple linear regression analysis showed that work ability was more influenced by physical scales of the health dimensions, such as physical function, role-physical, and general health, whereas a lower association was found for mental scales such as mental health. The average WAI was at a moderate work ability level for the sample population of farmers in this study. Based on the WAI guidelines, improvement of work ability and identification of factors affecting it should be considered a priority in interventional programs. Given the influence of health dimensions on WAI, any intervention program for preservation and promotion of work ability among the studied farmers should be based on balancing and optimizing the physical and psychosocial work environments, with a special focus on reducing physical work load.(J Occup Health 2014; 56: 478-484).

  2. Stanford-Binet & WAIS IQ Differences and Their Implications for Adults with Intellectual Disability (aka Mental Retardation)

    OpenAIRE

    Silverman, Wayne; Miezejeski, Charles; Ryan, Robert; Zigman, Warren; Krinsky-McHale, Sharon; Urv, Tiina

    2010-01-01

    Stanford-Binet and Wechsler Adult Intelligence Scale (WAIS) IQs were compared for a group of 74 adults with intellectual disability (ID). In every case, WAIS Full Scale IQ was higher than the Stanford-Binet Composite IQ, with a mean difference of 16.7 points. These differences did not appear to be due to the lower minimum possible score for the Stanford-Binet. Additional comparisons with other measures suggested that the WAIS might systematically underestimate severity of intellectual impairm...

  3. Structural validity of the Dutch-language version of the WAIS-III in a psychiatric sample

    NARCIS (Netherlands)

    Heijden, P. van der; Bos, P. van den; Mol, B.; Kessels, R.P.C.

    2013-01-01

    The Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV; Wechsler, 2008 ) no longer provides the "traditional" Verbal IQ and Performance IQ deviation scores. In the current study, we investigated the structural validity of these scores in the scale's predecessor, the WAIS-Third Edition

  4. Application of hierarchical genetic models to Raven and WAIS subtests: a Dutch twin study.

    Science.gov (United States)

    Rijsdijk, Frühling V; Vernon, P A; Boomsma, Dorret I

    2002-05-01

    Hierarchical models of intelligence are highly informative and widely accepted. Application of these models to twin data, however, is sparse. This paper addresses the question of how a genetic hierarchical model fits the Wechsler Adult Intelligence Scale (WAIS) subtests and the Raven Standard Progressive test score, collected in 194 18-year-old Dutch twin pairs. We investigated whether first-order group factors possess genetic and environmental variance independent of the higher-order general factor and whether the hierarchical structure is significant for all sources of variance. A hierarchical model with the 3 Cohen group-factors (verbal comprehension, perceptual organisation and freedom-from-distractibility) and a higher-order g factor showed the best fit to the phenotypic data and to additive genetic influences (A), whereas the unique environmental source of variance (E) could be modeled by a single general factor and specifics. There was no evidence for common environmental influences. The covariation among the WAIS group factors and the covariation between the group factors and the Raven is predominantly influenced by a second-order genetic factor and strongly support the notion of a biological basis of g.

  5. The psychometric properties of an Iranian translation of the Work Ability Index (WAI) questionnaire.

    Science.gov (United States)

    Abdolalizadeh, M; Arastoo, A A; Ghsemzadeh, R; Montazeri, A; Ahmadi, K; Azizi, A

    2012-09-01

    This study was carried out to evaluate the psychometric properties of an Iranian translation of the Work Ability Index (WAI) questionnaire. In this methodological study, nurses and healthcare workers aged 40 years and older who worked in educational hospitals in Ahvaz (236 workers) in 2010, completed the questionnaire and 60 of the workers filled out the WAI questionnaire for the second time to ensure test-retest reliability. Forward-backward method was applied to translate the questionnaire from English into Persian. The psychometric properties of the Iranian translation of the WAI were assessed using the fallowing tests: Internal consistency (to test reliability), test-retest analysis, exploratory factor analysis (construct validity), discriminate validity by comparing the mean WAI score in two groups of the employees that had different levels of sick leave, criterion validity by determining the correlation between the Persian version of short form health survey (SF-36) and WAI score. Cronbach's alpha coefficient was estimated to be 0.79 and it was concluded that the internal consistency was high enough. The intraclass correlation coefficient was recognized to be 0.92. Factor analysis indicated three factors in the structure of the work ability including self-perceived work ability (24.5% of the variance), mental resources (22.23% of the variance), and presence of disease and health related limitation (18.55% of the variance). Statistical tests showed that this questionnaire was capable of discriminating two groups of employees who had different levels of sick leave. Criterion validity analysis showed that this instrument and all dimensions of the Iranian version of SF-36 were correlated significantly. Item correlation corrective for overlap showed the items tests had a good correlation except for one. The finding of the study showed that the Iranian version of the WAI is a reliable and valid measure of work ability and can be used both in research and practical

  6. Effects of conversion of mangroves into gei wai ponds on accumulation, speciation and risk of heavy metals in intertidal sediments.

    Science.gov (United States)

    Li, Rongyu; Qiu, Guo Yu; Chai, Minwei; Shen, Xiaoxue; Zan, Qijie

    2018-06-23

    Mangroves are often converted into gei wai ponds for aquaculture, but how such conversion affects the accumulation and behavior of heavy metals in sediments is not clear. The present study aims to quantify the concentration and speciation of heavy metals in sediments in different habitats, including gei wai pond, mangrove marsh dominated by Avicennia marina and bare mudflat, in a mangrove nature reserve in South China. The results showed that gei wai pond acidified the sediment and reduced its electronic conductivity and total organic carbon (TOC) when compared to A. marina marsh and mudflat. The concentrations of Cd, Cu, Zn and Pb at all sediment depths in gei wai pond were lower than the other habitats, indicating gei wai pond reduced the fertility and the ability to retain heavy metals in sediment. Gei wai pond sediment also had a lower heavy metal pollution problem according to multiple evaluation methods, including potential ecological risk coefficient, potential ecological risk index, geo-accumulation index, mean PEL quotients, pollution load index, mean ERM quotients and total toxic unit. Heavy metal speciation analysis showed that gei wai pond increased the transfer of the immobilized fraction of Cd and Cr to the mobilized one. According to the acid-volatile sulfide (AVS) and simultaneously extracted metals (SEM) analysis, the conversion of mangroves into gei wai pond reduced values of ([SEM] - [AVS])/f oc , and the role of TOC in alleviating heavy metal toxicity in sediment. This study demonstrated the conversion of mangrove marsh into gei wai pond not only reduced the ecological purification capacity on heavy metal contamination, but also enhanced the transfer of heavy metals from gei wai pond sediment to nearby habitats.

  7. Effects of conversion of mangroves into gei wai ponds on sediment heavy metals accumulation in tidal flat estuary, South China

    Science.gov (United States)

    Li, R.; Qiu, G.; Chai, M.; Li, R.

    2017-12-01

    Gei wai ponds act as important component in mangrove ecosystem, but the conversion of mangroves into gei wai ponds and its ecological function on heavy metal accumulation is still not clear. The study quantified the sediment heavy metal concentration and speciation in gei wai pond, Avicennia marina marsh and mudflat in Futian mangrove wetlands, South China. The results showed that gei wai pond acidified the sediment and reduced its fertility due to reduced pH, electronic conductivity (EC) and total organic carbon (TOC) compared to A. marina marsh and mudflat. The concentrations of Cd, Cu, Zn and Pb at all depth in gei wai pond sediment were also lower than other sites, indicating reduced storage function on heavy metals. Multiple analysis implied that heavy metals in all sites could be attributed to anthropogenic sources, with Cr as natural and anthropogenic sources in gei wai pond. Gei wai pond sediment had lower heavy metal pollution based on multiple evaluation methods, including potential ecological risk coefficient (Eir), potential ecological risk index (RI), geo-accumulation index (Igeo), mean PEL quotients (m-PEL-q), pollution load index (PLI), mean ERM quotients (m-ERM-q) and total toxic unit (∑TU). Heavy metal speciation analysis indicated that gei wai pond improved the conversion from the immobilized Cd and Cr to the mobilized fraction. SEM-AVS analysis indicated no adverse toxicity occurred in all sites, and the role of TOC in relieving sediment heavy metal toxicity of gei wai pond is limited.

  8. WAIS-III IQs, Horn's Theory, and Generational Changes from Young Adulthood to Old Age.

    Science.gov (United States)

    Kaufman, Alan S.

    2001-01-01

    Examined age changes in intellectual ability in the range from 16 to 89 years through 2 studies that involved IQs on the Wechsler Adult Intelligence Scale III (WAIS-III). Results are interpreted in the context of the fluid-crystallized intelligence theory of J. Horn. Studies used WAIS-III standardization data for 2,450 adults and longitudinal data…

  9. Work ability index (WAI) and its association with psychosocial factors in one of the petrochemical industries in Iran.

    Science.gov (United States)

    Mazloumi, Adel; Rostamabadi, Akbar; Nasl Saraji, Gabraeil; Rahimi Foroushani, Abbas

    2012-01-01

    In recent decades, work ability index (WAI) has been a common practical tool to measure individuals' work ability in many European, Asian and South American countries. However, there is no study concerning work ability in Iran. The aim of this study was to determine the work ability index in an Iranian petrochemical job setting and to examine its relationship with psychosocial factors. A cross-sectional study was conducted among 420 male workers in various occupations. Work ability was evaluated using the WAI questionnaire developed by FIOH; the Job content questionnaire (JCQ) was used to assess psychosocial factors. The mean WAI score was 39.1 (SD=5.7) among workers in the studied petrochemical industry. Multiple linear regression analysis revealed a significant association between mean WAI score and age, job tenure, educational level, rest and sleep status and vocational education. Moreover, the results showed that skill discretion, coworker support and supervisor support were positively associated with the mean WAI score. On the other hand, it was inversely associated with job demands, job strain and job insecurity. This study was the first research to determine WAI in an important industry in Iran. Overall, work ability was in the "Good" category among the workers in the studied field. On the basis of the WAI guidelines, this level should be maintained and promoted to excellent level by providing supportive countermeasures. The WAI score was significantly associated with psychosocial factors. The results showed that even in heavy physical work, factors such as job insecurity, skill discretion, job strain and social support play an important role in maintaining work ability. A positive combination of "psychosocial characteristics" of the job with "individual resources" can promote work ability in such occupations.

  10. Comparison of the WAIS-III and WISC-IV in 16-Year-Old Special Education Students

    Science.gov (United States)

    Gordon, Shirley; Duff, Simon; Davidson, Terry; Whitaker, Simon

    2010-01-01

    Background: Previous research with earlier versions of the WISC and WAIS has demonstrated that when administered to people who have intellectual disabilities, the WAIS produced higher IQ scores than the WISC. The aim of this study was to examine whether these differences still exist. A comparison of the Wechsler Adult Intelligence Scale-Third…

  11. Stanford-Binet & WAIS IQ Differences and Their Implications for Adults with Intellectual Disability (aka Mental Retardation).

    Science.gov (United States)

    Silverman, Wayne; Miezejeski, Charles; Ryan, Robert; Zigman, Warren; Krinsky-McHale, Sharon; Urv, Tiina

    2010-03-01

    Stanford-Binet and Wechsler Adult Intelligence Scale (WAIS) IQs were compared for a group of 74 adults with intellectual disability (ID). In every case, WAIS Full Scale IQ was higher than the Stanford-Binet Composite IQ, with a mean difference of 16.7 points. These differences did not appear to be due to the lower minimum possible score for the Stanford-Binet. Additional comparisons with other measures suggested that the WAIS might systematically underestimate severity of intellectual impairment. Implications of these findings are discussed regarding determination of disability status, estimating prevalence of ID, assessing dementia and aging-related cognitive declines, and diagnosis of ID in forensic cases involving a possible death penalty.

  12. Factor Analysis of the Spanish Version of the WAIS: The Escala de Inteligencia Wechsler para Adultos (EIWA).

    Science.gov (United States)

    Gomez, Francisco C., Jr.; And Others

    1992-01-01

    The standardization of the Escala de Inteligencia Wechsler para Adultos (EIWA) and the original Wechsler Adult Intelligence Scale (WAIS) were subjected to principal components analysis to examine their comparability for 616 EIWA subjects and 800 WAIS subjects. Similarity of factor structures of both scales is supported. (SLD)

  13. From human monocytes to genome-wide binding sites--a protocol for small amounts of blood: monocyte isolation/ChIP-protocol/library amplification/genome wide computational data analysis.

    Directory of Open Access Journals (Sweden)

    Sebastian Weiterer

    Full Text Available Chromatin immunoprecipitation in combination with a genome-wide analysis via high-throughput sequencing is the state of the art method to gain genome-wide representation of histone modification or transcription factor binding profiles. However, chromatin immunoprecipitation analysis in the context of human experimental samples is limited, especially in the case of blood cells. The typically extremely low yields of precipitated DNA are usually not compatible with library amplification for next generation sequencing. We developed a highly reproducible protocol to present a guideline from the first step of isolating monocytes from a blood sample to analyse the distribution of histone modifications in a genome-wide manner.The protocol describes the whole work flow from isolating monocytes from human blood samples followed by a high-sensitivity and small-scale chromatin immunoprecipitation assay with guidance for generating libraries compatible with next generation sequencing from small amounts of immunoprecipitated DNA.

  14. Confirmatory Factor Analysis of WAIS-IV in a Clinical Sample: Examining a Bi-Factor Model

    Directory of Open Access Journals (Sweden)

    Rachel Collinson

    2016-12-01

    Full Text Available There have been a number of studies that have examined the factor structure of the Wechsler Adult Intelligence Scale IV (WAIS-IV using the standardization sample. In this study, we investigate its factor structure on a clinical neuropsychology sample of mixed aetiology. Correlated factor, higher-order and bi-factor models are all tested. Overall, the results suggest that the WAIS-IV will be suitable for use with this population.

  15. WAIS-III index score profiles in the Canadian standardization sample.

    Science.gov (United States)

    Lange, Rael T

    2007-01-01

    Representative index score profiles were examined in the Canadian standardization sample of the Wechsler Adult Intelligence Scale-Third Edition (WAIS-III). The identification of profile patterns was based on the methodology proposed by Lange, Iverson, Senior, and Chelune (2002) that aims to maximize the influence of profile shape and minimize the influence of profile magnitude on the cluster solution. A two-step cluster analysis procedure was used (i.e., hierarchical and k-means analyses). Cluster analysis of the four index scores (i.e., Verbal Comprehension [VCI], Perceptual Organization [POI], Working Memory [WMI], Processing Speed [PSI]) identified six profiles in this sample. Profiles were differentiated by pattern of performance and were primarily characterized as (a) high VCI/POI, low WMI/PSI, (b) low VCI/POI, high WMI/PSI, (c) high PSI, (d) low PSI, (e) high VCI/WMI, low POI/PSI, and (f) low VCI, high POI. These profiles are potentially useful for determining whether a patient's WAIS-III performance is unusual in a normal population.

  16. Stanford-Binet and WAIS IQ Differences and Their Implications for Adults with Intellectual Disability (aka Mental Retardation)

    Science.gov (United States)

    Silverman, Wayne; Miezejeski, Charles; Ryan, Robert; Zigman, Warren; Krinsky-McHale, Sharon; Urv, Tiina

    2010-01-01

    Stanford-Binet and Wechsler Adult Intelligence Scale (WAIS) IQs were compared for a group of 74 adults with intellectual disability (ID). In every case, WAIS Full Scale IQ was higher than the Stanford-Binet Composite IQ, with a mean difference of 16.7 points. These differences did not appear to be due to the lower minimum possible score for the…

  17. Comparison of Scores on the WAIS and Its Puerto Rican Counterpart, Escala de Inteligencia Wechsler para Adultos, in an Institutionalized Latin American Psychiatric Population.

    Science.gov (United States)

    Davis, Todd McLin; Rodriguez, Vene L.

    1979-01-01

    Compared vocabulary and block design subtests of the Wechsler Adult Intelligence Scale (WAIS) and its Puerto Rican counterpart, the Escala de Inteligencia Wechsler para Adultos (EIWA), in hospitalized Latins and Trans-Caribbean Blacks. EIWA scores were significantly higher than WAIS scores. Equivalence of EIWA and WAIS estimates is questioned.…

  18. WAIS Performance in Unincarcerated Groups of MMPI-Defined Sociopaths and Normal Controls

    Science.gov (United States)

    Allain, Albert N.

    1974-01-01

    This investigation examines WAIS performance in groups of 32 sociopaths and 33 normal controls defined by Minnesota Multiphasic Personality Inventory criteria. Sociopaths and normal controls show no differences in overall level of intellectual functioning. (Author)

  19. Rorschach and the WAIS-III after one and two years of psychotherapy O teste de Rorschach e a Escala WAIS-III após um e dois Anos de psicoterapia

    Directory of Open Access Journals (Sweden)

    Latife Yazigi

    2011-01-01

    Full Text Available This study aimed at identifying what aspects of personality are modified after one and two years of psychoanalytic psychotherapy in adults attending a free university healthcare service in São Paulo, Brazil. The instruments were the Rorschach and the WAIS-III tests which were administered before and after one and two years of treatment. The participants were 34 adult individuals, both genders. After one year of psychotherapy in the Rorschach method there was an increase in effective and adaptive interpersonal relationship, an enhancement in sensitiveness related to the capacity of modulating affect, the need for close contact as well as the arousal of feelings of discomfort associated with intensification of self-regard, and a decrease in narcissistic tendencies. As well as in WAIS-III, there was an increase in motivation, attention and speed processing.O estudo teve por objetivo identificar quais aspectos da personalidade são modificados após um e dois anos de psicoterapia psicanalítica em adultos atendidos em um serviço público de saúde mental de uma universidade em São Paulo, no Brasil. Os instrumentos utilizados foram o Rorschach e a Escala de Inteligência Wechsler para adultos (WAIS-III, os quais foram administrados antes e após um e dois anos de tratamento. Os participantes foram 34 indivíduos adultos, de ambos os sexos. No Rorschach, após um ano de psicoterapia, ocorreu melhora da relação interpessoal adaptada e efetiva, melhora na sensibilidade relacionada à capacidade de modular afeto e da necessidade de contato mais próximo, e surgimento de sentimentos de desconforto associados à intensificação de auto-observação e diminuição de tendências narcisistas. No WAIS-III houve aumento de motivação, melhora atencional e de velocidade de processamento.

  20. Viabilidade da estimativa de QI a partir dos subtestes Vocabulário e Cubos da WAIS-III Viability of IQ estimates based on Vocabulary and Block Design WAIS-III subtests

    Directory of Open Access Journals (Sweden)

    Flávia Wagner

    2010-08-01

    Full Text Available Objetivou-se avaliar a viabilidade de estimar o Quociente de Inteligência (QI de adultos por meio de duas estratégias que utilizam uma forma curta constituída pelos subtestes Vocabulário e Cubos da Escala Wechsler de Inteligência para Adultos (WAIS-III. Participaram do estudo 77 homens e mulheres, com idade média de 39,1 anos (dp=13,4. Foi aplicada a WAIS-III e questionários para cumprir os critérios de inclusão dos participantes sem prejuízos neurológicos e psiquiátricos. Para avaliar a concordância entre as duas estratégias de estimar o QI, utilizou-se o método estatístico proposto por Bland e Altman. Como resultado, encontrou-se que as estimativas de QI geradas pelas duas estratégias apresentam concordância com a medida do QI realizada pela aplicação da escala completa apenas em alguns dos casos avaliados. Sugere-se cautela na utilização dessas estratégias para estimar o QI de adultos.The aim of this study was to evaluate the feasibility of estimating the Intelligence Quotient (IQ in adults based on two strategies that use Vocabulary and Block Design subtests of Wechsler Adult Intelligence Scale (WAIS-III. Seventy-seven men and women participated of the study, with mean age of 39.1 (sd=13.4. WAIS-III subtests were administered and questionnaires were used to verify inclusion criteria for participants without neurological or psychiatric impairments. A statistical method proposed by Bland and Altman was used to evaluate the agreement between both strategies to estimate IQ. Results suggest that IQ estimates derived from both strategies only agree with the IQ derived from the full battery in a few cases of the sample. Considering these findings, caution is suggested when using these strategies to estimate adults' IQ.

  1. Investigation of the factor structure of the Wechsler Adult Intelligence Scale--Fourth Edition (WAIS-IV): exploratory and higher order factor analyses.

    Science.gov (United States)

    Canivez, Gary L; Watkins, Marley W

    2010-12-01

    The present study examined the factor structure of the Wechsler Adult Intelligence Scale--Fourth Edition (WAIS-IV; D. Wechsler, 2008a) standardization sample using exploratory factor analysis, multiple factor extraction criteria, and higher order exploratory factor analysis (J. Schmid & J. M. Leiman, 1957) not included in the WAIS-IV Technical and Interpretation Manual (D. Wechsler, 2008b). Results indicated that the WAIS-IV subtests were properly associated with the theoretically proposed first-order factors, but all but one factor-extraction criterion recommended extraction of one or two factors. Hierarchical exploratory analyses with the Schmid and Leiman procedure found that the second-order g factor accounted for large portions of total and common variance, whereas the four first-order factors accounted for small portions of total and common variance. It was concluded that the WAIS-IV provides strong measurement of general intelligence, and clinical interpretation should be primarily at that level.

  2. Evaluating WAIS-IV structure through a different psychometric lens: Structural causal model discovery as an alternative to confirmatory factor analysis

    NARCIS (Netherlands)

    Dijk, M.J.A.M. van; Claassen, T.; Suwartono, C.; Veld, W.M. van der; Heijden, P.T. van der; Hendriks, M.P.H.

    2017-01-01

    Objective: Since the publication of the WAIS-IV in the U.S. in 2008, efforts have been made to explore the structural validity by applying factor analysis to various samples. This study aims to achieve a more fine-grained understanding of the structure of the Dutch language version of the WAIS-IV

  3. Conceptual elaboration versus direct lexical access in WAIS-similarities: differential effects of white-matter lesions and gray matter volumes.

    Science.gov (United States)

    Fernaeus, Sven-Erik; Hellström, Åke

    2017-09-18

    Wechsler Adult Intelligence Scale (WAIS) subscale Similarities have been classified as a test of either verbal comprehension or of inductive reasoning. The reason may be that items divide into two categories. We tested the hypothesis of heterogeneity of items in WAIS-Similarities. Consecutive patients at a memory clinic and healthy controls participated in the study. White-matter hyperintensities (WMHs) and normalized temporal lobe volumes were measured based on Magnetic resonance Imaging (MRI), and tests of verbal memory and attention were used in addition to WAIS-Similarities to collect behavioural data. Factor analysis supported the hypothesis that two factors are involved in the performance of WAIS-similarities: (1) semiautomatic lexical access and (2) conceptual elaboration. These factors were highly correlated but provided discriminative diagnostic information: In logistic regression analyses, scores of the lexical access factor and of the conceptual elaboration factor discriminated patients with mild cognitive impairment from Alzheimer's disease patients and from healthy controls, respectively. High scores of WMH, indicating periventricular white-matter lesions, predicted factor scores of direct lexical access but not those of conceptual elaboration, which were predicted only by medial and lateral temporal lobe volumes.

  4. Ultra-trace Measurements in the WAIS Divide 06A Ice Core, Version 1

    Data.gov (United States)

    National Aeronautics and Space Administration — These data contain the results of gas chromatography mass spectrometry (GC-MS) analysis of 207 samples from the WAIS Divide 06A ice core. The trace gases found in...

  5. Internet-based wide area measurement applications in deregulated power systems

    Science.gov (United States)

    Khatib, Abdel-Rahman Amin

    Since the deregulation of power systems was started in 1989 in the UK, many countries have been motivated to undergo deregulation. The United State started deregulation in the energy sector in California back in 1996. Since that time many other states have also started the deregulation procedures in different utilities. Most of the deregulation market in the United States now is in the wholesale market area, however, the retail market is still undergoing changes. Deregulation has many impacts on power system network operation and control. The number of power transactions among the utilities has increased and many Independent Power Producers (IPPs) now have a rich market for competition especially in the green power market. The Federal Energy Regulatory Commission (FERC) called upon utilities to develop the Regional Transmission Organization (RTO). The RTO is a step toward the national transmission grid. RTO is an independent entity that will operate the transmission system in a large region. The main goal of forming RTOs is to increase the operation efficiency of the power network under the impact of the deregulated market. The objective of this work is to study Internet based Wide Area Information Sharing (WAIS) applications in the deregulated power system. The study is the first step toward building a national transmission grid picture using information sharing among utilities. Two main topics are covered as applications for the WAIS in the deregulated power system, state estimation and Total Transfer Capability (TTC) calculations. As a first step for building this national transmission grid picture, WAIS and the level of information sharing of the state estimation calculations have been discussed. WAIS impacts to the TTC calculations are also covered. A new technique to update the TTC using on line measurements based on WAIS created by sharing state estimation is presented.

  6. Relationship of Education and IQ in the WAIS-R Standardization Sample.

    Science.gov (United States)

    Matarazzo, Joseph D.; Herman, David O.

    1984-01-01

    Analyzed the total number of years of schooling completed against the Verbal IQ (VIQ), Performance IQ (PIQ), and Full Scale IQ (FSIQ) of the 1,880 individuals who were used to standardize the Wechsler Adult Intelligence Scale-Revised (WAIS-R). Analysis revealed a progressive increase in mean FSIQ with increasing education. (JAC)

  7. WISC-III e WAIS-III na avaliação da inteligência de cegos WISC-III/WAIS-III en ciegos WISC-III and WAIS-III in intellectual assessment of blind people

    OpenAIRE

    Elizabeth do Nascimento; Carmen Elvira Flores-Mendoza

    2007-01-01

    Diante da escassez de pesquisas nacionais e de testes psicológicos destinados a avaliar pessoas cegas, desenvolveu-se um estudo psicométrico com as escalas verbais dos testes WISC-III e WAIS-III. Após as adaptações de alguns estímulos e das instruções, os testes foram aplicados em crianças (N = 120) e adultos (N = 52) residentes em Belo Horizonte. Os resultados indicaram que as escalas verbais modificadas apresentam uma boa consistência interna (alfa> 0,80). Além disso, a investigação da vali...

  8. 'Ike Wai Professional Development Model for Students and Post-docs

    Science.gov (United States)

    Bruno, B. C.

    2016-12-01

    'Ike Wai: Securing Hawaii's Water Future, funded by NSF EPSCoR, is an interdisciplinary research collaboration among geophysicists, geochemists, engineers, microbiologists, computational modelers, data scientists and social scientists. Key questions include: How much water is there? How does it flow? How long will it last? Undergraduate students, graduate students and post-docs are actively involved in the research, and their professional development is a key part of the project. An underlying principle is that students assume responsibility for their own learning and professional development. Based on the model created by the NSF Center for Microbial Oceanography: Research and Education (C-MORE) (Bruno et al, 2008; Guannel et al 2014, Bottjer et al 2014), the 'Ike Wai professional development program includes (1) Leadership. Each student and post-doc creates an Individualized Professional Development plan, which includes leadership training (provided by external facilitators) and assuming leadership roles (such as developing and implementing trainings for their peers). (2) EDventures. Based on the C-MORE model, EDventures combines proposal-writing training with the incentive of seed money. Rather than providing training a priori, the EDventures model encourages students and post-docs to write a proposal based on guidelines provided. Training occurs during a two-stage review stage: proposers respond to panel reviews and resubmit their proposal within a single review cycle. C-MORE EDventures alumni self-report statistically significant confidence gains on all questions posed. Their subsequent proposal success is envious: of the 12 proposals submitted by to NSF, 50% were funded. (Wood Charlson & Bruno, 2015) (3) Layered Mentoring Network. All ´Ike Wai participants serve as both mentor and mentee. Students are matched with a non-research mentor in addition to their advisor to promote a holistic approach to career development. They will also serve as mentors to more

  9. Evaluating WAIS-IV structure through a different psychometric lens: structural causal model discovery as an alternative to confirmatory factor analysis.

    Science.gov (United States)

    van Dijk, Marjolein J A M; Claassen, Tom; Suwartono, Christiany; van der Veld, William M; van der Heijden, Paul T; Hendriks, Marc P H

    Since the publication of the WAIS-IV in the U.S. in 2008, efforts have been made to explore the structural validity by applying factor analysis to various samples. This study aims to achieve a more fine-grained understanding of the structure of the Dutch language version of the WAIS-IV (WAIS-IV-NL) by applying an alternative analysis based on causal modeling in addition to confirmatory factor analysis (CFA). The Bayesian Constraint-based Causal Discovery (BCCD) algorithm learns underlying network structures directly from data and assesses more complex structures than is possible with factor analysis. WAIS-IV-NL profiles of two clinical samples of 202 patients (i.e. patients with temporal lobe epilepsy and a mixed psychiatric outpatient group) were analyzed and contrasted with a matched control group (N = 202) selected from the Dutch standardization sample of the WAIS-IV-NL to investigate internal structure by means of CFA and BCCD. With CFA, the four-factor structure as proposed by Wechsler demonstrates acceptable fit in all three subsamples. However, BCCD revealed three consistent clusters (verbal comprehension, visual processing, and processing speed) in all three subsamples. The combination of Arithmetic and Digit Span as a coherent working memory factor could not be verified, and Matrix Reasoning appeared to be isolated. With BCCD, some discrepancies from the proposed four-factor structure are exemplified. Furthermore, these results fit CHC theory of intelligence more clearly. Consistent clustering patterns indicate these results are robust. The structural causal discovery approach may be helpful in better interpreting existing tests, the development of new tests, and aid in diagnostic instruments.

  10. Accuracy of WISC-III and WAIS-IV short forms in patients with neurological disorders

    NARCIS (Netherlands)

    van Ool, Jans S.; Hurks, Petra P.M.; Snoeijen-Schouwenaars, Francesca M.; Tan, In Y.; Schelhaas, Helenius J.; Klinkenberg, Sylvia; Aldenkamp, Albert P.; Hendriksen, Jos G.M.

    2018-01-01

    The assessment of intellectual abilities is intensive, time-consuming, and might be considered burdensome for patients. We examined psychometric qualities of short forms (SFs) of the Wechsler Intelligence Scales for Children (WISC-third edition) and for adults (WAIS-fourth edition), in children (n =

  11. Efficacy of a hospital-wide environmental cleaning protocol on hospital-acquired methicillin-resistant Staphylococcus aureus rates.

    Science.gov (United States)

    Watson, Paul Andrew; Watson, Luke Robert; Torress-Cook, Alfonso

    2016-07-01

    Environmental contamination has been associated with over half of methicillin-resistant Staphylococcus aureus (MRSA) outbreaks in hospitals. We explored if a hospital-wide environmental and patient cleaning protocol would lower hospital acquired MRSA rates and associated costs. This study evaluates the impact of implementing a hospital-wide environmental and patient cleaning protocol on the rate of MRSA infection and the potential cost benefit of the intervention. A retrospective, pre-post interventional study design was used. The intervention comprised a combination of enhanced environmental cleaning of high touch surfaces, daily washing of patients with benzalkonium chloride, and targeted isolation of patients with active infection. The rate of MRSA infection per 1000 patient days (PD) was compared with the rate after the intervention (Steiros Algorithm ® ) was implemented. A cost-benefit analysis based on the number of MRSA infections avoided was conducted. The MRSA rates decreased by 96% from 3.04 per 1000 PD to 0.11 per 1000 PD ( P reduction in MRSA infections, avoided an estimated $1,655,143 in healthcare costs. Implementation of this hospital-wide protocol appears to be associated with a reduction in the rate of MRSA infection and therefore a reduction in associated healthcare costs.

  12. Psychometric qualities of a tetrad WAIS-III short form for use in individuals with mild to borderline intellectual disability.

    Science.gov (United States)

    van Duijvenbode, Neomi; Didden, Robert; van den Hazel, Teunis; Engels, Rutger C M E

    2016-01-01

    To investigate the reliability and validity of a Wechsler Abbreviated Scale of Intelligence-based Wechsler Adult Intelligence Scale - third edition (WAIS-III) short form (SF) in a sample of individuals with mild to borderline intellectual disability (MBID) (N = 117; M(IQ) = 71.34; SD(IQ) = 8.00, range: 52-85). A full WAIS-III was administered as a standard procedure in the diagnostic process. The results indicate an excellent reliability (r = 0.96) and a strong, positive correlation with the full WAIS-III (r = 0.89). The SF correctly identified ID in general and the correct IQ category more specifically in the majority of cases (97.4% and 86.3% of cases, respectively). In addition, 82.1% of the full scale IQ (FSIQ) estimates fell within the 95% confidence interval of the original score. We conclude that the SF is a reliable and valid measure to estimate FSIQ. It can be used in clinical and research settings when global estimates of intelligence are sufficient.

  13. Measuring Working Memory With Digit Span and the Letter-Number Sequencing Subtests From the WAIS-IV: Too Low Manipulation Load and Risk for Underestimating Modality Effects.

    Science.gov (United States)

    Egeland, Jens

    2015-01-01

    The Wechsler Adult Intelligence Scale (WAIS) is one of the most frequently used tests among psychologists. In the fourth edition of the test (WAIS-IV), the subtests Digit Span and Letter-Number Sequencing are expanded for better measurement of working memory (WM). However, it is not clear whether the new extended tasks contribute sufficient complexity to be sensitive measures of manipulation WM, nor do we know to what degree WM capacity differs between the visual and the auditory modality because the WAIS-IV only tests the auditory modality. Performance by a mixed sample of 226 patients referred for neuropsychological examination on the Digit Span and Letter-Number Sequencing subtests from the WAIS-IV and on Spatial Span from the Wechsler Memory Scale-Third Edition was analyzed in two confirmatory factor analyses to investigate whether a unitary WM model or divisions based on modality or level/complexity best fit the data. The modality model showed the best fit when analyzing summed scores for each task as well as scores for the longest span. The clinician is advised to apply tests with higher manipulation load and to consider testing visual span as well before drawing conclusions about impaired WM from the WAIS-IV.

  14. Comparison of WAIS-III Short Forms for Measuring Index and Full-Scale Scores

    Science.gov (United States)

    Girard, Todd A.; Axelrod, Bradley N.; Wilkins, Leanne K.

    2010-01-01

    This investigation assessed the ability of the Wechsler Adult Intelligence Scale-Third Edition (WAIS-III) short forms to estimate both index and IQ scores in a large, mixed clinical sample (N = 809). More specifically, a commonly used modification of Ward's seven-subtest short form (SF7-A), a recently proposed index-based SF7-C and eight-subtest…

  15. CEPF Western Ghats Special Series: Freshwater fish fauna of Krishna River at Wai, northern Western Ghats, India

    Directory of Open Access Journals (Sweden)

    S.S. Kharat

    2012-06-01

    Full Text Available Freshwater fish fauna of the Krishna River at Wai, and the Dhom reservoir upstream of Wai, was studied. Fifty one species belonging to 14 families and 33 genera were recorded; 13 endemic to the Western Ghats and two to the Krishna River system. Moderate to rare populations were found for six globally threatened species: Gonoproktopterus curmuca, Labeo potail, Schismatorhynchos nukta, Tor khudree, T. mussullah and Parapsilorhynchus discophorus. Fish in this area are under threat due to two introduced species and five transplanted species, and due to other anthropogenic activities such as overfishing and organic and inorganic pollution of the river. Site based conservation action plans are needed for conservation of rare and threatened fish in this area.

  16. An exploratory study of the Work Ability Index (WAI) and its components in a group of computer workers.

    Science.gov (United States)

    Costa, Ana Filipa; Puga-Leal, Rogério; Nunes, Isabel L

    2011-01-01

    The objective of this paper is to present a study on the assessment of the work ability of a group of aged computers workers. The study was developed with the goal of creating a decision making framework oriented towards the maintenance of the health and working ability of aged workers. Fifty computer workers participated in this study. They were administrative secretaries and computer technicians working mainly with office computers. The method used to assess the work ability was the Work Ability Index (WAI). 78% of the participants had good or excellent work ability and only 2% a poor one. The average WAI score was 40.5 (SD=5.761; min=27; max=49). This study confirms the decrease in work ability of workers while aging. The group overall work ability was slightly higher than the reference values develop by the Finnish Institute of Occupational Health. The assessment of work ability is fundamental to make age-friendly workplaces. WAI is one tool designed to perform such assessment. The results obtained could assist the early identification of situations where employees are struggling with their work ability, thus helping to prioritize ergonomic interventions devoted to improve the working conditions, and allowing the continued employment of aging workers on their current job.

  17. WAIS Digit Span-Based Indicators of Malingered Neurocognitive Dysfunction: Classification Accuracy in Traumatic Brain Injury

    Science.gov (United States)

    Heinly, Matthew T.; Greve, Kevin W.; Bianchini, Kevin J.; Love, Jeffrey M.; Brennan, Adrianne

    2005-01-01

    The present study determined specificity and sensitivity to malingered neurocognitive dysfunction (MND) in traumatic brain injury (TBI) for several Wechsler Adult Intelligence Scale (WAIS) Digit Span scores. TBI patients (n = 344) were categorized into one of five groups: no incentive, incentive only, suspect, probable MND, and definite MND.…

  18. A cross-cultural comparison between South African and British students on the Wechsler Adult Intelligence Scales Third Edition (WAIS-III.

    Directory of Open Access Journals (Sweden)

    Kate eCockcroft

    2015-03-01

    Full Text Available There is debate regarding the appropriate use of Western cognitive measures with individuals from very diverse backgrounds to that of the norm population. Given the dated research in this area and the considerable socio-economic changes that South Africa has witnessed over the past 20 years, this paper reports on the use of the Wechsler Adult Intelligence Scale Third Edition (WAIS-III, the most commonly used measure of intelligence, with an English second language, multilingual, low socio-economic group of black, South African university students. Their performance on the WAIS-III was compared to that of a predominantly white, British, monolingual, higher socio-economic group. A multi-group confirmatory factor analysis showed that the WAIS-III lacks measurement invariance between the two groups, suggesting that it may be tapping different constructs in each group. The UK group significantly outperformed the SA group on the knowledge-based verbal, and some nonverbal subtests, while the SA group performed significantly better on measures of processing speed. The groups did not differ significantly on the Matrix Reasoning subtest and on those working memory subtests with minimal reliance on language, which appear to be the least culturally biased. Group differences were investigated further in a set of principal components analyses, which revealed that the WAIS-III scores loaded differently for the UK and SA groups. While the SA group appeared to treat the processing speed subtests differently to those measuring perceptual organisation and nonverbal reasoning, the UK group seemed to approach all of these subtests similarly. These results have important implications for the cognitive assessment of individuals from culturally, linguistically and socio-economically diverse circumstances.

  19. A cross-cultural comparison between South African and British students on the Wechsler Adult Intelligence Scales Third Edition (WAIS-III).

    Science.gov (United States)

    Cockcroft, Kate; Alloway, Tracy; Copello, Evan; Milligan, Robyn

    2015-01-01

    There is debate regarding the appropriate use of Western cognitive measures with individuals from very diverse backgrounds to that of the norm population. Given the dated research in this area and the considerable socio-economic changes that South Africa has witnessed over the past 20 years, this paper reports on the use of the Wechsler Adult Intelligence Scale Third Edition (WAIS-III), the most commonly used measure of intelligence, with an English second language, multilingual, low socio-economic group of black, South African university students. Their performance on the WAIS-III was compared to that of a predominantly white, British, monolingual, higher socio-economic group. A multi-group confirmatory factor analysis showed that the WAIS-III lacks measurement invariance between the two groups, suggesting that it may be tapping different constructs in each group. The UK group significantly outperformed the SA group on the knowledge-based verbal, and some non-verbal subtests, while the SA group performed significantly better on measures of Processing Speed (PS). The groups did not differ significantly on the Matrix Reasoning subtest and on those working memory subtests with minimal reliance on language, which appear to be the least culturally biased. Group differences were investigated further in a set of principal components analyses, which revealed that the WAIS-III scores loaded differently for the UK and SA groups. While the SA group appeared to treat the PS subtests differently to those measuring perceptual organization and non-verbal reasoning, the UK group seemed to approach all of these subtests similarly. These results have important implications for the cognitive assessment of individuals from culturally, linguistically, and socio-economically diverse circumstances.

  20. Incidental Learning: A Brief, Valid Measure of Memory Based on the WAIS-IV Vocabulary and Similarities Subtests.

    Science.gov (United States)

    Spencer, Robert J; Reckow, Jaclyn; Drag, Lauren L; Bieliauskas, Linas A

    2016-12-01

    We assessed the validity of a brief incidental learning measure based on the Similarities and Vocabulary subtests of the Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV). Most neuropsychological assessments for memory require intentional learning, but incidental learning occurs without explicit instruction. Incidental memory tests such as the WAIS-III Symbol Digit Coding subtest have existed for many years, but few memory studies have used a semantically processed incidental learning model. We conducted a retrospective analysis of 37 veterans with traumatic brain injury, referred for outpatient neuropsychological testing at a Veterans Affairs hospital. As part of their evaluation, the participants completed the incidental learning tasks. We compared their incidental learning performance to their performance on traditional memory measures. Incidental learning scores correlated strongly with scores on the California Verbal Learning Test-Second Edition (CVLT-II) and Brief Visuospatial Memory Test-Revised (BVMT-R). After we conducted a partial correlation that controlled for the effects of age, incidental learning correlated significantly with the CVLT-II Immediate Free Recall, CVLT-II Short-Delay Recall, CVLT-II Long-Delay Recall, and CVLT-II Yes/No Recognition Hits, and with the BVMT-R Delayed Recall and BVMT-R Recognition Discrimination Index. Our incidental learning procedures derived from subtests of the WAIS-IV Edition are an efficient and valid way of measuring memory. These tasks add minimally to testing time and capitalize on the semantic encoding that is inherent in completing the Similarities and Vocabulary subtests.

  1. Major Ion Concentrations in WDC05Q and WDC06A Ice Cores (WAIS Divide), Version 1

    Data.gov (United States)

    National Aeronautics and Space Administration — This data set contains major ion concentrations from the chemical analysis of two WAIS Divide ice cores (WDC05Q, 0-114 m; WDC06A, 0-129 m). The analytical technique...

  2. Transcranial Direct Current Stimulation of Frontal Cortex Decreases Performance on the WAIS-IV Intelligence Test

    Science.gov (United States)

    Sellers, Kristin K.; Mellin, Juliann M.; Lustenberger, Caroline M.; Boyle, Michael R.; Lee, Won Hee; Peterchev, Angel V.; Frohlich, Flavio

    2015-01-01

    Transcranial direct current stimulation (tDCS) modulates excitability of motor cortex. However, there is conflicting evidence about the efficacy of this non-invasive brain stimulation modality to modulate performance on cognitive tasks. Previous work has tested the effect of tDCS on specific facets of cognition and executive processing. However, no randomized, double-blind, sham-controlled study has looked at the effects of tDCS on a comprehensive battery of cognitive processes. The objective of this study was to test if tDCS had an effect on performance on a comprehensive assay of cognitive processes, a standardized intelligence quotient (IQ) test. The study consisted of two substudies and followed a double-blind, between-subjects, sham-controlled design. In total, 41 healthy adult participants completed the Wechsler Adult Intelligence Scale, Fourth Edition (WAIS-IV) as a baseline measure. At least one week later, participants in substudy 1 received either bilateral tDCS (anodes over both F4 and F3, cathode over Cz, 2mA at each anode for 20 minutes) or active sham tDCS (2mA for 40 seconds), and participants in substudy 2 received either right or left tDCS (anode over either F4 or F3, cathode over Cz, 2mA for 20 minutes). In both studies, the WAIS-IV was immediately administered following stimulation to assess for performance differences induced by bilateral and unilateral tDCS. Compared to sham stimulation, right, left, and bilateral tDCS reduced improvement between sessions on Full Scale IQ and the Perceptual Reasoning Index. This demonstration that frontal tDCS selectively degraded improvement on specific metrics of the WAIS-IV raises important questions about the often proposed role of tDCS in cognitive enhancement. PMID:25934490

  3. An examination of the Wechsler Adult Intelligence Scales, Fourth Edition (WAIS-IV) in individuals with complicated mild, moderate and Severe traumatic brain injury (TBI).

    Science.gov (United States)

    Carlozzi, Noelle E; Kirsch, Ned L; Kisala, Pamela A; Tulsky, David S

    2015-01-01

    This study examined the clinical utility of the Wechsler Adult Intelligence Scales-Fourth Edition (WAIS-IV) in individuals with complicated mild, moderate or severe TBI. One hundred individuals with TBI (n = 35 complicated mild or moderate TBI; n = 65 severe TBI) and 100 control participants matched on key demographic variables from the WAIS-IV normative dataset completed the WAIS-IV. Univariate analyses indicated that participants with severe TBI had poorer performance than matched controls on all index scores and subtests (except Matrix Reasoning). Individuals with complicated mild/moderate TBI performed more poorly than controls on the Working Memory Index (WMI), Processing Speed Index (PSI), and Full Scale IQ (FSIQ), and on four subtests: the two processing speed subtests (SS, CD), two working memory subtests (AR, LN), and a perceptual reasoning subtest (BD). Participants with severe TBI had significantly lower scores than the complicated mild/moderate TBI on PSI, and on three subtests: the two processing speed subtests (SS and CD), and the new visual puzzles test. Effect sizes for index and subtest scores were generally small-to-moderate for the group with complicated mild/moderate and moderate-to-large for the group with severe TBI. PSI also showed good sensitivity and specificity for classifying individuals with severe TBI versus controls. Findings provide support for the clinical utility of the WAIS-IV in individuals with complicated mild, moderate, and severe TBI.

  4. WAIS-IV administration errors: effects of altered response requirements on Symbol Search and violation of standard surface-variety patterns on Block Design.

    Science.gov (United States)

    Ryan, Joseph J; Swopes-Willhite, Nicole; Franklin, Cassi; Kreiner, David S

    2015-01-01

    This study utilized a sample of 50 college students to assess the possibility that responding to the Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV) Symbol Search subtest items with an "x" instead of a "single slash mark" would affect performance. A second sample of 50 college students was used to assess the impact on WAIS-IV Block Design performance of presenting all the items with only red surfaces facing up. The modified Symbol Search and Block Design administrations yielded mean scaled scores and raw scores that did not differ significantly from mean scores obtained with standard administrations. Findings should not be generalized beyond healthy, well-educated young adults.

  5. Protocol and Topology Issues for Wide-Area Satellite Interconnection of Terrestrial Optical LANs

    Science.gov (United States)

    Parraga, N.

    2002-01-01

    Apart from broadcasting, the satellite business is targeting niche markets. Wide area interconnection is considered as one of these niche markets, since it addresses operators and business LANs (B2B, business to business) in remote areas where terrestrial infrastructure is not available. These LANs - if high-speed - are typically based on optical networks such as SONET. One of the advantages of SONET is its architecture flexibility and capacity to transport all kind of applications including multimedia with a range of different transmission rates. The applications can be carried by different protocols among which the Internet Protocol (IP) or the Asynchronous Transfer Mode (ATM) are the most prominent ones. Thus, the question arises how these protocols can be interconnected via the satellite segment. The paper addresses several solutions for interworking with different protocols. For this investigation we distinguish first of all between the topology and the switching technology of the satellites. In case of a star network with transparent satellite, the satellite protocol consists of physical layer and data layer which can be directly interconnected with layer 2 interworking function to their terrestrial counterparts in the SONET backbone. For regenerative satellites the situation is more complex: here we need to distinguish the types of transport protocols being used in the terrestrial and satellite segment. Whereas IP, ATM, MPEG dominate in the terrestrial networks, satellite systems usually do not follow these standards. Some might employ minor additions (for instance, satellite specific packet headers), some might be completely proprietary. In general, interworking must be done for the data plane on top of layer 2 (data link layer), whereas for the signaling plane the interworking is on top of layer 3. In the paper we will discuss the protocol stacks for ATM, IP, and MPEG with a regenerative satellite system. As an example we will use the EuroSkyWay satellite

  6. Transcranial direct current stimulation (tDCS) of frontal cortex decreases performance on the WAIS-IV intelligence test.

    Science.gov (United States)

    Sellers, Kristin K; Mellin, Juliann M; Lustenberger, Caroline M; Boyle, Michael R; Lee, Won Hee; Peterchev, Angel V; Fröhlich, Flavio

    2015-09-01

    Transcranial direct current stimulation (tDCS) modulates excitability of motor cortex. However, there is conflicting evidence about the efficacy of this non-invasive brain stimulation modality to modulate performance on cognitive tasks. Previous work has tested the effect of tDCS on specific facets of cognition and executive processing. However, no randomized, double-blind, sham-controlled study has looked at the effects of tDCS on a comprehensive battery of cognitive processes. The objective of this study was to test if tDCS had an effect on performance on a comprehensive assay of cognitive processes, a standardized intelligence quotient (IQ) test. The study consisted of two substudies and followed a double-blind, between-subjects, sham-controlled design. In total, 41 healthy adult participants were included in the final analysis. These participants completed the Wechsler Adult Intelligence Scale, Fourth Edition (WAIS-IV) as a baseline measure. At least one week later, participants in substudy 1 received either bilateral tDCS (anodes over both F4 and F3, cathode over Cz, 2 mA at each anode for 20 min) or active sham tDCS (2 mA for 40 s), and participants in substudy 2 received either right or left tDCS (anode over either F4 or F3, cathode over Cz, 2 mA for 20 min). In both studies, the WAIS-IV was immediately administered following stimulation to assess for performance differences induced by bilateral and unilateral tDCS. Compared to sham stimulation, right, left, and bilateral tDCS reduced improvement between sessions on Full Scale IQ and the Perceptual Reasoning Index. This demonstration that frontal tDCS selectively degraded improvement on specific metrics of the WAIS-IV raises important questions about the often proposed role of tDCS in cognitive enhancement. Copyright © 2015 Elsevier B.V. All rights reserved.

  7. Malingering in Toxic Exposure. Classification Accuracy of Reliable Digit Span and WAIS-III Digit Span Scaled Scores

    Science.gov (United States)

    Greve, Kevin W.; Springer, Steven; Bianchini, Kevin J.; Black, F. William; Heinly, Matthew T.; Love, Jeffrey M.; Swift, Douglas A.; Ciota, Megan A.

    2007-01-01

    This study examined the sensitivity and false-positive error rate of reliable digit span (RDS) and the WAIS-III Digit Span (DS) scaled score in persons alleging toxic exposure and determined whether error rates differed from published rates in traumatic brain injury (TBI) and chronic pain (CP). Data were obtained from the files of 123 persons…

  8. Genetic correlations between brain volumes and the WAIS-III dimensions of verbal comprehension, working memory, perceptual organization, and processing speed

    DEFF Research Database (Denmark)

    Posthuma, Daniëlle; Baare, Wim F.C.; Hulshoff Pol, Hilleke E.

    2003-01-01

    We recently showed that the correlation of gray and white matter volume with full scale IQ and the Working Memory dimension are completely mediated by common genetic factors (Posthuma et al., 2002). Here we examine whether the other WAIS III dimensions (Verbal Comprehension, Perceptual Organization......, Processing Speed) are also related to gray and white matter volume, and whether any of the dimensions are related to cerebellar volume. Two overlapping samples provided 135 subjects from 60 extended twin families for whom both MRI scans and WAIS III data were available. All three brain volumes are related...... to Working Memory capacity (r = 0.27). This phenotypic correlation is completely due to a common underlying genetic factor. Processing Speed was genetically related to white matter volume (r(g) = 0.39). Perceptual Organization was both genetically (r(g) = 0.39) and environmentally (r(e) = -0.71) related...

  9. Graduate Student WAIS-III Scoring Accuracy Is a Function of Full Scale IQ and Complexity of Examiner Tasks

    Science.gov (United States)

    Hopwood, Christopher J.; Richard, David C. S.

    2005-01-01

    Research on the Wechsler Adult Intelligence Scale-Revised and Wechsler Adult Intelligence Scale-Third Edition (WAIS-III) suggests that practicing clinical psychologists and graduate students make item-level scoring errors that affect IQ, index, and subtest scores. Studies have been limited in that Full-Scale IQ (FSIQ) and examiner administration,…

  10. Psychometric qualities of a tetrad WAIS-III short form for use in individuals with mild to borderline intellectual disability

    NARCIS (Netherlands)

    Duijvenbode, N. van; Didden, H.C.M.; Hazel, T. van den; Engels, R.C.M.E.

    2016-01-01

    Objective: To investigate the reliability and validity of a Wechsler Abbreviated Scale of Intelligence-based Wechsler Adult Intelligence Scale - third edition (WAIS-III) short form (SF) in a sample of individuals with mild to borderline intellectual disability (MBID) (N=117; M-IQ=71.34; SDIQ=8.00,

  11. El universo plástico y sensorial de La mano (Wong Kar Wai, 2004

    Directory of Open Access Journals (Sweden)

    Melendo, Ana

    2012-04-01

    Full Text Available En español: Con el presente artículo, queremos mostrar cómo Wong Kar Wai, heredero de un cine muy vinculado a la modernidad cinematográfica, plantea en el cortometraje La mano (2004 temas como la soledad, la actitud melancólica o la necesidad de ensimismamiento. Estos, junto al estudio de la geometría, los colores saturados y las calidades pictóricas, y bajo el prisma de un realismo metafísico, dan lugar a situaciones ópticas, sonoras y táctiles puras. Es así como en el film del cineasta chino se ponen de manifiesto, a través de la presencia del fragmento corporal y la metonimia, las texturas, coloreadas y sonoras, que configuran los espacios sensoriomotrices del submundo en el que acontece la historia. In english: In this article, we show how Wong Kar Wai, heir to a filmography closely linked to cinematographic modernity, explores themes such as loneliness, melancholy, or self-absorption in his short film The Hand (2004. These themes, together with his study of geometry, saturated colours and pictorial qualities through the prism of metaphysical realism, give rise to purely optical, sonorous and tactile situations. In this way, the Chinese film director reveals, through the presence of a body fragment and metonymy, the colourful and sonorous textures that form the sensory-motor spaces of the underworld in which the story is set.

