WorldWideScience

Sample records for protocol wais wide

  1. Accessing HEP Collaboration documents using WWW and WAIS

    Energy Technology Data Exchange (ETDEWEB)

    Nguyen, T.D.; Buckley-Geer, E.; Ritchie, D.J.

    1995-09-01

    WAIS stands for Wide Area Information Server. It is a distributed information retrieval system. A WAIS system has a client-server architecture which consists of clients talking to a server via a TCP/IP network using the ANSI standard Z39-50 VI protocol. A freely available version (FreeWAIS) is supported by the Clearinghouse for Networked Information Discovery and Retrieval, also known as CNIDR. FreeWAIS-sf, which is the software the authors are using at Fermilab, is an extension of FreeWAIS. FreeWAIS-sf supports all the functionalities which FreeWAIS offers as well as additional indexing and searching capabilities for structured fields. World Wide Web (WWW) was originally developed by Tim Berners-Lee at CERN and is now the backbone for serving information on Internet. Here, the authors describe a system for accessing HEP collaboration documents using WWW and WAIS.

  2. Accessing HEP Collaboration documents using WWW and WAIS

    International Nuclear Information System (INIS)

    Nguyen, T.D.; Buckley-Geer, E.; Ritchie, D.J.

    1995-09-01

    WAIS stands for Wide Area Information Server. It is a distributed information retrieval system. A WAIS system has a client-server architecture which consists of clients talking to a server via a TCP/IP network using the ANSI standard Z39-50 VI protocol. A freely available version (FreeWAIS) is supported by the Clearinghouse for Networked Information Discovery and Retrieval, also known as CNIDR. FreeWAIS-sf, which is the software the authors are using at Fermilab, is an extension of FreeWAIS. FreeWAIS-sf supports all the functionalities which FreeWAIS offers as well as additional indexing and searching capabilities for structured fields. World Wide Web (WWW) was originally developed by Tim Berners-Lee at CERN and is now the backbone for serving information on Internet. Here, the authors describe a system for accessing HEP collaboration documents using WWW and WAIS

  3. The “Wireless Sensor Networks for City-Wide Ambient Intelligence (WISE-WAI)” Project

    Science.gov (United States)

    Casari, Paolo; Castellani, Angelo P.; Cenedese, Angelo; Lora, Claudio; Rossi, Michele; Schenato, Luca; Zorzi, Michele

    2009-01-01

    This paper gives a detailed technical overview of some of the activities carried out in the context of the “Wireless Sensor networks for city-Wide Ambient Intelligence (WISE-WAI)” project, funded by the Cassa di Risparmio di Padova e Rovigo Foundation, Italy. The main aim of the project is to demonstrate the feasibility of large-scale wireless sensor network deployments, whereby tiny objects integrating one or more environmental sensors (humidity, temperature, light intensity), a microcontroller and a wireless transceiver are deployed over a large area, which in this case involves the buildings of the Department of Information Engineering at the University of Padova. We will describe how the network is organized to provide full-scale automated functions, and which services and applications it is configured to provide. These applications include long-term environmental monitoring, alarm event detection and propagation, single-sensor interrogation, localization and tracking of objects, assisted navigation, as well as fast data dissemination services to be used, e.g., to rapidly re-program all sensors over-the-air. The organization of such a large testbed requires notable efforts in terms of communication protocols and strategies, whose design must pursue scalability, energy efficiency (while sensors are connected through USB cables for logging and debugging purposes, most of them will be battery-operated), as well as the capability to support applications with diverse requirements. These efforts, the description of a subset of the results obtained so far, and of the final objectives to be met are the scope of the present paper. PMID:22408513

  4. WAIS Searching of the Current Contents Database

    Science.gov (United States)

    Banholzer, P.; Grabenstein, M. E.

    The Homer E. Newell Memorial Library of NASA's Goddard Space Flight Center is developing capabilities to permit Goddard personnel to access electronic resources of the Library via the Internet. The Library's support services contractor, Maxima Corporation, and their subcontractor, SANAD Support Technologies have recently developed a World Wide Web Home Page (http://www-library.gsfc.nasa.gov) to provide the primary means of access. The first searchable database to be made available through the HomePage to Goddard employees is Current Contents, from the Institute for Scientific Information (ISI). The initial implementation includes coverage of articles from the last few months of 1992 to present. These records are augmented with abstracts and references, and often are more robust than equivalent records in bibliographic databases that currently serve the astronomical community. Maxima/SANAD selected Wais Incorporated's WAIS product with which to build the interface to Current Contents. This system allows access from Macintosh, IBM PC, and Unix hosts, which is an important feature for Goddard's multiplatform environment. The forms interface is structured to allow both fielded (author, article title, journal name, id number, keyword, subject term, and citation) and unfielded WAIS searches. The system allows a user to: Retrieve individual journal article records. Retrieve Table of Contents of specific issues of journals. Connect to articles with similar subject terms or keywords. Connect to other issues of the same journal in the same year. Browse journal issues from an alphabetical list of indexed journal names.

  5. Application of hierarchical genetic models to Raven and WAIS subtests: a Dutch twin study

    NARCIS (Netherlands)

    Rijsdijk, F.V.; Vernon, P.A.; Boomsma, D.I.

    2002-01-01

    Hierarchical models of intelligence are highly informative and widely accepted. Application of these models to twin data, however, is sparse. This paper addresses the question of how a genetic hierarchical model fits the Wechsler Adult Intelligence Scale (WAIS) subtests and the Raven Standard

  6. Protocol and Topology Issues for Wide-Area Satellite Interconnection of Terrestrial Optical LANs

    Science.gov (United States)

    Parraga, N.

    2002-01-01

    Apart from broadcasting, the satellite business is targeting niche markets. Wide area interconnection is considered as one of these niche markets, since it addresses operators and business LANs (B2B, business to business) in remote areas where terrestrial infrastructure is not available. These LANs - if high-speed - are typically based on optical networks such as SONET. One of the advantages of SONET is its architecture flexibility and capacity to transport all kind of applications including multimedia with a range of different transmission rates. The applications can be carried by different protocols among which the Internet Protocol (IP) or the Asynchronous Transfer Mode (ATM) are the most prominent ones. Thus, the question arises how these protocols can be interconnected via the satellite segment. The paper addresses several solutions for interworking with different protocols. For this investigation we distinguish first of all between the topology and the switching technology of the satellites. In case of a star network with transparent satellite, the satellite protocol consists of physical layer and data layer which can be directly interconnected with layer 2 interworking function to their terrestrial counterparts in the SONET backbone. For regenerative satellites the situation is more complex: here we need to distinguish the types of transport protocols being used in the terrestrial and satellite segment. Whereas IP, ATM, MPEG dominate in the terrestrial networks, satellite systems usually do not follow these standards. Some might employ minor additions (for instance, satellite specific packet headers), some might be completely proprietary. In general, interworking must be done for the data plane on top of layer 2 (data link layer), whereas for the signaling plane the interworking is on top of layer 3. In the paper we will discuss the protocol stacks for ATM, IP, and MPEG with a regenerative satellite system. As an example we will use the EuroSkyWay satellite

  7. Orthogonal Higher Order Structure and Confirmatory Factor Analysis of the French Wechsler Adult Intelligence Scale (WAIS-III)

    Science.gov (United States)

    Golay, Philippe; Lecerf, Thierry

    2011-01-01

    According to the most widely accepted Cattell-Horn-Carroll (CHC) model of intelligence measurement, each subtest score of the Wechsler Intelligence Scale for Adults (3rd ed.; WAIS-III) should reflect both 1st- and 2nd-order factors (i.e., 4 or 5 broad abilities and 1 general factor). To disentangle the contribution of each factor, we applied a…

  8. Math anxiety differentially affects WAIS-IV arithmetic performance in undergraduates.

    Science.gov (United States)

    Buelow, Melissa T; Frakey, Laura L

    2013-06-01

    Previous research has shown that math anxiety can influence the math performance level; however, to date, it is unknown whether math anxiety influences performance on working memory tasks during neuropsychological evaluation. In the present study, 172 undergraduate students completed measures of math achievement (the Math Computation subtest from the Wide Range Achievement Test-IV), math anxiety (the Math Anxiety Rating Scale-Revised), general test anxiety (from the Adult Manifest Anxiety Scale-College version), and the three Working Memory Index tasks from the Wechsler Adult Intelligence Scale-IV Edition (WAIS-IV; Digit Span [DS], Arithmetic, Letter-Number Sequencing [LNS]). Results indicated that math anxiety predicted performance on Arithmetic, but not DS or LNS, above and beyond the effects of gender, general test anxiety, and math performance level. Our findings suggest that math anxiety can negatively influence WAIS-IV working memory subtest scores. Implications for clinical practice include the utilization of LNS in individuals expressing high math anxiety.

  9. From human monocytes to genome-wide binding sites--a protocol for small amounts of blood: monocyte isolation/ChIP-protocol/library amplification/genome wide computational data analysis.

    Directory of Open Access Journals (Sweden)

    Sebastian Weiterer

    Full Text Available Chromatin immunoprecipitation in combination with a genome-wide analysis via high-throughput sequencing is the state of the art method to gain genome-wide representation of histone modification or transcription factor binding profiles. However, chromatin immunoprecipitation analysis in the context of human experimental samples is limited, especially in the case of blood cells. The typically extremely low yields of precipitated DNA are usually not compatible with library amplification for next generation sequencing. We developed a highly reproducible protocol to present a guideline from the first step of isolating monocytes from a blood sample to analyse the distribution of histone modifications in a genome-wide manner.The protocol describes the whole work flow from isolating monocytes from human blood samples followed by a high-sensitivity and small-scale chromatin immunoprecipitation assay with guidance for generating libraries compatible with next generation sequencing from small amounts of immunoprecipitated DNA.

  10. PERFORMANCE EVALUATION OF INTEGRATED MACRO AND MICRO MOBILITY PROTOCOLS FOR WIDE AREA WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    R.Gunasundari

    2010-03-01

    Full Text Available The success of next generation wireless networks will rely much on advanced mechanisms for seamless mobility support among emerging heterogeneous technologies. Currently, Mobile IP is the most promising solution for mobility management in the Internet. Several IP micro mobility approaches have been proposed to enhance the performance of Mobile IP which supports quality of service, minimum packet loss, limited handoff delay and scalability and power conservation but they are not scalable for macro mobility. A practical solution would therefore require integration of Mobile IP and Micro mobility protocols where Mobile IP handles macro mobility and micro mobility protocols handles micro mobility. In this paper an integrated mobility management protocol for IP based wireless networks is proposed and analyzed. Simulation results presented in this paper are based on ns 2.

  11. Efficacy of a hospital-wide environmental cleaning protocol on hospital-acquired methicillin-resistant Staphylococcus aureus rates.

    Science.gov (United States)

    Watson, Paul Andrew; Watson, Luke Robert; Torress-Cook, Alfonso

    2016-07-01

    Environmental contamination has been associated with over half of methicillin-resistant Staphylococcus aureus (MRSA) outbreaks in hospitals. We explored if a hospital-wide environmental and patient cleaning protocol would lower hospital acquired MRSA rates and associated costs. This study evaluates the impact of implementing a hospital-wide environmental and patient cleaning protocol on the rate of MRSA infection and the potential cost benefit of the intervention. A retrospective, pre-post interventional study design was used. The intervention comprised a combination of enhanced environmental cleaning of high touch surfaces, daily washing of patients with benzalkonium chloride, and targeted isolation of patients with active infection. The rate of MRSA infection per 1000 patient days (PD) was compared with the rate after the intervention (Steiros Algorithm ® ) was implemented. A cost-benefit analysis based on the number of MRSA infections avoided was conducted. The MRSA rates decreased by 96% from 3.04 per 1000 PD to 0.11 per 1000 PD ( P reduction in MRSA infections, avoided an estimated $1,655,143 in healthcare costs. Implementation of this hospital-wide protocol appears to be associated with a reduction in the rate of MRSA infection and therefore a reduction in associated healthcare costs.

  12. A Comparison of the Interest Accuracy of Two Short Forms of the WAIS-R.

    Science.gov (United States)

    Cella, David F.; And Others

    1985-01-01

    Examined relative efficacy of two short forms of Wechsler Adult Intelligence Scale-Revised (WAIS-R) with respect to accurate subtest profile scatter (N=50). Subtest scores of both split-half Satz-Mogel short form and criterion referenced Modified WAIS-R (WAIS-RM) short form were found to differ significantly from full-length WAIS-R subtest scores.…

  13. External validity of the Indonesian Wechsler Adult Intelligence Scale - Fourth edition (WAIS-IV-ID)

    NARCIS (Netherlands)

    Suwartono, C.; Hidajat, L.L.; Halim, M.S.; Hendriks, M.P.H.; Kessels, R.P.C.

    2016-01-01

    The Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV-ID) has been adapted and proved to be valid for its internal structure for Indonesian population. The same structure found as in the American WAIS-IV (WAIS-IV-US; Suwartono, Hendriks, Hidajat, Halim, & Kessels, 2015). Despite its strong

  14. Application of hierarchical genetic models to Raven and WAIS subtests: a Dutch twin study.

    Science.gov (United States)

    Rijsdijk, Frühling V; Vernon, P A; Boomsma, Dorret I

    2002-05-01

    Hierarchical models of intelligence are highly informative and widely accepted. Application of these models to twin data, however, is sparse. This paper addresses the question of how a genetic hierarchical model fits the Wechsler Adult Intelligence Scale (WAIS) subtests and the Raven Standard Progressive test score, collected in 194 18-year-old Dutch twin pairs. We investigated whether first-order group factors possess genetic and environmental variance independent of the higher-order general factor and whether the hierarchical structure is significant for all sources of variance. A hierarchical model with the 3 Cohen group-factors (verbal comprehension, perceptual organisation and freedom-from-distractibility) and a higher-order g factor showed the best fit to the phenotypic data and to additive genetic influences (A), whereas the unique environmental source of variance (E) could be modeled by a single general factor and specifics. There was no evidence for common environmental influences. The covariation among the WAIS group factors and the covariation between the group factors and the Raven is predominantly influenced by a second-order genetic factor and strongly support the notion of a biological basis of g.

  15. Independent Examination of the Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV): What Does the WAIS-IV Measure?

    Science.gov (United States)

    Benson, Nicholas; Hulac, David M.; Kranzler, John H.

    2010-01-01

    Published empirical evidence for the Wechsler Adult Intelligence Scale--Fourth Edition (WAIS-IV) does not address some essential questions pertaining to the applied practice of intellectual assessment. In this study, the structure and cross-age invariance of the latest WAIS-IV revision were examined to (a) elucidate the nature of the constructs…

  16. Working alliance inventory applied to virtual and augmented reality (WAI-VAR): psychometrics and therapeutic outcomes.

    Science.gov (United States)

    Miragall, Marta; Baños, Rosa M; Cebolla, Ausiàs; Botella, Cristina

    2015-01-01

    This study examines the psychometric properties of the Working Alliance Inventory-Short (WAI-S) adaptation to Virtual Reality (VR) and Augmented Reality (AR) therapies (WAI-VAR). The relationship between the therapeutic alliance (TA) with VR and AR and clinically significant change (CSC) is also explored. Seventy-five patients took part in this study (74.7% women, M age = 34.41). Fear of flying and adjustment disorder patients received VR therapy, and cockroach phobia patients received AR therapy. Psychometric properties, CSC, one-way ANOVA, Spearman's Correlations and Multiple Regression were calculated. The WAI-VAR showed a unidimensional structure, high internal consistency and adequate convergent validity. "Not changed" patients scored lower on the WAI-VAR than "improved" and "recovered" patients. Correlation between the WAI-VAR and CSC was moderate. The best fitting model for predicting CSC was a linear combination of the TA with therapist (WAI-S) and the TA with VR and AR (WAI-VAR), due to the latter variable slightly increased the percentage of variability accounted for in CSC. The WAI-VAR is the first validated instrument to measure the TA with VR and AR in research and clinical practice. This study reveals the importance of the quality of the TA with technologies in achieving positive outcomes in the therapy.

  17. Test Review: Advanced Clinical Solutions for WAIS-IV and WMS-IV

    Science.gov (United States)

    Chu, Yiting; Lai, Mark H. C.; Xu, Yining; Zhou, Yuanyuan

    2012-01-01

    The authors review the "Advanced Clinical Solutions for WAIS-IV and WMS-IV". The "Advanced Clinical Solutions (ACS) for the Wechsler Adult Intelligence Scale-Fourth Edition" (WAIS-IV; Wechsler, 2008) and the "Wechsler Memory Scale-Fourth Edition" (WMS-IV; Wechsler, 2009) was published by Pearson in 2009. It is a…

  18. Similarity of WISC-R and WAIS-R Scores at Age 16.

    Science.gov (United States)

    Sandoval, Jonathan; And Others

    1988-01-01

    Examined similarity of scores of 30 learning disabled students (aged 16 and 17) on the Wechsler Intelligence Scale for Children-Revised (WISC-R) and the Wechsler Adult Intelligence Scale-Revised (WAIS-R). Results documented similarity between WISC-R and WAIS-R for 16 year-olds who were learning disabled and had average intellectual ability.…

  19. WAIS-III IQs, Horn's Theory, and Generational Changes from Young Adulthood to Old Age.

    Science.gov (United States)

    Kaufman, Alan S.

    2001-01-01

    Examined age changes in intellectual ability in the range from 16 to 89 years through 2 studies that involved IQs on the Wechsler Adult Intelligence Scale III (WAIS-III). Results are interpreted in the context of the fluid-crystallized intelligence theory of J. Horn. Studies used WAIS-III standardization data for 2,450 adults and longitudinal data…

  20. Structural Validity of the Dutch-Language Version of the WAIS-III in a Psychiatric Sample

    NARCIS (Netherlands)

    Heijden, P.T. van der; Bos, P. van den; Mol, B.A.W.; Kessels, R.P.C.

    2013-01-01

    The Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV; Wechsler, 2008) no longer provides the traditional Verbal IQ and Performance IQ deviation scores. In the current study, we investigated the structural validity of these scores in the scale's predecessor, the WAIS-Third Edition (WAIS-III;

  1. Are Cross-National Differences in IQ Profiles Stable? A Comparison of Finnish and U.S. WAIS Norms

    Science.gov (United States)

    Roivainen, Eka

    2013-01-01

    To study the concept of national IQ profile, we compared U.S. and Finnish WAIS, WAIS-R, and WAIS III nonverbal and working memory subtest norms. The U.S. standardization samples had consistently higher scores on the Coding and Digit span subtests, while the Finnish samples had higher scores on the Block design subtest. No stable cross-national…

  2. Psychometric properties of the Thai version of the work ability index (Thai WAI).

    Science.gov (United States)

    Kaewboonchoo, Orawan; Ratanasiripong, Paul

    2015-01-01

    The purpose of this research was to develop and test the psychometric properties of the Thai version of the Work Ability Index (WAI). Forward translation and back-translation of the WAI were performed by seven bilingual professionals to ensure that the Thai WAI was culturally relevant and conceptually accurate. To ensure generalizability of the Thai WAI, a sample of 2,744 Thai workers from 19 different enterprises in five regions of Thailand completed the Thai version of the WAI along with the General Health Questionnaire. The 19 enterprises were from the following industries: canned food, snack food, cooking oil, footwear, pharmaceutical, ceramics, toy, steel, petrochemical, and auto parts. The results from exploratory factor analysis supported a 3-factor model, accounting for 53.49% of the total variance. The results also provided evidence for adequate test-retest reliability and internal consistency of the Thai WAI. The internal consistency of the Thai WAI was found to be slightly low due to the newness of the concept of work ability, which is not a common term used in the Thai language; therefore, explanation of the meaning of work ability is needed to increase understanding of workers. By providing early recognition of workers' health risks as well as risks of early termination, the WAI can help Thai human resources managers respond better to the needs of workers and be proactive in their efforts to retain workers in their organizations. Occupational health professionals could also utilize the WAI to evaluate the work ability of Thai workers in order to help organizations recognize early signs of their workers' health risks and possible early terminations and respond appropriately.

  3. Ultra-trace Measurements in the WAIS Divide 06A Ice Core, Version 1

    Data.gov (United States)

    National Aeronautics and Space Administration — These data contain the results of gas chromatography mass spectrometry (GC-MS) analysis of 207 samples from the WAIS Divide 06A ice core. The trace gases found in...

  4. WAIS Performance in Unincarcerated Groups of MMPI-Defined Sociopaths and Normal Controls

    Science.gov (United States)

    Allain, Albert N.

    1974-01-01

    This investigation examines WAIS performance in groups of 32 sociopaths and 33 normal controls defined by Minnesota Multiphasic Personality Inventory criteria. Sociopaths and normal controls show no differences in overall level of intellectual functioning. (Author)

  5. Independent examination of the Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV): what does the WAIS-IV measure?

    Science.gov (United States)

    Benson, Nicholas; Hulac, David M; Kranzler, John H

    2010-03-01

    Published empirical evidence for the Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV) does not address some essential questions pertaining to the applied practice of intellectual assessment. In this study, the structure and cross-age invariance of the latest WAIS-IV revision were examined to (a) elucidate the nature of the constructs measured and (b) determine whether the same constructs are measured across ages. Results suggest that a Cattell-Horn-Carroll (CHC)-inspired structure provides a better description of test performance than the published scoring structure does. Broad CHC abilities measured by the WAIS-IV include crystallized ability (Gc), fluid reasoning (Gf), visual processing (Gv), short-term memory (Gsm), and processing speed (Gs), although some of these abilities are measured more comprehensively than are others. Additionally, the WAIS-IV provides a measure of quantitative reasoning (QR). Results also suggest a lack of cross-age invariance resulting from age-related differences in factor loadings. Formulas for calculating CHC indexes and suggestions for interpretation are provided. PsycINFO Database Record (c) 2010 APA, all rights reserved.

  6. Stanford-Binet & WAIS IQ Differences and Their Implications for Adults with Intellectual Disability (aka Mental Retardation)

    OpenAIRE

    Silverman, Wayne; Miezejeski, Charles; Ryan, Robert; Zigman, Warren; Krinsky-McHale, Sharon; Urv, Tiina

    2010-01-01

    Stanford-Binet and Wechsler Adult Intelligence Scale (WAIS) IQs were compared for a group of 74 adults with intellectual disability (ID). In every case, WAIS Full Scale IQ was higher than the Stanford-Binet Composite IQ, with a mean difference of 16.7 points. These differences did not appear to be due to the lower minimum possible score for the Stanford-Binet. Additional comparisons with other measures suggested that the WAIS might systematically underestimate severity of intellectual impairm...

  7. Effects of conversion of mangroves into gei wai ponds on sediment heavy metals accumulation in tidal flat estuary, South China

    Science.gov (United States)

    Li, R.; Qiu, G.; Chai, M.; Li, R.

    2017-12-01

    Gei wai ponds act as important component in mangrove ecosystem, but the conversion of mangroves into gei wai ponds and its ecological function on heavy metal accumulation is still not clear. The study quantified the sediment heavy metal concentration and speciation in gei wai pond, Avicennia marina marsh and mudflat in Futian mangrove wetlands, South China. The results showed that gei wai pond acidified the sediment and reduced its fertility due to reduced pH, electronic conductivity (EC) and total organic carbon (TOC) compared to A. marina marsh and mudflat. The concentrations of Cd, Cu, Zn and Pb at all depth in gei wai pond sediment were also lower than other sites, indicating reduced storage function on heavy metals. Multiple analysis implied that heavy metals in all sites could be attributed to anthropogenic sources, with Cr as natural and anthropogenic sources in gei wai pond. Gei wai pond sediment had lower heavy metal pollution based on multiple evaluation methods, including potential ecological risk coefficient (Eir), potential ecological risk index (RI), geo-accumulation index (Igeo), mean PEL quotients (m-PEL-q), pollution load index (PLI), mean ERM quotients (m-ERM-q) and total toxic unit (∑TU). Heavy metal speciation analysis indicated that gei wai pond improved the conversion from the immobilized Cd and Cr to the mobilized fraction. SEM-AVS analysis indicated no adverse toxicity occurred in all sites, and the role of TOC in relieving sediment heavy metal toxicity of gei wai pond is limited.

  8. Factors associated with work ability index (WAI) among intensive care units' (ICUs') nurses.

    Science.gov (United States)

    Rostamabadi, Akbar; Zamanian, Zahra; Sedaghat, Zahra

    2017-03-28

    Work ability is a crucial occupational health issue in health care settings where a high physical and psychosocial work capacity is required and a high risk of disabling injuries and illnesses is predictable. This study aims to examine the association between the work ability index (WAI) and individual characterizations, workload, fatigue, and diseases among intensive care units' (ICUs') nurses. The study sample included 214 nurses selected by a random sampling method from a target population consisting of 321 registered nurses working in eight ICUs. Multiple linear regression analysis was used to test the association between WAI scores and each of the independent variables. Results of multivariate analysis revealed a strong and negative association between WAI scores and diseases (B=-5.82, 95% CI=-7.16, -4.48, Pindex (BMI) was significantly and inversely associated with WAI scores. A significant and negative association was also found between WAI scores and dimensions of MFI-20, such as general fatigue (B=-0.31, 95% CI=-0.53, -0.09, P=0.005) and physical fatigue (B=-0.44, 95% CI=-0.65, -0.23, Pwork environment characterized by a well-structured preventive attitude toward controlling diseases, and a well-designed organizational framework toward increasing the level of performance and motivation, reducing the level of fatigue, as well as reducing the workload, is necessary to promote work ability among ICUs' nurses.

  9. The psychometric properties of an Iranian translation of the Work Ability Index (WAI) questionnaire.

    Science.gov (United States)

    Abdolalizadeh, M; Arastoo, A A; Ghsemzadeh, R; Montazeri, A; Ahmadi, K; Azizi, A

    2012-09-01

    This study was carried out to evaluate the psychometric properties of an Iranian translation of the Work Ability Index (WAI) questionnaire. In this methodological study, nurses and healthcare workers aged 40 years and older who worked in educational hospitals in Ahvaz (236 workers) in 2010, completed the questionnaire and 60 of the workers filled out the WAI questionnaire for the second time to ensure test-retest reliability. Forward-backward method was applied to translate the questionnaire from English into Persian. The psychometric properties of the Iranian translation of the WAI were assessed using the fallowing tests: Internal consistency (to test reliability), test-retest analysis, exploratory factor analysis (construct validity), discriminate validity by comparing the mean WAI score in two groups of the employees that had different levels of sick leave, criterion validity by determining the correlation between the Persian version of short form health survey (SF-36) and WAI score. Cronbach's alpha coefficient was estimated to be 0.79 and it was concluded that the internal consistency was high enough. The intraclass correlation coefficient was recognized to be 0.92. Factor analysis indicated three factors in the structure of the work ability including self-perceived work ability (24.5% of the variance), mental resources (22.23% of the variance), and presence of disease and health related limitation (18.55% of the variance). Statistical tests showed that this questionnaire was capable of discriminating two groups of employees who had different levels of sick leave. Criterion validity analysis showed that this instrument and all dimensions of the Iranian version of SF-36 were correlated significantly. Item correlation corrective for overlap showed the items tests had a good correlation except for one. The finding of the study showed that the Iranian version of the WAI is a reliable and valid measure of work ability and can be used both in research and practical

  10. Long term survival with whole abdominopelvic irradiation (WAI) in platinum-refractory ovarian cancer

    International Nuclear Information System (INIS)

    Cmelak, Anthony J.; Cox, Richard S.; Kapp, Daniel S.

    1996-01-01

    Purpose: To evaluate the efficacy and toxicity of WAI in persistent or recurrent epithelial ovarian carcinoma after initial chemotherapy. Methods and Materials: Between 1970 and 1995, 41 women with persistent or recurrent ovarian carcinoma after initial surgical debulking and chemotherapy were treated with WAI. Median age was 57 years (range 27-75). Initial FIGO stages were I and II - 5 patients (12%), III - 26 (64%), and IV - 10 (24%). Tumor grade was 1 - 4 (10%), II - 16 (39%), and III - 20 (49%). Four to eighteen (median eight) cycles of chemotherapy had been given prior to WAI. Thirty-one patients had received platinum-based regimens, and 22 of these had failed within six months after completion of chemotherapy (platinum-refractory). Prior to WAI, 11 (27%) patients had microscopic residual disease, 21 (51%) had gross residual disease up to 1.5 cm, and 9 (22%) had tumors greater than 1.5 cm in maximal diameter. Median doses of 28 Gy to the abdomen and 48 Gy to the pelvis were delivered using an open-field technique with appropriate liver and kidney shielding. Results: With follow-up of 1 month to 16.5 years, the 5-year actuarial disease specific survival was 47% in all 41 patients, and 49% in 22 platinum-refractory patients. Both disease bulk at WAI (p -4 ) and initial stage (p=0.005) were of prognostic value. Five-year disease specific survivals were stage I and II - 100%, stage III - 55%, and stage IV - 27%. Five-year disease specific survival of all nonbulky (less than 1.5 cm) patients was 40%; 0% for patients with disease greater than 1.5 cm. Five-year disease specific survival for grade I - 66%, II - 59%, and III - 33%. Stage I, II, or III patients with residual disease bulk of 1.5 cm or less before WAI had a 10-year actuarial disease specific survival of 50%. Twelve patients (29%) failed to complete the planned course of WAI due to acute toxicity (most often due to prolonged thrombocytopenia). Late bowel toxicity included obstruction in one patient and

  11. Structural validity of the Dutch-language version of the WAIS-III in a psychiatric sample

    NARCIS (Netherlands)

    Heijden, P. van der; Bos, P. van den; Mol, B.; Kessels, R.P.C.

    2013-01-01

    The Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV; Wechsler, 2008 ) no longer provides the "traditional" Verbal IQ and Performance IQ deviation scores. In the current study, we investigated the structural validity of these scores in the scale's predecessor, the WAIS-Third Edition

  12. Comparison of the WAIS-III and WISC-IV in 16-Year-Old Special Education Students

    Science.gov (United States)

    Gordon, Shirley; Duff, Simon; Davidson, Terry; Whitaker, Simon

    2010-01-01

    Background: Previous research with earlier versions of the WISC and WAIS has demonstrated that when administered to people who have intellectual disabilities, the WAIS produced higher IQ scores than the WISC. The aim of this study was to examine whether these differences still exist. A comparison of the Wechsler Adult Intelligence Scale-Third…

  13. Stanford-Binet and WAIS IQ Differences and Their Implications for Adults with Intellectual Disability (aka Mental Retardation)

    Science.gov (United States)

    Silverman, Wayne; Miezejeski, Charles; Ryan, Robert; Zigman, Warren; Krinsky-McHale, Sharon; Urv, Tiina

    2010-01-01

    Stanford-Binet and Wechsler Adult Intelligence Scale (WAIS) IQs were compared for a group of 74 adults with intellectual disability (ID). In every case, WAIS Full Scale IQ was higher than the Stanford-Binet Composite IQ, with a mean difference of 16.7 points. These differences did not appear to be due to the lower minimum possible score for the…

  14. Factor Analysis of the Spanish Version of the WAIS: The Escala de Inteligencia Wechsler para Adultos (EIWA).

    Science.gov (United States)

    Gomez, Francisco C., Jr.; And Others

    1992-01-01

    The standardization of the Escala de Inteligencia Wechsler para Adultos (EIWA) and the original Wechsler Adult Intelligence Scale (WAIS) were subjected to principal components analysis to examine their comparability for 616 EIWA subjects and 800 WAIS subjects. Similarity of factor structures of both scales is supported. (SLD)

  15. Effects of conversion of mangroves into gei wai ponds on accumulation, speciation and risk of heavy metals in intertidal sediments.

    Science.gov (United States)

    Li, Rongyu; Qiu, Guo Yu; Chai, Minwei; Shen, Xiaoxue; Zan, Qijie

    2018-06-23

    Mangroves are often converted into gei wai ponds for aquaculture, but how such conversion affects the accumulation and behavior of heavy metals in sediments is not clear. The present study aims to quantify the concentration and speciation of heavy metals in sediments in different habitats, including gei wai pond, mangrove marsh dominated by Avicennia marina and bare mudflat, in a mangrove nature reserve in South China. The results showed that gei wai pond acidified the sediment and reduced its electronic conductivity and total organic carbon (TOC) when compared to A. marina marsh and mudflat. The concentrations of Cd, Cu, Zn and Pb at all sediment depths in gei wai pond were lower than the other habitats, indicating gei wai pond reduced the fertility and the ability to retain heavy metals in sediment. Gei wai pond sediment also had a lower heavy metal pollution problem according to multiple evaluation methods, including potential ecological risk coefficient, potential ecological risk index, geo-accumulation index, mean PEL quotients, pollution load index, mean ERM quotients and total toxic unit. Heavy metal speciation analysis showed that gei wai pond increased the transfer of the immobilized fraction of Cd and Cr to the mobilized one. According to the acid-volatile sulfide (AVS) and simultaneously extracted metals (SEM) analysis, the conversion of mangroves into gei wai pond reduced values of ([SEM] - [AVS])/f oc , and the role of TOC in alleviating heavy metal toxicity in sediment. This study demonstrated the conversion of mangrove marsh into gei wai pond not only reduced the ecological purification capacity on heavy metal contamination, but also enhanced the transfer of heavy metals from gei wai pond sediment to nearby habitats.

  16. Comparison of Scores on the WAIS and Its Puerto Rican Counterpart, Escala de Inteligencia Wechsler para Adultos, in an Institutionalized Latin American Psychiatric Population.

    Science.gov (United States)

    Davis, Todd McLin; Rodriguez, Vene L.

    1979-01-01

    Compared vocabulary and block design subtests of the Wechsler Adult Intelligence Scale (WAIS) and its Puerto Rican counterpart, the Escala de Inteligencia Wechsler para Adultos (EIWA), in hospitalized Latins and Trans-Caribbean Blacks. EIWA scores were significantly higher than WAIS scores. Equivalence of EIWA and WAIS estimates is questioned.…

  17. Relationship of Education and IQ in the WAIS-R Standardization Sample.

    Science.gov (United States)

    Matarazzo, Joseph D.; Herman, David O.

    1984-01-01

    Analyzed the total number of years of schooling completed against the Verbal IQ (VIQ), Performance IQ (PIQ), and Full Scale IQ (FSIQ) of the 1,880 individuals who were used to standardize the Wechsler Adult Intelligence Scale-Revised (WAIS-R). Analysis revealed a progressive increase in mean FSIQ with increasing education. (JAC)

  18. WAIS Digit Span-Based Indicators of Malingered Neurocognitive Dysfunction: Classification Accuracy in Traumatic Brain Injury

    Science.gov (United States)

    Heinly, Matthew T.; Greve, Kevin W.; Bianchini, Kevin J.; Love, Jeffrey M.; Brennan, Adrianne

    2005-01-01

    The present study determined specificity and sensitivity to malingered neurocognitive dysfunction (MND) in traumatic brain injury (TBI) for several Wechsler Adult Intelligence Scale (WAIS) Digit Span scores. TBI patients (n = 344) were categorized into one of five groups: no incentive, incentive only, suspect, probable MND, and definite MND.…

  19. Comparison of WAIS-III Short Forms for Measuring Index and Full-Scale Scores

    Science.gov (United States)

    Girard, Todd A.; Axelrod, Bradley N.; Wilkins, Leanne K.

    2010-01-01

    This investigation assessed the ability of the Wechsler Adult Intelligence Scale-Third Edition (WAIS-III) short forms to estimate both index and IQ scores in a large, mixed clinical sample (N = 809). More specifically, a commonly used modification of Ward's seven-subtest short form (SF7-A), a recently proposed index-based SF7-C and eight-subtest…

  20. Accuracy of WISC-III and WAIS-IV short forms in patients with neurological disorders

    NARCIS (Netherlands)

    van Ool, Jans S.; Hurks, Petra P.M.; Snoeijen-Schouwenaars, Francesca M.; Tan, In Y.; Schelhaas, Helenius J.; Klinkenberg, Sylvia; Aldenkamp, Albert P.; Hendriksen, Jos G.M.