  12. Genetic correlations between brain volumes and the WAIS-III dimensions of verbal comprehension, working memory, perceptual organization, and processing speed

    NARCIS (Netherlands)

    Posthuma, D.; Baare, W.F.C.; Hulshoff Pol, H.E.; Kahn, R.S.; Boomsma, D.I.; de Geus, E.J.C.

    2003-01-01

    We recently showed that the correlation of gray and white matter volume with full scale IQ and the Working Memory dimension are completely mediated by common genetic factors (Posthuma et al., 2002). Here we examine whether the other WAIS III dimensions (Verbal Comprehension, Perceptual Organization,

  13. Late-Holocene climate evolution at the WAIS Divide site, West Antarctica: Bubble number-density estimates

    Science.gov (United States)

    Fegyveresi, John M.; Alley, R.B.; Spencer, M.K.; Fitzpatrick, J.J.; Steig, E.J.; White, J.W.C.; McConnell, J.R.; Taylor, K.C.

    2011-01-01

    A surface cooling of ???1.7??C occurred over the ???two millennia prior to ???1700 CE at the West Antarctic ice sheet (WAIS) Divide site, based on trends in observed bubble number-density of samples from the WDC06A ice core, and on an independently constructed accumulation-rate history using annual-layer dating corrected for density variations and thinning from ice flow. Density increase and grain growth in polar firn are both controlled by temperature and accumulation rate, and the integrated effects are recorded in the number-density of bubbles as the firn changes to ice. Numberdensity is conserved in bubbly ice following pore close-off, allowing reconstruction of either paleotemperature or paleo-accumulation rate if the other is known. A quantitative late-Holocene paleoclimate reconstruction is presented for West Antarctica using data obtained from the WAIS Divide WDC06A ice core and a steady-state bubble number-density model. The resultant temperature history agrees closely with independent reconstructions based on stable-isotopic ratios of ice. The ???1.7??C cooling trend observed is consistent with a decrease in Antarctic summer duration from changing orbital obliquity, although it remains possible that elevation change at the site contributed part of the signal. Accumulation rate and temperature dropped together, broadly consistent with control by saturation vapor pressure.

  14. El universo plástico y sensorial de la mano (Wong Kar Wai, 2004

    Directory of Open Access Journals (Sweden)

    Ana MELENDO CRUZ

    2014-10-01

    Full Text Available In this article, we show how Wong Kar Wai, heir to a filmography closely linked to cinematographic modernity, explores themes such as loneliness, melancholy, or self-absorption in his short film The Hand (2004. These themes, together with his study of geometry, saturated colours and pictorial qualities through the prism of metaphysical realism, give rise to purely optical, sonorous and tactile situations. In this way, the Chinese film director reveals, through the presence of a body fragment and metonymy, the colourful and sonorous textures that form the sensory-motor spaces of the underworld in which the story is set

  15. WISC-III e WAIS-III na avaliação da inteligência de cegos

    OpenAIRE

    Nascimento, Elizabeth do; Flores-Mendoza, Carmen Elvira

    2007-01-01

    Diante da escassez de pesquisas nacionais e de testes psicológicos destinados a avaliar pessoas cegas, desenvolveu-se um estudo psicométrico com as escalas verbais dos testes WISC-III e WAIS-III. Após as adaptações de alguns estímulos e das instruções, os testes foram aplicados em crianças (N = 120) e adultos (N = 52) residentes em Belo Horizonte. Os resultados indicaram que as escalas verbais modificadas apresentam uma boa consistência interna (alfa> 0,80). Além disso, a investigação da vali...

  16. Low-res d15N and d18O of O2 in the WAIS Divide 06A Deep Core, Version 1

    Data.gov (United States)

    National Aeronautics and Space Administration — This data set is a low-resolution set of measurements of d15N of N2 and d18O of O2, along with dO2/N and dAr/N2 supporting data, in the WAIS Divide 3405 m long ice...

  17. Cognitive Profiles of Adults with Asperger's Disorder, High-Functioning Autism, and Pervasive Developmental Disorder Not Otherwise Specified Based on the WAIS-III

    Science.gov (United States)

    Kanai, Chieko; Tani, Masayuki; Hashimoto, Ryuichiro; Yamada, Takashi; Ota, Haruhisa; Watanabe, Hiromi; Iwanami, Akira; Kato, Nobumasa

    2012-01-01

    Little is known about the cognitive profiles of high-functioning Pervasive Developmental Disorders (PDD) in adults based on the Wechsler Intelligence Scale III (WAIS-III). We examined cognitive profiles of adults with no intellectual disability (IQ greater than 70), and in adults with Asperger's disorder (AS; n = 47), high-functioning autism (HFA;…

  18. Discrepancies between bilinguals' performance on the Spanish and English versions of the WAIS Digit Span task: Cross-cultural implications.

    Science.gov (United States)

    López, Enrique; Steiner, Alexander J; Hardy, David J; IsHak, Waguih W; Anderson, W Brantley

    2016-01-01

    This study explored within-subjects differences in the performance of 40 bilingual participants on the English and Spanish versions of the Wechsler Adult Intelligence Scale (WAIS) Digit Span task. To test the linguistic hypothesis that individuals would perform worse in Spanish because of its syllabic demand, we compared the number of syllables correctly recalled by each participant for every correct trial. Our analysis of the correct number of syllables remembered per trial showed that participants performed significantly better (i.e., recalling more syllables) in Spanish than in English on the total score. Findings suggest the Spanish version of the Digit Span (total score) was significantly more difficult than the English version utilizing traditional scoring methods. Moreover, the Forward Trial, rather than the Backward Trial, was more likely to show group differences between both language versions. Additionally, the Spanish trials of the Digit Span were correlated with language comprehension and verbal episodic memory measures, whereas the English trials of the Digit Span were correlated with confrontational naming and verbal fluency tasks. The results suggest that more research is necessary to further investigate other cognitive factors, rather than just syllabic demand, that might contribute to performance and outcome differences on the WAIS Digit Span in Spanish-English bilinguals.

  19. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  20. WAIS-IV and WISC-IV Structural Validity: Alternate Methods, Alternate Results. Commentary on Weiss et al. (2013a) and Weiss et al. (2013b)

    Science.gov (United States)

    Canivez, Gary L.; Kush, Joseph C.

    2013-01-01

    Weiss, Keith, Zhu, and Chen (2013a) and Weiss, Keith, Zhu, and Chen (2013b), this issue, report examinations of the factor structure of the Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV) and Wechsler Intelligence Scale for Children-Fourth Edition (WISC-IV), respectively; comparing Wechsler Hierarchical Model (W-HM) and…

  1. Genetic correlations between brain volumes and the WAIS-III dimensions of verbal comprehension, working memory, perceptual organization, and processing speed.

    Science.gov (United States)

    Posthuma, Daniëlle; Baaré, Wim F C; Hulshoff Pol, Hilleke E; Kahn, René S; Boomsma, Dorret I; De Geus, Eco J C

    2003-04-01

    We recently showed that the correlation of gray and white matter volume with full scale IQ and the Working Memory dimension are completely mediated by common genetic factors (Posthuma et al., 2002). Here we examine whether the other WAIS III dimensions (Verbal Comprehension, Perceptual Organization, Processing Speed) are also related to gray and white matter volume, and whether any of the dimensions are related to cerebellar volume. Two overlapping samples provided 135 subjects from 60 extended twin families for whom both MRI scans and WAIS III data were available. All three brain volumes are related to Working Memory capacity (r = 0.27). This phenotypic correlation is completely due to a common underlying genetic factor. Processing Speed was genetically related to white matter volume (r(g) = 0.39). Perceptual Organization was both genetically (r(g) = 0.39) and environmentally (r(e) = -0.71) related to cerebellar volume. Verbal Comprehension was not related to any of the three brain volumes. It is concluded that brain volumes are genetically related to intelligence which suggests that genes that influence brain volume may also be important for intelligence. It is also noted however, that the direction of causation (i.e., do genes influence brain volume which in turn influences intelligence, or alternatively, do genes influence intelligence which in turn influences brain volume), or the presence or absence of pleiotropy has not been resolved yet.

  2. Adjuvant whole abdominal intensity modulated radiotherapy (IMRT) for high risk stage FIGO III patients with ovarian cancer (OVAR-IMRT-01) – Pilot trial of a phase I/II study: study protocol

    International Nuclear Information System (INIS)

    Rochet, Nathalie; Jensen, Alexandra D; Sterzing, Florian; Munter, Marc W; Eichbaum, Michael H; Schneeweiss, Andreas; Sohn, Christof; Debus, Juergen; Harms, Wolfgang

    2007-01-01

    The prognosis for patients with advanced epithelial ovarian cancer remains poor despite aggressive surgical resection and platinum-based chemotherapy. More than 60% of patients will develop recurrent disease, principally intraperitoneal, and die within 5 years. The use of whole abdominal irradiation (WAI) as consolidation therapy would appear to be a logical strategy given its ability to sterilize small tumour volumes. Despite the clinically proven efficacy of whole abdominal irradiation, the use of radiotherapy in ovarian cancer has profoundly decreased mainly due to high treatment-related toxicity. Modern intensity-modulated radiation therapy (IMRT) could allow to spare kidneys, liver, and bone marrow while still adequately covering the peritoneal cavity with a homogenous dose. The OVAR-IMRT-01 study is a single center pilot trial of a phase I/II study. Patients with advanced ovarian cancer stage FIGO III (R1 or R2< 1 cm) after surgical resection and platinum-based chemotherapy will be treated with whole abdomen irradiation as consolidation therapy using intensity modulated radiation therapy (IMRT) to a total dose of 30 Gy in 1.5 Gy fractions. A total of 8 patients will be included in this trial. For treatment planning bone marrow, kidneys, liver, spinal cord, vertebral bodies and pelvic bones are defined as organs at risk. The planning target volume includes the entire peritoneal cavity plus pelvic and para-aortic node regions. The primary endpoint of the study is the evaluation of the feasibility of intensity-modulated WAI and the evaluation of the study protocol. Secondary endpoint is evaluation of the toxicity of intensity modulated WAI before continuing with the phase I/II study. The aim is to explore the potential of IMRT as a new method for WAI to decrease the dose to kidneys, liver, bone marrow while covering the peritoneal cavity with a homogenous dose, and to implement whole abdominal intensity-modulated radiotherapy into the adjuvant multimodal

  3. Validade e confiabilidade do índice de capacidade para o trabalho (ICT em trabalhadores de enfermagem Validity and reliability of the work ability index (WAI in nurses' work

    Directory of Open Access Journals (Sweden)

    Sérgio Henrique Almeida da Silva Junior

    2011-06-01

    Full Text Available Este artigo estima a validade e a confiabilidade do índice de capacidade para o trabalho (ICT em 1.436 trabalhadores de enfermagem de três hospitais públicos do Rio de Janeiro, Brasil. Foi estimada a validade dimensional, por meio de análise fatorial exploratória e também a validade correlacional, relacionando o ICT com construtos teoricamente relevantes. A confiabilidade foi avaliada pela análise de consistência interna utilizando o coeficiente alfa de Cronbach e ômega de McDonald. A análise fatorial indicou uma estrutura bidimensional, explicando 52,8% da variância acumulada para os componentes principais e 42% para os eixos principais. As hipóteses teóricas da validade de construto foram confirmadas com correlação direta e significativa do ICT com os escores de recompensa, controle e autoavaliação do estado de saúde; correlação inversa e significativa com a escala de necessidade de recuperação após o trabalho, distúrbios psíquicos menores, esforço, excesso de comprometimento e demanda. Concluiu-se que o ICT apresentou propriedades psicométricas adequadas.This article assesses the validity and reliability of the work ability index (WAI for 1,436 nurses in three public hospitals in Rio de Janeiro, Brazil. The study estimated the dimensional validity by means of exploratory factor analysis, as well as correlational validity, relating WAI to theoretically relevant constructs. Reliability was evaluated by internal consistency analysis, using Cronbach's alpha and McDonald's omega. Factor analysis indicated a two-dimensional structure explaining 52.8% of the accumulated variance for the principal components and 42% for the principal axes. The theoretical hypotheses for the construct's validity were confirmed, with direct and significant correlation between the WAI and the reward, control, and self-rated health scores; an inverse and significant correlation with the scale on need for recovery after work, minor psychological

  4. The National Adult Reading Test: restandardisation against the Wechsler Adult Intelligence Scale-Fourth edition.

    Science.gov (United States)

    Bright, Peter; Hale, Emily; Gooch, Vikki Jayne; Myhill, Thomas; van der Linde, Ian

    2018-09-01

    Since publication in 1982, the 50-item National Adult Reading Test (NART; Nelson, 1982; NART-R; Nelson & Willison, 1991) has remained a widely adopted method for estimating premorbid intelligence both for clinical and research purposes. However, the NART has not been standardised against the most recent revisions of the Wechsler Adult Intelligence Scale (WAIS-III; Wechsler, 1997, and WAIS-IV; Wechsler, 2008). Our objective, therefore, was to produce reliable standardised estimates of WAIS-IV IQ from the NART. Ninety-two neurologically healthy British adults were assessed and regression equations calculated to produce population estimates of WAIS-IV full-scale IQ (FSIQ) and constituent index scores. Results showed strong NART/WAIS-IV FSIQ correlations with more moderate correlations observed between NART error and constituent index scores. FSIQ estimates were closely similar to the published WAIS and WAIS-R estimates at the high end of the distribution, but at the lower end were approximately equidistant from the highly discrepant WAIS (low) and WAIS-R (high) values. We conclude that the NART is likely to remain an important tool for estimating the impact of neurological damage on general cognitive ability. We advise caution in the use of older published WAIS and/or WAIS-R estimates for estimating premorbid WAIS-IV FSIQ, particularly for those with low NART scores.

  5. Coefficients of Correlation of IQ's on the WAIS-R with Standard Age Scores on the Stanford-Binet, 4th Edition for Previously Identified Mentally Handicapped Adolescents.

    Science.gov (United States)

    Richardson, John C.

    This paper presents a study regarding the correlation of the Stanford-Binet: 4th Edition Intelligence Quotient (IQ) scores with the Wechsler Adult Intelligence Scale-Revised (WAIS-R) IQ scores for the purpose of improving the identification process for educable mentally handicapped (EMH) school age adolescents and young adults. The sample included…

  6. Overview of the InterGroup protocols

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah A. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Melliar-Smith, P. Michael [Univ. of California, Santa Barbara, CA (United States); Moser, Louise E. [Univ. of California, Santa Barbara, CA (United States)

    2001-03-01

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

  7. Unit 148 - World Wide Web Basics

    OpenAIRE

    148, CC in GIScience; Yeung, Albert K.

    2000-01-01

    This unit explains the characteristics and the working principles of the World Wide Web as the most important protocol of the Internet. Topics covered in this unit include characteristics of the World Wide Web; using the World Wide Web for the dissemination of information on the Internet; and using the World Wide Web for the retrieval of information from the Internet.

  8. Genetic correlations between brain volumes and the WAIS-III dimensions of verbal comprehension, working memory, perceptual organization, and processing speed

    DEFF Research Database (Denmark)

    Posthuma, Daniëlle; Baare, Wim F.C.; Hulshoff Pol, Hilleke E.

    2003-01-01

    We recently showed that the correlation of gray and white matter volume with full scale IQ and the Working Memory dimension are completely mediated by common genetic factors (Posthuma et al., 2002). Here we examine whether the other WAIS III dimensions (Verbal Comprehension, Perceptual Organization...... to Working Memory capacity (r = 0.27). This phenotypic correlation is completely due to a common underlying genetic factor. Processing Speed was genetically related to white matter volume (r(g) = 0.39). Perceptual Organization was both genetically (r(g) = 0.39) and environmentally (r(e) = -0.71) related...

  9. Two 24-hour Studies of Water Quality in the Ala Wai Canal during March and July, 1994 for the Mamala Bay Study, Pollutant Source Identification Project MB-3, (NODC Accession 0001188)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This dataset focuses on studies of water quality in the Ala Wai Canal in order to determine its role of point and non point source disharge into Mamala Bay. The...

  10. Age-related commonalities and differences in the relationship between executive functions and intelligence: Analysis of the NAB executive functions module and WAIS-IV scores.

    Science.gov (United States)

    Buczylowska, Dorota; Petermann, Franz

    2017-01-01

    Data from five subtests of the Executive Functions Module of the German Neuropsychological Assessment Battery (NAB) and all ten core subtests of the German Wechsler Adult Intelligence Scale - Fourth Edition (WAIS-IV) were used to examine the relationship between executive functions and intelligence in a comparison of two age groups: individuals aged 18-59 years and individuals aged 60-88 years. The NAB subtests Categories and Word Generation demonstrated a consistent correlation pattern for both age groups. However, the NAB Judgment subtest correlated more strongly with three WAIS-IV indices, the Full Scale IQ (FSIQ), and the General Ability Index (GAI) in the older adult group than in the younger group. Additionally, in the 60-88 age group, the Executive Functions Index (EFI) was more strongly correlated with the Verbal Comprehension Index (VCI) than with the Perceptual Reasoning Index (PRI). Both age groups demonstrated a strong association of the EFI with the FSIQ and the Working Memory Index (WMI). The results imply the potential diagnostic utility of the Judgment subtest and a significant relationship between executive functioning and crystallized intelligence at older ages. Furthermore, it may be concluded that there is a considerable age-independent overlap between the EFI and general intelligence, as well as between the EFI and working memory.

  11. Estudo longitudinal das habilidades intelectuais de idosos avaliados com a WAIS-III Longitudinal study of intellectual abilities of elderly people assessed by WAIS-III

    Directory of Open Access Journals (Sweden)

    Ana Carolina Zeferino Menezes

    2011-01-01

    Full Text Available Dados indicam que o envelhecimento, ainda que saudável, acarreta um declínio normal no desempenho intelectual. O presente estudo teve por objetivo investigar o desenvolvimento intelectual de idosos em diferentes domínios avaliados pela WAIS-III. A partir de um delineamento longitudinal, 47 participantes foram divididos em duas faixas etárias: idosos-jovens (até 74 anos e idosos-idosos (acima de 75 anos e seus desempenhos foram comparados após oito anos de intervalo. Resultados mostraram que idosos-jovens apresentaram ganhos nas habilidades avaliadas, embora em apenas dois índices estes tenham sido estatisticamente significativos. Com relação às capacidades de compreensão verbal e linguagem, os ganhos eram esperados. Já Memória, Organização Perceptual, Velocidade de Processamento, QI de Execução e Total não se comportaram como grande parte dos estudos reporta. Resultados para os idosos-idosos estão de acordo com a literatura: habilidades vulneráveis (organização perceptual, aprendizagem, memória, resolução de problemas e velocidade de processamento tiveram decréscimos após os oito anos entre as avaliações. Embora nem todos os resultados tenham sido significativos, corroboram dados de pesquisas que definem a idade de declínios significativos após os 75 anos. Concluindo, os resultados indicaram que os idosos não apresentaram declínio nas habilidades intelectuais avaliadas até a idade de 74 anos, a partir de quando alguma perda foi encontrada. A velocidade de processamento foi a única habilidade que apresentou declínio significativo. Portanto, as variações nos desempenhos não caracterizam um padrão de declínio generalizado, ou seja, não ocorrem em todas as habilidades e variam conforme a idade.Data have indicated that aging, even if in a healthy process, lead to a normal decrease in cognitive performance. The current study aims at investigating the intellectual development of elderly people in different

  12. Predictors of WAIS-R vocabulary in late life: Differences by race.

    Science.gov (United States)

    Morin, Ruth T; Midlarsky, Elizabeth

    2017-11-01

    Vocabulary scores tend to be significantly related to education in heterogeneous groups of older adults, even after controlling for confounding variables. However, there may be other factors that impinge on cognitive functioning for certain demographic groups, particularly those whose educational opportunities were limited, and who may have experienced considerable stress as a result of their minority status. This study sought to explore possible predictors of vocabulary scores among African American and White older adults. In this study, samples of African American (N = 165) and White (N = 146) community-dwelling older adults reported their level of education, perceived health status, and number of stressful life events, and were administered the Wechsler Adult Intelligence Scale-Revised (WAIS-R) Vocabulary subtest. Among the White participants, level of education was the only significant predictor of vocabulary score after controlling for perceived health and exposure to stress. Among African American participants, education was also a significant predictor of vocabulary score. However perceived health and number of stressful life events were also significantly predictors of vocabulary score. Findings indicate that for certain cohorts of older adults, especially those who may have experienced stressful life circumstances and health disparities as a result of racial inequality, education may not be the only variable that predicts verbal intelligence. The importance of investigating cognitive functioning within a broader sociocultural context is discussed.

  13. Visuospatial characteristics of an elderly Chinese population: results from the WAIS-R block design test.

    Science.gov (United States)

    Yin, Shufei; Zhu, Xinyi; Huang, Xin; Li, Juan

    2015-01-01

    Visuospatial deficits have long been recognized as a potential predictor of dementia, with visuospatial ability decline having been found to accelerate in later stages of dementia. We, therefore, believe that the visuospatial performance of patients with mild cognitive impairment (MCI) and dementia (Dem) might change with varying visuospatial task difficulties. This study administered the Wechsler Adult Intelligence Scale-Revised (WAIS-R) Block Design Test (BDT) to determine whether visuospatial ability can help discriminate between MCI patients from Dem patients and normal controls (NC). Results showed that the BDT could contribute to the discrimination between MCI and Dem. Specifically, simple BDT task scores could best distinguish MCI from Dem patients, while difficult BDT task scores could contribute to discriminating between MCI and NC. Given the potential clinical value of the BDT in the diagnosis of Dem and MCI, normative data stratified by age and education for the Chinese elderly population are presented for use in research and clinical settings.

  14. Physical Therapy Protocols for Arthroscopic Bankart Repair.

    Science.gov (United States)

    DeFroda, Steven F; Mehta, Nabil; Owens, Brett D

    Outcomes after arthroscopic Bankart repair can be highly dependent on compliance and participation in physical therapy. Additionally, there are many variations in physician-recommended physical therapy protocols. The rehabilitation protocols of academic orthopaedic surgery departments vary widely despite the presence of consensus protocols. Descriptive epidemiology study. Level 3. Web-based arthroscopic Bankart rehabilitation protocols available online from Accreditation Council for Graduate Medical Education (ACGME)-accredited orthopaedic surgery programs were included for review. Individual protocols were reviewed to evaluate for the presence or absence of recommended therapies, goals for completion of ranges of motion, functional milestones, exercise start times, and recommended time to return to sport. Thirty protocols from 27 (16.4%) total institutions were identified out of 164 eligible for review. Overall, 9 (30%) protocols recommended an initial period of strict immobilization. Variability existed between the recommended time periods for sling immobilization (mean, 4.8 ± 1.8 weeks). The types of exercises and their start dates were also inconsistent. Goals to full passive range of motion (mean, 9.2 ± 2.8 weeks) and full active range of motion (mean, 12.2 ± 2.8 weeks) were consistent with other published protocols; however, wide ranges existed within the reviewed protocols as a whole. Only 10 protocols (33.3%) included a timeline for return to sport, and only 3 (10%) gave an estimate for return to game competition. Variation also existed when compared with the American Society of Shoulder and Elbow Therapists' (ASSET) consensus protocol. Rehabilitation protocols after arthroscopic Bankart repair were found to be highly variable. They also varied with regard to published consensus protocols. This discrepancy may lead to confusion among therapists and patients. This study highlights the importance of attending surgeons being very clear and specific with

  15. World-Wide Web: The Information Universe.

    Science.gov (United States)

    Berners-Lee, Tim; And Others

    1992-01-01

    Describes the World-Wide Web (W3) project, which is designed to create a global information universe using techniques of hypertext, information retrieval, and wide area networking. Discussion covers the W3 data model, W3 architecture, the document naming scheme, protocols, document formats, comparison with other systems, experience with the W3…

  16. PERFORMANCE EVALUATION OF INTEGRATED MACRO AND MICRO MOBILITY PROTOCOLS FOR WIDE AREA WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    R.Gunasundari

    2010-03-01

    Full Text Available The success of next generation wireless networks will rely much on advanced mechanisms for seamless mobility support among emerging heterogeneous technologies. Currently, Mobile IP is the most promising solution for mobility management in the Internet. Several IP micro mobility approaches have been proposed to enhance the performance of Mobile IP which supports quality of service, minimum packet loss, limited handoff delay and scalability and power conservation but they are not scalable for macro mobility. A practical solution would therefore require integration of Mobile IP and Micro mobility protocols where Mobile IP handles macro mobility and micro mobility protocols handles micro mobility. In this paper an integrated mobility management protocol for IP based wireless networks is proposed and analyzed. Simulation results presented in this paper are based on ns 2.

  17. Effectiveness and Limitations of E-Mail Security Protocols

    OpenAIRE

    M. Tariq Banday

    2011-01-01

    Simple Mail Transport Protocol is the most widely adopted protocol for e-mail delivery. However, it lackssecurity features for privacy, authentication of sending party, integrity of e-mail message, nonrepudiationand consistency of e-mail envelope. To make e-mail communication secure and private,e-mail servers incorporate one or more security features using add-on security protocols. The add-onsecurity protocols provide a reasonable security but have several limitations. This paper discussesli...

  18. Validity of the Working Alliance Inventory within Child Protection Services

    Science.gov (United States)

    Killian, Michael; Forrester, Donald; Westlake, David; Antonopoulou, Paraskevi

    2017-01-01

    The Working Alliance Inventory remains a widely studied measure of quality of therapeutic relationships between the practitioner and client. No prior study has examined the psychometrics and validity of the Working Alliance Inventory-Short (WAI-S) in a sample of families, social workers, and trained observers within child protection services.…

  19. Sin-wai, Chan. The Future of Translation Technology: Towards a World without Babel. London and New York: Routledge, 2017. 302 p.

    Directory of Open Access Journals (Sweden)

    Thomas Kelahan

    2018-01-01

    Full Text Available Chan Sin-wai is a professor and chairman of the Department of Translation at the Chinese University of Hong Kong, Shenzhen. Additionally, he is the director of the Center for Translation Technology as well as the university’s MA Program in Computer-aided translation.  In 2016, he published A New Comprehensive Chinese-English Dictionary, Routledge Encyclopedia of Translation Technology and Routledge Encyclopedia of the Chinese Language. His newest book, The Future of Translation Technology: Towards a World without Babel, is described as “an essential read for scholars and researchers of translation studies and computational linguistics, and a guide to system users and professionals.”

  20. Constraints on ice volume changes of the WAIS and Ross Ice Shelf since the LGM based on cosmogenic exposure ages in the Darwin-Hatherton glacial system of the Transantarctic Mountains

    Science.gov (United States)

    Fink, David; Storey, Bryan; Hood, David; Joy, Kurt; Shulmeister, James

    2010-05-01

    Quantitative assessment of the spatial and temporal scale of ice volume change of the West Antarctic ice sheet (WAIS) and Ross Ice Shelf since the last glacial maximum (LGM) ~20 ka is essential to accurately predict ice sheet response to current and future climate change. Although global sea level rose by approximately 120 metres since the LGM, the contribution of polar ice sheets is uncertain and the timing of any such contribution is controversial. Mackintosh et al (2007) suggest that sectors of the EAIS, similar to those studied at Framnes Mountains where the ice sheet slowly calves at coastal margins, have made marginal contributions to global sea-level rise between 13 and 7 ka. In contrast, Stone et al (2003) document continuing WAIS decay during the mid-late Holocene, raising the question of what was the response of the WAIS since LGM and into the Holocene. Terrestrial evidence is restricted to sparse coastal oasis and ice free mountains which archive limits of former ice advances. Mountain ranges flanking the Darwin-Hatherton glaciers exhibit well-defined moraines, weathering signatures, boulder rich plateaus and glacial tills, which preserve the evidence of advance and retreat of the ice sheet during previous glacial cycles. Previous studies suggest a WAIS at the LGM in this location to be at least 1,000 meters thicker than today. As part of the New Zealand Latitudinal Gradient Project along the Transantarctic, we collected samples for cosmogenic exposure dating at a) Lake Wellman area bordering the Hatherton Glacier, (b) Roadend Nunatak at the confluence of the Darwin and Hatherton glaciers and (c) Diamond Hill which is positioned at the intersection of the Ross Ice Shelf and Darwin Glacier outlet. While the technique of exposure dating is very successful in mid-latitude alpine glacier systems, it is more challenging in polar ice-sheet regions due to the prevalence of cold-based ice over-riding events and absence of outwash processes which removes

  1. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  2. Therapeutic alliance in dietetic practice for weight loss: Insights from health coaching.

    Science.gov (United States)

    Nagy, Annaliese; McMahon, Anne; Tapsell, Linda; Deane, Frank; Arenson, Danielle

    2018-02-13

    The psychological construct of 'therapeutic alliance' can be used to better understand the effectiveness of consultations, particularly goal setting for weight management. We analysed audio-recorded health coaching sessions during a weight loss trial to explore relationships between therapeutic alliance and various contextual factors. Audio recordings of 50 health coaching sessions were analysed. After assessing fidelity to the protocol, therapeutic alliance was measured using an adapted Working Alliance Inventory Observer-rated Short Version (WAI-O-S), and examined by (i) identifying relationships between contextual factors and WAI-O-S scores (Spearman's coefficients); (ii) testing the impact of preparatory exercises and body mass index on WAI-O-S scores (one-way analysis of variance and least-squared differences tests) and (iii) comparing differences in WAI-O-S scores based on relationship status, gender and follow-up session completion (independent samples t-tests). Fidelity was high (mean 88%). WAI-O-S total scores ranged from 55 to 70 (out of 84). Session duration was significantly correlated with WAI-O-S component of 'Bond' (r = 0.42, P = 0.002). Those who completed preparatory exercises had significantly higher total WAI-O-S scores, 'Goal' and 'Task' scores. Participants who completed the follow-up session scored significantly higher for 'Goal' compared to no follow-up. Spending more time in a session appears related to increased bonding, a key component of therapeutic alliance. Preparatory work may help build therapeutic alliance and agreement on goals appears to influence follow-up completion. These exploratory findings provide directions for research addressing the professional relationship in dietetic consultations for weight loss. © 2018 Dietitians Association of Australia.

  3. Temps, Espace et la Eeprésentation de la Subjectivité Dans les Films de Wong Kar-wai

    Directory of Open Access Journals (Sweden)

    MOREIRA MACEDO, Ludmila

    2006-12-01

    Full Text Available Given the importance of the filmmaker Wong Kar-wai not only in the panorama of the cinema of Hong Kong, but in the contemporary cinematographic production as a whole, this paper proposes an analysis of his work concentrated on the problem of the identity of his characters. What we may call the «wongian subject” can be analyzed through various elements such as the tension between past, present and future, the relationship to public and private space, the changes of the perception of time and memory. Another important question that is analyzed is the relationship of the films with the social and political context of contemporary Hong Kong, because the topics of love, loneliness and alienation which invade the protagonists find relation in the transnational character of the Asian cinema and the fusion – often problematic – between Orient and Occident.

  4. Quality control and conduct of genome-wide association meta-analyses

    DEFF Research Database (Denmark)

    Winkler, Thomas W; Day, Felix R; Croteau-Chonka, Damien C

    2014-01-01

    Rigorous organization and quality control (QC) are necessary to facilitate successful genome-wide association meta-analyses (GWAMAs) of statistics aggregated across multiple genome-wide association studies. This protocol provides guidelines for (i) organizational aspects of GWAMAs, and for (ii) QC...

  5. Two-party quantum key agreement protocols under collective noise channel

    Science.gov (United States)

    Gao, Hao; Chen, Xiao-Guang; Qian, Song-Rong

    2018-06-01

    Recently, quantum communication has become a very popular research field. The quantum key agreement (QKA) plays an important role in the field of quantum communication, based on its unconditional security in terms of theory. Among all kinds of QKA protocols, QKA protocols resisting collective noise are widely being studied. In this paper, we propose improved two-party QKA protocols resisting collective noise and present a feasible plan for information reconciliation. Our protocols' qubit efficiency has achieved 26.67%, which is the best among all the two-party QKA protocols against collective noise, thus showing that our protocol can improve the transmission efficiency of quantum key agreement.

  6. Declarative Specification of Fault Tolerant Auction Protocols: The English Auction Case Study

    DEFF Research Database (Denmark)

    Dragoni, Nicola; Gaspari, Mauro

    2012-01-01

    Auction mechanisms are nowadays widely used in electronic commerce Web sites for buying and selling items among different users. The increasing importance of auction protocols in the negotiation phase is not limited to online marketplaces. In fact, the wide applicability of auctions as resource‐a...... about the specification of an English Auction protocol which tolerate crashes of bidding agents and we discuss its properties....

  7. Re-Framing the World Wide Web

    Science.gov (United States)

    Black, August

    2011-01-01

    The research presented in this dissertation studies and describes how technical standards, protocols, and application programming interfaces (APIs) shape the aesthetic, functional, and affective nature of our most dominant mode of online communication, the World Wide Web (WWW). I examine the politically charged and contentious battle over browser…

  8. Using critiquing for improving medical protocols : Harder than it seems

    NARCIS (Netherlands)

    Marcos, Mar; Berger, Geert; van Harmelen, Frank; ten Teije, Annette; Roomans, Hugo; Miksch, Silvia

    2001-01-01

    Medical protocols are widely recognised to provide clinicians with high-quality and up-to-date recommendations. A critical condition for this is of course that the protocols themselves are of high quality. In this paper we investigate the use of critiquing for improving the quality of medical

  9. WANNABES (PERSONAS QUE DESEAN SER AMPUTADAS. EVALUACIÓN NEUROPSICOLÓGICA CON EL WAIS III

    Directory of Open Access Journals (Sweden)

    Carolina Mora

    2017-01-01

    Full Text Available La presente investigación tiene tres objetivos: en primer lugar,dar a conocer el fenómeno Wannabe, queen los contextos académicos es conocido como Apotemnofilia, Xenomelia y/o Desorden de la Identidad de la Integridad Corporal(BIID por sus siglas en inglés,que se caracteriza por el deseo manifiesto de un sujeto cuyas extremidades están sanas por convertirse en una persona amputada. Ensegundo lugar, presentar el caso de un Wannabeque deseaamputarse la pierna izquierda, 4 dedos por debajo de la rodilla, se trata de un joven de 31 años, con formación universitaria y sin psicopatología identificable a partir del perfil de personalidad arrojado por el Test de Personalidad MMPI-2. En tercer lugar, presentar los resultados de un informe neuropsicológico elaborado con base en el WAIS III, a fin de detectar la posible disfuncióndel lóbuloparietal derecho, que frecuentemente se ha sugerido como la causa del fenómeno.Los resultados obtenidos indican que aunque el puntaje obtenido en la sub prueba llamada “Ensamblaje de Objetos” puede estar relacionadocon la disfunción en este lóbulo, no se cuenta con la evidencia clínica y conductual suficiente para aseverar que ella exista.

  10. Oceanic response to changes in the WAIS and astronomical forcing during the MIS31 superinterglacial

    Directory of Open Access Journals (Sweden)

    F. Justino

    2017-09-01

    Full Text Available Marine Isotope Stage 31 (MIS31, between 1085 and 1055 ka was characterized by higher extratropical air temperatures and a substantial recession of polar glaciers compared to today. Paleoreconstructions and model simulations have increased the understanding of the MIS31 interval, but questions remain regarding the role of the Atlantic and Pacific oceans in modifying the climate associated with the variations in Earth's orbital parameters. Multi-century coupled climate simulations, with the astronomical configuration of the MIS31 and modified West Antarctic Ice Sheet (WAIS topography, show an increase in the thermohaline flux and northward oceanic heat transport (OHT in the Pacific Ocean. These oceanic changes are driven by anomalous atmospheric circulation and increased surface salinity in concert with a stronger meridional overturning circulation (MOC. The intensified northward OHT is responsible for up to 85 % of the global OHT anomalies and contributes to the overall reduction in sea ice in the Northern Hemisphere (NH due to Earth's astronomical configuration. The relative contributions of the Atlantic Ocean to global OHT and MOC anomalies are minor compared to those of the Pacific. However, sea ice changes are remarkable, highlighted by decreased (increased cover in the Ross (Weddell Sea but widespread reductions in sea ice across the NH.

  11. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  12. Variation in radiographic protocols in paediatric interventional cardiology

    International Nuclear Information System (INIS)

    McFadden, S L; Hughes, C M; Winder, R J

    2013-01-01

    The aim of this work is to determine current radiographic protocols in paediatric interventional cardiology (IC) in the UK and Ireland. To do this we investigated which imaging parameters/protocols are commonly used in IC in different hospitals, to identify if a standard technique is used and illustrate any variation in practice. A questionnaire was sent to all hospitals in the UK and Ireland which perform paediatric IC to obtain information on techniques used in each clinical department and on the range of clinical examinations performed. Ethical and research governance approval was sought from the Office for Research Ethics Committees Northern Ireland and the individual trusts. A response rate of 79% was achieved, and a wide variation in technique was found between hospitals. The main differences in technique involved variations in the use of an anti-scatter grid and the use of additional filtration to the radiation beam, frame rates for digital acquisition and pre-programmed projections/paediatric specific programming in the equipment. We conclude that there is no standard protocol for carrying out paediatric IC in the UK or Ireland. Each hospital carries out the IC procedure according to its own local protocols resulting in a wide variation in radiation dose. (paper)

  13. Variation in radiographic protocols in paediatric interventional cardiology.

    Science.gov (United States)

    McFadden, S L; Hughes, C M; Winder, R J

    2013-06-01

    The aim of this work is to determine current radiographic protocols in paediatric interventional cardiology (IC) in the UK and Ireland. To do this we investigated which imaging parameters/protocols are commonly used in IC in different hospitals, to identify if a standard technique is used and illustrate any variation in practice. A questionnaire was sent to all hospitals in the UK and Ireland which perform paediatric IC to obtain information on techniques used in each clinical department and on the range of clinical examinations performed. Ethical and research governance approval was sought from the Office for Research Ethics Committees Northern Ireland and the individual trusts. A response rate of 79% was achieved, and a wide variation in technique was found between hospitals. The main differences in technique involved variations in the use of an anti-scatter grid and the use of additional filtration to the radiation beam, frame rates for digital acquisition and pre-programmed projections/paediatric specific programming in the equipment. We conclude that there is no standard protocol for carrying out paediatric IC in the UK or Ireland. Each hospital carries out the IC procedure according to its own local protocols resulting in a wide variation in radiation dose.

  14. Epilepsy & IQ: the clinical utility of the Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV) indices in the neuropsychological assessment of people with epilepsy.

    Science.gov (United States)

    Baxendale, Sallie; McGrath, Katherine; Thompson, Pamela J

    2014-01-01

    We examined Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV) General Ability Index (GAI) and Full Scale Intelligence Quotient (FSIQ) discrepancies in 100 epilepsy patients; 44% had a significant GAI > FSIQ discrepancy. GAI-FSIQ discrepancies were correlated with the number of antiepileptic drugs taken and duration of epilepsy. Individual antiepileptic drugs differentially interfere with the expression of underlying intellectual ability in this group. FSIQ may significantly underestimate levels of general intellectual ability in people with epilepsy. Inaccurate representations of FSIQ due to selective impairments in working memory and reduced processing speed obscure the contextual interpretation of performance on other neuropsychological tests, and subtle localizing and lateralizing signs may be missed as a result.

  15. Using Integer Clocks to Verify the Timing-Sync Sensor Network Protocol

    Science.gov (United States)

    Huang, Xiaowan; Singh, Anu; Smolka, Scott A.

    2010-01-01

    We use the UPPAAL model checker for Timed Automata to verify the Timing-Sync time-synchronization protocol for sensor networks (TPSN). The TPSN protocol seeks to provide network-wide synchronization of the distributed clocks in a sensor network. Clock-synchronization algorithms for sensor networks such as TPSN must be able to perform arithmetic on clock values to calculate clock drift and network propagation delays. They must be able to read the value of a local clock and assign it to another local clock. Such operations are not directly supported by the theory of Timed Automata. To overcome this formal-modeling obstacle, we augment the UPPAAL specification language with the integer clock derived type. Integer clocks, which are essentially integer variables that are periodically incremented by a global pulse generator, greatly facilitate the encoding of the operations required to synchronize clocks as in the TPSN protocol. With this integer-clock-based model of TPSN in hand, we use UPPAAL to verify that the protocol achieves network-wide time synchronization and is devoid of deadlock. We also use the UPPAAL Tracer tool to illustrate how integer clocks can be used to capture clock drift and resynchronization during protocol execution

  16. A standard protocol for describing individual-based and agent-based models

    Science.gov (United States)

    Grimm, Volker; Berger, Uta; Bastiansen, Finn; Eliassen, Sigrunn; Ginot, Vincent; Giske, Jarl; Goss-Custard, John; Grand, Tamara; Heinz, Simone K.; Huse, Geir; Huth, Andreas; Jepsen, Jane U.; Jorgensen, Christian; Mooij, Wolf M.; Muller, Birgit; Pe'er, Guy; Piou, Cyril; Railsback, Steven F.; Robbins, Andrew M.; Robbins, Martha M.; Rossmanith, Eva; Ruger, Nadja; Strand, Espen; Souissi, Sami; Stillman, Richard A.; Vabo, Rune; Visser, Ute; DeAngelis, Donald L.

    2006-01-01

    Simulation models that describe autonomous individual organisms (individual based models, IBM) or agents (agent-based models, ABM) have become a widely used tool, not only in ecology, but also in many other disciplines dealing with complex systems made up of autonomous entities. However, there is no standard protocol for describing such simulation models, which can make them difficult to understand and to duplicate. This paper presents a proposed standard protocol, ODD, for describing IBMs and ABMs, developed and tested by 28 modellers who cover a wide range of fields within ecology. This protocol consists of three blocks (Overview, Design concepts, and Details), which are subdivided into seven elements: Purpose, State variables and scales, Process overview and scheduling, Design concepts, Initialization, Input, and Submodels. We explain which aspects of a model should be described in each element, and we present an example to illustrate the protocol in use. In addition, 19 examples are available in an Online Appendix. We consider ODD as a first step for establishing a more detailed common format of the description of IBMs and ABMs. Once initiated, the protocol will hopefully evolve as it becomes used by a sufficiently large proportion of modellers.

  17. GossipKit: A Framework of Gossip Protocol Family

    OpenAIRE

    Lin, Shen; Taiani, Francois; Blair, Gordon S.

    2007-01-01

    A large number of gossip protocols have been developed in the last few years to address a wide range of functionalities. So far, however, very few software frameworks have been proposed to ease the development and deployment of these gossip protocols. To address this issue, this paper presents GossipKit, an event-driven framework that provides a generic and extensible architecture for the development of (re)configurable gossip-oriented middleware. GossipKit is based on a generic interaction m...

  18. A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography.

    Science.gov (United States)

    Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Zhao, Jining

    2015-03-01

    Radio Frequency Identification(RFID) is an automatic identification technology, which can be widely used in healthcare environments to locate and track staff, equipment and patients. However, potential security and privacy problems in RFID system remain a challenge. In this paper, we design a mutual authentication protocol for RFID based on elliptic curve cryptography(ECC). We use pre-computing method within tag's communication, so that our protocol can get better efficiency. In terms of security, our protocol can achieve confidentiality, unforgeability, mutual authentication, tag's anonymity, availability and forward security. Our protocol also can overcome the weakness in the existing protocols. Therefore, our protocol is suitable for healthcare environments.

  19. Geographic variation in lumbar diskectomy: a protocol for evaluation.

    Science.gov (United States)

    Barron, M; Kazandjian, V A

    1992-03-01

    In 1989 the Maryland Hospital Association (MHA) began developing a protocol related to lumbar diskectomy, a procedure with widely reported geographic variation in its use. The MHA's Laminectomy Advisory Committee drafted three criteria for performance of lumbar diskectomy and also developed a data-collection instrument with which the eight hospitals participating in a pilot study could abstract the necessary data from medical records. Both individual hospital and aggregate results showed wide variation in compliance with the criteria. These findings suggest research and development activities such as refinement of the data-collection instrument, use of the protocol for bench-marking, further investigation of clinical and other determinants of rate variation, and study of the effect of new diagnostic technology on utilization rates for this procedure.

  20. Development and implementation of the Dutch protocol for rehabilitative management in amyotrophic lateral sclerosis.

    Science.gov (United States)

    van den Berg, J P; de Groot, I J M; Joha, B C; van Haelst, J M; van Gorcom, P; Kalmijn, S

    2004-12-01

    In the Netherlands, rehabilitation care plays an important role in the symptomatic and palliative treatment of ALS patients. However, until 1999 there were no guidelines or practice parameters available for the management of ALS. Therefore, the Dutch protocol for rehabilitative management in ALS was developed. We describe the development process, the outcome and implementation of the protocol. A concept management protocol was written and the Delphi method was selected to develop the protocol further. This method comprises repetitive discussion sessions from postulates, using a combination of written questionnaires and work-conferences. Between 80 and 90 persons (rehabilitation team members of different professional backgrounds and neurologists) were involved in this process. The protocol was implemented by sending it to all consultants in rehabilitation medicine in the Netherlands; they were asked to inform all the treatment team members about the final protocol and to implement it in their treatment of ALS patients. The protocol was developed in 1999, implemented in 2000 and evaluated in 2001. Recommendations for improvement were made during the evaluation and improvements are currently being developed by an expert group. The protocol is widely used (88.9%) by consultants in rehabilitation medicine and their treatment teams in the Netherlands. The Dutch protocol for rehabilitative management was developed to provide an optimal and adequate care plan for patients with ALS. It is widely used in the Netherlands.

  1. Effects of Work-Related Stress on Work Ability Index among Iranian Workers.

    Science.gov (United States)

    Gharibi, Vahid; Mokarami, Hamidreza; Taban, Abrahim; Yazdani Aval, Mohsen; Samimi, Kazem; Salesi, Mahmood

    2016-03-01

    Work Ability Index (WAI) is a well-known and valid self-report tool that has been widely used in various studies to identify and avoid early retirement and work-related disability. Nevertheless, very few studies have been carried out to evaluate work ability in Iran. We aimed to investigate the WAI and the effect of work-related stress on it among Iranian workers. A cross-sectional, descriptive and analytic study was carried out among 449 workers from five working sectors in three big cities of Iran. Work ability and work-related stress were measured using the Persian version of WAI and the Persian version of Health and Safety Executive Stress Indicator Tool. More than a third of the workers surveyed (34.70%) did not have an appropriate level of work ability (WAI work-related stress and the mean score of WAI. Furthermore, the variables of body mass index, sleep quality, exercise activity, job tenure, and three subscales of work-related stress including demands, supervisor support, and role were significant predictors of WAI. According to the results of this study, the interventional programs must be focused on improving supervisors support, eliminating ambiguity and conflicts in the role of workers in their job and organization, reducing job demands, improving sleep quality, and increasing exercise activity.

  2. A History of the Improvement of Internet Protocols Over Satellites Using ACTS

    Science.gov (United States)

    Allman, Mark; Kruse, Hans; Ostermann, Shawn

    2000-01-01

    This paper outlines the main results of a number of ACTS experiments on the efficacy of using standard Internet protocols over long-delay satellite channels. These experiments have been jointly conducted by NASAs Glenn Research Center and Ohio University over the last six years. The focus of our investigations has been the impact of long-delay networks with non-zero bit-error rates on the performance of the suite of Internet protocols. In particular, we have focused on the most widely used transport protocol, the Transmission Control Protocol (TCP), as well as several application layer protocols. This paper presents our main results, as well as references to more verbose discussions of our experiments.

  3. Two Cheers for the Trafficking Protocol

    Directory of Open Access Journals (Sweden)

    Anne T Gallagher

    2015-04-01

    Full Text Available The Trafficking Protocol makes an easy target for attack. Its origins lie in an attempt to control a particularly exploitative form of migration that was challenging the ability of States to control their own borders. Its parent instrument is a framework agreement to address transnational organised crime. While paying fleeting attention to the rights of victims, the Protocol, with its emphasis on criminalisation and border protection is nowhere near being a human rights treaty. On top of all that it does not even have a credible enforcement mechanism, allowing states parties wide latitude in interpreting and applying their obligations. Strangely, these seemingly insurmountable flaws have not stopped the Protocol’s emergence as perhaps the single most important development in the fight against human trafficking. Without the Protocol, arguments around definitions would have continued to block the evolution of principles and rules. Without the Protocol it is likely that the human rights system would have continued its shameful tradition of sidelining issues such as forced labour, forced sex, forced marriage and the ritual exploitation of migrant workers through debt. Most critically, the Protocol provided the impetus and template for a series of legal and political developments that, over time, have served to ameliorate some of its greatest weaknesses, including the lack of human rights protections and of a credible oversight mechanism.

  4. The intergroup protocols: Scalable group communication for the internet

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo [Univ. of California, Santa Barbara, CA (United States)

    2000-12-04

    Reliable group ordered delivery of multicast messages in a distributed system is a useful service that simplifies the programming of distributed applications. Such a service helps to maintain the consistency of replicated information and to coordinate the activities of the various processes. With the increasing popularity of the Internet, there is an increasing interest in scaling the protocols that provide this service to the environment of the Internet. The InterGroup protocol suite, described in this dissertation, provides such a service, and is intended for the environment of the Internet with scalability to large numbers of nodes and high latency links. The InterGroup protocols approach the scalability problem from various directions. They redefine the meaning of group membership, allow voluntary membership changes, add a receiver-oriented selection of delivery guarantees that permits heterogeneity of the receiver set, and provide a scalable reliability service. The InterGroup system comprises several components, executing at various sites within the system. Each component provides part of the services necessary to implement a group communication system for the wide-area. The components can be categorized as: (1) control hierarchy, (2) reliable multicast, (3) message distribution and delivery, and (4) process group membership. We have implemented a prototype of the InterGroup protocols in Java, and have tested the system performance in both local-area and wide-area networks.

  5. A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem.

    Science.gov (United States)

    Zhao, Zhenguo

    2014-05-01

    With the fast advancement of the wireless communication technology and the widespread use of medical systems, the radio frequency identification (RFID) technology has been widely used in healthcare environments. As the first important protocol for ensuring secure communication in healthcare environment, the RFID authentication protocols derive more and more attentions. Most of RFID authentication protocols are based on hash function or symmetric cryptography. To get more security properties, elliptic curve cryptosystem (ECC) has been used in the design of RFID authentication protocol. Recently, Liao and Hsiao proposed a new RFID authentication protocol using ECC and claimed their protocol could withstand various attacks. In this paper, we will show that their protocol suffers from the key compromise problem, i.e. an adversary could get the private key stored in the tag. To enhance the security, we propose a new RFID authentication protocol using ECC. Detailed analysis shows the proposed protocol not only could overcome weaknesses in Liao and Hsiao's protocol but also has the same performance. Therefore, it is more suitable for healthcare environments.

  6. Grid-optimized Web 3D applications on wide area network

    Science.gov (United States)

    Wang, Frank; Helian, Na; Meng, Lingkui; Wu, Sining; Zhang, Wen; Guo, Yike; Parker, Michael Andrew

    2008-08-01

    Geographical information system has come into the Web Service times now. In this paper, Web3D applications have been developed based on our developed Gridjet platform, which provides a more effective solution for massive 3D geo-dataset sharing in distributed environments. Web3D services enabling web users could access the services as 3D scenes, virtual geographical environment and so on. However, Web3D services should be shared by thousands of essential users that inherently distributed on different geography locations. Large 3D geo-datasets need to be transferred to distributed clients via conventional HTTP, NFS and FTP protocols, which often encounters long waits and frustration in distributed wide area network environments. GridJet was used as the underlying engine between the Web 3D application node and geo-data server that utilizes a wide range of technologies including the one of paralleling the remote file access, which is a WAN/Grid-optimized protocol and provides "local-like" accesses to remote 3D geo-datasets. No change in the way of using software is required since the multi-streamed GridJet protocol remains fully compatible with existing IP infrastructures. Our recent progress includes a real-world test that Web3D applications as Google Earth over the GridJet protocol beats those over the classic ones by a factor of 2-7 where the transfer distance is over 10,000 km.

  7. Quantum Information Protocols with Gaussian States of Light

    DEFF Research Database (Denmark)

    Jacobsen, Christian Scheffmann

    and hardware for secure quantum key distribution. These technologies directly exploit quantum effects, and indeed this is where they offer advantages to classical products. This thesis deals with the development and implementation of quantum information protocols that utilize the rather inexpensive resource......Quantum cryptography is widely regarded as the most mature field within the context of quantum information in the sense that its application and development has produced companies that base their products on genuine quantum mechanical principles. Examples include quantum random number generators...... of Gaussian states. A quantum information protocol is essentially a sequence of state exchanges between some number of parties and a certain ordering of quantum mechanical unitary operators performed by these parties. An example of this is the famous BB84 protocol for secret key generation, where photons...

  8. Clinical validity of the Japanese version of WAIS-III short forms: Adaptation for patients with mild neurocognitive disorder and dementia.

    Science.gov (United States)

    Takeda, Mihoko; Nakaya, Makoto; Kikuchi, Yoko; Inoue, Sayaka; Kamata, Tomoyuki

    2018-01-01

    We investigated the Japanese WAIS-III short form utility in mild neurocognitive disorder and dementia. Our sample consisted of 108 old patients (ages: 65-89; mean age = 78.3). Fifteen short forms (SFs) and full-scale (FS) IQs were compared. The SFs included Dyads (SF1, SF2), Triads (SF3), Tetrads (SF4, SF5, SF6, SF7), Pentad (SF8), Six-subtest (SF9), Seven-subtests (SF10(a)(b), SF11(a)(b), SF12), and Nine-subtest (SF13). Correlations between SFIQs and FSIQ were all significant. Significant differences also were found in paired t-test between FSIQ and 5 SFIQs (SF2: t = -4.16, SF5: t = -7.06, SF7; t = 2.59, SF10(a): t = 2.56, SF12: t = -4.82; p Arithmetic, Digit Span, Information, Picture Completion, Digit Symbol-Coding, and Matrix Reasoning (Ryan & Ward, 1999), and the formula (Axelrod et al., 2001) should be adopted to convert scaled scores into estimated IQ scores. Copyright © 2017 Elsevier B.V. All rights reserved.

  9. The Classroom Observation Protocol for Undergraduate STEM (COPUS): A New Instrument to Characterize University STEM Classroom Practices

    OpenAIRE

    Smith, Michelle K.; Jones, Francis H. M.; Gilbert, Sarah L.; Wieman, Carl E.

    2013-01-01

    Instructors and the teaching practices they employ play a critical role in improving student learning in college science, technology, engineering, and mathematics (STEM) courses. Consequently, there is increasing interest in collecting information on the range and frequency of teaching practices at department-wide and institution-wide scales. To help facilitate this process, we present a new classroom observation protocol known as the Classroom Observation Protocol for Undergraduate STEM or C...

  10. Stochastic Characterization of Communication Network Latency for Wide Area Grid Control Applications.

    Energy Technology Data Exchange (ETDEWEB)

    Ameme, Dan Selorm Kwami [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Guttromson, Ross [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-10-01

    This report characterizes communications network latency under various network topologies and qualities of service (QoS). The characterizations are probabilistic in nature, allowing deeper analysis of stability for Internet Protocol (IP) based feedback control systems used in grid applications. The work involves the use of Raspberry Pi computers as a proxy for a controlled resource, and an ns-3 network simulator on a Linux server to create an experimental platform (testbed) that can be used to model wide-area grid control network communications in smart grid. Modbus protocol is used for information transport, and Routing Information Protocol is used for dynamic route selection within the simulated network.

  11. Protocol: methodology for chromatin immunoprecipitation (ChIP in Chlamydomonas reinhardtii

    Directory of Open Access Journals (Sweden)

    Strenkert Daniela

    2011-11-01

    Full Text Available Abstract We report on a detailed chromatin immunoprecipitation (ChIP protocol for the unicellular green alga Chlamydomonas reinhardtii. The protocol is suitable for the analysis of nucleosome occupancy, histone modifications and transcription factor binding sites at the level of mononucleosomes for targeted and genome-wide studies. We describe the optimization of conditions for crosslinking, chromatin fragmentation and antibody titer determination and provide recommendations and an example for the normalization of ChIP results as determined by real-time PCR.

  12. On TCP-based Session Initiation Protocol (SIP) Server Overload Control

    OpenAIRE

    Shen, Charles; Schulzrinne, Henning

    2010-01-01

    The Session Initiation Protocol (SIP) server overload management has attracted interest since SIP is being widely deployed in the Next Generation Networks (NGN) as a core signaling protocol. Yet all existing SIP overload control work is focused on SIP-over-UDP, despite the fact that TCP is increasingly seen as the more viable choice of SIP transport. This paper answers the following questions: is the existing TCP flow control capable of handling the SIP overload problem? If not, why and how c...

  13. New Communication Network Protocol for a Data Acquisition System

    Science.gov (United States)

    Uchida, T.; Fujii, H.; Nagasaka, Y.; Tanaka, M.

    2006-02-01

    An event builder based on communication networks has been used in high-energy physics experiments, and various networks have been adopted, for example, IEEE 802.3 (Ethernet), asynchronous transfer mode (ATM), and so on. In particular, Ethernet is widely used because its infrastructure is very cost effective. Many systems adopt standard protocols that are designed for a general network. However, in the case of an event builder, the communication pattern between stations is different from that in a general network. The unique communication pattern causes congestion, and thus makes it difficulty to quantitatively design the network. To solve this problem, we have developed a simple network protocol for a data acquisition (DAQ) system. The protocol is designed to keep the sequence of senders so that no congestion occurs. We implemented the protocol on a small hardware component [a field programmable gate array (FPGA)] and measured the performance, so that it will be ready for a generic DAQ system

  14. Gene probes : principles and protocols [Methods in molecular biology, v. 179

    National Research Council Canada - National Science Library

    Rapley, Ralph; Aquino de Muro, Marilena

    2002-01-01

    "Senior scientists Marilena Aquino de Muro and Ralph Rapley have brought together an outstanding collection of time-tested protocols for designing and using genes probes in a wide variety of applications...

  15. Advanced use of World-Wide Web in the online system of DELPHI

    International Nuclear Information System (INIS)

    Doenszelmann, M.; Carvalho, D.; Du, S.; Tennebo, F.

    1996-01-01

    The World-Wide Web technologies used by the DELPHI experiment at CERN to provide easy access to information of the On-line System. WWW technology on both client and server side is used in five different projects. The World-Wide Web has its advantages concerning the network technology, the practical user interface and its scalability. It however also demands a stateless protocol and format negotiation. (author)

  16. The WAIS Melt Monitor: An automated ice core melting system for meltwater sample handling and the collection of high resolution microparticle size distribution data

    Science.gov (United States)

    Breton, D. J.; Koffman, B. G.; Kreutz, K. J.; Hamilton, G. S.

    2010-12-01

    Paleoclimate data are often extracted from ice cores by careful geochemical analysis of meltwater samples. The analysis of the microparticles found in ice cores can also yield unique clues about atmospheric dust loading and transport, dust provenance and past environmental conditions. Determination of microparticle concentration, size distribution and chemical makeup as a function of depth is especially difficult because the particle size measurement either consumes or contaminates the meltwater, preventing further geochemical analysis. Here we describe a microcontroller-based ice core melting system which allows the collection of separate microparticle and chemistry samples from the same depth intervals in the ice core, while logging and accurately depth-tagging real-time electrical conductivity and particle size distribution data. This system was designed specifically to support microparticle analysis of the WAIS Divide WDC06A deep ice core, but many of the subsystems are applicable to more general ice core melting operations. Major system components include: a rotary encoder to measure ice core melt displacement with 0.1 millimeter accuracy, a meltwater tracking system to assign core depths to conductivity, particle and sample vial data, an optical debubbler level control system to protect the Abakus laser particle counter from damage due to air bubbles, a Rabbit 3700 microcontroller which communicates with a host PC, collects encoder and optical sensor data and autonomously operates Gilson peristaltic pumps and fraction collectors to provide automatic sample handling, melt monitor control software operating on a standard PC allowing the user to control and view the status of the system, data logging software operating on the same PC to collect data from the melting, electrical conductivity and microparticle measurement systems. Because microparticle samples can easily be contaminated, we use optical air bubble sensors and high resolution ice core density

  17. Scaling HEP to Web size with RESTful protocols: The frontier example

    International Nuclear Information System (INIS)

    Dykstra, Dave

    2011-01-01

    The World-Wide-Web has scaled to an enormous size. The largest single contributor to its scalability is the HTTP protocol, particularly when used in conformity to REST (REpresentational State Transfer) principles. High Energy Physics (HEP) computing also has to scale to an enormous size, so it makes sense to base much of it on RESTful protocols. Frontier, which reads databases with an HTTP-based RESTful protocol, has successfully scaled to deliver production detector conditions data from both the CMS and ATLAS LHC detectors to hundreds of thousands of computer cores worldwide. Frontier is also able to re-use a large amount of standard software that runs the Web: on the clients, caches, and servers. I discuss the specific ways in which HTTP and REST enable high scalability for Frontier. I also briefly discuss another protocol used in HEP computing that is HTTP-based and RESTful, and another protocol that could benefit from it. My goal is to encourage HEP protocol designers to consider HTTP and REST whenever the same information is needed in many places.

  18. Code Generation for Protocols from CPN models Annotated with Pragmatics

    DEFF Research Database (Denmark)

    Simonsen, Kent Inge; Kristensen, Lars Michael; Kindler, Ekkart

    software implementation satisfies the properties verified for the model. Coloured Petri Nets (CPNs) have been widely used to model and verify protocol software, but limited work exists on using CPN models of protocol software as a basis for automated code generation. In this report, we present an approach...... modelling languages, MDE further has the advantage that models are amenable to model checking which allows key behavioural properties of the software design to be verified. The combination of formally verified models and automated code generation contributes to a high degree of assurance that the resulting...... for generating protocol software from a restricted class of CPN models. The class of CPN models considered aims at being descriptive in that the models are intended to be helpful in understanding and conveying the operation of the protocol. At the same time, a descriptive model is close to a verifiable version...

  19. Perancangan dan Analisis Redistribution Routing Protocol OSPF dan EIGRP

    Directory of Open Access Journals (Sweden)

    DWI ARYANTA

    2014-07-01

    OSPF (Open Shortest Path First and EIGRP (Enhanced Interior Gateway Routing Protocol are two routing protocols are widely used in computer networks. Differences between the characteristics of routing protocols pose a problem in the delivery of data packets. Redistribution technique is the solution for communication between routing protocols. By using the software Cisco Packet Tracer 5.3 in this study were made simulating OSPF and EIGRP redistribution linked by technique, then compared its quality with a single EIGRP and OSPF routing protocols. Testing parameters in this study is the value of the time delay and trace route. Value trace route based on direct calculation of cost and metric compared with the simulation results. The result can be OSPF and EIGRP redistribution process. Value delay redistribution 1% better than OSPF and EIGRP 2-3% under traffic density dependent. In calculating the trace route redistribution is done 2 calculations, the cost for OSPF area and the area of the EIGRP metric. Making primary and alternate paths based on the packet delivery rate and the cost of the smallest metric, it is proved by calculation and simulation. Keywords: OSPF, EIGRP, Redistribution, Delay, Cost, Metric.

  20. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.

    Science.gov (United States)

    Rajeswari, S Raja; Seenivasagam, V

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.

  1. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks

    Science.gov (United States)

    Rajeswari, S. Raja; Seenivasagam, V.

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. PMID:26881272

  2. An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography.

    Science.gov (United States)

    Zhang, Zezhong; Qi, Qingqing

    2014-05-01

    Medication errors are very dangerous even fatal since it could cause serious even fatal harm to patients. In order to reduce medication errors, automated patient medication systems using the Radio Frequency Identification (RFID) technology have been used in many hospitals. The data transmitted in those medication systems is very important and sensitive. In the past decade, many security protocols have been proposed to ensure its secure transition attracted wide attention. Due to providing mutual authentication between the medication server and the tag, the RFID authentication protocol is considered as the most important security protocols in those systems. In this paper, we propose a RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography (ECC). The analysis shows the proposed protocol could overcome security weaknesses in previous protocols and has better performance. Therefore, the proposed protocol is very suitable for automated patient medication systems.

  3. Early functional outcome of two surgical protocols used in the repair ...

    African Journals Online (AJOL)

    A wide range of cleft lip and palate management protocols currently exists throughout ... surgery. It includes subjective as well as objective measures of evaluation. Postoperative ... tools that include visual assessment of the lip, teeth, alveolar.

  4. A New Ultra-lightweight Authentication Protocol for Low Cost RFID Tags

    Directory of Open Access Journals (Sweden)

    Xin Wang

    2013-05-01

    Full Text Available The Radio Frequency Identification (RFID system has been widely used in almost every aspects of the society. At present, the problem of security and privacy become a key factor of severely blocking the widespread of its usage. However, due to restraints on RFID tag’s manufacturing cost, the traditional methods of encryption are not good candidate to defend the security of wireless communication channel between reader and tag. Designing lightweight or ultra-lightweight RFID authentication protocol has become a hot research topic recently. This paper proposes a new ultra-lightweight RFID authentication protocol with high robustness and execution efficiency. The proposed protocol requires only simple bit-wise operations, it has the characteristics of low storage requirement and communication cost. At the same time, through elaborate mechanism design, avoid the vulnerability of the existing ultra-lightweight authentication protocols.

  5. Enhancing system-wide implementation of opioid prescribing guidelines in primary care: protocol for a stepped-wedge quality improvement project.

    Science.gov (United States)

    Zgierska, Aleksandra E; Vidaver, Regina M; Smith, Paul; Ales, Mary W; Nisbet, Kate; Boss, Deanne; Tuan, Wen-Jan; Hahn, David L

    2018-06-05

    Systematic implementation of guidelines for opioid therapy management in chronic non-cancer pain can reduce opioid-related harms. However, implementation of guideline-recommended practices in routine care is subpar. The goal of this quality improvement (QI) project is to assess whether a clinic-tailored QI intervention improves the implementation of a health system-wide, guideline-driven policy on opioid prescribing in primary care. This manuscript describes the protocol for this QI project. A health system with 28 primary care clinics caring for approximately 294,000 primary care patients developed and implemented a guideline-driven policy on long-term opioid therapy in adults with opioid-treated chronic non-cancer pain (estimated N = 3980). The policy provided multiple recommendations, including the universal use of treatment agreements, urine drug testing, depression and opioid misuse risk screening, and standardized documentation of the chronic pain diagnosis and treatment plan. The project team drew upon existing guidelines, feedback from end-users, experts and health system leadership to develop a robust QI intervention, targeting clinic-level implementation of policy-directed practices. The resulting multi-pronged QI intervention included clinic-wide and individual clinician-level educational interventions. The QI intervention will augment the health system's "routine rollout" method, consisting of a single educational presentation to clinicians in group settings and a separate presentation for staff. A stepped-wedge design will enable 9 primary care clinics to receive the intervention and assessment of within-clinic and between-clinic changes in adherence to the policy items measured by clinic-level electronic health record-based measures and process measures of the experience with the intervention. Developing methods for a health system-tailored QI intervention required a multi-step process to incorporate end-user feedback and account for the needs of

  6. Security Property Validation of the Sensor Network Encryption Protocol (SNEP

    Directory of Open Access Journals (Sweden)

    Salekul Islam

    2015-07-01

    Full Text Available Since wireless sensor networks (WSNs have been designed to be deployed in an unsecured, public environment, secured communication is really vital for their wide-spread use. Among all of the communication protocols developed for WSN, the Security Protocols for Sensor Networks (SPINS is exceptional, as it has been designed with security as a goal. SPINS is composed of two building blocks: Secure Network Encryption Protocol (SNEP and the “micro” version of the Timed Efficient Streaming Loss-tolerant Authentication (TESLA, named μTESLA. From the inception of SPINS, a number of efforts have been made to validate its security properties. In this paper, we have validated the security properties of SNEP by using an automated security protocol validation tool, named AVISPA. Using the protocol specification language, HLPSL, we model two combined scenarios—node to node key agreement and counter exchange protocols—followed by data transmission. Next, we validate the security properties of these combined protocols, using different AVISPA back-ends. AVISPA reports the models we have developed free from attacks. However, by analyzing the key distribution sub-protocol, we find one threat of a potential DoS attack that we have demonstrated by modeling in AVISPA. Finally, we propose a modification, and AVISPA reports this modified version free from the potential DoS attack.

  7. Implementation of Bridge Management System on Interurban Bridge in Maluku Province

    Directory of Open Access Journals (Sweden)

    Erwin Marasabessy

    2015-05-01

    Full Text Available Bridges as transport infrastructures play a vital role in smoothing traffic flows. The success of a bridge in playing its role and serving its function depends on its management. The Directorate General of Highways of the Ministry of Public Work has used a system to manage bridges known as the Bridge Management System (BMS. The system allows a systematic plan and provides a uniform procedure for all bridge operation activities on the national and provincial level. Data from Implementation Agency of National Inter-Urban Roads of Area IX, Northern Maluku in 2011 indicates that the total length of national roads in Maluku Province is 15,238.01 M, with a total of 562 bridges. In Ambon Island, especially, there are 52 bridges totaling 1,176.25 m in length. The study was conducted at several inter-urban bridges in Maluku Province of Ambon Island: Wai Batu Merah, Wai Ruhu, Wai Lawa, Wai Yari and Wai Tua bridges. Assessment of bridge structure conditions was conducted visually to determine the conditions of the existing bridges comprehensively by referring to the Bridge Management System (BMS complemented with a computer-based Bridge Management Information System (BMIS. Condition scores for the five bridges—Wai Batu Merah, Wai Ruhu, Wai Lawa, Wai Yari, and Wai Tua, according to Bridge Management System, are 2, 1, 2, 1, and 2 respectively. The scores of the five bridges indicate that their physical condition can be categorized as good or with minor defects. Based on technical screening, the proposed treatment for Wai Batu Merah, Wai Ruhu, Wai Lawa, dan Wai Tua bridges is the rehabilitation of their sub-elements. As for the Wai Yari Bridge, the treatment will be maintained regularly. The defect repair costs are IDR 149,138,238.00, IDR 81,048,000.00, IDR 174,579,106.10, IDR 79,233,324.01 and IDR 238,323,258.60 for Wai Batu, Wai Ruhu, Wai Lawa, Wai Yari, and Wai Tua Bridges, respectively.

  8. Item response theory analysis of Working Alliance Inventory, revised response format, and new Brief Alliance Inventory.

    Science.gov (United States)

    Mallinckrodt, Brent; Tekie, Yacob T

    2016-11-01

    The Working Alliance Inventory (WAI) has made great contributions to psychotherapy research. However, studies suggest the 7-point response format and 3-factor structure of the client version may have psychometric problems. This study used Rasch item response theory (IRT) to (a) improve WAI response format, (b) compare two brief 12-item versions (WAI-sr; WAI-s), and (c) develop a new 16-item Brief Alliance Inventory (BAI). Archival data from 1786 counseling center and community clients were analyzed. IRT findings suggested problems with crossed category thresholds. A rescoring scheme that combines neighboring responses to create 5- and 4-point scales sharply reduced these problems. Although subscale variance was reduced by 11-26%, rescoring yielded improved reliability and generally higher correlations with therapy process (session depth and smoothness) and outcome measures (residual gain symptom improvement). The 16-item BAI was designed to maximize "bandwidth" of item difficulty and preserve a broader range of WAI sensitivity than WAI-s or WAI-sr. Comparisons suggest the BAI performed better in several respects than the WAI-s or WAI-sr and equivalent to the full WAI on several performance indicators.

  9. Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-06-01

    Full Text Available Wireless sensor networks (WSNs consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC for WSNs. However, it turned out that Yeh et al.’s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.’s protocol. However, Shi et al.’s improvement introduces other security weaknesses. In this paper, we show that Shi et al.’s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  10. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography.

    Science.gov (United States)

    Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho

    2014-06-10

    Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  11. Genome-wide profiling of transcription factor binding and epigenetic marks in adipocytes by ChIP-seq

    DEFF Research Database (Denmark)

    Nielsen, Ronni; Mandrup, Susanne

    2014-01-01

    of the most widely used of these technologies. Using these methods, association of transcription factors, cofactors, and epigenetic marks can be mapped to DNA in a genome-wide manner. Here, we provide a detailed protocol for performing ChIP-seq analyses in preadipocytes and adipocytes. We have focused mainly...

  12. Analysis of Security Protocols in Embedded Systems

    DEFF Research Database (Denmark)

    Bruni, Alessandro

    Embedded real-time systems have been adopted in a wide range of safety-critical applications—including automotive, avionics, and train control systems—where the focus has long been on safety (i.e., protecting the external world from the potential damage caused by the system) rather than security (i.......e., protecting the system from the external world). With increased connectivity of these systems to external networks the attack surface has grown, and consequently there is a need for securing the system from external attacks. Introducing security protocols in safety critical systems requires careful...... in this direction is to extend saturation-based techniques so that enough state information can be modelled and analysed. Finally, we present a methodology for proving the same security properties in the computational model, by means of typing protocol implementations....

  13. Three-Stage Quantum Cryptography Protocol under Collective-Rotation Noise

    Directory of Open Access Journals (Sweden)

    Linsen Wu

    2015-05-01

    Full Text Available Information security is increasingly important as society migrates to the information age. Classical cryptography widely used nowadays is based on computational complexity, which means that it assumes that solving some particular mathematical problems is hard on a classical computer. With the development of supercomputers and, potentially, quantum computers, classical cryptography has more and more potential risks. Quantum cryptography provides a solution which is based on the Heisenberg uncertainty principle and no-cloning theorem. While BB84-based quantum protocols are only secure when a single photon is used in communication, the three-stage quantum protocol is multi-photon tolerant. However, existing analyses assume perfect noiseless channels. In this paper, a multi-photon analysis is performed for the three-stage quantum protocol under the collective-rotation noise model. The analysis provides insights into the impact of the noise level on a three-stage quantum cryptography system.

  14. Nuclear medicine resources in the internet

    International Nuclear Information System (INIS)

    Obaldo, J.M.

    1996-01-01

    The internet is a global collection of networked computers linked by a set of protocols which allows the otherwise disperate computer systems to communicate with each other. In contrast to text-only data available previously, the World Wide Web allows multimedia content to be available on the internet. Graphics can now likewise be used as links. The development of World Wide Web client software such as Mosaic, or the currently more popular Netscape Navigator, makes linking from one document to another (colloquially referred to as 'surfing the Net') fast and simple. While these software are commonly called Web browsers their function extends to the other internet services such as e-mail, file transfer protocol, remote login, Gopher and WAIS. A prototype application being developed as a case-based teaching file which could include clinical data and case discussion, aside of course from the nuclear medicine and related images. Contributions from various institutions can be made available on their own servers and linked together through hypertext. Examples of these are websites of the Mallinckrodt Institute of Radiology and the Joint Program in Nuclear Medicine of the Harvard Medical School. The university of Iowa also has its Virtual Hospital, a collection of clinical cases with radiologic images. Most major universities and medical centers have websites where information on on-going research, facilities and personnel are made available. Links to various special interest discussion groups (e.g. those developing the common image file format) are also accessible and the documents often contain further links to related fields in nuclear technology. The very nature of the hypertext transfer protocol of the World Wide Web makes it a relatively simple matter for a developer of a teaching system to include links to necessary resources. It is envisioned that an internet-based teaching module will be incorporated in some nuclear medicine training programs in the United States

  15. Development of wide area environment accelerator operation and diagnostics method

    Science.gov (United States)

    Uchiyama, Akito; Furukawa, Kazuro

    2015-08-01

    Remote operation and diagnostic systems for particle accelerators have been developed for beam operation and maintenance in various situations. Even though fully remote experiments are not necessary, the remote diagnosis and maintenance of the accelerator is required. Considering remote-operation operator interfaces (OPIs), the use of standard protocols such as the hypertext transfer protocol (HTTP) is advantageous, because system-dependent protocols are unnecessary between the remote client and the on-site server. Here, we have developed a client system based on WebSocket, which is a new protocol provided by the Internet Engineering Task Force for Web-based systems, as a next-generation Web-based OPI using the Experimental Physics and Industrial Control System Channel Access protocol. As a result of this implementation, WebSocket-based client systems have become available for remote operation. Also, as regards practical application, the remote operation of an accelerator via a wide area network (WAN) faces a number of challenges, e.g., the accelerator has both experimental device and radiation generator characteristics. Any error in remote control system operation could result in an immediate breakdown. Therefore, we propose the implementation of an operator intervention system for remote accelerator diagnostics and support that can obviate any differences between the local control room and remote locations. Here, remote-operation Web-based OPIs, which resolve security issues, are developed.

  16. Development of wide area environment accelerator operation and diagnostics method

    Directory of Open Access Journals (Sweden)

    Akito Uchiyama

    2015-08-01

    Full Text Available Remote operation and diagnostic systems for particle accelerators have been developed for beam operation and maintenance in various situations. Even though fully remote experiments are not necessary, the remote diagnosis and maintenance of the accelerator is required. Considering remote-operation operator interfaces (OPIs, the use of standard protocols such as the hypertext transfer protocol (HTTP is advantageous, because system-dependent protocols are unnecessary between the remote client and the on-site server. Here, we have developed a client system based on WebSocket, which is a new protocol provided by the Internet Engineering Task Force for Web-based systems, as a next-generation Web-based OPI using the Experimental Physics and Industrial Control System Channel Access protocol. As a result of this implementation, WebSocket-based client systems have become available for remote operation. Also, as regards practical application, the remote operation of an accelerator via a wide area network (WAN faces a number of challenges, e.g., the accelerator has both experimental device and radiation generator characteristics. Any error in remote control system operation could result in an immediate breakdown. Therefore, we propose the implementation of an operator intervention system for remote accelerator diagnostics and support that can obviate any differences between the local control room and remote locations. Here, remote-operation Web-based OPIs, which resolve security issues, are developed.

  17. TH-C-18A-08: A Management Tool for CT Dose Monitoring, Analysis, and Protocol Review

    International Nuclear Information System (INIS)

    Wang, J; Chan, F; Newman, B; Larson, D; Leung, A; Fleischmann, D; Molvin, L; Marsh, D; Zorich, C; Phillips, L

    2014-01-01

    Purpose: To develop a customizable tool for enterprise-wide managing of CT protocols and analyzing radiation dose information of CT exams for a variety of quality control applications Methods: All clinical CT protocols implemented on the 11 CT scanners at our institution were extracted in digital format. The original protocols had been preset by our CT management team. A commercial CT dose tracking software (DoseWatch,GE healthcare,WI) was used to collect exam information (exam date, patient age etc.), scanning parameters, and radiation doses for all CT exams. We developed a Matlab-based program (MathWorks,MA) with graphic user interface which allows to analyze the scanning protocols with the actual dose estimates, and compare the data to national (ACR,AAPM) and internal reference values for CT quality control. Results: The CT protocol review portion of our tool allows the user to look up the scanning and image reconstruction parameters of any protocol on any of the installed CT systems among about 120 protocols per scanner. In the dose analysis tool, dose information of all CT exams (from 05/2013 to 02/2014) was stratified on a protocol level, and within a protocol down to series level, i.e. each individual exposure event. This allows numerical and graphical review of dose information of any combination of scanner models, protocols and series. The key functions of the tool include: statistics of CTDI, DLP and SSDE, dose monitoring using user-set CTDI/DLP/SSDE thresholds, look-up of any CT exam dose data, and CT protocol review. Conclusion: our inhouse CT management tool provides radiologists, technologists and administration a first-hand near real-time enterprise-wide knowledge on CT dose levels of different exam types. Medical physicists use this tool to manage CT protocols, compare and optimize dose levels across different scanner models. It provides technologists feedback on CT scanning operation, and knowledge on important dose baselines and thresholds

  18. Redactions in protocols for drug trials: what industry sponsors concealed.

    Science.gov (United States)

    Marquardsen, Mikkel; Ogden, Michelle; Gøtzsche, Peter C

    2018-04-01

    Objective To describe the redactions in contemporary protocols for industry-sponsored randomised drug trials with patient relevant outcomes and to evaluate whether there was a legitimate rationale for the redactions. Design Cohort study. Under the Freedom of Information Act, we requested access to trial protocols approved by a research ethics committee in Denmark from October 2012 to March 2013. We received 17 consecutive protocols, which had been redacted before we got them, and nine protocols without redactions. In five additional cases, the companies refused to let the committees give us access, and in three other cases, documents were missing. Participants Not applicable. Setting Not applicable. Main outcome measure Amount and nature of redactions in 22 predefined key protocol variables. Results The redactions were most widespread in those sections of the protocol where there is empirical evidence of substantial problems with the trustworthiness of published drug trials: data analysis, handling of missing data, detection and analysis of adverse events, definition of the outcomes, interim analyses and premature termination of the study, sponsor's access to incoming data while the study is running, ownership to the data and investigators' publication rights. The parts of the text that were redacted differed widely, both between companies and within the same company. Conclusions We could not identify any legitimate rationale for the redactions. The current mistrust in industry-sponsored drug trials can only change if the industry offers unconditional access to its trial protocols and other relevant documents and data.

  19. UAV telemetry communications using ZigBee protocol

    Science.gov (United States)

    Nasution, T. H.; Siregar, I.; Yasir, M.

    2017-10-01

    Wireless communication has been widely used in various fields or disciplines such as agriculture, health, engineering, military, and aerospace so as to support the work in that field. The communication technology is typically used for controlling devices and data monitoring. One development of wireless communication is the widely used telemetry system used to reach areas that cannot be reached by humans using UAV (Unmanned Aerial Vehicle) or unmanned aircraft. In this paper we discuss the design of telemetry system in UAV using ZigBee protocol. From the test obtained the system can work well with visualization displays without pause is 20 data per second with a maximum data length of 120 characters.

  20. A Push-pull Protocol to Reduce Colonization of Bird Nest Boxes by Honey Bees.

    Science.gov (United States)

    Efstathion, Caroline A; Kern, William H

    2016-09-04

    Introduction of the invasive Africanized honey bee (AHB) into the Neotropics is a serious problem for many cavity nesting birds, specifically parrots. These bees select cavities that are suitable nest sites for birds, resulting in competition. The difficulty of removing bees and their defensive behavior makes a prevention protocol necessary. Here, we describe a push-pull integrated pest management protocol to deter bees from inhabiting bird boxes by applying a bird safe insecticide, permethrin, to repel bees from nest boxes, while simultaneously attracting them to pheromone-baited swarm traps. Shown here is an example experiment using Barn Owl nest boxes. This protocol successfully reduced colonization of Barn Owl nest boxes by Africanized honey bees. This protocol is flexible, allowing adjustments to accommodate a wide range of bird species and habitats. This protocol could benefit conservation efforts where AHB are located.

  1. Standardised test protocol (Constant Score) for evaluation of functionality in patients with shoulder disorders

    DEFF Research Database (Denmark)

    Ban, Ilija; Troelsen, Anders; Christiansen, David Høyrup

    2013-01-01

    INTRODUCTION: The Constant Score (CS), developed as a scoring system to evaluate overall functionality of patients with shoulder disorders, is widely used but has been criticised for relying on an imprecise terminology and for lack of a standardised methodology. A modified guideline was therefore...... differences. One of the authors of the modified CS approved both the English and the Danish test protocol. CONCLUSION: A simple test protocol of the modified CS was developed in both English and Danish. With precise terminology and definitions, the test protocol is the first of its kind. We suggest its use...

  2. Latency correction of event-related potentials between different experimental protocols

    Science.gov (United States)

    Iturrate, I.; Chavarriaga, R.; Montesano, L.; Minguez, J.; Millán, JdR

    2014-06-01

    Objective. A fundamental issue in EEG event-related potentials (ERPs) studies is the amount of data required to have an accurate ERP model. This also impacts the time required to train a classifier for a brain-computer interface (BCI). This issue is mainly due to the poor signal-to-noise ratio and the large fluctuations of the EEG caused by several sources of variability. One of these sources is directly related to the experimental protocol or application designed, and may affect the amplitude or latency of ERPs. This usually prevents BCI classifiers from generalizing among different experimental protocols. In this paper, we analyze the effect of the amplitude and the latency variations among different experimental protocols based on the same type of ERP. Approach. We present a method to analyze and compensate for the latency variations in BCI applications. The algorithm has been tested on two widely used ERPs (P300 and observation error potentials), in three experimental protocols in each case. We report the ERP analysis and single-trial classification. Main results. The results obtained show that the designed experimental protocols significantly affect the latency of the recorded potentials but not the amplitudes. Significance. These results show how the use of latency-corrected data can be used to generalize the BCIs, reducing the calibration time when facing a new experimental protocol.

  3. IEEE 802.11 Wireless LANs: Performance Analysis and Protocol Refinement

    Directory of Open Access Journals (Sweden)

    Chatzimisios P.

    2005-01-01

    Full Text Available The IEEE 802.11 protocol is emerging as a widely used standard and has become the most mature technology for wireless local area networks (WLANs. In this paper, we focus on the tuning of the IEEE 802.11 protocol parameters taking into consideration, in addition to throughput efficiency, performance metrics such as the average packet delay, the probability of a packet being discarded when it reaches the maximum retransmission limit, the average time to drop a packet, and the packet interarrival time. We present an analysis, which has been validated by simulation that is based on a Markov chain model commonly used in the literature. We further study the improvement on these performance metrics by employing suitable protocol parameters according to the specific communication needs of the IEEE 802.11 protocol for both basic access and RTS/CTS access schemes. We show that the use of a higher initial contention window size does not considerably degrade performance in small networks and performs significantly better in any other scenario. Moreover, we conclude that the combination of a lower maximum contention window size and a higher retry limit considerably improves performance. Results indicate that the appropriate adjustment of the protocol parameters enhances performance and improves the services that the IEEE 802.11 protocol provides to various communication applications.

  4. Desensitization to clopidogrel: a tailor-made protocol.

    Science.gov (United States)

    Barreira, P; Cadinha, S; Malheiro, D; Moreira da Silva, J P

    2014-01-01

    Clopidogrel is an antiplatelet drug widely used for treatment and prevention of a variety of cardiovascular diseases. We report a successful desensitization to clopidogrel in a 70-year-old Caucasian man with delayed hypersensitivity (HS) reaction. He developed lip, hand and foot swelling, erythematous papular non-pruritic lesions and arthralgias 2 weeks after starting treatment with clopidogrel 75 mg/d. A 3-hour desensitization protocol was started, achieving a cumulative dose of 154 mg without any reaction, and a daily dose of 75 mg was recommended. On the 4th day, the patient developed skin lesions similar to the previously described. He was treated with topical steroids and oral antihistamines, and the daily dose of clopidogrel was reduced to 20 mg. A new desensitization protocol was established, with a slow dose increment, according to the patient's response. It was only possible to achieve the dose of 75 mg/d after 2 months. Although well tolerated by most patients, HS reactions with clopidogrel may occur and desensitization is rising as a safe alternative in those patients. In delayed reactions with cutaneous lesions, a slower desensitization protocol may be necessary, as in this case.

  5. A mechanical protocol to replicate impact in walking footwear.

    Science.gov (United States)

    Price, Carina; Cooper, Glen; Graham-Smith, Philip; Jones, Richard

    2014-01-01

    Impact testing is undertaken to quantify the shock absorption characteristics of footwear. The current widely reported mechanical testing method mimics the heel impact in running and therefore applies excessive energy to walking footwear. The purpose of this study was to modify the ASTM protocol F1614 (Procedure A) to better represent walking gait. This was achieved by collecting kinematic and kinetic data while participants walked in four different styles of walking footwear (trainer, oxford shoe, flip-flop and triple-density sandal). The quantified heel-velocity and effective mass at ground-impact were then replicated in a mechanical protocol. The kinematic data identified different impact characteristics in the footwear styles. Significantly faster heel velocity towards the floor was recorded walking in the toe-post sandals (flip-flop and triple-density sandal) compared with other conditions (e.g. flip-flop: 0.36±0.05 ms(-1) versus trainer: 0.18±0.06 ms(-1)). The mechanical protocol was adapted by altering the mass and drop height specific to the data captured for each shoe (e.g. flip-flop: drop height 7 mm, mass 16.2 kg). As expected, the adapted mechanical protocol produced significantly lower peak force and accelerometer values than the ASTM protocol (pfootwear style specific. Copyright © 2014 Elsevier B.V. All rights reserved.

  6. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  7. A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.

    Science.gov (United States)

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2015-08-01

    Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based RFID tag authentication protocol in TMIS. Their protocol uses lightweight hash operation and synchronized secret value shared between back-end server and tag, which is more secure and efficient than other related RFID authentication protocols. Unfortunately, in this paper, we demonstrate that Srivastava et al.'s tag authentication protocol has a serious security problem in that an adversary may use the stolen/lost reader to connect to the medical back-end server that store information associated with tagged objects and this privacy damage causing the adversary could reveal medical data obtained from stolen/lost readers in a malicious way. Therefore, we propose a secure and efficient RFID tag authentication protocol to overcome security flaws and improve the system efficiency. Compared with Srivastava et al.'s protocol, the proposed protocol not only inherits the advantages of Srivastava et al.'s authentication protocol for TMIS but also provides better security with high system efficiency.

  8. Integration of the White Sands Complex into a Wide Area Network

    Science.gov (United States)

    Boucher, Phillip Larry; Horan, Sheila, B.

    1996-01-01

    The NASA White Sands Complex (WSC) satellite communications facility consists of two main ground stations, an auxiliary ground station, a technical support facility, and a power plant building located on White Sands Missile Range. When constructed, terrestrial communication access to these facilities was limited to copper telephone circuits. There was no local or wide area communications network capability. This project incorporated a baseband local area network (LAN) topology at WSC and connected it to NASA's wide area network using the Program Support Communications Network-Internet (PSCN-I). A campus-style LAN is configured in conformance with the International Standards Organization (ISO) Open Systems Interconnect (ISO) model. Ethernet provides the physical and data link layers. Transmission Control Protocol and Internet Protocol (TCP/IP) are used for the network and transport layers. The session, presentation, and application layers employ commercial software packages. Copper-based Ethernet collision domains are constructed in each of the primary facilities and these are interconnected by routers over optical fiber links. The network and each of its collision domains are shown to meet IEEE technical configuration guidelines. The optical fiber links are analyzed for the optical power budget and bandwidth allocation and are found to provide sufficient margin for this application. Personal computers and work stations attached to the LAN communicate with and apply a wide variety of local and remote administrative software tools. The Internet connection provides wide area network (WAN) electronic access to other NASA centers and the world wide web (WWW). The WSC network reduces and simplifies the administrative workload while providing enhanced and advanced inter-communications capabilities among White Sands Complex departments and with other NASA centers.

  9. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  10. Compact Modbus TCP/IP protocol for data acquisition systems based on limited hardware resources

    Science.gov (United States)

    Bai, Q.; Jin, B.; Wang, D.; Wang, Y.; Liu, X.

    2018-04-01

    The Modbus TCP/IP has been a standard industry communication protocol and widely utilized for establishing sensor-cloud platforms on the Internet. However, numerous existing data acquisition systems built on traditional single-chip microcontrollers without sufficient resources cannot support it, because the complete Modbus TCP/IP protocol always works dependent on a full operating system which occupies abundant hardware resources. Hence, a compact Modbus TCP/IP protocol is proposed in this work to make it run efficiently and stably even on a resource-limited hardware platform. Firstly, the Modbus TCP/IP protocol stack is analyzed and the refined protocol suite is rebuilt by streamlining the typical TCP/IP suite. Then, specific implementation of every hierarchical layer is respectively presented in detail according to the protocol structure. Besides, the compact protocol is implemented in a traditional microprocessor to validate the feasibility of the scheme. Finally, the performance of the proposed scenario is assessed. The experimental results demonstrate that message packets match the frame format of Modbus TCP/IP protocol and the average bandwidth reaches to 1.15 Mbps. The compact protocol operates stably even based on a traditional microcontroller with only 4-kB RAM and 12-MHz system clock, and no communication congestion or frequent packet loss occurs.

  11. Applying Hypertext Structures to Software Documentation.

    Science.gov (United States)

    French, James C.; And Others

    1997-01-01

    Describes a prototype system for software documentation management called SLEUTH (Software Literacy Enhancing Usefulness to Humans) being developed at the University of Virginia. Highlights include information retrieval techniques, hypertext links that are installed automatically, a WAIS (Wide Area Information Server) search engine, user…

  12. The research and application of the NDP protocol vulnerability attack and the defense technology based on SEND

    Science.gov (United States)

    Xi, Huixing

    2017-05-01

    Neighbor discovery protocol (NDP) is the underlying protocol in the IPv6 protocol, which is mainly used to solve the problem of interconnection between nodes on the same link. But with wide use of IPV6, NDP becomes the main objects of a variety of attacks due to a lack of security mechanism. The paper introduces the working principle of the NDP and methods of how the SEND protocol to enhance NDP security defense. It also analyzes and summarizes the security threats caused by the defects of the protocol itself. On the basis of the SEND protocol, the NDP data packet structure is modified to enhance the security of the SEND. An improved NDP cheating defense technology is put forward to make up the defects of the SEND protocol which can't verify the correctness of the public key and cannot bind the MAC address.

  13. 'BREAKS' Protocol for Breaking Bad News.

    Science.gov (United States)

    Narayanan, Vijayakumar; Bista, Bibek; Koshy, Cheriyan

    2010-05-01

    Information that drastically alters the life world of the patient is termed as bad news. Conveying bad news is a skilled communication, and not at all easy. The amount of truth to be disclosed is subjective. A properly structured and well-orchestrated communication has a positive therapeutic effect. This is a process of negotiation between patient and physician, but physicians often find it difficult due to many reasons. They feel incompetent and are afraid of unleashing a negative reaction from the patient or their relatives. The physician is reminded of his or her own vulnerability to terminal illness, and find themselves powerless over emotional distress. Lack of sufficient training in breaking bad news is a handicap to most physicians and health care workers. Adherence to the principles of client-centered counseling is helpful in attaining this skill. Fundamental insight of the patient is exploited and the bad news is delivered in a structured manner, because the patient is the one who knows what is hurting him most and he is the one who knows how to move forward. Six-step SPIKES protocol is widely used for breaking bad news. In this paper, we put forward another six-step protocol, the BREAKS protocol as a systematic and easy communication strategy for breaking bad news. Development of competence in dealing with difficult situations has positive therapeutic outcome and is a professionally satisfying one.

  14. A review on transport layer protocol performance for delivering video on an adhoc network

    Science.gov (United States)

    Suherman; Suwendri; Al-Akaidi, Marwan

    2017-09-01

    The transport layer protocol is responsible for the end to end data transmission. Transmission control protocol (TCP) provides a reliable connection and user datagram protocol (UDP) offers fast but unguaranteed data transfer. Meanwhile, the 802.11 (wireless fidelity/WiFi) networks have been widely used as internet hotspots. This paper evaluates TCP, TCP variants and UDP performances for video transmission on an adhoc network. The transport protocol - medium access cross-layer is proposed by prioritizing TCP acknowledgement to reduce delay. The NS-2 evaluations show that the average delays increase linearly for all the evaluated protocols and the average packet losses grow logarithmically. UDP produces the lowest transmission delay; 5.4% and 5.8% lower than TCP and TCP variant, but experiences the highest packet loss. Both TCP and TCP Vegas maintain packet loss as low as possible. The proposed cross-layer successfully decreases TCP and TCP Vegas delay about 0.12 % and 0.15%, although losses remain similar.

  15. An improved authenticated key agreement protocol for telecare medicine information system.

    Science.gov (United States)

    Liu, Wenhao; Xie, Qi; Wang, Shengbao; Hu, Bin

    2016-01-01

    In telecare medicine information systems (TMIS), identity authentication of patients plays an important role and has been widely studied in the research field. Generally, it is realized by an authenticated key agreement protocol, and many such protocols were proposed in the literature. Recently, Zhang et al. pointed out that Islam et al.'s protocol suffers from the following security weaknesses: (1) Any legal but malicious patient can reveal other user's identity; (2) An attacker can launch off-line password guessing attack and the impersonation attack if the patient's identity is compromised. Zhang et al. also proposed an improved authenticated key agreement scheme with privacy protection for TMIS. However, in this paper, we point out that Zhang et al.'s scheme cannot resist off-line password guessing attack, and it fails to provide the revocation of lost/stolen smartcard. In order to overcome these weaknesses, we propose an improved protocol, the security and authentication of which can be proven using applied pi calculus based formal verification tool ProVerif.

  16. Download this PDF file

    African Journals Online (AJOL)

    pc

    2018-03-07

    Mar 7, 2018 ... ON COMPARISON OF TECHNOLOGIES AND PROGRESS OF .... government of Malaysia had underlined the SG enforcement through the Malaysia 9th plan. Through the ... Wide Area Information Sharing (WAIS) .... achieving huge amount of funding or sources, therefore some of the private sector are.

  17. Ko Wai Au? Who Am I? Examining the Multiple Identities of Maori Youth

    Science.gov (United States)

    Faircloth, Susan C.; Hynds, Anne; Jacob, Helen; Green, Clint; Thompson, Patrick

    2016-01-01

    In this paper, we present preliminary findings from a unique collaborative research project involving six Deaf Maori rangatahi (youth) in Tamaki Makaurau (Auckland), Aotearoa New Zealand. This study utilized kaupapa whanau (research family) protocols, established in consultation with two cultural advisory groups within New Zealand and the young…

  18. Fluid resuscitation for major burn patients with the TMMU protocol.

    Science.gov (United States)

    Luo, Gaoxing; Peng, Yizhi; Yuan, Zhiqiang; Cheng, Wenguang; Wu, Jun; Tang, Jin; Huang, Yuesheng; Fitzgerald, Mark

    2009-12-01

    Fluid resuscitation is one of the critical treatments for the major burn patient in the early phases after injury. We evaluated the practice of fluid resuscitation for severely burned patients with the Third Military Medical University (TMMU) protocol, which is most widely used in many regions of China. Patients with major burns (>30% total body surface area (TBSA)) presenting to Southwest Hospital, Third Military Medical University, between January 2005 and October 2007, were included in this study. Fluid resuscitation was initiated by the TMMU protocol. A total of 71 patients were (46 adults and 25 children) included in this study. All patients survived the first 48 h after injury smoothly and none developed abdominal compartment syndrome or other recognised complications associated with fluid resuscitation. The average quantity of fluid infused was 3.3-61.33% more than that calculated based on the TMMU protocol in both adult and paediatric groups. The average urine output during the first 24h after injury was about 1.2 ml per kg body weight per hour in the two groups, but reached 1.2 ml and 1.7 ml during the second 24h in adult and pediatric groups, respectively. This study indicates that the TMMU protocol for fluid resuscitation is a feasible option for burn patients. Individualised resuscitation - guided by the physiological response to fluid administration - is still important as in other protocols.

  19. The costs of the Kyoto Protocol in the European Union

    International Nuclear Information System (INIS)

    Viguier, Laurent L.; Babiker, Mustafa H.; Reilly, John M.

    2003-01-01

    We estimate reference CO 2 emission projections in the European Union, and quantify the economic impacts of the Kyoto commitment on Member States. We consider the case where each EU member individually meets a CO 2 emissions target, applying a country-wide cap and trade system to meet the target but without trade among countries. We use a version of the MIT Emissions Prediction and Policy Analysis (EPPA) model, here disaggregated to separately include 9 European Community countries and commercial and household transportation sectors. We compare our results with that of four energy-economic models that have provided detailed analyses of European climate change policy. In the absence of specific additional climate policy measures, the EPPA reference projections of carbon emissions increase by 14% from 1990 levels. The EU-wide target under the Kyoto Protocol to the Framework Convention on Climate Change is a reduction in emissions to 8% below 1990 levels. EPPA emissions projections are similar to other recent modeling results, but there are underlying differences in energy and carbon intensities among the projections. If EU countries were to individually meet the EU allocation of the Community-wide carbon cap specified in the Kyoto Protocol, we find using EPPA that carbon prices vary from $91 in the United Kingdom to $385 in Denmark; welfare costs range from 0.6% to 5%

  20. Using Think Aloud Protocols to Assess E-Prescribing in Community Pharmacies

    Directory of Open Access Journals (Sweden)

    Olufunmilola K. Odukoya, BPharm, MS

    2012-01-01

    Full Text Available Introduction: Think aloud protocol has rarely been used as a method of data collection in community pharmacies.Purpose: The aim of the report is to describe how think aloud protocols were used to identify issues that arise when using e-prescribing technology in pharmacies. In this paper, we report on the benefits and challenges of using think aloud protocols in pharmacies to examine the use of e-prescribing systems.Methods: Sixteen pharmacists and pharmacy technicians were recruited from seven community pharmacies in Wisconsin. Data were collected using direct observation alongside think aloud protocol. Direct observations and think aloud protocols took place between January-February, 2011. Participants were asked to verbalize their thoughts as they process electronic prescriptions.Results: Participants identified weaknesses in e-prescribing that they had previously not conceived. This created heightened awareness for vigilance when processing e-prescriptions. The main challenge with using think aloud protocols was due to interruptions in the pharmacies. Also, a few participants found it challenging to remember to continue verbalizing their thought process during think aloud sessions.Conclusion: The use of think aloud protocols as method of data collection is a new way for understanding the issues related to technology use in community pharmacy practice. Think aloud protocol was beneficial in providing objective information on e-prescribing use not solely based on pharmacist’s or technician’s opinion of the technology. This method provided detailed information on a wide variety of real time challenges with e-prescribing technology use in community pharmacies. Using this data collection method can help identify potential patient safety issues when using e-prescribing and suggestions for redesign.

  1. Allowing Students to Select Deliverables for Peer Review: Analysis of a Free-Selection Protocol

    DEFF Research Database (Denmark)

    Papadopoulos, Pantelis M.; Lagkas, Thomas; Demetriadis, Stavros

    2011-01-01

    This study analyzes the benefits and limitations of a “free-selection” peer assignment protocol by comparing them to the widely implemented “assigned-pair” protocol. The primary motivation was to circumvent the issues that often appear to the instructors implementing peer review activities with pre......-Selection, where students were able to explore and select peer work for review. Result analysis showed a very strong tendency in favor of the Free-Selection students regarding both domain specific (conceptual) and domain-general (reviewing) knowledge....

  2. Wireless Intelligent Sensors Management Application Protocol-WISMAP

    Directory of Open Access Journals (Sweden)

    Antonio Jesus Yuste-Delgado

    2010-09-01

    Full Text Available Although many recent studies have focused on the development of new applications for wireless sensor networks, less attention has been paid to knowledge-based sensor nodes. The objective of this work is the development in a real network of a new distributed system in which every sensor node can execute a set of applications, such as fuzzy ruled-base systems, measures, and actions. The sensor software is based on a multi-agent structure that is composed of three components: management, application control, and communication agents; a service interface, which provides applications the abstraction of sensor hardware and other components; and an application layer protocol. The results show the effectiveness of the communication protocol and that the proposed system is suitable for a wide range of applications. As real world applications, this work presents an example of a fuzzy rule-based system and a noise pollution monitoring application that obtains a fuzzy noise indicator.

  3. Computer network time synchronization the network time protocol on earth and in space

    CERN Document Server

    Mills, David L

    2010-01-01

    Carefully coordinated, reliable, and accurate time synchronization is vital to a wide spectrum of fields-from air and ground traffic control, to buying and selling goods and services, to TV network programming. Ill-gotten time could even lead to the unimaginable and cause DNS caches to expire, leaving the entire Internet to implode on the root servers.Written by the original developer of the Network Time Protocol (NTP), Computer Network Time Synchronization: The Network Time Protocol on Earth and in Space, Second Edition addresses the technological infrastructure of time dissemination, distrib

  4. Simple proof of the unconditional security of the Bennett 1992 quantum key distribution protocol

    International Nuclear Information System (INIS)

    Zhang Quan; Tang Chaojing

    2002-01-01

    It is generally accepted that quantum key distribution (QKD) could supply legitimate users with unconditional security during their communication. Quite a lot of satisfactory efforts have been achieved on experimentations with quantum cryptography. However, when the eavesdropper has extra-powerful computational ability, has access to a quantum computer, for example, and can carry into execution any eavesdropping measurement that is allowed by the laws of physics, the security against such attacks has not been widely studied and rigorously proved for most QKD protocols. Quite recently, Shor and Preskill proved concisely the unconditional security of the Bennett-Brassard 1984 (BB84) protocol. Their method is highly valued for its clarity of concept and concision of form. In order to take advantage of the Shor-Preskill technique in their proof of the unconditional security of the BB84 QKD protocol, we introduced in this paper a transformation that can translate the Bennett 1992 (B92) protocol into the BB84 protocol. By proving that the transformation leaks no more information to the eavesdropper, we proved the unconditional security of the B92 protocol. We also settled the problem proposed by Lo about how to prove the unconditional security of the B92 protocol with the Shor-Preskill method

  5. Role of Librarian in Internet and World Wide Web Environment

    OpenAIRE

    K. Nageswara Rao; KH Babu

    2001-01-01

    The transition of traditional library collections to digital or virtual collections presented the librarian with new opportunities. The Internet, Web en-vironment and associated sophisticated tools have given the librarian a new dynamic role to play and serve the new information based society in bet-ter ways than hitherto. Because of the powerful features of Web i.e. distributed, heterogeneous, collaborative, multimedia, multi-protocol, hyperme-dia-oriented architecture, World Wide Web has re...