    2018-01-01

    The assessment of intellectual abilities is intensive, time-consuming, and might be considered burdensome for patients. We examined psychometric qualities of short forms (SFs) of the Wechsler Intelligence Scales for Children (WISC-third edition) and for adults (WAIS-fourth edition), in children (n =

  1. WISC-III e WAIS-III na avaliação da inteligência de cegos WISC-III/WAIS-III en ciegos WISC-III and WAIS-III in intellectual assessment of blind people

    Directory of Open Access Journals (Sweden)

    Elizabeth do Nascimento

    2007-12-01

    Full Text Available Diante da escassez de pesquisas nacionais e de testes psicológicos destinados a avaliar pessoas cegas, desenvolveu-se um estudo psicométrico com as escalas verbais dos testes WISC-III e WAIS-III. Após as adaptações de alguns estímulos e das instruções, os testes foram aplicados em crianças (N = 120 e adultos (N = 52 residentes em Belo Horizonte. Os resultados indicaram que as escalas verbais modificadas apresentam uma boa consistência interna (alfa> 0,80. Além disso, a investigação da validade fatorial identifica a presença clara de apenas um componente. Este componente explica 81% e 64% para o WISC-III e WAIS-III, respectivamente. Conclui-se que as adaptações a que se procedeu não afetaram a estrutura fatorial das escalas. Deste modo, os profissionais poderão utilizar as escalas modificadas para avaliar a inteligência de pessoas cegas.Frente a la escasez de investigaciones nacionales asi como la ausencia de tests psicológicos que evaluen personas ciegas, se ha desarrollado un estudio psicometrico com la escalas verbales del WISC-III y WAIS-III. Posteriormente a las adaptaciones de algunos estímulos y de las instrucciones, las escalas fueron aplicadas a una muestra de niños (n=120 y de adultos (n=52 residentes en la ciudad de Belo Horizonte-Brasil. Los resultados indican que las escalas verbales modificadas presentan una alta fiabilidad (alpha >0,80 asi como la presencia clara de un unico componente responsable por 81% y 64% de la variancia del WIC-III e WAIS-III respectivamente. Se ha concluido que las modificaciones efectuadas no han comprometido la estructura factorial de las escalas verbales. Por tanto, los profesionales psicólogos pueden utilizar las escalas modificadas para la evaluación de la inteligencia de personas portadoras de ceguera.Owing to the almost lack of a national research on psychological testing for the evaluation of blind people, a psychometric study has been developed with the WISC-III and WAIS

  2. WISC-III e WAIS-III na avaliação da inteligência de cegos WISC-III/WAIS-III en ciegos WISC-III and WAIS-III in intellectual assessment of blind people

    OpenAIRE

    Elizabeth do Nascimento; Carmen Elvira Flores-Mendoza

    2007-01-01

    Diante da escassez de pesquisas nacionais e de testes psicológicos destinados a avaliar pessoas cegas, desenvolveu-se um estudo psicométrico com as escalas verbais dos testes WISC-III e WAIS-III. Após as adaptações de alguns estímulos e das instruções, os testes foram aplicados em crianças (N = 120) e adultos (N = 52) residentes em Belo Horizonte. Os resultados indicaram que as escalas verbais modificadas apresentam uma boa consistência interna (alfa> 0,80). Além disso, a investigação da vali...

  3. Major Ion Concentrations in WDC05Q and WDC06A Ice Cores (WAIS Divide), Version 1

    Data.gov (United States)

    National Aeronautics and Space Administration — This data set contains major ion concentrations from the chemical analysis of two WAIS Divide ice cores (WDC05Q, 0-114 m; WDC06A, 0-129 m). The analytical technique...

  4. Work ability index (WAI) and its association with psychosocial factors in one of the petrochemical industries in Iran.

    Science.gov (United States)

    Mazloumi, Adel; Rostamabadi, Akbar; Nasl Saraji, Gabraeil; Rahimi Foroushani, Abbas

    2012-01-01

    In recent decades, work ability index (WAI) has been a common practical tool to measure individuals' work ability in many European, Asian and South American countries. However, there is no study concerning work ability in Iran. The aim of this study was to determine the work ability index in an Iranian petrochemical job setting and to examine its relationship with psychosocial factors. A cross-sectional study was conducted among 420 male workers in various occupations. Work ability was evaluated using the WAI questionnaire developed by FIOH; the Job content questionnaire (JCQ) was used to assess psychosocial factors. The mean WAI score was 39.1 (SD=5.7) among workers in the studied petrochemical industry. Multiple linear regression analysis revealed a significant association between mean WAI score and age, job tenure, educational level, rest and sleep status and vocational education. Moreover, the results showed that skill discretion, coworker support and supervisor support were positively associated with the mean WAI score. On the other hand, it was inversely associated with job demands, job strain and job insecurity. This study was the first research to determine WAI in an important industry in Iran. Overall, work ability was in the "Good" category among the workers in the studied field. On the basis of the WAI guidelines, this level should be maintained and promoted to excellent level by providing supportive countermeasures. The WAI score was significantly associated with psychosocial factors. The results showed that even in heavy physical work, factors such as job insecurity, skill discretion, job strain and social support play an important role in maintaining work ability. A positive combination of "psychosocial characteristics" of the job with "individual resources" can promote work ability in such occupations.

  5. Work Ability Index (WAI) and its health-related determinants among Iranian farmers working in small farm enterprises.

    Science.gov (United States)

    Rostamabadi, Akbar; Mazloumi, Adel; Rahimi Foroushani, Abbas

    2014-01-01

    This study aimed to determine the Work Ability Index (WAI) and examine the influence of health dimensions and demographic variables on the work ability of Iranian farmers working in small farm enterprises. A cross-sectional study was conducted among 294 male farmers. The WAI and SF-36 questionnaires were used to determine work ability and health status. The effect of demographics variables on the work ability index was investigated with the independent samples t-test and one-way ANOVA. Also, multiple linear regression analysis was used to test the association between the mean WAI score and the SF-36 scales. The mean WAI score was 35.1 (SD=10.6). One-way ANOVA revealed a significant relationship between the mean WAI and age. Multiple linear regression analysis showed that work ability was more influenced by physical scales of the health dimensions, such as physical function, role-physical, and general health, whereas a lower association was found for mental scales such as mental health. The average WAI was at a moderate work ability level for the sample population of farmers in this study. Based on the WAI guidelines, improvement of work ability and identification of factors affecting it should be considered a priority in interventional programs. Given the influence of health dimensions on WAI, any intervention program for preservation and promotion of work ability among the studied farmers should be based on balancing and optimizing the physical and psychosocial work environments, with a special focus on reducing physical work load.(J Occup Health 2014; 56: 478-484).

  6. Confirmatory Factor Analysis of WAIS-IV in a Clinical Sample: Examining a Bi-Factor Model

    Directory of Open Access Journals (Sweden)

    Rachel Collinson

    2016-12-01

    Full Text Available There have been a number of studies that have examined the factor structure of the Wechsler Adult Intelligence Scale IV (WAIS-IV using the standardization sample. In this study, we investigate its factor structure on a clinical neuropsychology sample of mixed aetiology. Correlated factor, higher-order and bi-factor models are all tested. Overall, the results suggest that the WAIS-IV will be suitable for use with this population.

  7. Implementation of a mandatory checklist of protocols and objectives improves compliance with a wide range of evidence-based intensive care unit practices.

    Science.gov (United States)

    Byrnes, Matthew C; Schuerer, Douglas J E; Schallom, Marilyn E; Sona, Carrie S; Mazuski, John E; Taylor, Beth E; McKenzie, Wendi; Thomas, James M; Emerson, Jeffrey S; Nemeth, Jennifer L; Bailey, Ruth A; Boyle, Walter A; Buchman, Timothy G; Coopersmith, Craig M

    2009-10-01

    To determine a) if a checklist covering a diverse group of intensive care unit protocols and objectives would improve clinician consideration of these domains and b) if improved consideration would change practice patterns. Pre- and post observational study. A 24-bed surgical/burn/trauma intensive care unit in a teaching hospital. A total of 1399 patients admitted between June 2006 and May 2007. The first component of the study evaluated whether mandating verbal review of a checklist covering 14 intensive care unit best practices altered verbal consideration of these domains. Evaluation was performed using real-time bedside audits on morning rounds. The second component evaluated whether the checklist altered implementation of these domains by changing practice patterns. Evaluation was performed by analyzing data from the Project IMPACT database after patients left the intensive care unit. Verbal consideration of evaluable domains improved from 90.9% (530/583) to 99.7% (669/671, p < .0001) after verbal review of the checklist was mandated. Bedside consideration improved on the use of deep venous thrombosis prophylaxis (p < .05), stress ulcer prophylaxis (p < .01), oral care for ventilated patients (p < 0.01), electrolyte repletion (p < .01), initiation of physical therapy (p < .05), and documentation of restraint orders (p < .0001). Mandatory verbal review of the checklist resulted in a greater than two-fold increase in transferring patients out of the intensive care unit on telemetry (16% vs. 35%, p < .0001) and initiation of physical therapy (28% vs. 42%, p < .0001) compared with baseline practice. A mandatory verbal review of a checklist covering a wide range of objectives and goals at each patient's bedside is an effective method to improve both consideration and implementation of intensive care unit best practices. A bedside checklist is a simple, cost-effective method to prevent errors of omission in basic domains of intensive care unit management that might

  8. Enhancing system-wide implementation of opioid prescribing guidelines in primary care: protocol for a stepped-wedge quality improvement project.

    Science.gov (United States)

    Zgierska, Aleksandra E; Vidaver, Regina M; Smith, Paul; Ales, Mary W; Nisbet, Kate; Boss, Deanne; Tuan, Wen-Jan; Hahn, David L

    2018-06-05

    Systematic implementation of guidelines for opioid therapy management in chronic non-cancer pain can reduce opioid-related harms. However, implementation of guideline-recommended practices in routine care is subpar. The goal of this quality improvement (QI) project is to assess whether a clinic-tailored QI intervention improves the implementation of a health system-wide, guideline-driven policy on opioid prescribing in primary care. This manuscript describes the protocol for this QI project. A health system with 28 primary care clinics caring for approximately 294,000 primary care patients developed and implemented a guideline-driven policy on long-term opioid therapy in adults with opioid-treated chronic non-cancer pain (estimated N = 3980). The policy provided multiple recommendations, including the universal use of treatment agreements, urine drug testing, depression and opioid misuse risk screening, and standardized documentation of the chronic pain diagnosis and treatment plan. The project team drew upon existing guidelines, feedback from end-users, experts and health system leadership to develop a robust QI intervention, targeting clinic-level implementation of policy-directed practices. The resulting multi-pronged QI intervention included clinic-wide and individual clinician-level educational interventions. The QI intervention will augment the health system's "routine rollout" method, consisting of a single educational presentation to clinicians in group settings and a separate presentation for staff. A stepped-wedge design will enable 9 primary care clinics to receive the intervention and assessment of within-clinic and between-clinic changes in adherence to the policy items measured by clinic-level electronic health record-based measures and process measures of the experience with the intervention. Developing methods for a health system-tailored QI intervention required a multi-step process to incorporate end-user feedback and account for the needs of

  9. Transcranial Direct Current Stimulation of Frontal Cortex Decreases Performance on the WAIS-IV Intelligence Test

    Science.gov (United States)

    Sellers, Kristin K.; Mellin, Juliann M.; Lustenberger, Caroline M.; Boyle, Michael R.; Lee, Won Hee; Peterchev, Angel V.; Frohlich, Flavio

    2015-01-01

    Transcranial direct current stimulation (tDCS) modulates excitability of motor cortex. However, there is conflicting evidence about the efficacy of this non-invasive brain stimulation modality to modulate performance on cognitive tasks. Previous work has tested the effect of tDCS on specific facets of cognition and executive processing. However, no randomized, double-blind, sham-controlled study has looked at the effects of tDCS on a comprehensive battery of cognitive processes. The objective of this study was to test if tDCS had an effect on performance on a comprehensive assay of cognitive processes, a standardized intelligence quotient (IQ) test. The study consisted of two substudies and followed a double-blind, between-subjects, sham-controlled design. In total, 41 healthy adult participants completed the Wechsler Adult Intelligence Scale, Fourth Edition (WAIS-IV) as a baseline measure. At least one week later, participants in substudy 1 received either bilateral tDCS (anodes over both F4 and F3, cathode over Cz, 2mA at each anode for 20 minutes) or active sham tDCS (2mA for 40 seconds), and participants in substudy 2 received either right or left tDCS (anode over either F4 or F3, cathode over Cz, 2mA for 20 minutes). In both studies, the WAIS-IV was immediately administered following stimulation to assess for performance differences induced by bilateral and unilateral tDCS. Compared to sham stimulation, right, left, and bilateral tDCS reduced improvement between sessions on Full Scale IQ and the Perceptual Reasoning Index. This demonstration that frontal tDCS selectively degraded improvement on specific metrics of the WAIS-IV raises important questions about the often proposed role of tDCS in cognitive enhancement. PMID:25934490

  10. El universo plástico y sensorial de la mano (Wong Kar Wai, 2004

    Directory of Open Access Journals (Sweden)

    Ana MELENDO CRUZ

    2014-10-01

    Full Text Available In this article, we show how Wong Kar Wai, heir to a filmography closely linked to cinematographic modernity, explores themes such as loneliness, melancholy, or self-absorption in his short film The Hand (2004. These themes, together with his study of geometry, saturated colours and pictorial qualities through the prism of metaphysical realism, give rise to purely optical, sonorous and tactile situations. In this way, the Chinese film director reveals, through the presence of a body fragment and metonymy, the colourful and sonorous textures that form the sensory-motor spaces of the underworld in which the story is set

  11. Stanford-Binet & WAIS IQ Differences and Their Implications for Adults with Intellectual Disability (aka Mental Retardation).

    Science.gov (United States)

    Silverman, Wayne; Miezejeski, Charles; Ryan, Robert; Zigman, Warren; Krinsky-McHale, Sharon; Urv, Tiina

    2010-03-01

    Stanford-Binet and Wechsler Adult Intelligence Scale (WAIS) IQs were compared for a group of 74 adults with intellectual disability (ID). In every case, WAIS Full Scale IQ was higher than the Stanford-Binet Composite IQ, with a mean difference of 16.7 points. These differences did not appear to be due to the lower minimum possible score for the Stanford-Binet. Additional comparisons with other measures suggested that the WAIS might systematically underestimate severity of intellectual impairment. Implications of these findings are discussed regarding determination of disability status, estimating prevalence of ID, assessing dementia and aging-related cognitive declines, and diagnosis of ID in forensic cases involving a possible death penalty.

  12. WAIS-III index score profiles in the Canadian standardization sample.

    Science.gov (United States)

    Lange, Rael T

    2007-01-01

    Representative index score profiles were examined in the Canadian standardization sample of the Wechsler Adult Intelligence Scale-Third Edition (WAIS-III). The identification of profile patterns was based on the methodology proposed by Lange, Iverson, Senior, and Chelune (2002) that aims to maximize the influence of profile shape and minimize the influence of profile magnitude on the cluster solution. A two-step cluster analysis procedure was used (i.e., hierarchical and k-means analyses). Cluster analysis of the four index scores (i.e., Verbal Comprehension [VCI], Perceptual Organization [POI], Working Memory [WMI], Processing Speed [PSI]) identified six profiles in this sample. Profiles were differentiated by pattern of performance and were primarily characterized as (a) high VCI/POI, low WMI/PSI, (b) low VCI/POI, high WMI/PSI, (c) high PSI, (d) low PSI, (e) high VCI/WMI, low POI/PSI, and (f) low VCI, high POI. These profiles are potentially useful for determining whether a patient's WAIS-III performance is unusual in a normal population.

  13. El universo plástico y sensorial de La mano (Wong Kar Wai, 2004

    Directory of Open Access Journals (Sweden)

    Melendo, Ana

    2012-04-01

    Full Text Available En español: Con el presente artículo, queremos mostrar cómo Wong Kar Wai, heredero de un cine muy vinculado a la modernidad cinematográfica, plantea en el cortometraje La mano (2004 temas como la soledad, la actitud melancólica o la necesidad de ensimismamiento. Estos, junto al estudio de la geometría, los colores saturados y las calidades pictóricas, y bajo el prisma de un realismo metafísico, dan lugar a situaciones ópticas, sonoras y táctiles puras. Es así como en el film del cineasta chino se ponen de manifiesto, a través de la presencia del fragmento corporal y la metonimia, las texturas, coloreadas y sonoras, que configuran los espacios sensoriomotrices del submundo en el que acontece la historia. In english: In this article, we show how Wong Kar Wai, heir to a filmography closely linked to cinematographic modernity, explores themes such as loneliness, melancholy, or self-absorption in his short film The Hand (2004. These themes, together with his study of geometry, saturated colours and pictorial qualities through the prism of metaphysical realism, give rise to purely optical, sonorous and tactile situations. In this way, the Chinese film director reveals, through the presence of a body fragment and metonymy, the colourful and sonorous textures that form the sensory-motor spaces of the underworld in which the story is set.

  14. Evaluating WAIS-IV structure through a different psychometric lens: Structural causal model discovery as an alternative to confirmatory factor analysis

    NARCIS (Netherlands)

    Dijk, M.J.A.M. van; Claassen, T.; Suwartono, C.; Veld, W.M. van der; Heijden, P.T. van der; Hendriks, M.P.H.

    2017-01-01

    Objective: Since the publication of the WAIS-IV in the U.S. in 2008, efforts have been made to explore the structural validity by applying factor analysis to various samples. This study aims to achieve a more fine-grained understanding of the structure of the Dutch language version of the WAIS-IV

  15. 'Ike Wai Professional Development Model for Students and Post-docs

    Science.gov (United States)

    Bruno, B. C.

    2016-12-01

    'Ike Wai: Securing Hawaii's Water Future, funded by NSF EPSCoR, is an interdisciplinary research collaboration among geophysicists, geochemists, engineers, microbiologists, computational modelers, data scientists and social scientists. Key questions include: How much water is there? How does it flow? How long will it last? Undergraduate students, graduate students and post-docs are actively involved in the research, and their professional development is a key part of the project. An underlying principle is that students assume responsibility for their own learning and professional development. Based on the model created by the NSF Center for Microbial Oceanography: Research and Education (C-MORE) (Bruno et al, 2008; Guannel et al 2014, Bottjer et al 2014), the 'Ike Wai professional development program includes (1) Leadership. Each student and post-doc creates an Individualized Professional Development plan, which includes leadership training (provided by external facilitators) and assuming leadership roles (such as developing and implementing trainings for their peers). (2) EDventures. Based on the C-MORE model, EDventures combines proposal-writing training with the incentive of seed money. Rather than providing training a priori, the EDventures model encourages students and post-docs to write a proposal based on guidelines provided. Training occurs during a two-stage review stage: proposers respond to panel reviews and resubmit their proposal within a single review cycle. C-MORE EDventures alumni self-report statistically significant confidence gains on all questions posed. Their subsequent proposal success is envious: of the 12 proposals submitted by to NSF, 50% were funded. (Wood Charlson & Bruno, 2015) (3) Layered Mentoring Network. All ´Ike Wai participants serve as both mentor and mentee. Students are matched with a non-research mentor in addition to their advisor to promote a holistic approach to career development. They will also serve as mentors to more

  16. Graduate Student WAIS-III Scoring Accuracy Is a Function of Full Scale IQ and Complexity of Examiner Tasks

    Science.gov (United States)

    Hopwood, Christopher J.; Richard, David C. S.

    2005-01-01

    Research on the Wechsler Adult Intelligence Scale-Revised and Wechsler Adult Intelligence Scale-Third Edition (WAIS-III) suggests that practicing clinical psychologists and graduate students make item-level scoring errors that affect IQ, index, and subtest scores. Studies have been limited in that Full-Scale IQ (FSIQ) and examiner administration,…

  17. Malingering in Toxic Exposure. Classification Accuracy of Reliable Digit Span and WAIS-III Digit Span Scaled Scores

    Science.gov (United States)

    Greve, Kevin W.; Springer, Steven; Bianchini, Kevin J.; Black, F. William; Heinly, Matthew T.; Love, Jeffrey M.; Swift, Douglas A.; Ciota, Megan A.

    2007-01-01

    This study examined the sensitivity and false-positive error rate of reliable digit span (RDS) and the WAIS-III Digit Span (DS) scaled score in persons alleging toxic exposure and determined whether error rates differed from published rates in traumatic brain injury (TBI) and chronic pain (CP). Data were obtained from the files of 123 persons…

  18. Psychometric qualities of a tetrad WAIS-III short form for use in individuals with mild to borderline intellectual disability

    NARCIS (Netherlands)

    Duijvenbode, N. van; Didden, H.C.M.; Hazel, T. van den; Engels, R.C.M.E.

    2016-01-01

    Objective: To investigate the reliability and validity of a Wechsler Abbreviated Scale of Intelligence-based Wechsler Adult Intelligence Scale - third edition (WAIS-III) short form (SF) in a sample of individuals with mild to borderline intellectual disability (MBID) (N=117; M-IQ=71.34; SDIQ=8.00,

  19. Visuospatial characteristics of an elderly Chinese population: results from the WAIS-R block design test.

    Science.gov (United States)

    Yin, Shufei; Zhu, Xinyi; Huang, Xin; Li, Juan

    2015-01-01

    Visuospatial deficits have long been recognized as a potential predictor of dementia, with visuospatial ability decline having been found to accelerate in later stages of dementia. We, therefore, believe that the visuospatial performance of patients with mild cognitive impairment (MCI) and dementia (Dem) might change with varying visuospatial task difficulties. This study administered the Wechsler Adult Intelligence Scale-Revised (WAIS-R) Block Design Test (BDT) to determine whether visuospatial ability can help discriminate between MCI patients from Dem patients and normal controls (NC). Results showed that the BDT could contribute to the discrimination between MCI and Dem. Specifically, simple BDT task scores could best distinguish MCI from Dem patients, while difficult BDT task scores could contribute to discriminating between MCI and NC. Given the potential clinical value of the BDT in the diagnosis of Dem and MCI, normative data stratified by age and education for the Chinese elderly population are presented for use in research and clinical settings.

  20. Estudo longitudinal das habilidades intelectuais de idosos avaliados com a WAIS-III Longitudinal study of intellectual abilities of elderly people assessed by WAIS-III

    Directory of Open Access Journals (Sweden)

    Ana Carolina Zeferino Menezes

    2011-01-01

    Full Text Available Dados indicam que o envelhecimento, ainda que saudável, acarreta um declínio normal no desempenho intelectual. O presente estudo teve por objetivo investigar o desenvolvimento intelectual de idosos em diferentes domínios avaliados pela WAIS-III. A partir de um delineamento longitudinal, 47 participantes foram divididos em duas faixas etárias: idosos-jovens (até 74 anos e idosos-idosos (acima de 75 anos e seus desempenhos foram comparados após oito anos de intervalo. Resultados mostraram que idosos-jovens apresentaram ganhos nas habilidades avaliadas, embora em apenas dois índices estes tenham sido estatisticamente significativos. Com relação às capacidades de compreensão verbal e linguagem, os ganhos eram esperados. Já Memória, Organização Perceptual, Velocidade de Processamento, QI de Execução e Total não se comportaram como grande parte dos estudos reporta. Resultados para os idosos-idosos estão de acordo com a literatura: habilidades vulneráveis (organização perceptual, aprendizagem, memória, resolução de problemas e velocidade de processamento tiveram decréscimos após os oito anos entre as avaliações. Embora nem todos os resultados tenham sido significativos, corroboram dados de pesquisas que definem a idade de declínios significativos após os 75 anos. Concluindo, os resultados indicaram que os idosos não apresentaram declínio nas habilidades intelectuais avaliadas até a idade de 74 anos, a partir de quando alguma perda foi encontrada. A velocidade de processamento foi a única habilidade que apresentou declínio significativo. Portanto, as variações nos desempenhos não caracterizam um padrão de declínio generalizado, ou seja, não ocorrem em todas as habilidades e variam conforme a idade.Data have indicated that aging, even if in a healthy process, lead to a normal decrease in cognitive performance. The current study aims at investigating the intellectual development of elderly people in different

  1. Investigation of the factor structure of the Wechsler Adult Intelligence Scale--Fourth Edition (WAIS-IV): exploratory and higher order factor analyses.

    Science.gov (United States)

    Canivez, Gary L; Watkins, Marley W

    2010-12-01

    The present study examined the factor structure of the Wechsler Adult Intelligence Scale--Fourth Edition (WAIS-IV; D. Wechsler, 2008a) standardization sample using exploratory factor analysis, multiple factor extraction criteria, and higher order exploratory factor analysis (J. Schmid & J. M. Leiman, 1957) not included in the WAIS-IV Technical and Interpretation Manual (D. Wechsler, 2008b). Results indicated that the WAIS-IV subtests were properly associated with the theoretically proposed first-order factors, but all but one factor-extraction criterion recommended extraction of one or two factors. Hierarchical exploratory analyses with the Schmid and Leiman procedure found that the second-order g factor accounted for large portions of total and common variance, whereas the four first-order factors accounted for small portions of total and common variance. It was concluded that the WAIS-IV provides strong measurement of general intelligence, and clinical interpretation should be primarily at that level.

  2. CEPF Western Ghats Special Series: Freshwater fish fauna of Krishna River at Wai, northern Western Ghats, India

    Directory of Open Access Journals (Sweden)

    S.S. Kharat

    2012-06-01

    Full Text Available Freshwater fish fauna of the Krishna River at Wai, and the Dhom reservoir upstream of Wai, was studied. Fifty one species belonging to 14 families and 33 genera were recorded; 13 endemic to the Western Ghats and two to the Krishna River system. Moderate to rare populations were found for six globally threatened species: Gonoproktopterus curmuca, Labeo potail, Schismatorhynchos nukta, Tor khudree, T. mussullah and Parapsilorhynchus discophorus. Fish in this area are under threat due to two introduced species and five transplanted species, and due to other anthropogenic activities such as overfishing and organic and inorganic pollution of the river. Site based conservation action plans are needed for conservation of rare and threatened fish in this area.

  3. The role of organisational and cultural factors in the implementation of system-wide interventions in acute hospitals to improve patient outcomes: protocol for a systematic literature review.

    Science.gov (United States)

    Nosrati, Hadis; Clay-Williams, Robyn; Cunningham, Frances; Hillman, Ken; Braithwaite, Jeffrey

    2013-03-09

    Little is known about the role of the organisational culture in the success and sustainability of the hospital-wide interventions, and how local culture affects patient outcomes in acute hospitals. A systematic literature review will be conducted to identify organisational factors influencing hospital-wide interventions and patient outcomes. A search of English language articles will be performed in MEDLINE, CINAHL, EMBASE, Web of Science, PsychInfo and Global Health databases using Medical Subject Headings and keywords. Randomised controlled trials, quasi-randomised trials, controlled before and after design studies and interrupted time-series analysis studies will be included. 'Grey literature' will be excluded, however peer-reviewed journals that are likely to publish relevant studies (JAMA, BMJ, BMJ Quality and Safety, Lancet and New England Journal of Medicine and Implementation Science) will be hand searched for the last 5 years. Two reviewers will independently undertake a title and abstract review using inclusion and exclusion criteria. Studies will be excluded only after discussion between at least two reviewers, who will assess and agree on the inclusion, risk of bias and quality rating of the studies. One author will extract summary descriptive data from these studies; the other author will review this documentation for accuracy and completeness. It is likely that the studies will be heterogeneous in nature, therefore a narrative synthesis of the findings will be conducted. We will discuss characteristics of the studies and stratify the results according to the type of hospital-wide interventions, organisational factors associated with them and outcomes measured.

  4. An exploratory study of the Work Ability Index (WAI) and its components in a group of computer workers.

    Science.gov (United States)

    Costa, Ana Filipa; Puga-Leal, Rogério; Nunes, Isabel L

    2011-01-01

    The objective of this paper is to present a study on the assessment of the work ability of a group of aged computers workers. The study was developed with the goal of creating a decision making framework oriented towards the maintenance of the health and working ability of aged workers. Fifty computer workers participated in this study. They were administrative secretaries and computer technicians working mainly with office computers. The method used to assess the work ability was the Work Ability Index (WAI). 78% of the participants had good or excellent work ability and only 2% a poor one. The average WAI score was 40.5 (SD=5.761; min=27; max=49). This study confirms the decrease in work ability of workers while aging. The group overall work ability was slightly higher than the reference values develop by the Finnish Institute of Occupational Health. The assessment of work ability is fundamental to make age-friendly workplaces. WAI is one tool designed to perform such assessment. The results obtained could assist the early identification of situations where employees are struggling with their work ability, thus helping to prioritize ergonomic interventions devoted to improve the working conditions, and allowing the continued employment of aging workers on their current job.

  5. Psychometric qualities of a tetrad WAIS-III short form for use in individuals with mild to borderline intellectual disability.

    Science.gov (United States)

    van Duijvenbode, Neomi; Didden, Robert; van den Hazel, Teunis; Engels, Rutger C M E

    2016-01-01

    To investigate the reliability and validity of a Wechsler Abbreviated Scale of Intelligence-based Wechsler Adult Intelligence Scale - third edition (WAIS-III) short form (SF) in a sample of individuals with mild to borderline intellectual disability (MBID) (N = 117; M(IQ) = 71.34; SD(IQ) = 8.00, range: 52-85). A full WAIS-III was administered as a standard procedure in the diagnostic process. The results indicate an excellent reliability (r = 0.96) and a strong, positive correlation with the full WAIS-III (r = 0.89). The SF correctly identified ID in general and the correct IQ category more specifically in the majority of cases (97.4% and 86.3% of cases, respectively). In addition, 82.1% of the full scale IQ (FSIQ) estimates fell within the 95% confidence interval of the original score. We conclude that the SF is a reliable and valid measure to estimate FSIQ. It can be used in clinical and research settings when global estimates of intelligence are sufficient.

  6. Oceanic response to changes in the WAIS and astronomical forcing during the MIS31 superinterglacial

    Directory of Open Access Journals (Sweden)

    F. Justino

    2017-09-01

    Full Text Available Marine Isotope Stage 31 (MIS31, between 1085 and 1055 ka was characterized by higher extratropical air temperatures and a substantial recession of polar glaciers compared to today. Paleoreconstructions and model simulations have increased the understanding of the MIS31 interval, but questions remain regarding the role of the Atlantic and Pacific oceans in modifying the climate associated with the variations in Earth's orbital parameters. Multi-century coupled climate simulations, with the astronomical configuration of the MIS31 and modified West Antarctic Ice Sheet (WAIS topography, show an increase in the thermohaline flux and northward oceanic heat transport (OHT in the Pacific Ocean. These oceanic changes are driven by anomalous atmospheric circulation and increased surface salinity in concert with a stronger meridional overturning circulation (MOC. The intensified northward OHT is responsible for up to 85 % of the global OHT anomalies and contributes to the overall reduction in sea ice in the Northern Hemisphere (NH due to Earth's astronomical configuration. The relative contributions of the Atlantic Ocean to global OHT and MOC anomalies are minor compared to those of the Pacific. However, sea ice changes are remarkable, highlighted by decreased (increased cover in the Ross (Weddell Sea but widespread reductions in sea ice across the NH.

  7. Predictors of WAIS-R vocabulary in late life: Differences by race.

    Science.gov (United States)

    Morin, Ruth T; Midlarsky, Elizabeth

    2017-11-01

    Vocabulary scores tend to be significantly related to education in heterogeneous groups of older adults, even after controlling for confounding variables. However, there may be other factors that impinge on cognitive functioning for certain demographic groups, particularly those whose educational opportunities were limited, and who may have experienced considerable stress as a result of their minority status. This study sought to explore possible predictors of vocabulary scores among African American and White older adults. In this study, samples of African American (N = 165) and White (N = 146) community-dwelling older adults reported their level of education, perceived health status, and number of stressful life events, and were administered the Wechsler Adult Intelligence Scale-Revised (WAIS-R) Vocabulary subtest. Among the White participants, level of education was the only significant predictor of vocabulary score after controlling for perceived health and exposure to stress. Among African American participants, education was also a significant predictor of vocabulary score. However perceived health and number of stressful life events were also significantly predictors of vocabulary score. Findings indicate that for certain cohorts of older adults, especially those who may have experienced stressful life circumstances and health disparities as a result of racial inequality, education may not be the only variable that predicts verbal intelligence. The importance of investigating cognitive functioning within a broader sociocultural context is discussed.

  8. WANNABES (PERSONAS QUE DESEAN SER AMPUTADAS. EVALUACIÓN NEUROPSICOLÓGICA CON EL WAIS III

    Directory of Open Access Journals (Sweden)

    Carolina Mora

    2017-01-01

    Full Text Available La presente investigación tiene tres objetivos: en primer lugar,dar a conocer el fenómeno Wannabe, queen los contextos académicos es conocido como Apotemnofilia, Xenomelia y/o Desorden de la Identidad de la Integridad Corporal(BIID por sus siglas en inglés,que se caracteriza por el deseo manifiesto de un sujeto cuyas extremidades están sanas por convertirse en una persona amputada. Ensegundo lugar, presentar el caso de un Wannabeque deseaamputarse la pierna izquierda, 4 dedos por debajo de la rodilla, se trata de un joven de 31 años, con formación universitaria y sin psicopatología identificable a partir del perfil de personalidad arrojado por el Test de Personalidad MMPI-2. En tercer lugar, presentar los resultados de un informe neuropsicológico elaborado con base en el WAIS III, a fin de detectar la posible disfuncióndel lóbuloparietal derecho, que frecuentemente se ha sugerido como la causa del fenómeno.Los resultados obtenidos indican que aunque el puntaje obtenido en la sub prueba llamada “Ensamblaje de Objetos” puede estar relacionadocon la disfunción en este lóbulo, no se cuenta con la evidencia clínica y conductual suficiente para aseverar que ella exista.

  9. Rorschach and the WAIS-III after one and two years of psychotherapy O teste de Rorschach e a Escala WAIS-III após um e dois Anos de psicoterapia

    Directory of Open Access Journals (Sweden)

    Latife Yazigi

    2011-01-01

    Full Text Available This study aimed at identifying what aspects of personality are modified after one and two years of psychoanalytic psychotherapy in adults attending a free university healthcare service in São Paulo, Brazil. The instruments were the Rorschach and the WAIS-III tests which were administered before and after one and two years of treatment. The participants were 34 adult individuals, both genders. After one year of psychotherapy in the Rorschach method there was an increase in effective and adaptive interpersonal relationship, an enhancement in sensitiveness related to the capacity of modulating affect, the need for close contact as well as the arousal of feelings of discomfort associated with intensification of self-regard, and a decrease in narcissistic tendencies. As well as in WAIS-III, there was an increase in motivation, attention and speed processing.O estudo teve por objetivo identificar quais aspectos da personalidade são modificados após um e dois anos de psicoterapia psicanalítica em adultos atendidos em um serviço público de saúde mental de uma universidade em São Paulo, no Brasil. Os instrumentos utilizados foram o Rorschach e a Escala de Inteligência Wechsler para adultos (WAIS-III, os quais foram administrados antes e após um e dois anos de tratamento. Os participantes foram 34 indivíduos adultos, de ambos os sexos. No Rorschach, após um ano de psicoterapia, ocorreu melhora da relação interpessoal adaptada e efetiva, melhora na sensibilidade relacionada à capacidade de modular afeto e da necessidade de contato mais próximo, e surgimento de sentimentos de desconforto associados à intensificação de auto-observação e diminuição de tendências narcisistas. No WAIS-III houve aumento de motivação, melhora atencional e de velocidade de processamento.