  6. IDMA-Based MAC Protocol for Satellite Networks with Consideration on Channel Quality

    Directory of Open Access Journals (Sweden)

    Gongliang Liu

    2014-01-01

    Full Text Available In order to overcome the shortcomings of existing medium access control (MAC protocols based on TDMA or CDMA in satellite networks, interleave division multiple access (IDMA technique is introduced into satellite communication networks. Therefore, a novel wide-band IDMA MAC protocol based on channel quality is proposed in this paper, consisting of a dynamic power allocation algorithm, a rate adaptation algorithm, and a call admission control (CAC scheme. Firstly, the power allocation algorithm combining the technique of IDMA SINR-evolution and channel quality prediction is developed to guarantee high power efficiency even in terrible channel conditions. Secondly, the effective rate adaptation algorithm, based on accurate channel information per timeslot and by the means of rate degradation, can be realized. What is more, based on channel quality prediction, the CAC scheme, combining the new power allocation algorithm, rate scheduling, and buffering strategies together, is proposed for the emerging IDMA systems, which can support a variety of traffic types, and offering quality of service (QoS requirements corresponding to different priority levels. Simulation results show that the new wide-band IDMA MAC protocol can make accurate estimation of available resource considering the effect of multiuser detection (MUD and QoS requirements of multimedia traffic, leading to low outage probability as well as high overall system throughput.

  7. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  8. A minimal cost micropropagation protocol for Dianthus caryophyllus L.-- a commercially significant venture.

    Science.gov (United States)

    Pant, Manu

    2016-03-01

    In tissue culture, high production cost of the products restricts their reach. Though tissue culture is a major strength in floriculture it is marred by pricing issues. Hence, we developed a complete regeneration low cost micropropagation protocol for an economically important floriculture crop, carnation (Dianthus caryophyllus L.). Successful regeneration of carnation from nodal explants on cost-efficient medium indicates that psyllium husk, sugar and RO water can effectively replace the conventional medium comprising agar, sucrose and distilled water. The protocol can contribute to increased carnation production at comparatively reduced cost, and there by encourage wide scale adoption by the common growers.

  9. Survey is based on Synchronized and Asynchronized Approach of MAC Protocols in WSN

    Directory of Open Access Journals (Sweden)

    Soni Chaurasia

    2010-07-01

    Full Text Available A wireless network is made of spatially distributed autonomous devices. These devices are called sensors. The sensor is used for monitoring physical or environmental conditions. The potential application of wireless sensor network is environmental monitoring, healthcare applications and tactical systems. In this paper focus is on the MAC protocol for WSN. Wireless sensor network is deployed for wide range to send and receive data with the help of medium. Here literature survey of MAC protocol based on the synchronized and asynchronized approach is described which is used to meet different objective like access a medium, statistical channel allocation, spectrum utilization

  10. Genome-wide analysis of replication timing by next-generation sequencing with E/L Repli-seq.

    Science.gov (United States)

    Marchal, Claire; Sasaki, Takayo; Vera, Daniel; Wilson, Korey; Sima, Jiao; Rivera-Mulia, Juan Carlos; Trevilla-García, Claudia; Nogues, Coralin; Nafie, Ebtesam; Gilbert, David M

    2018-05-01

    This protocol is an extension to: Nat. Protoc. 6, 870-895 (2014); doi:10.1038/nprot.2011.328; published online 02 June 2011Cycling cells duplicate their DNA content during S phase, following a defined program called replication timing (RT). Early- and late-replicating regions differ in terms of mutation rates, transcriptional activity, chromatin marks and subnuclear position. Moreover, RT is regulated during development and is altered in diseases. Here, we describe E/L Repli-seq, an extension of our Repli-chip protocol. E/L Repli-seq is a rapid, robust and relatively inexpensive protocol for analyzing RT by next-generation sequencing (NGS), allowing genome-wide assessment of how cellular processes are linked to RT. Briefly, cells are pulse-labeled with BrdU, and early and late S-phase fractions are sorted by flow cytometry. Labeled nascent DNA is immunoprecipitated from both fractions and sequenced. Data processing leads to a single bedGraph file containing the ratio of nascent DNA from early versus late S-phase fractions. The results are comparable to those of Repli-chip, with the additional benefits of genome-wide sequence information and an increased dynamic range. We also provide computational pipelines for downstream analyses, for parsing phased genomes using single-nucleotide polymorphisms (SNPs) to analyze RT allelic asynchrony, and for direct comparison to Repli-chip data. This protocol can be performed in up to 3 d before sequencing, and requires basic cellular and molecular biology skills, as well as a basic understanding of Unix and R.

  11. Generation of meiomaps of genome-wide recombination and chromosome segregation in human oocytes

    DEFF Research Database (Denmark)

    Ottolini, Christian S; Capalbo, Antonio; Newnham, Louise

    2016-01-01

    We have developed a protocol for the generation of genome-wide maps (meiomaps) of recombination and chromosome segregation for the three products of human female meiosis: the first and second polar bodies (PB1 and PB2) and the corresponding oocyte. PB1 is biopsied and the oocyte is artificially......-nucleotide polymorphisms (SNPs) genome-wide by microarray. Informative maternal heterozygous SNPs are phased using a haploid PB2 or oocyte as a reference. A simple algorithm is then used to identify the maternal haplotypes for each chromosome, in all of the products of meiosis for each oocyte. This allows mapping...

  12. Surface formation, preservation, and history of low-porosity crusts at the WAIS Divide site, West Antarctica

    Science.gov (United States)

    Fegyveresi, John M.; Alley, Richard B.; Muto, Atsuhiro; Orsi, Anaïs J.; Spencer, Matthew K.

    2018-01-01

    Observations at the West Antarctic Ice Sheet (WAIS) Divide site show that near-surface snow is strongly altered by weather-related processes such as strong winds and temperature fluctuations, producing features that are recognizable in the deep ice core. Prominent glazed surface crusts develop frequently at the site during summer seasons. Surface, snow pit, and ice core observations made in this study during summer field seasons from 2008-2009 to 2012-2013, supplemented by automated weather station (AWS) data with short- and longwave radiation sensors, revealed that such crusts formed during relatively low-wind, low-humidity, clear-sky periods with intense daytime sunshine. After formation, such glazed surfaces typically developed cracks in a polygonal pattern likely from thermal contraction at night. Cracking was commonest when several clear days occurred in succession and was generally followed by surface hoar growth; vapor escaping through the cracks during sunny days may have contributed to the high humidity that favored nighttime formation of surface hoar. Temperature and radiation observations show that daytime solar heating often warmed the near-surface snow above the air temperature, contributing to upward mass transfer, favoring crust formation from below, and then surface hoar formation. A simple surface energy calculation supports this observation. Subsequent examination of the WDC06A deep ice core revealed that crusts are preserved through the bubbly ice, and some occur in snow accumulated during winters, although not as commonly as in summertime deposits. Although no one has been on site to observe crust formation during winter, it may be favored by greater wintertime wind packing from stronger peak winds, high temperatures and steep temperature gradients from rapid midwinter warmings reaching as high as -15 °C, and perhaps longer intervals of surface stability. Time variations in crust occurrence in the core may provide paleoclimatic information

  13. Surface formation, preservation, and history of low-porosity crusts at the WAIS Divide site, West Antarctica

    Directory of Open Access Journals (Sweden)

    J. M. Fegyveresi

    2018-01-01

    Full Text Available Observations at the West Antarctic Ice Sheet (WAIS Divide site show that near-surface snow is strongly altered by weather-related processes such as strong winds and temperature fluctuations, producing features that are recognizable in the deep ice core. Prominent glazed surface crusts develop frequently at the site during summer seasons. Surface, snow pit, and ice core observations made in this study during summer field seasons from 2008–2009 to 2012–2013, supplemented by automated weather station (AWS data with short- and longwave radiation sensors, revealed that such crusts formed during relatively low-wind, low-humidity, clear-sky periods with intense daytime sunshine. After formation, such glazed surfaces typically developed cracks in a polygonal pattern likely from thermal contraction at night. Cracking was commonest when several clear days occurred in succession and was generally followed by surface hoar growth; vapor escaping through the cracks during sunny days may have contributed to the high humidity that favored nighttime formation of surface hoar. Temperature and radiation observations show that daytime solar heating often warmed the near-surface snow above the air temperature, contributing to upward mass transfer, favoring crust formation from below, and then surface hoar formation. A simple surface energy calculation supports this observation. Subsequent examination of the WDC06A deep ice core revealed that crusts are preserved through the bubbly ice, and some occur in snow accumulated during winters, although not as commonly as in summertime deposits. Although no one has been on site to observe crust formation during winter, it may be favored by greater wintertime wind packing from stronger peak winds, high temperatures and steep temperature gradients from rapid midwinter warmings reaching as high as −15 °C, and perhaps longer intervals of surface stability. Time variations in crust occurrence in the core may provide

  14. A review of tags anti-collision and localization protocols in RFID networks.

    Science.gov (United States)

    Ullah, S; Alsalih, W; Alsehaim, A; Alsadhan, N

    2012-12-01

    Radio Frequency IDentification (RFID) has allowed the realization of ubiquitous tracking and monitoring of physical objects wirelessly with minimum human interactions. It plays a key role in a wide range of applications including asset tracking, contactless payment, access control, transportation and logistics, and other industrial applications. On the other side, RFID systems face several technical challenges that need to be overcome in order to achieve their potential benefits; tags collisions and localization of tagged objects are two important challenges. Numerous anti-collision and localization protocols have been proposed to address these challenges. This paper reviews the state-of-art tags' anti-collision and localization protocols, and provides a deep insight into technical issues of these protocols. The probabilistic and deterministic anti-collision protocols are critically studied and compared in terms of different parameters. We further review distance estimation, scene analysis, and proximity localization schemes and provide useful suggestions. We also introduce a new hybrid direction that utilizes power control to spatially partition the interrogation range of a reader for more efficient anti-collision and localization. Finally, we present the applications of RFID systems in healthcare sectors.

  15. An optimized protocol for isolating primary epithelial cell chromatin for ChIP.

    Directory of Open Access Journals (Sweden)

    James A Browne

    Full Text Available A critical part of generating robust chromatin immunoprecipitation (ChIP data is the optimization of chromatin purification and size selection. This is particularly important when ChIP is combined with next-generation sequencing (ChIP-seq to identify targets of DNA-binding proteins, genome-wide. Current protocols refined by the ENCODE consortium generally use a two-step cell lysis procedure that is applicable to a wide variety of cell types. However, the isolation and size selection of chromatin from primary human epithelial cells may often be particularly challenging. These cells tend to form sheets of formaldehyde cross-linked material in which cells are resistant to membrane lysis, nuclei are not released and subsequent sonication produces extensive high molecular weight contamination. Here we describe an optimized protocol to prepare high quality ChIP-grade chromatin from primary human bronchial epithelial cells. The ENCODE protocol was used as a starting point to which we added the following key steps to separate the sheets of formaldehyde-fixed cells prior to lysis. (1 Incubation of the formaldehyde-fixed adherent cells in Trypsin-EDTA (0.25% room temperature for no longer than 5 min. (2 Equilibration of the fixed cells in detergent-free lysis buffers prior to each lysis step. (3 The addition of 0.5% Triton X-100 to the complete cell membrane lysis buffer. (4 Passing the cell suspension (in complete cell membrane lysis buffer through a 25-gauge needle followed by continuous agitation on ice for 35 min. Each step of the modified protocol was documented by light microscopy using the Methyl Green-Pyronin dual dye, which stains cytoplasm red (Pyronin and the nuclei grey-blue (Methyl green. This modified method is reproducibly effective at producing high quality sheared chromatin for ChIP and is equally applicable to other epithelial cell types.

  16. A Review on State of Art Variants of LEACH Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yuvaraj P.

    2015-03-01

    Full Text Available Recent advances in wireless communication lead to many improvements in application specific wireless sensor network (WSN deployment. Sensing different data from different environments is essential to monitor and control the situations. For instance, it is very important to sense the forest fire as early as possible to control the upshot. So efficient and timely gathering of the data from a network of small sensor nodes is necessary. In WSN, the small sized sensor nodes are working with very small batteries with limited energy. Since those are randomly deployed over a wide area, replacement of battery or recharging is not feasible. So, for getting prolonged life time of WSN, energy efficient operation is the key factor. Among many protocols proposed for enhancing the life time of WSN, the clustering based hierarchical protocols are popular and gaining the attention of researchers because of their high energy efficiency. Low Energy Adaptive Clustering Hierarchy (LEACH is energy efficient hierarchical, clustering based protocol. It is considered as the base of many hierarchical clustering protocols. In this paper, some of the recent tailored protocols proposed to strengthen LEACH are examined.

  17. A Survey of MAC Protocols for Cognitive Radio Body Area Networks.

    Science.gov (United States)

    Bhandari, Sabin; Moh, Sangman

    2015-04-20

    The advancement in electronics, wireless communications and integrated circuits has enabled the development of small low-power sensors and actuators that can be placed on, in or around the human body. A wireless body area network (WBAN) can be effectively used to deliver the sensory data to a central server, where it can be monitored, stored and analyzed. For more than a decade, cognitive radio (CR) technology has been widely adopted in wireless networks, as it utilizes the available spectra of licensed, as well as unlicensed bands. A cognitive radio body area network (CRBAN) is a CR-enabled WBAN. Unlike other wireless networks, CRBANs have specific requirements, such as being able to automatically sense their environments and to utilize unused, licensed spectra without interfering with licensed users, but existing protocols cannot fulfill them. In particular, the medium access control (MAC) layer plays a key role in cognitive radio functions, such as channel sensing, resource allocation, spectrum mobility and spectrum sharing. To address various application-specific requirements in CRBANs, several MAC protocols have been proposed in the literature. In this paper, we survey MAC protocols for CRBANs. We then compare the different MAC protocols with one another and discuss challenging open issues in the relevant research.

  18. ′BREAKS′ protocol for breaking bad news

    Directory of Open Access Journals (Sweden)

    Vijayakumar Narayanan

    2010-01-01

    Full Text Available Information that drastically alters the life world of the patient is termed as bad news. Conveying bad news is a skilled communication, and not at all easy. The amount of truth to be disclosed is subjective. A properly structured and well-orchestrated communication has a positive therapeutic effect. This is a process of negotiation between patient and physician, but physicians often find it difficult due to many reasons. They feel incompetent and are afraid of unleashing a negative reaction from the patient or their relatives. The physician is reminded of his or her own vulnerability to terminal illness, and find themselves powerless over emotional distress. Lack of sufficient training in breaking bad news is a handicap to most physicians and health care workers. Adherence to the principles of client-centered counseling is helpful in attaining this skill. Fundamental insight of the patient is exploited and the bad news is delivered in a structured manner, because the patient is the one who knows what is hurting him most and he is the one who knows how to move forward. Six-step SPIKES protocol is widely used for breaking bad news. In this paper, we put forward another six-step protocol, the BREAKS protocol as a systematic and easy communication strategy for breaking bad news. Development of competence in dealing with difficult situations has positive therapeutic outcome and is a professionally satisfying one.

  19. ‘BREAKS’ Protocol for Breaking Bad News

    Science.gov (United States)

    Narayanan, Vijayakumar; Bista, Bibek; Koshy, Cheriyan

    2010-01-01

    Information that drastically alters the life world of the patient is termed as bad news. Conveying bad news is a skilled communication, and not at all easy. The amount of truth to be disclosed is subjective. A properly structured and well-orchestrated communication has a positive therapeutic effect. This is a process of negotiation between patient and physician, but physicians often find it difficult due to many reasons. They feel incompetent and are afraid of unleashing a negative reaction from the patient or their relatives. The physician is reminded of his or her own vulnerability to terminal illness, and find themselves powerless over emotional distress. Lack of sufficient training in breaking bad news is a handicap to most physicians and health care workers. Adherence to the principles of client-centered counseling is helpful in attaining this skill. Fundamental insight of the patient is exploited and the bad news is delivered in a structured manner, because the patient is the one who knows what is hurting him most and he is the one who knows how to move forward. Six-step SPIKES protocol is widely used for breaking bad news. In this paper, we put forward another six-step protocol, the BREAKS protocol as a systematic and easy communication strategy for breaking bad news. Development of competence in dealing with difficult situations has positive therapeutic outcome and is a professionally satisfying one. PMID:21811349

  20. Two-Layer Hierarchy Optimization Model for Communication Protocol in Railway Wireless Monitoring Networks

    Directory of Open Access Journals (Sweden)

    Xiaoping Ma

    2018-01-01

    Full Text Available The wireless monitoring system is always destroyed by the insufficient energy of the sensors in railway. Hence, how to optimize the communication protocol and extend the system lifetime is crucial to ensure the stability of system. However, the existing studies focused primarily on cluster-based or multihop protocols individually, which are ineffective in coping with the complex communication scenarios in the railway wireless monitoring system (RWMS. This study proposes a hybrid protocol which combines the cluster-based and multihop protocols (CMCP to minimize and balance the energy consumption in different sections of the RWMS. In the first hierarchy, the total energy consumption is minimized by optimizing the cluster quantities in the cluster-based protocol and the number of hops and the corresponding hop distances in the multihop protocol. In the second hierarchy, the energy consumption is balanced through rotating the cluster head (CH in the subnetworks and further optimizing the hops and the corresponding hop distances in the backbone network. On this basis, the system lifetime is maximized with the minimum and balance energy consumption among the sensors. Furthermore, the hybrid particle swarm optimization and genetic algorithm (PSO-GA are adopted to optimize the energy consumption from the two-layer hierarchy. Finally, the effectiveness of the proposed CMCP is verified in the simulation. The performances of the proposed CMCP in system lifetime, residual energy, and the corresponding variance are all superior to the LEACH protocol widely applied in the previous research. The effective protocol proposed in this study can facilitate the application of the wireless monitoring network in the railway system and enhance safety operation of the railway.

  1. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  2. A Protocol for the Comprehensive Flow Cytometric Analysis of Immune Cells in Normal and Inflamed Murine Non-Lymphoid Tissues

    Science.gov (United States)

    Yu, Yen-Rei A.; O’Koren, Emily G.; Hotten, Danielle F.; Kan, Matthew J.; Kopin, David; Nelson, Erik R.; Que, Loretta; Gunn, Michael D.

    2016-01-01

    Flow cytometry is used extensively to examine immune cells in non-lymphoid tissues. However, a method of flow cytometric analysis that is both comprehensive and widely applicable has not been described. We developed a protocol for the flow cytometric analysis of non-lymphoid tissues, including methods of tissue preparation, a 10-fluorochrome panel for cell staining, and a standardized gating strategy, that allows the simultaneous identification and quantification of all major immune cell types in a variety of normal and inflamed non-lymphoid tissues. We demonstrate that our basic protocol minimizes cell loss, reliably distinguishes macrophages from dendritic cells (DC), and identifies all major granulocytic and mononuclear phagocytic cell types. This protocol is able to accurately quantify 11 distinct immune cell types, including T cells, B cells, NK cells, neutrophils, eosinophils, inflammatory monocytes, resident monocytes, alveolar macrophages, resident/interstitial macrophages, CD11b- DC, and CD11b+ DC, in normal lung, heart, liver, kidney, intestine, skin, eyes, and mammary gland. We also characterized the expression patterns of several commonly used myeloid and macrophage markers. This basic protocol can be expanded to identify additional cell types such as mast cells, basophils, and plasmacytoid DC, or perform detailed phenotyping of specific cell types. In examining models of primary and metastatic mammary tumors, this protocol allowed the identification of several distinct tumor associated macrophage phenotypes, the appearance of which was highly specific to individual tumor cell lines. This protocol provides a valuable tool to examine immune cell repertoires and follow immune responses in a wide variety of tissues and experimental conditions. PMID:26938654

  3. Neuroimaging for non-accidental head injury in childhood: A proposed protocol

    International Nuclear Information System (INIS)

    Jaspan, T.; Griffiths, P.D.; McConachie, N.S.; Punt, J.A.G.

    2003-01-01

    Non-accidental head injury (NAHI) is a major cause of neurological disability and death during infancy. Radiological imaging plays a crucial role in evaluating craniospinal injury, both for guiding medical management and the forensic aspects of abusive trauma. The damage sustained is varied, complex and may be accompanied by an evolving pattern of brain injury secondary to a cascade of metabolic and physiological derangements. Regrettably, many cases are poorly or incompletely evaluated leading to diagnostic errors and difficulties in executing subsequent child care or criminal proceedings. It is evident, from cases referred to the authors, that imaging protocols for NAHI are lacking (or only loosely adhered to, if present) in many centres throughout the U.K. Future research in this field will also be hampered if there is a lack of consistent and reliable radiological data. There is no nationally agreed protocol for imaging NAHI. We propose such a protocol, based upon a wide experience in the medical management of child abuse and extensive involvement in the medicolegal aspects of NAHI. Jaspan, T., et al. (2003). Clinical Radiology58, 44--53

  4. Neuroimaging for non-accidental head injury in childhood: A proposed protocol

    Energy Technology Data Exchange (ETDEWEB)

    Jaspan, T.; Griffiths, P.D.; McConachie, N.S.; Punt, J.A.G

    2003-01-01

    Non-accidental head injury (NAHI) is a major cause of neurological disability and death during infancy. Radiological imaging plays a crucial role in evaluating craniospinal injury, both for guiding medical management and the forensic aspects of abusive trauma. The damage sustained is varied, complex and may be accompanied by an evolving pattern of brain injury secondary to a cascade of metabolic and physiological derangements. Regrettably, many cases are poorly or incompletely evaluated leading to diagnostic errors and difficulties in executing subsequent child care or criminal proceedings. It is evident, from cases referred to the authors, that imaging protocols for NAHI are lacking (or only loosely adhered to, if present) in many centres throughout the U.K. Future research in this field will also be hampered if there is a lack of consistent and reliable radiological data. There is no nationally agreed protocol for imaging NAHI. We propose such a protocol, based upon a wide experience in the medical management of child abuse and extensive involvement in the medicolegal aspects of NAHI. Jaspan, T., et al. (2003). Clinical Radiology58, 44--53.

  5. Measurement properties of the Brazilian version of the Working Alliance Inventory (patient and therapist short-forms) and Session Rating Scale for low back pain.

    Science.gov (United States)

    Araujo, Amanda Costa; Filho, Rúben Negrão; Oliveira, Crystian B; Ferreira, Paulo H; Pinto, Rafael Z

    2017-01-01

    In the low back pain (LBP) field, therapeutic alliance is considered a non-specific factor of interventions associated with improvements in clinical outcomes. However, there is a paucity of studies aimed to evaluate measurement properties of tools used to objectively quantify the alliance between therapist and patients, such as the Working Alliance Inventory (WAI) and Session Rating Scale (SRS). To translate and cross-culturally adapt the short-form version of WAI - therapist and SRS into Brazilian Portuguese; to investigate the measurement properties, of the WAI-Patient, WAI-Therapist and SRS in patients with LBP and their physical therapists, respectively. One hundred patients with LBP and 18 physical therapists were recruited from physical therapy clinics in Brazil. Therapeutic alliance measures were collected at the initial assessment, prior to the second session, and at 2-month follow-up. The measurement properties investigated were reproducibility, internal consistency, ceiling/floor effects and responsiveness. Although WAI-Patient, WAI-Therapist and SRS were considered to have acceptable test-retest reliability (ICC2,1 > 0.70), these questionnaires showed problems with other measurement properties. WAI-Patient showed problems with internal consistency (i.e. Cronbach's alpha 15% of participants with the maximum score) and poor internal responsiveness were found for the WAI-Patient (Effect size = 0.15; 84% CI: 0.04 to 0.29) and for the SRS (Effect size = 0.05; 84% CI: -0.22 to 0.11). The WAI-Therapist revealed slightly better measurement properties. We identified psychometric limitations with most measurement properties of the WAI questionnaires and SRS. Future studies are needed to refine these tools.

  6. An Energy-efficient Clock Synchronization Protocol for Wireless Sensor Networks

    OpenAIRE

    Albu, Roxana; Labit, Yann; Thierry, Gayraud; Pascal, Berthou

    2010-01-01

    5p.; International audience; The behavior of Wireless Sensor Networks (WSN) is nowadays widely analyzed. One of the most important issues is related to their energy consumption, as this has a major impact on the network lifetime. Another important application requirement is to ensure data sensing synchronization, which leads to additional energy consumption as a high number of messages is sent and received at each node. Our proposal consists in implementing a combined synchronization protocol...

  7. Implementation and Analysis of Real-Time Streaming Protocols.

    Science.gov (United States)

    Santos-González, Iván; Rivero-García, Alexandra; Molina-Gil, Jezabel; Caballero-Gil, Pino

    2017-04-12

    Communication media have become the primary way of interaction thanks to the discovery and innovation of many new technologies. One of the most widely used communication systems today is video streaming, which is constantly evolving. Such communications are a good alternative to face-to-face meetings, and are therefore very useful for coping with many problems caused by distance. However, they suffer from different issues such as bandwidth limitation, network congestion, energy efficiency, cost, reliability and connectivity. Hence, the quality of service and the quality of experience are considered the two most important issues for this type of communication. This work presents a complete comparative study of two of the most used protocols of video streaming, Real Time Streaming Protocol (RTSP) and the Web Real-Time Communication (WebRTC). In addition, this paper proposes two new mobile applications that implement those protocols in Android whose objective is to know how they are influenced by the aspects that most affect the streaming quality of service, which are the connection establishment time and the stream reception time. The new video streaming applications are also compared with the most popular video streaming applications for Android, and the experimental results of the analysis show that the developed WebRTC implementation improves the performance of the most popular video streaming applications with respect to the stream packet delay.

  8. Application of World Wide Web (W3) Technologies in Payload Operations

    Science.gov (United States)

    Sun, Charles; Windrem, May; Picinich, Lou

    1996-01-01

    World Wide Web (W3) technologies are considered in relation to their application to space missions. It is considered that such technologies, including the hypertext transfer protocol and the Java object-oriented language, offer a powerful and relatively inexpensive framework for distributed application software development. The suitability of these technologies for payload monitoring systems development is discussed, and the experience gained from the development of an insect habitat monitoring system based on W3 technologies is reported.

  9. 12-Mo Intervention of Physical Exercise Improved Work Ability, Especially in Subjects with Low Baseline Work Ability

    Directory of Open Access Journals (Sweden)

    Oili Kettunen

    2014-04-01

    Full Text Available Objectives: This study’s objective was to assess the effects of a 12-month physical exercise intervention on work ability (WAI and cardiorespiratory fitness (CRF in healthy working adults. Methods: The study group had 371 participants, of which 338 (212 women and 126 men were allocated in the exercise group and 33 (17 women and 16 men in the control group. The exercise group underwent a 12-month exercise program followed by a 12-month follow-up. WAI and CRF were evaluated at baseline, and at 4, 8, 12, and 24 study months, in both exercise and control groups. The exercise group was divided into subgroups according to baseline WAI classifications (poor/moderate, good, excellent. Results: During the 12-month exercise intervention, the exercise group increased their leisure-time physical activity by 71% (p = 0.016 and improved the mean WAI by 3% and CRF by 7% (p < 0.0001, in both, while WAI and CRF decreased in the control group (ANCOVA using age, sex and BMI as covariates, for WAI, p = 0.013 and for CRF, p = 0.008. The changes in WAI and CRF between the exercise group and control group were significantly different during the intervention (baseline vs. 12-months, p = 0.028 and p = 0.007 and after the follow-up (p = 0.001 and p = 0.040, respectively. A light positive correlation between the changes in WAI and in CRF (r = 0.19, p < 0.01 existed. WAI improvement was the highest (13%, p < 0.0001 in the subgroup having poor/moderate WAI at baseline (ANCOVA, p < 0.001. Conclusions: The improvement of WAI associated with CRF. These results suggest that a physical exercise intervention may improve work ability.

  10. The HPA photon protocol and proposed electron protocol

    International Nuclear Information System (INIS)

    Pitchford, W.G.

    1985-01-01

    The Hospital Physicists Association (HPA) photon dosimetry protocol has been produced and was published in 1983. Revised values of some components of Csub(lambda) and refinements introduced into the theory in the last few years have enabled new Csub(lambda) values to be produced. The proposed HPA electron protocol is at present in draft form and will be published shortly. Both protocels are discussed. (Auth.)

  11. [Professor Xu Fu-song's traditional Chinese medicine protocols for male diseases: A descriptive analysis].

    Science.gov (United States)

    Liu, Cheng-yong; Xu, Fu-song

    2015-04-01

    To analyze the efficacy and medication principles of Professor Xu Fu-songs traditional Chinese medicine (TCM) protocols for male diseases. We reviewed and descriptively analyzed the unpublished complete medical records of 100 male cases treated by Professor Xu Fu-song with his TCM protocols from 1978 to 1992. The 100 cases involved 32 male diseases, most of which were difficult and complicated cases. The drug compliance was 95%. Each prescription was made up of 14 traditional Chinese drugs on average. The cure rate was 32% , and the effective rate was 85%. Professor Xu Fu-song advanced and proved some new theories and therapeutic methods. Professor Xu Fu-song's TCM protocols can be applied to a wide range of male diseases, mostly complicated, and are characterized by accurate differentiation of symptoms and signs, high drug compliance, and excellent therapeutic efficacy.

  12. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  13. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  14. Development of a bedside viable ultrasound protocol to quantify appendicular lean tissue mass.

    Science.gov (United States)

    Paris, Michael T; Lafleur, Benoit; Dubin, Joel A; Mourtzakis, Marina

    2017-10-01

    Ultrasound is a non-invasive and readily available tool that can be prospectively applied at the bedside to assess muscle mass in clinical settings. The four-site protocol, which images two anatomical sites on each quadriceps, may be a viable bedside method, but its ability to predict musculature has not been compared against whole-body reference methods. Our primary objectives were to (i) compare the four-site protocol's ability to predict appendicular lean tissue mass from dual-energy X-ray absorptiometry; (ii) optimize the predictability of the four-site protocol with additional anatomical muscle thicknesses and easily obtained covariates; and (iii) assess the ability of the optimized protocol to identify individuals with low lean tissue mass. This observational cross-sectional study recruited 96 university and community dwelling adults. Participants underwent ultrasound scans for assessment of muscle thickness and whole-body dual-energy X-ray absorptiometry scans for assessment of appendicular lean tissue. Ultrasound protocols included (i) the nine-site protocol, which images nine anterior and posterior muscle groups in supine and prone positions, and (ii) the four-site protocol, which images two anterior sites on each quadriceps muscle group in a supine position. The four-site protocol was strongly associated (R 2  = 0.72) with appendicular lean tissue mass, but Bland-Altman analysis displayed wide limits of agreement (-5.67, 5.67 kg). Incorporating the anterior upper arm muscle thickness, and covariates age and sex, alongside the four-site protocol, improved the association (R 2  = 0.91) with appendicular lean tissue and displayed narrower limits of agreement (-3.18, 3.18 kg). The optimized protocol demonstrated a strong ability to identify low lean tissue mass (area under the curve = 0.89). The four-site protocol can be improved with the addition of the anterior upper arm muscle thickness, sex, and age when predicting appendicular lean tissue mass

  15. Efficacy of a sedo-analgesia protocol in pre-hospital trauma treatment

    Directory of Open Access Journals (Sweden)

    Savino Occhionorelli

    2013-06-01

    Full Text Available Pre-hospital trauma treatment is an important situation in which pain should be appropriately assessed and treated, but there is a great lack of studies about it. Literature has widely pointed out that the underanalgesia problem is spread to all groups of patients. The objective of the study is to verify the efficacy of a sedation-analgesia protocol based on the use of NSAIDs, Fentanyl and Midazolam, for prehospital treatment of trauma patients. The protocol was tested in three Emergency Medical Services for a four month period, in which 30 patients were included in the study. Results evidenced a good management of both pain and anxiety in the majority of patients treated, with the achievement of analgesia target in 80% of the patients and sedation target in 100% of the patients.

  16. Data-Based Energy Efficient Clustered Routing Protocol for Wireless Sensors Networks – Tabuk Flood Monitoring System Case Study

    Directory of Open Access Journals (Sweden)

    Ammar Babiker

    2017-10-01

    Full Text Available Energy efficiency has been considered as the most important issue in wireless sensor networks. As in many applications, wireless sensors are scattered in a wide harsh area, where the battery replacement or charging will be quite difficult and it is the most important challenge. Therefore, the design of energy saving mechanism becomes mandatory in most recent research. In this paper, a new energy efficient clustered routing protocol is proposed: the proposed protocol is based on analyzing the data collected from the sensors in a base-station. Based on this analysis the cluster head will be selected as the one with the most useful data. Then, a variable time slot is specified to each sensor to minimize the transmission of repetitive and un-useful data. The proposed protocol Data-Based Energy Efficient Clustered Routing Protocol for Wireless Sensors Networks (DCRP was compared with the famous energy efficient LEACH protocol and also with one of the recent energy efficient routing protocols named Position Responsive Routing Protocol (PRRP. DCRP has been used in monitoring the floods in Tabuk area –Saudi Arabia. It shows comparatively better results.

  17. The Comparative Study Some of Reactive and Proactive Routing Protocols in The Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Anas Ali Hussien

    2018-02-01

    Full Text Available The wireless sensor network (WSN consists mostly of a large number of nodes in a large area where not all nodes are directly connected. The applications of comprise a wide variety of scenarios.The mobile nodes are free to move because this network has selfــstructured topology. Routing protocols are responsible for detecting and maintaining paths in the network, and it classified into reactive (OnـــDemand, proactive (Table driven, and hybrid. In this paper represents a performance study of some WSN routing protocols: the Dynamic Source Routing (DSR, Ad hoc On-Demand Distance Vector (AODV, and Destination-Sequenced Distance-Vector (DSDV. The comparison made according to important metrics like packet delivery ratio (PDR, total packets dropped, Average end-to-end delay (Avg EED, and normalized routing load under the Transmission Control Protocol (TCP and User Datagram Protocol (UDP traffic connection and with varying number of nodes, pause time; and  varying speed. In this work used (NSــ2.35 that installed on (Ubuntu 14.04 operating system to implementing the scenario. Conclude that the DSR has better performance in TCP connection; while the DSDV has better performance in UDP protocol.

  18. Direct Cellular Lysis/Protein Extraction Protocol for Soil Metaproteomics

    Energy Technology Data Exchange (ETDEWEB)

    Chourey, Karuna [ORNL; Jansson, Janet [Lawrence Berkeley National Laboratory (LBNL); Verberkmoes, Nathan C [ORNL; Shah, Manesh B [ORNL; Chavarria, Krystle L. [Lawrence Berkeley National Laboratory (LBNL); Tom, Lauren M [Lawrence Berkeley National Laboratory (LBNL); Brodie, Eoin L. [Lawrence Berkeley National Laboratory (LBNL); Hettich, Robert {Bob} L [ORNL

    2010-01-01

    We present a novel direct protocol for deep proteome characterization of microorganisms in soil. The method employs thermally assisted detergent-based cellular lysis (SDS) of soil samples, followed by TCA precipitation for proteome extraction/cleanup prior to liquid chromatography-mass spectrometric characterization. This approach was developed and optimized using different soils inoculated with genome-sequenced bacteria (Gram-negative Pseudomonas putida or Gram-positive Arthrobacter chlorophenolicus). Direct soil protein extraction was compared to protein extraction from cells isolated from the soil matrix prior to lysis (indirect method). Each approach resulted in identification of greater than 500 unique proteins, with a wide range in molecular mass and functional categories. To our knowledge, this SDS-TCA approach enables the deepest proteome characterizations of microbes in soil to date, without significant biases in protein size, localization, or functional category compared to pure cultures. This protocol should provide a powerful tool for ecological studies of soil microbial communities.

  19. An Individualized, Perception-Based Protocol to Investigate Human Physiological Responses to Cooling

    Science.gov (United States)

    Coolbaugh, Crystal L.; Bush, Emily C.; Galenti, Elizabeth S.; Welch, E. Brian; Towse, Theodore F.

    2018-01-01

    Cold exposure, a known stimulant of the thermogenic effects of brown adipose tissue (BAT), is the most widely used method to study BAT physiology in adult humans. Recently, individualized cooling has been recommended to standardize the physiological cold stress applied across participants, but critical experimental details remain unclear. The purpose of this work was to develop a detailed methodology for an individualized, perception-based protocol to investigate human physiological responses to cooling. Participants were wrapped in two water-circulating blankets and fitted with skin temperature probes to estimate BAT activity and peripheral vasoconstriction. We created a thermoesthesia graphical user interface (tGUI) to continuously record the subject's perception of cooling and shivering status during the cooling protocol. The protocol began with a 15 min thermoneutral phase followed by a series of 10 min cooling phases and concluded when sustained shivering (>1 min duration) occurred. Researchers used perception of cooling feedback (tGUI ratings) to manually adjust and personalize the water temperature at each cooling phase. Blanket water temperatures were recorded continuously during the protocol. Twelve volunteers (ages: 26.2 ± 1.4 years; 25% female) completed a feasibility study to evaluate the proposed protocol. Water temperature, perception of cooling, and shivering varied considerably across participants in response to cooling. Mean clavicle skin temperature, a surrogate measure of BAT activity, decreased (−0.99°C, 95% CI: −1.7 to −0.25°C, P = 0.16) after the cooling protocol, but an increase in supraclavicular skin temperature was observed in 4 participants. A strong positive correlation was also found between thermoesthesia and peripheral vasoconstriction (ρ = 0.84, P < 0.001). The proposed individualized, perception-based protocol therefore has potential to investigate the physiological responses to cold stress applied across populations with

  20. Software for simulating IMRT protocol

    Energy Technology Data Exchange (ETDEWEB)

    Fonseca, Thelma C.F.; Campos, Tarcisio P.R. de, E-mail: tcff@ufmg.b, E-mail: campos@nuclear.ufmg.b [Universidade Federal de Minas Gerais (UFMG), Belo Horizonte, MG (Brazil). Dept. de Engenharia Nuclear

    2009-07-01

    The Intensity Modulated Radiation Therapy - IMRT is an advanced technique to cancer treatment widely used on oncology around the world. The present paper describes the SOFT-RT software which is a tool for simulating IMRT protocol. Also, it will be present a cerebral tumor case of studied in which three irradiation windows with distinct orientation were applied. The SOFT-RT collect and export data to MCNP code. This code simulates the photon transport on the voxel model. Later, a out-module from SOFT-RT import the results and express the dose-response superimposing dose and voxel model in a tree-dimensional graphic representation. The present paper address the IMRT software and its function as well a cerebral tumor case of studied is showed. The graphic interface of the SOFT-RT illustrates the example case. (author)

  1. Software for simulating IMRT protocol

    International Nuclear Information System (INIS)

    Fonseca, Thelma C.F.; Campos, Tarcisio P.R. de

    2009-01-01

    The Intensity Modulated Radiation Therapy - IMRT is an advanced technique to cancer treatment widely used on oncology around the world. The present paper describes the SOFT-RT software which is a tool for simulating IMRT protocol. Also, it will be present a cerebral tumor case of studied in which three irradiation windows with distinct orientation were applied. The SOFT-RT collect and export data to MCNP code. This code simulates the photon transport on the voxel model. Later, a out-module from SOFT-RT import the results and express the dose-response superimposing dose and voxel model in a tree-dimensional graphic representation. The present paper address the IMRT software and its function as well a cerebral tumor case of studied is showed. The graphic interface of the SOFT-RT illustrates the example case. (author)

  2. AstroWeb -- Internet Resources for Astronomers

    Science.gov (United States)

    Jackson, R. E.; Adorf, H.-M.; Egret, D.; Heck, A.; Koekemoer, A.; Murtagh, F.; Wells, D. C.

    AstroWeb is a World Wide Web (WWW) interface to a collection of Internet accessible resources aimed at the astronomical community. The collection currently contains more than 1000 WWW, Gopher, Wide Area Information System (WAIS), Telnet, and Anonymous FTP resources, and it is still growing. AstroWeb provides the additional value-added services: categorization of each resource; descriptive paragraphs for some resources; searchable index of all resource information; 3 times daily search for ``dead'' or ``unreliable'' resources.

  3. Evaluating Protocol Lifecycle Time Intervals in HIV/AIDS Clinical Trials

    Science.gov (United States)

    Schouten, Jeffrey T.; Dixon, Dennis; Varghese, Suresh; Cope, Marie T.; Marci, Joe; Kagan, Jonathan M.

    2014-01-01

    Background Identifying efficacious interventions for the prevention and treatment of human diseases depends on the efficient development and implementation of controlled clinical trials. Essential to reducing the time and burden of completing the clinical trial lifecycle is determining which aspects take the longest, delay other stages, and may lead to better resource utilization without diminishing scientific quality, safety, or the protection of human subjects. Purpose In this study we modeled time-to-event data to explore relationships between clinical trial protocol development and implementation times, as well as identify potential correlates of prolonged development and implementation. Methods We obtained time interval and participant accrual data from 111 interventional clinical trials initiated between 2006 and 2011 by NIH’s HIV/AIDS Clinical Trials Networks. We determined the time (in days) required to complete defined phases of clinical trial protocol development and implementation. Kaplan-Meier estimates were used to assess the rates at which protocols reached specified terminal events, stratified by study purpose (therapeutic, prevention) and phase group (pilot/phase I, phase II, and phase III/ IV). We also examined several potential correlates to prolonged development and implementation intervals. Results Even though phase grouping did not determine development or implementation times of either therapeutic or prevention studies, overall we observed wide variation in protocol development times. Moreover, we detected a trend toward phase III/IV therapeutic protocols exhibiting longer developmental (median 2 ½ years) and implementation times (>3years). We also found that protocols exceeding the median number of days for completing the development interval had significantly longer implementation. Limitations The use of a relatively small set of protocols may have limited our ability to detect differences across phase groupings. Some timing effects

  4. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  5. Protocols for Improvement of Black Pepper (Piper nigrum L.) Utilizing Biotechnological Tools.

    Science.gov (United States)

    Nirmal Babu, K; Divakaran, Minoo; Yamuna, G; Ravindran, P N; Peter, K V

    2016-01-01

    Black pepper, Piper nigrum L., the "King of spices" is the most widely used spice growing in the South-Western region of India. The humid tropical evergreen forest bordering the Malabar Coast (Western Ghats is one of the hot spot areas of plant bio-diversity on earth) is its center of origin and diversity. However, the crop faces constraints like rampant fungal and viral diseases, lack of disease free planting material, hence biotechnological tools can be utilized to address these problems and strides have been made successfully. The standardization of micropropagation, somatic embryogenesis, in vitro conservation, protoplast isolation, and genetic transformation protocols are described here. The protocols could be utilized to achieve similar goals in the related species of Piper too.

  6. FLOWER, an Innovative Fuzzy Lower-than-Best-Effort Transport Protocol

    OpenAIRE

    Trang, Si Quoc Viet; Lochin, Emmanuel

    2016-01-01

    We present a new delay-based transport protocol named FLOWER, that aims at providing a Lower-than-Best-Effort (LBE) service. The objective is to propose an alternative to the Low Extra Delay Background Transport (LEDBAT) widely deployed within the official BitTorrent client. Indeed, besides its intra-fairness problem, known as latecomer unfairness, LEDBAT can be too aggressive against TCP, making it ill suited for providing LBE services over certain networks such as constrained wireless netwo...

  7. Radiation dosimetry assessment of routine CT scanning protocols used in Western Australia

    International Nuclear Information System (INIS)

    Moorin, Rachael E; Forsyth, Rene; Gibson, David J; Fox, Richard

    2013-01-01

    Technical data on local CT practice in Western Australia were collected for five major CT providers using a self-completed questionnaire. The CTDIvol DLP and effective dose for each protocol were obtained and providers were ranked according to radiation burden for each clinical scenario. The mean, median, 75th percentile and standard deviation were calculated for both effective dose and DLP for each scenario and these values were compared with published data. CT utilisation data were used to estimate the attributable radiation dose to the WA population and the potential change in population annual effective dose according to the protocol used was estimated. We found that wide variations in technique and radiation dose exist across providers for similar examinations, producing a higher radiation burden than reported internationally. As expected, the CT protocol used dramatically affects the radiation dose received, and this has a significant effect on annual population dose. This study highlights the need for recognition and understanding of both the degree of variation in radiation dose across providers and the relatively high radiation burden afforded by protocols in use in Western Australia so that necessary dialogue can be launched for practitioner consensus on appropriate diagnostic reference levels in CT scanning. (paper)

  8. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  9. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  10. A high performance totally ordered multicast protocol

    Science.gov (United States)

    Montgomery, Todd; Whetten, Brian; Kaplan, Simon

    1995-01-01

    This paper presents the Reliable Multicast Protocol (RMP). RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service such as IP Multicasting. RMP is fully and symmetrically distributed so that no site bears un undue portion of the communication load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These QoS guarantees are selectable on a per packet basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, an implicit naming service, mutually exclusive handlers for messages, and mutually exclusive locks. It has commonly been held that a large performance penalty must be paid in order to implement total ordering -- RMP discounts this. On SparcStation 10's on a 1250 KB/sec Ethernet, RMP provides totally ordered packet delivery to one destination at 842 KB/sec throughput and with 3.1 ms packet latency. The performance stays roughly constant independent of the number of destinations. For two or more destinations on a LAN, RMP provides higher throughput than any protocol that does not use multicast or broadcast.

  11. The Montreal Protocol for Identification of Amusia.

    Science.gov (United States)

    Vuvan, D T; Paquette, S; Mignault Goulet, G; Royal, I; Felezeu, M; Peretz, I

    2018-04-01

    The Montreal Battery for the Evaluation of Amusia (MBEA; Peretz, Champod, & Hyde Annals of the New York Academy of Sciences, 999, 58-75, 2003) is an empirically grounded quantitative tool that is widely used to identify individuals with congenital amusia. The use of such a standardized measure ensures that the individuals tested will conform to a specific neuropsychological profile, allowing for comparisons across studies and research groups. Recently, a number of researchers have published credible critiques of the usefulness of the MBEA as a diagnostic tool for amusia. Here we argue that the MBEA and its online counterpart, the AMUSIA tests (Peretz et al. Music Perception, 25, 331-343, 2008), should be considered steps in a screening process for amusia, rather than standalone diagnostic tools. The goal of this article is to present, in detailed and easily replicable format, the full protocol through which congenital amusics should be identified. In providing information that has often gone unreported in published articles, we aim to clarify the strengths and limitations of the MBEA and to make recommendations for its continued use by the research community as part of the Montreal Protocol for Identification of Amusia.

  12. A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function.

    Science.gov (United States)

    Xu, He; Ding, Jie; Li, Peng; Zhu, Feng; Wang, Ruchuan

    2018-03-02

    With the fast development of the Internet of Things, Radio Frequency Identification (RFID) has been widely applied into many areas. Nevertheless, security problems of the RFID technology are also gradually exposed, when it provides life convenience. In particular, the appearance of a large number of fake and counterfeit goods has caused massive loss for both producers and customers, for which the clone tag is a serious security threat. If attackers acquire the complete information of a tag, they can then obtain the unique identifier of the tag by some technological means. In general, because there is no extra identifier of a tag, it is difficult to distinguish an original tag and its clone one. Once the legal tag data is obtained, attackers can be able to clone this tag. Therefore, this paper shows an efficient RFID mutual verification protocol. This protocol is based on the Physical Unclonable Function (PUF) and the lightweight cryptography to achieve efficient verification of a single tag. The protocol includes three process: tag recognition, mutual verification and update. The tag recognition is that the reader recognizes the tag; mutual verification is that the reader and tag mutually verify the authenticity of each other; update is supposed to maintain the latest secret key for the following verification. Analysis results show that this protocol has a good balance between performance and security.

  13. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

    Science.gov (United States)

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S

    2015-11-01

    In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.

  14. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  15. Development of a Competent and Trouble Free DNA Isolation Protocol for Downstream Genetic Analyses in Glycine Species

    Directory of Open Access Journals (Sweden)

    Muhammad Amjad Nawaz

    2016-08-01

    Full Text Available Extraction of deoxyribose nucleic acid (DNA from plants is preliminary step in molecular biology. Fast and cost effective genomic DNA isolation from Glycine species for downstream application is a major bottleneck. Here we report a high throughput and trouble free method for genomic DNA extraction from leaf and seeds of Glycine species with high quality and quantity. Protocol reports the optimization by employing different concentrations of CTAB and PVP in extraction buffer. Efficiency of optimized protocol was compared with frequently used DNA extraction methods. Wide adoptability and utility of this protocol was confirmed by DNA extraction from leaves as well as seeds of G. max, G. soja, G. tomentella and G. latifolia. Extracted DNA was successfully subjected to PCR amplification of five microsatellite markers and four putative glycosyltransferase genes. DNA extraction protocol is reproducible, trouble free, rapid and can be adopted for plant molecular biology applications.

  16. An efficient chronic unpredictable stress protocol to induce stress-related responses in C57BL/6 mice.

    Science.gov (United States)

    Monteiro, Susana; Roque, Susana; de Sá-Calçada, Daniela; Sousa, Nuno; Correia-Neves, Margarida; Cerqueira, João José

    2015-01-01

    Exposure to chronic stress can have broad effects on health ranging from increased predisposition for neuropsychiatric disorders to deregulation of immune responses. The chronic unpredictable stress (CUS) protocol has been widely used to study the impact of stress exposure in several animal models and consists in the random, intermittent, and unpredictable exposure to a variety of stressors during several weeks. CUS has consistently been shown to induce behavioral and immunological alterations typical of the chronic stress-response. Unfortunately C57BL/6 mice, one of the most widely used mouse strains, due to the great variety of genetically modified lines, seem to be resistant to the commonly used 4-week-long CUS protocol. The definition of an alternative CUS protocol allowing the use of C57BL/6 mice in chronic stress experiments is a need. Here, we show that by extending the CUS protocol to 8 weeks is possible to induce a chronic stress-response in C57BL/6 mice, as revealed by abrogated body weight gain, increased adrenals weight, and an overactive hypothalamic-pituitary-adrenal axis with increased levels of serum corticosterone. Moreover, we also observed stress-associated behavioral alterations, including the potentiation of anxious-like and depressive-like behaviors and a reduction of exploratory behavior, as well as subtle stress-related changes in the cell population of the thymus and of the spleen. The present protocol for C57BL/6 mice consistently triggers the spectrum of CUS-induced changes observed in rats and, thus, will be highly useful to researchers that need to use this particular mouse strain as an animal model of neuropsychiatric disorders and/or immune deregulation related to CUS.

  17. Final report for the protocol extensions for ATM Security Laboratory Directed Research and Development Project

    Energy Technology Data Exchange (ETDEWEB)

    Tarman, T.D.; Pierson, L.G.; Brenkosh, J.P. [and others

    1996-03-01

    This is the summary report for the Protocol Extensions for Asynchronous Transfer Mode project, funded under Sandia`s Laboratory Directed Research and Development program. During this one-year effort, techniques were examined for integrating security enhancements within standard ATM protocols, and mechanisms were developed to validate these techniques and to provide a basic set of ATM security assurances. Based on our experience during this project, recommendations were presented to the ATM Forum (a world-wide consortium of ATM product developers, service providers, and users) to assist with the development of security-related enhancements to their ATM specifications. As a result of this project, Sandia has taken a leading role in the formation of the ATM Forum`s Security Working Group, and has gained valuable alliances and leading-edge experience with emerging ATM security technologies and protocols.

  18. Cross-Layer Protocol as a Better Option in Wireless Mesh Network with Respect to Layered-Protocol

    OpenAIRE

    Ahmed Abdulwahab Al-Ahdal; Dr. V. P. Pawar; G. N. Shinde

    2014-01-01

    The Optimal way to improve Wireless Mesh Networks (WMNs) performance is to use a better network protocol, but whether layered-protocol design or cross-layer design is a better option to optimize protocol performance in WMNs is still an on-going research topic. In this paper, we focus on cross-layer protocol as a better option with respect to layered-protocol. The layered protocol architecture (OSI) model divides networking tasks into layers and defines a pocket of services for each layer to b...

  19. Perancangan dan Realisasi Web-Based Data Logging System menggunakan ATmega16 melalui Hypertext Transfer Protocol (HTTP

    Directory of Open Access Journals (Sweden)

    RATNA SUSANA

    2016-02-01

    Full Text Available Abstrak Hypertext Transfer Protocol (HTTP merupakan protokol jaringan pada lapisan aplikasi TCP/IP yang menjadi dasar komunikasi pada World Wide Web (WWW. Penelitian ini merancang dan merealisasikan web-based data logging system yang bertujuan untuk memperkenalkan aturan HTTP, sehingga perangkat elektronik dapat berkomunikasi dengan website secara langsung. Sistem dirancang dengan dua sub sistem utama yaitu website data logger dan website. Data logger direalisasikan menggunakan ATMega16 yang diintegrasikan dengan sumber data analog dan digital, RTC serta modem GSM. Data logger berfungsi sebagai pengirim data, sedangkan website berfungsi sebagai pengatur, penerima, pengolah dan penyaji data. Sistem ini telah berhasil melakukan komunikasi antara data logger dengan website melalui HTTP, artinya protokol ini dapat diimplementasikan pada data logger yang menggunakan ATmega16. Perubahan data analog dan status logika 0 dan 1 dari data digital yang terjadi pada data logger dapat dilihat pada tampilan di website. Kata kunci:  basis data, data logger, Hypertext Transfer Protocol (HTTP, website, protokol jaringan. Abstract Hypertext Transfer Protocol (HTTP is an application layer network protocols in TCP/IP is the basis of communication on the World Wide Web (WWW. This research was to design and realize a web-based data logging system that aims to introduce the rules of HTTP, so that electronic devices could communicate with the website directly. The system was designed with two main sub-system, namely data logger and website. The data logger was realized using ATmega16 are integrated with analog and digital data sources, RTC and a GSM modem. Data logger function as the sender of data, while the website functions as regulator, receiver, processing and presenter data. This system had been successfully perform communication between the data logger to a website via HTTP, meaning that this protocol could be implemented on a data logger that uses ATmega16

  20. The anti-CMS technique for genome-wide mapping of 5-hydroxymethylcytosine.

    Science.gov (United States)

    Huang, Yun; Pastor, William A; Zepeda-Martínez, Jorge A; Rao, Anjana

    2012-10-01

    5-Hydroxymethylcytosine (5hmC) is a recently discovered base in the mammalian genome, produced upon oxidation of 5-methylcytosine (5mC) in a process catalyzed by TET proteins. The biological functions of 5hmC and further oxidation products of 5mC are under intense investigation, as they are likely intermediates in DNA demethylation pathways. Here we describe a novel protocol to profile 5hmC at a genome-wide scale. This approach is based on sodium bisulfite-mediated conversion of 5hmC to cytosine-5-methylenesulfonate (CMS); CMS-containing DNA fragments are then immunoprecipitated using a CMS-specific antiserum. The anti-CMS technique is highly specific with a low background, and is much less dependent on 5hmC density than anti-5hmC immunoprecipitation (IP). Moreover, it does not enrich for CA and CT repeats, as noted for 5hmC DNA IP using antibodies to 5hmC. The anti-CMS protocol takes 3 d to complete.

  1. The Prognostic Value of the Work Ability Index for Sickness Absence among Office Workers.

    Directory of Open Access Journals (Sweden)

    Kerstin G Reeuwijk

    Full Text Available The work ability index (WAI is a frequently used tool in occupational health to identify workers at risk for a reduced work performance and for work-related disability. However, information about the prognostic value of the WAI to identify workers at risk for sickness absence is scarce.To investigate the prognostic value of the WAI for sickness absence, and whether the discriminative ability differs across demographic subgroups.At baseline, the WAI (score 7-49 was assessed among 1,331 office workers from a Dutch financial service company. Sickness absence was registered during 12-months follow-up and categorised as 0 days, 0WAI and sickness absence were estimated by multinomial regression analyses. Discriminative ability of the WAI was assessed by the Area Under the Curve (AUC and Ordinal c-index (ORC. Test characteristics were determined for dichotomised outcomes. Additional analyses were performed for separate WAI dimensions, and subgroup analyses for demographic groups.A lower WAI was associated with sickness absence (≥15 days vs. 0 days: per point lower WAI score OR=1.27; 95%CI 1.21-1.33. The WAI showed reasonable ability to discriminate between categories of sickness absence (ORC=0.65; 95%CI 0.63-0.68. Highest discrimination was found for comparing workers with ≥15 sick days with 0 sick days (AUC=0.77 or with 1-5 sick days (AUC=0.69. At the cut-off for poor work ability (WAI≤27 the sensitivity to identify workers at risk for ≥15 sick days was 7.5%, the specificity 99.6%, and the positive predictive value 82%. The performance was similar across demographic subgroups.The WAI could be used to identify workers at high risk for prolonged sickness absence. However, due to low sensitivity many workers will be missed. Hence, additional factors are required to better identify workers at highest risk.

  2. Is health, measured by work ability index, affected by 12-hour rotating shift schedules?

    Science.gov (United States)

    Yong, Mei; Nasterlack, Michael; Pluto, Rolf-Peter; Elmerich, Kathrin; Karl, Dorothee; Knauth, Peter

    2010-07-01

    Two forms of continuously forward rotating 12-h shift schedules exist at BASF's Ludwigshafen site. These shift schedules were compared with a daytime working system to investigate potential differential effects on employee's health status assessed with the Work Ability Index (WAI). In the 3 x 12 system, a 12-h day shift is followed 24 h later by a 12-h night shift, and after a day off the employee returns to the day shift. The 4 x 12 schedule follows the same pattern except that there are 2 days off between the night and next day shift. A total of 924 participants (278 3 x 12 and 321 4 x 12 shiftworkers and 325 day workers) were recruited. A self-administered questionnaire was used to obtain information about shiftwork schedule, demographic characteristics, and lifestyle and social factors, and the WAI was applied. The outcomes of interest were the WAI sum score and its seven dimensions. In examining the relationship with the WAI categories, a Proportional Odds Model (POM) was used to identify the potential determinants. Logistic regression models were used to estimate the impact of age on single dimensions of WAI after adjustment for potential confounding factors. Increasing age and obesity (BMI > or = 30) were the only significant determinants of poorer WAI. Although a positive association was found linking the second WAI dimension (work ability in relation to job demands) with age, an inverse association was demonstrated consistently between age and the third and fourth WAI dimensions, i.e., number of diagnosed diseases and estimated work impairment due to disease, after adjustment for potential confounders. The age-dependency was moderate overall, but seemed to be stronger among shift- than day workers, although this difference did not reach statistical significance. There was no significant differential impact of the working time systems on the WAI sum score or on the individual WAI dimensions. Thus, there is no indication of an excessive adverse health impact

  3. A Study on Work Ability Index and Physical Work Capacity on the Base of Fax Equation VO(2) Max in Male Nursing Hospital Staff in Isfahan, Iran.

    Science.gov (United States)

    Habibi, Ehsanollah; Dehghan, Habibollah; Zeinodini, Mohhamad; Yousefi, Hosseinali; Hasanzadeh, Akbar

    2012-11-01

    The purpose of this research is to establish the ability of employees by work ability index (WAI), physical work capacity (PWC), and finding the correlation between them. Establishing the PWC index with attention to WAI values for the purpose of saving in costs and time of PWC measurements is another aim of this project. The present research is an analytic cross-sectional and one-trail study. The study population consists of 228 randomly selected registered nurses from hospitals in Isfahan (Iran). The WAI and PWC were established through WAI questionnaire and Fax equation and by using ergometer bicycle, respectively. The resulting data were analyzed using SPSS 16 software. Average WAI and PWC among the study population were 38.25±4.4 and 4.45±0.7, respectively. Pearson test results showed no significant correlation between PWC and WAI in different age groups (r=0.3 and P>0.05). Multiple linear regression analysis showed that the variables of age and diagnosed diseases were the most effective factors of WAI (β=0.18 and P>0.05). Pearson test revealed a significant correlation between the number of diagnosed diseases and PWC index in age groups of 40-49 years. Average WAI in this research, like other studies on similar jobs is in the acceptable level of >36. Work ability index and PWC index in different age groups did not show a significant correlation and this suggests that there are essential discrepancies in work ability evaluations made by each index and it is not possible to predict PWC index using WAI values. Given the PWC results and the level of nursing staff's activity (low, medium) the WAI is a suitable instrument to establish the professionals' abilities. This study revealed that 27.6% of individuals were subject to medium-low work ability risk (WAIworking and increased working hours.

  4. Shortened version of the work ability index to identify workers at risk of long-term sickness absence.

    Science.gov (United States)

    Schouten, Lianne S; Bültmann, Ute; Heymans, Martijn W; Joling, Catelijne I; Twisk, Jos W R; Roelen, Corné A M

    2016-04-01

    The Work Ability Index (WAI) identifies non-sicklisted workers at risk of future long-term sickness absence (LTSA). The WAI is a complicated instrument and inconvenient for use in large-scale surveys. We investigated whether shortened versions of the WAI identify non-sicklisted workers at risk of LTSA. Prospective study including two samples of non-sicklisted workers participating in occupational health checks between 2010 and 2012. A heterogeneous development sample (N= 2899) was used to estimate logistic regression coefficients for the complete WAI, a shortened WAI version without the list of diseases, and single-item Work Ability Score (WAS). These three instruments were calibrated for predictions of different (≥2, ≥4 and ≥6 weeks) LTSA durations in a validation sample of non-sicklisted workers (N= 3049) employed at a steel mill, differentiating between manual (N= 1710) and non-manual (N= 1339) workers. The discriminative ability was investigated by receiver operating characteristic analysis. All three instruments under-predicted the LTSA risks in both manual and non-manual workers. The complete WAI discriminated between individuals at high and low risk of LTSA ≥2, ≥4 and ≥6 weeks in manual and non-manual workers. Risk predictions and discrimination by the shortened WAI without the list of diseases were as good as the complete WAI. The WAS showed poorer discrimination in manual and non-manual workers. The WAI without the list of diseases is a good alternative to the complete WAI to identify non-sicklisted workers at risk of future LTSA durations ≥2, ≥4 and ≥6 weeks. © The Author 2015. Published by Oxford University Press on behalf of the European Public Health Association. All rights reserved.

  5. A streamlined ribosome profiling protocol for the characterization of microorganisms

    DEFF Research Database (Denmark)

    Latif, Haythem; Szubin, Richard; Tan, Justin

    2015-01-01

    Ribosome profiling is a powerful tool for characterizing in vivo protein translation at the genome scale, with multiple applications ranging from detailed molecular mechanisms to systems-level predictive modeling. Though highly effective, this intricate technique has yet to become widely used...... in the microbial research community. Here we present a streamlined ribosome profiling protocol with reduced barriers to entry for microbial characterization studies. Our approach provides simplified alternatives during harvest, lysis, and recovery of monosomes and also eliminates several time-consuming steps...

  6. Applied techniques for high bandwidth data transfers across wide area networks

    International Nuclear Information System (INIS)

    Lee, J.; Gunter, D.; Tierney, B.; Allcock, B.; Bester, J.; Bresnahan, J.; Tuecke, S.

    2001-01-01

    Large distributed systems such as Computational/Data Grids require large amounts of data to be co-located with the computing facilities for processing. From their work developing a scalable distributed network cache, the authors have gained experience with techniques necessary to achieve high data throughput over high bandwidth Wide Area Networks (WAN). The authors discuss several hardware and software design techniques, and then describe their application to an implementation of an enhanced FTP protocol called GridFTP. The authors describe results from the Supercomputing 2000 conference

  7. An Environment-Friendly Multipath Routing Protocol for Underwater Acoustic Sensor Network

    Directory of Open Access Journals (Sweden)

    Yun Li

    2017-01-01

    Full Text Available Underwater Acoustic Sensor Network (UASN is a promising technique by facilitating a wide range of aquatic applications. However, routing scheme in UASN is a challenging task because of the characteristics of the nodes mobility, interruption of link, and interference caused by other underwater acoustic systems such as marine mammals. In order to achieve reliable data delivery in UASN, in this work, we present a disjoint multipath disruption-tolerant routing protocol for UASN (ENMR, which incorporates the Hue, Saturation, and Value color space (HSV model to establish routing paths to greedily forward data packets to sink nodes. ENMR applies the mechanism to maintain the network topology. Simulation results show that, compared with the classic underwater routing protocols named PVBF, ENMR can improve packet delivery ratio and reduce network latency while avoiding introducing additional energy consumption.

  8. [Multidisciplinary protocol for computed tomography imaging and angiographic embolization of splenic injury due to trauma: assessment of pre-protocol and post-protocol outcomes].

    Science.gov (United States)

    Koo, M; Sabaté, A; Magalló, P; García, M A; Domínguez, J; de Lama, M E; López, S

    2011-11-01

    To assess conservative treatment of splenic injury due to trauma, following a protocol for computed tomography (CT) and angiographic embolization. To quantify the predictive value of CT for detecting bleeding and need for embolization. The care protocol developed by the multidisciplinary team consisted of angiography with embolization of lesions revealed by contrast extravasation under CT as well as embolization of grade III-V injuries observed, or grade I-II injuries causing hemodynamic instability and/or need for blood transfusion. We collected data on demographic variables, injury severity score (ISS), angiographic findings, and injuries revealed by CT. Pre-protocol and post-protocol outcomes were compared. The sensitivity and specificity of CT findings were calculated for all patients who required angiographic embolization. Forty-four and 30 angiographies were performed in the pre- and post-protocol periods, respectively. The mean (SD) ISSs in the two periods were 25 (11) and 26 (12), respectively. A total of 24 (54%) embolizations were performed in the pre-protocol period and 28 (98%) after implementation of the protocol. Two and 7 embolizations involved the spleen in the 2 periods, respectively; abdominal laparotomies numbered 32 and 25, respectively, and 10 (31%) vs 4 (16%) splenectomies were performed. The specificity and sensitivity values for contrast extravasation found on CT and followed by embolization were 77.7% and 79.5%. The implementation of this multidisciplinary protocol using CT imaging and angiographic embolization led to a decrease in the number of splenectomies. The protocol allows us to take a more conservative treatment approach.

  9. Network protocol changes can improve DisCom WAN performance : evaluating TCP modifications and SCTP in the ASC tri-lab environment.

    Energy Technology Data Exchange (ETDEWEB)

    Tolendino, Lawrence F.; Hu, Tan Chang

    2005-06-01

    The Advanced Simulation and Computing (ASC) Distance Computing (DisCom) Wide Area Network (WAN) is a high performance, long distance network environment that is based on the ubiquitous TCP/IP protocol set. However, the Transmission Control Protocol (TCP) and the algorithms that govern its operation were defined almost two decades ago for a network environment vastly different from the DisCom WAN. In this paper we explore and evaluate possible modifications to TCP that purport to improve TCP performance in environments like the DisCom WAN. We also examine a much newer protocol, SCTP (Stream Control Transmission Protocol) that claims to provide reliable network transport while also implementing multi-streaming, multi-homing capabilities that are appealing in the DisCom high performance network environment. We provide performance comparisons and recommendations for continued development that will lead to network communications protocol implementations capable of supporting the coming ASC Petaflop computing environments.

  10. Perancangan dan Analisis Redistribution Routing Protocol OSPF dan EIGRP

    Directory of Open Access Journals (Sweden)

    DWI ARYANTA

    2016-02-01

    Full Text Available Abstrak OSPF (Open Shortest Path First dan EIGRP (Enhanced Interior Gateway Routing Protocol adalah dua routing protokol yang banyak digunakan dalam jaringan komputer. Perbedaan karakteristik antar routing protokol menimbulkan masalah dalam pengiriman paket data. Teknik redistribution adalah solusi untuk melakukan komunikasi antar routing protokol. Dengan menggunakan software Cisco Packet Tracer 5.3 pada penelitian ini dibuat simulasi OSPF dan EIGRP yang dihubungkan oleh teknik redistribution, kemudian dibandingkan kualitasnya dengan single routing protokol EIGRP dan OSPF. Parameter pengujian dalam penelitian ini adalah nilai time delay dan trace route. Nilai trace route berdasarkan perhitungan langsung cost dan metric dibandingkan dengan hasil simulasi. Hasilnya dapat dilakukan proses redistribution OSPF dan EIGRP. Nilai delay redistribution lebih baik 1% dibanding OSPF dan 2-3% di bawah EIGRP tergantung kepadatan traffic. Dalam perhitungan trace route redistribution dilakukan 2 perhitungan, yaitu cost untuk area OSPF dan metric pada area EIGRP. Pengambilan jalur utama dan alternatif pengiriman paket berdasarkan nilai cost dan metric yang terkecil, hal ini terbukti berdasarkan perhitungan dan simulasi. Kata kunci: OSPF, EIGRP, Redistribution, Delay, Cost, Metric. Abstract OSPF (Open Shortest Path First and EIGRP (Enhanced Interior Gateway Routing Protocol are two routing protocols are widely used in computer networks. Differences between the characteristics of routing protocols pose a problem in the delivery of data packets. Redistribution technique is the solution for communication between routing protocols. By using the software Cisco Packet Tracer 5.3 in this study were made simulating OSPF and EIGRP redistribution linked by technique, then compared its quality with a single EIGRP and OSPF routing protocols. Testing parameters in this study is the value of the time delay and trace route. Value trace route based on direct calculation of cost

  11. An Intelligent Improvement of Internet-Wide Scan Engine for Fast Discovery of Vulnerable IoT Devices

    Directory of Open Access Journals (Sweden)

    Hwankuk Kim

    2018-05-01

    Full Text Available Since 2016, Mirai and Persirai malware have infected hundreds of thousands of Internet of Things (IoT devices and created a massive IoT botnet, which caused distributed denial of service (DDoS attacks. IoT malware targets vulnerable IoT devices, which are vulnerable to security risks. Techniques are needed to prevent IoT devices from being exploited by attackers. However, unlike high-performance PCs, IoT devices are lightweight, low-power, and low-cost, having performance limitations regarding processing and memory, which makes it difficult to install security and anti-malware programs. Recently, several studies have been attempted to quickly search for vulnerable internet-connected devices to solve this real issue. Issues yet to be studied still exist regarding these types of internet-wide scan technologies, such as filtering by security devices and a shortage of collected operating system (OS information. This paper proposes an intelligent internet-wide scan model that improves IP state scanning with advanced internet protocol (IP randomization, reactive protocol (port scanning, and OS fingerprinting scanning, applying k* algorithm in order to find vulnerable IoT devices. Additionally, we describe the experiment’s results compared to the existing internet-wide scan technologies, such as ZMap and Shodan. As a result, the proposed model experimentally shows improved performance. Although we improved the ZMap, the throughput per minute (TPM performance is similar to ZMap without degrading the IP scan throughput and the performance of generating a single IP address is about 118% better than ZMap. In the protocol scan performance experiments, it is about 129% better than the Censys based ZMap, and the performance of OS fingerprinting is better than ZMap, with about 50% accuracy.

  12. Shortened version of the work ability index to identify workers at risk of long-term sickness absence

    NARCIS (Netherlands)

    Schouten, Lianne S.; Bultmann, Ute; Heymans, Martijn W.; Joling, Catelijne I.; Twisk, Jos W. R.; Roelen, Corne A. M.

    2016-01-01

    Background: The Work Ability Index (WAI) identifies non-sicklisted workers at risk of future long-term sickness absence (LTSA). The WAI is a complicated instrument and inconvenient for use in large-scale surveys. We investigated whether shortened versions of the WAI identify non-sicklisted workers

  13. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  14. Snow Accumulation Variability Over the West Antarctic Ice Sheet Since 1900: A Comparison of Ice Core Records With ERA-20C Reanalysis

    Science.gov (United States)

    Wang, Yetang; Thomas, Elizabeth R.; Hou, Shugui; Huai, Baojuan; Wu, Shuangye; Sun, Weijun; Qi, Shanzhong; Ding, Minghu; Zhang, Yulun

    2017-11-01

    This study uses a set of 37 firn core records over the West Antarctic Ice Sheet (WAIS) to test the performance of the twentieth century from the European Centre for Medium-Range Weather Forecasts (ERA-20C) reanalysis for snow accumulation and quantify temporal variability in snow accumulation since 1900. The firn cores are allocated to four geographical areas demarcated by drainage divides (i.e., Antarctic Peninsula (AP), western WAIS, central WAIS, and eastern WAIS) to calculate stacked records of regional snow accumulation. Our results show that the interannual variability in ERA-20C precipitation minus evaporation (P - E) agrees well with the corresponding ice core snow accumulation composites in each of the four geographical regions, suggesting its skill for simulating snow accumulation changes before the modern satellite era (pre-1979). Snow accumulation experiences significantly positive trends for the AP and eastern WAIS, a negative trend for the western WAIS, and no significant trend for the central WAIS from 1900 to 2010. The contrasting trends are associated with changes in the large-scale moisture transport driven by a deepening of the low-pressure systems and anomalies of sea ice in the Amundsen Sea Low region.

  15. Highball: A high speed, reserved-access, wide area network

    Science.gov (United States)

    Mills, David L.; Boncelet, Charles G.; Elias, John G.; Schragger, Paul A.; Jackson, Alden W.

    1990-01-01

    A network architecture called Highball and a preliminary design for a prototype, wide-area data network designed to operate at speeds of 1 Gbps and beyond are described. It is intended for applications requiring high speed burst transmissions where some latency between requesting a transmission and granting the request can be anticipated and tolerated. Examples include real-time video and disk-disk transfers, national filestore access, remote sensing, and similar applications. The network nodes include an intelligent crossbar switch, but have no buffering capabilities; thus, data must be queued at the end nodes. There are no restrictions on the network topology, link speeds, or end-end protocols. The end system, nodes, and links can operate at any speed up to the limits imposed by the physical facilities. An overview of an initial design approach is presented and is intended as a benchmark upon which a detailed design can be developed. It describes the network architecture and proposed access protocols, as well as functional descriptions of the hardware and software components that could be used in a prototype implementation. It concludes with a discussion of additional issues to be resolved in continuing stages of this project.

  16. TH-E-209-00: Radiation Dose Monitoring and Protocol Management

    International Nuclear Information System (INIS)

    2016-01-01

    Radiation dose monitoring solutions have opened up new opportunities for medical physicists to be more involved in modern clinical radiology practices. In particular, with the help of comprehensive radiation dose data, data-driven protocol management and informed case follow up are now feasible. Significant challenges remain however and the problems faced by medical physicists are highly heterogeneous. Imaging systems from multiple vendors and a wide range of vintages co-exist in the same department and employ data communication protocols that are not fully standardized or implemented making harmonization complex. Many different solutions for radiation dose monitoring have been implemented by imaging facilities over the past few years. Such systems are based on commercial software, home-grown IT solutions, manual PACS data dumping, etc., and diverse pathways can be used to bring the data to impact clinical practice. The speakers will share their experiences with creating or tailoring radiation dose monitoring/management systems and procedures over the past few years, which vary significantly in design and scope. Topics to cover: (1) fluoroscopic dose monitoring and high radiation event handling from a large academic hospital; (2) dose monitoring and protocol optimization in pediatric radiology; and (3) development of a home-grown IT solution and dose data analysis framework. Learning Objectives: Describe the scope and range of radiation dose monitoring and protocol management in a modern radiology practice Review examples of data available from a variety of systems and how it managed and conveyed. Reflect on the role of the physicist in radiation dose awareness.

  17. TH-E-209-00: Radiation Dose Monitoring and Protocol Management

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2016-06-15

    Radiation dose monitoring solutions have opened up new opportunities for medical physicists to be more involved in modern clinical radiology practices. In particular, with the help of comprehensive radiation dose data, data-driven protocol management and informed case follow up are now feasible. Significant challenges remain however and the problems faced by medical physicists are highly heterogeneous. Imaging systems from multiple vendors and a wide range of vintages co-exist in the same department and employ data communication protocols that are not fully standardized or implemented making harmonization complex. Many different solutions for radiation dose monitoring have been implemented by imaging facilities over the past few years. Such systems are based on commercial software, home-grown IT solutions, manual PACS data dumping, etc., and diverse pathways can be used to bring the data to impact clinical practice. The speakers will share their experiences with creating or tailoring radiation dose monitoring/management systems and procedures over the past few years, which vary significantly in design and scope. Topics to cover: (1) fluoroscopic dose monitoring and high radiation event handling from a large academic hospital; (2) dose monitoring and protocol optimization in pediatric radiology; and (3) development of a home-grown IT solution and dose data analysis framework. Learning Objectives: Describe the scope and range of radiation dose monitoring and protocol management in a modern radiology practice Review examples of data available from a variety of systems and how it managed and conveyed. Reflect on the role of the physicist in radiation dose awareness.

  18. Application of Modbus communication protocol and float-point display in MCS51 system

    International Nuclear Information System (INIS)

    Kong Xiangcheng; Liu Shaozhen

    2010-01-01

    As its widely opening and easy performance, Modbus communication protocol has a great advantage in field bus using. Details are given on a method to implement Modbus communication protocol based on MCS51 system, and the advantage of uVision integrated environment. The design realizes Modbus RTU mode communication, meanwhile the problem of synchronization in communication is solved. And float-point operation and display are achieved by format print. All of this are carried out under uVision integrated environment. The result approves that the response ratio of Modbus communication is 100%. The design shows the advantage of uVision integrated environment and MCS51 system. And also gives solution to the occasion where communication interface and low cost are required. (authors)

  19. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  20. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  1. An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System.

    Science.gov (United States)

    You, Ilsun; Kwon, Soonhyun; Choudhary, Gaurav; Sharma, Vishal; Seo, Jung Taek

    2018-06-08

    The Internet of Things (IoT) utilizes algorithms to facilitate intelligent applications across cities in the form of smart-urban projects. As the majority of devices in IoT are battery operated, their applications should be facilitated with a low-power communication setup. Such facility is possible through the Low-Power Wide-Area Network (LPWAN), but at a constrained bit rate. For long-range communication over LPWAN, several approaches and protocols are adopted. One such protocol is the Long-Range Wide Area Network (LoRaWAN), which is a media access layer protocol for long-range communication between the devices and the application servers via LPWAN gateways. However, LoRaWAN comes with fewer security features as a much-secured protocol consumes more battery because of the exorbitant computational overheads. The standard protocol fails to support end-to-end security and perfect forward secrecy while being vulnerable to the replay attack that makes LoRaWAN limited in supporting applications where security (especially end-to-end security) is important. Motivated by this, an enhanced LoRaWAN security protocol is proposed, which not only provides the basic functions of connectivity between the application server and the end device, but additionally averts these listed security issues. The proposed protocol is developed with two options, the Default Option (DO) and the Security-Enhanced Option (SEO). The protocol is validated through Burrows⁻Abadi⁻Needham (BAN) logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The proposed protocol is also analyzed for overheads through system-based and low-power device-based evaluations. Further, a case study on a smart factory-enabled parking system is considered for its practical application. The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with the two

  2. An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System

    Directory of Open Access Journals (Sweden)

    Ilsun You

    2018-06-01

    Full Text Available The Internet of Things (IoT utilizes algorithms to facilitate intelligent applications across cities in the form of smart-urban projects. As the majority of devices in IoT are battery operated, their applications should be facilitated with a low-power communication setup. Such facility is possible through the Low-Power Wide-Area Network (LPWAN, but at a constrained bit rate. For long-range communication over LPWAN, several approaches and protocols are adopted. One such protocol is the Long-Range Wide Area Network (LoRaWAN, which is a media access layer protocol for long-range communication between the devices and the application servers via LPWAN gateways. However, LoRaWAN comes with fewer security features as a much-secured protocol consumes more battery because of the exorbitant computational overheads. The standard protocol fails to support end-to-end security and perfect forward secrecy while being vulnerable to the replay attack that makes LoRaWAN limited in supporting applications where security (especially end-to-end security is important. Motivated by this, an enhanced LoRaWAN security protocol is proposed, which not only provides the basic functions of connectivity between the application server and the end device, but additionally averts these listed security issues. The proposed protocol is developed with two options, the Default Option (DO and the Security-Enhanced Option (SEO. The protocol is validated through Burrows–Abadi–Needham (BAN logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA tool. The proposed protocol is also analyzed for overheads through system-based and low-power device-based evaluations. Further, a case study on a smart factory-enabled parking system is considered for its practical application. The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with

  3. Musculoskeletal wide detector CT: Principles, techniques and applications in clinical practice and research

    International Nuclear Information System (INIS)

    Gondim Teixeira, Pedro Augusto; Gervaise, Alban; Louis, Matthias; Lecocq, Sophie; Raymond, Ariane; Aptel, Sabine; Blum, Alain

    2015-01-01

    Highlights: • Wide area-detector CT availability is growing steadily. • Advanced techniques such as Dynamic CT, Perfusion CT and dual energy can be used in clinical practice. • Optimal acquisition protocol is needed to increase diagnostic performance and limit dose exposure. • Guidelines for data acquisition and interpretation may increase diagnostic performance and reproducibility. - Abstract: A progressive increase in the detector width in CT scanners has meant that advanced techniques such as dynamic, perfusion and dual-energy CT are now at the radiologist's disposal. Although these techniques may be important for the diagnosis of various musculoskeletal diseases, data acquisition and interpretation can be challenging. This article offers a practical guide for the use of these tools including acquisition protocol, post-processing options and data interpretation based on 7 years of clinical experience in a tertiary university hospital

  4. Automatic Reverse Engineering of Private Flight Control Protocols of UAVs

    Directory of Open Access Journals (Sweden)

    Ran Ji

    2017-01-01

    Full Text Available The increasing use of civil unmanned aerial vehicles (UAVs has the potential to threaten public safety and privacy. Therefore, airspace administrators urgently need an effective method to regulate UAVs. Understanding the meaning and format of UAV flight control commands by automatic protocol reverse-engineering techniques is highly beneficial to UAV regulation. To improve our understanding of the meaning and format of UAV flight control commands, this paper proposes a method to automatically analyze the private flight control protocols of UAVs. First, we classify flight control commands collected from a binary network trace into clusters; then, we analyze the meaning of flight control commands by the accumulated error of each cluster; next, we extract the binary format of commands and infer field semantics in these commands; and finally, we infer the location of the check field in command and the generator polynomial matrix. The proposed approach is validated via experiments on a widely used consumer UAV.

  5. Enhanced Secure Trusted AODV (ESTA Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dilraj Singh

    2015-09-01

    Full Text Available The self-organizing nature of the Mobile Ad hoc Networks (MANETs provide a communication channel anywhere, anytime without any pre-existing network infrastructure. However, it is exposed to various vulnerabilities that may be exploited by the malicious nodes. One such malicious behavior is introduced by blackhole nodes, which can be easily introduced in the network and, in turn, such nodes try to crumble the working of the network by dropping the maximum data under transmission. In this paper, a new protocol is proposed which is based on the widely used Ad hoc On-Demand Distance Vector (AODV protocol, Enhanced Secure Trusted AODV (ESTA, which makes use of multiple paths along with use of trust and asymmetric cryptography to ensure data security. The results, based on NS-3 simulation, reveal that the proposed protocol is effectively able to counter the blackhole nodes in three different scenarios.

  6. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.

    Science.gov (United States)

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-06-17

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV's research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.

  7. An efficient chronic unpredictable stress protocol to induce stress-related responses in C57BL/6 mice

    Directory of Open Access Journals (Sweden)

    Susana eMonteiro

    2015-02-01

    Full Text Available Exposure to chronic stress can have broad effects on health ranging from increased predisposition for neuropsychiatric disorders to deregulation of immune responses. The chronic unpredictable stress (CUS protocol has been widely used to study the impact of stress exposure in several animal models and consists in the random, intermittent and unpredictable exposure to a variety of stressors during several weeks. CUS has consistently been shown to induce behavioral and immunological alterations typical of the chronic stress response. Unfortunately C57BL/6 mice, one of the most widely used mouse strains, due to the great variety of genetically modified lines, seem to be resistant to the commonly used 4-week-long CUS protocol. The definition of an alternative CUS protocol allowing the use of C57BL/6 mice in chronic stress experiments is a need. Here we show that by extending the CUS protocol to 8 weeks is possible to induce a chronic stress response in C57BL/6 mice, as revealed by abrogated body weight gain, increased adrenals weight and an overactive hypothalamic-pituitary-adrenal (HPA axis with increased levels of serum corticosterone. Moreover, we also observed stress-associated behavioral alterations, including the potentiation of anxious-like and depressive-like behaviors and a reduction of exploratory behavior, as well as subtle stress-related changes in the cell population of the thymus and of the spleen.The present protocol for C57BL/6 mice consistently triggers the spectrum of CUS-induced changes observed in rats and, thus, will be highly useful to researchers that need to use this particular mouse strain as an animal model of neuropsychiatric disorders and/or immune deregulation related to chronic unpredictable stress.

  8. Epistemic Protocols for Distributed Gossiping

    Directory of Open Access Journals (Sweden)

    Krzysztof R. Apt

    2016-06-01

    Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.

  9. Test Protocols for Advanced Inverter Interoperability Functions - Appendices

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, Jay Dean [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gonzalez, Sigifredo [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ralph, Mark E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ellis, Abraham [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Broderick, Robert Joseph [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2013-11-01

    Distributed energy resources (DER) such as photovoltaic (PV) systems, when deployed in a large scale, are capable of influencing significantly the operation of power systems. Looking to the future, stakeholders are working on standards to make it possible to manage the potentially complex interactions between DER and the power system. In 2009, the Electric Power Research Institute (EPRI), Sandia National Laboratories (SNL) with the U.S. Department of Energy (DOE), and the Solar Electric Power Association (SEPA) initiated a large industry collaborative to identify and standardize definitions for a set of DER grid support functions. While the initial effort concentrated on grid-tied PV inverters and energy storage systems, the concepts have applicability to all DER. A partial product of this on-going effort is a reference definitions document (IEC TR 61850-90-7, Object models for power converters in distributed energy resources (DER) systems) that has become a basis for expansion of related International Electrotechnical Commission (IEC) standards, and is supported by US National Institute of Standards and Technology (NIST) Smart Grid Interoperability Panel (SGIP). Some industry-led organizations advancing communications protocols have also embraced this work. As standards continue to evolve, it is necessary to develop test protocols to independently verify that the inverters are properly executing the advanced functions. Interoperability is assured by establishing common definitions for the functions and a method to test compliance with operational requirements. This document describes test protocols developed by SNL to evaluate the electrical performance and operational capabilities of PV inverters and energy storage, as described in IEC TR 61850-90-7. While many of these functions are not now required by existing grid codes or may not be widely available commercially, the industry is rapidly moving in that direction. Interoperability issues are already apparent as

  10. The Prognostic Value of the Work Ability Index for Sickness Absence among Office Workers.

    Science.gov (United States)

    Reeuwijk, Kerstin G; Robroek, Suzan J W; Niessen, Maurice A J; Kraaijenhagen, Roderik A; Vergouwe, Yvonne; Burdorf, Alex

    2015-01-01

    The work ability index (WAI) is a frequently used tool in occupational health to identify workers at risk for a reduced work performance and for work-related disability. However, information about the prognostic value of the WAI to identify workers at risk for sickness absence is scarce. To investigate the prognostic value of the WAI for sickness absence, and whether the discriminative ability differs across demographic subgroups. At baseline, the WAI (score 7-49) was assessed among 1,331 office workers from a Dutch financial service company. Sickness absence was registered during 12-months follow-up and categorised as 0 days, 0performed for separate WAI dimensions, and subgroup analyses for demographic groups. A lower WAI was associated with sickness absence (≥15 days vs. 0 days: per point lower WAI score OR=1.27; 95%CI 1.21-1.33). The WAI showed reasonable ability to discriminate between categories of sickness absence (ORC=0.65; 95%CI 0.63-0.68). Highest discrimination was found for comparing workers with ≥15 sick days with 0 sick days (AUC=0.77) or with 1-5 sick days (AUC=0.69). At the cut-off for poor work ability (WAI≤27) the sensitivity to identify workers at risk for ≥15 sick days was 7.5%, the specificity 99.6%, and the positive predictive value 82%. The performance was similar across demographic subgroups. The WAI could be used to identify workers at high risk for prolonged sickness absence. However, due to low sensitivity many workers will be missed. Hence, additional factors are required to better identify workers at highest risk.

  11. Using semantics for representing experimental protocols.

    Science.gov (United States)

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  12. Optimizing the ASC WAN: evaluating network performance tools for comparing transport protocols.

    Energy Technology Data Exchange (ETDEWEB)

    Lydick, Christopher L.

    2007-07-01

    The Advanced Simulation & Computing Wide Area Network (ASC WAN), which is a high delay-bandwidth network connection between US Department of Energy National Laboratories, is constantly being examined and evaluated for efficiency. One of the current transport-layer protocols which is used, TCP, was developed for traffic demands which are different from that on the ASC WAN. The Stream Control Transport Protocol (SCTP), on the other hand, has shown characteristics which make it more appealing to networks such as these. Most important, before considering a replacement for TCP on any network, a testing tool that performs well against certain criteria needs to be found. In order to try to find such a tool, two popular networking tools (Netperf v.2.4.3 & v.2.4.6 (OpenSS7 STREAMS), and Iperf v.2.0.6) were tested. These tools implement both TCP and SCTP and were evaluated using four metrics: (1) How effectively can the tool reach a throughput near the bandwidth? (2) How much of the CPU does the tool utilize during operation? (3) Is the tool freely and widely available? And, (4) Is the tool actively developed? Following the analysis of those tools, this paper goes further into explaining some recommendations and ideas for future work.

  13. A method exploiting direct communication between phasor measurement units for power system wide-area protection and control algorithms.

    Science.gov (United States)

    Almas, Muhammad Shoaib; Vanfretti, Luigi

    2017-01-01

    Synchrophasor measurements from Phasor Measurement Units (PMUs) are the primary sensors used to deploy Wide-Area Monitoring, Protection and Control (WAMPAC) systems. PMUs stream out synchrophasor measurements through the IEEE C37.118.2 protocol using TCP/IP or UDP/IP. The proposed method establishes a direct communication between two PMUs, thus eliminating the requirement of an intermediate phasor data concentrator, data mediator and/or protocol parser and thereby ensuring minimum communication latency without considering communication link delays. This method allows utilizing synchrophasor measurements internally in a PMU to deploy custom protection and control algorithms. These algorithms are deployed using protection logic equations which are supported by all the PMU vendors. Moreover, this method reduces overall equipment cost as the algorithms execute internally in a PMU and therefore does not require any additional controller for their deployment. The proposed method can be utilized for fast prototyping of wide-area measurements based protection and control applications. The proposed method is tested by coupling commercial PMUs as Hardware-in-the-Loop (HIL) with Opal-RT's eMEGAsim Real-Time Simulator (RTS). As illustrative example, anti-islanding protection application is deployed using proposed method and its performance is assessed. The essential points in the method are: •Bypassing intermediate phasor data concentrator or protocol parsers as the synchrophasors are communicated directly between the PMUs (minimizes communication delays).•Wide Area Protection and Control Algorithm is deployed using logic equations in the client PMU, therefore eliminating the requirement for an external hardware controller (cost curtailment)•Effortless means to exploit PMU measurements in an environment familiar to protection engineers.

  14. Positive Selection on Loci Associated with Drug and Alcohol Dependence.

    Directory of Open Access Journals (Sweden)

    Brooke Sadler

    Full Text Available Much of the evolution of human behavior remains a mystery, including how certain disadvantageous behaviors are so prevalent. Nicotine addiction is one such phenotype. Several loci have been implicated in nicotine related phenotypes including the nicotinic receptor gene clusters (CHRNs on chromosomes 8 and 15. Here we use 1000 Genomes sequence data from 3 populations (Africans, Asians and Europeans to examine whether natural selection has occurred at these loci. We used Tajima's D and the integrated haplotype score (iHS to test for evidence of natural selection. Our results provide evidence for strong selection in the nicotinic receptor gene cluster on chromosome 8, previously found to be significantly associated with both nicotine and cocaine dependence, as well as evidence selection acting on the region containing the CHRNA5 nicotinic receptor gene on chromosome 15, that is genome wide significant for risk for nicotine dependence. To examine the possibility that this selection is related to memory and learning, we utilized genetic data from the Collaborative Studies on the Genetics of Alcoholism (COGA to test variants within these regions with three tests of memory and learning, the Wechsler Adult Intelligence Scale (WAIS Block Design, WAIS Digit Symbol and WAIS Information tests. Of the 17 SNPs genotyped in COGA in this region, we find one significantly associated with WAIS digit symbol test results. This test captures aspects of reaction time and memory, suggesting that a phenotype relating to memory and learning may have been the driving force behind selection at these loci. This study could begin to explain why these seemingly deleterious SNPs are present at their current frequencies.

  15. Evaluation of a biodegradation screening protocol for contaminated soil from manufactured gas plant sites

    International Nuclear Information System (INIS)

    Morgan, D.J.; Battaglia, A.; Smith, J.R.; Middleton, A.C.; Nakles, D.V.; Linz, D.G.

    1991-01-01

    Bioremediation has been demonstrated to be a viable alternative for treating soils contaminated with PAHs. however, given the variability encountered in soils characteristics and contamination level, their susceptibility to biological treatment must be assessed on a case-by-case basis. This paper discusses a new treatability protocol, the GRI Accelerated Treatability Protocol. The mainstay of the protocol, which is designed to quickly provide treatability data for a given contaminated soil is a bioslurry experiment, in which the contaminated soil is continuously stirred and provided with abundant oxygen, nutrients and water, to maximize biological activity and thus contaminant removal. The results of using such protocol on four soils, widely differing in physical characteristics and contamination levels, are compared to the results of traditional pan studies, and an empirical equation, describing the observed soil concentrations as a function of time in both slurry and pans, is presented. Similarities and differences between achievable endpoints and biodegradation rates are discussed, and the applicability of the GRI Accelerated Treatability Protocol to full-scale engineered systems is addressed. Results to date indicate that, for soils with less than 10% fines slurry and pan experiments yield approximately the same endpoint, so that for those soils the GRI Accelerated Treatability Protocol can be used to assess the viability of an unsaturated bioremediation system. For soils with more than 10% fines, the slurry treatment endpoints are better than the pans. For those soils a traditional pan study experiment should be performed to evaluate the potential capabilities of unsaturated bioremediation

  16. Implementation of the quality control protocol in Crawls

    International Nuclear Information System (INIS)

    Ambroa Rey, E. M.; Gimenez Insua, M.; Vazquez Vazquez, R.; Sanchez Garcia, M.; Luna Vega, V.; Mosquera Suero, J.; Otero Martinez, C.; Lobato Busto, R.; Pombar Camean, M.

    2013-01-01

    Bone scintigraphy is a test widely used in Nuclear Medicine of our service. 33% of the tests performed are of this type, so it is necessary to develop a specific quality control protocol for the tracking of the gamma camera acquisitions. This type of procurement means the mechanical movement of the stretcher, with a static initial phase in which the movement of the stretcher is replaced by the gradual opening of the field of view (electronic window). This creates the density of accounts to be uniform throughout the study. The presence of a movement mechanical and co-registration with the static phase implies the need for specific tests. (Author)

  17. Accurate typing of short tandem repeats from genome-wide sequencing data and its applications.

    Science.gov (United States)

    Fungtammasan, Arkarachai; Ananda, Guruprasad; Hile, Suzanne E; Su, Marcia Shu-Wei; Sun, Chen; Harris, Robert; Medvedev, Paul; Eckert, Kristin; Makova, Kateryna D

    2015-05-01

    Short tandem repeats (STRs) are implicated in dozens of human genetic diseases and contribute significantly to genome variation and instability. Yet profiling STRs from short-read sequencing data is challenging because of their high sequencing error rates. Here, we developed STR-FM, short tandem repeat profiling using flank-based mapping, a computational pipeline that can detect the full spectrum of STR alleles from short-read data, can adapt to emerging read-mapping algorithms, and can be applied to heterogeneous genetic samples (e.g., tumors, viruses, and genomes of organelles). We used STR-FM to study STR error rates and patterns in publicly available human and in-house generated ultradeep plasmid sequencing data sets. We discovered that STRs sequenced with a PCR-free protocol have up to ninefold fewer errors than those sequenced with a PCR-containing protocol. We constructed an error correction model for genotyping STRs that can distinguish heterozygous alleles containing STRs with consecutive repeat numbers. Applying our model and pipeline to Illumina sequencing data with 100-bp reads, we could confidently genotype several disease-related long trinucleotide STRs. Utilizing this pipeline, for the first time we determined the genome-wide STR germline mutation rate from a deeply sequenced human pedigree. Additionally, we built a tool that recommends minimal sequencing depth for accurate STR genotyping, depending on repeat length and sequencing read length. The required read depth increases with STR length and is lower for a PCR-free protocol. This suite of tools addresses the pressing challenges surrounding STR genotyping, and thus is of wide interest to researchers investigating disease-related STRs and STR evolution. © 2015 Fungtammasan et al.; Published by Cold Spring Harbor Laboratory Press.

  18. The SHIP: A SIP to HTTP Interaction Protocol

    Science.gov (United States)

    Zeiß, Joachim; Gabner, Rene; Bessler, Sandford; Happenhofer, Marco

    IMS is capable of providing a wide range of services. As a result, terminal software becomes more and more complex to deliver network intelligence to user applications. Currently mobile terminal software needs to be permanently updated so that the latest network services and functionality can be delivered to the user. In the Internet, browser based user interfaces assure that an interface is made available to the user which offers the latest services in the net immediately. Our approach combines the benefits of the Session Initiation Protocol (SIP) and those of the HTTP protocol to bring the same type of user interfacing to IMS. SIP (IMS) realizes authentication, session management, charging and Quality of Service (QoS), HTTP provides access to Internet services and allows the user interface of an application to run on a mobile terminal while processing and orchestration is done on the server. A SHIP enabled IMS client only needs to handle data transport and session management via SIP, HTTP and RTP and render streaming media, HTML and Javascript. SHIP allows new kinds of applications, which combine audio, video and data within a single multimedia session.

  19. Understanding protocol performance: impact of test performance.

    Science.gov (United States)

    Turner, Robert G

    2013-01-01

    This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as

  20. Genomic selection: genome-wide prediction in plant improvement.

    Science.gov (United States)

    Desta, Zeratsion Abera; Ortiz, Rodomiro

    2014-09-01

    Association analysis is used to measure relations between markers and quantitative trait loci (QTL). Their estimation ignores genes with small effects that trigger underpinning quantitative traits. By contrast, genome-wide selection estimates marker effects across the whole genome on the target population based on a prediction model developed in the training population (TP). Whole-genome prediction models estimate all marker effects in all loci and capture small QTL effects. Here, we review several genomic selection (GS) models with respect to both the prediction accuracy and genetic gain from selection. Phenotypic selection or marker-assisted breeding protocols can be replaced by selection, based on whole-genome predictions in which phenotyping updates the model to build up the prediction accuracy. Copyright © 2014 Elsevier Ltd. All rights reserved.

  1. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  2. Simplifying the Welfare Quality® assessment protocol for broiler chicken welfare.

    Science.gov (United States)

    de Jong, I C; Hindle, V A; Butterworth, A; Engel, B; Ferrari, P; Gunnink, H; Perez Moya, T; Tuyttens, F A M; van Reenen, C G

    2016-01-01

    Welfare Quality(®) (WQ) assessment protocols place the emphasis on animal-based measures as an indicator for animal welfare. Stakeholders, however, emphasize that a reduction in the time taken to complete the protocol is essential to improve practical applicability. We studied the potential for reduction in time to complete the WQ broiler assessment protocol and present some modifications to the protocol correcting a few errors in the original calculations. Data was used from 180 flocks assessed on-farm and 150 flocks assessed at the slaughter plant. Correlations between variables were calculated, and where correlation was moderate, meaningful and promising (in terms of time reduction), simplification was considered using one variable predicted from another variable. Correlation analysis revealed a promising correlation between severe hock burn and gait scores on-farm. Therefore, prediction of gait scores using hock burn scores was studied further as a possible simplification strategy (strategy 1). Measurements of footpad dermatitis, hock burn, cleanliness and gait score on-farm correlated moderately to highly with slaughter plant measurements of footpad dermatitis and/or hock burn, supporting substitution of on-farm measurements with slaughter plant data. A simplification analysis was performed using footpad dermatitis, hock burn, cleanliness and gait scores measured on-farm predicted from slaughter plant measurements of footpad dermatitis and hock burn (strategy 2). Simplification strategies were compared with the full assessment protocol. Close agreement was found between the full protocol and both simplification strategies although large confidence intervals were found for specificity of the simplified models. It is concluded that the proposed simplification strategies are encouraging; strategy 1 can reduce the time to complete the on-farm assessment by ~1 h (25% to 33% reduction) and strategy 2 can reduce on-farm assessment time by ~2 h (50% to 67% reduction

  3. An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP

    Directory of Open Access Journals (Sweden)

    Alaauldin Ibrahim

    2017-01-01

    Full Text Available Information in patients’ medical histories is subject to various security and privacy concerns. Meanwhile, any modification or error in a patient’s medical data may cause serious or even fatal harm. To protect and transfer this valuable and sensitive information in a secure manner, radio-frequency identification (RFID technology has been widely adopted in healthcare systems and is being deployed in many hospitals. In this paper, we propose a mutual authentication protocol for RFID tags based on elliptic curve cryptography and advanced encryption standard. Unlike existing authentication protocols, which only send the tag ID securely, the proposed protocol could also send the valuable data stored in the tag in an encrypted pattern. The proposed protocol is not simply a theoretical construct; it has been coded and tested on an experimental RFID tag. The proposed scheme achieves mutual authentication in just two steps and satisfies all the essential security requirements of RFID-based healthcare systems.

  4. A class-chest for deriving transport protocols

    Energy Technology Data Exchange (ETDEWEB)

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  5. The Work Ability Index as a screening tool to identify the need for rehabilitation: longitudinal findings from the Second German Sociomedical Panel of Employees.

    Science.gov (United States)

    Bethge, Matthias; Radoschewski, Friedrich Michael; Gutenbrunner, Christoph

    2012-11-01

    To evaluate the predictive value of the Work Ability Index (WAI) for different indicators of the need for rehabilitation at 1-year follow-up. Cohort study. Data were obtained from the Second German Sociomedical Panel of Employees, a large-scale cohort study with postal surveys in 2009 and 2010. A total of 457 women and 579 men were included. Confirmatory factor analysis confirmed the one-dimensionality of the WAI. Regression analyses showed that poor and moderate baseline WAI scores were associated with lower health-related quality of life and more frequent use of primary healthcare 1 year later. Subjects with poor baseline work ability had 4.6 times higher odds of unemployment and 12.2 times higher odds of prolonged sick leave than the reference group with good or excellent baseline work ability. Moreover, the odds of subjectively perceived need for rehabilitation, intention to request rehabilitation and actual use of rehabilitation services were 9.7, 5.7 and 3 times higher in the poor baseline WAI group and 5.5, 4 and 1.8 times higher in the moderate baseline WAI group, respectively. A WAI score ≤ 37 was identified as the optimal cut-off to predict the need for rehabilitation. The WAI is a valid screening tool for identifying the need for rehabilitation.

  6. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    International Nuclear Information System (INIS)

    Soares, M. R.; Maia, A. F.; Batista, W. O. G.; Lara, P. A.

    2014-08-01

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  7. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    Energy Technology Data Exchange (ETDEWEB)

    Soares, M. R.; Maia, A. F. [Universidade Federal de Sergipe, Departamento de Fisica, Cidade Universitaria Prof. Jose Aloisio de Campos, Marechal Rondon s/n, Jardim Rosa Elze, 49-100000 Sao Cristovao, Sergipe (Brazil); Batista, W. O. G. [Instituto Federal da Bahia, Rua Emidio dos Santos s/n, Barbalho, Salvador, 40301015 Bahia (Brazil); Lara, P. A., E-mail: wilsonottobatista@gmail.com [Instituto de Pesquisas Energeticas e Nucleares / CNEN, Av. Lineu Prestes 2242, Cidade Universitaria, 05508-000 Sao Paulo (Brazil)

    2014-08-15

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  8. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  9. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  10. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  11. Methods for culturing retinal pigment epithelial cells: a review of current protocols and future recommendations

    Directory of Open Access Journals (Sweden)

    Aaron H Fronk

    2016-07-01

    Full Text Available The retinal pigment epithelium is an important part of the vertebrate eye, particularly in studying the causes and possible treatment of age-related macular degeneration. The retinal pigment epithelium is difficult to access in vivo due to its location at the back of the eye, making experimentation with age-related macular degeneration treatments problematic. An alternative to in vivo experimentation is cultivating the retinal pigment epithelium in vitro, a practice that has been going on since the 1970s, providing a wide range of retinal pigment epithelial culture protocols, each producing cells and tissue of varying degrees of similarity to natural retinal pigment epithelium. The purpose of this review is to provide researchers with a ready list of retinal pigment epithelial protocols, their effects on cultured tissue, and their specific possible applications. Protocols using human and animal retinal pigment epithelium cells, derived from tissue or cell lines, are discussed, and recommendations for future researchers included.

  12. Mapping the availability and accessibility of healthy food in rural and urban New Zealand--Te Wai o Rona: Diabetes Prevention Strategy.

    Science.gov (United States)

    Wang, Jing; Williams, Margaret; Rush, Elaine; Crook, Nic; Forouhi, Nita G; Simmons, David

    2010-07-01

    Uptake of advice for lifestyle change for obesity and diabetes prevention requires access to affordable 'healthy' foods (high in fibre/low in sugar and fat). The present study aimed to examine the availability and accessibility of 'healthy' foods in rural and urban New Zealand. We identified and visited ('mapped') 1230 food outlets (473 urban, 757 rural) across the Waikato/Lakes areas (162 census areas within twelve regions) in New Zealand, where the Te Wai O Rona: Diabetes Prevention Strategy was underway. At each site, we assessed the availability of 'healthy' foods (e.g. wholemeal bread) and compared their cost with those of comparable 'regular' foods (e.g. white bread). Healthy foods were generally more available in urban than rural areas. In both urban and rural areas, 'healthy' foods were more expensive than 'regular' foods after adjusting for the population and income level of each area. For instance, there was an increasing price difference across bread, meat, poultry, with the highest difference for sugar substitutes. The weekly family cost of a 'healthy' food basket (without sugar) was 29.1% more expensive than the 'regular' basket ($NZ 176.72 v. $NZ 136.84). The difference between the 'healthy' and 'regular' basket was greater in urban ($NZ 49.18) than rural areas ($NZ 36.27) in adjusted analysis. 'Healthy' foods were more expensive than 'regular' choices in both urban and rural areas. Although urban areas had higher availability of 'healthy' foods, the cost of changing to a healthy diet in urban areas was also greater. Improvement in the food environment is needed to support people in adopting healthy food choices.