  10. Viabilidade da estimativa de QI a partir dos subtestes Vocabulário e Cubos da WAIS-III Viability of IQ estimates based on Vocabulary and Block Design WAIS-III subtests

    Directory of Open Access Journals (Sweden)

    Flávia Wagner

    2010-08-01

    Full Text Available Objetivou-se avaliar a viabilidade de estimar o Quociente de Inteligência (QI de adultos por meio de duas estratégias que utilizam uma forma curta constituída pelos subtestes Vocabulário e Cubos da Escala Wechsler de Inteligência para Adultos (WAIS-III. Participaram do estudo 77 homens e mulheres, com idade média de 39,1 anos (dp=13,4. Foi aplicada a WAIS-III e questionários para cumprir os critérios de inclusão dos participantes sem prejuízos neurológicos e psiquiátricos. Para avaliar a concordância entre as duas estratégias de estimar o QI, utilizou-se o método estatístico proposto por Bland e Altman. Como resultado, encontrou-se que as estimativas de QI geradas pelas duas estratégias apresentam concordância com a medida do QI realizada pela aplicação da escala completa apenas em alguns dos casos avaliados. Sugere-se cautela na utilização dessas estratégias para estimar o QI de adultos.The aim of this study was to evaluate the feasibility of estimating the Intelligence Quotient (IQ in adults based on two strategies that use Vocabulary and Block Design subtests of Wechsler Adult Intelligence Scale (WAIS-III. Seventy-seven men and women participated of the study, with mean age of 39.1 (sd=13.4. WAIS-III subtests were administered and questionnaires were used to verify inclusion criteria for participants without neurological or psychiatric impairments. A statistical method proposed by Bland and Altman was used to evaluate the agreement between both strategies to estimate IQ. Results suggest that IQ estimates derived from both strategies only agree with the IQ derived from the full battery in a few cases of the sample. Considering these findings, caution is suggested when using these strategies to estimate adults' IQ.

  11. Measuring Working Memory With Digit Span and the Letter-Number Sequencing Subtests From the WAIS-IV: Too Low Manipulation Load and Risk for Underestimating Modality Effects.

    Science.gov (United States)

    Egeland, Jens

    2015-01-01

    The Wechsler Adult Intelligence Scale (WAIS) is one of the most frequently used tests among psychologists. In the fourth edition of the test (WAIS-IV), the subtests Digit Span and Letter-Number Sequencing are expanded for better measurement of working memory (WM). However, it is not clear whether the new extended tasks contribute sufficient complexity to be sensitive measures of manipulation WM, nor do we know to what degree WM capacity differs between the visual and the auditory modality because the WAIS-IV only tests the auditory modality. Performance by a mixed sample of 226 patients referred for neuropsychological examination on the Digit Span and Letter-Number Sequencing subtests from the WAIS-IV and on Spatial Span from the Wechsler Memory Scale-Third Edition was analyzed in two confirmatory factor analyses to investigate whether a unitary WM model or divisions based on modality or level/complexity best fit the data. The modality model showed the best fit when analyzing summed scores for each task as well as scores for the longest span. The clinician is advised to apply tests with higher manipulation load and to consider testing visual span as well before drawing conclusions about impaired WM from the WAIS-IV.

  12. Transcranial direct current stimulation (tDCS) of frontal cortex decreases performance on the WAIS-IV intelligence test.

    Science.gov (United States)

    Sellers, Kristin K; Mellin, Juliann M; Lustenberger, Caroline M; Boyle, Michael R; Lee, Won Hee; Peterchev, Angel V; Fröhlich, Flavio

    2015-09-01

    Transcranial direct current stimulation (tDCS) modulates excitability of motor cortex. However, there is conflicting evidence about the efficacy of this non-invasive brain stimulation modality to modulate performance on cognitive tasks. Previous work has tested the effect of tDCS on specific facets of cognition and executive processing. However, no randomized, double-blind, sham-controlled study has looked at the effects of tDCS on a comprehensive battery of cognitive processes. The objective of this study was to test if tDCS had an effect on performance on a comprehensive assay of cognitive processes, a standardized intelligence quotient (IQ) test. The study consisted of two substudies and followed a double-blind, between-subjects, sham-controlled design. In total, 41 healthy adult participants were included in the final analysis. These participants completed the Wechsler Adult Intelligence Scale, Fourth Edition (WAIS-IV) as a baseline measure. At least one week later, participants in substudy 1 received either bilateral tDCS (anodes over both F4 and F3, cathode over Cz, 2 mA at each anode for 20 min) or active sham tDCS (2 mA for 40 s), and participants in substudy 2 received either right or left tDCS (anode over either F4 or F3, cathode over Cz, 2 mA for 20 min). In both studies, the WAIS-IV was immediately administered following stimulation to assess for performance differences induced by bilateral and unilateral tDCS. Compared to sham stimulation, right, left, and bilateral tDCS reduced improvement between sessions on Full Scale IQ and the Perceptual Reasoning Index. This demonstration that frontal tDCS selectively degraded improvement on specific metrics of the WAIS-IV raises important questions about the often proposed role of tDCS in cognitive enhancement. Copyright © 2015 Elsevier B.V. All rights reserved.

  13. Incidental Learning: A Brief, Valid Measure of Memory Based on the WAIS-IV Vocabulary and Similarities Subtests.

    Science.gov (United States)

    Spencer, Robert J; Reckow, Jaclyn; Drag, Lauren L; Bieliauskas, Linas A

    2016-12-01

    We assessed the validity of a brief incidental learning measure based on the Similarities and Vocabulary subtests of the Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV). Most neuropsychological assessments for memory require intentional learning, but incidental learning occurs without explicit instruction. Incidental memory tests such as the WAIS-III Symbol Digit Coding subtest have existed for many years, but few memory studies have used a semantically processed incidental learning model. We conducted a retrospective analysis of 37 veterans with traumatic brain injury, referred for outpatient neuropsychological testing at a Veterans Affairs hospital. As part of their evaluation, the participants completed the incidental learning tasks. We compared their incidental learning performance to their performance on traditional memory measures. Incidental learning scores correlated strongly with scores on the California Verbal Learning Test-Second Edition (CVLT-II) and Brief Visuospatial Memory Test-Revised (BVMT-R). After we conducted a partial correlation that controlled for the effects of age, incidental learning correlated significantly with the CVLT-II Immediate Free Recall, CVLT-II Short-Delay Recall, CVLT-II Long-Delay Recall, and CVLT-II Yes/No Recognition Hits, and with the BVMT-R Delayed Recall and BVMT-R Recognition Discrimination Index. Our incidental learning procedures derived from subtests of the WAIS-IV Edition are an efficient and valid way of measuring memory. These tasks add minimally to testing time and capitalize on the semantic encoding that is inherent in completing the Similarities and Vocabulary subtests.

  14. Internet-based wide area measurement applications in deregulated power systems

    Science.gov (United States)

    Khatib, Abdel-Rahman Amin

    Since the deregulation of power systems was started in 1989 in the UK, many countries have been motivated to undergo deregulation. The United State started deregulation in the energy sector in California back in 1996. Since that time many other states have also started the deregulation procedures in different utilities. Most of the deregulation market in the United States now is in the wholesale market area, however, the retail market is still undergoing changes. Deregulation has many impacts on power system network operation and control. The number of power transactions among the utilities has increased and many Independent Power Producers (IPPs) now have a rich market for competition especially in the green power market. The Federal Energy Regulatory Commission (FERC) called upon utilities to develop the Regional Transmission Organization (RTO). The RTO is a step toward the national transmission grid. RTO is an independent entity that will operate the transmission system in a large region. The main goal of forming RTOs is to increase the operation efficiency of the power network under the impact of the deregulated market. The objective of this work is to study Internet based Wide Area Information Sharing (WAIS) applications in the deregulated power system. The study is the first step toward building a national transmission grid picture using information sharing among utilities. Two main topics are covered as applications for the WAIS in the deregulated power system, state estimation and Total Transfer Capability (TTC) calculations. As a first step for building this national transmission grid picture, WAIS and the level of information sharing of the state estimation calculations have been discussed. WAIS impacts to the TTC calculations are also covered. A new technique to update the TTC using on line measurements based on WAIS created by sharing state estimation is presented.

  15. WISC-III e WAIS-III na avaliação da inteligência de cegos

    OpenAIRE

    Nascimento, Elizabeth do; Flores-Mendoza, Carmen Elvira

    2007-01-01

    Diante da escassez de pesquisas nacionais e de testes psicológicos destinados a avaliar pessoas cegas, desenvolveu-se um estudo psicométrico com as escalas verbais dos testes WISC-III e WAIS-III. Após as adaptações de alguns estímulos e das instruções, os testes foram aplicados em crianças (N = 120) e adultos (N = 52) residentes em Belo Horizonte. Os resultados indicaram que as escalas verbais modificadas apresentam uma boa consistência interna (alfa> 0,80). Além disso, a investigação da vali...

  16. Discrepancies between bilinguals' performance on the Spanish and English versions of the WAIS Digit Span task: Cross-cultural implications.

    Science.gov (United States)

    López, Enrique; Steiner, Alexander J; Hardy, David J; IsHak, Waguih W; Anderson, W Brantley

    2016-01-01

    This study explored within-subjects differences in the performance of 40 bilingual participants on the English and Spanish versions of the Wechsler Adult Intelligence Scale (WAIS) Digit Span task. To test the linguistic hypothesis that individuals would perform worse in Spanish because of its syllabic demand, we compared the number of syllables correctly recalled by each participant for every correct trial. Our analysis of the correct number of syllables remembered per trial showed that participants performed significantly better (i.e., recalling more syllables) in Spanish than in English on the total score. Findings suggest the Spanish version of the Digit Span (total score) was significantly more difficult than the English version utilizing traditional scoring methods. Moreover, the Forward Trial, rather than the Backward Trial, was more likely to show group differences between both language versions. Additionally, the Spanish trials of the Digit Span were correlated with language comprehension and verbal episodic memory measures, whereas the English trials of the Digit Span were correlated with confrontational naming and verbal fluency tasks. The results suggest that more research is necessary to further investigate other cognitive factors, rather than just syllabic demand, that might contribute to performance and outcome differences on the WAIS Digit Span in Spanish-English bilinguals.

  17. Late-Holocene climate evolution at the WAIS Divide site, West Antarctica: Bubble number-density estimates

    Science.gov (United States)

    Fegyveresi, John M.; Alley, R.B.; Spencer, M.K.; Fitzpatrick, J.J.; Steig, E.J.; White, J.W.C.; McConnell, J.R.; Taylor, K.C.

    2011-01-01

    A surface cooling of ???1.7??C occurred over the ???two millennia prior to ???1700 CE at the West Antarctic ice sheet (WAIS) Divide site, based on trends in observed bubble number-density of samples from the WDC06A ice core, and on an independently constructed accumulation-rate history using annual-layer dating corrected for density variations and thinning from ice flow. Density increase and grain growth in polar firn are both controlled by temperature and accumulation rate, and the integrated effects are recorded in the number-density of bubbles as the firn changes to ice. Numberdensity is conserved in bubbly ice following pore close-off, allowing reconstruction of either paleotemperature or paleo-accumulation rate if the other is known. A quantitative late-Holocene paleoclimate reconstruction is presented for West Antarctica using data obtained from the WAIS Divide WDC06A ice core and a steady-state bubble number-density model. The resultant temperature history agrees closely with independent reconstructions based on stable-isotopic ratios of ice. The ???1.7??C cooling trend observed is consistent with a decrease in Antarctic summer duration from changing orbital obliquity, although it remains possible that elevation change at the site contributed part of the signal. Accumulation rate and temperature dropped together, broadly consistent with control by saturation vapor pressure.

  18. WAIS-IV administration errors: effects of altered response requirements on Symbol Search and violation of standard surface-variety patterns on Block Design.

    Science.gov (United States)

    Ryan, Joseph J; Swopes-Willhite, Nicole; Franklin, Cassi; Kreiner, David S

    2015-01-01

    This study utilized a sample of 50 college students to assess the possibility that responding to the Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV) Symbol Search subtest items with an "x" instead of a "single slash mark" would affect performance. A second sample of 50 college students was used to assess the impact on WAIS-IV Block Design performance of presenting all the items with only red surfaces facing up. The modified Symbol Search and Block Design administrations yielded mean scaled scores and raw scores that did not differ significantly from mean scores obtained with standard administrations. Findings should not be generalized beyond healthy, well-educated young adults.

  19. Ko Wai Au? Who Am I? Examining the Multiple Identities of Maori Youth

    Science.gov (United States)

    Faircloth, Susan C.; Hynds, Anne; Jacob, Helen; Green, Clint; Thompson, Patrick

    2016-01-01

    In this paper, we present preliminary findings from a unique collaborative research project involving six Deaf Maori rangatahi (youth) in Tamaki Makaurau (Auckland), Aotearoa New Zealand. This study utilized kaupapa whanau (research family) protocols, established in consultation with two cultural advisory groups within New Zealand and the young…

  20. Conceptual elaboration versus direct lexical access in WAIS-similarities: differential effects of white-matter lesions and gray matter volumes.

    Science.gov (United States)

    Fernaeus, Sven-Erik; Hellström, Åke

    2017-09-18

    Wechsler Adult Intelligence Scale (WAIS) subscale Similarities have been classified as a test of either verbal comprehension or of inductive reasoning. The reason may be that items divide into two categories. We tested the hypothesis of heterogeneity of items in WAIS-Similarities. Consecutive patients at a memory clinic and healthy controls participated in the study. White-matter hyperintensities (WMHs) and normalized temporal lobe volumes were measured based on Magnetic resonance Imaging (MRI), and tests of verbal memory and attention were used in addition to WAIS-Similarities to collect behavioural data. Factor analysis supported the hypothesis that two factors are involved in the performance of WAIS-similarities: (1) semiautomatic lexical access and (2) conceptual elaboration. These factors were highly correlated but provided discriminative diagnostic information: In logistic regression analyses, scores of the lexical access factor and of the conceptual elaboration factor discriminated patients with mild cognitive impairment from Alzheimer's disease patients and from healthy controls, respectively. High scores of WMH, indicating periventricular white-matter lesions, predicted factor scores of direct lexical access but not those of conceptual elaboration, which were predicted only by medial and lateral temporal lobe volumes.

  1. Genetic correlations between brain volumes and the WAIS-III dimensions of verbal comprehension, working memory, perceptual organization, and processing speed

    NARCIS (Netherlands)

    Posthuma, D.; Baare, W.F.C.; Hulshoff Pol, H.E.; Kahn, R.S.; Boomsma, D.I.; de Geus, E.J.C.

    2003-01-01

    We recently showed that the correlation of gray and white matter volume with full scale IQ and the Working Memory dimension are completely mediated by common genetic factors (Posthuma et al., 2002). Here we examine whether the other WAIS III dimensions (Verbal Comprehension, Perceptual Organization,

  2. WAIS-IV and WISC-IV Structural Validity: Alternate Methods, Alternate Results. Commentary on Weiss et al. (2013a) and Weiss et al. (2013b)

    Science.gov (United States)

    Canivez, Gary L.; Kush, Joseph C.

    2013-01-01

    Weiss, Keith, Zhu, and Chen (2013a) and Weiss, Keith, Zhu, and Chen (2013b), this issue, report examinations of the factor structure of the Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV) and Wechsler Intelligence Scale for Children-Fourth Edition (WISC-IV), respectively; comparing Wechsler Hierarchical Model (W-HM) and…

  3. An examination of the Wechsler Adult Intelligence Scales, Fourth Edition (WAIS-IV) in individuals with complicated mild, moderate and Severe traumatic brain injury (TBI).

    Science.gov (United States)

    Carlozzi, Noelle E; Kirsch, Ned L; Kisala, Pamela A; Tulsky, David S

    2015-01-01

    This study examined the clinical utility of the Wechsler Adult Intelligence Scales-Fourth Edition (WAIS-IV) in individuals with complicated mild, moderate or severe TBI. One hundred individuals with TBI (n = 35 complicated mild or moderate TBI; n = 65 severe TBI) and 100 control participants matched on key demographic variables from the WAIS-IV normative dataset completed the WAIS-IV. Univariate analyses indicated that participants with severe TBI had poorer performance than matched controls on all index scores and subtests (except Matrix Reasoning). Individuals with complicated mild/moderate TBI performed more poorly than controls on the Working Memory Index (WMI), Processing Speed Index (PSI), and Full Scale IQ (FSIQ), and on four subtests: the two processing speed subtests (SS, CD), two working memory subtests (AR, LN), and a perceptual reasoning subtest (BD). Participants with severe TBI had significantly lower scores than the complicated mild/moderate TBI on PSI, and on three subtests: the two processing speed subtests (SS and CD), and the new visual puzzles test. Effect sizes for index and subtest scores were generally small-to-moderate for the group with complicated mild/moderate and moderate-to-large for the group with severe TBI. PSI also showed good sensitivity and specificity for classifying individuals with severe TBI versus controls. Findings provide support for the clinical utility of the WAIS-IV in individuals with complicated mild, moderate, and severe TBI.

  4. Low-res d15N and d18O of O2 in the WAIS Divide 06A Deep Core, Version 1

    Data.gov (United States)

    National Aeronautics and Space Administration — This data set is a low-resolution set of measurements of d15N of N2 and d18O of O2, along with dO2/N and dAr/N2 supporting data, in the WAIS Divide 3405 m long ice...

  5. Coefficients of Correlation of IQ's on the WAIS-R with Standard Age Scores on the Stanford-Binet, 4th Edition for Previously Identified Mentally Handicapped Adolescents.

    Science.gov (United States)

    Richardson, John C.

    This paper presents a study regarding the correlation of the Stanford-Binet: 4th Edition Intelligence Quotient (IQ) scores with the Wechsler Adult Intelligence Scale-Revised (WAIS-R) IQ scores for the purpose of improving the identification process for educable mentally handicapped (EMH) school age adolescents and young adults. The sample included…

  6. Cognitive Profiles of Adults with Asperger's Disorder, High-Functioning Autism, and Pervasive Developmental Disorder Not Otherwise Specified Based on the WAIS-III

    Science.gov (United States)

    Kanai, Chieko; Tani, Masayuki; Hashimoto, Ryuichiro; Yamada, Takashi; Ota, Haruhisa; Watanabe, Hiromi; Iwanami, Akira; Kato, Nobumasa

    2012-01-01

    Little is known about the cognitive profiles of high-functioning Pervasive Developmental Disorders (PDD) in adults based on the Wechsler Intelligence Scale III (WAIS-III). We examined cognitive profiles of adults with no intellectual disability (IQ greater than 70), and in adults with Asperger's disorder (AS; n = 47), high-functioning autism (HFA;…

  7. Evaluating WAIS-IV structure through a different psychometric lens: structural causal model discovery as an alternative to confirmatory factor analysis.

    Science.gov (United States)

    van Dijk, Marjolein J A M; Claassen, Tom; Suwartono, Christiany; van der Veld, William M; van der Heijden, Paul T; Hendriks, Marc P H

    Since the publication of the WAIS-IV in the U.S. in 2008, efforts have been made to explore the structural validity by applying factor analysis to various samples. This study aims to achieve a more fine-grained understanding of the structure of the Dutch language version of the WAIS-IV (WAIS-IV-NL) by applying an alternative analysis based on causal modeling in addition to confirmatory factor analysis (CFA). The Bayesian Constraint-based Causal Discovery (BCCD) algorithm learns underlying network structures directly from data and assesses more complex structures than is possible with factor analysis. WAIS-IV-NL profiles of two clinical samples of 202 patients (i.e. patients with temporal lobe epilepsy and a mixed psychiatric outpatient group) were analyzed and contrasted with a matched control group (N = 202) selected from the Dutch standardization sample of the WAIS-IV-NL to investigate internal structure by means of CFA and BCCD. With CFA, the four-factor structure as proposed by Wechsler demonstrates acceptable fit in all three subsamples. However, BCCD revealed three consistent clusters (verbal comprehension, visual processing, and processing speed) in all three subsamples. The combination of Arithmetic and Digit Span as a coherent working memory factor could not be verified, and Matrix Reasoning appeared to be isolated. With BCCD, some discrepancies from the proposed four-factor structure are exemplified. Furthermore, these results fit CHC theory of intelligence more clearly. Consistent clustering patterns indicate these results are robust. The structural causal discovery approach may be helpful in better interpreting existing tests, the development of new tests, and aid in diagnostic instruments.

  8. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  9. Two 24-hour Studies of Water Quality in the Ala Wai Canal during March and July, 1994 for the Mamala Bay Study, Pollutant Source Identification Project MB-3, (NODC Accession 0001188)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This dataset focuses on studies of water quality in the Ala Wai Canal in order to determine its role of point and non point source disharge into Mamala Bay. The...

  10. Genetic correlations between brain volumes and the WAIS-III dimensions of verbal comprehension, working memory, perceptual organization, and processing speed

    DEFF Research Database (Denmark)

    Posthuma, Daniëlle; Baare, Wim F.C.; Hulshoff Pol, Hilleke E.

    2003-01-01

    We recently showed that the correlation of gray and white matter volume with full scale IQ and the Working Memory dimension are completely mediated by common genetic factors (Posthuma et al., 2002). Here we examine whether the other WAIS III dimensions (Verbal Comprehension, Perceptual Organization......, Processing Speed) are also related to gray and white matter volume, and whether any of the dimensions are related to cerebellar volume. Two overlapping samples provided 135 subjects from 60 extended twin families for whom both MRI scans and WAIS III data were available. All three brain volumes are related...... to Working Memory capacity (r = 0.27). This phenotypic correlation is completely due to a common underlying genetic factor. Processing Speed was genetically related to white matter volume (r(g) = 0.39). Perceptual Organization was both genetically (r(g) = 0.39) and environmentally (r(e) = -0.71) related...

  11. A cross-cultural comparison between South African and British students on the Wechsler Adult Intelligence Scales Third Edition (WAIS-III.

    Directory of Open Access Journals (Sweden)

    Kate eCockcroft

    2015-03-01

    Full Text Available There is debate regarding the appropriate use of Western cognitive measures with individuals from very diverse backgrounds to that of the norm population. Given the dated research in this area and the considerable socio-economic changes that South Africa has witnessed over the past 20 years, this paper reports on the use of the Wechsler Adult Intelligence Scale Third Edition (WAIS-III, the most commonly used measure of intelligence, with an English second language, multilingual, low socio-economic group of black, South African university students. Their performance on the WAIS-III was compared to that of a predominantly white, British, monolingual, higher socio-economic group. A multi-group confirmatory factor analysis showed that the WAIS-III lacks measurement invariance between the two groups, suggesting that it may be tapping different constructs in each group. The UK group significantly outperformed the SA group on the knowledge-based verbal, and some nonverbal subtests, while the SA group performed significantly better on measures of processing speed. The groups did not differ significantly on the Matrix Reasoning subtest and on those working memory subtests with minimal reliance on language, which appear to be the least culturally biased. Group differences were investigated further in a set of principal components analyses, which revealed that the WAIS-III scores loaded differently for the UK and SA groups. While the SA group appeared to treat the processing speed subtests differently to those measuring perceptual organisation and nonverbal reasoning, the UK group seemed to approach all of these subtests similarly. These results have important implications for the cognitive assessment of individuals from culturally, linguistically and socio-economically diverse circumstances.

  12. A cross-cultural comparison between South African and British students on the Wechsler Adult Intelligence Scales Third Edition (WAIS-III).

    Science.gov (United States)

    Cockcroft, Kate; Alloway, Tracy; Copello, Evan; Milligan, Robyn

    2015-01-01

    There is debate regarding the appropriate use of Western cognitive measures with individuals from very diverse backgrounds to that of the norm population. Given the dated research in this area and the considerable socio-economic changes that South Africa has witnessed over the past 20 years, this paper reports on the use of the Wechsler Adult Intelligence Scale Third Edition (WAIS-III), the most commonly used measure of intelligence, with an English second language, multilingual, low socio-economic group of black, South African university students. Their performance on the WAIS-III was compared to that of a predominantly white, British, monolingual, higher socio-economic group. A multi-group confirmatory factor analysis showed that the WAIS-III lacks measurement invariance between the two groups, suggesting that it may be tapping different constructs in each group. The UK group significantly outperformed the SA group on the knowledge-based verbal, and some non-verbal subtests, while the SA group performed significantly better on measures of Processing Speed (PS). The groups did not differ significantly on the Matrix Reasoning subtest and on those working memory subtests with minimal reliance on language, which appear to be the least culturally biased. Group differences were investigated further in a set of principal components analyses, which revealed that the WAIS-III scores loaded differently for the UK and SA groups. While the SA group appeared to treat the PS subtests differently to those measuring perceptual organization and non-verbal reasoning, the UK group seemed to approach all of these subtests similarly. These results have important implications for the cognitive assessment of individuals from culturally, linguistically, and socio-economically diverse circumstances.

  13. Unit 148 - World Wide Web Basics

    OpenAIRE

    148, CC in GIScience; Yeung, Albert K.

    2000-01-01

    This unit explains the characteristics and the working principles of the World Wide Web as the most important protocol of the Internet. Topics covered in this unit include characteristics of the World Wide Web; using the World Wide Web for the dissemination of information on the Internet; and using the World Wide Web for the retrieval of information from the Internet.

  14. Surface formation, preservation, and history of low-porosity crusts at the WAIS Divide site, West Antarctica

    Science.gov (United States)

    Fegyveresi, John M.; Alley, Richard B.; Muto, Atsuhiro; Orsi, Anaïs J.; Spencer, Matthew K.

    2018-01-01

    Observations at the West Antarctic Ice Sheet (WAIS) Divide site show that near-surface snow is strongly altered by weather-related processes such as strong winds and temperature fluctuations, producing features that are recognizable in the deep ice core. Prominent glazed surface crusts develop frequently at the site during summer seasons. Surface, snow pit, and ice core observations made in this study during summer field seasons from 2008-2009 to 2012-2013, supplemented by automated weather station (AWS) data with short- and longwave radiation sensors, revealed that such crusts formed during relatively low-wind, low-humidity, clear-sky periods with intense daytime sunshine. After formation, such glazed surfaces typically developed cracks in a polygonal pattern likely from thermal contraction at night. Cracking was commonest when several clear days occurred in succession and was generally followed by surface hoar growth; vapor escaping through the cracks during sunny days may have contributed to the high humidity that favored nighttime formation of surface hoar. Temperature and radiation observations show that daytime solar heating often warmed the near-surface snow above the air temperature, contributing to upward mass transfer, favoring crust formation from below, and then surface hoar formation. A simple surface energy calculation supports this observation. Subsequent examination of the WDC06A deep ice core revealed that crusts are preserved through the bubbly ice, and some occur in snow accumulated during winters, although not as commonly as in summertime deposits. Although no one has been on site to observe crust formation during winter, it may be favored by greater wintertime wind packing from stronger peak winds, high temperatures and steep temperature gradients from rapid midwinter warmings reaching as high as -15 °C, and perhaps longer intervals of surface stability. Time variations in crust occurrence in the core may provide paleoclimatic information

  15. A 21 000-year record of fluorescent organic matter markers in the WAIS Divide ice core

    Science.gov (United States)

    D'Andrilli, Juliana; Foreman, Christine M.; Sigl, Michael; Priscu, John C.; McConnell, Joseph R.

    2017-05-01

    Englacial ice contains a significant reservoir of organic material (OM), preserving a chronological record of materials from Earth's past. Here, we investigate if OM composition surveys in ice core research can provide paleoecological information on the dynamic nature of our Earth through time. Temporal trends in OM composition from the early Holocene extending back to the Last Glacial Maximum (LGM) of the West Antarctic Ice Sheet Divide (WD) ice core were measured by fluorescence spectroscopy. Multivariate parallel factor (PARAFAC) analysis is widely used to isolate the chemical components that best describe the observed variation across three-dimensional fluorescence spectroscopy (excitation-emission matrices; EEMs) assays. Fluorescent OM markers identified by PARAFAC modeling of the EEMs from the LGM (27.0-18.0 kyr BP; before present 1950) through the last deglaciation (LD; 18.0-11.5 kyr BP), to the mid-Holocene (11.5-6.0 kyr BP) provided evidence of different types of fluorescent OM composition and origin in the WD ice core over 21.0 kyr. Low excitation-emission wavelength fluorescent PARAFAC component one (C1), associated with chemical species similar to simple lignin phenols was the greatest contributor throughout the ice core, suggesting a strong signature of terrestrial OM in all climate periods. The component two (C2) OM marker, encompassed distinct variability in the ice core describing chemical species similar to tannin- and phenylalanine-like material. Component three (C3), associated with humic-like terrestrial material further resistant to biodegradation, was only characteristic of the Holocene, suggesting that more complex organic polymers such as lignins or tannins may be an ecological marker of warmer climates. We suggest that fluorescent OM markers observed during the LGM were the result of greater continental dust loading of lignin precursor (monolignol) material in a drier climate, with lower marine influences when sea ice extent was higher and

  16. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  17. Genetic correlations between brain volumes and the WAIS-III dimensions of verbal comprehension, working memory, perceptual organization, and processing speed

    DEFF Research Database (Denmark)

    Posthuma, Daniëlle; Baare, Wim F.C.; Hulshoff Pol, Hilleke E.

    2003-01-01

    We recently showed that the correlation of gray and white matter volume with full scale IQ and the Working Memory dimension are completely mediated by common genetic factors (Posthuma et al., 2002). Here we examine whether the other WAIS III dimensions (Verbal Comprehension, Perceptual Organization...... to Working Memory capacity (r = 0.27). This phenotypic correlation is completely due to a common underlying genetic factor. Processing Speed was genetically related to white matter volume (r(g) = 0.39). Perceptual Organization was both genetically (r(g) = 0.39) and environmentally (r(e) = -0.71) related...

  18. Immunochemical protocols

    National Research Council Canada - National Science Library

    Pound, John D

    1998-01-01

    ... easy and important refinements often are not published. This much anticipated 2nd edition of Immunochemzcal Protocols therefore aims to provide a user-friendly up-to-date handbook of reliable techniques selected to suit the needs of molecular biologists. It covers the full breadth of the relevant established immunochemical methods, from protein blotting and immunoa...

  19. Surface formation, preservation, and history of low-porosity crusts at the WAIS Divide site, West Antarctica

    Directory of Open Access Journals (Sweden)

    J. M. Fegyveresi

    2018-01-01

    Full Text Available Observations at the West Antarctic Ice Sheet (WAIS Divide site show that near-surface snow is strongly altered by weather-related processes such as strong winds and temperature fluctuations, producing features that are recognizable in the deep ice core. Prominent glazed surface crusts develop frequently at the site during summer seasons. Surface, snow pit, and ice core observations made in this study during summer field seasons from 2008–2009 to 2012–2013, supplemented by automated weather station (AWS data with short- and longwave radiation sensors, revealed that such crusts formed during relatively low-wind, low-humidity, clear-sky periods with intense daytime sunshine. After formation, such glazed surfaces typically developed cracks in a polygonal pattern likely from thermal contraction at night. Cracking was commonest when several clear days occurred in succession and was generally followed by surface hoar growth; vapor escaping through the cracks during sunny days may have contributed to the high humidity that favored nighttime formation of surface hoar. Temperature and radiation observations show that daytime solar heating often warmed the near-surface snow above the air temperature, contributing to upward mass transfer, favoring crust formation from below, and then surface hoar formation. A simple surface energy calculation supports this observation. Subsequent examination of the WDC06A deep ice core revealed that crusts are preserved through the bubbly ice, and some occur in snow accumulated during winters, although not as commonly as in summertime deposits. Although no one has been on site to observe crust formation during winter, it may be favored by greater wintertime wind packing from stronger peak winds, high temperatures and steep temperature gradients from rapid midwinter warmings reaching as high as −15 °C, and perhaps longer intervals of surface stability. Time variations in crust occurrence in the core may provide

  20. Genetic correlations between brain volumes and the WAIS-III dimensions of verbal comprehension, working memory, perceptual organization, and processing speed.

    Science.gov (United States)

    Posthuma, Daniëlle; Baaré, Wim F C; Hulshoff Pol, Hilleke E; Kahn, René S; Boomsma, Dorret I; De Geus, Eco J C

    2003-04-01

    We recently showed that the correlation of gray and white matter volume with full scale IQ and the Working Memory dimension are completely mediated by common genetic factors (Posthuma et al., 2002). Here we examine whether the other WAIS III dimensions (Verbal Comprehension, Perceptual Organization, Processing Speed) are also related to gray and white matter volume, and whether any of the dimensions are related to cerebellar volume. Two overlapping samples provided 135 subjects from 60 extended twin families for whom both MRI scans and WAIS III data were available. All three brain volumes are related to Working Memory capacity (r = 0.27). This phenotypic correlation is completely due to a common underlying genetic factor. Processing Speed was genetically related to white matter volume (r(g) = 0.39). Perceptual Organization was both genetically (r(g) = 0.39) and environmentally (r(e) = -0.71) related to cerebellar volume. Verbal Comprehension was not related to any of the three brain volumes. It is concluded that brain volumes are genetically related to intelligence which suggests that genes that influence brain volume may also be important for intelligence. It is also noted however, that the direction of causation (i.e., do genes influence brain volume which in turn influences intelligence, or alternatively, do genes influence intelligence which in turn influences brain volume), or the presence or absence of pleiotropy has not been resolved yet.

  1. Age-related commonalities and differences in the relationship between executive functions and intelligence: Analysis of the NAB executive functions module and WAIS-IV scores.

    Science.gov (United States)

    Buczylowska, Dorota; Petermann, Franz

    2017-01-01

    Data from five subtests of the Executive Functions Module of the German Neuropsychological Assessment Battery (NAB) and all ten core subtests of the German Wechsler Adult Intelligence Scale - Fourth Edition (WAIS-IV) were used to examine the relationship between executive functions and intelligence in a comparison of two age groups: individuals aged 18-59 years and individuals aged 60-88 years. The NAB subtests Categories and Word Generation demonstrated a consistent correlation pattern for both age groups. However, the NAB Judgment subtest correlated more strongly with three WAIS-IV indices, the Full Scale IQ (FSIQ), and the General Ability Index (GAI) in the older adult group than in the younger group. Additionally, in the 60-88 age group, the Executive Functions Index (EFI) was more strongly correlated with the Verbal Comprehension Index (VCI) than with the Perceptual Reasoning Index (PRI). Both age groups demonstrated a strong association of the EFI with the FSIQ and the Working Memory Index (WMI). The results imply the potential diagnostic utility of the Judgment subtest and a significant relationship between executive functioning and crystallized intelligence at older ages. Furthermore, it may be concluded that there is a considerable age-independent overlap between the EFI and general intelligence, as well as between the EFI and working memory.

  2. Study protocol

    DEFF Research Database (Denmark)

    Smith, Benjamin E; Hendrick, Paul; Bateman, Marcus

    2017-01-01

    avoidance behaviours, catastrophising, self-efficacy, sport and leisure activity participation, and general quality of life. Follow-up will be 3 and 6 months. The analysis will focus on descriptive statistics and confidence intervals. The qualitative components will follow a thematic analysis approach....... DISCUSSION: This study will evaluate the feasibility of running a definitive large-scale trial on patients with patellofemoral pain, within the NHS in the UK. We will identify strengths and weaknesses of the proposed protocol and the utility and characteristics of the outcome measures. The results from...... this study will inform the design of a multicentre trial. TRIAL REGISTRATION: ISRCTN35272486....

  3. World-Wide Web: The Information Universe.

    Science.gov (United States)

    Berners-Lee, Tim; And Others

    1992-01-01

    Describes the World-Wide Web (W3) project, which is designed to create a global information universe using techniques of hypertext, information retrieval, and wide area networking. Discussion covers the W3 data model, W3 architecture, the document naming scheme, protocols, document formats, comparison with other systems, experience with the W3…

  4. Beyond protocols

    DEFF Research Database (Denmark)

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impact...... information on risk and the exploration of improved methods for decision making on biodiversity management. This is crucial for efficient conservation resource allocation and uptake by stakeholders and the public......., transparency and repeatability of assessments as well as the incorporation of uncertainty should all be explicitly considered. We recommend improved quality control of risk assessments through formalized peer review with clear feedback between assessors and reviewers. Alternatively, a consensus building...

  5. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  6. The communities first (ComFi) study: protocol for a prospective controlled quasi-experimental study to evaluate the impact of area-wide regeneration on mental health and social cohesion in deprived communities.