  13. Utilization of Neurophysiological Protocols to Characterize Soldier Response to Irritant Gases. Phase 1.

    Science.gov (United States)

    1990-02-15

    DAMM7-89-C-9136 7. PERFORMING ORGANIZATION NAME(S) AND AOO«£S$<£S) Northeast Reserach Institute, Inc Suite A-100 309 Farmington Avenue...is no widely accepted methodology or protocol lor the assessment of human toxicity induced by exposure to irritant gases. Most procedures used by the...employing the appropriate analytical methodologies necessary to more precisely characterize the complex mixture of low-boiling volatilcs, aerosols, and

  14. Genome-wide RNAi Screening to Identify Host Factors That Modulate Oncolytic Virus Therapy.

    Science.gov (United States)

    Allan, Kristina J; Mahoney, Douglas J; Baird, Stephen D; Lefebvre, Charles A; Stojdl, David F

    2018-04-03

    High-throughput genome-wide RNAi (RNA interference) screening technology has been widely used for discovering host factors that impact virus replication. Here we present the application of this technology to uncovering host targets that specifically modulate the replication of Maraba virus, an oncolytic rhabdovirus, and vaccinia virus with the goal of enhancing therapy. While the protocol has been tested for use with oncolytic Maraba virus and oncolytic vaccinia virus, this approach is applicable to other oncolytic viruses and can also be utilized for identifying host targets that modulate virus replication in mammalian cells in general. This protocol describes the development and validation of an assay for high-throughput RNAi screening in mammalian cells, the key considerations and preparation steps important for conducting a primary high-throughput RNAi screen, and a step-by-step guide for conducting a primary high-throughput RNAi screen; in addition, it broadly outlines the methods for conducting secondary screen validation and tertiary validation studies. The benefit of high-throughput RNAi screening is that it allows one to catalogue, in an extensive and unbiased fashion, host factors that modulate any aspect of virus replication for which one can develop an in vitro assay such as infectivity, burst size, and cytotoxicity. It has the power to uncover biotherapeutic targets unforeseen based on current knowledge.

  15. A family of multi-party authentication protocols

    NARCIS (Netherlands)

    Cremers, C.J.F.; Mauw, S.

    2006-01-01

    We introduce a family of multi-party authentication protocols and discuss six novel protocols, which are members of this family. The first three generalize the well-known Needham-Schroeder-Lowe public-key protocol, the Needham-Schroeder private-key protocol, and the Bilateral Key Exchange protocol.

  16. 75 FR 36516 - Addition and Removal of Certain Persons on the Entity List: Addition of Persons Acting Contrary...

    Science.gov (United States)

    2010-06-28

    ... reasons. OnTime Electronics Technology Company and Tam Wai Tak, a.k.a., Thomsom Tam, are being added due... June 5, 2008, OnTime Electronics Technology Company and Tam Wai Tak were indicted in the Southern... Commercial Center, 28 Ferry Street, Jordon, Kowloon, Hong Kong; and (2) Tam Wai Tak, a.k.a., Thomsom Tam...

  17. World-Wide Web the information universe

    CERN Document Server

    Berners-Lee, Tim; Groff, Jean-Francois; Pollermann, Bernd

    1992-01-01

    Purpose - The World-Wide Web (W-3) initiative is a practical project designed to bring a global information universe into existence using available technology. This paper seeks to describe the aims, data model, and protocols needed to implement the "web" and to compare them with various contemporary systems. Design/methodology/approach - Since Vannevar Bush's article, men have dreamed of extending their intellect by making their collective knowledge available to each individual by using machines. Computers provide us two practical techniques for human-knowledge interface. One is hypertext, in which links between pieces of text (or other media) mimic human association of ideas. The other is text retrieval, which allows associations to be deduced from the content of text. The W-3 ideal world allows both operations and provides access from any browsing platform. Findings - Various server gateways to other information systems have been produced, and the total amount of information available on the web is...

  18. Developing an optimum protocol for thermoluminescence dosimetry with gr-200 chips using Taguchi method

    International Nuclear Information System (INIS)

    Sadeghi, Maryam; Faghihi, Reza; Sina, Sedigheh

    2017-01-01

    Thermoluminescence dosimetry (TLD) is a powerful technique with wide applications in personal, environmental and clinical dosimetry. The optimum annealing, storage and reading protocols are very effective in accuracy of TLD response. The purpose of this study is to obtain an optimum protocol for GR-200; LiF: Mg, Cu, P, by optimizing the effective parameters, to increase the reliability of the TLD response using Taguchi method. Taguchi method has been used in this study for optimization of annealing, storage and reading protocols of the TLDs. A number of 108 GR-200 chips were divided into 27 groups, each containing four chips. The TLDs were exposed to three different doses, and stored, annealed and read out by different procedures as suggested by Taguchi Method. By comparing the signal-to-noise ratios the optimum dosimetry procedure was obtained. According to the results, the optimum values for annealing temperature (de.C), Annealing Time (s), Annealing to Exposure time (d), Exposure to Readout time (d), Pre-heat Temperature (de.C), Pre-heat Time (s), Heating Rate (de.C/s), Maximum Temperature of Readout (de.C), readout time (s) and Storage Temperature (de.C) are 240, 90, 1, 2, 50, 0, 15, 240, 13 and -20, respectively. Using the optimum protocol, an efficient glow curve with low residual signals can be achieved. Using optimum protocol obtained by Taguchi method, the dosimetry can be effectively performed with great accuracy. (authors)

  19. A practical and successful desensitization protocol for immediate hypersensitivity reactions to iron salts.

    Science.gov (United States)

    Demir, Semra; Olgac, Muge; Unal, Derya; Gelincik, Asli; Colakoglu, Bahauddin; Buyukozturk, Suna

    2014-01-01

    Orally administered iron salts (OAS) are widely used in the management of iron deficiency anemia and hypersensitivity reactions to OAS are not common. If an offending drug is the sole option or is significantly more effective than its alternatives, it can be readministered by desensitization. The oral desensitization protocols for iron published so far concern either desensitization that was completed only over a long period or did not attain the recommended therapeutic dose. We aimed to develop a more effective protocol. We report here on 2 patients who experienced hypersensitivity reactions to OAS. After confirming the diagnosis, both patients were desensitized to oral ferrous (II) glycine sulfate complex according to a 2-day desensitization protocol. A commercial suspension of oral ferrous glycine sulfate, which contains 4 mg of elemental iron in 1 ml, was preferred. We started with a dose as low as 0.1 ml from a 1/100 dilution (0.004 mg elemental iron) of the original suspension and reached the maximum effective dose in 2 days. Both patients were successfully desensitized and they went on to complete the 6-month iron treatment without any adverse effects. Although hypersensitvity reactions to iron are not common, there is no alternative for iron administration. Therefore, desensitization has to be the choice. This easy desensitization protocol seems to be a promising option. © 2014 S. Karger AG, Basel.

  20. A Cryptographic Moving-Knife Cake-Cutting Protocol

    Directory of Open Access Journals (Sweden)

    Yoshifumi Manabe

    2012-02-01

    Full Text Available This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum.

  1. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... active and adaptive corruptions in the random oracle model. Due to its simplicity, the protocol is extremely efficient and it allows to perform m 1-out-of-n OTs using only: - Computation: (n+1)m+2 exponentiations (mn for the receiver, mn+2 for the sender) and - Communication: 32(m+1) bytes (for the group...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  2. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  3. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  4. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  5. Asymptotic adaptive bipartite entanglement-distillation protocol

    International Nuclear Information System (INIS)

    Hostens, Erik; Dehaene, Jeroen; De Moor, Bart

    2006-01-01

    We present an asymptotic bipartite entanglement-distillation protocol that outperforms all existing asymptotic schemes. This protocol is based on the breeding protocol with the incorporation of two-way classical communication. Like breeding, the protocol starts with an infinite number of copies of a Bell-diagonal mixed state. Breeding can be carried out as successive stages of partial information extraction, yielding the same result: one bit of information is gained at the cost (measurement) of one pure Bell state pair (ebit). The basic principle of our protocol is at every stage to replace measurements on ebits by measurements on a finite number of copies, whenever there are two equiprobable outcomes. In that case, the entropy of the global state is reduced by more than one bit. Therefore, every such replacement results in an improvement of the protocol. We explain how our protocol is organized as to have as many replacements as possible. The yield is then calculated for Werner states

  6. A Fast Silver Staining Protocol Enabling Simple and Efficient Detection of SSR Markers using a Non-denaturing Polyacrylamide Gel.

    Science.gov (United States)

    Huang, Ling; Deng, Xiaohui; Li, Ronghua; Xia, Yanshi; Bai, Guihua; Siddique, Kadambot H M; Guo, Peiguo

    2018-04-20

    Simple Sequence Repeat (SSR) is one of the most effective markers used in plant and animal genetic research and molecular breeding programs. Silver staining is a widely used method for the detection of SSR markers in a polyacrylamide gel. However, conventional protocols for silver staining are technically demanding and time-consuming. Like many other biological laboratory techniques, silver staining protocols have been steadily optimized to improve detection efficiency. Here, we report a simplified silver staining method that significantly reduces reagent costs and enhances the detection resolution and picture clarity. The new method requires two major steps (impregnation and development) and three reagents (silver nitrate, sodium hydroxide, and formaldehyde), and only 7 min of processing for a non-denaturing polyacrylamide gel. Compared to previously reported protocols, this new method is easier, quicker and uses fewer chemical reagents for SSR detection. Therefore, this simple, low-cost, and effective silver staining protocol will benefit genetic mapping and marker-assisted breeding by a quick generation of SSR marker data.

  7. ASSESSMENT OF RIP-V1 AND OSPF-V2 PROTOCOL WITH CONSIDERATION OF CONVERGENCE CRITERIA AND SENDING PROTOCOLS TRAFFIC

    Directory of Open Access Journals (Sweden)

    Hamed Jelodar

    2014-03-01

    Full Text Available Routing Protocols are underlying principles in networks like internet, transport and mobile. Routing Protocols include a series of rules and algorithms that consider routing metric and select the best way for sending healthy data packets from origin to destination. Dynamic routing protocol compatible to topology has a changeable state. RIP and OSPF are dynamic routing protocol that we consider criteria like convergence and sending protocols traffic assessment RIP first version and OSPF second version. By the test we have done on OPNET stimulation we understood that the OSPF protocol was more efficient than RIP protocol.

  8. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols.

    Science.gov (United States)

    Campagne, Fabien

    2008-02-29

    The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79-0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86-0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these protocols can fully substitute

  9. A Power-Efficient Access Point Operation for Infrastructure Basic Service Set in IEEE 802.11 MAC Protocol

    Directory of Open Access Journals (Sweden)

    Hua Ye Ming

    2006-01-01

    Full Text Available Infrastructure-based wireless LAN technology has been widely used in today's personal communication environment. Power efficiency and battery management have been the center of attention in the design of handheld devices with wireless LAN capability. In this paper, a hybrid protocol named improved PCF operation is proposed, which intelligently chooses the access point- (AP- assisted DCF (distributed coordinator function and enhanced PCF (point coordinator function transmission mechanism of IEEE 802.11 protocol in an infrastructure-based wireless LAN environment. Received signal strength indicator (RSSI is used to determine the tradeoff between direct mobile-to-mobile transmission and transmission routed by AP. Based on the estimation, mobile stations can efficiently communicate directly instead of being routed through AP if they are in the vicinity of each other. Furthermore, a smart AP protocol is proposed as extension to the improved PCF operation by utilizing the historical end-to-end delay information to decide the waking up time of mobile stations. Simulation results show that using the proposed protocol, energy consumption of mobile devices can be reduced at the cost of slightly longer end-to-end packet delay compared to traditional IEEE 802.11 PCF protocol. However, in a non-time-critical environment, this option can significantly prolong the operation time of mobile devices.

  10. Nonpainful wide-area compression inhibits experimental pain.

    Science.gov (United States)

    Honigman, Liat; Bar-Bachar, Ofrit; Yarnitsky, David; Sprecher, Elliot; Granovsky, Yelena

    2016-09-01

    Compression therapy, a well-recognized treatment for lymphoedema and venous disorders, pressurizes limbs and generates massive non-noxious afferent sensory barrages. The aim of this study was to study whether such afferent activity has an analgesic effect when applied on the lower limbs, hypothesizing that larger compression areas will induce stronger analgesic effects, and whether this effect correlates with conditioned pain modulation (CPM). Thirty young healthy subjects received painful heat and pressure stimuli (47°C for 30 seconds, forearm; 300 kPa for 15 seconds, wrist) before and during 3 compression protocols of either SMALL (up to ankles), MEDIUM (up to knees), or LARGE (up to hips) compression areas. Conditioned pain modulation (heat pain conditioned by noxious cold water) was tested before and after each compression protocol. The LARGE protocol induced more analgesia for heat than the SMALL protocol (P < 0.001). The analgesic effect interacted with gender (P = 0.015). The LARGE protocol was more efficient for females, whereas the MEDIUM protocol was more efficient for males. Pressure pain was reduced by all protocols (P < 0.001) with no differences between protocols and no gender effect. Conditioned pain modulation was more efficient than the compression-induced analgesia. For the LARGE protocol, precompression CPM efficiency positively correlated with compression-induced analgesia. Large body area compression exerts an area-dependent analgesic effect on experimental pain stimuli. The observed correlation with pain inhibition in response to robust non-noxious sensory stimulation may suggest that compression therapy shares similar mechanisms with inhibitory pain modulation assessed through CPM.

  11. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  12. [Computerized clinical protocol for occlusion].

    Science.gov (United States)

    Salsench, J; Ferrer, J; Nogueras, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself. In this work we all data collected in the protocol and we give the explanations of each concept.

  13. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  14. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  15. Group covariant protocols for quantum string commitment

    International Nuclear Information System (INIS)

    Tsurumaru, Toyohiro

    2006-01-01

    We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next using this result, we prove that for every irreducible representation of a finite group, there always exists a corresponding nontrivial QSC protocol which reaches a level of security impossible to achieve classically

  16. Families of quantum fingerprinting protocols

    Science.gov (United States)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  17. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  18. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  19. FLIP: Federation support for Long range low power Internet of things Protocols

    OpenAIRE

    Delbruel, Stéphane; Small, Nicolas; Hughes, Danny

    2017-01-01

    There is growing interest in the Internet of Things (IoT) and especially Low-Power Wide Area Networks (LPWAN), which are rapidly being rolled-out globally. Within the LPWAN market, LoRaWAN is considered a leading solution which has achieved significant success. Despite the rapid uptake of LoRaWAN, scalability concerns arising from interference and contention are also growing. While the current LoRaWAN protocol includes basic techniques to deal with these problems, recent research has shown th...

  20. Effectiveness of oxaliplatin desensitization protocols.

    Science.gov (United States)

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  1. A Distributed Approach towards Improved Dissemination Protocol for Smooth Handover in MediaSense IoT Platform

    Directory of Open Access Journals (Sweden)

    Shabir Ahmad

    2018-05-01

    Full Text Available Recently, the Internet has been utilized by many applications to convey time-sensitive messages. The persistently expanding Internet coverage and its easy accessibility have offered to ascend to a problem which was once regarded as not essential to contemplate. Nowadays, the Internet has been utilized by many applications to convey time-sensitive messages. Wireless access points have widely been used but these access points have limitations regarding area coverage. So for covering a wider space, various access points need to be introduced. Therefore, when the user moves to some other place, the devices expected to switch between access points. Packet loss amid the handovers is a trivial issue. MediaSense is an Internet of Things distributed architecture enabling the development of the IoT application faster. It deals with this trivial handover issue by utilizing a protocol called Distributed Context eXchange Protocol. However, this protocol is centralized in nature and also suffers in a scenario when both sender and receiver address change simultaneously. This paper presents a mechanism to deal with this scenario and presents a distributed solution to deal with this issue within the MediaSense platform. The proposed protocol improves dissemination using retransmission mechanism to diminish packet loss. The proposed protocol has been delineated with a proof of concept chat application and the outcomes have indicated a significant improvement in terms of packet loss.

  2. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  3. Research and application of ARP protocol vulnerability attack and defense technology based on trusted network

    Science.gov (United States)

    Xi, Huixing

    2017-03-01

    With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.

  4. Phase Transition in Protocols Minimizing Work Fluctuations

    Science.gov (United States)

    Solon, Alexandre P.; Horowitz, Jordan M.

    2018-05-01

    For two canonical examples of driven mesoscopic systems—a harmonically trapped Brownian particle and a quantum dot—we numerically determine the finite-time protocols that optimize the compromise between the standard deviation and the mean of the dissipated work. In the case of the oscillator, we observe a collection of protocols that smoothly trade off between average work and its fluctuations. However, for the quantum dot, we find that as we shift the weight of our optimization objective from average work to work standard deviation, there is an analog of a first-order phase transition in protocol space: two distinct protocols exchange global optimality with mixed protocols akin to phase coexistence. As a result, the two types of protocols possess qualitatively different properties and remain distinct even in the infinite duration limit: optimal-work-fluctuation protocols never coalesce with the minimal-work protocols, which therefore never become quasistatic.

  5. Are chronotype, social jetlag and sleep duration associated with health measured by Work Ability Index?

    Science.gov (United States)

    Yong, Mei; Fischer, Dorothee; Germann, Christina; Lang, Stefan; Vetter, Céline; Oberlinner, Christoph

    The present study investigates the impact of chronotype, social jetlag and sleep duration on self-perceived health, measured by Work Ability Index (WAI), within an industrial setting. Between 2011 and 2013, 2474 day and shift workers participated in a health check offered by an occupational health promotion program and filled out the Munich ChronoType Questionnaire (adapted to the rotational 12-h schedule for shift workers) and the WAI. We computed sleep duration on work and free days, chronotype, and social jetlag. We used linear regression models to examine chronotype, sleep duration and social jetlag for association with the WAI sum score, and proportional odds models to estimate the combined effect of social jetlag and sleep duration. Participants reported an average daily sleep duration of 7.35 h (SD: 1.2 h), had an average chronotype of 3:08 a.m. (SD: 1 h), and the average social jetlag corresponded to 1.96 h (SD: 2.05 h). Increasing social jetlag and shorter sleep duration were independently associated with a decreasing WAI, while chronotype per se was not associated with WAI. Short sleep duration combined with high social jetlag significantly increased the risk of poor WAI (OR = 1.36; 95% CI: 1.09-1.72), while long sleep duration and high social jetlag were not associated with poor WAI (OR = 1.09; 95% CI: 0.88-1.35). Our results add to a growing body of literature, suggesting that circadian misalignment, but not chronotype per se, may be critical for health. Our results indicate that longer sleep may override the adverse effects of social jetlag on WAI.

  6. Effects of a peracetic acid disinfection protocol on the biocompatibility and biomechanical properties of human patellar tendon allografts.

    Science.gov (United States)

    Lomas, R J; Jennings, L M; Fisher, J; Kearney, J N

    2004-01-01

    Patellar tendon allografts, retrieved from cadaveric human donors, are widely used for replacement of damaged cruciate ligaments. In common with other tissue allografts originating from cadaveric donors, there are concerns regarding the potential for disease transmission from the donor to the recipient. Additionally, retrieval and subsequent processing protocols expose the graft to the risk of environmental contamination. For these reasons, disinfection or sterilisation protocols are necessary for these grafts before they are used clinically. A high-level disinfection protocol, utilising peracetic acid (PAA), has been developed and investigated for its effects on the biocompatibility and biomechanics of the patellar tendon allografts. PAA disinfection did not render the grafts either cytotoxic or liable to provoke an inflammatory response as assessed in vitro . However, the protocol was shown to increase the size of gaps between the tendon fibres in the matrix and render the grafts more susceptible to digestion with collagenase. Biomechanical studies of the tendons showed that PAA treatment had no effect on the ultimate tensile stress or Young's modulus of the tendons, and that ultimate strain was significantly higher in PAA treated tendons.

  7. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  8. Psychological variables and Wechsler Adult Intelligence Scale-IV performance.

    Science.gov (United States)

    Gass, Carlton S; Gutierrez, Laura

    2017-01-01

    The MMPI-2 and WAIS-IV are commonly used together in neuropsychological evaluations yet little is known about their interrelationships. This study explored the potential influence of psychological factors on WAIS-IV performance in a sample of 180 predominantly male veteran referrals that underwent a comprehensive neuropsychological examination in a VA Medical Center. Exclusionary criteria included failed performance validity testing and self-report distortion on the MMPI-2. A Principal Components Analysis was performed on the 15 MMPI-2 content scales, yielding three broader higher-order psychological dimensions: Internalized Emotional Dysfunction (IED), Externalized Emotional Dysfunction (EED), and Fear. Level of IED was not related to performance on the WAIS-IV Full Scale IQ or its four indexes: (Verbal Comprehension, Perceptual Reasoning, Working Memory, and Processing Speed). EED was not related to WAIS-IV performance. Level of Fear, which encompasses health preoccupations (HEA) and distorted perceptions (BIZ), was significantly related to WAIS-IV Full Scale IQ and Verbal Comprehension. These results challenge the common use of high scores on the MMPI-2 IED measures (chiefly depression and anxiety) to explain deficient WAIS-IV performance. In addition, they provide impetus for further investigation of the relation between verbal intelligence and Fear.

  9. Regular Topologies for Gigabit Wide-Area Networks. Volume 1

    Science.gov (United States)

    Shacham, Nachum; Denny, Barbara A.; Lee, Diane S.; Khan, Irfan H.; Lee, Danny Y. C.; McKenney, Paul

    1994-01-01

    In general terms, this project aimed at the analysis and design of techniques for very high-speed networking. The formal objectives of the project were to: (1) Identify switch and network technologies for wide-area networks that interconnect a large number of users and can provide individual data paths at gigabit/s rates; (2) Quantitatively evaluate and compare existing and proposed architectures and protocols, identify their strength and growth potentials, and ascertain the compatibility of competing technologies; and (3) Propose new approaches to existing architectures and protocols, and identify opportunities for research to overcome deficiencies and enhance performance. The project was organized into two parts: 1. The design, analysis, and specification of techniques and protocols for very-high-speed network environments. In this part, SRI has focused on several key high-speed networking areas, including Forward Error Control (FEC) for high-speed networks in which data distortion is the result of packet loss, and the distribution of broadband, real-time traffic in multiple user sessions. 2. Congestion Avoidance Testbed Experiment (CATE). This part of the project was done within the framework of the DARTnet experimental T1 national network. The aim of the work was to advance the state of the art in benchmarking DARTnet's performance and traffic control by developing support tools for network experimentation, by designing benchmarks that allow various algorithms to be meaningfully compared, and by investigating new queueing techniques that better satisfy the needs of best-effort and reserved-resource traffic. This document is the final technical report describing the results obtained by SRI under this project. The report consists of three volumes: Volume 1 contains a technical description of the network techniques developed by SRI in the areas of FEC and multicast of real-time traffic. Volume 2 describes the work performed under CATE. Volume 3 contains the source

  10. Design, Implementation, and Verification of the Reliable Multicast Protocol. Thesis

    Science.gov (United States)

    Montgomery, Todd L.

    1995-01-01

    This document describes the Reliable Multicast Protocol (RMP) design, first implementation, and formal verification. RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service. RMP is fully and symmetrically distributed so that no site bears an undue portion of the communications load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These guarantees are selectable on a per message basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, a client/server model of delivery, mutually exclusive handlers for messages, and mutually exclusive locks. It has been commonly believed that total ordering of messages can only be achieved at great performance expense. RMP discounts this. The first implementation of RMP has been shown to provide high throughput performance on Local Area Networks (LAN). For two or more destinations a single LAN, RMP provides higher throughput than any other protocol that does not use multicast or broadcast technology. The design, implementation, and verification activities of RMP have occurred concurrently. This has allowed the verification to maintain a high fidelity between design model, implementation model, and the verification model. The restrictions of implementation have influenced the design earlier than in normal sequential approaches. The protocol as a whole has matured smoother by the inclusion of several different perspectives into the product development.

  11. Developing an Optimum Protocol for Thermoluminescence Dosimetry with GR-200 Chips using Taguchi Method.

    Science.gov (United States)

    Sadeghi, Maryam; Faghihi, Reza; Sina, Sedigheh

    2017-06-15

    Thermoluminescence dosimetry (TLD) is a powerful technique with wide applications in personal, environmental and clinical dosimetry. The optimum annealing, storage and reading protocols are very effective in accuracy of TLD response. The purpose of this study is to obtain an optimum protocol for GR-200; LiF: Mg, Cu, P, by optimizing the effective parameters, to increase the reliability of the TLD response using Taguchi method. Taguchi method has been used in this study for optimization of annealing, storage and reading protocols of the TLDs. A number of 108 GR-200 chips were divided into 27 groups, each containing four chips. The TLDs were exposed to three different doses, and stored, annealed and read out by different procedures as suggested by Taguchi Method. By comparing the signal-to-noise ratios the optimum dosimetry procedure was obtained. According to the results, the optimum values for annealing temperature (°C), Annealing Time (s), Annealing to Exposure time (d), Exposure to Readout time (d), Pre-heat Temperature (°C), Pre-heat Time (s), Heating Rate (°C/s), Maximum Temperature of Readout (°C), readout time (s) and Storage Temperature (°C) are 240, 90, 1, 2, 50, 0, 15, 240, 13 and -20, respectively. Using the optimum protocol, an efficient glow curve with low residual signals can be achieved. Using optimum protocol obtained by Taguchi method, the dosimetry can be effectively performed with great accuracy. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  12. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  13. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    Science.gov (United States)

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  14. Maximally efficient protocols for direct secure quantum communication

    Energy Technology Data Exchange (ETDEWEB)

    Banerjee, Anindita [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); Department of Physics and Center for Astroparticle Physics and Space Science, Bose Institute, Block EN, Sector V, Kolkata 700091 (India); Pathak, Anirban, E-mail: anirban.pathak@jiit.ac.in [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); RCPTM, Joint Laboratory of Optics of Palacky University and Institute of Physics of Academy of Science of the Czech Republic, Faculty of Science, Palacky University, 17. Listopadu 12, 77146 Olomouc (Czech Republic)

    2012-10-01

    Two protocols for deterministic secure quantum communication (DSQC) using GHZ-like states have been proposed. It is shown that one of these protocols is maximally efficient and that can be modified to an equivalent protocol of quantum secure direct communication (QSDC). Security and efficiency of the proposed protocols are analyzed and compared. It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. Maximally efficient QSDC protocols are shown to be more efficient than their DSQC counterparts. This additional efficiency arises at the cost of message transmission rate. -- Highlights: ► Two protocols for deterministic secure quantum communication (DSQC) are proposed. ► One of the above protocols is maximally efficient. ► It is modified to an equivalent protocol of quantum secure direct communication (QSDC). ► It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. ► Efficient QSDC protocols are always more efficient than their DSQC counterparts.

  15. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  16. Welfare Quality assessment protocol for laying hens = Welfare Quality assessment protocol voor leghennen

    NARCIS (Netherlands)

    Niekerk, van T.G.C.M.; Gunnink, H.; Reenen, van C.G.

    2012-01-01

    Results of a study on the Welfare Quality® assessment protocol for laying hens. It reports the development of the integration of welfare assessment as scores per criteria as well as simplification of the Welfare Quality® assessment protocol. Results are given from assessment of 122 farms.

  17. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  18. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  19. TH-E-209-02: Dose Monitoring and Protocol Optimization: The Pediatric Perspective

    International Nuclear Information System (INIS)

    MacDougall, R.

    2016-01-01

    Radiation dose monitoring solutions have opened up new opportunities for medical physicists to be more involved in modern clinical radiology practices. In particular, with the help of comprehensive radiation dose data, data-driven protocol management and informed case follow up are now feasible. Significant challenges remain however and the problems faced by medical physicists are highly heterogeneous. Imaging systems from multiple vendors and a wide range of vintages co-exist in the same department and employ data communication protocols that are not fully standardized or implemented making harmonization complex. Many different solutions for radiation dose monitoring have been implemented by imaging facilities over the past few years. Such systems are based on commercial software, home-grown IT solutions, manual PACS data dumping, etc., and diverse pathways can be used to bring the data to impact clinical practice. The speakers will share their experiences with creating or tailoring radiation dose monitoring/management systems and procedures over the past few years, which vary significantly in design and scope. Topics to cover: (1) fluoroscopic dose monitoring and high radiation event handling from a large academic hospital; (2) dose monitoring and protocol optimization in pediatric radiology; and (3) development of a home-grown IT solution and dose data analysis framework. Learning Objectives: Describe the scope and range of radiation dose monitoring and protocol management in a modern radiology practice Review examples of data available from a variety of systems and how it managed and conveyed. Reflect on the role of the physicist in radiation dose awareness.

  20. TH-E-209-02: Dose Monitoring and Protocol Optimization: The Pediatric Perspective

    Energy Technology Data Exchange (ETDEWEB)

    MacDougall, R. [Boston Children’s Hospital (United States)

    2016-06-15

    Radiation dose monitoring solutions have opened up new opportunities for medical physicists to be more involved in modern clinical radiology practices. In particular, with the help of comprehensive radiation dose data, data-driven protocol management and informed case follow up are now feasible. Significant challenges remain however and the problems faced by medical physicists are highly heterogeneous. Imaging systems from multiple vendors and a wide range of vintages co-exist in the same department and employ data communication protocols that are not fully standardized or implemented making harmonization complex. Many different solutions for radiation dose monitoring have been implemented by imaging facilities over the past few years. Such systems are based on commercial software, home-grown IT solutions, manual PACS data dumping, etc., and diverse pathways can be used to bring the data to impact clinical practice. The speakers will share their experiences with creating or tailoring radiation dose monitoring/management systems and procedures over the past few years, which vary significantly in design and scope. Topics to cover: (1) fluoroscopic dose monitoring and high radiation event handling from a large academic hospital; (2) dose monitoring and protocol optimization in pediatric radiology; and (3) development of a home-grown IT solution and dose data analysis framework. Learning Objectives: Describe the scope and range of radiation dose monitoring and protocol management in a modern radiology practice Review examples of data available from a variety of systems and how it managed and conveyed. Reflect on the role of the physicist in radiation dose awareness.

  1. Universally composable protocols with relaxed set-up assumptions

    DEFF Research Database (Denmark)

    Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus

    2004-01-01

    A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally composable (UC) protocols provide this guarantee in a strong sense: A protocol remains secure even when composed concurrently with an unbounded number of ...

  2. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  3. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  4. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  5. A comparative study on the energy policies in Japan and Malaysia in fulfilling their nations' obligations towards the Kyoto Protocol

    International Nuclear Information System (INIS)

    Lau, Lee Chung; Tan, Kok Tat; Lee, Keat Teong; Mohamed, Abdul Rahman

    2009-01-01

    Global warming and the associated changes in the world climate pattern have been accepted world wide as the gravest threat to humanity in the 20th century. To mitigate the impacts of global warming, the Kyoto Protocol was established in 1997 with the objective of reducing global greenhouse gases (GHGs) emission, in particular carbon dioxide (CO 2 ), by 5.2% below 1990 levels. Developed nations that ratified the Protocol are committed to GHG reduction targets while developing nations are encouraged to reduce GHG emissions on a voluntary basis. Since most of the GHGs emissions come from the energy sector, energy policy plays an important role in fulfilling the Kyoto Protocol obligations. This year marks the beginning of the commitment period for the 2012 Kyoto Protocol. In this case, it would be worthwhile to compare the energy policies in Malaysia and Japan as these nations move towards fulfilling their obligations towards the Kyoto Protocol; bearing in mind that both countries ratified the Protocol, but that Japan commits a reduction target of 6% while Malaysia bears no obligation. Based on the comparison, recommendations were made on how a developing nation like Malaysia could adopt the policies implemented in Japan to suit local conditions and contribute significantly to GHG reduction.

  6. Chapter 22: Compressed Air Evaluation Protocol. The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Benton, Nathanael [Nexant, Inc., San Francisco, CA (United States); Burns, Patrick [Nexant, Inc., San Francisco, CA (United States)

    2017-10-18

    Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: High-efficiency/variable speed drive (VSD) compressor replacing modulating, load/unload, or constant-speed compressor; and Compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

  7. e-SCP-ECG+ Protocol: An Expansion on SCP-ECG Protocol for Health Telemonitoring—Pilot Implementation

    Directory of Open Access Journals (Sweden)

    George J. Mandellos

    2010-01-01

    Full Text Available Standard Communication Protocol for Computer-assisted Electrocardiography (SCP-ECG provides standardized communication among different ECG devices and medical information systems. This paper extends the use of this protocol in order to be included in health monitoring systems. It introduces new sections into SCP-ECG structure for transferring data for positioning, allergies, and five additional biosignals: noninvasive blood pressure (NiBP, body temperature (Temp, Carbon dioxide (CO2, blood oxygen saturation (SPO2, and pulse rate. It also introduces new tags in existing sections for transferring comprehensive demographic data. The proposed enhanced version is referred to as e-SCP-ECG+ protocol. This paper also considers the pilot implementation of the new protocol as a software component in a Health Telemonitoring System.

  8. Intelligence is in the eye of the beholder: investigating repeated IQ measurements in forensic psychiatry.

    Science.gov (United States)

    Habets, Petra; Jeandarme, Inge; Uzieblo, Kasia; Oei, Karel; Bogaerts, Stefan

    2015-05-01

    A stable assessment of cognition is of paramount importance for forensic psychiatric patients (FPP). The purpose of this study was to compare repeated measures of IQ scores in FPPs with and without intellectual disability. Repeated measurements of IQ scores in FPPs (n = 176) were collected. Differences between tests were computed, and each IQ score was categorized. Additionally, t-tests and regression analyses were performed. Differences of 10 points or more were found in 66% of the cases comparing WAIS-III with RAVEN scores. Fisher's exact test revealed differences between two WAIS-III scores and the WAIS categories. The WAIS-III did not predict other IQs (WAIS or RAVEN) in participants with intellectual disability. This study showed that stability or interchangeability of scores is lacking, especially in individuals with intellectual disability. Caution in interpreting IQ scores is therefore recommended, and the use of the unitary concept of IQ should be discouraged. © 2014 John Wiley & Sons Ltd.

  9. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  10. Climate policy and trade policy - The French proposal for a EU-wide border tax adjustment for CO2 emissions

    International Nuclear Information System (INIS)

    Damian, M.; Abbasn, M.

    2007-01-01

    The paper examines the French proposal to establish a EU-wide border tax adjustment for CO 2 emissions. The tax seeks to offset competitive distortions toward European industries which incur the cost of the Kyoto Protocol and to prompt European competitors to join the Kyoto Protocol. So far, the debate has chiefly focused on the compatibility of such a border tax adjustment with the rules of the multilateral trading system of the World Trade Organization. Without auguring how a dispute would eventually be settled within the WTO frame-work, the paper argues that the implementation of a border tax adjustment is not as much an issue of technical feasibility or compatibility with the multilateral trading system, as a matter of collective determination to drastically reduce greenhouse gas emissions. The French proposal is a yardstick for climate policy after the expiration of the Kyoto Protocol in 2012. The paper looks in more details into the core directions of pending negotiations. (authors)

  11. Dating glacimarine sediments from the continental shelf in the Amundsen Sea using a multi-tool box: Implications for West Antarctic ice-sheet extent and retreat during the last glacial cycle

    Science.gov (United States)

    Hillenbrand, C. D.; Smith, J.; Klages, J. P.; Kuhn, G.; Maher, B.; Moreton, S.; Wacker, L.; Frederichs, T.; Wiers, S.; Jernas, P.; Anderson, J. B.; Ehrmann, W. U.; Graham, A. G. C.; Gohl, K.; Larter, R. D.

    2016-02-01

    Satellite data and in-situ measurements show that today considerable mass loss is occurring from the Amundsen Sea sector of the West Antarctic Ice Sheet (WAIS). The observational record only spans the past four decades, and until recently the long-term context of the current deglaciation was poorly constrained. This information is, however, crucial for understanding WAIS dynamics, evaluating the role of forcing mechanisms for ice-sheet melting, and testing and calibrating ice-sheet models that attempt to predict future WAIS behavior and its impact on global sea level. Over the past decade several multinational marine expeditions and terrestrial fieldwork campaigns have targeted the Amundsen Sea shelf and its hinterland to reconstruct the WAIS configuration during the Last Glacial Maximum (LGM) and its subsequent deglacial history. The resulting studies succeeded in shedding light on the maximum WAIS extent at the LGM and the style, pattern and speed of its retreat and thinning thereafter. Despite this progress, however, significant uncertainties and discrepancies between marine and terrestrial reconstructions remain, which may arise from difficulties in dating sediment cores from the Antarctic shelf, especially their deglacial sections. Resolving these issues is crucial for understanding the WAIS' contribution to post-LGM sea-level rise, its sensitivity to different forcing mechanisms and its future evolution. Here we present chronological constraints on WAIS advance in the Amundsen Sea and its retreat from 20 ka BP into the Holocene that were obtained by various techniques, such as 14C dating of large ( 10 mg) and small (sample aliquots of calcareous microfossils, 14C dating of acid-insoluble organic matter combusted at low (300 °C) and high (800 °C) temperatures and dating of sediment cores by using geomagnetic paleointensity. We will compare the different age constraints and discuss their reliability, applicability and implications for WAIS history.

  12. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees.

    Science.gov (United States)

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-04-01

    A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  13. Large family of quantum weak coin-flipping protocols

    International Nuclear Information System (INIS)

    Mochon, Carlos

    2005-01-01

    Each classical public-coin protocol for coin flipping is naturally associated with a quantum protocol for weak coin flipping. The quantum protocol is obtained by replacing classical randomness with quantum entanglement and by adding a cheat detection test in the last round that verifies the integrity of this entanglement. The set of such protocols defines a family which contains the protocol with bias 0.192 previously found by the author, as well as protocols with bias as low as 1/6 described herein. The family is analyzed by identifying a set of optimal protocols for every number of messages. In the end, tight lower bounds for the bias are obtained which prove that 1/6 is optimal for all protocols within the family

  14. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  15. The Kyoto Protocol. An economic appraisal

    International Nuclear Information System (INIS)

    Grubb, M.

    2000-05-01

    This paper examines the overall economics of the Kyoto Protocol on climate change, in three main parts. The first part explores the structure of the Protocol and how this matches against classical economic criteria of an 'optimal' climate change agreement. This discussion also considers the nature of and reasons for shortcomings, and the prospects for its evolution. Given the various flexibilities in the agreement, the Kyoto Protocol is far more economically efficient in its structure than any previous global environmental agreement. The central conclusion is that, from an economic perspective, the Protocol's structure for industrialised country commitments is as good as could reasonably be expected. The second part of the paper explores more closely the economics of the commitments themselves and how they combine with the various flexibilities, briefly reviewing the available literature and using a simple spreadsheet model of how the commitments might combine with trading mechanisms under a range of assumptions. Flexibility is intrinsic and necessary, but it is argued that the allocations to Russia and Ukraine in particular mean that unlimited flexibility could render the Protocol's commitments weaker in their impacts than is economically desirable to address climate change. It is argued that, should this prove to be the case, access to the large surplus in the transition economies could be used as a control valve to limit the costs of the Protocol to within acceptable limits. Finally, the paper considers the issues of developing country involvement in the Kyoto Protocol, and the Protocol's longer-term impact and evolution, including its impact on technological evolution and dissemination and the evolution of future commitments. It is argued that taking account of such issues critically affects views of the Protocol

  16. Test Protocols for Advanced Inverter Interoperability Functions – Main Document

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, Jay Dean [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gonzalez, Sigifredo [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ralph, Mark E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ellis, Abraham [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Broderick, Robert Joseph [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2013-11-01

    Distributed energy resources (DER) such as photovoltaic (PV) systems, when deployed in a large scale, are capable of influencing significantly the operation of power systems. Looking to the future, stakeholders are working on standards to make it possible to manage the potentially complex interactions between DER and the power system. In 2009, the Electric Power Research Institute (EPRI), Sandia National Laboratories (SNL) with the U.S. Department of Energy (DOE), and the Solar Electric Power Association (SEPA) initiated a large industry collaborative to identify and standardize definitions for a set of DER grid support functions. While the initial effort concentrated on grid-tied PV inverters and energy storage systems, the concepts have applicability to all DER. A partial product of this on-going effort is a reference definitions document (IEC TR 61850-90-7, Object models for power converters in distributed energy resources (DER) systems) that has become a basis for expansion of related International Electrotechnical Commission (IEC) standards, and is supported by US National Institute of Standards and Technology (NIST) Smart Grid Interoperability Panel (SGIP). Some industry-led organizations advancing communications protocols have also embraced this work. As standards continue to evolve, it is necessary to develop test protocols to independently verify that the inverters are properly executing the advanced functions. Interoperability is assured by establishing common definitions for the functions and a method to test compliance with operational requirements. This document describes test protocols developed by SNL to evaluate the electrical performance and operational capabilities of PV inverters and energy storage, as described in IEC TR 61850-90-7. While many of these functions are not currently required by existing grid codes or may not be widely available commercially, the industry is rapidly moving in that direction. Interoperability issues are already

  17. Computed Tomography of the Head and Neck Region for Tumor Staging-Comparison of Dual-Source, Dual-Energy and Low-Kilovolt, Single-Energy Acquisitions.

    Science.gov (United States)

    May, Matthias Stefan; Bruegel, Joscha; Brand, Michael; Wiesmueller, Marco; Krauss, Bernhard; Allmendinger, Thomas; Uder, Michael; Wuest, Wolfgang

    2017-09-01

    The aim of this study was to intra-individually compare the image quality obtained by dual-source, dual-energy (DSDE) computed tomography (CT) examinations and different virtual monoenergetic reconstructions to a low single-energy (SE) scan. Third-generation DSDE-CT was performed in 49 patients with histologically proven malignant disease of the head and neck region. Weighted average images (WAIs) and virtual monoenergetic images (VMIs) for low (40 and 60 keV) and high (120 and 190 keV) energies were reconstructed. A second scan aligned to the jaw, covering the oral cavity, was performed for every patient to reduce artifacts caused by dental hardware using a SE-CT protocol with 70-kV tube voltages and matching radiation dose settings. Objective image quality was evaluated by calculating contrast-to-noise ratios. Subjective image quality was evaluated by experienced radiologists. Highest contrast-to-noise ratios for vessel and tumor attenuation were obtained in 40-keV VMI (all P image quality was also highest for 40-keV, but differences to 60-keV VMI, WAI, and 70-kV SE were nonsignificant (all P > 0.05). High kiloelectron volt VMIs reduce metal artifacts with only limited diagnostic impact because of insufficiency in case of severe dental hardware. CTDIvol did not differ significantly between both examination protocols (DSDE: 18.6 mGy; 70-kV SE: 19.4 mGy; P = 0.10). High overall image quality for tumor delineation in head and neck imaging were obtained with 40-keV VMI. However, 70-kV SE examinations are an alternative and modified projections aligned to the jaw are recommended in case of severe artifacts caused by dental hardware.

  18. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  19. The Global and Local Climatic Response to the Collapse of the West Antarctic Ice Sheet

    Science.gov (United States)

    Huybers, K. M.; Singh, H.; Steiger, N. J.; Frierson, D. M.; Steig, E. J.; Bitz, C. M.

    2014-12-01

    Glaciologists have suggested that a relatively small external forcing may compromise the stability of the West Antarctic Ice Sheet (WAIS). Further, there is compelling physical evidence that the WAIS has collapsed in the past, at times when the mean global temperature was only a few degrees warmer than it is today. In addition to a rapid increase in global sea level, the collapse of the WAIS could also affect the global circulation of the atmosphere. Ice sheets are some of the largest topographic features on Earth, causing large regional anomalies in albedo and radiative balance. Our work uses idealized aquaplanet models in tandem with a fully coupled ocean/atmosphere/sea-ice model (CCSM4) to compare the atmospheric, radiative, and oceanic response to a complete loss of the WAIS. Initial findings indicate that the loss of the WAIS leads to a weakening and equator-ward shift of the zonal winds, a development of strong zonal asymmetries in the meridional wind, and a northward migration of the Intertropical Convergence Zone. We aim to characterize how the local and global climate is affected by the presence of the WAIS, and how changes in the distribution of Southern Hemisphere ice may be represented in the proxy record.

  20. Searching for a neurologic injury's Wechsler Adult Intelligence Scale-Third Edition profile.

    Science.gov (United States)

    Gonçalves, Marta A; Moura, Octávio; Castro-Caldas, Alexandre; Simões, Mário R

    2017-01-01

    This study aimed to investigate the presence of a Wechsler Adult Intelligence Scale-Third Edition (WAIS-III) cognitive profile in a Portuguese neurologic injured sample. The Portuguese WAIS-III was administered to 81 mixed neurologic patients and 81 healthy matched controls selected from the Portuguese standardization sample. Although the mixed neurologic injury group performed significantly lower than the healthy controls for the majority of the WAIS-III scores (i.e., composite measures, discrepancies, and subtests), the mean scores were within the normal range and, therefore, at risk of being unobserved in a clinical evaluation. ROC curves analysis showed poor to acceptable diagnostic accuracy for the WAIS-III composite measures and subtests (Working Memory Index and Digit Span revealed the highest accuracy for discriminating between participants, respectively). Multiple regression analysis showed that both literacy and the presence of brain injury were significant predictors for all of the composite measures. In addition, multiple regression analysis also showed that literacy, age of injury onset, and years of survival predicted all seven composite measures for the mixed neurologic injured group. Despite the failure to find a WAIS-III cognitive profile for mixed neurologic patients, the results showed a significant influence of brain lesion and literacy in the performance of the WAIS-III.

  1. Principles of the new quantum cryptography protocols building

    International Nuclear Information System (INIS)

    Kurochkin, V.; Kurochkin, Yu.

    2009-01-01

    The main aim of the quantum cryptography protocols is the maximal secrecy under the conditions of the real experiment. This work presents the result of the new protocol building with the use of the secrecy maximization. While using some well-known approaches this method has allowed one to achieve completely new results in quantum cryptography. The process of the protocol elaboration develops from the standard BB84 protocol upgrading to the building of completely new protocol with arbitrary large bases number. The secrecy proofs of the elaborated protocol appear to be natural continuation of the protocol building process. This approach reveals possibility to reach extremely high parameters of the protocol. It suits both the restrictions of contemporary technologies and requirements for high bit rate while being absolutely secret

  2. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  3. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  4. MR spectroscopy in children: protocols and pitfalls in non-tumorous brain pathology

    Energy Technology Data Exchange (ETDEWEB)

    Schneider, Jacques F. [University Children' s Hospital Basel (UKBB), Basel (Switzerland)

    2016-06-15

    Proton nuclear magnetic resonance spectroscopy (MRS) delivers information about cell content and metabolism in a noninvasive manner. The diagnostic strength of MRS lies in its evaluation of pathologies in combination with conventional magnetic resonance imaging (MRI). MRS in children has been most widely used to evaluate brain conditions like tumors, infections, metabolic diseases or learning disabilities and especially in neonates with hypoxic-ischemic encephalopathy. This article reviews some basic theoretical considerations, routine procedures, protocols and pitfalls and will illustrate the range of spectrum alterations occurring in some non-tumorous pediatric brain pathologies. (orig.)

  5. MR spectroscopy in children: protocols and pitfalls in non-tumorous brain pathology

    International Nuclear Information System (INIS)

    Schneider, Jacques F.

    2016-01-01

    Proton nuclear magnetic resonance spectroscopy (MRS) delivers information about cell content and metabolism in a noninvasive manner. The diagnostic strength of MRS lies in its evaluation of pathologies in combination with conventional magnetic resonance imaging (MRI). MRS in children has been most widely used to evaluate brain conditions like tumors, infections, metabolic diseases or learning disabilities and especially in neonates with hypoxic-ischemic encephalopathy. This article reviews some basic theoretical considerations, routine procedures, protocols and pitfalls and will illustrate the range of spectrum alterations occurring in some non-tumorous pediatric brain pathologies. (orig.)

  6. Development of a calibration protocol for quantitative imaging for molecular radiotherapy dosimetry

    International Nuclear Information System (INIS)

    Wevrett, J.; Fenwick, A.; Scuffham, J.; Nisbet, A.

    2017-01-01

    Within the field of molecular radiotherapy, there is a significant need for standardisation in dosimetry, in both quantitative imaging and dosimetry calculations. Currently, there are a wide range of techniques used by different clinical centres and as a result there is no means to compare patient doses between centres. To help address this need, a 3 year project was funded by the European Metrology Research Programme, and a number of clinical centres were involved in the project. One of the required outcomes of the project was to develop a calibration protocol for three dimensional quantitative imaging of volumes of interest. Two radionuclides were selected as being of particular interest: iodine-131 ( 131 I, used to treat thyroid disorders) and lutetium-177 ( 177 Lu, used to treat neuroendocrine tumours). A small volume of activity within a scatter medium (water), representing a lesion within a patient body, was chosen as the calibration method. To ensure ease of use in clinical centres, an “off-the-shelf” solution was proposed – to avoid the need for in-house manufacturing. The BIODEX elliptical Jaszczak phantom and 16 ml fillable sphere were selected. The protocol was developed for use on SPECT/CT gamma cameras only, where the CT dataset would be used to correct the imaging data for attenuation of the emitted photons within the phantom. The protocol corrects for scatter of emitted photons using the triple energy window correction technique utilised by most clinical systems. A number of clinical systems were tested in the development of this protocol, covering the major manufacturers of gamma camera generally used in Europe. Initial imaging was performed with 131 I and 177 Lu at a number of clinical centres, but due to time constraints in the project, some acquisitions were performed with 177 Lu only. The protocol is relatively simplistic, and does not account for the effects of dead-time in high activity patients, the presence of background activity

  7. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  8. MR efficiency using automated MRI-desktop eProtocol

    Science.gov (United States)

    Gao, Fei; Xu, Yanzhe; Panda, Anshuman; Zhang, Min; Hanson, James; Su, Congzhe; Wu, Teresa; Pavlicek, William; James, Judy R.

    2017-03-01

    MRI protocols are instruction sheets that radiology technologists use in routine clinical practice for guidance (e.g., slice position, acquisition parameters etc.). In Mayo Clinic Arizona (MCA), there are over 900 MR protocols (ranging across neuro, body, cardiac, breast etc.) which makes maintaining and updating the protocol instructions a labor intensive effort. The task is even more challenging given different vendors (Siemens, GE etc.). This is a universal problem faced by all the hospitals and/or medical research institutions. To increase the efficiency of the MR practice, we designed and implemented a web-based platform (eProtocol) to automate the management of MRI protocols. It is built upon a database that automatically extracts protocol information from DICOM compliant images and provides a user-friendly interface to the technologists to create, edit and update the protocols. Advanced operations such as protocol migrations from scanner to scanner and capability to upload Multimedia content were also implemented. To the best of our knowledge, eProtocol is the first MR protocol automated management tool used clinically. It is expected that this platform will significantly improve the radiology operations efficiency including better image quality and exam consistency, fewer repeat examinations and less acquisition errors. These protocols instructions will be readily available to the technologists during scans. In addition, this web-based platform can be extended to other imaging modalities such as CT, Mammography, and Interventional Radiology and different vendors for imaging protocol management.

  9. Protocols and plan of quantum cryptography

    Directory of Open Access Journals (Sweden)

    Milorad S. Markagić

    2012-01-01

    Full Text Available Along with the development of confidentiality of data and resources, there is a need to develop systems that would provide confidentiality. Currently, the most used systems are classical cryptographic systems and encryption public key systems. However, none of these systems provides a solution for the famous 'catch 22' of cryptography. Owing to the intensive development of quantum mechanics, in the last 30 years emerged an entirely new kind of cryptography-quantum cryptography. Its greatest contribution is a possibility to discover an intercepted communication channel from a third party. The question is: is this really true? The question arises: 'If the quantum cryptography is so good, why is not widely used?' The aim of this paper is, on the one hand, to define the basic mechanisms of quantum cryptography IP, and, on the other hand, to point to the shortcomings, as they related to the opportunities of today's devices and flaws in protocols.

  10. SPP: A data base processor data communications protocol

    Science.gov (United States)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  11. Is work engagement related to work ability beyond working conditions and lifestyle factors?