    Science.gov (United States)

    White, James; Greene, Giles; Dunstan, Frank; Rodgers, Sarah; Lyons, Ronan A; Humphreys, Ioan; John, Ann; Webster, Chris; Palmer, Stephen; Elliott, Eva; Phillips, Ceri J; Fone, David

    2014-10-14

    Recent systematic reviews have highlighted the dearth of evidence on the effectiveness of regeneration on health and health inequalities. 'Communities First' is an area-wide regeneration scheme to improve the lives of people living in the most deprived areas in Wales (UK). This study will evaluate the impact of Communities First on residents' mental health and social cohesion. A prospective controlled quasi-experimental study of the association between residence in Communities First regeneration areas in Caerphilly county borough and change in mental health and social cohesion. The study population is the 4226 residents aged 18-74 years who responded to the Caerphilly Health and Social Needs Study in 2001 (before delivery) and 2008 (after delivery of Communities First). Data on the location, type and cost of Communities First interventions will be extracted from records collected by Caerphilly county borough council. The primary outcome is the change in mental health between 2001 and 2008. Secondary outcomes are changes: in common mental disorder case status (using survey and general practice data), social cohesion and mental health inequalities. Multilevel models will examine change in mental health and social cohesion between Communities First and control areas, adjusting for individual and household level confounding factors. Further models will examine the effects of (1) different types of intervention, (2) contamination across areas, (3) length of residence in a Communities First area, and (4) population migration. We will carry out a cost-consequences analysis to summarise the outcomes generated for participants, as well as service utilisation and utility gains. This study has had approval from the Information Governance Review Panel at Swansea University (Ref: 0266 CF). Findings will be disseminated through peer-review publications, international conferences, policy and practice partners in local and national government, and updates on our study website

  7. Sin-wai, Chan. The Future of Translation Technology: Towards a World without Babel. London and New York: Routledge, 2017. 302 p.

    Directory of Open Access Journals (Sweden)

    Thomas Kelahan

    2018-01-01

    Full Text Available Chan Sin-wai is a professor and chairman of the Department of Translation at the Chinese University of Hong Kong, Shenzhen. Additionally, he is the director of the Center for Translation Technology as well as the university’s MA Program in Computer-aided translation.  In 2016, he published A New Comprehensive Chinese-English Dictionary, Routledge Encyclopedia of Translation Technology and Routledge Encyclopedia of the Chinese Language. His newest book, The Future of Translation Technology: Towards a World without Babel, is described as “an essential read for scholars and researchers of translation studies and computational linguistics, and a guide to system users and professionals.”

  8. Temps, Espace et la Eeprésentation de la Subjectivité Dans les Films de Wong Kar-wai

    Directory of Open Access Journals (Sweden)

    MOREIRA MACEDO, Ludmila

    2006-12-01

    Full Text Available Given the importance of the filmmaker Wong Kar-wai not only in the panorama of the cinema of Hong Kong, but in the contemporary cinematographic production as a whole, this paper proposes an analysis of his work concentrated on the problem of the identity of his characters. What we may call the «wongian subject” can be analyzed through various elements such as the tension between past, present and future, the relationship to public and private space, the changes of the perception of time and memory. Another important question that is analyzed is the relationship of the films with the social and political context of contemporary Hong Kong, because the topics of love, loneliness and alienation which invade the protagonists find relation in the transnational character of the Asian cinema and the fusion – often problematic – between Orient and Occident.

  9. Epilepsy & IQ: the clinical utility of the Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV) indices in the neuropsychological assessment of people with epilepsy.

    Science.gov (United States)

    Baxendale, Sallie; McGrath, Katherine; Thompson, Pamela J

    2014-01-01

    We examined Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV) General Ability Index (GAI) and Full Scale Intelligence Quotient (FSIQ) discrepancies in 100 epilepsy patients; 44% had a significant GAI > FSIQ discrepancy. GAI-FSIQ discrepancies were correlated with the number of antiepileptic drugs taken and duration of epilepsy. Individual antiepileptic drugs differentially interfere with the expression of underlying intellectual ability in this group. FSIQ may significantly underestimate levels of general intellectual ability in people with epilepsy. Inaccurate representations of FSIQ due to selective impairments in working memory and reduced processing speed obscure the contextual interpretation of performance on other neuropsychological tests, and subtle localizing and lateralizing signs may be missed as a result.

  10. Drug adherence and multidisciplinary care in patients with multiple sclerosis: Protocol of a prospective, web-based, patient-centred, nation-wide, Dutch cohort study in glatiramer acetate treated patients (CAIR study

    Directory of Open Access Journals (Sweden)

    Siepman Theodora

    2011-03-01

    an investigator-initiated, prospective, web-based, patient-centred, nation-wide cohort study in the Netherlands. The primary objective is to investigate whether GA adherence is associated with specific disciplines of care or quantities of specific care. The secondary objective is to investigate whether GA adherence is associated with specific aspects of the socio-economic situation, health care and caregivers, disease, treatment or patient characteristics. All data are acquired on-line via a study website. All RRMS patients in the Netherlands starting GA treatment are eligible. Patients are informed by neurologists, nurses, and websites from national MS patient organisations. All data, except on disability, are obtained by patient self-reports on pre-defined and random time points. The number of missed doses and the number of patients having discontinued GA treatment at 6 and 12 months are measures of adherence. Per care discipline the number of sessions and the total duration of care are measures of received care. The full spectrum of non-experimental care that is available in the Netherlands is assessed. Care includes 'physical' contacts, contacts by telephone or internet, health-promoting activities and community care activities. Care received over the preceding 14 days is assessed by patients at baseline and every other week thereafter up to month 12. Every 3 months neurologists and nurses record care disciplines to which patients have been referred. The Dutch Adherence Questionnaire-90 (DAQ-90 is a 90-item questionnaire based on the World Health Organisation (WHO 2003 report on adherence and comprehensively assesses five domains of evidence-based determinants of adherence: socio-economic, health care and caregivers, disease, treatment, and patient-related factors. In addition, self-efficacy is assessed by the MS Self-Efficacy Scale (MSSES, and mood and health-related quality of life (HRQoL by the Multiple Sclerosis Quality of Life-54 questionnaire (MSQoL-54

  11. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  12. Physical Therapy Protocols for Arthroscopic Bankart Repair.

    Science.gov (United States)

    DeFroda, Steven F; Mehta, Nabil; Owens, Brett D

    Outcomes after arthroscopic Bankart repair can be highly dependent on compliance and participation in physical therapy. Additionally, there are many variations in physician-recommended physical therapy protocols. The rehabilitation protocols of academic orthopaedic surgery departments vary widely despite the presence of consensus protocols. Descriptive epidemiology study. Level 3. Web-based arthroscopic Bankart rehabilitation protocols available online from Accreditation Council for Graduate Medical Education (ACGME)-accredited orthopaedic surgery programs were included for review. Individual protocols were reviewed to evaluate for the presence or absence of recommended therapies, goals for completion of ranges of motion, functional milestones, exercise start times, and recommended time to return to sport. Thirty protocols from 27 (16.4%) total institutions were identified out of 164 eligible for review. Overall, 9 (30%) protocols recommended an initial period of strict immobilization. Variability existed between the recommended time periods for sling immobilization (mean, 4.8 ± 1.8 weeks). The types of exercises and their start dates were also inconsistent. Goals to full passive range of motion (mean, 9.2 ± 2.8 weeks) and full active range of motion (mean, 12.2 ± 2.8 weeks) were consistent with other published protocols; however, wide ranges existed within the reviewed protocols as a whole. Only 10 protocols (33.3%) included a timeline for return to sport, and only 3 (10%) gave an estimate for return to game competition. Variation also existed when compared with the American Society of Shoulder and Elbow Therapists' (ASSET) consensus protocol. Rehabilitation protocols after arthroscopic Bankart repair were found to be highly variable. They also varied with regard to published consensus protocols. This discrepancy may lead to confusion among therapists and patients. This study highlights the importance of attending surgeons being very clear and specific with

  13. Overview of the InterGroup protocols

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah A. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Melliar-Smith, P. Michael [Univ. of California, Santa Barbara, CA (United States); Moser, Louise E. [Univ. of California, Santa Barbara, CA (United States)

    2001-03-01

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

  14. The WAIS Melt Monitor: An automated ice core melting system for meltwater sample handling and the collection of high resolution microparticle size distribution data

    Science.gov (United States)

    Breton, D. J.; Koffman, B. G.; Kreutz, K. J.; Hamilton, G. S.

    2010-12-01

    Paleoclimate data are often extracted from ice cores by careful geochemical analysis of meltwater samples. The analysis of the microparticles found in ice cores can also yield unique clues about atmospheric dust loading and transport, dust provenance and past environmental conditions. Determination of microparticle concentration, size distribution and chemical makeup as a function of depth is especially difficult because the particle size measurement either consumes or contaminates the meltwater, preventing further geochemical analysis. Here we describe a microcontroller-based ice core melting system which allows the collection of separate microparticle and chemistry samples from the same depth intervals in the ice core, while logging and accurately depth-tagging real-time electrical conductivity and particle size distribution data. This system was designed specifically to support microparticle analysis of the WAIS Divide WDC06A deep ice core, but many of the subsystems are applicable to more general ice core melting operations. Major system components include: a rotary encoder to measure ice core melt displacement with 0.1 millimeter accuracy, a meltwater tracking system to assign core depths to conductivity, particle and sample vial data, an optical debubbler level control system to protect the Abakus laser particle counter from damage due to air bubbles, a Rabbit 3700 microcontroller which communicates with a host PC, collects encoder and optical sensor data and autonomously operates Gilson peristaltic pumps and fraction collectors to provide automatic sample handling, melt monitor control software operating on a standard PC allowing the user to control and view the status of the system, data logging software operating on the same PC to collect data from the melting, electrical conductivity and microparticle measurement systems. Because microparticle samples can easily be contaminated, we use optical air bubble sensors and high resolution ice core density

  15. Adjuvant whole abdominal intensity modulated radiotherapy (IMRT) for high risk stage FIGO III patients with ovarian cancer (OVAR-IMRT-01) – Pilot trial of a phase I/II study: study protocol

    International Nuclear Information System (INIS)

    Rochet, Nathalie; Jensen, Alexandra D; Sterzing, Florian; Munter, Marc W; Eichbaum, Michael H; Schneeweiss, Andreas; Sohn, Christof; Debus, Juergen; Harms, Wolfgang

    2007-01-01

    The prognosis for patients with advanced epithelial ovarian cancer remains poor despite aggressive surgical resection and platinum-based chemotherapy. More than 60% of patients will develop recurrent disease, principally intraperitoneal, and die within 5 years. The use of whole abdominal irradiation (WAI) as consolidation therapy would appear to be a logical strategy given its ability to sterilize small tumour volumes. Despite the clinically proven efficacy of whole abdominal irradiation, the use of radiotherapy in ovarian cancer has profoundly decreased mainly due to high treatment-related toxicity. Modern intensity-modulated radiation therapy (IMRT) could allow to spare kidneys, liver, and bone marrow while still adequately covering the peritoneal cavity with a homogenous dose. The OVAR-IMRT-01 study is a single center pilot trial of a phase I/II study. Patients with advanced ovarian cancer stage FIGO III (R1 or R2< 1 cm) after surgical resection and platinum-based chemotherapy will be treated with whole abdomen irradiation as consolidation therapy using intensity modulated radiation therapy (IMRT) to a total dose of 30 Gy in 1.5 Gy fractions. A total of 8 patients will be included in this trial. For treatment planning bone marrow, kidneys, liver, spinal cord, vertebral bodies and pelvic bones are defined as organs at risk. The planning target volume includes the entire peritoneal cavity plus pelvic and para-aortic node regions. The primary endpoint of the study is the evaluation of the feasibility of intensity-modulated WAI and the evaluation of the study protocol. Secondary endpoint is evaluation of the toxicity of intensity modulated WAI before continuing with the phase I/II study. The aim is to explore the potential of IMRT as a new method for WAI to decrease the dose to kidneys, liver, bone marrow while covering the peritoneal cavity with a homogenous dose, and to implement whole abdominal intensity-modulated radiotherapy into the adjuvant multimodal

  16. Effectiveness and Limitations of E-Mail Security Protocols

    OpenAIRE

    M. Tariq Banday

    2011-01-01

    Simple Mail Transport Protocol is the most widely adopted protocol for e-mail delivery. However, it lackssecurity features for privacy, authentication of sending party, integrity of e-mail message, nonrepudiationand consistency of e-mail envelope. To make e-mail communication secure and private,e-mail servers incorporate one or more security features using add-on security protocols. The add-onsecurity protocols provide a reasonable security but have several limitations. This paper discussesli...

  17. Re-Framing the World Wide Web

    Science.gov (United States)

    Black, August

    2011-01-01

    The research presented in this dissertation studies and describes how technical standards, protocols, and application programming interfaces (APIs) shape the aesthetic, functional, and affective nature of our most dominant mode of online communication, the World Wide Web (WWW). I examine the politically charged and contentious battle over browser…

  18. Clinical validity of the Japanese version of WAIS-III short forms: Adaptation for patients with mild neurocognitive disorder and dementia.

    Science.gov (United States)

    Takeda, Mihoko; Nakaya, Makoto; Kikuchi, Yoko; Inoue, Sayaka; Kamata, Tomoyuki

    2018-01-01

    We investigated the Japanese WAIS-III short form utility in mild neurocognitive disorder and dementia. Our sample consisted of 108 old patients (ages: 65-89; mean age = 78.3). Fifteen short forms (SFs) and full-scale (FS) IQs were compared. The SFs included Dyads (SF1, SF2), Triads (SF3), Tetrads (SF4, SF5, SF6, SF7), Pentad (SF8), Six-subtest (SF9), Seven-subtests (SF10(a)(b), SF11(a)(b), SF12), and Nine-subtest (SF13). Correlations between SFIQs and FSIQ were all significant. Significant differences also were found in paired t-test between FSIQ and 5 SFIQs (SF2: t = -4.16, SF5: t = -7.06, SF7; t = 2.59, SF10(a): t = 2.56, SF12: t = -4.82; p Arithmetic, Digit Span, Information, Picture Completion, Digit Symbol-Coding, and Matrix Reasoning (Ryan & Ward, 1999), and the formula (Axelrod et al., 2001) should be adopted to convert scaled scores into estimated IQ scores. Copyright © 2017 Elsevier B.V. All rights reserved.

  19. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  20. Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV) processing speed scores as measures of noncredible responding: The third generation of embedded performance validity indicators.

    Science.gov (United States)

    Erdodi, Laszlo A; Abeare, Christopher A; Lichtenstein, Jonathan D; Tyson, Bradley T; Kucharski, Brittany; Zuccato, Brandon G; Roth, Robert M

    2017-02-01

    Research suggests that select processing speed measures can also serve as embedded validity indicators (EVIs). The present study examined the diagnostic utility of Wechsler Adult Intelligence Scale-Fourth Edition (WAIS-IV) subtests as EVIs in a mixed clinical sample of 205 patients medically referred for neuropsychological assessment (53.3% female, mean age = 45.1). Classification accuracy was calculated against 3 composite measures of performance validity as criterion variables. A PSI ≤79 produced a good combination of sensitivity (.23-.56) and specificity (.92-.98). A Coding scaled score ≤5 resulted in good specificity (.94-1.00), but low and variable sensitivity (.04-.28). A Symbol Search scaled score ≤6 achieved a good balance between sensitivity (.38-.64) and specificity (.88-.93). A Coding-Symbol Search scaled score difference ≥5 produced adequate specificity (.89-.91) but consistently low sensitivity (.08-.12). A 2-tailed cutoff on the Coding/Symbol Search raw score ratio (≤1.41 or ≥3.57) produced acceptable specificity (.87-.93), but low sensitivity (.15-.24). Failing ≥2 of these EVIs produced variable specificity (.81-.93) and sensitivity (.31-.59). Failing ≥3 of these EVIs stabilized specificity (.89-.94) at a small cost to sensitivity (.23-.53). Results suggest that processing speed based EVIs have the potential to provide a cost-effective and expedient method for evaluating the validity of cognitive data. Given their generally low and variable sensitivity, however, they should not be used in isolation to determine the credibility of a given response set. They also produced unacceptably high rates of false positive errors in patients with moderate-to-severe head injury. Combining evidence from multiple EVIs has the potential to improve overall classification accuracy. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  1. Mapping the availability and accessibility of healthy food in rural and urban New Zealand--Te Wai o Rona: Diabetes Prevention Strategy.

    Science.gov (United States)

    Wang, Jing; Williams, Margaret; Rush, Elaine; Crook, Nic; Forouhi, Nita G; Simmons, David

    2010-07-01

    Uptake of advice for lifestyle change for obesity and diabetes prevention requires access to affordable 'healthy' foods (high in fibre/low in sugar and fat). The present study aimed to examine the availability and accessibility of 'healthy' foods in rural and urban New Zealand. We identified and visited ('mapped') 1230 food outlets (473 urban, 757 rural) across the Waikato/Lakes areas (162 census areas within twelve regions) in New Zealand, where the Te Wai O Rona: Diabetes Prevention Strategy was underway. At each site, we assessed the availability of 'healthy' foods (e.g. wholemeal bread) and compared their cost with those of comparable 'regular' foods (e.g. white bread). Healthy foods were generally more available in urban than rural areas. In both urban and rural areas, 'healthy' foods were more expensive than 'regular' foods after adjusting for the population and income level of each area. For instance, there was an increasing price difference across bread, meat, poultry, with the highest difference for sugar substitutes. The weekly family cost of a 'healthy' food basket (without sugar) was 29.1% more expensive than the 'regular' basket ($NZ 176.72 v. $NZ 136.84). The difference between the 'healthy' and 'regular' basket was greater in urban ($NZ 49.18) than rural areas ($NZ 36.27) in adjusted analysis. 'Healthy' foods were more expensive than 'regular' choices in both urban and rural areas. Although urban areas had higher availability of 'healthy' foods, the cost of changing to a healthy diet in urban areas was also greater. Improvement in the food environment is needed to support people in adopting healthy food choices.

  2. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  3. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  4. Validade e confiabilidade do índice de capacidade para o trabalho (ICT em trabalhadores de enfermagem Validity and reliability of the work ability index (WAI in nurses' work

    Directory of Open Access Journals (Sweden)

    Sérgio Henrique Almeida da Silva Junior

    2011-06-01

    Full Text Available Este artigo estima a validade e a confiabilidade do índice de capacidade para o trabalho (ICT em 1.436 trabalhadores de enfermagem de três hospitais públicos do Rio de Janeiro, Brasil. Foi estimada a validade dimensional, por meio de análise fatorial exploratória e também a validade correlacional, relacionando o ICT com construtos teoricamente relevantes. A confiabilidade foi avaliada pela análise de consistência interna utilizando o coeficiente alfa de Cronbach e ômega de McDonald. A análise fatorial indicou uma estrutura bidimensional, explicando 52,8% da variância acumulada para os componentes principais e 42% para os eixos principais. As hipóteses teóricas da validade de construto foram confirmadas com correlação direta e significativa do ICT com os escores de recompensa, controle e autoavaliação do estado de saúde; correlação inversa e significativa com a escala de necessidade de recuperação após o trabalho, distúrbios psíquicos menores, esforço, excesso de comprometimento e demanda. Concluiu-se que o ICT apresentou propriedades psicométricas adequadas.This article assesses the validity and reliability of the work ability index (WAI for 1,436 nurses in three public hospitals in Rio de Janeiro, Brazil. The study estimated the dimensional validity by means of exploratory factor analysis, as well as correlational validity, relating WAI to theoretically relevant constructs. Reliability was evaluated by internal consistency analysis, using Cronbach's alpha and McDonald's omega. Factor analysis indicated a two-dimensional structure explaining 52.8% of the accumulated variance for the principal components and 42% for the principal axes. The theoretical hypotheses for the construct's validity were confirmed, with direct and significant correlation between the WAI and the reward, control, and self-rated health scores; an inverse and significant correlation with the scale on need for recovery after work, minor psychological

  5. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  6. Using critiquing for improving medical protocols : Harder than it seems

    NARCIS (Netherlands)

    Marcos, Mar; Berger, Geert; van Harmelen, Frank; ten Teije, Annette; Roomans, Hugo; Miksch, Silvia

    2001-01-01

    Medical protocols are widely recognised to provide clinicians with high-quality and up-to-date recommendations. A critical condition for this is of course that the protocols themselves are of high quality. In this paper we investigate the use of critiquing for improving the quality of medical

  7. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  8. Constraints on ice volume changes of the WAIS and Ross Ice Shelf since the LGM based on cosmogenic exposure ages in the Darwin-Hatherton glacial system of the Transantarctic Mountains

    Science.gov (United States)

    Fink, David; Storey, Bryan; Hood, David; Joy, Kurt; Shulmeister, James

    2010-05-01

    Quantitative assessment of the spatial and temporal scale of ice volume change of the West Antarctic ice sheet (WAIS) and Ross Ice Shelf since the last glacial maximum (LGM) ~20 ka is essential to accurately predict ice sheet response to current and future climate change. Although global sea level rose by approximately 120 metres since the LGM, the contribution of polar ice sheets is uncertain and the timing of any such contribution is controversial. Mackintosh et al (2007) suggest that sectors of the EAIS, similar to those studied at Framnes Mountains where the ice sheet slowly calves at coastal margins, have made marginal contributions to global sea-level rise between 13 and 7 ka. In contrast, Stone et al (2003) document continuing WAIS decay during the mid-late Holocene, raising the question of what was the response of the WAIS since LGM and into the Holocene. Terrestrial evidence is restricted to sparse coastal oasis and ice free mountains which archive limits of former ice advances. Mountain ranges flanking the Darwin-Hatherton glaciers exhibit well-defined moraines, weathering signatures, boulder rich plateaus and glacial tills, which preserve the evidence of advance and retreat of the ice sheet during previous glacial cycles. Previous studies suggest a WAIS at the LGM in this location to be at least 1,000 meters thicker than today. As part of the New Zealand Latitudinal Gradient Project along the Transantarctic, we collected samples for cosmogenic exposure dating at a) Lake Wellman area bordering the Hatherton Glacier, (b) Roadend Nunatak at the confluence of the Darwin and Hatherton glaciers and (c) Diamond Hill which is positioned at the intersection of the Ross Ice Shelf and Darwin Glacier outlet. While the technique of exposure dating is very successful in mid-latitude alpine glacier systems, it is more challenging in polar ice-sheet regions due to the prevalence of cold-based ice over-riding events and absence of outwash processes which removes

  9. Just how wide should 'wide reading' be?

    Science.gov (United States)

    Lipscomb, Martin

    2015-10-01

    Educationalists introduce students to literature search strategies that, with rare exceptions, focus chiefly on the location of primary research reports and systematic reviews of those reports. These sources are, however, unlikely to adequately address the normative and/or metaphysical questions that nurses frequently and legitimately interest themselves in. To meet these interests, non-research texts exploring normative and/or metaphysical topics might and perhaps should, in some situations, be deemed suitable search targets. This seems plausible and, moreover, students are encouraged to 'read widely'. Yet accepting this proposition creates significant difficulties. Specifically, if non-research scholarly sources and artistic or literary (humanities) products dealing with normative/metaphysical issues were included in what are, at present, scientifically orientated searches, it is difficult to draw boundaries around what--if anything--is to be excluded. Engaging with this issue highlights problems with qualitative scholarship's designation as 'evidence'. Thus, absurdly, if qualitative scholarship's findings are labelled evidence because they generate practice-relevant understanding/insight, then any literary or artistic artefact (e.g. a throwaway lifestyle magazine) that generates kindred understandings/insights is presumably also evidence? This conclusion is rejected and it is instead proposed that while artistic, literary, and qualitative inquiries can provide practitioners with powerful and stimulating non-evidential understanding, these sources are not evidence as commonly conceived. © 2015 John Wiley & Sons Ltd.

  10. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  11. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  12. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  13. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  14. Wide-Gap Chalcopyrites

    CERN Document Server

    Siebentritt, Susanne

    2006-01-01

    Chalcopyrites, in particular those with a wide band gap, are fascinating materials in terms of their technological potential in the next generation of thin-film solar cells and in terms of their basic material properties. They exhibit uniquely low defect formation energies, leading to unusual doping and phase behavior and to extremely benign grain boundaries. This book collects articles on a number of those basic material properties of wide-gap chalcopyrites, comparing them to their low-gap cousins. They explore the doping of the materials, the electronic structure and the transport through interfaces and grain boundaries, the formation of the electric field in a solar cell, the mechanisms and suppression of recombination, the role of inhomogeneities, and the technological role of wide-gap chalcopyrites.

  15. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  16. Ultra wide band antennas

    CERN Document Server

    Begaud, Xavier

    2013-01-01

    Ultra Wide Band Technology (UWB) has reached a level of maturity that allows us to offer wireless links with either high or low data rates. These wireless links are frequently associated with a location capability for which ultimate accuracy varies with the inverse of the frequency bandwidth. Using time or frequency domain waveforms, they are currently the subject of international standards facilitating their commercial implementation. Drawing up a complete state of the art, Ultra Wide Band Antennas is aimed at students, engineers and researchers and presents a summary of internationally recog

  17. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  18. World wide biomass resources

    NARCIS (Netherlands)

    Faaij, A.P.C.

    2012-01-01

    In a wide variety of scenarios, policy strategies, and studies that address the future world energy demand and the reduction of greenhouse gas emissions, biomass is considered to play a major role as renewable energy carrier. Over the past decades, the modern use of biomass has increased

  19. Wide angle isotope separator

    International Nuclear Information System (INIS)

    Kantrowitz, A.

    1976-01-01

    A method and apparatus is described for particle separation. The method uses a wide angle radially expanding vapor of a particle mixture. In particular, selective ionization of one isotope type in the particle mixture is produced in a multichamber separator and the ionized isotope type is accelerated out of the path of the vapor expansion for separate collection

  20. Software for simulating IMRT protocol

    Energy Technology Data Exchange (ETDEWEB)

    Fonseca, Thelma C.F.; Campos, Tarcisio P.R. de, E-mail: tcff@ufmg.b, E-mail: campos@nuclear.ufmg.b [Universidade Federal de Minas Gerais (UFMG), Belo Horizonte, MG (Brazil). Dept. de Engenharia Nuclear

    2009-07-01

    The Intensity Modulated Radiation Therapy - IMRT is an advanced technique to cancer treatment widely used on oncology around the world. The present paper describes the SOFT-RT software which is a tool for simulating IMRT protocol. Also, it will be present a cerebral tumor case of studied in which three irradiation windows with distinct orientation were applied. The SOFT-RT collect and export data to MCNP code. This code simulates the photon transport on the voxel model. Later, a out-module from SOFT-RT import the results and express the dose-response superimposing dose and voxel model in a tree-dimensional graphic representation. The present paper address the IMRT software and its function as well a cerebral tumor case of studied is showed. The graphic interface of the SOFT-RT illustrates the example case. (author)

  1. Software for simulating IMRT protocol

    International Nuclear Information System (INIS)

    Fonseca, Thelma C.F.; Campos, Tarcisio P.R. de

    2009-01-01

    The Intensity Modulated Radiation Therapy - IMRT is an advanced technique to cancer treatment widely used on oncology around the world. The present paper describes the SOFT-RT software which is a tool for simulating IMRT protocol. Also, it will be present a cerebral tumor case of studied in which three irradiation windows with distinct orientation were applied. The SOFT-RT collect and export data to MCNP code. This code simulates the photon transport on the voxel model. Later, a out-module from SOFT-RT import the results and express the dose-response superimposing dose and voxel model in a tree-dimensional graphic representation. The present paper address the IMRT software and its function as well a cerebral tumor case of studied is showed. The graphic interface of the SOFT-RT illustrates the example case. (author)

  2. Two-party quantum key agreement protocols under collective noise channel

    Science.gov (United States)

    Gao, Hao; Chen, Xiao-Guang; Qian, Song-Rong

    2018-06-01

    Recently, quantum communication has become a very popular research field. The quantum key agreement (QKA) plays an important role in the field of quantum communication, based on its unconditional security in terms of theory. Among all kinds of QKA protocols, QKA protocols resisting collective noise are widely being studied. In this paper, we propose improved two-party QKA protocols resisting collective noise and present a feasible plan for information reconciliation. Our protocols' qubit efficiency has achieved 26.67%, which is the best among all the two-party QKA protocols against collective noise, thus showing that our protocol can improve the transmission efficiency of quantum key agreement.

  3. A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography.

    Science.gov (United States)

    Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Zhao, Jining

    2015-03-01

    Radio Frequency Identification(RFID) is an automatic identification technology, which can be widely used in healthcare environments to locate and track staff, equipment and patients. However, potential security and privacy problems in RFID system remain a challenge. In this paper, we design a mutual authentication protocol for RFID based on elliptic curve cryptography(ECC). We use pre-computing method within tag's communication, so that our protocol can get better efficiency. In terms of security, our protocol can achieve confidentiality, unforgeability, mutual authentication, tag's anonymity, availability and forward security. Our protocol also can overcome the weakness in the existing protocols. Therefore, our protocol is suitable for healthcare environments.

  4. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  5. Two Cheers for the Trafficking Protocol

    Directory of Open Access Journals (Sweden)

    Anne T Gallagher

    2015-04-01

    Full Text Available The Trafficking Protocol makes an easy target for attack. Its origins lie in an attempt to control a particularly exploitative form of migration that was challenging the ability of States to control their own borders. Its parent instrument is a framework agreement to address transnational organised crime. While paying fleeting attention to the rights of victims, the Protocol, with its emphasis on criminalisation and border protection is nowhere near being a human rights treaty. On top of all that it does not even have a credible enforcement mechanism, allowing states parties wide latitude in interpreting and applying their obligations. Strangely, these seemingly insurmountable flaws have not stopped the Protocol’s emergence as perhaps the single most important development in the fight against human trafficking. Without the Protocol, arguments around definitions would have continued to block the evolution of principles and rules. Without the Protocol it is likely that the human rights system would have continued its shameful tradition of sidelining issues such as forced labour, forced sex, forced marriage and the ritual exploitation of migrant workers through debt. Most critically, the Protocol provided the impetus and template for a series of legal and political developments that, over time, have served to ameliorate some of its greatest weaknesses, including the lack of human rights protections and of a credible oversight mechanism.

  6. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  7. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  8. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  9. Jihadism, Narrow and Wide

    DEFF Research Database (Denmark)

    Sedgwick, Mark

    2015-01-01

    The term “jihadism” is popular, but difficult. It has narrow senses, which are generally valuable, and wide senses, which may be misleading. This article looks at the derivation and use of “jihadism” and of related terms, at definitions provided by a number of leading scholars, and at media usage....... It distinguishes two main groups of scholarly definitions, some careful and narrow, and some appearing to match loose media usage. However, it shows that even these scholarly definitions actually make important distinctions between jihadism and associated political and theological ideology. The article closes...

  10. With eyes wide open

    DEFF Research Database (Denmark)

    Frølunde, Lisbeth; Pedersen, Chistina Hee

    2013-01-01

    and that vulnerability and discomfort are often overlooked as transformative forces. The analysis draws on data from a classroom context in which university students tested methods for facilitating creative thinking in a course on data production and creativity. The data stem from a session on the method “Lego Serious...... in constructions of group identity when an external facilitator disrupts a context. We argue that the facilitation of creative methods calls for keeping our eyes wide open for tensions, for they are the mulch that improves the soil....

  11. Protocol Monitoring Energy Conservation; Protocol Monitoring Energiebesparing

    Energy Technology Data Exchange (ETDEWEB)

    Boonekamp, P.G.M. [ECN Beleidsstudies, Petten (Netherlands); Mannaerts, H. [Centraal Planburea CPB, Den Haag (Netherlands); Tinbergen, W. [Centraal Bureau voor de Statistiek CBS, Den Haag (Netherlands); Vreuls, H.H.J. [Nederlandse onderneming voor energie en milieu Novem, Utrecht (Netherlands); Wesselink, B. [Rijksinstituut voor Volksgezondheid en Milieuhygiene RIVM, Bilthoven (Netherlands)

    2001-12-01

    On request of the Dutch ministry of Economic Affairs five institutes have collaborated to create a 'Protocol Monitoring Energy Conservation', a common method and database to calculate the amount of energy savings realised in past years. The institutes concerned are the Central Bureau of Statistics (CBS), the Netherlands Bureau for Economic Policy Analysis (CPB), the Energy research Centre of the Netherlands (ECN), the National Agency for Energy and Environment (Novem) and the Netherlands Institute of Public Health and the Environment (RIVM). The institutes have agreed upon a clear definition of energy use and energy savings. The demarcation with renewable energy, the saving effects of substitution between energy carriers and the role of import and export of energy have been elaborated. A decomposition method is used to split up the observed change in energy use in a number of effects, on a national and sectoral level. This method includes an analysis of growth effects, effects of structural changes in production and consumption activities and savings on end use or with more efficient conversion processes. To calculate these effects the total energy use is desegregated as much as possible. For each segment a reference energy use is calculated according to the trend in a variable which is supposed to be representative for the use without savings. The difference with the actual energy use is taken as the savings realised. Results are given for the sectors households, industry, agriculture, services and government, transportation and the energy sector; as well as a national figure. A special feature of the protocol method is the application of primary energy use figures in the determination of savings for end users. This means that the use of each energy carrier is increased with a certain amount, according to the conversion losses caused elsewhere in the energy system. The losses concern the base year energy sector and losses abroad for imports of secondary

  12. World wide spatial capital.

    Science.gov (United States)

    Sen, Rijurekha; Quercia, Daniele

    2018-01-01

    In its most basic form, the spatial capital of a neighborhood entails that most aspects of daily life are located close at hand. Urban planning researchers have widely recognized its importance, not least because it can be transformed in other forms of capital such as economical capital (e.g., house prices, retail sales) and social capital (e.g., neighborhood cohesion). Researchers have already studied spatial capital from official city data. Their work led to important planning decisions, yet it also relied on data that is costly to create and update, and produced metrics that are difficult to compare across cities. By contrast, we propose to measure spatial capital in cheap and standardized ways around the world. Hence the name of our project "World Wide Spatial Capital". Our measures are cheap as they rely on the most basic information about a city that is currently available on the Web (i.e., which amenities are available and where). They are also standardized because they can be applied in any city in the five continents (as opposed to previous metrics that were mainly applied in USA and UK). We show that, upon these metrics, one could produce insights at the core of the urban planning discipline: which areas would benefit the most from urban interventions; how to inform planning depending on whether a city's activity is mono- or poly-centric; how different cities fare against each other; and how spatial capital correlates with other urban characteristics such as mobility patterns and road network structure.

  13. Immunocytochemical methods and protocols

    National Research Council Canada - National Science Library

    Javois, Lorette C

    1999-01-01

    ... monoclonal antibodies to study cell differentiation during embryonic development. For a select few disciplines volumes have been published focusing on the specific application of immunocytochemical techniques to that discipline. What distinguished Immunocytochemical Methods and Protocols from earlier books when it was first published four years ago was i...

  14. Critical Response Protocol

    Science.gov (United States)

    Ellingson, Charlene; Roehrig, Gillian; Bakkum, Kris; Dubinsky, Janet M.

    2016-01-01

    This article introduces the Critical Response Protocol (CRP), an arts-based technique that engages students in equitable critical discourse and aligns with the "Next Generation Science Standards" vision for providing students opportunities for language learning while advancing science learning (NGSS Lead States 2013). CRP helps teachers…

  15. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification. In r...

  16. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one...

  17. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  18. Weaving a wide net.

    Science.gov (United States)

    Garber, Linda

    2002-10-01

    SUMMARY Any single approach tostudents' heterosexism and homophobia, however well conceived and executed, is most successful when supported by an integrated campus approach to the problem. Taking as a model the multifaceted efforts at California State University, Fresno-a large public institution located in what can be considered the state's Bible Belt-this essay discusses the strengths and logistics of a campus-wide program to address homophobia and alleviate LGBTQ students' feelings of alienation from the institution and their oppression in society. The efforts of CSUF take place at a number of different levels-classroom, academic department, student services, faculty networking-and can be considered a successful work in progress.

  19. World wide spatial capital.

    Directory of Open Access Journals (Sweden)

    Rijurekha Sen

    Full Text Available In its most basic form, the spatial capital of a neighborhood entails that most aspects of daily life are located close at hand. Urban planning researchers have widely recognized its importance, not least because it can be transformed in other forms of capital such as economical capital (e.g., house prices, retail sales and social capital (e.g., neighborhood cohesion. Researchers have already studied spatial capital from official city data. Their work led to important planning decisions, yet it also relied on data that is costly to create and update, and produced metrics that are difficult to compare across cities. By contrast, we propose to measure spatial capital in cheap and standardized ways around the world. Hence the name of our project "World Wide Spatial Capital". Our measures are cheap as they rely on the most basic information about a city that is currently available on the Web (i.e., which amenities are available and where. They are also standardized because they can be applied in any city in the five continents (as opposed to previous metrics that were mainly applied in USA and UK. We show that, upon these metrics, one could produce insights at the core of the urban planning discipline: which areas would benefit the most from urban interventions; how to inform planning depending on whether a city's activity is mono- or poly-centric; how different cities fare against each other; and how spatial capital correlates with other urban characteristics such as mobility patterns and road network structure.

  20. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  1. Wide area monitoring study

    International Nuclear Information System (INIS)

    Wogman, N.A.; Holdren, G.R. Jr.

    1999-01-01

    Environmental sampling can be used to complement the safeguarding of nuclear material, especially in the detection of undeclared nuclear activities. Routine monitoring of nuclear installations has provided valuable information about the fate of key signature materials within different environmental settings. The approach collates information regarding the generation of individual radiochemical signatures within different nuclear processes, the potential for release of these signatures to the environment and, the chemical form and mobility of the signatures in environmental media along which the material could migrate. Meteorological, geological and hydrological information is used to determine where to sample, what to sample, and how often to sample to provide the greatest likelihood for detection. Multiple strategies can be used to implement wide area monitoring for safeguards purposes. The most complex, and expensive of these, involves establishing extensive networks of fixed location sampling sites. The sites would be operated continuously, and would be instrumented with automated sampling, analysis, and communication equipment to relay information regarding potential anomalies to control centers in near-real time. Alternative strategies can be used to supplement fixed location monitoring equipment, especially in regions that cannot support (financially or logistically) the fixed stations. Through combinations of these various strategies, using a variety of environmental media to monitor a region, we believe that a competent network, one with a quantifiable probability for detecting undeclared nuclear activities, can be designed. While this approach cannot and should not replace other inspection and monitoring activities, it can potentially contribute valuable information to an international safeguards system. (author)

  2. Epistemic Protocols for Distributed Gossiping

    Directory of Open Access Journals (Sweden)

    Krzysztof R. Apt

    2016-06-01

    Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.

  3. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  4. Diplomacy and Diplomatic Protocol

    Directory of Open Access Journals (Sweden)

    Lect. Ph.D Oana Iucu

    2008-12-01

    Full Text Available The present study aims to observe relationships and determining factors between diplomacyand diplomatic protocol as outlined by historical and contextual analyses. The approach is very dynamic,provided that concepts are able to show their richness, antiquity and polyvalence at the level of connotations,semantics, grammatical and social syntax. The fact that this information is up to date determines anattitude of appreciation and a state of positive contamination.

  5. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  6. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  7. Dysphonia risk screening protocol

    Science.gov (United States)

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  8. Wide Awake Hand Surgery.

    Science.gov (United States)

    Lied, Line; Borchgrevink, Grethe E; Finsen, Vilhjalmur

    2017-09-01

    "Wide awake hand surgery", where surgery is performed in local anaesthesia with adrenaline, without sedation or a tourniquet, has become widespread in some countries. It has a number of potential advantages and we wished to evaluate it among our patients. All 122 patients treated by this method during one year were evaluated by the surgeons and the patients on a numerical scale from 0 (best/least) to 10 (worst/most). Theatre time was compared to that recorded for a year when regional or general anaesthesia had been used. The patients' mean score for the general care they had received was 0.1 (SD 0.6), for pain during lidocaine injection 2.4 (SD 2.2), for pain during surgery 0.9 (SD 1.5), and for other discomfort during surgery 0.5 (SD 1.4). Eight reported that they would want general anaesthesia if they were to be operated again. The surgeons' mean evaluation of bleeding during surgery was 1.6 (SD 1.8), oedema during surgery 0.4 (SD 1.1), general disadvantages with the method 1.0 (SD 1.6) and general advantages 6.5 (SD 4.3). The estimation of advantages was 9.9 (DS 0.5) for tendon suture. 28 patients needed intra-operative additional anaesthesia. The proportion was lower among trained hand surgeons and fell significantly during the study period. Non-surgical theatre time was 46 (SD 15) minutes during the study period and 55 (SD 22) minutes during the regional/general period (p theatre.

  9. Analysis of Security Protocols in Embedded Systems

    DEFF Research Database (Denmark)

    Bruni, Alessandro

    Embedded real-time systems have been adopted in a wide range of safety-critical applications—including automotive, avionics, and train control systems—where the focus has long been on safety (i.e., protecting the external world from the potential damage caused by the system) rather than security (i.......e., protecting the system from the external world). With increased connectivity of these systems to external networks the attack surface has grown, and consequently there is a need for securing the system from external attacks. Introducing security protocols in safety critical systems requires careful...... in this direction is to extend saturation-based techniques so that enough state information can be modelled and analysed. Finally, we present a methodology for proving the same security properties in the computational model, by means of typing protocol implementations....

  10. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  11. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Human Resources Division

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  12. Sincalide - the final protocol

    International Nuclear Information System (INIS)

    Clarke, E.A.; Notghi, A.; Hesslewood, S.R.; Harding, L.K.

    2002-01-01

    Full text: HIDA biliary studies examine the gallbladder (GB) to give a percentage ejection fraction (EF). Porcine CCK was an accepted agent for stimulating the GB prior to being withdrawn in the UK from 1998. Sincalide (a synthetic CCK) was the suggested replacement. We have tried many administration regimes in an attempt to get results comparable with our established CCK protocols. Dose concentration and length of infusion times have been studied. Initially a dose of 10 ngm/kg/min given over 2 minutes (manufacturer's recommended dose) was used. This gave falsely low ejection fractions. The dose was reduced to 3 ngm/kg/min over 3 minutes as it was felt the higher dose may be causing constriction of the sphincter of Oddi. This gave a slight improvement with 22 % of patients having normal EF (>35 %). The length of infusion was extended to 15 minutes and the dose concentration reduced again to 0.6 ngm/kg/min. 62 % of patients had a normal EF. However, on many of the curves the gallbladder was still contracting on completion of the 15 minute infusion and began to refill immediately after stopping Sincalide. A further change of protocol was indicated. The infusion time was extended to 30 minutes and the dose concentration per minute kept the same. Imaging began at 30 minutes post HIDA injection and continued for a total of 50 minutes. Sincalide infusion began at 35 minutes if a GB was visualized. This protocol has been performed on 17 patients. 53 % of these had a normal result (comparable with a normal rate of 40 % previously established with CCK) with a mean EF of 60 %. The mean EF of patients with abnormal studies was 15 %. Curves showed a plateau by 30 minutes in 94 % of patients indicating that gallbladder contraction was complete. No normal range is available so results were compared with ultrasound (US). All patients who had an abnormal US scan also had abnormal HIDA results. Three patients had a normal US scan and abnormal HIDA study. These are currently

  13. Distributed Network Protocols

    Science.gov (United States)

    1980-07-01

    MONITORING AGENCY NAME & ADDRESS(II different from Controlting Office) IS. SECURITY CLASS. (of this report) S Office of Naval Research Unclassified...All protocols are extended to networks with changing. topology. S80 8 4 246 DD0I iA 1473 EDITION OF INOV 65 IS OBSOLETE 8 0 24 SECURITY CLASSIFICATION...to the netowrk . f) Each node knows its adjacent links, but not necessarily the identity of its neighbors, i.e. the nodes at the other end of the links

  14. World-Wide Web the information universe

    CERN Document Server

    Berners-Lee, Tim; Groff, Jean-Francois; Pollermann, Bernd

    1992-01-01

    Purpose - The World-Wide Web (W-3) initiative is a practical project designed to bring a global information universe into existence using available technology. This paper seeks to describe the aims, data model, and protocols needed to implement the "web" and to compare them with various contemporary systems. Design/methodology/approach - Since Vannevar Bush's article, men have dreamed of extending their intellect by making their collective knowledge available to each individual by using machines. Computers provide us two practical techniques for human-knowledge interface. One is hypertext, in which links between pieces of text (or other media) mimic human association of ideas. The other is text retrieval, which allows associations to be deduced from the content of text. The W-3 ideal world allows both operations and provides access from any browsing platform. Findings - Various server gateways to other information systems have been produced, and the total amount of information available on the web is...

  15. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  16. New Communication Network Protocol for a Data Acquisition System

    Science.gov (United States)

    Uchida, T.; Fujii, H.; Nagasaka, Y.; Tanaka, M.

    2006-02-01

    An event builder based on communication networks has been used in high-energy physics experiments, and various networks have been adopted, for example, IEEE 802.3 (Ethernet), asynchronous transfer mode (ATM), and so on. In particular, Ethernet is widely used because its infrastructure is very cost effective. Many systems adopt standard protocols that are designed for a general network. However, in the case of an event builder, the communication pattern between stations is different from that in a general network. The unique communication pattern causes congestion, and thus makes it difficulty to quantitatively design the network. To solve this problem, we have developed a simple network protocol for a data acquisition (DAQ) system. The protocol is designed to keep the sequence of senders so that no congestion occurs. We implemented the protocol on a small hardware component [a field programmable gate array (FPGA)] and measured the performance, so that it will be ready for a generic DAQ system

  17. Code Generation for Protocols from CPN models Annotated with Pragmatics

    DEFF Research Database (Denmark)

    Simonsen, Kent Inge; Kristensen, Lars Michael; Kindler, Ekkart

    software implementation satisfies the properties verified for the model. Coloured Petri Nets (CPNs) have been widely used to model and verify protocol software, but limited work exists on using CPN models of protocol software as a basis for automated code generation. In this report, we present an approach...... modelling languages, MDE further has the advantage that models are amenable to model checking which allows key behavioural properties of the software design to be verified. The combination of formally verified models and automated code generation contributes to a high degree of assurance that the resulting...... for generating protocol software from a restricted class of CPN models. The class of CPN models considered aims at being descriptive in that the models are intended to be helpful in understanding and conveying the operation of the protocol. At the same time, a descriptive model is close to a verifiable version...

  18. Redactions in protocols for drug trials: what industry sponsors concealed.

    Science.gov (United States)

    Marquardsen, Mikkel; Ogden, Michelle; Gøtzsche, Peter C

    2018-04-01

    Objective To describe the redactions in contemporary protocols for industry-sponsored randomised drug trials with patient relevant outcomes and to evaluate whether there was a legitimate rationale for the redactions. Design Cohort study. Under the Freedom of Information Act, we requested access to trial protocols approved by a research ethics committee in Denmark from October 2012 to March 2013. We received 17 consecutive protocols, which had been redacted before we got them, and nine protocols without redactions. In five additional cases, the companies refused to let the committees give us access, and in three other cases, documents were missing. Participants Not applicable. Setting Not applicable. Main outcome measure Amount and nature of redactions in 22 predefined key protocol variables. Results The redactions were most widespread in those sections of the protocol where there is empirical evidence of substantial problems with the trustworthiness of published drug trials: data analysis, handling of missing data, detection and analysis of adverse events, definition of the outcomes, interim analyses and premature termination of the study, sponsor's access to incoming data while the study is running, ownership to the data and investigators' publication rights. The parts of the text that were redacted differed widely, both between companies and within the same company. Conclusions We could not identify any legitimate rationale for the redactions. The current mistrust in industry-sponsored drug trials can only change if the industry offers unconditional access to its trial protocols and other relevant documents and data.

  19. Security Property Validation of the Sensor Network Encryption Protocol (SNEP

    Directory of Open Access Journals (Sweden)

    Salekul Islam

    2015-07-01

    Full Text Available Since wireless sensor networks (WSNs have been designed to be deployed in an unsecured, public environment, secured communication is really vital for their wide-spread use. Among all of the communication protocols developed for WSN, the Security Protocols for Sensor Networks (SPINS is exceptional, as it has been designed with security as a goal. SPINS is composed of two building blocks: Secure Network Encryption Protocol (SNEP and the “micro” version of the Timed Efficient Streaming Loss-tolerant Authentication (TESLA, named μTESLA. From the inception of SPINS, a number of efforts have been made to validate its security properties. In this paper, we have validated the security properties of SNEP by using an automated security protocol validation tool, named AVISPA. Using the protocol specification language, HLPSL, we model two combined scenarios—node to node key agreement and counter exchange protocols—followed by data transmission. Next, we validate the security properties of these combined protocols, using different AVISPA back-ends. AVISPA reports the models we have developed free from attacks. However, by analyzing the key distribution sub-protocol, we find one threat of a potential DoS attack that we have demonstrated by modeling in AVISPA. Finally, we propose a modification, and AVISPA reports this modified version free from the potential DoS attack.

  20. [Computerized clinical protocol for occlusion].

    Science.gov (United States)

    Salsench, J; Ferrer, J; Nogueras, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself. In this work we all data collected in the protocol and we give the explanations of each concept.

  1. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  2. Development of wide area environment accelerator operation and diagnostics method

    Science.gov (United States)

    Uchiyama, Akito; Furukawa, Kazuro

    2015-08-01

    Remote operation and diagnostic systems for particle accelerators have been developed for beam operation and maintenance in various situations. Even though fully remote experiments are not necessary, the remote diagnosis and maintenance of the accelerator is required. Considering remote-operation operator interfaces (OPIs), the use of standard protocols such as the hypertext transfer protocol (HTTP) is advantageous, because system-dependent protocols are unnecessary between the remote client and the on-site server. Here, we have developed a client system based on WebSocket, which is a new protocol provided by the Internet Engineering Task Force for Web-based systems, as a next-generation Web-based OPI using the Experimental Physics and Industrial Control System Channel Access protocol. As a result of this implementation, WebSocket-based client systems have become available for remote operation. Also, as regards practical application, the remote operation of an accelerator via a wide area network (WAN) faces a number of challenges, e.g., the accelerator has both experimental device and radiation generator characteristics. Any error in remote control system operation could result in an immediate breakdown. Therefore, we propose the implementation of an operator intervention system for remote accelerator diagnostics and support that can obviate any differences between the local control room and remote locations. Here, remote-operation Web-based OPIs, which resolve security issues, are developed.

  3. Development of wide area environment accelerator operation and diagnostics method

    Directory of Open Access Journals (Sweden)

    Akito Uchiyama

    2015-08-01

    Full Text Available Remote operation and diagnostic systems for particle accelerators have been developed for beam operation and maintenance in various situations. Even though fully remote experiments are not necessary, the remote diagnosis and maintenance of the accelerator is required. Considering remote-operation operator interfaces (OPIs, the use of standard protocols such as the hypertext transfer protocol (HTTP is advantageous, because system-dependent protocols are unnecessary between the remote client and the on-site server. Here, we have developed a client system based on WebSocket, which is a new protocol provided by the Internet Engineering Task Force for Web-based systems, as a next-generation Web-based OPI using the Experimental Physics and Industrial Control System Channel Access protocol. As a result of this implementation, WebSocket-based client systems have become available for remote operation. Also, as regards practical application, the remote operation of an accelerator via a wide area network (WAN faces a number of challenges, e.g., the accelerator has both experimental device and radiation generator characteristics. Any error in remote control system operation could result in an immediate breakdown. Therefore, we propose the implementation of an operator intervention system for remote accelerator diagnostics and support that can obviate any differences between the local control room and remote locations. Here, remote-operation Web-based OPIs, which resolve security issues, are developed.

  4. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  5. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  6. An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography.

    Science.gov (United States)

    Zhang, Zezhong; Qi, Qingqing

    2014-05-01

    Medication errors are very dangerous even fatal since it could cause serious even fatal harm to patients. In order to reduce medication errors, automated patient medication systems using the Radio Frequency Identification (RFID) technology have been used in many hospitals. The data transmitted in those medication systems is very important and sensitive. In the past decade, many security protocols have been proposed to ensure its secure transition attracted wide attention. Due to providing mutual authentication between the medication server and the tag, the RFID authentication protocol is considered as the most important security protocols in those systems. In this paper, we propose a RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography (ECC). The analysis shows the proposed protocol could overcome security weaknesses in previous protocols and has better performance. Therefore, the proposed protocol is very suitable for automated patient medication systems.

  7. 'BREAKS' Protocol for Breaking Bad News.

    Science.gov (United States)

    Narayanan, Vijayakumar; Bista, Bibek; Koshy, Cheriyan

    2010-05-01

    Information that drastically alters the life world of the patient is termed as bad news. Conveying bad news is a skilled communication, and not at all easy. The amount of truth to be disclosed is subjective. A properly structured and well-orchestrated communication has a positive therapeutic effect. This is a process of negotiation between patient and physician, but physicians often find it difficult due to many reasons. They feel incompetent and are afraid of unleashing a negative reaction from the patient or their relatives. The physician is reminded of his or her own vulnerability to terminal illness, and find themselves powerless over emotional distress. Lack of sufficient training in breaking bad news is a handicap to most physicians and health care workers. Adherence to the principles of client-centered counseling is helpful in attaining this skill. Fundamental insight of the patient is exploited and the bad news is delivered in a structured manner, because the patient is the one who knows what is hurting him most and he is the one who knows how to move forward. Six-step SPIKES protocol is widely used for breaking bad news. In this paper, we put forward another six-step protocol, the BREAKS protocol as a systematic and easy communication strategy for breaking bad news. Development of competence in dealing with difficult situations has positive therapeutic outcome and is a professionally satisfying one.

  8. Role of Librarian in Internet and World Wide Web Environment

    OpenAIRE

    K. Nageswara Rao; KH Babu

    2001-01-01

    The transition of traditional library collections to digital or virtual collections presented the librarian with new opportunities. The Internet, Web en-vironment and associated sophisticated tools have given the librarian a new dynamic role to play and serve the new information based society in bet-ter ways than hitherto. Because of the powerful features of Web i.e. distributed, heterogeneous, collaborative, multimedia, multi-protocol, hyperme-dia-oriented architecture, World Wide Web has re...

  9. Gene probes : principles and protocols [Methods in molecular biology, v. 179

    National Research Council Canada - National Science Library

    Rapley, Ralph; Aquino de Muro, Marilena

    2002-01-01

    "Senior scientists Marilena Aquino de Muro and Ralph Rapley have brought together an outstanding collection of time-tested protocols for designing and using genes probes in a wide variety of applications...

  10. Early functional outcome of two surgical protocols used in the repair ...

    African Journals Online (AJOL)

    A wide range of cleft lip and palate management protocols currently exists throughout ... surgery. It includes subjective as well as objective measures of evaluation. Postoperative ... tools that include visual assessment of the lip, teeth, alveolar.

  11. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Aquino de Muro, Marilena; Rapley, Ralph

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  12. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  13. Quality control and conduct of genome-wide association meta-analyses

    DEFF Research Database (Denmark)

    Winkler, Thomas W; Day, Felix R; Croteau-Chonka, Damien C

    2014-01-01

    Rigorous organization and quality control (QC) are necessary to facilitate successful genome-wide association meta-analyses (GWAMAs) of statistics aggregated across multiple genome-wide association studies. This protocol provides guidelines for (i) organizational aspects of GWAMAs, and for (ii) QC...

  14. CASTOR: Widely Distributed Scalable Infospaces

    Science.gov (United States)

    2008-11-01

    Symposium on Networked System Design and Implementation (NSDI 08). San Francisco , CA. April 2008. Gossip-based Distribution Estimation in Peer-to...and S. Paul. RMTP: A reliable multicast transport protocol. In INFOCOM, pages 1414–1424, San Francisco , CA, Mar. 1996. [22] T. Montgomery, B. Whetten...Fast approx- imate reconciliation of set differences. Boston University Computer Science Technical Report 2002-019., 2002. [5] L. Camargos , F. Pedone

  15. Declarative Specification of Fault Tolerant Auction Protocols: The English Auction Case Study

    DEFF Research Database (Denmark)

    Dragoni, Nicola; Gaspari, Mauro

    2012-01-01

    Auction mechanisms are nowadays widely used in electronic commerce Web sites for buying and selling items among different users. The increasing importance of auction protocols in the negotiation phase is not limited to online marketplaces. In fact, the wide applicability of auctions as resource‐a...... about the specification of an English Auction protocol which tolerate crashes of bidding agents and we discuss its properties....

  16. Protocols for Scholarly Communication

    Science.gov (United States)

    Pepe, A.; Yeomans, J.

    2007-10-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should guide authors naturally towards OA publication, and CERN wants to help reach a full open access publishing environment for the particle physics community and related sciences in the next few years.

  17. UNUSUALLY WIDE BINARIES: ARE THEY WIDE OR UNUSUAL?

    International Nuclear Information System (INIS)

    Kraus, Adam L.; Hillenbrand, Lynne A.

    2009-01-01

    We describe an astrometric and spectroscopic campaign to confirm the youth and association of a complete sample of candidate wide companions in Taurus and Upper Sco. Our survey found 15 new binary systems (three in Taurus and 12 in Upper Sco) with separations of 3''-30'' (500-5000 AU) among all of the known members with masses of 2.5-0.012 M sun . The total sample of 49 wide systems in these two regions conforms to only some expectations from field multiplicity surveys. Higher mass stars have a higher frequency of wide binary companions, and there is a marked paucity of wide binary systems near the substellar regime. However, the separation distribution appears to be log-flat, rather than declining as in the field, and the mass ratio distribution is more biased toward similar-mass companions than the initial mass function or the field G-dwarf distribution. The maximum separation also shows no evidence of a limit at ∼ sun . We attribute this result to the post-natal dynamical sculpting that occurs for most field systems; our binary systems will escape to the field intact, but most field stars are formed in denser clusters and undergo significant dynamical evolution. In summary, only wide binary systems with total masses ∼ sun appear to be 'unusually wide'.

  18. Effectiveness of oxaliplatin desensitization protocols.

    Science.gov (United States)

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  19. Deterministic secure communication protocol without using entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

  20. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  1. GossipKit: A Framework of Gossip Protocol Family

    OpenAIRE

    Lin, Shen; Taiani, Francois; Blair, Gordon S.

    2007-01-01

    A large number of gossip protocols have been developed in the last few years to address a wide range of functionalities. So far, however, very few software frameworks have been proposed to ease the development and deployment of these gossip protocols. To address this issue, this paper presents GossipKit, an event-driven framework that provides a generic and extensible architecture for the development of (re)configurable gossip-oriented middleware. GossipKit is based on a generic interaction m...

  2. The HPA photon protocol and proposed electron protocol

    International Nuclear Information System (INIS)

    Pitchford, W.G.

    1985-01-01

    The Hospital Physicists Association (HPA) photon dosimetry protocol has been produced and was published in 1983. Revised values of some components of Csub(lambda) and refinements introduced into the theory in the last few years have enabled new Csub(lambda) values to be produced. The proposed HPA electron protocol is at present in draft form and will be published shortly. Both protocels are discussed. (Auth.)

  3. System Wide Information Management (SWIM)

    Science.gov (United States)

    Hritz, Mike; McGowan, Shirley; Ramos, Cal

    2004-01-01

    This viewgraph presentation lists questions regarding the implementation of System Wide Information Management (SWIM). Some of the questions concern policy issues and strategies, technology issues and strategies, or transition issues and strategies.

  4. Development and implementation of the Dutch protocol for rehabilitative management in amyotrophic lateral sclerosis.

    Science.gov (United States)

    van den Berg, J P; de Groot, I J M; Joha, B C; van Haelst, J M; van Gorcom, P; Kalmijn, S

    2004-12-01

    In the Netherlands, rehabilitation care plays an important role in the symptomatic and palliative treatment of ALS patients. However, until 1999 there were no guidelines or practice parameters available for the management of ALS. Therefore, the Dutch protocol for rehabilitative management in ALS was developed. We describe the development process, the outcome and implementation of the protocol. A concept management protocol was written and the Delphi method was selected to develop the protocol further. This method comprises repetitive discussion sessions from postulates, using a combination of written questionnaires and work-conferences. Between 80 and 90 persons (rehabilitation team members of different professional backgrounds and neurologists) were involved in this process. The protocol was implemented by sending it to all consultants in rehabilitation medicine in the Netherlands; they were asked to inform all the treatment team members about the final protocol and to implement it in their treatment of ALS patients. The protocol was developed in 1999, implemented in 2000 and evaluated in 2001. Recommendations for improvement were made during the evaluation and improvements are currently being developed by an expert group. The protocol is widely used (88.9%) by consultants in rehabilitation medicine and their treatment teams in the Netherlands. The Dutch protocol for rehabilitative management was developed to provide an optimal and adequate care plan for patients with ALS. It is widely used in the Netherlands.

  5. Antibody engineering: methods and protocols

    National Research Council Canada - National Science Library

    Chames, Patrick

    2012-01-01

    "Antibody Engineering: Methods and Protocols, Second Edition was compiled to give complete and easy access to a variety of antibody engineering techniques, starting from the creation of antibody repertoires and efficient...

  6. Implementation of postoperative handoff protocol

    African Journals Online (AJOL)

    Background: Standardised handoff protocols have become necessary patient ... improve the perioperative handoff communications from the cardiac operating theatres to the ICU. ..... as you can imagine, there was push-back to the change.

  7. Data Exchange Protocol in Repsail

    Directory of Open Access Journals (Sweden)

    Gucma Maciej

    2017-12-01

    Full Text Available Article presents implantation and theoretical considerations of data exchange protocol developed for the RepSail project, where main objective was design and building innovative hybrid yacht. One of problems during the design process was improper functioning of data exchange protocols that were available in the commercially available devices to mention navigation purpose NMEA183 or 2000 as well as automation dedicated ones (CAN and similar. Author shows the basis of the dedicated format of exchange for in board devices.

  8. The Groningen protocol: another perspective

    OpenAIRE

    Jotkowitz, A B; Glick, S

    2006-01-01

    The Groningen protocol allows for the euthanasia of severely ill newborns with a hopeless prognosis and unbearable suffering. We understand the impetus for such a protocol but have moral and ethical concerns with it. Advocates for euthanasia in adults have relied on the concept of human autonomy, which is lacking in the case of infants. In addition, biases can potentially influence the decision making of both parents and physicians. It is also very difficult to weigh the element of quality of...

  9. Stochastic Characterization of Communication Network Latency for Wide Area Grid Control Applications.

    Energy Technology Data Exchange (ETDEWEB)

    Ameme, Dan Selorm Kwami [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Guttromson, Ross [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-10-01

    This report characterizes communications network latency under various network topologies and qualities of service (QoS). The characterizations are probabilistic in nature, allowing deeper analysis of stability for Internet Protocol (IP) based feedback control systems used in grid applications. The work involves the use of Raspberry Pi computers as a proxy for a controlled resource, and an ns-3 network simulator on a Linux server to create an experimental platform (testbed) that can be used to model wide-area grid control network communications in smart grid. Modbus protocol is used for information transport, and Routing Information Protocol is used for dynamic route selection within the simulated network.

  10. Quantum Information Protocols with Gaussian States of Light

    DEFF Research Database (Denmark)

    Jacobsen, Christian Scheffmann

    and hardware for secure quantum key distribution. These technologies directly exploit quantum effects, and indeed this is where they offer advantages to classical products. This thesis deals with the development and implementation of quantum information protocols that utilize the rather inexpensive resource......Quantum cryptography is widely regarded as the most mature field within the context of quantum information in the sense that its application and development has produced companies that base their products on genuine quantum mechanical principles. Examples include quantum random number generators...... of Gaussian states. A quantum information protocol is essentially a sequence of state exchanges between some number of parties and a certain ordering of quantum mechanical unitary operators performed by these parties. An example of this is the famous BB84 protocol for secret key generation, where photons...

  11. A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem.

    Science.gov (United States)

    Zhao, Zhenguo

    2014-05-01

    With the fast advancement of the wireless communication technology and the widespread use of medical systems, the radio frequency identification (RFID) technology has been widely used in healthcare environments. As the first important protocol for ensuring secure communication in healthcare environment, the RFID authentication protocols derive more and more attentions. Most of RFID authentication protocols are based on hash function or symmetric cryptography. To get more security properties, elliptic curve cryptosystem (ECC) has been used in the design of RFID authentication protocol. Recently, Liao and Hsiao proposed a new RFID authentication protocol using ECC and claimed their protocol could withstand various attacks. In this paper, we will show that their protocol suffers from the key compromise problem, i.e. an adversary could get the private key stored in the tag. To enhance the security, we propose a new RFID authentication protocol using ECC. Detailed analysis shows the proposed protocol not only could overcome weaknesses in Liao and Hsiao's protocol but also has the same performance. Therefore, it is more suitable for healthcare environments.

  12. World-wide environmental problems

    International Nuclear Information System (INIS)

    Wohlers, H.C.

    1975-01-01

    Man and the physical and natural resources necessary to support him in a civilized society are on a collision course. It is simple to say that man cannot continue to grow in number at an ever-increasing rate without a destructive effect upon the environment. Positive scientific proof for this impending calamity is not now available, yet many indications--sometimes physical and sometimes natural--point toward major world-wide environmental troubles in the near future. A number of environmental problems are described, particularly as they relate to the total world system. A computer model simulating future world-wide environmental trends from 1900 to 2100 A.D. is evaluated and suggested as a major tool for data-gathering purposes to determine the extent of world-wide environmental problems. It is suggested that scientists take an active role in the study of the environment, particularly in relation to man's future on earth

  13. Monoclonal antibodies technology. Protocols

    International Nuclear Information System (INIS)

    Acevado Castro, B.E.

    1997-01-01

    Full text: Immunization. The first step in preparing useful monoclonal antibodies (MAbs) is to immunize an animal (Balb/c for example) with an appropriate antigen. Methods (only for soluble antigen): Solubilize selected antigen in Phosphate buffer solution (PBS) at pH 7.2-7.4, ideally at a final concentration per animal between 10 to 50 μg/ml. It is recommended that the antigen under consideration be incorporated into the emulsion adjuvants in 1:1 volumetric relation. We commonly use Frend's adjuvant (FA) to prepared immunized solution. The first immunization should be prepared with complete FA, and the another could be prepared with incomplete FA. It is recommended to inject mice with 0.2 ml intraperitoneal (ip) or subcutaneous (sc). Our experience suggests the sc route is the preferred route. A minimum protocol for immunizing mice to generate cells for preparing hybridomas is s follows: immunize sc on day 0, boost sc on day 21, take a trial bleeding on day 26; if antibody titters are satisfactory, boost ip on day 35 with antigen only, and remove the spleen to obtain cells for fusion on day 38. Fusion protocol. The myeloma cell line we are using is X63 Ag8.653. At the moment of fusion myeloma cells need a good viability (at least a 95%). 1. Remove the spleen cells from immunized mice using sterile conditions. An immune spleen should yield between 7 a 10x10 7 nucleated cells. 2. Place the spleen in 20 ml of serum-free RPMI 1640 in a Petri dish. Using a needle and syringe, inject the spleen with medium to distend and disrupt the spleen stroma and free the nucleated cells. 3. Flush the cell suspension with a Pasteur pipet to disperse clumps of cells. 4. Centrifuge the spleen cell suspension at 250g for 10 min. Resuspend the pellet in serum-free RPMI 1640. Determine cell concentration using Neuhabuer chamber. 5. Mix the myeloma cells and spleen cells in a conical 50-ml tube in serum-free RPMI 1640, 1 x10 7 spleen cells to 1x10 6 myeloma cells (ratio 10:1). Centrifuge

  14. Wide gap semiconductor microwave devices

    International Nuclear Information System (INIS)

    Buniatyan, V V; Aroutiounian, V M

    2007-01-01

    A review of properties of wide gap semiconductor materials such as diamond, diamond-like carbon films, SiC, GaP, GaN and AlGaN/GaN that are relevant to electronic, optoelectronic and microwave applications is presented. We discuss the latest situation and perspectives based on experimental and theoretical results obtained for wide gap semiconductor devices. Parameters are taken from the literature and from some of our theoretical works. The correspondence between theoretical results and parameters of devices is critically analysed. (review article)

  15. A high performance totally ordered multicast protocol

    Science.gov (United States)

    Montgomery, Todd; Whetten, Brian; Kaplan, Simon

    1995-01-01

    This paper presents the Reliable Multicast Protocol (RMP). RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service such as IP Multicasting. RMP is fully and symmetrically distributed so that no site bears un undue portion of the communication load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These QoS guarantees are selectable on a per packet basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, an implicit naming service, mutually exclusive handlers for messages, and mutually exclusive locks. It has commonly been held that a large performance penalty must be paid in order to implement total ordering -- RMP discounts this. On SparcStation 10's on a 1250 KB/sec Ethernet, RMP provides totally ordered packet delivery to one destination at 842 KB/sec throughput and with 3.1 ms packet latency. The performance stays roughly constant independent of the number of destinations. For two or more destinations on a LAN, RMP provides higher throughput than any protocol that does not use multicast or broadcast.

  16. The Montreal Protocol for Identification of Amusia.

    Science.gov (United States)

    Vuvan, D T; Paquette, S; Mignault Goulet, G; Royal, I; Felezeu, M; Peretz, I

    2018-04-01

    The Montreal Battery for the Evaluation of Amusia (MBEA; Peretz, Champod, & Hyde Annals of the New York Academy of Sciences, 999, 58-75, 2003) is an empirically grounded quantitative tool that is widely used to identify individuals with congenital amusia. The use of such a standardized measure ensures that the individuals tested will conform to a specific neuropsychological profile, allowing for comparisons across studies and research groups. Recently, a number of researchers have published credible critiques of the usefulness of the MBEA as a diagnostic tool for amusia. Here we argue that the MBEA and its online counterpart, the AMUSIA tests (Peretz et al. Music Perception, 25, 331-343, 2008), should be considered steps in a screening process for amusia, rather than standalone diagnostic tools. The goal of this article is to present, in detailed and easily replicable format, the full protocol through which congenital amusics should be identified. In providing information that has often gone unreported in published articles, we aim to clarify the strengths and limitations of the MBEA and to make recommendations for its continued use by the research community as part of the Montreal Protocol for Identification of Amusia.

  17. Protocols and plan of quantum cryptography

    Directory of Open Access Journals (Sweden)

    Milorad S. Markagić

    2012-01-01

    Full Text Available Along with the development of confidentiality of data and resources, there is a need to develop systems that would provide confidentiality. Currently, the most used systems are classical cryptographic systems and encryption public key systems. However, none of these systems provides a solution for the famous 'catch 22' of cryptography. Owing to the intensive development of quantum mechanics, in the last 30 years emerged an entirely new kind of cryptography-quantum cryptography. Its greatest contribution is a possibility to discover an intercepted communication channel from a third party. The question is: is this really true? The question arises: 'If the quantum cryptography is so good, why is not widely used?' The aim of this paper is, on the one hand, to define the basic mechanisms of quantum cryptography IP, and, on the other hand, to point to the shortcomings, as they related to the opportunities of today's devices and flaws in protocols.

  18. World Wide Web Homepage Design.

    Science.gov (United States)

    Tillman, Michael L.