    Science.gov (United States)

    Airila, Auli; Hakanen, Jari; Punakallio, Anne; Lusa, Sirpa; Luukkonen, Ritva

    2012-11-01

    To examine the associations of age, lifestyle and work-related factors, and particularly work engagement with the work ability index (WAI) and its sub-dimensions. Step-wise regression analysis with a sample of Finnish firefighters (n = 403) was used. The outcome variables were the WAI and its six sub-dimensions. The independent variables consisted of age, lifestyle variables (alcohol consumption, BMI, smoking, physical exercise, and sleep problems), working conditions (job demands, physical workload, supervisory relations, and task resources), and work engagement. The outcome variables and all the variables related to lifestyle, working conditions, and work engagement were measured in 2009. Work ability at baseline 10 years earlier was adjusted for in the models. Work engagement, age, physical exercise, sleep problems, and physical workload were associated with the WAI. All independent variables, except BMI and alcohol consumption, were associated with at least one sub-dimension of the WAI after controlling the baseline WAI. Lifestyle variables, working conditions, and work engagement were more strongly related to the subjective WAI sub-dimensions than to the two more objective WAI sub-dimensions. Work engagement was significantly associated with work ability even after adjusting for various factors, indicating its importance in promoting work ability. Other key factors for good work ability were frequent exercise, good sleep, non-smoking, low job demands, low physical workload, and high task resources. More specifically, this study suggests that in maintaining work ability, it is valuable not only to promote lifestyle factors or working conditions, but also to enhance employees' positive state of work engagement.

  12. Predictive validity of the Work Ability Index and its individual items in the general population.

    Science.gov (United States)

    Lundin, Andreas; Leijon, Ola; Vaez, Marjan; Hallgren, Mats; Torgén, Margareta

    2017-06-01

    This study assesses the predictive ability of the full Work Ability Index (WAI) as well as its individual items in the general population. The Work, Health and Retirement Study (WHRS) is a stratified random national sample of 25-75-year-olds living in Sweden in 2000 that received a postal questionnaire ( n = 6637, response rate = 53%). Current and subsequent sickness absence was obtained from registers. The ability of the WAI to predict long-term sickness absence (LTSA; ⩾ 90 consecutive days) during a period of four years was analysed by logistic regression, from which the Area Under the Receiver Operating Characteristic curve (AUC) was computed. There were 313 incident LTSA cases among 1786 employed individuals. The full WAI had acceptable ability to predict LTSA during the 4-year follow-up (AUC = 0.79; 95% CI 0.76 to 0.82). Individual items were less stable in their predictive ability. However, three of the individual items: current work ability compared with lifetime best, estimated work impairment due to diseases, and number of diagnosed current diseases, exceeded AUC > 0.70. Excluding the WAI item on number of days on sickness absence did not result in an inferior predictive ability of the WAI. The full WAI has acceptable predictive validity, and is superior to its individual items. For public health surveys, three items may be suitable proxies of the full WAI; current work ability compared with lifetime best, estimated work impairment due to diseases, and number of current diseases diagnosed by a physician.

  13. Work Ability Index as tool to identify workers at risk of premature work exit.

    Science.gov (United States)

    Roelen, Corné A M; Heymans, Martijn W; Twisk, Jos W R; van der Klink, Jac J L; Groothoff, Johan W; van Rhenen, Willem

    2014-12-01

    To investigate the Work Ability Index (WAI) as tool for identifying workers at risk of premature work exit in terms of disability pension, unemployment, or early retirement. Prospective cohort study of 11,537 male construction workers (mean age 45.5 years), who completed the WAI at baseline and reported their work status (employed, unemployed, disability pension, or retired) after mean 2.3 years of follow-up. Associations between WAI scores and work status were investigated by multinomial logistic regression analysis. The ability of the WAI to discriminate between workers at high and low risk of premature work exit was analyzed by the area (AUC) under the receiver operating characteristic curve. 9,530 (83 %) construction workers had complete data for analysis. At follow-up, 336 (4 %) workers reported disability pension, 125 (1 %) unemployment, and 255 (3 %) retirement. WAI scores were prospectively associated with the risk of disability pension at follow-up, but not with the risk of unemployment and early retirement. The WAI showed fair discrimination to identify workers at risk of disability pension [AUC = 0.74; 95 % confidence interval (CI) 0.70-0.77]. The discriminative ability decreased with age from AUC = 0.78 in workers aged 30-39 years to AUC = 0.69 in workers ≥50 years of age. Discrimination failed for unemployment (AUC = 0.51; 95 % CI 0.47-0.55) and early retirement (AUC = 0.58; 95 % CI 0.53-0.61). The WAI can be used to identify construction workers <50 years of age at increased risk of disability pension and invite them for preventive interventions.

  14. The work ability index and single-item question: associations with sick leave, symptoms, and health--a prospective study of women on long-term sick leave.

    Science.gov (United States)

    Ahlstrom, Linda; Grimby-Ekman, Anna; Hagberg, Mats; Dellve, Lotta

    2010-09-01

    This study investigated the association between the work ability index (WAI) and the single-item question on work ability among women working in human service organizations (HSO) currently on long-term sick leave. It also examined the association between the WAI and the single-item question in relation to sick leave, symptoms, and health. Predictive values of the WAI, the changed WAI, the single-item question and the changed single-item question were investigated for degree of sick leave, symptoms, and health. This cohort study comprised 324 HSO female workers on long-term (>60 days) sick leave, with follow-ups at 6 and 12 months. Participants responded to questionnaires. Data on work ability, sick leave, health, and symptoms were analyzed with regard to associations and predictability. Spearman correlation and mixed-model analysis were performed for repeated measurements over time. The study showed a very strong association between the WAI and the single-item question among all participants. Both the WAI and the single-item question showed similar patterns of associations with sick leave, health, and symptoms. The predictive value for the degree of sick leave and health-related quality of life (HRQoL) was strong for both the WAI and the single-item question, and slightly less strong for vitality, neck pain, both self-rated general and mental health, and behavioral and current stress. This study suggests that the single-item question on work ability could be used as a simple indicator for assessing the status and progress of work ability among women on long-term sick leave.

  15. Deterministic secure communication protocol without using entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

  16. Patient-Specific Internal Dosimetry Protocol for 131 treatment of differentiated thyroid cancer

    International Nuclear Information System (INIS)

    Deluca, G.M.; Rojo, Ana M.; Llina Fuentes, C.S.; Cabrejas, Mariana L.; Cabrejas, R.; Fadel, A.M.

    2008-01-01

    dosage of radio iodide is still widely used, the application of an internal dosimetry protocol has notorious advantages because it gives more precise information about the relationship between doses and effects of the radioiodine therapy in most cases. Internal dosimetry could greatly strengthen the radioprotection of critical DCT patients, particularly in those patients who have already suffered from red marrow depression, those who have bone or lung metastases and in cases that evidence high risks after clinical examination. (author)

  17. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  18. Inspiratory muscle training in pediatrics: main indications and technical characteristics of the protocols

    Directory of Open Access Journals (Sweden)

    Cristhiele Tais Woszezenki

    Full Text Available Abstract Introduction: Inspiratory muscle training (IMT is a resource widely used in pediatrics. However, there is great variability in relation to the characteristics of the protocols used. Objective: To identify the main clinical conditions and IMT protocols used in the pediatric age group. Methods: Integrative review of the literature by searching on Pubmed, Scielo, PEDro and EMBASE databases using the following strategy: threshold OR inspiratory muscle training OR muscle endurance OR muscle resistance OR endurance training OR maximal inspiratory pressure AND respiratory muscle. We have selected clinical trials that performed IMT in children and adolescents (0 to 18 years old, with a clinical diagnosis, and published in English, Portuguese and Spanish. Results: 17 studies were included. From these, 11 underwent IMT in patients with some neuromuscular disorder, being Duchenne Muscular Dystrophy the most common. The selected articles included a total sample of 327 participants. As for the characteristics of the protocols, 7 performed strength training, 5 endurance and 5 strength and endurance. The training load ranged from 30 to 80% of maximal inspiratory pressure. Moreover, 8 studies performed IMT twice daily and the session duration and the training period varied between 10 and 30 minutes, and from 3 weeks to 24 months, respectively. Conclusion: The IMT was used more frequently in patients with some neuromuscular disorder. Although there is no consensus as to the characteristics of the protocols, the choice of the load should take into account the purpose of IMT and the disease severity.

  19. The Development of Korea Additional Protocol System

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yeo, Jin Kyun

    2008-01-01

    The Agreement between the Republic of Korea (ROK) and the IAEA for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Safeguards Agreement) entered into force on 14 November 1975. The Additional Protocol to the Safeguards Agreement (the Additional Protocol) was signed on 21 June 1999 and entered into force on 19 February 2004. ROK has been submitting annual updated reports of initial declaration on every May 15th since August 2004. Additional protocol reports were submitted through Protocol Reporter provided by IAEA. Annual declarations were simply uploaded and stored in the Accounting Information Treatment System of KINAC, which did not provide data analysis and management function. There have been demands for improvement to handle ever-increasing information. KAPS (Korea Additional Protocol System) has been developed to assist and administrate the additional protocol related works effectively. The new system enables integrated management including composition of additional protocol report and version control, periodical update of related information, results of IAEA complementary access to each facility

  20. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  1. Implementation of a mandatory checklist of protocols and objectives improves compliance with a wide range of evidence-based intensive care unit practices.

    Science.gov (United States)

    Byrnes, Matthew C; Schuerer, Douglas J E; Schallom, Marilyn E; Sona, Carrie S; Mazuski, John E; Taylor, Beth E; McKenzie, Wendi; Thomas, James M; Emerson, Jeffrey S; Nemeth, Jennifer L; Bailey, Ruth A; Boyle, Walter A; Buchman, Timothy G; Coopersmith, Craig M

    2009-10-01

    To determine a) if a checklist covering a diverse group of intensive care unit protocols and objectives would improve clinician consideration of these domains and b) if improved consideration would change practice patterns. Pre- and post observational study. A 24-bed surgical/burn/trauma intensive care unit in a teaching hospital. A total of 1399 patients admitted between June 2006 and May 2007. The first component of the study evaluated whether mandating verbal review of a checklist covering 14 intensive care unit best practices altered verbal consideration of these domains. Evaluation was performed using real-time bedside audits on morning rounds. The second component evaluated whether the checklist altered implementation of these domains by changing practice patterns. Evaluation was performed by analyzing data from the Project IMPACT database after patients left the intensive care unit. Verbal consideration of evaluable domains improved from 90.9% (530/583) to 99.7% (669/671, p < .0001) after verbal review of the checklist was mandated. Bedside consideration improved on the use of deep venous thrombosis prophylaxis (p < .05), stress ulcer prophylaxis (p < .01), oral care for ventilated patients (p < 0.01), electrolyte repletion (p < .01), initiation of physical therapy (p < .05), and documentation of restraint orders (p < .0001). Mandatory verbal review of the checklist resulted in a greater than two-fold increase in transferring patients out of the intensive care unit on telemetry (16% vs. 35%, p < .0001) and initiation of physical therapy (28% vs. 42%, p < .0001) compared with baseline practice. A mandatory verbal review of a checklist covering a wide range of objectives and goals at each patient's bedside is an effective method to improve both consideration and implementation of intensive care unit best practices. A bedside checklist is a simple, cost-effective method to prevent errors of omission in basic domains of intensive care unit management that might

  2. Quantum-key-distribution protocol with pseudorandom bases

    Science.gov (United States)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  3. Interoperability and Reliability of Multiplatform MPLS VPN: Comparison of Traffic Engineering with RSVP-TE Protocol and LDP Protocol

    Directory of Open Access Journals (Sweden)

    Nanang Ismail

    2017-10-01

    48% of packet loss per 100 sent packets while on RSVP packet loss percentage is 35.5% per 100 sent packets. Both protocols have interoperability on the third layer of multiplatform MPLS VPN, but on heavy loaded traffic condition, RSVP protocol has better reliability than the LDP protocol.

  4. Applied techniques for high bandwidth data transfers across wide area networks

    International Nuclear Information System (INIS)

    Lee, Jason; Gunter, Dan; Tierney, Brian; Allcock, Bill; Bester, Joe; Bresnahan, John; Tuecke, Steve

    2001-01-01

    Large distributed systems such as Computational/Data Grids require large amounts of data to be co-located with the computing facilities for processing. Ensuring that the data is there in time for the computation in today's Internet is a massive problem. From our work developing a scalable distributed network cache, we have gained experience with techniques necessary to achieve high data throughput over high bandwidth Wide Area Networks (WAN). In this paper, we discuss several hardware and software design techniques and issues, and then describe their application to an implementation of an enhanced FTP protocol called GridFTP. We also describe results from two applications using these techniques, which were obtained at the Supercomputing 2000 conference

  5. A comparison of low IQ scores from the Reynolds Intellectual Assessment Scales and the Wechsler Adult Intelligence Scale-Third Edition.

    Science.gov (United States)

    Umphress, Thomas B

    2008-06-01

    Twenty people with suspected intellectual disability took the Reynolds Intellectual Assessment Scales (RIAS; C. R. Reynolds & R. W. Kamphaus, 1998) and the Wechsler Adult Intelligence Scale-3rd Edition (WAIS-III; D. Wechsler, 1997) to see if the 2 IQ tests produced comparable results. A t test showed that the RIAS Composite Intelligence Index scores were significantly higher than WAIS-III Full Scale IQ scores at the alpha level of .01. There was a significant difference between the RIAS Nonverbal Intelligence and WAIS-III Performance Scale, but there was no significant difference between the RIAS Verbal Intelligence Index and the WAIS-III Verbal Scale IQ. The results raise questions concerning test selection for diagnosing intellectual disability and the use of the correlation statistic for comparing intelligence tests.

  6. The introduction of a protocol for the use of biobrane for facial burns in children.

    Science.gov (United States)

    Rogers, A D; Adams, S; Rode, H

    2011-01-01

    BIOBRANE HAS BECOME AN INDISPENSIBLE DRESSING WITH THREE ESTABLISHED INDICATIONS IN ACUTE BURNS CARE AT OUR INSTITUTION: (1) as the definitive dressing of superficial partial thickness facial burns, (2) after tangential excision of deep burns when autograft or cadaver skin is unavailable, and (3) for graft reduction. This paper details our initial experience of Biobrane for the management of superficial partial thickness facial burns in children and the protocol that was compiled for its optimal use. A retrospective analysis of theatre records, case notes and photographs was performed to evaluate our experience with Biobrane over a one-year period. Endpoints included length of stay, analgesic requirements, time to application of Biobrane, healing times, and aesthetic results. Historical controls were used to compare the results with our previous standard of care. 87 patients with superficial partial thickness burns of the face had Biobrane applied during this period. By adhering to the protocol we were able to demonstrate significant reductions in hospital stay, healing time, analgesic requirements, nursing care, with excellent cosmetic results. The protocol is widely accepted by all involved in the optimal management of these patients, including parents, anaesthetists, and nursing staff.

  7. An Optimal Non-Interactive Message Authentication Protocol

    OpenAIRE

    Pasini, Sylvain; Vaudenay, Serge

    2006-01-01

    Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SAS-based non-interactive message authentication protocols (NIMAP). We start by the analysis of two popular non-interactive message authentication protocols. The first one is based on a collision-resistant hash function and was presented by Balfanz et al. The second protocol is based on a universal hash function family and was proposed by Gehrmann, Mi...

  8. Nucleic acid protocols: Extraction and optimization

    Directory of Open Access Journals (Sweden)

    Saeed El-Ashram

    2016-12-01

    Full Text Available Yield and quality are fundamental features for any researchers during nucleic acid extraction. Here, we describe a simplified, semi-unified, effective, and toxic material free protocol for extracting DNA and RNA from different prokaryotic and eukaryotic sources exploiting the physical and chemical properties of nucleic acids. Furthermore, this protocol showed that DNA and RNA are under triple protection (i.e. EDTA, SDS and NaCl during lysis step, and this environment is improper for RNase to have DNA liberated of RNA and even for DNase to degrade the DNA. Therefore, the complete removal of RNA under RNase influence is achieved when RNase is added after DNA extraction, which gives optimal quality with any protocols. Similarly, DNA contamination in an isolated RNA is degraded by DNase to obtain high-quality RNA. Our protocol is the protocol of choice in terms of simplicity, recovery time, environmental safety, amount, purity, PCR and RT-PCR applicability.

  9. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  10. Forensic aspects of intellectual disabilities and autism spectrum disorders

    OpenAIRE

    Nugent, Stella

    2016-01-01

    Overview This thesis reviewed forensic aspects of Intellectual Disabilities (ID) and Autism Spectrum Disorder (ASD). Chapter two was a case study where an individual with ID and ASD who exhibited forensic/Challenging Behaviour (CB) was assessed and intervention offered. Chapter three then focussed on the assessment of people with ID and ASD by critiquing the Wechsler Adult Intelligence Scale (WAIS), version 3 and 4 (WAIS-III & WAIS-IV) (Wechsler, 1997; Wechsler, 2008a, 2008b, 2008c) and ...

  11. The Trauma Time-Out: Evaluating the Effectiveness of Protocol-Based Information Dissemination in the Traumatically Injured Patient.

    Science.gov (United States)

    Nolan, Heather R; Fitzgerald, Michael; Howard, Brett; Jarrard, Joey; Vaughn, Danny

    Procedural time-outs are widely accepted safety standards that are protocolized in nearly all hospital systems. The trauma time-out, however, has been largely unstudied in the existing literature and does not have a standard protocol outlined by any of the major trauma surgery organizations. The goal of this study was to evaluate our institution's use of the trauma time-out and assess how trauma team members viewed its effectiveness. A multiple-answer survey was sent to trauma team members at a Level I trauma center. Questions included items directed at background, experience, opinions, and write-in responses. Most responders were experienced trauma team members who regularly participated in trauma codes. All respondents noted the total time required to complete the time-out was less than 5 min, with the majority saying it took less than 1 min. Seventy-five percent agreed that trauma time-outs should continue, with 92% noting that it improved understanding of patient presentation and prehospital evaluation. Seventy-seven percent said it improved understanding of other team member's roles, and 75% stated it improved patient care. Subgroups of physicians and nurses were statistically similar; yet, physicians did note that it improved their understanding of the team member's function more frequently than nurses. The trauma time-out can be an excellent tool to improve patient care and team understanding of the incoming trauma patient. Although used widely at multiple levels of trauma institutions, development of a documented protocol can be the next step in creating a unified safety standard.

  12. Bitcoin-NG: A Scalable Blockchain Protocol

    OpenAIRE

    Eyal, Ittay; Gencer, Adem Efe; Sirer, Emin Gun; van Renesse, Robbert

    2015-01-01

    Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is By...

  13. A case for evaluating sensor network protocols concurrently

    KAUST Repository

    Gnawali, Omprakash; Guibas, Leonidas; Levis, Philip

    2010-01-01

    Researchers typically evaluate and compare protocols on the testbeds by running them one at a time. This methodology ignores the variation in link qualities and wireless environment across these experiments. These variations can introduce significant noise in the results. Evaluating two protocols concurrently, however, suffers from inter-protocol interactions. These interactions can perturb performance even under very light load, especially timing and timing sensitive protocols. We argue that the benefits of running protocols concurrently greatly outweigh the disadvantages. Protocols rarely run in isolation in real networks, and so considering such interactions is valuable. Although the wireless environment is still uncontrolled, concurrent evaluations make comparisons fair and more statistically sound. Through experiments on two testbeds, we make the case for evaluating and comparing low data-rate sensor network protocols by running them concurrently. Copyright 2010 ACM.

  14. MODELLING AND VERIFICATION OF KITSAT PACKET COMMUNICATION PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Young-Ro Lee

    1996-06-01

    Full Text Available In this paper, in order to verify KITSAT 1/2 packet communication protocols, we model the AX.25 protocol and PACSAT protocol by using an extended Petri net and then verify the correctness, boundedness, liveness and deadlock freeness of packet protocols by utilizing reachability trees.

  15. Game-theoretic perspective of Ping-Pong protocol

    Science.gov (United States)

    Kaur, Hargeet; Kumar, Atul

    2018-01-01

    We analyse Ping-Pong protocol from the point of view of a game. The analysis helps us in understanding the different strategies of a sender and an eavesdropper to gain the maximum payoff in the game. The study presented here characterizes strategies that lead to different Nash equilibriums. We further demonstrate the condition for Pareto optimality depending on the parameters used in the game. Moreover, we also analysed LM05 protocol and compared it with PP protocol from the point of view of a generic two-way QKD game with or without entanglement. Our results provide a deeper understanding of general two-way QKD protocols in terms of the security and payoffs of different stakeholders in the protocol.

  16. Technical Analysis of SSP-21 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-09

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.

  17. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol\\'s perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain\\'s fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  18. Formal analysis of a fair payment protocol

    NARCIS (Netherlands)

    J.G. Cederquist; M.T. Dashti (Mohammad)

    2004-01-01

    textabstractWe formally specify a payment protocol. This protocol is intended for fair exchange of time-sensitive data. Here the ?-CRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free ?-calculus. These properties are then verified

  19. Tourist Quarter “Chinese-Baroque” of Dao Way District in Harbin City: experience, problems and perspectives of renovation.

    Directory of Open Access Journals (Sweden)

    Levoshko Svetlana

    2016-01-01

    Full Text Available This article analyzes results of an unique experience of the Dao Wai historic district renovation project in Harbin of the 2010th. It includes an interpretation of the stylistic features of the Dao Wai building. Also, there was made a presumptive conclusion about the origins of the “Chinese Baroque”, which is now famous Dao Wai, combining European order architecture and far Eastern decorative tradition. Presumptive conclusion was based on the construction area observing in 2011-2016 and on the Chinese sources. As a result of renovation, there was formed a new public space with high tourism potential. Social value and status of the Dao Wai has significantly grown. The significant cost increase of real estate and provided services is an essential consequence of the gentrification method. There are were noted increased problems of the native people forced to move from the center to the outskirts of the city. Also, this article analyzes the current stage of the second phase design of Dao Wai renovation project and the perspectives for its implementation.

  20. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, M.T.

    2004-01-01

    We formally specify a payment protocol. This protocol is intended for fair exchange of timesensitive data. Here the μCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free μ-calculus. These properties are then verified using the finite

  1. The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol

    OpenAIRE

    Seema Mehla; Bhawna Gupta

    2010-01-01

    the Extensible Authentication Protocol (EAP) is a generic framework supporting multiple types of authentication methods. In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP exchange with another authenticator. The EAP reauthentication Protocol provides a consistent, methodindependentand low-latency re-authentication. It is extension to current EAP mechanism to support intradomain handoff authentication. This paper analyzed the performance of the EAP r...

  2. Blockchain Consensus Protocols in the Wild

    OpenAIRE

    Cachin, Christian; Vukolić, Marko

    2017-01-01

    A blockchain is a distributed ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received renewed attention because they also address blockchain systems. This work discusses the process o...

  3. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  4. Interface Assignment-Based AODV Routing Protocol to Improve Reliability in Multi-Interface Multichannel Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Won-Suk Kim

    2015-01-01

    Full Text Available The utilization of wireless mesh networks (WMNs has greatly increased, and the multi-interface multichannel (MIMC technic has been widely used for the backbone network. Unfortunately, the ad hoc on-demand distance vector (AODV routing protocol defined in the IEEE 802.11s standard was designed for WMNs using the single-interface single-channel technic. So, we define a problem that happens when the legacy AODV is used in MIMC WMNs and propose an interface assignment-based AODV (IA-AODV in order to resolve that problem. IA-AODV, which is based on multitarget path request, consists of the PREQ prediction scheme, the PREQ loss recovery scheme, and the PREQ sender assignment scheme. A detailed operation according to various network conditions and services is introduced, and the routing efficiency and network reliability of a network using IA-AODV are analyzed over the presented system model. Finally, after a real-world test-bed for MIMC WMNs using the IA-AODV routing protocol is implemented, the various indicators of the network are evaluated through experiments. When the proposed routing protocol is compared with the existing AODV routing protocol, it performs the path update using only 14.33% of the management frames, completely removes the routing malfunction, and reduces the UDP packet loss ratio by 0.0012%.

  5. Fully Automated Trimethylsilyl (TMS) Derivatisation Protocol for Metabolite Profiling by GC-MS.

    Science.gov (United States)

    Zarate, Erica; Boyle, Veronica; Rupprecht, Udo; Green, Saras; Villas-Boas, Silas G; Baker, Philip; Pinu, Farhana R

    2016-12-29

    Gas Chromatography-Mass Spectrometry (GC-MS) has long been used for metabolite profiling of a wide range of biological samples. Many derivatisation protocols are already available and among these, trimethylsilyl (TMS) derivatisation is one of the most widely used in metabolomics. However, most TMS methods rely on off-line derivatisation prior to GC-MS analysis. In the case of manual off-line TMS derivatisation, the derivative created is unstable, so reduction in recoveries occurs over time. Thus, derivatisation is carried out in small batches. Here, we present a fully automated TMS derivatisation protocol using robotic autosamplers and we also evaluate a commercial software, Maestro available from Gerstel GmbH. Because of automation, there was no waiting time of derivatised samples on the autosamplers, thus reducing degradation of unstable metabolites. Moreover, this method allowed us to overlap samples and improved throughputs. We compared data obtained from both manual and automated TMS methods performed on three different matrices, including standard mix, wine, and plasma samples. The automated TMS method showed better reproducibility and higher peak intensity for most of the identified metabolites than the manual derivatisation method. We also validated the automated method using 114 quality control plasma samples. Additionally, we showed that this online method was highly reproducible for most of the metabolites detected and identified (RSD TMS method has been applied to analyse a large number of complex plasma samples. Furthermore, we found that this method was highly applicable for routine metabolite profiling (both targeted and untargeted) in any metabolomics laboratory.

  6. Analysis of the radius and diameter protocols in terms of pricing telecommunication services

    Directory of Open Access Journals (Sweden)

    Vesna M. Radonjić

    2013-06-01

    Full Text Available Accounting of telecommunication services is closely related to the functions of authentication and authorization. These functions are usually considered together and implemented within the same server using a common protocol. The most renowned protocols for authentication, authorization and accounting are the RADIUS and Diameter protocols.   AAA functions and related protocols   In this chapter, the accounting management architecture developed by IETF is presented. It includes the interaction between network elements, accounting servers and billing and charging servers. Accounting data can be used for management, planning and charging users as well as other (specific purposes. Authentication is the process of confirming a user's digital identity, usually through some type of identifiers and related data. Authorization determines whether a particular entity is authorized to perform an activity.   Basic Functions of the RADIUS Protocol   The RADIUS architecture is based on a client-server model. It uses UDP on the transport layer. Transactions between the client and the server are authenticated, which is achieved by using a common secret key that is never sent through the network. Given the limited resources available to network devices, RADIUS facilitates and centralizes charging end users, provides some protection against active attacks by unauthorized users and it has great support from different network equipment vendors. Although RADIUS is a widely accepted protocol for the mechanisms of authentication, authorization and accounting, it has certain shortcomings that may be caused by the protocol itself or by its poor implementation.   Architecture and Operation of the Diameter Protocol   Diameter is a scalable protocol designed by the IETF working group in order to eliminate shortcomings and functional limitations of the RADIUS protocol and eventually to replace it in the near future. Most of the basic Diameter mechanisms and its

  7. Differential phase-time shifting protocol for QKD (DPTS)

    DEFF Research Database (Denmark)

    Usuga Castaneda, Mario A.; Bacco, Davide; Christensen, Jesper Bjerge

    2016-01-01

    We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols.......We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols....

  8. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi; Dimitrakos, Theo; Martinelli, Fabio

    We formally specify a payment protocol described by Vogt et al. This protocol is intended for fair exchange of time-sensitive data. Here the mCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free mu-calculus. These properties are then

  9. The UMTS-AKA Protocols for Intelligent Transportation Systems

    Directory of Open Access Journals (Sweden)

    Hwang Min-Shiang

    2009-01-01

    Full Text Available The integration of communication protocols into transport systems is a much adored research area today. Much of seminal work has been reported on the topic of intelligent transportation systems (ITS in the recent years. Many advanced techniques have been garnered to improve online communication and to promote the security, comfort, and efficiency of ITS. Of primary importance to the effective application of ITS is the communication protocol used. A fascinating development is that the yesterday's Global System for Mobile Communication protocol is being replaced by the Universal Mobile Telecommunication System protocol, which is the third-generation mobile technology. This article attempts to identify a suitable communication system for ITS applications. It is impracticable to substantially modify the original UMTS-IMS-AKA protocol which is in practice because it can disturb the operation of the current system, and thus we explore other possibilities through this research. We investigate a novel protocol to make the original UMTS-IMS-AKA protocol compliant with ITS as well as adaptable into the current UMTS protocol.

  10. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  11. Whole-abdomen radiotherapy for non-Hodgkin's lymphoma using twice-daily fractionation

    International Nuclear Information System (INIS)

    Liauw, Stanley L.; Yeh, Alexander M.; Morris, Christopher G.; Olivier, Kenneth R.; Mendenhall, Nancy Price

    2006-01-01

    Purpose: To report the tolerability and efficacy of twice-daily whole-abdomen irradiation (WAI) for non-Hodgkin's lymphoma (NHL). Methods and Materials: Of 123 patients treated for NHL with WAI, 37% received previous chemotherapy, 28% received WAI as part of comprehensive lymphatic irradiation (CLI), and 32% received WAI for palliation. The median dose to the whole abdomen was 25.0 Gy, followed by a median tumor boost of 9.8 Gy in 58 patients. Fractionation was 1.0 Gy once daily (54%) or 0.8 Gy twice daily (46%). Blood counts were measured weekly. Results: At a median follow-up of 4.3 years, local control was 72% and overall survival was 55% at 5 years. Median time of WAI was 42 days for once-daily treatment and 32 days for twice-daily treatment. Patients receiving twice-daily WAI did not have a significantly higher rate of acute side effects (e.g., nausea, diarrhea, platelet or red blood cell toxicity). Overall, acute thrombocytopenia was the most frequent side effect of treatment; 24 of 96 patients (25%) with available hematologic data had Grade 3+ toxicity. There was no acute Grade 3 gastrointestinal toxicity and no late small bowel obstruction. Multiple regression indicated that patients with four or less involved sites and disease size ≤6 cm had improved local control and overall survival. Conclusions: Twice-daily WAI using 0.8 Gy/fraction does not appear to have any greater toxicity compared with once-daily treatment using 1 Gy/fraction. Small doses per fraction (0.8-1 Gy/fx) are effective, tolerated well in the acute setting, and associated with a low rate of late toxicity

  12. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  13. Neurofeedback Treatment and Posttraumatic Stress Disorder: Effectiveness of Neurofeedback on Posttraumatic Stress Disorder and the Optimal Choice of Protocol.

    Science.gov (United States)

    Reiter, Karen; Andersen, Søren Bo; Carlsson, Jessica

    2016-02-01

    Neurofeedback is an alternative, noninvasive approach used in the treatment of a wide range of neuropsychiatric disorders, including posttraumatic stress disorder (PTSD). Many different neurofeedback protocols and methods exist. Likewise, PTSD is a heterogeneous disorder. To review the evidence on effectiveness and preferred protocol when using neurofeedback treatment on PTSD, a systematic search of PubMed, PsychInfo, Embase, and Cochrane databases was undertaken. Five studies were included in this review. Neurofeedback had a statistically significant effect in three studies. Neurobiological changes were reported in three studies. Interpretation of results is, however, limited by differences between the studies and several issues regarding design. The optimistic results presented here qualify neurofeedback as probably efficacious for PTSD treatment.

  14. Protocols for second-generation business satellites systems

    Science.gov (United States)

    Evans, B. G.; Coakley, F. P.; El Amin, M. H. M.

    The paper discusses the nature and mix of traffic in business satellite systems and describes the limitations on the protocol imposed by the differing impairments of speech, video, and data. A simple TDMA system protocol is presented which meets the requirements of mixed-service operation. The efficiency of the protocol together with implications for allocation, scheduling and synchronisation are discussed. Future-generation satellites will probably use on-board processing. Some initial work on protocols that make use of on-board processing and the implications for satellite and earth-station equipment are presented.

  15. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  16. Radio protocols for LTE and LTE-advanced

    CERN Document Server

    Yi, SeungJune; Lee, YoungDae; Park, SungJun; Jung, SungHoon

    2012-01-01

    Provides a unique focus on radio protocols for LTE and LTE-Advanced (LTE-A) Giving readers a valuable understanding of LTE radio protocols, this book covers LTE (Long-Term Evolution) Layer 2/3 radio protocols as well as new features including LTE-Advanced. It is divided into two sections to differentiate between the two technologies' characteristics. The authors systematically explain the design principles and functions of LTE radio protocols during the development of mobile handsets. The book also provides essential knowledge on the interaction between mobile networks a

  17. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Aquino de Muro, Marilena; Rapley, Ralph

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  18. New logistics protocols for distributed interactive simulation

    Science.gov (United States)

    Taylor, Darrin; Morrison, John; Katz, Warren; Felton, Erik; Herman, Deborah A.

    1995-06-01

    In today's environment, the transportation and maintenance of military forces is nearly as important as combat operations. Rapid deployment to regions of low-intensity conflict will become a very common training scenario for the U.S. military. Thus it is desirable to apply distributed simulation technology to train logistics personnel in their combat support roles. Currently, distributed interactive simulation (DIS) only contains rudimentary logistics protocols. This paper introduces new protocols designed to handle the logistics problem. The Newtonian protocol takes a physics-based approach to modeling interactions on the simulation network. This protocol consists of a family of protocol data units (PDUs) which are used to communicate forces in different circumstances. The protocol implements a small set of physical relations. This represents a flexible and general mechanism to describe battlefield interactions between network entities. The migratory object protocol (MOP) family addresses the transfer of control. General mechanisms provide the means to simulate resupply, repair, and maintenance of entities at any level of abstraction (individual soldier to division). It can also increase the fidelity of mine laying, enable handover of weapons for terminal guidance, allow for the distribution of aggregate-level simulation entities, provide capabilities for the simulation of personnel, etc.

  19. The Work Ability of Hong Kong Construction Workers in Relation to Individual and Work-Related Factors.

    Science.gov (United States)

    Ng, Jacky Y K; Chan, Alan H S

    2018-05-14

    The shortage in Hong Kong of construction workers is expected to worsen in future due to the aging population and increasing construction activity. Construction work is dangerous and to help reduce the premature loss of construction workers due to work-related disabilities, this study measured the work ability of 420 Hong Kong construction workers with a Work Ability Index (WAI) which can be used to predict present and future work performance. Given the importance of WAI, in this study the effects of individual and work-related factors on WAI were examined to develop and validate a WAI model to predict how individual and work-related factors affect work ability. The findings will be useful for formulating a pragmatic intervention program to improve the work ability of construction workers and keep them in the work force.

  20. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol h...

  1. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  2. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  3. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung; Kazandjieva, Maria A.; Jain, Mayank; Levis, Philip

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol's perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain's fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  4. A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs

    Science.gov (United States)

    Malekpour, Mahyar R.

    2011-01-01

    This paper presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. We present an outline of a deductive proof of the correctness of the protocol. A bounded model of the protocol was mechanically verified for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.

  5. Extraction protocols for orthodontic treatment: A retrospective study

    Directory of Open Access Journals (Sweden)

    Vaishnevi N Thirunavukkarasu

    2016-01-01

    Full Text Available Background and Objectives: Various extraction protocols have been followed for successful orthodontic treatment. The purpose of this study was to evaluate the extraction protocols in patients who had previously undergone orthodontic treatment and also who had reported for continuing orthodontic treatment from other clinics. Materials and Methods: One hundred thirty eight patients who registered for orthodontic treatment at the Faculty of Dentistry were divided into 10 extraction protocols based on the Orthodontic treatment protocol given by Janson et al. and were evaluated for statistical significance. Results: The descriptive statistics of the study revealed a total of 40 (29% patients in protocol 1, 43 (31.2% in protocol 2, 18 (13% in protocol 3, 16 (11.6% in protocol 5, and 12 (8.7% in Type 3 category of protocol 9. The Type 3 category in protocol 9 was statistically significant compared to other studies. Midline shift and collapse of the arch form were noticed in these individuals. Conclusion: Extraction of permanent teeth such as canine and lateral incisors without rational reasons could have devastating consequences on the entire occlusion. The percentage of cases wherein extraction of permanent teeth in the crowded region was adopted as a treatment option instead of orthodontic treatment is still prevalent in dental practice. The shortage of orthodontists in Malaysia, the long waiting period, and lack of subjective need for orthodontic treatment at an earlier age group were the reasons for the patient's to choose extraction of the mal-aligned teeth such as the maxillary canine or maxillary lateral incisors.

  6. Survey of protocols for the manual segmentation of the hippocampus: preparatory steps towards a joint EADC-ADNI harmonized protocol.

    Science.gov (United States)

    Boccardi, Marina; Ganzola, Rossana; Bocchetta, Martina; Pievani, Michela; Redolfi, Alberto; Bartzokis, George; Camicioli, Richard; Csernansky, John G; de Leon, Mony J; deToledo-Morrell, Leyla; Killiany, Ronald J; Lehéricy, Stéphane; Pantel, Johannes; Pruessner, Jens C; Soininen, H; Watson, Craig; Duchesne, Simon; Jack, Clifford R; Frisoni, Giovanni B

    2011-01-01

    Manual segmentation from magnetic resonance imaging (MR) is the gold standard for evaluating hippocampal atrophy in Alzheimer's disease (AD). Nonetheless, different segmentation protocols provide up to 2.5-fold volume differences. Here we surveyed the most frequently used segmentation protocols in the AD literature as a preliminary step for international harmonization. The anatomical landmarks (anteriormost and posteriormost slices, superior, inferior, medial, and lateral borders) were identified from 12 published protocols for hippocampal manual segmentation ([Abbreviation] first author, publication year: [B] Bartzokis, 1998; [C] Convit, 1997; [dTM] deToledo-Morrell, 2004; [H] Haller, 1997; [J] Jack, 1994; [K] Killiany, 1993; [L] Lehericy, 1994; [M] Malykhin, 2007; [Pa] Pantel, 2000; [Pr] Pruessner, 2000; [S] Soininen, 1994; [W] Watson, 1992). The hippocampi of one healthy control and one AD patient taken from the 1.5T MR ADNI database were segmented by a single rater according to each protocol. The accuracy of the protocols' interpretation and translation into practice was checked with lead authors of protocols through individual interactive web conferences. Semantically harmonized landmarks and differences were then extracted, regarding: (a) the posteriormost slice, protocol [B] being the most restrictive, and [H, M, Pa, Pr, S] the most inclusive; (b) inclusion [C, dTM, J, L, M, Pr, W] or exclusion [B, H, K, Pa, S] of alveus/fimbria; (c) separation from the parahippocampal gyrus, [C] being the most restrictive, [B, dTM, H, J, Pa, S] the most inclusive. There were no substantial differences in the definition of the anteriormost slice. This survey will allow us to operationalize differences among protocols into tracing units, measure their impact on the repeatability and diagnostic accuracy of manual hippocampal segmentation, and finally develop a harmonized protocol.

  7. A secure key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Luan Da-Peng

    2013-01-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol

  8. Internet: la red de redes

    OpenAIRE

    Climent Serrano, Salvador

    1998-01-01

    Historia de I nternet en donde se realiza una descripción de la transmisión de los datos por TCP/IP y se explica el número IP. Se estudian los servicios de Internet como, Correo electrónico (e-mail), Transferencia de ficheros (ftp), World wide wed (la telaraña mundial), Navegadores, URL (Uniform Resource Locator), 4.5 Noticias (news), Chats (IRC), Webphone, Archie, Gopher, Wais, Comercio electrónico sus componentes.

  9. Internet, la xarxa de xarxes

    OpenAIRE

    Climent Serrano, Salvador

    1989-01-01

    Història d'Internet on es realitza una descripció de la transmissió de les dades per TCP / IP i s'explica el nombre IP. S'estudien els serveis d'Internet com, Correu electrònic (e-mail), Transferència de fitxers (ftp), World wide wed (la teranyina mundial), Navegadors, URL (Uniform Resource Locator), 4.5 Notícies (news), Xats (IRC ), Webphone, Archie, Gopher, Wais, Comerç electrònic els seus components.

  10. Work ability assessment in a worker population: comparison and determinants of Work Ability Index and Work Ability score

    OpenAIRE

    El Fassi, Mehdi; Bocquet, Valery; Majery, Nicole; Lair, Marie Lise; Couffignal, Sophie; Mairiaux, Philippe

    2013-01-01

    Background Public authorities in European countries are paying increasing attention to the promotion of work ability throughout working life and the best method to monitor work ability in populations of workers is becoming a significant question. The present study aims to compare the assessment of work ability based on the use of the Work Ability Index (WAI), a 7-item questionnaire, with another one based on the use of WAI?s first item, which consists in the worker?s self-assessment of his/he...

  11. The protocol amending the 1963 Vienna Convention

    International Nuclear Information System (INIS)

    Lamm, V.

    2006-01-01

    Technically the Vienna Convention was revised by the adoption of the protocol to amend the instrument. and according to Article 19 of the protocol 'A State which is Party to this Protocol but not to the 1963 Vienna Convention shall be bound by the provisions of that Convention as amended by this Protocol in relation to other States Parties hereto, and failing an expression of a different intention by that State at the time of deposit of an instrument referred to in Article 20 shall be bound by the provisions of the 1963 Vienna Convention in relation to States which are only Parties thereto'. This solution has created a special situation, because after the entry into force of the protocol there will be living together or operating in practice 'two' Vienna Conventions, notably the convention's original text of 1963 and its new version as amended by the protocol. After the protocol has come into force, a state may only accede to the amended version, but in the inter se relations of the States Party to the 'old' Vienna Convention the provisions of that convention will remain in force until such time as they have acceded to the new protocol. This rather complicated situation is nevertheless understandable and is fully in accord with Article 40 of the 1969 Vienna Convention on the Law of Treaties, which provides for the amendment of multilateral treaties. In 1989 the negotiations on the revision of the Vienna Convention had begun with the aim of strengthening the existing nuclear liability regime and of improving the situation of potential victims of nuclear accidents. The Protocol to Amend the Vienna Convention serves those purposes; it also reflects a good compromise, since it is the outcome of a negotiation process in which experts from both nuclear and non-nuclear states, from Contacting Parties and non-Contracting Parties were very active. That affords some assurance that the compromise solution reached is acceptable to all States participating in the adoption of

  12. Security Protocol Review Method Analyzer(SPRMAN)

    OpenAIRE

    Navaz, A. S. Syed; Narayanan, H. Iyyappa; Vinoth, R.

    2013-01-01

    This Paper is designed using J2EE (JSP, SERVLET), HTML as front end and a Oracle 9i is back end. SPRMAN is been developed for the client British Telecom (BT) UK., Telecom company. Actually the requirement of BT is, they are providing Network Security Related Products to their IT customers like Virtusa,Wipro,HCL etc., This product is framed out by set of protocols and these protocols are been associated with set of components. By grouping all these protocols and components together, product is...

  13. Energy-Aware RFID Anti-Collision Protocol.

    Science.gov (United States)

    Arjona, Laura; Simon, Hugo Landaluce; Ruiz, Asier Perallos

    2018-06-11

    The growing interest in mobile devices is transforming wireless identification technologies. Mobile and battery-powered Radio Frequency Identification (RFID) readers, such as hand readers and smart phones, are are becoming increasingly attractive. These RFID readers require energy-efficient anti-collision protocols to minimize the tag collisions and to expand the reader's battery life. Furthermore, there is an increasing interest in RFID sensor networks with a growing number of RFID sensor tags. Thus, RFID application developers must be mindful of tag anti-collision protocols. Energy-efficient protocols involve a low reader energy consumption per tag. This work presents a thorough study of the reader energy consumption per tag and analyzes the main factor that affects this metric: the frame size update strategy. Using the conclusion of this analysis, the anti-collision protocol Energy-Aware Slotted Aloha (EASA) is presented to decrease the energy consumption per tag. The frame size update strategy of EASA is configured to minimize the energy consumption per tag. As a result, EASA presents an energy-aware frame. The performance of the proposed protocol is evaluated and compared with several state of the art Aloha-based anti-collision protocols based on the current RFID standard. Simulation results show that EASA, with an average of 15 mJ consumed per tag identified, achieves a 6% average improvement in the energy consumption per tag in relation to the strategies of the comparison.

  14. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  15. Event-by-event simulation of quantum cryptography protocols

    NARCIS (Netherlands)

    Zhao, S.; Raedt, H. De

    We present a new approach to simulate quantum cryptography protocols using event-based processes. The method is validated by simulating the BB84 protocol and the Ekert protocol, both without and with the presence of an eavesdropper.

  16. WDM Network and Multicasting Protocol Strategies

    Directory of Open Access Journals (Sweden)

    Pinar Kirci

    2014-01-01

    Full Text Available Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM, it is easier to take the advantage of optical networks and optical burst switching (OBS and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET and Just In Time (JIT reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes.

  17. A More Efficient Contextuality Distillation Protocol

    Science.gov (United States)

    Meng, Hui-xian; Cao, Huai-xin; Wang, Wen-hua; Fan, Ya-jing; Chen, Liang

    2018-03-01

    Based on the fact that both nonlocality and contextuality are resource theories, it is natural to ask how to amplify them more efficiently. In this paper, we present a contextuality distillation protocol which produces an n-cycle box B ∗ B ' from two given n-cycle boxes B and B '. It works efficiently for a class of contextual n-cycle ( n ≥ 4) boxes which we termed as "the generalized correlated contextual n-cycle boxes". For any two generalized correlated contextual n-cycle boxes B and B ', B ∗ B ' is more contextual than both B and B '. Moreover, they can be distilled toward to the maximally contextual box C H n as the times of iteration goes to infinity. Among the known protocols, our protocol has the strongest approximate ability and is optimal in terms of its distillation rate. What is worth noting is that our protocol can witness a larger set of nonlocal boxes that make communication complexity trivial than the protocol in Brunner and Skrzypczyk (Phys. Rev. Lett. 102, 160403 2009), this might be helpful for exploring the problem that why quantum nonlocality is limited.

  18. An one-time-pad key communication protocol with entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We present an one-time-pad key communication protocol that allows secure direct communication with entanglement. Alice can send message to Bob in a deterministic manner by using local measurements and public communication. The theoretical efficiency of this protocol is double compared with BB84 protocol. We show this protocol is unconditional secure under arbitrary quantum attack. And we discuss that this protocol can be perfectly implemented with current technologies.

  19. Language pathway tracking: comparing nTMS-based DTI fiber tracking with a cubic ROIs-based protocol.

    Science.gov (United States)

    Negwer, Chiara; Sollmann, Nico; Ille, Sebastian; Hauck, Theresa; Maurer, Stefanie; Kirschke, Jan S; Ringel, Florian; Meyer, Bernhard; Krieg, Sandro M

    2017-03-01

    OBJECTIVE Diffusion tensor imaging (DTI) fiber tracking (FT) has been widely used in glioma surgery in recent years. It can provide helpful information about subcortical structures, especially in patients with eloquent space-occupying lesions. This study compared the newly developed navigated transcranial magnetic stimulation (nTMS)-based DTI FT of language pathways with the most reproducible protocol for language pathway tractography, using cubic regions of interest (ROIs) for the arcuate fascicle. METHODS Thirty-seven patients with left-sided perisylvian lesions underwent language mapping by repetitive nTMS. DTI FT was performed using the cubic ROIs-based protocol and the authors' nTMS-based DTI FT approach. The same minimal fiber length and fractional anisotropy were chosen (50 mm and 0.2, respectively). Both protocols were performed with standard clinical tractography software. RESULTS Both methods visualized language-related fiber tracts (i.e., corticonuclear tract, arcuate fascicle, uncinate fascicle, superior longitudinal fascicle, inferior longitudinal fascicle, arcuate fibers, commissural fibers, corticothalamic fibers, and frontooccipital fascicle) in all 37 patients. Using the cubic ROIs-based protocol, 39.9% of these language-related fiber tracts were detected in the examined patients, as opposed to 76.0% when performing nTMS-based DTI FT. For specifically tracking the arcuate fascicle, however, the cubic ROIs-based approach showed better results (97.3% vs 75.7% with nTMS-based DTI FT). CONCLUSIONS The cubic ROIs-based protocol was designed for arcuate fascicle tractography, and this study shows that it is still useful for this intention. However, superior results were obtained using the nTMS-based DTI FT for visualization of other language-related fiber tracts.

  20. Sharing Service Resource Information for Application Integration in a Virtual Enterprise - Modeling the Communication Protocol for Exchanging Service Resource Information

    Science.gov (United States)

    Yamada, Hiroshi; Kawaguchi, Akira

    Grid computing and web service technologies enable us to use networked resources in a coordinated manner. An integrated service is made of individual services running on coordinated resources. In order to achieve such coordinated services autonomously, the initiator of a coordinated service needs to know detailed service resource information. This information ranges from static attributes like the IP address of the application server to highly dynamic ones like the CPU load. The most famous wide-area service discovery mechanism based on names is DNS. Its hierarchical tree organization and caching methods take advantage of the static information managed. However, in order to integrate business applications in a virtual enterprise, we need a discovery mechanism to search for the optimal resources based on the given a set of criteria (search keys). In this paper, we propose a communication protocol for exchanging service resource information among wide-area systems. We introduce the concept of the service domain that consists of service providers managed under the same management policy. This concept of the service domain is similar to that for autonomous systems (ASs). In each service domain, the service information provider manages the service resource information of service providers that exist in this service domain. The service resource information provider exchanges this information with other service resource information providers that belong to the different service domains. We also verified the protocol's behavior and effectiveness using a simulation model developed for proposed protocol.

  1. Cure Cycle Design Methodology for Fabricating Reactive Resin Matrix Fiber Reinforced Composites: A Protocol for Producing Void-free Quality Laminates

    Science.gov (United States)

    Hou, Tan-Hung

    2014-01-01

    For the fabrication of resin matrix fiber reinforced composite laminates, a workable cure cycle (i.e., temperature and pressure profiles as a function of processing time) is needed and is critical for achieving void-free laminate consolidation. Design of such a cure cycle is not trivial, especially when dealing with reactive matrix resins. An empirical "trial and error" approach has been used as common practice in the composite industry. Such an approach is not only costly, but also ineffective at establishing the optimal processing conditions for a specific resin/fiber composite system. In this report, a rational "processing science" based approach is established, and a universal cure cycle design protocol is proposed. Following this protocol, a workable and optimal cure cycle can be readily and rationally designed for most reactive resin systems in a cost effective way. This design protocol has been validated through experimental studies of several reactive polyimide composites for a wide spectrum of usage that has been documented in the previous publications.

  2. Prosthesis Prescription Protocol of the Arm (PPP-Arm) : The implementation of a national prosthesis prescription protocol

    NARCIS (Netherlands)

    Wijdenes, Paula; Brouwers, Michael; van der Sluis, Corry K

    BACKGROUND AND AIM: In order to create more uniformity in the prescription of upper limb prostheses by Dutch rehabilitation teams, the development and implementation of a Prosthesis Prescription Protocol of the upper limb (PPP-Arm) was initiated. The aim was to create a national digital protocol to

  3. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  4. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...

  5. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  6. Work ability index and perceived work ability as predictors of disability pension: a prospective study among Finnish municipal employees.

    Science.gov (United States)

    Jääskeläinen, Anne; Kausto, Johanna; Seitsamo, Jorma; Ojajärvi, Anneli; Nygård, Clas-Håkan; Arjas, Elja; Leino-Arjas, Päivi

    2016-06-01

    We analyzed the work ability index (WAI) and its first item (work ability score, WAS) - and subsequent four-year changes thereof - as predictors of disability pension (DP). We linked survey responses of 5251 Finnish municipal employees, aged 44-58 years, to pension and death register data until 2009. Job content (physical, mental, or mixed) was based on observation. Baseline (1981) WAI was divided into poor (37) and WAS into poor (0-5), moderate (6-7), and good/excellent (8-10). Four-year changes in these scores were classified as strong decline (WAI, the hazard ratio (HR) for DP related to moderate and poor WAI, respectively, was 2.0 (95% CI 1.8-2.2) and 5.0 (95% CI 4.4-5.6), adjusted for sociodemographic variables and job content. For WAS, the HR were 1.8 (95% CI 1.6-2.0) and 3.4 (95% 3.0-3.8). Four-year decline in WAI/WAS further increased the risk. During the first four years of follow-up, the area under the curve (AUC) for WAI at cut-off point 27 was 0.66 (sensitivity 49.2% and specificity 82.9%) and 0.64 for cut-off point 36 (sensitivity 84.2% and specificity 44.3%). For WAS at cut-off point 5, the figures were AUC 0.63 (sensitivity 41.9% and specificity 85.0%) and AUC 0.65 for cut-off point 7 (sensitivity 78.2% and specificity 52.7%). The single-item WAS can be considered a reasonable alternative to the seven-item WAI in describing the risk of DP and as a prognostic tool.

  7. Generalized fragment picking in Rosetta: design, protocols and applications.

    Directory of Open Access Journals (Sweden)

    Dominik Gront

    Full Text Available The Rosetta de novo structure prediction and loop modeling protocols begin with coarse grained Monte Carlo searches in which the moves are based on short fragments extracted from a database of known structures. Here we describe a new object oriented program for picking fragments that greatly extends the functionality of the previous program (nnmake and opens the door for new approaches to structure modeling. We provide a detailed description of the code design and architecture, highlighting its modularity, and new features such as extensibility, total control over the fragment picking workflow and scoring system customization. We demonstrate that the program provides at least as good building blocks for ab-initio structure prediction as the previous program, and provide examples of the wide range of applications that are now accessible.

  8. Comparison of a new whole-body continuous-table-movement protocol versus a standard whole-body MR protocol for the assessment of multiple myeloma

    International Nuclear Information System (INIS)

    Weckbach, S.; Michaely, H.J.; Schoenberg, S.O.; Dinter, D.J.; Stemmer, A.