    This paper examines hypermedia design and draws conclusions about how educational research and theory applies to various aspects of World Wide Web (WWW) homepage design. "Hypermedia" is defined as any collection of information which may be textual, graphical, visual, or auditory in nature and which may be accessed via a nonlinear route.…

  19. The World Wide Web Revisited

    Science.gov (United States)

    Owston, Ron

    2007-01-01

    Nearly a decade ago the author wrote in one of the first widely-cited academic articles, Educational Researcher, about the educational role of the web. He argued that educators must be able to demonstrate that the web (1) can increase access to learning, (2) must not result in higher costs for learning, and (3) can lead to improved learning. These…

  20. Variation in radiographic protocols in paediatric interventional cardiology

    International Nuclear Information System (INIS)

    McFadden, S L; Hughes, C M; Winder, R J

    2013-01-01

    The aim of this work is to determine current radiographic protocols in paediatric interventional cardiology (IC) in the UK and Ireland. To do this we investigated which imaging parameters/protocols are commonly used in IC in different hospitals, to identify if a standard technique is used and illustrate any variation in practice. A questionnaire was sent to all hospitals in the UK and Ireland which perform paediatric IC to obtain information on techniques used in each clinical department and on the range of clinical examinations performed. Ethical and research governance approval was sought from the Office for Research Ethics Committees Northern Ireland and the individual trusts. A response rate of 79% was achieved, and a wide variation in technique was found between hospitals. The main differences in technique involved variations in the use of an anti-scatter grid and the use of additional filtration to the radiation beam, frame rates for digital acquisition and pre-programmed projections/paediatric specific programming in the equipment. We conclude that there is no standard protocol for carrying out paediatric IC in the UK or Ireland. Each hospital carries out the IC procedure according to its own local protocols resulting in a wide variation in radiation dose. (paper)

  1. Variation in radiographic protocols in paediatric interventional cardiology.

    Science.gov (United States)

    McFadden, S L; Hughes, C M; Winder, R J

    2013-06-01

    The aim of this work is to determine current radiographic protocols in paediatric interventional cardiology (IC) in the UK and Ireland. To do this we investigated which imaging parameters/protocols are commonly used in IC in different hospitals, to identify if a standard technique is used and illustrate any variation in practice. A questionnaire was sent to all hospitals in the UK and Ireland which perform paediatric IC to obtain information on techniques used in each clinical department and on the range of clinical examinations performed. Ethical and research governance approval was sought from the Office for Research Ethics Committees Northern Ireland and the individual trusts. A response rate of 79% was achieved, and a wide variation in technique was found between hospitals. The main differences in technique involved variations in the use of an anti-scatter grid and the use of additional filtration to the radiation beam, frame rates for digital acquisition and pre-programmed projections/paediatric specific programming in the equipment. We conclude that there is no standard protocol for carrying out paediatric IC in the UK or Ireland. Each hospital carries out the IC procedure according to its own local protocols resulting in a wide variation in radiation dose.

  2. The intergroup protocols: Scalable group communication for the internet

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo [Univ. of California, Santa Barbara, CA (United States)

    2000-12-04

    Reliable group ordered delivery of multicast messages in a distributed system is a useful service that simplifies the programming of distributed applications. Such a service helps to maintain the consistency of replicated information and to coordinate the activities of the various processes. With the increasing popularity of the Internet, there is an increasing interest in scaling the protocols that provide this service to the environment of the Internet. The InterGroup protocol suite, described in this dissertation, provides such a service, and is intended for the environment of the Internet with scalability to large numbers of nodes and high latency links. The InterGroup protocols approach the scalability problem from various directions. They redefine the meaning of group membership, allow voluntary membership changes, add a receiver-oriented selection of delivery guarantees that permits heterogeneity of the receiver set, and provide a scalable reliability service. The InterGroup system comprises several components, executing at various sites within the system. Each component provides part of the services necessary to implement a group communication system for the wide-area. The components can be categorized as: (1) control hierarchy, (2) reliable multicast, (3) message distribution and delivery, and (4) process group membership. We have implemented a prototype of the InterGroup protocols in Java, and have tested the system performance in both local-area and wide-area networks.

  3. Families of quantum fingerprinting protocols

    Science.gov (United States)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  4. Fluid resuscitation for major burn patients with the TMMU protocol.

    Science.gov (United States)

    Luo, Gaoxing; Peng, Yizhi; Yuan, Zhiqiang; Cheng, Wenguang; Wu, Jun; Tang, Jin; Huang, Yuesheng; Fitzgerald, Mark

    2009-12-01

    Fluid resuscitation is one of the critical treatments for the major burn patient in the early phases after injury. We evaluated the practice of fluid resuscitation for severely burned patients with the Third Military Medical University (TMMU) protocol, which is most widely used in many regions of China. Patients with major burns (>30% total body surface area (TBSA)) presenting to Southwest Hospital, Third Military Medical University, between January 2005 and October 2007, were included in this study. Fluid resuscitation was initiated by the TMMU protocol. A total of 71 patients were (46 adults and 25 children) included in this study. All patients survived the first 48 h after injury smoothly and none developed abdominal compartment syndrome or other recognised complications associated with fluid resuscitation. The average quantity of fluid infused was 3.3-61.33% more than that calculated based on the TMMU protocol in both adult and paediatric groups. The average urine output during the first 24h after injury was about 1.2 ml per kg body weight per hour in the two groups, but reached 1.2 ml and 1.7 ml during the second 24h in adult and pediatric groups, respectively. This study indicates that the TMMU protocol for fluid resuscitation is a feasible option for burn patients. Individualised resuscitation - guided by the physiological response to fluid administration - is still important as in other protocols.

  5. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.

    Science.gov (United States)

    Rajeswari, S Raja; Seenivasagam, V

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.

  6. A mechanical protocol to replicate impact in walking footwear.

    Science.gov (United States)

    Price, Carina; Cooper, Glen; Graham-Smith, Philip; Jones, Richard

    2014-01-01

    Impact testing is undertaken to quantify the shock absorption characteristics of footwear. The current widely reported mechanical testing method mimics the heel impact in running and therefore applies excessive energy to walking footwear. The purpose of this study was to modify the ASTM protocol F1614 (Procedure A) to better represent walking gait. This was achieved by collecting kinematic and kinetic data while participants walked in four different styles of walking footwear (trainer, oxford shoe, flip-flop and triple-density sandal). The quantified heel-velocity and effective mass at ground-impact were then replicated in a mechanical protocol. The kinematic data identified different impact characteristics in the footwear styles. Significantly faster heel velocity towards the floor was recorded walking in the toe-post sandals (flip-flop and triple-density sandal) compared with other conditions (e.g. flip-flop: 0.36±0.05 ms(-1) versus trainer: 0.18±0.06 ms(-1)). The mechanical protocol was adapted by altering the mass and drop height specific to the data captured for each shoe (e.g. flip-flop: drop height 7 mm, mass 16.2 kg). As expected, the adapted mechanical protocol produced significantly lower peak force and accelerometer values than the ASTM protocol (pfootwear style specific. Copyright © 2014 Elsevier B.V. All rights reserved.

  7. Perancangan dan Analisis Redistribution Routing Protocol OSPF dan EIGRP

    Directory of Open Access Journals (Sweden)

    DWI ARYANTA

    2014-07-01

    OSPF (Open Shortest Path First and EIGRP (Enhanced Interior Gateway Routing Protocol are two routing protocols are widely used in computer networks. Differences between the characteristics of routing protocols pose a problem in the delivery of data packets. Redistribution technique is the solution for communication between routing protocols. By using the software Cisco Packet Tracer 5.3 in this study were made simulating OSPF and EIGRP redistribution linked by technique, then compared its quality with a single EIGRP and OSPF routing protocols. Testing parameters in this study is the value of the time delay and trace route. Value trace route based on direct calculation of cost and metric compared with the simulation results. The result can be OSPF and EIGRP redistribution process. Value delay redistribution 1% better than OSPF and EIGRP 2-3% under traffic density dependent. In calculating the trace route redistribution is done 2 calculations, the cost for OSPF area and the area of the EIGRP metric. Making primary and alternate paths based on the packet delivery rate and the cost of the smallest metric, it is proved by calculation and simulation. Keywords: OSPF, EIGRP, Redistribution, Delay, Cost, Metric.

  8. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks

    Science.gov (United States)

    Rajeswari, S. Raja; Seenivasagam, V.

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. PMID:26881272

  9. Geographic variation in lumbar diskectomy: a protocol for evaluation.

    Science.gov (United States)

    Barron, M; Kazandjian, V A

    1992-03-01

    In 1989 the Maryland Hospital Association (MHA) began developing a protocol related to lumbar diskectomy, a procedure with widely reported geographic variation in its use. The MHA's Laminectomy Advisory Committee drafted three criteria for performance of lumbar diskectomy and also developed a data-collection instrument with which the eight hospitals participating in a pilot study could abstract the necessary data from medical records. Both individual hospital and aggregate results showed wide variation in compliance with the criteria. These findings suggest research and development activities such as refinement of the data-collection instrument, use of the protocol for bench-marking, further investigation of clinical and other determinants of rate variation, and study of the effect of new diagnostic technology on utilization rates for this procedure.

  10. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  11. Understanding protocol performance: impact of test performance.

    Science.gov (United States)

    Turner, Robert G

    2013-01-01

    This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as

  12. The Geneva Protocol of 1925

    International Nuclear Information System (INIS)

    Mc Elroy, R.J.

    1991-01-01

    This paper reports that when President Gerald Ford signed the instruments of ratification for the Geneva Protocol of 1925 on January 22, 1975, a tortured, half-century-long chapter in U.S. arms control policy was brought to a close. Fifty years earlier, at the Geneva Conference for the Control of the International Trade in Arms, Munitions and Implements of War, the United States had played a key role in drafting and reaching agreement on the Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases and of Bacteriological Methods of Warfare. The protocol, signed by thirty nations, including the United States, on June 17, 1925, prohibits the use in war of asphyxiating, poisonous or other gases, and of all analogous liquids, materials or devices as well as the use of bacteriological methods of warfare

  13. The Kyoto protocol development; La viabilite du protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)

    2002-04-01

    From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)

  14. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    We present our work on using abstract models for formally analysing cryptographic protocols: First, we present an ecient method for verifying trace-based authenticity properties of protocols using nonces, symmetric encryption, and asymmetric encryption. The method is based on a type system...... of Gordon et al., which we modify to support fully-automated type inference. Tests conducted via an implementation of our algorithm found it to be very ecient. Second, we show how privacy may be captured in a symbolic model using an equivalencebased property and give a formal denition. We formalise...

  15. Wide Bandgap Extrinsic Photoconductive Switches

    Energy Technology Data Exchange (ETDEWEB)

    Sullivan, James S. [State Univ. of New York (SUNY), Plattsburgh, NY (United States); Univ. of California, Davis, CA (United States)

    2012-01-20

    Photoconductive semiconductor switches (PCSS) have been investigated since the late 1970s. Some devices have been developed that withstand tens of kilovolts and others that switch hundreds of amperes. However, no single device has been developed that can reliably withstand both high voltage and switch high current. Yet, photoconductive switches still hold the promise of reliable high voltage and high current operation with subnanosecond risetimes. Particularly since good quality, bulk, single crystal, wide bandgap semiconductor materials have recently become available. In this chapter we will review the basic operation of PCSS devices, status of PCSS devices and properties of the wide bandgap semiconductors 4H-SiC, 6H-SiC and 2H-GaN.

  16. Wide range neutron flux monitor

    International Nuclear Information System (INIS)

    Endo, Yorimasa; Fukushima, Toshiki.

    1983-01-01

    Purpose: To provide a wide range neutron-flux monitor adapted such that the flux monitoring function and alarming function can automatically by shifted from pulse counting system to cambel method system. Constitution: A wide range neutron-flux monitor comprises (la) pulse counting system and (lb) cambel-method system for inputting detection signals from neutron detectors and separating them into signals for the pulse measuring system and the cambel measuring system, (2) overlap detection and calculation circuit for detecting the existence of the overlap of two output signals from the (la) and (lb) systems, and (3) trip circuit for judging the abnormal state of neutron detectors upon input of the detection signals. (Seki, T.)

  17. NCenter wide band neutrino beam

    International Nuclear Information System (INIS)

    Stutte, L.G.

    1985-01-01

    This memo describes the physical properties of the currently operating N-Center wide band neutrino beam---commonly called the triplet train, following a past tradition of a triplet lens configuration. In reality, in order to gain a larger momentum acceptance and to minimize the angular divergence of the beam, a quadruplet beam (4 lenses) employing point-to-parallel optics at a central momentum of 300 GeV was built. 6 refs., 13 figs., 1 tab

  18. Wide range neutron detection system

    International Nuclear Information System (INIS)

    Todt, W.H. Sr.

    1978-01-01

    A neutron detection system for reactor control is described which is operable over a wide range of neutron flux levels. The system includes a fission type ionization chamber neutron detector, means for gamma and alpha signal compensation, and means for operating the neutron detector in the pulse counting mode for low neutron flux levels, and in the direct current mode for high neutron flux levels

  19. Wide and High Additive Manufacturing

    Energy Technology Data Exchange (ETDEWEB)

    Post, Brian K. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Roschli, Alex C. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-03-01

    The goal of this project is to develop and demonstrate the enabling technologies for Wide and High Additive Manufacturing (WHAM). WHAM will open up new areas of U.S. manufacturing for very large tooling in support of the transportation and energy industries, significantly reducing cost and lead time. As with Big Area Additive Manufacturing (BAAM), the initial focus is on the deposition of composite materials.

  20. UAV telemetry communications using ZigBee protocol

    Science.gov (United States)

    Nasution, T. H.; Siregar, I.; Yasir, M.

    2017-10-01

    Wireless communication has been widely used in various fields or disciplines such as agriculture, health, engineering, military, and aerospace so as to support the work in that field. The communication technology is typically used for controlling devices and data monitoring. One development of wireless communication is the widely used telemetry system used to reach areas that cannot be reached by humans using UAV (Unmanned Aerial Vehicle) or unmanned aircraft. In this paper we discuss the design of telemetry system in UAV using ZigBee protocol. From the test obtained the system can work well with visualization displays without pause is 20 data per second with a maximum data length of 120 characters.

  1. Wide Bandgap Extrinsic Photoconductive Switches

    Energy Technology Data Exchange (ETDEWEB)

    Sullivan, James S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2013-07-03

    Semi-insulating Gallium Nitride, 4H and 6H Silicon Carbide are attractive materials for compact, high voltage, extrinsic, photoconductive switches due to their wide bandgap, high dark resistance, high critical electric field strength and high electron saturation velocity. These wide bandgap semiconductors are made semi-insulating by the addition of vanadium (4H and 6HSiC) and iron (2H-GaN) impurities that form deep acceptors. These deep acceptors trap electrons donated from shallow donor impurities. The electrons can be optically excited from these deep acceptor levels into the conduction band to transition the wide bandgap semiconductor materials from a semi-insulating to a conducting state. Extrinsic photoconductive switches with opposing electrodes have been constructed using vanadium compensated 6H-SiC and iron compensated 2H-GaN. These extrinsic photoconductive switches were tested at high voltage and high power to determine if they could be successfully used as the closing switch in compact medical accelerators.

  2. World wide developments in shortwall and wide web mining techniques

    Energy Technology Data Exchange (ETDEWEB)

    Pollard, T

    1975-11-01

    The paper describes the progress to date with continuous pillar extraction, and how the typical longwall powered support has been modified to be both strong enough and stable enough to provide roof support for very wide webs. It also describes the operating systems which have been specially designed. The next stages of development are discussed, particularly the provision of continuous conveyor haulage in place of the present-day shuttle car. The author suggests that marrying American coal-getting technology and British roof support technology might increase productivity.

  3. The research and application of the NDP protocol vulnerability attack and the defense technology based on SEND

    Science.gov (United States)

    Xi, Huixing

    2017-05-01

    Neighbor discovery protocol (NDP) is the underlying protocol in the IPv6 protocol, which is mainly used to solve the problem of interconnection between nodes on the same link. But with wide use of IPV6, NDP becomes the main objects of a variety of attacks due to a lack of security mechanism. The paper introduces the working principle of the NDP and methods of how the SEND protocol to enhance NDP security defense. It also analyzes and summarizes the security threats caused by the defects of the protocol itself. On the basis of the SEND protocol, the NDP data packet structure is modified to enhance the security of the SEND. An improved NDP cheating defense technology is put forward to make up the defects of the SEND protocol which can't verify the correctness of the public key and cannot bind the MAC address.

  4. Compact Modbus TCP/IP protocol for data acquisition systems based on limited hardware resources

    Science.gov (United States)

    Bai, Q.; Jin, B.; Wang, D.; Wang, Y.; Liu, X.

    2018-04-01

    The Modbus TCP/IP has been a standard industry communication protocol and widely utilized for establishing sensor-cloud platforms on the Internet. However, numerous existing data acquisition systems built on traditional single-chip microcontrollers without sufficient resources cannot support it, because the complete Modbus TCP/IP protocol always works dependent on a full operating system which occupies abundant hardware resources. Hence, a compact Modbus TCP/IP protocol is proposed in this work to make it run efficiently and stably even on a resource-limited hardware platform. Firstly, the Modbus TCP/IP protocol stack is analyzed and the refined protocol suite is rebuilt by streamlining the typical TCP/IP suite. Then, specific implementation of every hierarchical layer is respectively presented in detail according to the protocol structure. Besides, the compact protocol is implemented in a traditional microprocessor to validate the feasibility of the scheme. Finally, the performance of the proposed scenario is assessed. The experimental results demonstrate that message packets match the frame format of Modbus TCP/IP protocol and the average bandwidth reaches to 1.15 Mbps. The compact protocol operates stably even based on a traditional microcontroller with only 4-kB RAM and 12-MHz system clock, and no communication congestion or frequent packet loss occurs.

  5. Petri Nets in Cryptographic Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Winskel, Glynn

    2001-01-01

    A process language for security protocols is presented together with a semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. By means of an example we illustrate...

  6. Improving the DGK comparison protocol

    NARCIS (Netherlands)

    Veugen, P.J.M.

    2012-01-01

    When processing signals in the encrypted domain, homomorphic encryption can be used to enable linear operations on encrypted data. Comparison of encrypted data however requires an additional protocol between the parties and will be relatively expensive. A well-known and frequently used comparison

  7. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use...... of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools....

  8. Art. 1 Eerste Protocol EVRM

    NARCIS (Netherlands)

    Poelmann, E.

    2014-01-01

    Het recht op bezit is niet in het Europees Verdrag ter bescherming van de rechten van de mens en de fundamentele vrijheden (hierna: EVRM) neergelegd, maar in het Eerste Protocol daarbij (hierna: EP), dat in 1954 in werking is getreden. Het is van belang voor ogen te houden dat de Tweede Wereldoorlog

  9. Bundle Security Protocol for ION

    Science.gov (United States)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  10. Affinity biosensors: techniques and protocols

    National Research Council Canada - National Science Library

    Rogers, Kim R; Mulchandani, Ashok

    1998-01-01

    ..., and government to begin or expand their biosensors research. This volume, Methods in Biotechnology vol. 7: Affinity Biosensors: Techniques and Protocols, describes a variety of classical and emerging transduction technologies that have been interfaced to bioaffinity elements (e.g., antibodies and receptors). Some of the reas...

  11. High Entropy Random Selection Protocols

    NARCIS (Netherlands)

    H. Buhrman (Harry); M. Christandl (Matthias); M. Koucky (Michal); Z. Lotker (Zvi); B. Patt-Shamir; M. Charikar; K. Jansen; O. Reingold; J. Rolim

    2007-01-01

    textabstractIn this paper, we construct protocols for two parties that do not trust each other, to generate random variables with high Shannon entropy. We improve known bounds for the trade off between the number of rounds, length of communication and the entropy of the outcome.

  12. A Student Teamwork Induction Protocol

    Science.gov (United States)

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  13. Cognitive Communications Protocols for SATCOM

    Science.gov (United States)

    2017-10-20

    communications protocols for satellite and space communications with possible broad applications in defense, homeland-security as well as consumer ...communications with possible broad applications in defense, homeland-security, and civilian as well as consumer telecommunications. Such cognitive...vulnerable against smart jammers that may attempt to learn the cognitive radios own behavior . In response, our second class of proposed algorithms

  14. Group covariant protocols for quantum string commitment

    International Nuclear Information System (INIS)

    Tsurumaru, Toyohiro

    2006-01-01

    We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next using this result, we prove that for every irreducible representation of a finite group, there always exists a corresponding nontrivial QSC protocol which reaches a level of security impossible to achieve classically

  15. A History of the Improvement of Internet Protocols Over Satellites Using ACTS

    Science.gov (United States)

    Allman, Mark; Kruse, Hans; Ostermann, Shawn

    2000-01-01

    This paper outlines the main results of a number of ACTS experiments on the efficacy of using standard Internet protocols over long-delay satellite channels. These experiments have been jointly conducted by NASAs Glenn Research Center and Ohio University over the last six years. The focus of our investigations has been the impact of long-delay networks with non-zero bit-error rates on the performance of the suite of Internet protocols. In particular, we have focused on the most widely used transport protocol, the Transmission Control Protocol (TCP), as well as several application layer protocols. This paper presents our main results, as well as references to more verbose discussions of our experiments.

  16. A Push-pull Protocol to Reduce Colonization of Bird Nest Boxes by Honey Bees.

    Science.gov (United States)

    Efstathion, Caroline A; Kern, William H

    2016-09-04

    Introduction of the invasive Africanized honey bee (AHB) into the Neotropics is a serious problem for many cavity nesting birds, specifically parrots. These bees select cavities that are suitable nest sites for birds, resulting in competition. The difficulty of removing bees and their defensive behavior makes a prevention protocol necessary. Here, we describe a push-pull integrated pest management protocol to deter bees from inhabiting bird boxes by applying a bird safe insecticide, permethrin, to repel bees from nest boxes, while simultaneously attracting them to pheromone-baited swarm traps. Shown here is an example experiment using Barn Owl nest boxes. This protocol successfully reduced colonization of Barn Owl nest boxes by Africanized honey bees. This protocol is flexible, allowing adjustments to accommodate a wide range of bird species and habitats. This protocol could benefit conservation efforts where AHB are located.

  17. Advanced use of World-Wide Web in the online system of DELPHI

    International Nuclear Information System (INIS)

    Doenszelmann, M.; Carvalho, D.; Du, S.; Tennebo, F.

    1996-01-01

    The World-Wide Web technologies used by the DELPHI experiment at CERN to provide easy access to information of the On-line System. WWW technology on both client and server side is used in five different projects. The World-Wide Web has its advantages concerning the network technology, the practical user interface and its scalability. It however also demands a stateless protocol and format negotiation. (author)

  18. Wide-range voltage modulation

    International Nuclear Information System (INIS)

    Rust, K.R.; Wilson, J.M.

    1992-06-01

    The Superconducting Super Collider's Medium Energy Booster Abort (MEBA) kicker modulator will supply a current pulse to the abort magnets which deflect the proton beam from the MEB ring into a designated beam stop. The abort kicker will be used extensively during testing of the Low Energy Booster (LEB) and the MEB rings. When the Collider is in full operation, the MEBA kicker modulator will abort the MEB beam in the event of a malfunction during the filling process. The modulator must generate a 14-μs wide pulse with a rise time of less than 1 μs, including the delay and jitter times. It must also be able to deliver a current pulse to the magnet proportional to the beam energy at any time during ramp-up of the accelerator. Tracking the beam energy, which increases from 12 GeV at injection to 200 GeV at extraction, requires the modulator to operate over a wide range of voltages (4 kV to 80 kV). A vacuum spark gap and a thyratron have been chosen for test and evaluation as candidate switches for the abort modulator. Modulator design, switching time delay, jitter and pre-fire data are presented

  19. Genome-wide profiling of transcription factor binding and epigenetic marks in adipocytes by ChIP-seq

    DEFF Research Database (Denmark)

    Nielsen, Ronni; Mandrup, Susanne

    2014-01-01

    of the most widely used of these technologies. Using these methods, association of transcription factors, cofactors, and epigenetic marks can be mapped to DNA in a genome-wide manner. Here, we provide a detailed protocol for performing ChIP-seq analyses in preadipocytes and adipocytes. We have focused mainly...

  20. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  1. The Classroom Observation Protocol for Undergraduate STEM (COPUS): A New Instrument to Characterize University STEM Classroom Practices

    OpenAIRE

    Smith, Michelle K.; Jones, Francis H. M.; Gilbert, Sarah L.; Wieman, Carl E.

    2013-01-01

    Instructors and the teaching practices they employ play a critical role in improving student learning in college science, technology, engineering, and mathematics (STEM) courses. Consequently, there is increasing interest in collecting information on the range and frequency of teaching practices at department-wide and institution-wide scales. To help facilitate this process, we present a new classroom observation protocol known as the Classroom Observation Protocol for Undergraduate STEM or C...

  2. On TCP-based Session Initiation Protocol (SIP) Server Overload Control

    OpenAIRE

    Shen, Charles; Schulzrinne, Henning

    2010-01-01

    The Session Initiation Protocol (SIP) server overload management has attracted interest since SIP is being widely deployed in the Next Generation Networks (NGN) as a core signaling protocol. Yet all existing SIP overload control work is focused on SIP-over-UDP, despite the fact that TCP is increasingly seen as the more viable choice of SIP transport. This paper answers the following questions: is the existing TCP flow control capable of handling the SIP overload problem? If not, why and how c...

  3. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  4. Standardised test protocol (Constant Score) for evaluation of functionality in patients with shoulder disorders

    DEFF Research Database (Denmark)

    Ban, Ilija; Troelsen, Anders; Christiansen, David Høyrup

    2013-01-01

    INTRODUCTION: The Constant Score (CS), developed as a scoring system to evaluate overall functionality of patients with shoulder disorders, is widely used but has been criticised for relying on an imprecise terminology and for lack of a standardised methodology. A modified guideline was therefore...... differences. One of the authors of the modified CS approved both the English and the Danish test protocol. CONCLUSION: A simple test protocol of the modified CS was developed in both English and Danish. With precise terminology and definitions, the test protocol is the first of its kind. We suggest its use...

  5. Phase Transition in Protocols Minimizing Work Fluctuations

    Science.gov (United States)

    Solon, Alexandre P.; Horowitz, Jordan M.

    2018-05-01

    For two canonical examples of driven mesoscopic systems—a harmonically trapped Brownian particle and a quantum dot—we numerically determine the finite-time protocols that optimize the compromise between the standard deviation and the mean of the dissipated work. In the case of the oscillator, we observe a collection of protocols that smoothly trade off between average work and its fluctuations. However, for the quantum dot, we find that as we shift the weight of our optimization objective from average work to work standard deviation, there is an analog of a first-order phase transition in protocol space: two distinct protocols exchange global optimality with mixed protocols akin to phase coexistence. As a result, the two types of protocols possess qualitatively different properties and remain distinct even in the infinite duration limit: optimal-work-fluctuation protocols never coalesce with the minimal-work protocols, which therefore never become quasistatic.

  6. Database communication protocol analyses and security detection

    International Nuclear Information System (INIS)

    Luo Qun; Liu Qiushi

    2003-01-01

    In this paper we introduced the analysis of TDS protocol in the communication application between Client and Server about SYBASE and MICROSOFT SQL SERVER and do some test for some bugs existed in the protocol. (authors)

  7. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  8. Improving the wide resonance approximation

    International Nuclear Information System (INIS)

    Aboustta, Mohamed A.; Martinez, Aquilino S.

    1999-01-01

    A resonance is considered wide if its practical width, in energy, exceeds the average energy loss per collision, E(1-α A )/2, of the absorbing material. When the mass number, A, is taken infinite, the scattering produces only a change in the direction of motion of the neutron and not in its energy. Based on this assumption, the integral in the slowing-down equation describing the contribution of the resonant absorber is evaluated by taking its limit when α A →1. This work questions the necessity to take such a limit and shows that it is still possible to obtain a simple and more accurate expression for the integral without taking such limit

  9. Improving the wide resonance approximation

    Energy Technology Data Exchange (ETDEWEB)

    Aboustta, Mohamed A.; Martinez, Aquilino S

    1999-03-01

    A resonance is considered wide if its practical width, in energy, exceeds the average energy loss per collision, E(1-{alpha}{sub A})/2, of the absorbing material. When the mass number, A, is taken infinite, the scattering produces only a change in the direction of motion of the neutron and not in its energy. Based on this assumption, the integral in the slowing-down equation describing the contribution of the resonant absorber is evaluated by taking its limit when {alpha}{sub A}{yields}1. This work questions the necessity to take such a limit and shows that it is still possible to obtain a simple and more accurate expression for the integral without taking such limit.

  10. Enterprise wide transparent information access

    International Nuclear Information System (INIS)

    Brown, J.

    1995-05-01

    The information management needs of the Department of Energy (DOE) represents a fertile domain for the development of highly sophisticated yet intuitive enterprise-wide computing solutions. These solutions must support business operations, research agendas, technology development efforts, decision support, and other application areas with a user base ranging from technical staff to the highest levels of management. One area of primary interest is in the Environmental Restoration and Waste Management Branch of DOE. In this arena, the issue of tracking and managing nuclear waste related to the long legacy of prior defense production and research programs is one of high visibility and great concern. The Tank Waste Information Network System (TWINS) application has been created by the Pacific Northwest Laboratory (PNL) for the DOE to assist in managing and accessing the information related to this mission. The TWINS solution addresses many of the technical issues faced by other efforts to provide integrated information access to a wide variety of stakeholders. TWINS provides secure transparent access to distributed heterogeneous multimedia information sources from around the DOE complex. The users interact with the information through a consistent user interface that presents the desired data in a common format regardless of the structure of the source information. The solutions developed by the TWINS project represent an integration of several technologies and products that can be applied to other mission areas within DOE and other government agencies. These solutions are now being applied to public and private sector problem domains as well. The successful integration and inter-operation of both commercial and custom modules into a flexible and extensible information architecture will help ensure that new problems facing DOE and other clients can be addressed more rapidly in the future by re-use of existing tools and techniques proven viable through the TWINS efforts

  11. From protocol to published report

    DEFF Research Database (Denmark)

    Berendt, Louise; Callréus, Torbjörn; Petersen, Lene Grejs

    2016-01-01

    and published reports of academic clinical drug trials. METHODS: A comparison was made between study protocols and their corresponding published reports. We assessed the overall consistency, which was defined as the absence of discrepancy regarding study type (categorized as either exploratory or confirmatory...... in 1999, 2001, and 2003, 95 of which fulfilled the eligibility criteria and had at least one corresponding published report reporting data on trial subjects. Overall consistency was observed in 39% of the trials (95% CI: 29 to 49%). Randomized controlled trials (RCTs) constituted 72% (95% CI: 63 to 81......%) of the sample, and 87% (95% CI: 80 to 94%) of the trials were hospital based. CONCLUSIONS: Overall consistency between protocols and their corresponding published reports was low. Motivators for the inconsistencies are unknown but do not seem restricted to economic incentives....

  12. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  13. Feasible quantum communication complexity protocol

    International Nuclear Information System (INIS)

    Galvao, Ernesto F.

    2002-01-01

    I show that a simple multiparty communication task can be performed more efficiently with quantum communication than with classical communication, even with low detection efficiency η. The task is a communication complexity problem in which distant parties need to compute a function of the distributed inputs, while minimizing the amount of communication between them. A realistic quantum optical setup is suggested that can demonstrate a five-party quantum protocol with higher-than-classical performance, provided η>0.33

  14. Cost estimation of Kyoto Protocol

    International Nuclear Information System (INIS)

    Di Giulio, Enzo

    2005-01-01

    This article proposes a reflection on important aspects in the costs determination performance of Kyoto Protocol. The evaluation of the main models evidence possible impacts on the economies. A key role in the determination of the cost is represented by the relative hypothesis to emission trading and the projects CDM-JI and from the political capacity at the cost negative or equal to zero [it

  15. Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, Robert [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht, Cheryn [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  16. Behavior Protocols for Software Components

    Czech Academy of Sciences Publication Activity Database

    Plášil, František; Višňovský, Stanislav

    2002-01-01

    Roč. 28, č. 11 (2002), s. 1056-1076 ISSN 0098-5589 R&D Projects: GA AV ČR IAA2030902; GA ČR GA201/99/0244 Grant - others:Eureka(XE) Pepita project no.2033 Institutional research plan: AV0Z1030915 Keywords : behavior protocols * component-based programming * software architecture Subject RIV: JC - Computer Hardware ; Software Impact factor: 1.170, year: 2002

  17. Desensitization protocols and their outcome.

    Science.gov (United States)

    Marfo, Kwaku; Lu, Amy; Ling, Min; Akalin, Enver

    2011-04-01

    In the last decade, transplantation across previously incompatible barriers has increasingly become popular because of organ donor shortage, availability of better methods of detecting and characterizing anti-HLA antibodies, ease of diagnosis, better understanding of antibody-mediated rejection, and the availability of effective regimens. This review summarizes all manuscripts published since the first publication in 2000 on desensitized patients and discusses clinical outcomes including acute and chronic antibody-mediated rejection rate, the new agents available, kidney paired exchange programs, and the future directions in sensitized patients. There were 21 studies published between 2000 and 2010, involving 725 patients with donor-specific anti-HLA antibodies (DSAs) who underwent kidney transplantation with different desensitization protocols. All studies were single center and retrospective. The patient and graft survival were 95% and 86%, respectively, at a 2-year median follow-up. Despite acceptable short-term patient and graft survivals, acute rejection rate was 36% and acute antibody-mediated rejection rate was 28%, which is significantly higher than in nonsensitized patients. Recent studies with longer follow-up of those patients raised concerns about long-term success of desensitization protocols. The studies utilizing protocol biopsies in desensitized patients also reported higher subclinical and chronic antibody-mediated rejection. An association between the strength of DSAs determined by median fluorescence intensity values of Luminex single-antigen beads and risk of rejection was observed. Two new agents, bortezomib, a proteasome inhibitor, and eculizumab, an anti-complement C5 antibody, were recently introduced to desensitization protocols. An alternative intervention is kidney paired exchange, which should be considered first for sensitized patients. © 2011 by the American Society of Nephrology

  18. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  19. Formal analysis of a fair payment protocol

    NARCIS (Netherlands)

    J.G. Cederquist; M.T. Dashti (Mohammad)

    2004-01-01

    textabstractWe formally specify a payment protocol. This protocol is intended for fair exchange of time-sensitive data. Here the ?-CRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free ?-calculus. These properties are then verified

  20. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, M.T.

    2004-01-01

    We formally specify a payment protocol. This protocol is intended for fair exchange of timesensitive data. Here the μCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free μ-calculus. These properties are then verified using the finite

  1. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi; Dimitrakos, Theo; Martinelli, Fabio

    We formally specify a payment protocol described by Vogt et al. This protocol is intended for fair exchange of time-sensitive data. Here the mCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free mu-calculus. These properties are then

  2. Advanced dementia pain management protocols.

    Science.gov (United States)

    Montoro-Lorite, Mercedes; Canalias-Reverter, Montserrat

    Pain management in advanced dementia is complex because of neurological deficits present in these patients, and nurses are directly responsible for providing interventions for the evaluation, management and relief of pain for people suffering from this health problem. In order to facilitate and help decision-makers, pain experts recommend the use of standardized protocols to guide pain management, but in Spain, comprehensive pain management protocols have not yet been developed for advanced dementia. This article reflects the need for an integrated management of pain in advanced dementia. From the review and analysis of the most current and relevant studies in the literature, we performed an approximation of the scales for the determination of pain in these patients, with the observational scale PAINAD being the most recommended for the hospital setting. In addition, we provide an overview for comprehensive management of pain in advanced dementia through the conceptual framework «a hierarchy of pain assessment techniques by McCaffery and Pasero» for the development and implementation of standardized protocols, including a four-phase cyclical process (evaluation, planning/performance, revaluation and recording), which can facilitate the correct management of pain in these patients. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.

  3. A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.

    Science.gov (United States)

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2015-08-01

    Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based RFID tag authentication protocol in TMIS. Their protocol uses lightweight hash operation and synchronized secret value shared between back-end server and tag, which is more secure and efficient than other related RFID authentication protocols. Unfortunately, in this paper, we demonstrate that Srivastava et al.'s tag authentication protocol has a serious security problem in that an adversary may use the stolen/lost reader to connect to the medical back-end server that store information associated with tagged objects and this privacy damage causing the adversary could reveal medical data obtained from stolen/lost readers in a malicious way. Therefore, we propose a secure and efficient RFID tag authentication protocol to overcome security flaws and improve the system efficiency. Compared with Srivastava et al.'s protocol, the proposed protocol not only inherits the advantages of Srivastava et al.'s authentication protocol for TMIS but also provides better security with high system efficiency.