    2010-01-01

    To evaluate a whole body (WB) continuous-table-movement (CTM) MR protocol for the assessment of multiple myeloma (MM) in comparison to a step-by-step WB protocol. Eighteen patients with MM were examined at 1.5T using a WB CTM protocol (axial T2-w fs BLADE, T1-w GRE sequence) and a step-by-step WB protocol including coronal/sagittal T1-w SE and STIR sequences as reference. Protocol time was assessed. Image quality, artefacts, liver/spleen assessability, and the ability to depict bone marrow lesions less than or greater than 1 cm as well as diffuse infiltration and soft tissue lesions were rated. Potential changes in the Durie and Salmon Plus stage and the detectability of complications were assessed. Mean protocol time was 6:38 min (CTM) compared to 24:32 min (standard). Image quality was comparable. Artefacts were more prominent using the CTM protocol (P = 0.0039). Organ assessability was better using the CTM protocol (P < 0.001). Depiction of bone marrow and soft tissue lesions was identical without a staging shift. Vertebral fractures were not detected using the CTM protocol. The new protocol allows a higher patient throughput and facilitates the depiction of extramedullary lesions. However, as long as vertebral fractures are not detectable, the protocol cannot be safely used for clinical routine without the acquisition of an additional sagittal sequence. (orig.)

  9. Impacts of Urban Agriculture on the Determinants of Health: Scoping Review Protocol.

    Science.gov (United States)

    Audate, Pierre Paul; Fernandez, Melissa A; Cloutier, Geneviève; Lebel, Alexandre

    2018-03-27

    Since the 1990s, urban agriculture (UA) has contributed to improving food security in low- and middle- income countries. Now, it is implemented as a multifunctional intervention that can influence various determinants of health (eg, food security, social relationships). Studies of interest stem from several research disciplines, use a wide range of methods, and show results that are sometimes inconsistent. Current studies have not summarized the overall effects of UA on health and its determinants. The objective of this protocol is to develop a research strategy for a scoping review that characterizes studies of beneficial and adverse impacts of UA on health and its determinants in a wide range of disciplines. Initially, with the help of a library specialist, a list of publications will be obtained through a systematic search of seven electronic bibliographic databases: PubMed, Embase, MEDLINE (Embase), CINAHL Plus with full text, Academic Search Premier (EBSCO host), CAB Abstract (Ovid), and Web of Science. Secondly, a three-step screening by two independent reviewers will lead to a list of relevant publications that meet eligibility and inclusion criteria. Finally, data on the bibliography, type of participants, type of study, results of study, and countries will be extracted from included articles and analyzed to be presented in a peer-reviewed article. The findings are expected to identify research gaps that will inform needs for UA research in specific fields (eg, mental health), among certain population groups (eg, adults) or within different economic contexts (eg, low-, middle-, or high-income countries). Furthermore, the findings are expected to identify knowledge gaps and direct future research needs. This is an original study that seeks to integrate beneficial and adverse effects of UA on health at different level of influence (individuals, households, and community) in order to facilitate a better understanding of UA impacts. This protocol is a first of

  10. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  11. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  12. Adaptive Beaconing in Mobility Aware Clustering Based MAC Protocol for Safety Message Dissemination in VANET

    Directory of Open Access Journals (Sweden)

    Nishu Gupta

    2017-01-01

    Full Text Available Majority of research contributions in wireless access in vehicular environment (WAVE/IEEE 802.11p standard focus on life critical safety-related applications. These applications require regular status update of vehicle’s position referred to as beaconing. Periodic beaconing in vehicle to vehicle communication leads to severe network congestion in the communication channel. The condition worsens under high vehicular density where it impacts reliability and upper bound latency of safety messages. In this paper, WAVE compliant enhancement to the existing IEEE 802.11p protocol is presented which targets prioritized delivery of safety messages while simultaneously provisioning the dissemination of nonsafety messages. Proposed scheme relies on dynamic generation of beacons to mitigate channel congestion and inefficient bandwidth utilization by reducing transmission frequency of beacons. Through the use of clustering mechanism, different beaconing frequencies and different data transmission rates are assigned to prioritize vehicular mobility. Through extensive simulation results, the performance of the proposed approach is evaluated in terms of a wide range of quality of service (QoS parameters for two different transmission ranges. Results show that the proposed protocol provides significant enhancement and stability of the clustered topology in vehicular ad hoc network over existing standard and other protocols with similar applications.

  13. Search and nonsearch protocols for radiographic consultation

    International Nuclear Information System (INIS)

    Swensson, R.G.; Theodore, G.H.

    1989-01-01

    Six radiologists, acting as film reviewers, used two different consultation protocols to differentiate among 292 ambiguous findings on chest films: 120 simulated nodules and 172 normal findings (previous readers' false-positive reports of nodules). The non-search protocol identified each finding (by location), and reviewers rated its likelihood as a nodule. The search protocol, which asked reviewers to report and rate all locations regarded as possible nodules on each film, assigned a default negative rating to any unreported finding (nodule or normal). Receiver operator characteristic analyses demonstrated a significantly higher accuracy for each reviewer's search- protocol discriminations between these nodules and confusing normal findings

  14. Cross Layer PHY-MAC Protocol for Wireless Static and Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Chris Blondia

    2008-11-01

    Full Text Available Multihop mobile wireless networks have drawn a lot of attention in recent years thanks to their wide applicability in civil and military environments. Since the existing IEEE 802.11 distributed coordination function (DCF standard does not provide satisfactory access to the wireless medium in multihop mobile networks, we have designed a cross-layer protocol, (CroSs-layer noise aware power driven MAC (SNAPdMac, which consists of two parts. The protocol first concentrates on the flexible adjustment of the upper and lower bounds of the contention window (CW to lower the number of collisions. In addition, it uses a power control scheme, triggered by the medium access control (MAC layer, to limit the waste of energy and also to decrease the number of collisions. Thanks to a noticeable energy conservation and decrease of the number of collisions, it prolongs significantly the lifetime of the network and delays the death of the first node while increasing both the throughput performance and the sending bit rate/throughput fairness among contending flows.

  15. UNUSUALLY WIDE BINARIES: ARE THEY WIDE OR UNUSUAL?

    International Nuclear Information System (INIS)

    Kraus, Adam L.; Hillenbrand, Lynne A.

    2009-01-01

    We describe an astrometric and spectroscopic campaign to confirm the youth and association of a complete sample of candidate wide companions in Taurus and Upper Sco. Our survey found 15 new binary systems (three in Taurus and 12 in Upper Sco) with separations of 3''-30'' (500-5000 AU) among all of the known members with masses of 2.5-0.012 M sun . The total sample of 49 wide systems in these two regions conforms to only some expectations from field multiplicity surveys. Higher mass stars have a higher frequency of wide binary companions, and there is a marked paucity of wide binary systems near the substellar regime. However, the separation distribution appears to be log-flat, rather than declining as in the field, and the mass ratio distribution is more biased toward similar-mass companions than the initial mass function or the field G-dwarf distribution. The maximum separation also shows no evidence of a limit at ∼ sun . We attribute this result to the post-natal dynamical sculpting that occurs for most field systems; our binary systems will escape to the field intact, but most field stars are formed in denser clusters and undergo significant dynamical evolution. In summary, only wide binary systems with total masses ∼ sun appear to be 'unusually wide'.

  16. The Work Ability of Hong Kong Construction Workers in Relation to Individual and Work-Related Factors

    Science.gov (United States)

    Ng, Jacky Y. K.

    2018-01-01

    The shortage in Hong Kong of construction workers is expected to worsen in future due to the aging population and increasing construction activity. Construction work is dangerous and to help reduce the premature loss of construction workers due to work-related disabilities, this study measured the work ability of 420 Hong Kong construction workers with a Work Ability Index (WAI) which can be used to predict present and future work performance. Given the importance of WAI, in this study the effects of individual and work-related factors on WAI were examined to develop and validate a WAI model to predict how individual and work-related factors affect work ability. The findings will be useful for formulating a pragmatic intervention program to improve the work ability of construction workers and keep them in the work force. PMID:29758018

  17. Education-stratified base-rate information on discrepancy scores within and between the Wechsler Adult Intelligence Scale--Third Edition and the Wechsler Memory Scale--Third Edition.

    Science.gov (United States)

    Dori, Galit A; Chelune, Gordon J

    2004-06-01

    The Wechsler Adult Intelligence Scale--Third Edition (WAIS-III; D. Wechsler, 1997a) and the Wechsler Memory Scale--Third Edition (WMS-III; D. Wechsler, 1997b) are 2 of the most frequently used measures in psychology and neuropsychology. To facilitate the diagnostic use of these measures in the clinical decision-making process, this article provides information on education-stratified, directional prevalence rates (i.e., base rates) of discrepancy scores between the major index scores for the WAIS-III, the WMS-III, and between the WAIS-III and WMS-III. To illustrate how such base-rate data can be clinically used, this article reviews the relative risk (i.e., odds ratio) of empirically defined "rare" cognitive deficits in 2 of the clinical samples presented in the WAIS-III--WMS-III Technical Manual (The Psychological Corporation, 1997). ((c) 2004 APA, all rights reserved)

  18. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  19. Protocol for disposition of tank farm equipment lists and tank farm drawings for year 2000 compliance

    International Nuclear Information System (INIS)

    ADAMS, M.R.

    1999-01-01

    A program has been initiated to assess, renovate, document and certify tank farm field equipment for year 2000 compliance. The program is necessary to assure no adverse effects occur in tank farm operations as a result of equipment malfunction due to what is widely known as the ''millennium bug''. This document elaborates the protocols for reviewing field equipment lists and tank farm drawings for the purpose of identifying and resolving year 2000 compliance problems in tank farm equipment

  20. FLIP: An Internetwork Protocol for Supporting Distributed Systems

    NARCIS (Netherlands)

    Kaashoek, M.F.; van Renesse, R.; van Staveren, H.; Tanenbaum, A.S.

    1993-01-01

    Most modern network protocols give adequate support for traditional applications such as file transfer and remote login. Distributed applications, however, have different requirements 1993. Instead of using ad hoc protocols to meet each of the new requirements, we have designed a new protocol,

  1. Biometrics based authentication scheme for session initiation protocol.

    Science.gov (United States)

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  2. 1991 and networked interoperability

    Directory of Open Access Journals (Sweden)

    Birte Christensen-Dalsgaard

    2017-05-01

    Full Text Available 1991, the year of the first call in the Libraries Programme, was a very different time; the network infrastructure was being built, computers were becoming more powerful, and the information society was being formed based on different technological solutions. Standards (SR, Z39.50, HTML, MP3 and protocols (TCP/IP, OSI as to how bits should be transported and interpreted, how programs on computers should communicate and how one could find the relevant information (WAIS, Gopher, WWW were being developed, tested and deployed. Questions were asked that pushed boundaries, experiments were conducted, which delivered new possibilities, and progress on standardization was made. Much happened in the 1990s in a short time span.

  3. Security of the arbitrated quantum signature protocols revisited

    International Nuclear Information System (INIS)

    Kejia, Zhang; Dan, Li; Qi, Su

    2014-01-01

    Recently, much attention has been paid to the study of arbitrated quantum signature (AQS). Among these studies, the cryptanalysis of some AQS protocols and a series of improved ideas have been proposed. Compared with the previous analysis, we present a security criterion, which can judge whether an AQS protocol is able to prevent the receiver (i.e. one participant in the signature protocol) from forging a legal signature. According to our results, it can be seen that most AQS protocols which are based on the Zeng and Keitel (ZK) model are susceptible to a forgery attack. Furthermore, we present an improved idea of the ZK protocol. Finally, some supplement discussions and several interesting topics are provided. (paper)

  4. An electronic specimen collection protocol schema (eSCPS). Document architecture for specimen management and the exchange of specimen collection protocols between biobanking information systems.

    Science.gov (United States)

    Eminaga, O; Semjonow, A; Oezguer, E; Herden, J; Akbarov, I; Tok, A; Engelmann, U; Wille, S

    2014-01-01

    The integrity of collection protocols in biobanking is essential for a high-quality sample preparation process. However, there is not currently a well-defined universal method for integrating collection protocols in the biobanking information system (BIMS). Therefore, an electronic schema of the collection protocol that is based on Extensible Markup Language (XML) is required to maintain the integrity and enable the exchange of collection protocols. The development and implementation of an electronic specimen collection protocol schema (eSCPS) was performed at two institutions (Muenster and Cologne) in three stages. First, we analyzed the infrastructure that was already established at both the biorepository and the hospital information systems of these institutions and determined the requirements for the sufficient preparation of specimens and documentation. Second, we designed an eSCPS according to these requirements. Finally, a prospective study was conducted to implement and evaluate the novel schema in the current BIMS. We designed an eSCPS that provides all of the relevant information about collection protocols. Ten electronic collection protocols were generated using the supplementary Protocol Editor tool, and these protocols were successfully implemented in the existing BIMS. Moreover, an electronic list of collection protocols for the current studies being performed at each institution was included, new collection protocols were added, and the existing protocols were redesigned to be modifiable. The documentation time was significantly reduced after implementing the eSCPS (5 ± 2 min vs. 7 ± 3 min; p = 0.0002). The eSCPS improves the integrity and facilitates the exchange of specimen collection protocols in the existing open-source BIMS.

  5. Establishing treatment protocols for clinical mastitis.

    Science.gov (United States)

    Roberson, Jerry R

    2003-03-01

    Each farm has a unique mix of mastitis pathogens and management procedures that have evolved over time. The herd veterinarian should work with the manager/owner to systematically develop treatment protocols that meet the needs and management of the farm. To establish a mastitis treatment protocol, it is necessary to develop a system to routinely identify clinical mastitis cases, develop a herd-specific severity level assessment system, manage the clinical mastitis cases based on severity level and culture result (when available), avoid antibiotic residues, and monitor the success of the system and alter the protocol as necessary.

  6. The Singapore protocol [for quantum cryptography

    International Nuclear Information System (INIS)

    Englert, B.

    2005-01-01

    The qubit protocol for quantum key distribution presented in this talk is fully tomographic and more efficient than other tomographic protocols. Under ideal circumstances the efficiency is log 2 (4/3) = 0.415 key bits per qubit sent, which is 25% more than the efficiency of 1/3 = 0.333 for the standard 6-state protocol. One can extract 0.4 key bits per qubit by a simple two-way communication scheme, and can so get close to the information-theoretical limit. The noise thresholds for secure key bit generation in the presence of unbiased noise will be reported and discussed. (author)

  7. Securing statically-verified communications protocols against timing attacks

    DEFF Research Database (Denmark)

    Buchholtz, Mikael; Gilmore, Stephen; Hillston, Jane

    2004-01-01

    We present a federated analysis of communication protocols which considers both security properties and timing. These are not entirely independent observations of a protocol; by using timing observations of an executing protocol it is possible to deduce derived information about the nature...... of the communication even in the presence of unbreakable encryption. Our analysis is based on expressing the protocol as a process algebra model and deriving from this process models analysable by the Imperial PEPA Compiler and the LySatool....

  8. Optimized UAV Communication Protocol Based on Prior Locations

    OpenAIRE

    Sboui, Lokman; Rabah, Abdullatif

    2015-01-01

    In this paper, we adopt a new communication protocol between the UAV and fixed on-ground nodes. This protocol tends to reduce communication power consumption by stopping communication if the channel is not good to communicate (i.e. far nodes, obstacles, etc.) The communication is performed using the XBee 868M standard and Libelium wapsmotes. Our designed protocol is based on a new communication model that we propose in this paper. The protocole decides wether to communicate or not after compu...

  9. Dynamic whole body PET parametric imaging: I. Concept, acquisition protocol optimization and clinical application

    Science.gov (United States)

    Karakatsanis, Nicolas A.; Lodge, Martin A.; Tahari, Abdel K.; Zhou, Y.; Wahl, Richard L.; Rahmim, Arman

    2013-01-01

    Static whole body PET/CT, employing the standardized uptake value (SUV), is considered the standard clinical approach to diagnosis and treatment response monitoring for a wide range of oncologic malignancies. Alternative PET protocols involving dynamic acquisition of temporal images have been implemented in the research setting, allowing quantification of tracer dynamics, an important capability for tumor characterization and treatment response monitoring. Nonetheless, dynamic protocols have been confined to single bed-coverage limiting the axial field-of-view to ~15–20 cm, and have not been translated to the routine clinical context of whole-body PET imaging for the inspection of disseminated disease. Here, we pursue a transition to dynamic whole body PET parametric imaging, by presenting, within a unified framework, clinically feasible multi-bed dynamic PET acquisition protocols and parametric imaging methods. We investigate solutions to address the challenges of: (i) long acquisitions, (ii) small number of dynamic frames per bed, and (iii) non-invasive quantification of kinetics in the plasma. In the present study, a novel dynamic (4D) whole body PET acquisition protocol of ~45min total length is presented, composed of (i) an initial 6-min dynamic PET scan (24 frames) over the heart, followed by (ii) a sequence of multi-pass multi-bed PET scans (6 passes x 7 bed positions, each scanned for 45sec). Standard Patlak linear graphical analysis modeling was employed, coupled with image-derived plasma input function measurements. Ordinary least squares (OLS) Patlak estimation was used as the baseline regression method to quantify the physiological parameters of tracer uptake rate Ki and total blood distribution volume V on an individual voxel basis. Extensive Monte Carlo simulation studies, using a wide set of published kinetic FDG parameters and GATE and XCAT platforms, were conducted to optimize the acquisition protocol from a range of 10 different clinically

  10. Dynamic whole-body PET parametric imaging: I. Concept, acquisition protocol optimization and clinical application.

    Science.gov (United States)

    Karakatsanis, Nicolas A; Lodge, Martin A; Tahari, Abdel K; Zhou, Y; Wahl, Richard L; Rahmim, Arman

    2013-10-21

    Static whole-body PET/CT, employing the standardized uptake value (SUV), is considered the standard clinical approach to diagnosis and treatment response monitoring for a wide range of oncologic malignancies. Alternative PET protocols involving dynamic acquisition of temporal images have been implemented in the research setting, allowing quantification of tracer dynamics, an important capability for tumor characterization and treatment response monitoring. Nonetheless, dynamic protocols have been confined to single-bed-coverage limiting the axial field-of-view to ~15-20 cm, and have not been translated to the routine clinical context of whole-body PET imaging for the inspection of disseminated disease. Here, we pursue a transition to dynamic whole-body PET parametric imaging, by presenting, within a unified framework, clinically feasible multi-bed dynamic PET acquisition protocols and parametric imaging methods. We investigate solutions to address the challenges of: (i) long acquisitions, (ii) small number of dynamic frames per bed, and (iii) non-invasive quantification of kinetics in the plasma. In the present study, a novel dynamic (4D) whole-body PET acquisition protocol of ~45 min total length is presented, composed of (i) an initial 6 min dynamic PET scan (24 frames) over the heart, followed by (ii) a sequence of multi-pass multi-bed PET scans (six passes × seven bed positions, each scanned for 45 s). Standard Patlak linear graphical analysis modeling was employed, coupled with image-derived plasma input function measurements. Ordinary least squares Patlak estimation was used as the baseline regression method to quantify the physiological parameters of tracer uptake rate Ki and total blood distribution volume V on an individual voxel basis. Extensive Monte Carlo simulation studies, using a wide set of published kinetic FDG parameters and GATE and XCAT platforms, were conducted to optimize the acquisition protocol from a range of ten different clinically

  11. Dynamic whole-body PET parametric imaging: I. Concept, acquisition protocol optimization and clinical application

    International Nuclear Information System (INIS)

    Karakatsanis, Nicolas A; Lodge, Martin A; Tahari, Abdel K; Zhou, Y; Wahl, Richard L; Rahmim, Arman

    2013-01-01

    Static whole-body PET/CT, employing the standardized uptake value (SUV), is considered the standard clinical approach to diagnosis and treatment response monitoring for a wide range of oncologic malignancies. Alternative PET protocols involving dynamic acquisition of temporal images have been implemented in the research setting, allowing quantification of tracer dynamics, an important capability for tumor characterization and treatment response monitoring. Nonetheless, dynamic protocols have been confined to single-bed-coverage limiting the axial field-of-view to ∼15–20 cm, and have not been translated to the routine clinical context of whole-body PET imaging for the inspection of disseminated disease. Here, we pursue a transition to dynamic whole-body PET parametric imaging, by presenting, within a unified framework, clinically feasible multi-bed dynamic PET acquisition protocols and parametric imaging methods. We investigate solutions to address the challenges of: (i) long acquisitions, (ii) small number of dynamic frames per bed, and (iii) non-invasive quantification of kinetics in the plasma. In the present study, a novel dynamic (4D) whole-body PET acquisition protocol of ∼45 min total length is presented, composed of (i) an initial 6 min dynamic PET scan (24 frames) over the heart, followed by (ii) a sequence of multi-pass multi-bed PET scans (six passes × seven bed positions, each scanned for 45 s). Standard Patlak linear graphical analysis modeling was employed, coupled with image-derived plasma input function measurements. Ordinary least squares Patlak estimation was used as the baseline regression method to quantify the physiological parameters of tracer uptake rate K i and total blood distribution volume V on an individual voxel basis. Extensive Monte Carlo simulation studies, using a wide set of published kinetic FDG parameters and GATE and XCAT platforms, were conducted to optimize the acquisition protocol from a range of ten different

  12. Dynamic whole-body PET parametric imaging: I. Concept, acquisition protocol optimization and clinical application

    Science.gov (United States)

    Karakatsanis, Nicolas A.; Lodge, Martin A.; Tahari, Abdel K.; Zhou, Y.; Wahl, Richard L.; Rahmim, Arman

    2013-10-01

    Static whole-body PET/CT, employing the standardized uptake value (SUV), is considered the standard clinical approach to diagnosis and treatment response monitoring for a wide range of oncologic malignancies. Alternative PET protocols involving dynamic acquisition of temporal images have been implemented in the research setting, allowing quantification of tracer dynamics, an important capability for tumor characterization and treatment response monitoring. Nonetheless, dynamic protocols have been confined to single-bed-coverage limiting the axial field-of-view to ˜15-20 cm, and have not been translated to the routine clinical context of whole-body PET imaging for the inspection of disseminated disease. Here, we pursue a transition to dynamic whole-body PET parametric imaging, by presenting, within a unified framework, clinically feasible multi-bed dynamic PET acquisition protocols and parametric imaging methods. We investigate solutions to address the challenges of: (i) long acquisitions, (ii) small number of dynamic frames per bed, and (iii) non-invasive quantification of kinetics in the plasma. In the present study, a novel dynamic (4D) whole-body PET acquisition protocol of ˜45 min total length is presented, composed of (i) an initial 6 min dynamic PET scan (24 frames) over the heart, followed by (ii) a sequence of multi-pass multi-bed PET scans (six passes × seven bed positions, each scanned for 45 s). Standard Patlak linear graphical analysis modeling was employed, coupled with image-derived plasma input function measurements. Ordinary least squares Patlak estimation was used as the baseline regression method to quantify the physiological parameters of tracer uptake rate Ki and total blood distribution volume V on an individual voxel basis. Extensive Monte Carlo simulation studies, using a wide set of published kinetic FDG parameters and GATE and XCAT platforms, were conducted to optimize the acquisition protocol from a range of ten different clinically

  13. Decellularization of placentas: establishing a protocol

    Directory of Open Access Journals (Sweden)

    L.C.P.C. Leonel

    2017-11-01

    Full Text Available Biological biomaterials for tissue engineering purposes can be produced through tissue and/or organ decellularization. The remaining extracellular matrix (ECM must be acellular and preserve its proteins and physical features. Placentas are organs of great interest because they are discarded after birth and present large amounts of ECM. Protocols for decellularization are tissue-specific and have not been established for canine placentas yet. This study aimed at analyzing a favorable method for decellularization of maternal and fetal portions of canine placentas. Canine placentas were subjected to ten preliminary tests to analyze the efficacy of parameters such as the type of detergents, freezing temperatures and perfusion. Two protocols were chosen for further analyses using histology, scanning electron microscopy, immunofluorescence and DNA quantification. Sodium dodecyl sulfate (SDS was the most effective detergent for cell removal. Freezing placentas before decellularization required longer periods of incubation in different detergents. Both perfusion and immersion methods were capable of removing cells. Placentas decellularized using Protocol I (1% SDS, 5 mM EDTA, 50 mM TRIS, and 0.5% antibiotic preserved the ECM structure better, but Protocol I was less efficient to remove cells and DNA content from the ECM than Protocol II (1% SDS, 5 mM EDTA, 0.05% trypsin, and 0.5% antibiotic.

  14. Mac protocols for wireless sensor network (wsn): a comparative study

    International Nuclear Information System (INIS)

    Arshad, J.; Akram, Q.; Saleem, Y.

    2014-01-01

    Data communication between nodes is carried out under Medium Access Control (MAC) protocol which is defined at data link layer. The MAC protocols are responsible to communicate and coordinate between nodes according to the defined standards in WSN (Wireless Sensor Networks). The design of a MAC protocol should also address the issues of energy efficiency and transmission efficiency. There are number of MAC protocols that exist in the literature proposed for WSN. In this paper, nine MAC protocols which includes S-MAC, T-MAC, Wise-MAC, Mu-MAC, Z-MAC, A-MAC, D-MAC, B-MAC and B-MAC+ for WSN have been explored, studied and analyzed. These nine protocols are classified in contention based and hybrid (combination of contention and schedule based) MAC protocols. The goal of this comparative study is to provide a basis for MAC protocols and to highlight different mechanisms used with respect to parameters for the evaluation of energy and transmission efficiency in WSN. This study also aims to give reader a better understanding of the concepts, processes and flow of information used in these MAC protocols for WSN. A comparison with respect to energy reservation scheme, idle listening avoidance, latency, fairness, data synchronization, and throughput maximization has been presented. It was analyzed that contention based MAC protocols are less energy efficient as compared to hybrid MAC protocols. From the analysis of contention based MAC protocols in term of energy consumption, it was being observed that protocols based on preamble sampling consume lesser energy than protocols based on static or dynamic sleep schedule. (author)

  15. Verbal protocols as methodological resources: research evidence

    Directory of Open Access Journals (Sweden)

    Alessandra Baldo

    2012-01-01

    Full Text Available This article aims at reflecting on the use of verbal protocols as a methodological resource in qualitative research, more specifically on the aspect regarded as the main limitation of a study about lexical inferencing in L2 (BALDO; VELASQUES, 2010: its subjective trait. The article begins with a brief literature review on protocols, followed by a description of the study in which they were employed as methodological resources. Based on that, protocol subjectivity is illustrated through samples of unparalleled data classification, carried out independently by two researchers. In the final section, the path followed to minimize the problem is presented, intending to contribute to improve efficiency in the use of verbal protocols in future research.

  16. Comparison between PRP, PRGF and PRF: lights and shadows in three similar but different protocols.

    Science.gov (United States)

    Giannini, S; Cielo, A; Bonanome, L; Rastelli, C; Derla, C; Corpaci, F; Falisi, G

    2015-01-01

    The main goal of the modern surgery is to get a low invasiveness and a high rate of clinical healing: in the last years, it has been introduced the concept of a "regenerative surgery", and many techniques has been widely described in the literature. The most used are PRP, PRGF and PRF techniques. Aim of this research is to compare the three protocol of PRP, PRF and PRGF in their essential features, so to suggest to the practitioners the best blood product to use in the regenerative surgery. Among the advantages that shows the PRF, compared to PRP and PRGF, we can cite a greater simplicity of production for the absence of manipulation that leads to a reduced possibility of alteration of the protocol due to an error of the operator. The special texture of the PRF and its biological features shows clearly an interesting surgical versatility and all the characteristics that can support a faster tissues regeneration and high-quality clinical outcomes.

  17. ULMAP: Ultralightweight NFC Mutual Authentication Protocol with Pseudonyms in the Tag for IoT in 5G

    Directory of Open Access Journals (Sweden)

    Kai Fan

    2017-01-01

    Full Text Available As one of the core techniques in 5G, the Internet of Things (IoT is increasingly attracting people’s attention. Meanwhile, as an important part of IoT, the Near Field Communication (NFC is widely used on mobile devices and makes it possible to take advantage of NFC system to complete mobile payment and merchandise information reading. But with the development of NFC, its problems are increasingly exposed, especially the security and privacy of authentication. Many NFC authentication protocols have been proposed for that, some of them only improve the function and performance without considering the security and privacy, and most of the protocols are heavyweight. In order to overcome these problems, this paper proposes an ultralightweight mutual authentication protocol, named ULMAP. ULMAP only uses Bit and XOR operations to complete the mutual authentication and prevent the denial of service (DoS attack. In addition, it uses subkey and subindex number into its key update process to achieve the forward security. The most important thing is that the computation and storage overhead of ULMAP are few. Compared with some traditional schemes, our scheme is lightweight, economical, practical, and easy to protect against synchronization attack.

  18. A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS

    Directory of Open Access Journals (Sweden)

    U. Latha

    2013-08-01

    Full Text Available The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints information. The proposed system comprised of three phases namely, fingerprint reconstruction, feature extraction and development of trigon based security protocol. In fingerprint reconstruction, the different crack variance level finger prints images are reconstructed by the M-band Dual Tree Complex Wavelet Transform (DTCWT. After that features are extracted by binarization. A set of finger print images are utilized to evaluate the performance of security protocol and the result from this process guarantees the healthiness of the proposed trigon based security protocol. The implementation results show the effectiveness of proposed trigon based security protocol in protecting the finger print information and the achieved improvement in image reconstruction and the security process.

  19. Cryptographic protocol security analysis based on bounded constructing algorithm

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    An efficient approach to analyzing cryptographic protocols is to develop automatic analysis tools based on formal methods. However, the approach has encountered the high computational complexity problem due to reasons that participants of protocols are arbitrary, their message structures are complex and their executions are concurrent. We propose an efficient automatic verifying algorithm for analyzing cryptographic protocols based on the Cryptographic Protocol Algebra (CPA) model proposed recently, in which algebraic techniques are used to simplify the description of cryptographic protocols and their executions. Redundant states generated in the analysis processes are much reduced by introducing a new algebraic technique called Universal Polynomial Equation and the algorithm can be used to verify the correctness of protocols in the infinite states space. We have implemented an efficient automatic analysis tool for cryptographic protocols, called ACT-SPA, based on this algorithm, and used the tool to check more than 20 cryptographic protocols. The analysis results show that this tool is more efficient, and an attack instance not offered previously is checked by using this tool.

  20. Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV) processing speed scores as measures of noncredible responding: The third generation of embedded performance validity indicators.

    Science.gov (United States)

    Erdodi, Laszlo A; Abeare, Christopher A; Lichtenstein, Jonathan D; Tyson, Bradley T; Kucharski, Brittany; Zuccato, Brandon G; Roth, Robert M

    2017-02-01

    Research suggests that select processing speed measures can also serve as embedded validity indicators (EVIs). The present study examined the diagnostic utility of Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV) subtests as EVIs in a mixed clinical sample of 205 patients medically referred for neuropsychological assessment (53.3% female, mean age = 45.1). Classification accuracy was calculated against 3 composite measures of performance validity as criterion variables. A PSI ≤79 produced a good combination of sensitivity (.23-.56) and specificity (.92-.98). A Coding scaled score ≤5 resulted in good specificity (.94-1.00), but low and variable sensitivity (.04-.28). A Symbol Search scaled score ≤6 achieved a good balance between sensitivity (.38-.64) and specificity (.88-.93). A Coding-Symbol Search scaled score difference ≥5 produced adequate specificity (.89-.91) but consistently low sensitivity (.08-.12). A 2-tailed cutoff on the Coding/Symbol Search raw score ratio (≤1.41 or ≥3.57) produced acceptable specificity (.87-.93), but low sensitivity (.15-.24). Failing ≥2 of these EVIs produced variable specificity (.81-.93) and sensitivity (.31-.59). Failing ≥3 of these EVIs stabilized specificity (.89-.94) at a small cost to sensitivity (.23-.53). Results suggest that processing speed based EVIs have the potential to provide a cost-effective and expedient method for evaluating the validity of cognitive data. Given their generally low and variable sensitivity, however, they should not be used in isolation to determine the credibility of a given response set. They also produced unacceptably high rates of false positive errors in patients with moderate-to-severe head injury. Combining evidence from multiple EVIs has the potential to improve overall classification accuracy. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  1. Authentication Protocol using Quantum Superposition States

    Energy Technology Data Exchange (ETDEWEB)

    Kanamori, Yoshito [University of Alaska; Yoo, Seong-Moo [University of Alabama, Huntsville; Gregory, Don A. [University of Alabama, Huntsville; Sheldon, Frederick T [ORNL

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  2. Entanglement distillation protocols and number theory

    International Nuclear Information System (INIS)

    Bombin, H.; Martin-Delgado, M.A.

    2005-01-01

    We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set Z D n associated with Bell diagonal states is a module rather than a vector space. We find that a partition of Z D n into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D. When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively

  3. Saudi Arabia and CERN sign protocol

    CERN Multimedia

    2008-01-01

    On 9 May 2008, Mohammed I. Al Suwaiyel, President of the King Abdulaziz City of Science and Technology, representing the Government of Saudi Arabia, and CERN Director-General, Robert Aymar, signed a protocol to the 2006 cooperation agreement between CERN and Saudi Arabia. Members of the Saudi Arabian Government visit ATLAS.The purpose of the protocol is to define the operational framework needed to carry out various specific tasks provided for in the cooperation agreement in order to promote the development of a high energy particle physics community in Saudi Arabia and its ultimate visible participation as a member of the global CERN community. Signing the protocol, Mohammed I. Al-Suwaiyel said: "The Saudi Arabian Government has taken a number of initiatives to promote R&D in the interests of our country’s development and the advancement of science. Thanks to this protocol, Saudi scientists will be able to work towards this go...

  4. Novel protocol for persister cells isolation.

    Directory of Open Access Journals (Sweden)

    Silvia J Cañas-Duarte

    Full Text Available Bacterial persistence, where a fraction of a population presents a transient resistance to bactericidal substances, has great medical importance due to its relation with the appearance of antibiotic resistances and untreatable bacterial chronic infections. The mechanisms behind this phenomenon remain largely unknown in spite of recent advances, in great part because of the difficulty in isolating the very small fraction of the population that is in this state at any given time. Current protocols for persister isolation have resulted in possible biases because of the induction of this state by the protocol itself. Here we present a novel protocol that allows rapid isolation of persister cells both from exponential and stationary phase. Moreover, it is capable of differentiating between type I and type II persister cells, which should allow the field to move beyond its current state of studying only one type. While this protocol prompts a revision of many of the current results, it should greatly facilitate further advances in the field.

  5. Feeling Is Believing: A Secure Template Exchange Protocol

    NARCIS (Netherlands)

    Buhan, I.R.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.; Lee, Seong-Whan; Li, Stan Z.

    We use grip pattern based biometrics as a secure side channel to achieve pre-authentication in a protocol that sets up a secure channel between two hand held devices. The protocol efficiently calculates a shared secret key from biometric data. The protocol is used in an application where grip

  6. Optimizing the high-resolution manometry (HRM) study protocol.

    Science.gov (United States)

    Patel, A; Ding, A; Mirza, F; Gyawali, C P

    2015-02-01

    Intolerance of the esophageal manometry catheter may prolong high-resolution manometry (HRM) studies and increase patient distress. We assessed the impact of obtaining the landmark phase at the end of the study when the patient has acclimatized to the HRM catheter. 366 patients (mean age 55.4 ± 0.8 years, 62.0% female) undergoing esophageal HRM over a 1-year period were studied. The standard protocol consisted of the landmark phase, 10 5 mL water swallows 20-30 s apart, and multiple rapid swallows where 4-6 2 mL swallows were administered in rapid succession. The modified protocol consisted of the landmark phase at the end of the study after test swallows. Study duration, technical characteristics, indications, and motor findings were compared between standard and modified protocols. Of the 366 patients, 89.6% underwent the standard protocol (study duration 12.9 ± 0.3 min). In 10.4% with poor catheter tolerance undergoing the modified protocol, study duration was significantly longer (15.6 ± 1.0 min, p = 0.004) despite similar duration of study maneuvers. Only elevated upper esophageal sphincter basal pressures at the beginning of the study segregated modified protocol patients. The 95th percentile time to landmark phase in the standard protocol patients was 6.1 min; as many as 31.4% of modified protocol patients could not obtain their first study maneuver within this period (p = 0.0003). Interpretation was not impacted by shifting the landmark phase to the end of the study. Modification of the HRM study protocol with the landmark phase obtained at the end of the study optimizes study duration without compromising quality. © 2014 John Wiley & Sons Ltd.

  7. Multiprofissional electronic protocol in ophtalmology with enfasis in strabismus

    Directory of Open Access Journals (Sweden)

    CHRISTIE GRAF RIBEIRO

    Full Text Available ABSTRACT Objective: to create and validate an electronic database in ophthalmology focused on strabismus, to computerize this database in the form of a systematic data collection software named Electronic Protocol, and to incorporate this protocol into the Integrated System of Electronic Protocols (SINPE(c. Methods: this is a descriptive study, with the methodology divided into three phases: (1 development of a theoretical ophthalmologic database with emphasis on strabismus; (2 computerization of this theoretical ophthalmologic database using SINPE(c and (3 interpretation of the information with demonstration of results to validate the protocol. We inputed data from the charts of fifty patients with known strabismus through the Electronic Protocol for testing and validation. Results: the new electronic protocol was able to store information regarding patient history, physical examination, laboratory exams, imaging results, diagnosis and treatment of patients with ophthalmologic diseases, with emphasis on strabismus. We included 2,141 items in this master protocol and created 20 new specific electronic protocols for strabismus, each with its own specifics. Validation was achieved through correlation and corroboration of the symptoms and confirmed diagnoses of the fifty included patients with the diagnostic criteria for the twenty new strabismus protocols. Conclusion: a new, validated electronic database focusing on ophthalmology, with emphasis on strabismus, was successfully created through the standardized collection of information, and computerization of the database using proprietary software. This protocol is ready for deployment to facilitate data collection, sorting and application for practitioners and researchers in numerous specialties.

  8. The Montreal Protocol's multilateral fund and sustainable development

    International Nuclear Information System (INIS)

    Luken, Ralph; Grof, Tamas

    2006-01-01

    The 1987 Montreal Protocol is widely seen as a global environmental accord that has produced tangible results in terms of reductions in ozone-depleting substances. In addition, there have been other benefits, largely unrecognized and undocumented, that can best be characterized in a sustainable development framework based on a review of 50 out of 931 projects implemented over a 13 year period by one of the four implementing agencies of the Multilateral Fund for the Implementation of the Montreal Protocol. All investment projects have reduced ozone depleting potential and global warming potential. Some projects have reduced atmospheric emissions and contamination of groundwater. Other projects have increased the competitiveness of enterprises in domestic and international markets and have sustained and in a few cases created employment opportunities. Others, fewer in number, have potentially contributed to environmental problems, have initially created difficulties in maintaining productivity and quality standards and have decreased the number of employment opportunities because of the need to rationalize manufacturing processes. The potential contributions from Multilateral Fund investment projects to sustainable development could probably have been amplified with project design guidance for the technical staffs of all three implementing agencies executing investment projects. In thinking about other multilateral environmental agreements, one can see the need for similar guidance for Global Environment Facility funded projects supporting the focal areas of climate change, international waters, ozone depletion and persistent organic pollutants. Some of them have the potential to generate multiple beneficial impacts in addition to their stated environmental objective if designed and implemented within a sustainable development framework. (author)

  9. A Protocol for the Use of Remotely-Supervised Transcranial Direct Current Stimulation (tDCS) in Multiple Sclerosis (MS).

    Science.gov (United States)

    Kasschau, Margaret; Sherman, Kathleen; Haider, Lamia; Frontario, Ariana; Shaw, Michael; Datta, Abhishek; Bikson, Marom; Charvet, Leigh

    2015-12-26

    Transcranial direct current stimulation (tDCS) is a noninvasive brain stimulation technique that uses low amplitude direct currents to alter cortical excitability. With well-established safety and tolerability, tDCS has been found to have the potential to ameliorate symptoms such as depression and pain in a range of conditions as well as to enhance outcomes of cognitive and physical training. However, effects are cumulative, requiring treatments that can span weeks or months and frequent, repeated visits to the clinic. The cost in terms of time and travel is often prohibitive for many participants, and ultimately limits real-world access. Following guidelines for remote tDCS application, we propose a protocol that would allow remote (in-home) participation that uses specially-designed devices for supervised use with materials modified for patient use, and real-time monitoring through a telemedicine video conferencing platform. We have developed structured training procedures and clear, detailed instructional materials to allow for self- or proxy-administration while supervised remotely in real-time. The protocol is designed to have a series of checkpoints, addressing attendance and tolerability of the session, to be met in order to continue to the next step. The feasibility of this protocol was then piloted for clinical use in an open label study of remotely-supervised tDCS in multiple sclerosis (MS). This protocol can be widely used for clinical study of tDCS.

  10. Optical code-division multiple-access protocol with selective retransmission

    Science.gov (United States)

    Mohamed, Mohamed A. A.; Shalaby, Hossam M. H.; El-Badawy, El-Sayed A.

    2006-05-01

    An optical code-division multiple-access (OCDMA) protocol based on selective retransmission technique is proposed. The protocol is modeled using a detailed state diagram and is analyzed using equilibrium point analysis (EPA). Both traditional throughput and average delay are used to examine its performance for several network parameters. In addition, the performance of the proposed protocol is compared to that of the R3T protocol, which is based on a go-back-n technique. Our results show that a higher performance is achieved by the proposed protocol at the expense of system complexity.

  11. Protocol Monitoring Energy Conservation; Protocol Monitoring Energiebesparing

    Energy Technology Data Exchange (ETDEWEB)

    Boonekamp, P.G.M. [ECN Beleidsstudies, Petten (Netherlands); Mannaerts, H. [Centraal Planburea CPB, Den Haag (Netherlands); Tinbergen, W. [Centraal Bureau voor de Statistiek CBS, Den Haag (Netherlands); Vreuls, H.H.J. [Nederlandse onderneming voor energie en milieu Novem, Utrecht (Netherlands); Wesselink, B. [Rijksinstituut voor Volksgezondheid en Milieuhygiene RIVM, Bilthoven (Netherlands)

    2001-12-01

    On request of the Dutch ministry of Economic Affairs five institutes have collaborated to create a 'Protocol Monitoring Energy Conservation', a common method and database to calculate the amount of energy savings realised in past years. The institutes concerned are the Central Bureau of Statistics (CBS), the Netherlands Bureau for Economic Policy Analysis (CPB), the Energy research Centre of the Netherlands (ECN), the National Agency for Energy and Environment (Novem) and the Netherlands Institute of Public Health and the Environment (RIVM). The institutes have agreed upon a clear definition of energy use and energy savings. The demarcation with renewable energy, the saving effects of substitution between energy carriers and the role of import and export of energy have been elaborated. A decomposition method is used to split up the observed change in energy use in a number of effects, on a national and sectoral level. This method includes an analysis of growth effects, effects of structural changes in production and consumption activities and savings on end use or with more efficient conversion processes. To calculate these effects the total energy use is desegregated as much as possible. For each segment a reference energy use is calculated according to the trend in a variable which is supposed to be representative for the use without savings. The difference with the actual energy use is taken as the savings realised. Results are given for the sectors households, industry, agriculture, services and government, transportation and the energy sector; as well as a national figure. A special feature of the protocol method is the application of primary energy use figures in the determination of savings for end users. This means that the use of each energy carrier is increased with a certain amount, according to the conversion losses caused elsewhere in the energy system. The losses concern the base year energy sector and losses abroad for imports of secondary

  12. Sufficient Conditions for Vertical Composition of Security Protocols (Extended Version)

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Viganò, Luca

    a certain kind of channel as a goal and another secure protocol P2 that assumes this kind of channel, can we then derive that their vertical composition P2[P1] is secure? It is well known that protocol composition can lead to attacks even when the individual protocols are all secure in isolation......Vertical composition of security protocols means that an application protocol (e.g., a banking service) runs over a channel established by another protocol (e.g., a secure channel provided by TLS). This naturally gives rise to a compositionality question: given a secure protocol P1 that provides....... In this paper, we formalize seven easy-to-check static conditions that support a large class of channels and applications and that we prove to be su_cient for vertical security protocol composition....

  13. Effectiveness of a transdiagnostic internet-based protocol for the treatment of emotional disorders versus treatment as usual in specialized care: study protocol for a randomized controlled trial.

    Science.gov (United States)

    González-Robles, Alberto; García-Palacios, Azucena; Baños, Rosa; Riera, Antonio; Llorca, Ginés; Traver, Francisco; Haro, Gonzalo; Palop, Vicente; Lera, Guillem; Romeu, José Enrique; Botella, Cristina

    2015-10-31

    Emotional disorders (depression and anxiety disorders) are highly prevalent mental health problems. Although evidence showing the effectiveness of disorder-specific treatments exists, high comorbidity rates among emotional disorders limit the utility of these protocols. This has led some researchers to focus their interest on transdiagnostic interventions, a treatment perspective that might be more widely effective across these disorders. Also, the current way of delivering treatments makes it difficult provide assistance to all of the population in need. The use of the Internet in the delivery of evidence-based treatments may help to disseminate treatments among the population. In this study, we aim to test the effectiveness of EmotionRegulation, a new transdiagnostic Internet-based protocol for unipolar mood disorders, five anxiety disorders (panic disorder, agoraphobia, social anxiety disorder, generalized anxiety disorder and anxiety disorder not otherwise specified), and obsessive-compulsive disorder in comparison to treatment as usual as provided in Spanish public specialized mental health care. We will also study its potential impact on basic temperament dimensions (neuroticism/behavioral inhibition and extraversion/behavioral activation). Expectations and opinions of patients about this protocol will also be studied. The study is a randomized controlled trial. 200 participants recruited in specialized care will be allocated to one of two treatment conditions: a) EmotionRegulation or b) treatment as usual. Primary outcome measures will be the BAI and the BDI-II. Secondary outcomes will include a specific measure of the principal disorder, and measures of neuroticism/behavioral inhibition and extraversion/behavioral activation. Patients will be assessed at baseline, post-treatment, and 3- and 12-month follow-ups. Intention to treat and per protocol analyses will be performed. Although the effectiveness of face-to-face transdiagnostic protocols has been

  14. The most frequently used tests for assessing executive functions in aging

    Directory of Open Access Journals (Sweden)

    Camila de Assis Faria

    Full Text Available There are numerous neuropsychological tests for assessing executive functions in aging, which vary according to the different domains assessed. OBJECTIVE: To present a systematic review of the most frequently used instruments for assessing executive functions in older adults with different educational levels in clinical and experimental research. METHODS: We searched for articles published in the last five years, using the PubMed database with the following terms: "neuropsychological tests", "executive functions", and "mild cognitive impairment". There was no language restriction. RESULTS: 25 articles fulfilled all the inclusion criteria. The seven neuropsychological tests most frequently used to evaluate executive functions in aging were: [1] Trail Making Test (TMT Form B; [2] Verbal Fluency Test (VFT - F, A and S; [3] VFT Animals category; [4] Clock Drawing Test (CDT; [5] Digits Forward and Backward subtests (WAIS-R or WAIS-III; [6] Stroop Test; and [7] Wisconsin Card Sorting Test (WCST and its variants. The domains of executive functions most frequently assessed were: mental flexibility, verbal fluency, planning, working memory, and inhibitory control. CONCLUSION: The study identified the tests and domains of executive functions most frequently used in the last five years by research groups worldwide to evaluate older adults. These results can direct future research and help build evaluation protocols for assessing executive functions, taking into account the different educational levels and socio-demographic profiles of older adults in Brazil.

  15. A customised cold-water immersion protocol favours one-size-fits-all protocols in improving acute performance recovery

    NARCIS (Netherlands)

    Zandvoort, Coen S.; de Zwart, Jelmer R.; van Keeken, Brenda L.; Viroux, Patrick J.F.; Tiemessen, Ivo J.H.

    The purpose of the present study was to investigate whether a customised cold-water immersion (CWIc) protocol was more effective in enhancing acute performance recovery than a one-size-fits-all CWI (CWIs) or active recovery (AR) protocol. On three separate testing days, 10 healthy, physically

  16. Demographic and occupational determinants of the work ability of firemen.

    Science.gov (United States)

    Firoozeh, Marjan; Saremi, Mahnaz; Kavousi, Amir; Maleki, Azam

    2017-01-24

    Firefighters tackle various stressors that affect their health and job performance; therefore, assessment of their work ability is necessary. This study aimed to investigate the demographic and occupational determinants of the work ability of firemen. In this cross-sectional study, 375 firemen working in Tehran Fire Department were randomly selected. Demographic, occupational, and work ability index (WAI) questionnaires were applied as research tools. The mean firemen's WAI score was relatively high. There were significant relationships between WAI and age, body mass index, work experience, and weekly leisure-time physical exercise hours. Single employees, those who did not have extra jobs and did not smoke, had greater scores compared to their counterparts. Poisson regression revealed that age and weekly leisure-time physical exercise hours could affect WAI significantly. Although Iranian firemen revealed good work ability, recognizing factors affecting this ability and preparing facilities to promote their function is necessary.

  17. The Additional Protocol as an important tool for the strengthening of the safeguards system

    International Nuclear Information System (INIS)

    Loosch, Reinhard

    2001-01-01

    Full text: The following main points will be dealt with and underlined by illustrative examples: 0. A preliminary clarification: Contrary to the title's short-hand language, it is of course, not the Additional Protocols entered into by the Agency and States and other Parties to Safeguards Agreements since 1997 nor the Model Additional Protocol adopted by the Board of Governors and endorsed by the General Conference in 1997 that are, by themselves, an important tool for the strengthening of the Agency's safeguards system. They are, however, the necessary legal prerequisite as well as a strong political and moral boost for enabling the Agency to develop and apply additional tools in order to make the international nuclear non-proliferation regime more effective and, therefore, more reassuring and at the same time, more efficient and therefore, more widely accepted. 1. The importance of the new tools cannot be assessed yet. Hopefully, it will grow quickly and consistently. This will depend primarily on two factors: - The extent to which Additional Protocols are entered into force and at what speed this is achieved, and the extent to which these Protocols cover all important peaceful nuclear activities and resources, whether these exist in states with comprehensive safeguards agreements or not; - The extent to which the Agency succeeds in merging the new measures with those applicable before into an optimized, integrated toolbox. 2. The first factor tends to increase effectiveness by permitting the collection of safeguards- relevant data provided not only in reports from countries in which such activities are conducted or such resources exist but also in information coming from other sources such as publications in. or intelligence made available by, other countries. Cross-checking all those data against each other may, in the best case, reinforce their credibility or, in the worst case, reveal gaps and inconsistencies, but will at any rate, in one way or other, help

  18. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... results. The most important generalization is the support for all security properties of the geometric fragment proposed by [Gut14]....... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...

  19. Validation of the Pangao PG-800B11 blood pressure monitor according to the European Society of Hypertension and the British Hypertension Society protocols.

    Science.gov (United States)

    Bing, Sen; Zhang, Cunhai; Wang, Liping; Li, Linyi; Wan, Yi

    2014-12-01

    The study aimed to determine the accuracy of the fully automated oscillometric upper-arm blood pressure (BP) monitor Pangao PG-800B11 according to the European Society of Hypertension-International Protocol (ESH-IP) revision 2010 and the British Hypertension Society (BHS) protocol 1993. Data from 33 participants were initially examined according to the ESH-IP revision 2010. Furthermore, 52 participants were then enrolled to fulfill the BHS protocol requirements. In all participants, sequential left arm measurements were performed by two trained observers using a mercury sphygmomanometer and one supervisor using the device. The protocols' requirements were followed precisely. The device passed all parts of the ESH protocol for systolic blood pressure (SBP) and diastolic blood pressure (DBP) and was graded A according to the criteria of the BHS protocol for both SBP and DBP. The A/A grade was achieved in low (160/100 mmHg) BP categories. The mean BP difference between PG-800B11 and observers in the 85 participants was -0.6±5.0 mmHg for SBP and -0.6±4.5 mmHg for DBP; thus, the device also fulfilled the requirements of the Association for the Advancement of Medical Instrumentation (AAMI). The Pangao PG-800B11 passed all requirements of the ESH-IP revision 2010 and achieved A/A grade of the BHS protocol across a wide range of BPs.

  20. The Geneva Protocol of 1925

    International Nuclear Information System (INIS)

    Mc Elroy, R.J.

    1991-01-01

    This paper reports that when President Gerald Ford signed the instruments of ratification for the Geneva Protocol of 1925 on January 22, 1975, a tortured, half-century-long chapter in U.S. arms control policy was brought to a close. Fifty years earlier, at the Geneva Conference for the Control of the International Trade in Arms, Munitions and Implements of War, the United States had played a key role in drafting and reaching agreement on the Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases and of Bacteriological Methods of Warfare. The protocol, signed by thirty nations, including the United States, on June 17, 1925, prohibits the use in war of asphyxiating, poisonous or other gases, and of all analogous liquids, materials or devices as well as the use of bacteriological methods of warfare