  4. Wide area continuous offender monitoring

    Energy Technology Data Exchange (ETDEWEB)

    Hoshen, J. [Lucent Technologies (United States); Drake, G. [New Mexico Dept. of Corrections, Santa Fe, NM (United States); Spencer, D. [Sandia National Labs., Albuquerque, NM (United States)

    1996-11-01

    The corrections system in the U.S. is supervising over five million offenders. This number is rising fast and so are the direct and indirect costs to society. To improve supervision and reduce the cost of parole and probation, first generation home arrest systems were introduced in 1987. While these systems proved to be helpful to the corrections system, their scope is rather limited because they only cover an offender at a single location and provide only a partial time coverage. To correct the limitations of first-generation systems, second-generation wide area continuous electronic offender monitoring systems, designed to monitor the offender at all times and locations, are now on the drawing board. These systems use radio frequency location technology to track the position of offenders. The challenge for this technology is the development of reliable personal locator devices that are small, lightweight, with long operational battery life, and indoors/outdoors accuracy of 100 meters or less. At the center of a second-generation system is a database that specifies the offender`s home, workplace, commute, and time the offender should be found in each. The database could also define areas from which the offender is excluded. To test compliance, the system would compare the observed coordinates of the offender with the stored location for a given time interval. Database logfiles will also enable law enforcement to determine if a monitored offender was present at a crime scene and thus include or exclude the offender as a potential suspect.

  5. Wide Field Radio Transient Surveys

    Science.gov (United States)

    Bower, Geoffrey

    2011-04-01

    The time domain of the radio wavelength sky has been only sparsely explored. Nevertheless, serendipitous discovery and results from limited surveys indicate that there is much to be found on timescales from nanoseconds to years and at wavelengths from meters to millimeters. These observations have revealed unexpected phenomena such as rotating radio transients and coherent pulses from brown dwarfs. Additionally, archival studies have revealed an unknown class of radio transients without radio, optical, or high-energy hosts. The new generation of centimeter-wave radio telescopes such as the Allen Telescope Array (ATA) will exploit wide fields of view and flexible digital signal processing to systematically explore radio transient parameter space, as well as lay the scientific and technical foundation for the Square Kilometer Array. Known unknowns that will be the target of future transient surveys include orphan gamma-ray burst afterglows, radio supernovae, tidally-disrupted stars, flare stars, and magnetars. While probing the variable sky, these surveys will also provide unprecedented information on the static radio sky. I will present results from three large ATA surveys (the Fly's Eye survey, the ATA Twenty CM Survey (ATATS), and the Pi GHz Survey (PiGSS)) and several small ATA transient searches. Finally, I will discuss the landscape and opportunities for future instruments at centimeter wavelengths.

  6. Wide spectral band beam analysis

    Science.gov (United States)

    Aharon, Oren

    2015-03-01

    The reality in laser beam profiling is that measurements are performed over a wide spectrum of wavelengths and power ranges. Many applications use multiple laser wavelengths with very different power levels, a fact which dictates a need for a better measuring tool. Rapid progress in the fiber laser area has increased the demand for lasers in the wavelength range of 900 - 1030 nm, while the telecommunication market has increased the demand for wavelength range of 1300nm - 1600 nm, on the other hand the silicone chip manufacturing and mass production requirements tend to lower the laser wavelength towards the 190nm region. In many cases there is a need to combine several lasers together in order to perform a specific task. A typical application is to combine one visible laser for pointing, with a different laser for material processing with a very different wavelength and power level. The visible laser enables accurate pointing before the second laser is operated. The beam profile of the intensity distribution is an important parameter that indicates how a laser beam will behave in an application. Currently a lab, where many different lasers are used, will find itself using various laser beam profilers from several vendors with different specifications and accuracies. It is the propose of this article to present a technological breakthrough in the area of detectors, electronics and optics allowing intricate measurements of lasers with different wavelength and with power levels that vary many orders of magnitude by a single beam profiler.

  7. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  8. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  9. Direct Cellular Lysis/Protein Extraction Protocol for Soil Metaproteomics

    Energy Technology Data Exchange (ETDEWEB)

    Chourey, Karuna [ORNL; Jansson, Janet [Lawrence Berkeley National Laboratory (LBNL); Verberkmoes, Nathan C [ORNL; Shah, Manesh B [ORNL; Chavarria, Krystle L. [Lawrence Berkeley National Laboratory (LBNL); Tom, Lauren M [Lawrence Berkeley National Laboratory (LBNL); Brodie, Eoin L. [Lawrence Berkeley National Laboratory (LBNL); Hettich, Robert {Bob} L [ORNL

    2010-01-01

    We present a novel direct protocol for deep proteome characterization of microorganisms in soil. The method employs thermally assisted detergent-based cellular lysis (SDS) of soil samples, followed by TCA precipitation for proteome extraction/cleanup prior to liquid chromatography-mass spectrometric characterization. This approach was developed and optimized using different soils inoculated with genome-sequenced bacteria (Gram-negative Pseudomonas putida or Gram-positive Arthrobacter chlorophenolicus). Direct soil protein extraction was compared to protein extraction from cells isolated from the soil matrix prior to lysis (indirect method). Each approach resulted in identification of greater than 500 unique proteins, with a wide range in molecular mass and functional categories. To our knowledge, this SDS-TCA approach enables the deepest proteome characterizations of microbes in soil to date, without significant biases in protein size, localization, or functional category compared to pure cultures. This protocol should provide a powerful tool for ecological studies of soil microbial communities.

  10. Wireless Intelligent Sensors Management Application Protocol-WISMAP

    Directory of Open Access Journals (Sweden)

    Antonio Jesus Yuste-Delgado

    2010-09-01

    Full Text Available Although many recent studies have focused on the development of new applications for wireless sensor networks, less attention has been paid to knowledge-based sensor nodes. The objective of this work is the development in a real network of a new distributed system in which every sensor node can execute a set of applications, such as fuzzy ruled-base systems, measures, and actions. The sensor software is based on a multi-agent structure that is composed of three components: management, application control, and communication agents; a service interface, which provides applications the abstraction of sensor hardware and other components; and an application layer protocol. The results show the effectiveness of the communication protocol and that the proposed system is suitable for a wide range of applications. As real world applications, this work presents an example of a fuzzy rule-based system and a noise pollution monitoring application that obtains a fuzzy noise indicator.

  11. Automatic Reverse Engineering of Private Flight Control Protocols of UAVs

    Directory of Open Access Journals (Sweden)

    Ran Ji

    2017-01-01

    Full Text Available The increasing use of civil unmanned aerial vehicles (UAVs has the potential to threaten public safety and privacy. Therefore, airspace administrators urgently need an effective method to regulate UAVs. Understanding the meaning and format of UAV flight control commands by automatic protocol reverse-engineering techniques is highly beneficial to UAV regulation. To improve our understanding of the meaning and format of UAV flight control commands, this paper proposes a method to automatically analyze the private flight control protocols of UAVs. First, we classify flight control commands collected from a binary network trace into clusters; then, we analyze the meaning of flight control commands by the accumulated error of each cluster; next, we extract the binary format of commands and infer field semantics in these commands; and finally, we infer the location of the check field in command and the generator polynomial matrix. The proposed approach is validated via experiments on a widely used consumer UAV.

  12. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  13. Asymptotic adaptive bipartite entanglement-distillation protocol

    International Nuclear Information System (INIS)

    Hostens, Erik; Dehaene, Jeroen; De Moor, Bart

    2006-01-01

    We present an asymptotic bipartite entanglement-distillation protocol that outperforms all existing asymptotic schemes. This protocol is based on the breeding protocol with the incorporation of two-way classical communication. Like breeding, the protocol starts with an infinite number of copies of a Bell-diagonal mixed state. Breeding can be carried out as successive stages of partial information extraction, yielding the same result: one bit of information is gained at the cost (measurement) of one pure Bell state pair (ebit). The basic principle of our protocol is at every stage to replace measurements on ebits by measurements on a finite number of copies, whenever there are two equiprobable outcomes. In that case, the entropy of the global state is reduced by more than one bit. Therefore, every such replacement results in an improvement of the protocol. We explain how our protocol is organized as to have as many replacements as possible. The yield is then calculated for Werner states

  14. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  15. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  16. TH-C-18A-08: A Management Tool for CT Dose Monitoring, Analysis, and Protocol Review

    International Nuclear Information System (INIS)

    Wang, J; Chan, F; Newman, B; Larson, D; Leung, A; Fleischmann, D; Molvin, L; Marsh, D; Zorich, C; Phillips, L

    2014-01-01

    Purpose: To develop a customizable tool for enterprise-wide managing of CT protocols and analyzing radiation dose information of CT exams for a variety of quality control applications Methods: All clinical CT protocols implemented on the 11 CT scanners at our institution were extracted in digital format. The original protocols had been preset by our CT management team. A commercial CT dose tracking software (DoseWatch,GE healthcare,WI) was used to collect exam information (exam date, patient age etc.), scanning parameters, and radiation doses for all CT exams. We developed a Matlab-based program (MathWorks,MA) with graphic user interface which allows to analyze the scanning protocols with the actual dose estimates, and compare the data to national (ACR,AAPM) and internal reference values for CT quality control. Results: The CT protocol review portion of our tool allows the user to look up the scanning and image reconstruction parameters of any protocol on any of the installed CT systems among about 120 protocols per scanner. In the dose analysis tool, dose information of all CT exams (from 05/2013 to 02/2014) was stratified on a protocol level, and within a protocol down to series level, i.e. each individual exposure event. This allows numerical and graphical review of dose information of any combination of scanner models, protocols and series. The key functions of the tool include: statistics of CTDI, DLP and SSDE, dose monitoring using user-set CTDI/DLP/SSDE thresholds, look-up of any CT exam dose data, and CT protocol review. Conclusion: our inhouse CT management tool provides radiologists, technologists and administration a first-hand near real-time enterprise-wide knowledge on CT dose levels of different exam types. Medical physicists use this tool to manage CT protocols, compare and optimize dose levels across different scanner models. It provides technologists feedback on CT scanning operation, and knowledge on important dose baselines and thresholds

  17. Protein blotting protocol for beginners.

    Science.gov (United States)

    Petrasovits, Lars A

    2014-01-01

    The transfer and immobilization of biological macromolecules onto solid nitrocellulose or nylon (polyvinylidene difluoride (PVDF)) membranes subsequently followed by specific detection is referred to as blotting. DNA blots are called Southerns after the inventor of the technique, Edwin Southern. By analogy, RNA blots are referred to as northerns and protein blots as westerns (Burnette, Anal Biochem 112:195-203, 1981). With few exceptions, western blotting involves five steps, namely, sample collection, preparation, separation, immobilization, and detection. In this chapter, protocols for the entire process from sample collection to detection are described.

  18. Optical protocols for terabit networks

    Science.gov (United States)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  19. Massive transfusion protocols: current best practice

    Directory of Open Access Journals (Sweden)

    Hsu YM

    2016-03-01

    Full Text Available Yen-Michael S Hsu,1 Thorsten Haas,2 Melissa M Cushing1 1Department of Pathology and Laboratory Medicine, Weill Cornell Medical College, New York, NY, USA; 2Department of Anesthesia, University Children's Hospital Zurich, Zurich, Switzerland Abstract: Massive transfusion protocols (MTPs are established to provide rapid blood replacement in a setting of severe hemorrhage. Early optimal blood transfusion is essential to sustain organ perfusion and oxygenation. There are many variables to consider when establishing an MTP, and studies have prospectively evaluated different scenarios and patient populations to establish the best practices to attain improved patient outcomes. The establishment and utilization of an optimal MTP is challenging given the ever-changing patient status during resuscitation efforts. Much of the MTP literature comes from the trauma population, due to the fact that massive hemorrhage is the leading cause of preventable trauma-related death. As we come to further understand the positive and negative clinical impacts of transfusion-related factors, massive transfusion practice can be further refined. This article will first discuss specific MTPs targeting different patient populations and current relevant international guidelines. Then, we will examine a wide selection of therapeutic products to support MTPs, including newly available products and the most suitable of the traditional products. Lastly, we will discuss the best design for an MTP, including ratio-based MTPs and MTPs based on the use of point-of-care coagulation diagnostic tools. Keywords: hemorrhage, MTP, antifibrinolytics, coagulopathy, trauma, ratio, logistics, guidelines, hemostatic

  20. The costs of the Kyoto Protocol in the European Union

    International Nuclear Information System (INIS)

    Viguier, Laurent L.; Babiker, Mustafa H.; Reilly, John M.

    2003-01-01

    We estimate reference CO 2 emission projections in the European Union, and quantify the economic impacts of the Kyoto commitment on Member States. We consider the case where each EU member individually meets a CO 2 emissions target, applying a country-wide cap and trade system to meet the target but without trade among countries. We use a version of the MIT Emissions Prediction and Policy Analysis (EPPA) model, here disaggregated to separately include 9 European Community countries and commercial and household transportation sectors. We compare our results with that of four energy-economic models that have provided detailed analyses of European climate change policy. In the absence of specific additional climate policy measures, the EPPA reference projections of carbon emissions increase by 14% from 1990 levels. The EU-wide target under the Kyoto Protocol to the Framework Convention on Climate Change is a reduction in emissions to 8% below 1990 levels. EPPA emissions projections are similar to other recent modeling results, but there are underlying differences in energy and carbon intensities among the projections. If EU countries were to individually meet the EU allocation of the Community-wide carbon cap specified in the Kyoto Protocol, we find using EPPA that carbon prices vary from $91 in the United Kingdom to $385 in Denmark; welfare costs range from 0.6% to 5%

  1. Using semantics for representing experimental protocols.

    Science.gov (United States)

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  2. Implementation of the Kyoto protocol

    International Nuclear Information System (INIS)

    2006-07-01

    The Rio Earth summit in 1992 has been the starting point of an international awareness about the global risk of climatic change. At this occasion, the richest countries committed themselves to stabilize their greenhouse gas emissions and to reach by the year 2000 an emissions level equivalent to the one of 1990. The Kyoto protocol in 1997 has permitted to convert this will into juridically constraining quantitative commitments. In 2005, Russia ratified the protocol while in 2001 the USA refused to do so. Because the commitments signed are ambitious, flexibility mechanisms have been implemented: 'emission permits' (emissions trading), 'joint implementation' allowing the investments abroad for greenhouse gases abatement in another developed country, and 'clean development mechanisms' when investments are made in a developing country. The Marrakech conference of December 2001 has permitted to fix up the eligibility criteria of projects belonging to the joint implementation and clean development mechanisms. The effective implementation of these mechanisms still raises technical difficulties to evaluate and measure the effective abatement of greenhouse gas emissions. (J.S.)

  3. Latest approaches of Kyoto protocol

    International Nuclear Information System (INIS)

    Matei, M.; Matei, L.

    2005-01-01

    Recently EURELECTRIC welcome the proposal of new EC Directive concerning the inclusion in the EU Emissions Trading Scheme (ETS) of credits from the project mechanisms - Joint Implementation (JI) and Clean Development Mechanism (CDM). The proposed Directive is an amendment to the EU Emissions Trading Directive adopted in June 2003. EURELECTRIC calls for unlimited use of credits in ETS. The draft Directive provides for the application of these mechanisms to begin as of 2008, on condition that the Kyoto Protocol does actually enter into force, an event which is still dependent on Russia's ratification. Such ratification has been subject to contradictory statements from the Russian Government, and the question of whether their signature to the Protocol is forthcoming is still fraught with uncertainty. Although it is not anticipated that significant quantities of JI or CDM certified credits will be available in the period 2005-2007, those that do become available would provide some additional liquidity in the emissions trading market. There is a direct relation between the coming ETS and electricity pricing: environmental policy is the driver, based on the need to switch to a low-carbon future and manage the necessary investments in a rational manner - and emissions trading is the best solution available. Romania has good opportunities to be involved in the greenhouse gases market, both in ETS and JI mechanisms. Some JI projects between Romanian and The Netherlands are already done or underway. (author)

  4. Regular Topologies for Gigabit Wide-Area Networks. Volume 1

    Science.gov (United States)

    Shacham, Nachum; Denny, Barbara A.; Lee, Diane S.; Khan, Irfan H.; Lee, Danny Y. C.; McKenney, Paul

    1994-01-01

    In general terms, this project aimed at the analysis and design of techniques for very high-speed networking. The formal objectives of the project were to: (1) Identify switch and network technologies for wide-area networks that interconnect a large number of users and can provide individual data paths at gigabit/s rates; (2) Quantitatively evaluate and compare existing and proposed architectures and protocols, identify their strength and growth potentials, and ascertain the compatibility of competing technologies; and (3) Propose new approaches to existing architectures and protocols, and identify opportunities for research to overcome deficiencies and enhance performance. The project was organized into two parts: 1. The design, analysis, and specification of techniques and protocols for very-high-speed network environments. In this part, SRI has focused on several key high-speed networking areas, including Forward Error Control (FEC) for high-speed networks in which data distortion is the result of packet loss, and the distribution of broadband, real-time traffic in multiple user sessions. 2. Congestion Avoidance Testbed Experiment (CATE). This part of the project was done within the framework of the DARTnet experimental T1 national network. The aim of the work was to advance the state of the art in benchmarking DARTnet's performance and traffic control by developing support tools for network experimentation, by designing benchmarks that allow various algorithms to be meaningfully compared, and by investigating new queueing techniques that better satisfy the needs of best-effort and reserved-resource traffic. This document is the final technical report describing the results obtained by SRI under this project. The report consists of three volumes: Volume 1 contains a technical description of the network techniques developed by SRI in the areas of FEC and multicast of real-time traffic. Volume 2 describes the work performed under CATE. Volume 3 contains the source

  5. A streamlined ribosome profiling protocol for the characterization of microorganisms

    DEFF Research Database (Denmark)

    Latif, Haythem; Szubin, Richard; Tan, Justin

    2015-01-01

    Ribosome profiling is a powerful tool for characterizing in vivo protein translation at the genome scale, with multiple applications ranging from detailed molecular mechanisms to systems-level predictive modeling. Though highly effective, this intricate technique has yet to become widely used...... in the microbial research community. Here we present a streamlined ribosome profiling protocol with reduced barriers to entry for microbial characterization studies. Our approach provides simplified alternatives during harvest, lysis, and recovery of monosomes and also eliminates several time-consuming steps...

  6. Implementation of the quality control protocol in Crawls

    International Nuclear Information System (INIS)

    Ambroa Rey, E. M.; Gimenez Insua, M.; Vazquez Vazquez, R.; Sanchez Garcia, M.; Luna Vega, V.; Mosquera Suero, J.; Otero Martinez, C.; Lobato Busto, R.; Pombar Camean, M.

    2013-01-01

    Bone scintigraphy is a test widely used in Nuclear Medicine of our service. 33% of the tests performed are of this type, so it is necessary to develop a specific quality control protocol for the tracking of the gamma camera acquisitions. This type of procurement means the mechanical movement of the stretcher, with a static initial phase in which the movement of the stretcher is replaced by the gradual opening of the field of view (electronic window). This creates the density of accounts to be uniform throughout the study. The presence of a movement mechanical and co-registration with the static phase implies the need for specific tests. (Author)

  7. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  8. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  9. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... active and adaptive corruptions in the random oracle model. Due to its simplicity, the protocol is extremely efficient and it allows to perform m 1-out-of-n OTs using only: - Computation: (n+1)m+2 exponentiations (mn for the receiver, mn+2 for the sender) and - Communication: 32(m+1) bytes (for the group...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  10. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  11. Highball: A high speed, reserved-access, wide area network

    Science.gov (United States)

    Mills, David L.; Boncelet, Charles G.; Elias, John G.; Schragger, Paul A.; Jackson, Alden W.

    1990-01-01

    A network architecture called Highball and a preliminary design for a prototype, wide-area data network designed to operate at speeds of 1 Gbps and beyond are described. It is intended for applications requiring high speed burst transmissions where some latency between requesting a transmission and granting the request can be anticipated and tolerated. Examples include real-time video and disk-disk transfers, national filestore access, remote sensing, and similar applications. The network nodes include an intelligent crossbar switch, but have no buffering capabilities; thus, data must be queued at the end nodes. There are no restrictions on the network topology, link speeds, or end-end protocols. The end system, nodes, and links can operate at any speed up to the limits imposed by the physical facilities. An overview of an initial design approach is presented and is intended as a benchmark upon which a detailed design can be developed. It describes the network architecture and proposed access protocols, as well as functional descriptions of the hardware and software components that could be used in a prototype implementation. It concludes with a discussion of additional issues to be resolved in continuing stages of this project.

  12. A New Ultra-lightweight Authentication Protocol for Low Cost RFID Tags

    Directory of Open Access Journals (Sweden)

    Xin Wang

    2013-05-01

    Full Text Available The Radio Frequency Identification (RFID system has been widely used in almost every aspects of the society. At present, the problem of security and privacy become a key factor of severely blocking the widespread of its usage. However, due to restraints on RFID tag’s manufacturing cost, the traditional methods of encryption are not good candidate to defend the security of wireless communication channel between reader and tag. Designing lightweight or ultra-lightweight RFID authentication protocol has become a hot research topic recently. This paper proposes a new ultra-lightweight RFID authentication protocol with high robustness and execution efficiency. The proposed protocol requires only simple bit-wise operations, it has the characteristics of low storage requirement and communication cost. At the same time, through elaborate mechanism design, avoid the vulnerability of the existing ultra-lightweight authentication protocols.

  13. Simple proof of the unconditional security of the Bennett 1992 quantum key distribution protocol

    International Nuclear Information System (INIS)

    Zhang Quan; Tang Chaojing

    2002-01-01

    It is generally accepted that quantum key distribution (QKD) could supply legitimate users with unconditional security during their communication. Quite a lot of satisfactory efforts have been achieved on experimentations with quantum cryptography. However, when the eavesdropper has extra-powerful computational ability, has access to a quantum computer, for example, and can carry into execution any eavesdropping measurement that is allowed by the laws of physics, the security against such attacks has not been widely studied and rigorously proved for most QKD protocols. Quite recently, Shor and Preskill proved concisely the unconditional security of the Bennett-Brassard 1984 (BB84) protocol. Their method is highly valued for its clarity of concept and concision of form. In order to take advantage of the Shor-Preskill technique in their proof of the unconditional security of the BB84 QKD protocol, we introduced in this paper a transformation that can translate the Bennett 1992 (B92) protocol into the BB84 protocol. By proving that the transformation leaks no more information to the eavesdropper, we proved the unconditional security of the B92 protocol. We also settled the problem proposed by Lo about how to prove the unconditional security of the B92 protocol with the Shor-Preskill method

  14. Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-06-01

    Full Text Available Wireless sensor networks (WSNs consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC for WSNs. However, it turned out that Yeh et al.’s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.’s protocol. However, Shi et al.’s improvement introduces other security weaknesses. In this paper, we show that Shi et al.’s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  15. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography.

    Science.gov (United States)

    Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho

    2014-06-10

    Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  16. Blockchain Consensus Protocols in the Wild

    OpenAIRE

    Cachin, Christian; Vukolić, Marko

    2017-01-01

    A blockchain is a distributed ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received renewed attention because they also address blockchain systems. This work discusses the process o...

  17. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol h...

  18. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  19. Bitcoin-NG: A Scalable Blockchain Protocol

    OpenAIRE

    Eyal, Ittay; Gencer, Adem Efe; Sirer, Emin Gun; van Renesse, Robbert

    2015-01-01

    Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is By...

  20. Genomic selection: genome-wide prediction in plant improvement.

    Science.gov (United States)

    Desta, Zeratsion Abera; Ortiz, Rodomiro

    2014-09-01

    Association analysis is used to measure relations between markers and quantitative trait loci (QTL). Their estimation ignores genes with small effects that trigger underpinning quantitative traits. By contrast, genome-wide selection estimates marker effects across the whole genome on the target population based on a prediction model developed in the training population (TP). Whole-genome prediction models estimate all marker effects in all loci and capture small QTL effects. Here, we review several genomic selection (GS) models with respect to both the prediction accuracy and genetic gain from selection. Phenotypic selection or marker-assisted breeding protocols can be replaced by selection, based on whole-genome predictions in which phenotyping updates the model to build up the prediction accuracy. Copyright © 2014 Elsevier Ltd. All rights reserved.

  1. Directional Wide-Angle Range Finder (DWARF)

    Data.gov (United States)

    National Aeronautics and Space Administration — The proposed innovation, the Directional Wide-Angle Range Finder (DWARF) is the creation of a laser range-finder with a wide field-of-view (FOV) and a directional...

  2. Telomerase Repeated Amplification Protocol (TRAP).

    Science.gov (United States)

    Mender, Ilgen; Shay, Jerry W

    2015-11-20

    Telomeres are found at the end of eukaryotic linear chromosomes, and proteins that bind to telomeres protect DNA from being recognized as double-strand breaks thus preventing end-to-end fusions (Griffith et al. , 1999). However, due to the end replication problem and other factors such as oxidative damage, the limited life span of cultured cells (Hayflick limit) results in progressive shortening of these protective structures (Hayflick and Moorhead, 1961; Olovnikov, 1973). The ribonucleoprotein enzyme complex telomerase-consisting of a protein catalytic component hTERT and a functional RNA component hTR or hTERC - counteracts telomere shortening by adding telomeric repeats to the end of chromosomes in ~90% of primary human tumors and in some transiently proliferating stem-like cells (Shay and Wright, 1996; Shay and Wright, 2001). This results in continuous proliferation of cells which is a hallmark of cancer. Therefore, telomere biology has a central role in aging, cancer progression/metastasis as well as targeted cancer therapies. There are commonly used methods in telomere biology such as Telomere Restriction Fragment (TRF) (Mender and Shay, 2015b), Telomere Repeat Amplification Protocol (TRAP) and Telomere dysfunction Induced Foci (TIF) analysis (Mender and Shay, 2015a). In this detailed protocol we describe Telomere Repeat Amplification Protocol (TRAP). The TRAP assay is a popular method to determine telomerase activity in mammalian cells and tissue samples (Kim et al. , 1994). The TRAP assay includes three steps: extension, amplification, and detection of telomerase products. In the extension step, telomeric repeats are added to the telomerase substrate (which is actually a non telomeric oligonucleotide, TS) by telomerase. In the amplification step, the extension products are amplified by the polymerase chain reaction (PCR) using specific primers (TS upstream primer and ACX downstream primer) and in the detection step, the presence or absence of telomerase is

  3. Search and nonsearch protocols for radiographic consultation

    International Nuclear Information System (INIS)

    Swensson, R.G.; Theodore, G.H.

    1989-01-01

    Six radiologists, acting as film reviewers, used two different consultation protocols to differentiate among 292 ambiguous findings on chest films: 120 simulated nodules and 172 normal findings (previous readers' false-positive reports of nodules). The non-search protocol identified each finding (by location), and reviewers rated its likelihood as a nodule. The search protocol, which asked reviewers to report and rate all locations regarded as possible nodules on each film, assigned a default negative rating to any unreported finding (nodule or normal). Receiver operator characteristic analyses demonstrated a significantly higher accuracy for each reviewer's search- protocol discriminations between these nodules and confusing normal findings

  4. Adaptive Protocols for Mobile Wireless Networks

    National Research Council Canada - National Science Library

    Pursley, Michael B

    2005-01-01

    .... Research results are presented on adaptive, energy-efficient, distributed protocols for mobile wireless networks that must operate effectively over unreliable communication links in highly dynamic...

  5. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  6. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  7. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  8. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  9. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  10. Secure Multi-Player Protocols

    DEFF Research Database (Denmark)

    Fehr, Serge

    While classically cryptography is concerned with the problem of private communication among two entities, say players, in modern cryptography multi-player protocols play an important role. And among these, it is probably fair to say that secret sharing, and its stronger version verifiable secret...... sharing (VSS), as well as multi-party computation (MPC) belong to the most appealing and/or useful ones. The former two are basic tools to achieve better robustness of cryptographic schemes against malfunction or misuse by “decentralizing” the security from one single to a whole group of individuals...... (captured by the term threshold cryptography). The latter allows—at least in principle—to execute any collaboration among a group of players in a secure way that guarantees the correctness of the outcome but simultaneously respects the privacy of the participants. In this work, we study three aspects...

  11. Fetal MRI: techniques and protocols

    International Nuclear Information System (INIS)

    Prayer, Daniela; Brugger, Peter Christian; Prayer, Lucas

    2004-01-01

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  12. Analysing Protocol Stacks for Services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    We show an approach, CaPiTo, to model service-oriented applications using process algebras such that, on the one hand, we can achieve a certain level of abstraction without being overwhelmed by the underlying implementation details and, on the other hand, we respect the concrete industrial...... standards used for implementing the service-oriented applications. By doing so, we will be able to not only reason about applications at different levels of abstractions, but also to build a bridge between the views of researchers on formal methods and developers in industry. We apply our approach...... to the financial case study taken from Chapter 0-3. Finally, we develop a static analysis to analyse the security properties as they emerge at the level of concrete industrial protocols....

  13. Protocol Monitoring Passive Solar Energy

    International Nuclear Information System (INIS)

    Van den Ham, E.R.; Bosselaar, L.

    1998-01-01

    A method has been developed by means of which the contribution of passive solar energy to the Dutch energy balance can be quantified univocally. The contribution was 57 PJ in 1990 and also 57 PJ in 1995. The efficiency of passive solar energy systems increased from -31.5% to -28.1% in the period 1990-1995, mainly as a result of the use of extra insulating glazing. As a result of the reduction of energy consumption for heating in houses it is expected that the extra contribution of 2 PJ will not be realized in the year 2010. It is suggested that the method to determine the absolute contribution of passive solar energy to the energy demand of dwellings is to be included in the protocol monitoring renewable energy. For the method to be included in the energy statistics of Statistics Netherlands (CBS) it can be considered only to take into account the difference compared to 1990. 11 refs

  14. Fetal MRI: techniques and protocols

    Energy Technology Data Exchange (ETDEWEB)

    Prayer, Daniela [Department of Neuroradiology, University Clinics of Radiodiagnostics, Medical University Vienna, Waehringerguertel 18-10, 1090, Vienna (Austria); Brugger, Peter Christian [Department of Anatomy, Integrative Morphology Group, Medical University Vienna (Austria); Prayer, Lucas [Diagnosezentrum Urania, Vienna (Austria)

    2004-09-01

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  15. Implementation and Analysis of Real-Time Streaming Protocols.

    Science.gov (United States)

    Santos-González, Iván; Rivero-García, Alexandra; Molina-Gil, Jezabel; Caballero-Gil, Pino

    2017-04-12

    Communication media have become the primary way of interaction thanks to the discovery and innovation of many new technologies. One of the most widely used communication systems today is video streaming, which is constantly evolving. Such communications are a good alternative to face-to-face meetings, and are therefore very useful for coping with many problems caused by distance. However, they suffer from different issues such as bandwidth limitation, network congestion, energy efficiency, cost, reliability and connectivity. Hence, the quality of service and the quality of experience are considered the two most important issues for this type of communication. This work presents a complete comparative study of two of the most used protocols of video streaming, Real Time Streaming Protocol (RTSP) and the Web Real-Time Communication (WebRTC). In addition, this paper proposes two new mobile applications that implement those protocols in Android whose objective is to know how they are influenced by the aspects that most affect the streaming quality of service, which are the connection establishment time and the stream reception time. The new video streaming applications are also compared with the most popular video streaming applications for Android, and the experimental results of the analysis show that the developed WebRTC implementation improves the performance of the most popular video streaming applications with respect to the stream packet delay.

  16. Design, Implementation, and Verification of the Reliable Multicast Protocol. Thesis

    Science.gov (United States)

    Montgomery, Todd L.

    1995-01-01

    This document describes the Reliable Multicast Protocol (RMP) design, first implementation, and formal verification. RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service. RMP is fully and symmetrically distributed so that no site bears an undue portion of the communications load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These guarantees are selectable on a per message basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, a client/server model of delivery, mutually exclusive handlers for messages, and mutually exclusive locks. It has been commonly believed that total ordering of messages can only be achieved at great performance expense. RMP discounts this. The first implementation of RMP has been shown to provide high throughput performance on Local Area Networks (LAN). For two or more destinations a single LAN, RMP provides higher throughput than any other protocol that does not use multicast or broadcast technology. The design, implementation, and verification activities of RMP have occurred concurrently. This has allowed the verification to maintain a high fidelity between design model, implementation model, and the verification model. The restrictions of implementation have influenced the design earlier than in normal sequential approaches. The protocol as a whole has matured smoother by the inclusion of several different perspectives into the product development.

  17. ‘BREAKS’ Protocol for Breaking Bad News

    Science.gov (United States)

    Narayanan, Vijayakumar; Bista, Bibek; Koshy, Cheriyan

    2010-01-01

    Information that drastically alters the life world of the patient is termed as bad news. Conveying bad news is a skilled communication, and not at all easy. The amount of truth to be disclosed is subjective. A properly structured and well-orchestrated communication has a positive therapeutic effect. This is a process of negotiation between patient and physician, but physicians often find it difficult due to many reasons. They feel incompetent and are afraid of unleashing a negative reaction from the patient or their relatives. The physician is reminded of his or her own vulnerability to terminal illness, and find themselves powerless over emotional distress. Lack of sufficient training in breaking bad news is a handicap to most physicians and health care workers. Adherence to the principles of client-centered counseling is helpful in attaining this skill. Fundamental insight of the patient is exploited and the bad news is delivered in a structured manner, because the patient is the one who knows what is hurting him most and he is the one who knows how to move forward. Six-step SPIKES protocol is widely used for breaking bad news. In this paper, we put forward another six-step protocol, the BREAKS protocol as a systematic and easy communication strategy for breaking bad news. Development of competence in dealing with difficult situations has positive therapeutic outcome and is a professionally satisfying one. PMID:21811349

  18. ′BREAKS′ protocol for breaking bad news

    Directory of Open Access Journals (Sweden)

    Vijayakumar Narayanan

    2010-01-01

    Full Text Available Information that drastically alters the life world of the patient is termed as bad news. Conveying bad news is a skilled communication, and not at all easy. The amount of truth to be disclosed is subjective. A properly structured and well-orchestrated communication has a positive therapeutic effect. This is a process of negotiation between patient and physician, but physicians often find it difficult due to many reasons. They feel incompetent and are afraid of unleashing a negative reaction from the patient or their relatives. The physician is reminded of his or her own vulnerability to terminal illness, and find themselves powerless over emotional distress. Lack of sufficient training in breaking bad news is a handicap to most physicians and health care workers. Adherence to the principles of client-centered counseling is helpful in attaining this skill. Fundamental insight of the patient is exploited and the bad news is delivered in a structured manner, because the patient is the one who knows what is hurting him most and he is the one who knows how to move forward. Six-step SPIKES protocol is widely used for breaking bad news. In this paper, we put forward another six-step protocol, the BREAKS protocol as a systematic and easy communication strategy for breaking bad news. Development of competence in dealing with difficult situations has positive therapeutic outcome and is a professionally satisfying one.

  19. Desensitization to clopidogrel: a tailor-made protocol.

    Science.gov (United States)

    Barreira, P; Cadinha, S; Malheiro, D; Moreira da Silva, J P

    2014-01-01

    Clopidogrel is an antiplatelet drug widely used for treatment and prevention of a variety of cardiovascular diseases. We report a successful desensitization to clopidogrel in a 70-year-old Caucasian man with delayed hypersensitivity (HS) reaction. He developed lip, hand and foot swelling, erythematous papular non-pruritic lesions and arthralgias 2 weeks after starting treatment with clopidogrel 75 mg/d. A 3-hour desensitization protocol was started, achieving a cumulative dose of 154 mg without any reaction, and a daily dose of 75 mg was recommended. On the 4th day, the patient developed skin lesions similar to the previously described. He was treated with topical steroids and oral antihistamines, and the daily dose of clopidogrel was reduced to 20 mg. A new desensitization protocol was established, with a slow dose increment, according to the patient's response. It was only possible to achieve the dose of 75 mg/d after 2 months. Although well tolerated by most patients, HS reactions with clopidogrel may occur and desensitization is rising as a safe alternative in those patients. In delayed reactions with cutaneous lesions, a slower desensitization protocol may be necessary, as in this case.

  20. Genome-Wide Mutagenesis in Borrelia burgdorferi.

    Science.gov (United States)

    Lin, Tao; Gao, Lihui

    2018-01-01

    Signature-tagged mutagenesis (STM) is a functional genomics approach to identify bacterial virulence determinants and virulence factors by simultaneously screening multiple mutants in a single host animal, and has been utilized extensively for the study of bacterial pathogenesis, host-pathogen interactions, and spirochete and tick biology. The signature-tagged transposon mutagenesis has been developed to investigate virulence determinants and pathogenesis of Borrelia burgdorferi. Mutants in genes important in virulence are identified by negative selection in which the mutants fail to colonize or disseminate in the animal host and tick vector. STM procedure combined with Luminex Flex ® Map™ technology and next-generation sequencing (e.g., Tn-seq) are the powerful high-throughput tools for the determination of Borrelia burgdorferi virulence determinants. The assessment of multiple tissue sites and two DNA resources at two different time points using Luminex Flex ® Map™ technology provides a robust data set. B. burgdorferi transposon mutant screening indicates that a high proportion of genes are the novel virulence determinants that are required for mouse and tick infection. In this protocol, an effective signature-tagged Himar1-based transposon suicide vector was developed and used to generate a sequence-defined library of nearly 4800 mutants in the infectious B. burgdorferi B31 clone. In STM, signature-tagged suicide vectors are constructed by inserting unique DNA sequences (tags) into the transposable elements. The signature-tagged transposon mutants are generated when transposon suicide vectors are transformed into an infectious B. burgdorferi clone, and the transposable element is transposed into the 5'-TA-3' sequence in the B. burgdorferi genome with the signature tag. The transposon library is created and consists of many sub-libraries, each sub-library has several hundreds of mutants with same tags. A group of mice or ticks are infected with a mixed

  1. Grid-optimized Web 3D applications on wide area network

    Science.gov (United States)

    Wang, Frank; Helian, Na; Meng, Lingkui; Wu, Sining; Zhang, Wen; Guo, Yike; Parker, Michael Andrew

    2008-08-01

    Geographical information system has come into the Web Service times now. In this paper, Web3D applications have been developed based on our developed Gridjet platform, which provides a more effective solution for massive 3D geo-dataset sharing in distributed environments. Web3D services enabling web users could access the services as 3D scenes, virtual geographical environment and so on. However, Web3D services should be shared by thousands of essential users that inherently distributed on different geography locations. Large 3D geo-datasets need to be transferred to distributed clients via conventional HTTP, NFS and FTP protocols, which often encounters long waits and frustration in distributed wide area network environments. GridJet was used as the underlying engine between the Web 3D application node and geo-data server that utilizes a wide range of technologies including the one of paralleling the remote file access, which is a WAN/Grid-optimized protocol and provides "local-like" accesses to remote 3D geo-datasets. No change in the way of using software is required since the multi-streamed GridJet protocol remains fully compatible with existing IP infrastructures. Our recent progress includes a real-world test that Web3D applications as Google Earth over the GridJet protocol beats those over the classic ones by a factor of 2-7 where the transfer distance is over 10,000 km.

  2. Perancangan dan Analisis Redistribution Routing Protocol OSPF dan EIGRP

    Directory of Open Access Journals (Sweden)

    DWI ARYANTA

    2016-02-01

    Full Text Available Abstrak OSPF (Open Shortest Path First dan EIGRP (Enhanced Interior Gateway Routing Protocol adalah dua routing protokol yang banyak digunakan dalam jaringan komputer. Perbedaan karakteristik antar routing protokol menimbulkan masalah dalam pengiriman paket data. Teknik redistribution adalah solusi untuk melakukan komunikasi antar routing protokol. Dengan menggunakan software Cisco Packet Tracer 5.3 pada penelitian ini dibuat simulasi OSPF dan EIGRP yang dihubungkan oleh teknik redistribution, kemudian dibandingkan kualitasnya dengan single routing protokol EIGRP dan OSPF. Parameter pengujian dalam penelitian ini adalah nilai time delay dan trace route. Nilai trace route berdasarkan perhitungan langsung cost dan metric dibandingkan dengan hasil simulasi. Hasilnya dapat dilakukan proses redistribution OSPF dan EIGRP. Nilai delay redistribution lebih baik 1% dibanding OSPF dan 2-3% di bawah EIGRP tergantung kepadatan traffic. Dalam perhitungan trace route redistribution dilakukan 2 perhitungan, yaitu cost untuk area OSPF dan metric pada area EIGRP. Pengambilan jalur utama dan alternatif pengiriman paket berdasarkan nilai cost dan metric yang terkecil, hal ini terbukti berdasarkan perhitungan dan simulasi. Kata kunci: OSPF, EIGRP, Redistribution, Delay, Cost, Metric. Abstract OSPF (Open Shortest Path First and EIGRP (Enhanced Interior Gateway Routing Protocol are two routing protocols are widely used in computer networks. Differences between the characteristics of routing protocols pose a problem in the delivery of data packets. Redistribution technique is the solution for communication between routing protocols. By using the software Cisco Packet Tracer 5.3 in this study were made simulating OSPF and EIGRP redistribution linked by technique, then compared its quality with a single EIGRP and OSPF routing protocols. Testing parameters in this study is the value of the time delay and trace route. Value trace route based on direct calculation of cost

  3. Wind power agreement protocol; Protocole d'accord eolien

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-10-01

    The aim of this protocol of agreement is to propose to wind turbine fitters some models of contracts allowing the setting up of wind turbines on agricultural lots. These documents, which make an indissociable ensemble, apply to both phases of development of a wind power project: the feasibility study phase, for a duration comprised between 2 and 5 years (studies, administrative procedures, precise definition of the project), and the construction, exploitation and dismantling phase. These documents will serve as common guidelines for both the farmers and the wind turbine designers. Both parties agree to meet together in the future to propose some modifications of these texts if necessary. The four models of contracts are attached to the document: contract for the feasibility study phase, first contract between the landlord and the farmer for the cancellation of the rural lease, second contract between the landlord and the wind power exploitation company for the common right lease, and the third contract between the farmer and the wind power company for the indemnification convention. (J.S.)

  4. Analysis of a security protocol in ?CRL

    NARCIS (Netherlands)

    J. Pang

    2002-01-01

    textabstractNeedham-Schroeder public-key protocol; With the growth and commercialization of the Internet, the security of communication between computers becomes a crucial point. A variety of security protocols based on cryptographic primitives are used to establish secure communication over

  5. An Argument Approach to Observation Protocol Validity

    Science.gov (United States)

    Bell, Courtney A.; Gitomer, Drew H.; McCaffrey, Daniel F.; Hamre, Bridget K.; Pianta, Robert C.; Qi, Yi

    2012-01-01

    This article develops a validity argument approach for use on observation protocols currently used to assess teacher quality for high-stakes personnel and professional development decisions. After defining the teaching quality domain, we articulate an interpretive argument for observation protocols. To illustrate the types of evidence that might…

  6. Model checking the HAVi leader election protocol

    NARCIS (Netherlands)

    J.M.T. Romijn (Judi)

    1999-01-01

    textabstractThe HAVi specification proposes an architecture for audio/video interoperability in home networks. Part of the HAVi specification is a distributed leader election protocol. We have modelled this leader election protocol in Promela and Lotos and have checked several properties with the

  7. Climate Change And The Kyoto Protocol

    International Nuclear Information System (INIS)

    Comsan, M.N.H.

    2007-01-01

    The problem of global warming is addressed. Changes in earth surface temperature, emission of CO 2 and other four major green house gases are presented. Effect of global warming on weather, ocean, and ecosystem is discussed. A brief history of the Kyoto protocol starting from the 151 Earth Summit in 1972 is outlined. An overview of the protocol and a brief summary are given

  8. Kyoto Protocol: trade versus the environment

    International Nuclear Information System (INIS)

    Loose, H.

    2001-01-01

    Could the signatories to the Kyoto Protocol find themselves up against the WTO? This paper examines how the climate change agreement could conflict with trade rules, and shows that there are potentially serious conflicts in the interface between the WTO and the Kyoto Protocol. It argues for dialogue and debate before it is too late. (author)

  9. Network Coding Protocols for Smart Grid Communications

    DEFF Research Database (Denmark)

    Prior, Rui; Roetter, Daniel Enrique Lucani; Phulpin, Yannick

    2014-01-01

    We propose a robust network coding protocol for enhancing the reliability and speed of data gathering in smart grids. At the heart of our protocol lies the idea of tunable sparse network coding, which adopts the transmission of sparsely coded packets at the beginning of the transmission process b...

  10. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  11. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  12. Nucleic acid protocols: Extraction and optimization

    Directory of Open Access Journals (Sweden)

    Saeed El-Ashram

    2016-12-01

    Full Text Available Yield and quality are fundamental features for any researchers during nucleic acid extraction. Here, we describe a simplified, semi-unified, effective, and toxic material free protocol for extracting DNA and RNA from different prokaryotic and eukaryotic sources exploiting the physical and chemical properties of nucleic acids. Furthermore, this protocol showed that DNA and RNA are under triple protection (i.e. EDTA, SDS and NaCl during lysis step, and this environment is improper for RNase to have DNA liberated of RNA and even for DNase to degrade the DNA. Therefore, the complete removal of RNA under RNase influence is achieved when RNase is added after DNA extraction, which gives optimal quality with any protocols. Similarly, DNA contamination in an isolated RNA is degraded by DNase to obtain high-quality RNA. Our protocol is the protocol of choice in terms of simplicity, recovery time, environmental safety, amount, purity, PCR and RT-PCR applicability.

  13. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  14. Application of World Wide Web (W3) Technologies in Payload Operations

    Science.gov (United States)

    Sun, Charles; Windrem, May; Picinich, Lou

    1996-01-01

    World Wide Web (W3) technologies are considered in relation to their application to space missions. It is considered that such technologies, including the hypertext transfer protocol and the Java object-oriented language, offer a powerful and relatively inexpensive framework for distributed application software development. The suitability of these technologies for payload monitoring systems development is discussed, and the experience gained from the development of an insect habitat monitoring system based on W3 technologies is reported.

  15. A family of multi-party authentication protocols

    NARCIS (Netherlands)

    Cremers, C.J.F.; Mauw, S.

    2006-01-01

    We introduce a family of multi-party authentication protocols and discuss six novel protocols, which are members of this family. The first three generalize the well-known Needham-Schroeder-Lowe public-key protocol, the Needham-Schroeder private-key protocol, and the Bilateral Key Exchange protocol.

  16. Universally composable protocols with relaxed set-up assumptions

    DEFF Research Database (Denmark)

    Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus

    2004-01-01

    A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally composable (UC) protocols provide this guarantee in a strong sense: A protocol remains secure even when composed concurrently with an unbounded number of ...

  17. Live chat alternative security protocol

    Science.gov (United States)

    Rahman, J. P. R.; Nugraha, E.; Febriany, A.

    2018-05-01

    Indonesia is one of the largest e-commerce markets in Southeast Asia, as many as 5 million people do transactions in e-commerce, therefore more and more people use live chat service to communicate with customer service. In live chat, the customer service often asks customers’ data such as, full name, address, e-mail, transaction id, which aims to verify the purchase of the product. One of the risks that will happen is sniffing which will lead to the theft of confidential information that will cause huge losses to the customer. The anticipation that will be done is build an alternative security protocol for user interaction in live chat by using a cryptographic algorithm that is useful for protecting confidential messages. Live chat requires confidentiality and data integration with encryption and hash functions. The used algorithm are Rijndael 256 bits, RSA, and SHA256. To increase the complexity, the Rijndael algorithm will be modified in the S-box and ShiftRow sections based on the shannon principle rule, the results show that all pass the Randomness test, but the modification in Shiftrow indicates a better avalanche effect. Therefore the message will be difficult to be stolen or changed.

  18. Using Integer Clocks to Verify the Timing-Sync Sensor Network Protocol

    Science.gov (United States)

    Huang, Xiaowan; Singh, Anu; Smolka, Scott A.

    2010-01-01

    We use the UPPAAL model checker for Timed Automata to verify the Timing-Sync time-synchronization protocol for sensor networks (TPSN). The TPSN protocol seeks to provide network-wide synchronization of the distributed clocks in a sensor network. Clock-synchronization algorithms for sensor networks such as TPSN must be able to perform arithmetic on clock values to calculate clock drift and network propagation delays. They must be able to read the value of a local clock and assign it to another local clock. Such operations are not directly supported by the theory of Timed Automata. To overcome this formal-modeling obstacle, we augment the UPPAAL specification language with the integer clock derived type. Integer clocks, which are essentially integer variables that are periodically incremented by a global pulse generator, greatly facilitate the encoding of the operations required to synchronize clocks as in the TPSN protocol. With this integer-clock-based model of TPSN in hand, we use UPPAAL to verify that the protocol achieves network-wide time synchronization and is devoid of deadlock. We also use the UPPAAL Tracer tool to illustrate how integer clocks can be used to capture clock drift and resynchronization during protocol execution

  19. A standard protocol for describing individual-based and agent-based models

    Science.gov (United States)

    Grimm, Volker; Berger, Uta; Bastiansen, Finn; Eliassen, Sigrunn; Ginot, Vincent; Giske, Jarl; Goss-Custard, John; Grand, Tamara; Heinz, Simone K.; Huse, Geir; Huth, Andreas; Jepsen, Jane U.; Jorgensen, Christian; Mooij, Wolf M.; Muller, Birgit; Pe'er, Guy; Piou, Cyril; Railsback, Steven F.; Robbins, Andrew M.; Robbins, Martha M.; Rossmanith, Eva; Ruger, Nadja; Strand, Espen; Souissi, Sami; Stillman, Richard A.; Vabo, Rune; Visser, Ute; DeAngelis, Donald L.

    2006-01-01

    Simulation models that describe autonomous individual organisms (individual based models, IBM) or agents (agent-based models, ABM) have become a widely used tool, not only in ecology, but also in many other disciplines dealing with complex systems made up of autonomous entities. However, there is no standard protocol for describing such simulation models, which can make them difficult to understand and to duplicate. This paper presents a proposed standard protocol, ODD, for describing IBMs and ABMs, developed and tested by 28 modellers who cover a wide range of fields within ecology. This protocol consists of three blocks (Overview, Design concepts, and Details), which are subdivided into seven elements: Purpose, State variables and scales, Process overview and scheduling, Design concepts, Initialization, Input, and Submodels. We explain which aspects of a model should be described in each element, and we present an example to illustrate the protocol in use. In addition, 19 examples are available in an Online Appendix. We consider ODD as a first step for establishing a more detailed common format of the description of IBMs and ABMs. Once initiated, the protocol will hopefully evolve as it becomes used by a sufficiently large proportion of modellers.

  20. Introduction to the world wide web.

    Science.gov (United States)

    Downes, P K

    2007-05-12

    The World Wide Web used to be nicknamed the 'World Wide Wait'. Now, thanks to high speed broadband connections, browsing the web has become a much more enjoyable and productive activity. Computers need to know where web pages are stored on the Internet, in just the same way as we need to know where someone lives in order to post them a letter. This section explains how the World Wide Web works and how web pages can be viewed using a web browser.

  1. Wide-Field Imaging Using Nitrogen Vacancies

    Science.gov (United States)

    Englund, Dirk Robert (Inventor); Trusheim, Matthew Edwin (Inventor)

    2017-01-01

    Nitrogen vacancies in bulk diamonds and nanodiamonds can be used to sense temperature, pressure, electromagnetic fields, and pH. Unfortunately, conventional sensing techniques use gated detection and confocal imaging, limiting the measurement sensitivity and precluding wide-field imaging. Conversely, the present sensing techniques do not require gated detection or confocal imaging and can therefore be used to image temperature, pressure, electromagnetic fields, and pH over wide fields of view. In some cases, wide-field imaging supports spatial localization of the NVs to precisions at or below the diffraction limit. Moreover, the measurement range can extend over extremely wide dynamic range at very high sensitivity.

  2. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  3. Generation of meiomaps of genome-wide recombination and chromosome segregation in human oocytes

    DEFF Research Database (Denmark)

    Ottolini, Christian S; Capalbo, Antonio; Newnham, Louise

    2016-01-01

    We have developed a protocol for the generation of genome-wide maps (meiomaps) of recombination and chromosome segregation for the three products of human female meiosis: the first and second polar bodies (PB1 and PB2) and the corresponding oocyte. PB1 is biopsied and the oocyte is artificially......-nucleotide polymorphisms (SNPs) genome-wide by microarray. Informative maternal heterozygous SNPs are phased using a haploid PB2 or oocyte as a reference. A simple algorithm is then used to identify the maternal haplotypes for each chromosome, in all of the products of meiosis for each oocyte. This allows mapping...

  4. Scaling HEP to Web size with RESTful protocols: The frontier example

    International Nuclear Information System (INIS)

    Dykstra, Dave

    2011-01-01

    The World-Wide-Web has scaled to an enormous size. The largest single contributor to its scalability is the HTTP protocol, particularly when used in conformity to REST (REpresentational State Transfer) principles. High Energy Physics (HEP) computing also has to scale to an enormous size, so it makes sense to base much of it on RESTful protocols. Frontier, which reads databases with an HTTP-based RESTful protocol, has successfully scaled to deliver production detector conditions data from both the CMS and ATLAS LHC detectors to hundreds of thousands of computer cores worldwide. Frontier is also able to re-use a large amount of standard software that runs the Web: on the clients, caches, and servers. I discuss the specific ways in which HTTP and REST enable high scalability for Frontier. I also briefly discuss another protocol used in HEP computing that is HTTP-based and RESTful, and another protocol that could benefit from it. My goal is to encourage HEP protocol designers to consider HTTP and REST whenever the same information is needed in many places.

  5. Latency correction of event-related potentials between different experimental protocols

    Science.gov (United States)

    Iturrate, I.; Chavarriaga, R.; Montesano, L.; Minguez, J.; Millán, JdR

    2014-06-01

    Objective. A fundamental issue in EEG event-related potentials (ERPs) studies is the amount of data required to have an accurate ERP model. This also impacts the time required to train a classifier for a brain-computer interface (BCI). This issue is mainly due to the poor signal-to-noise ratio and the large fluctuations of the EEG caused by several sources of variability. One of these sources is directly related to the experimental protocol or application designed, and may affect the amplitude or latency of ERPs. This usually prevents BCI classifiers from generalizing among different experimental protocols. In this paper, we analyze the effect of the amplitude and the latency variations among different experimental protocols based on the same type of ERP. Approach. We present a method to analyze and compensate for the latency variations in BCI applications. The algorithm has been tested on two widely used ERPs (P300 and observation error potentials), in three experimental protocols in each case. We report the ERP analysis and single-trial classification. Main results. The results obtained show that the designed experimental protocols significantly affect the latency of the recorded potentials but not the amplitudes. Significance. These results show how the use of latency-corrected data can be used to generalize the BCIs, reducing the calibration time when facing a new experimental protocol.

  6. Evaluation of a biodegradation screening protocol for contaminated soil from manufactured gas plant sites

    International Nuclear Information System (INIS)

    Morgan, D.J.; Battaglia, A.; Smith, J.R.; Middleton, A.C.; Nakles, D.V.; Linz, D.G.

    1991-01-01

    Bioremediation has been demonstrated to be a viable alternative for treating soils contaminated with PAHs. however, given the variability encountered in soils characteristics and contamination level, their susceptibility to biological treatment must be assessed on a case-by-case basis. This paper discusses a new treatability protocol, the GRI Accelerated Treatability Protocol. The mainstay of the protocol, which is designed to quickly provide treatability data for a given contaminated soil is a bioslurry experiment, in which the contaminated soil is continuously stirred and provided with abundant oxygen, nutrients and water, to maximize biological activity and thus contaminant removal. The results of using such protocol on four soils, widely differing in physical characteristics and contamination levels, are compared to the results of traditional pan studies, and an empirical equation, describing the observed soil concentrations as a function of time in both slurry and pans, is presented. Similarities and differences between achievable endpoints and biodegradation rates are discussed, and the applicability of the GRI Accelerated Treatability Protocol to full-scale engineered systems is addressed. Results to date indicate that, for soils with less than 10% fines slurry and pan experiments yield approximately the same endpoint, so that for those soils the GRI Accelerated Treatability Protocol can be used to assess the viability of an unsaturated bioremediation system. For soils with more than 10% fines, the slurry treatment endpoints are better than the pans. For those soils a traditional pan study experiment should be performed to evaluate the potential capabilities of unsaturated bioremediation

  7. IEEE 802.11 Wireless LANs: Performance Analysis and Protocol Refinement

    Directory of Open Access Journals (Sweden)

    Chatzimisios P.

    2005-01-01

    Full Text Available The IEEE 802.11 protocol is emerging as a widely used standard and has become the most mature technology for wireless local area networks (WLANs. In this paper, we focus on the tuning of the IEEE 802.11 protocol parameters taking into consideration, in addition to throughput efficiency, performance metrics such as the average packet delay, the probability of a packet being discarded when it reaches the maximum retransmission limit, the average time to drop a packet, and the packet interarrival time. We present an analysis, which has been validated by simulation that is based on a Markov chain model commonly used in the literature. We further study the improvement on these performance metrics by employing suitable protocol parameters according to the specific communication needs of the IEEE 802.11 protocol for both basic access and RTS/CTS access schemes. We show that the use of a higher initial contention window size does not considerably degrade performance in small networks and performs significantly better in any other scenario. Moreover, we conclude that the combination of a lower maximum contention window size and a higher retry limit considerably improves performance. Results indicate that the appropriate adjustment of the protocol parameters enhances performance and improves the services that the IEEE 802.11 protocol provides to various communication applications.

  8. Development of a bedside viable ultrasound protocol to quantify appendicular lean tissue mass.

    Science.gov (United States)

    Paris, Michael T; Lafleur, Benoit; Dubin, Joel A; Mourtzakis, Marina

    2017-10-01

    Ultrasound is a non-invasive and readily available tool that can be prospectively applied at the bedside to assess muscle mass in clinical settings. The four-site protocol, which images two anatomical sites on each quadriceps, may be a viable bedside method, but its ability to predict musculature has not been compared against whole-body reference methods. Our primary objectives were to (i) compare the four-site protocol's ability to predict appendicular lean tissue mass from dual-energy X-ray absorptiometry; (ii) optimize the predictability of the four-site protocol with additional anatomical muscle thicknesses and easily obtained covariates; and (iii) assess the ability of the optimized protocol to identify individuals with low lean tissue mass. This observational cross-sectional study recruited 96 university and community dwelling adults. Participants underwent ultrasound scans for assessment of muscle thickness and whole-body dual-energy X-ray absorptiometry scans for assessment of appendicular lean tissue. Ultrasound protocols included (i) the nine-site protocol, which images nine anterior and posterior muscle groups in supine and prone positions, and (ii) the four-site protocol, which images two anterior sites on each quadriceps muscle group in a supine position. The four-site protocol was strongly associated (R 2  = 0.72) with appendicular lean tissue mass, but Bland-Altman analysis displayed wide limits of agreement (-5.67, 5.67 kg). Incorporating the anterior upper arm muscle thickness, and covariates age and sex, alongside the four-site protocol, improved the association (R 2  = 0.91) with appendicular lean tissue and displayed narrower limits of agreement (-3.18, 3.18 kg). The optimized protocol demonstrated a strong ability to identify low lean tissue mass (area under the curve = 0.89). The four-site protocol can be improved with the addition of the anterior upper arm muscle thickness, sex, and age when predicting appendicular lean tissue mass

  9. The Development of Korea Additional Protocol System

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yeo, Jin Kyun

    2008-01-01

    The Agreement between the Republic of Korea (ROK) and the IAEA for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Safeguards Agreement) entered into force on 14 November 1975. The Additional Protocol to the Safeguards Agreement (the Additional Protocol) was signed on 21 June 1999 and entered into force on 19 February 2004. ROK has been submitting annual updated reports of initial declaration on every May 15th since August 2004. Additional protocol reports were submitted through Protocol Reporter provided by IAEA. Annual declarations were simply uploaded and stored in the Accounting Information Treatment System of KINAC, which did not provide data analysis and management function. There have been demands for improvement to handle ever-increasing information. KAPS (Korea Additional Protocol System) has been developed to assist and administrate the additional protocol related works effectively. The new system enables integrated management including composition of additional protocol report and version control, periodical update of related information, results of IAEA complementary access to each facility

  10. New logistics protocols for distributed interactive simulation

    Science.gov (United States)

    Taylor, Darrin; Morrison, John; Katz, Warren; Felton, Erik; Herman, Deborah A.

    1995-06-01

    In today's environment, the transportation and maintenance of military forces is nearly as important as combat operations. Rapid deployment to regions of low-intensity conflict will become a very common training scenario for the U.S. military. Thus it is desirable to apply distributed simulation technology to train logistics personnel in their combat support roles. Currently, distributed interactive simulation (DIS) only contains rudimentary logistics protocols. This paper introduces new protocols designed to handle the logistics problem. The Newtonian protocol takes a physics-based approach to modeling interactions on the simulation network. This protocol consists of a family of protocol data units (PDUs) which are used to communicate forces in different circumstances. The protocol implements a small set of physical relations. This represents a flexible and general mechanism to describe battlefield interactions between network entities. The migratory object protocol (MOP) family addresses the transfer of control. General mechanisms provide the means to simulate resupply, repair, and maintenance of entities at any level of abstraction (individual soldier to division). It can also increase the fidelity of mine laying, enable handover of weapons for terminal guidance, allow for the distribution of aggregate-level simulation entities, provide capabilities for the simulation of personnel, etc.

  11. The Kyoto Protocol. An economic appraisal

    International Nuclear Information System (INIS)

    Grubb, M.

    2000-05-01

    This paper examines the overall economics of the Kyoto Protocol on climate change, in three main parts. The first part explores the structure of the Protocol and how this matches against classical economic criteria of an 'optimal' climate change agreement. This discussion also considers the nature of and reasons for shortcomings, and the prospects for its evolution. Given the various flexibilities in the agreement, the Kyoto Protocol is far more economically efficient in its structure than any previous global environmental agreement. The central conclusion is that, from an economic perspective, the Protocol's structure for industrialised country commitments is as good as could reasonably be expected. The second part of the paper explores more closely the economics of the commitments themselves and how they combine with the various flexibilities, briefly reviewing the available literature and using a simple spreadsheet model of how the commitments might combine with trading mechanisms under a range of assumptions. Flexibility is intrinsic and necessary, but it is argued that the allocations to Russia and Ukraine in particular mean that unlimited flexibility could render the Protocol's commitments weaker in their impacts than is economically desirable to address climate change. It is argued that, should this prove to be the case, access to the large surplus in the transition economies could be used as a control valve to limit the costs of the Protocol to within acceptable limits. Finally, the paper considers the issues of developing country involvement in the Kyoto Protocol, and the Protocol's longer-term impact and evolution, including its impact on technological evolution and dissemination and the evolution of future commitments. It is argued that taking account of such issues critically affects views of the Protocol

  12. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  13. Energy Efficient Network Protocols for Wireless and Mobile Networks

    National Research Council Canada - National Science Library

    Sivalingam, Krishna

    2001-01-01

    ... (also called power aware) network protocols for wireless and mobile networks. Battery power limitations are a very serious concern, and it is essential to study energy efficient protocol design at different layers of the network protocol stack...

  14. Event-by-event simulation of quantum cryptography protocols

    NARCIS (Netherlands)

    Zhao, S.; Raedt, H. De

    We present a new approach to simulate quantum cryptography protocols using event-based processes. The method is validated by simulating the BB84 protocol and the Ekert protocol, both without and with the presence of an eavesdropper.

  15. Wireless Wide Area Networks for School Districts.

    Science.gov (United States)

    Nair, Prakash

    This paper considers a basic question that many schools districts face in attempting to develop affordable, expandable district-wide computer networks that are resistant to obsolescence: Should these wide area networks (WANs) employ wireless technology, stick to venerable hard-wired solutions, or combine both. This publication explores the…

  16. Reduction operator for wide-SIMDs reconsidered

    NARCIS (Netherlands)

    Waeijen, L.J.W.; She, D.; Corporaal, H.; He, Y.

    2014-01-01

    It has been shown that wide Single Instruction Multiple Data architectures (wide-SIMDs) can achieve high energy efficiency, especially in domains such as image and vision processing. In these and various other application domains, reduction is a frequently encountered operation, where multiple input

  17. Innovation in Science Education - World-Wide.

    Science.gov (United States)

    Baez, Albert V.

    The purpose of this book is to promote improvements in science education, world-wide, but particularly in developing countries. It is addressed to those in positions to make effective contributions to the improvement of science education. The world-wide role of science education, the goals of innovative activities, past experience in efforts to…

  18. Michelson wide-field stellar interferometry

    NARCIS (Netherlands)

    Montilla, I.

    2004-01-01

    The main goal of this thesis is to develop a system to permit wide field operation of Michelson Interferometers. A wide field of view is very important in applications such as the observation of extended or multiple objects, the fringe acquisition and/ or tracking on a nearby unresolved object, and

  19. Management van World-Wide Web Servers

    NARCIS (Netherlands)

    van Hengstum, F.P.H.; Pras, Aiko

    1996-01-01

    Het World Wide Web is een populaire Internet toepassing waarmee het mogelijk is documenten aan willekeurige Internet gebruikers aan te bieden. Omdat hiervoor nog geen voorzieningen zijn getroffen, was het tot voor kort niet goed mogelijk het World Wide Web op afstand te beheren. De Universiteit

  20. Protocolized hyperventilation enhances electroconvulsive therapy.

    Science.gov (United States)

    de Arriba-Arnau, Aida; Dalmau, Antonia; Soria, Virginia; Salvat-Pujol, Neus; Ribes, Carmina; Sánchez-Allueva, Ana; Menchón, José Manuel; Urretavizcaya, Mikel

    2017-08-01

    Hyperventilation is recommended in electroconvulsive therapy (ECT) to enhance seizures and to increase patients' safety. However, more evidence is needed regarding its effects and the optimum method of application. This prospective study involving 21 subjects compared two procedures, protocolized hyperventilation (PHV) and hyperventilation as usual (HVau), applied to the same patient in two consecutive sessions. Transcutaneous partial pressure of carbon dioxide (TcPCO 2 ) was measured throughout all sessions. Ventilation parameters, hemodynamic measures, seizure characteristics, and side effects were also explored. PHV resulted in lower TcPCO 2 after hyperventilation (p=.008) and over the whole session (p=.035). The lowest TcPCO 2 was achieved after voluntary hyperventilation. Changes in TcPCO 2 from baseline showed differences between HVau and PHV at each session time-point (all p<.05). Between- and within-subjects factors were statistically significant in a general linear model. Seizure duration was greater in PHV sessions (p=.028), without differences in other seizure quality parameters or adverse effects. Correlations were found between hypocapnia induction and seizure quality indexes. Secondary outcomes could be underpowered. PHV produces hypocapnia before the stimulus, modifies patients' TcPCO 2 values throughout the ECT session and lengthens seizure duration. Voluntary hyperventilation is the most important part of the PHV procedure with respect to achieving hypocapnia. A specific ventilation approach, CO 2 quantification and monitoring may be advisable in ECT. PHV is easy to apply in daily clinical practice and does not imply added costs. Ventilation management has promising effects in terms of optimizing ECT technique. Copyright © 2017 Elsevier B.V. All rights reserved.

  1. The protocol amending the 1963 Vienna Convention

    International Nuclear Information System (INIS)

    Lamm, V.

    2006-01-01

    Technically the Vienna Convention was revised by the adoption of the protocol to amend the instrument. and according to Article 19 of the protocol 'A State which is Party to this Protocol but not to the 1963 Vienna Convention shall be bound by the provisions of that Convention as amended by this Protocol in relation to other States Parties hereto, and failing an expression of a different intention by that State at the time of deposit of an instrument referred to in Article 20 shall be bound by the provisions of the 1963 Vienna Convention in relation to States which are only Parties thereto'. This solution has created a special situation, because after the entry into force of the protocol there will be living together or operating in practice 'two' Vienna Conventions, notably the convention's original text of 1963 and its new version as amended by the protocol. After the protocol has come into force, a state may only accede to the amended version, but in the inter se relations of the States Party to the 'old' Vienna Convention the provisions of that convention will remain in force until such time as they have acceded to the new protocol. This rather complicated situation is nevertheless understandable and is fully in accord with Article 40 of the 1969 Vienna Convention on the Law of Treaties, which provides for the amendment of multilateral treaties. In 1989 the negotiations on the revision of the Vienna Convention had begun with the aim of strengthening the existing nuclear liability regime and of improving the situation of potential victims of nuclear accidents. The Protocol to Amend the Vienna Convention serves those purposes; it also reflects a good compromise, since it is the outcome of a negotiation process in which experts from both nuclear and non-nuclear states, from Contacting Parties and non-Contracting Parties were very active. That affords some assurance that the compromise solution reached is acceptable to all States participating in the adoption of

  2. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  3. Security Protocol Review Method Analyzer(SPRMAN)

    OpenAIRE

    Navaz, A. S. Syed; Narayanan, H. Iyyappa; Vinoth, R.

    2013-01-01

    This Paper is designed using J2EE (JSP, SERVLET), HTML as front end and a Oracle 9i is back end. SPRMAN is been developed for the client British Telecom (BT) UK., Telecom company. Actually the requirement of BT is, they are providing Network Security Related Products to their IT customers like Virtusa,Wipro,HCL etc., This product is framed out by set of protocols and these protocols are been associated with set of components. By grouping all these protocols and components together, product is...

  4. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...

  5. Establishing treatment protocols for clinical mastitis.

    Science.gov (United States)

    Roberson, Jerry R

    2003-03-01

    Each farm has a unique mix of mastitis pathogens and management procedures that have evolved over time. The herd veterinarian should work with the manager/owner to systematically develop treatment protocols that meet the needs and management of the farm. To establish a mastitis treatment protocol, it is necessary to develop a system to routinely identify clinical mastitis cases, develop a herd-specific severity level assessment system, manage the clinical mastitis cases based on severity level and culture result (when available), avoid antibiotic residues, and monitor the success of the system and alter the protocol as necessary.

  6. The Singapore protocol [for quantum cryptography

    International Nuclear Information System (INIS)

    Englert, B.

    2005-01-01

    The qubit protocol for quantum key distribution presented in this talk is fully tomographic and more efficient than other tomographic protocols. Under ideal circumstances the efficiency is log 2 (4/3) = 0.415 key bits per qubit sent, which is 25% more than the efficiency of 1/3 = 0.333 for the standard 6-state protocol. One can extract 0.4 key bits per qubit by a simple two-way communication scheme, and can so get close to the information-theoretical limit. The noise thresholds for secure key bit generation in the presence of unbiased noise will be reported and discussed. (author)

  7. A Logical Analysis of Quantum Voting Protocols

    Science.gov (United States)

    Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja

    2017-12-01

    In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.

  8. Protocol: methodology for chromatin immunoprecipitation (ChIP in Chlamydomonas reinhardtii

    Directory of Open Access Journals (Sweden)

    Strenkert Daniela

    2011-11-01

    Full Text Available Abstract We report on a detailed chromatin immunoprecipitation (ChIP protocol for the unicellular green alga Chlamydomonas reinhardtii. The protocol is suitable for the analysis of nucleosome occupancy, histone modifications and transcription factor binding sites at the level of mononucleosomes for targeted and genome-wide studies. We describe the optimization of conditions for crosslinking, chromatin fragmentation and antibody titer determination and provide recommendations and an example for the normalization of ChIP results as determined by real-time PCR.

  9. A minimal cost micropropagation protocol for Dianthus caryophyllus L.-- a commercially significant venture.

    Science.gov (United States)

    Pant, Manu

    2016-03-01

    In tissue culture, high production cost of the products restricts their reach. Though tissue culture is a major strength in floriculture it is marred by pricing issues. Hence, we developed a complete regeneration low cost micropropagation protocol for an economically important floriculture crop, carnation (Dianthus caryophyllus L.). Successful regeneration of carnation from nodal explants on cost-efficient medium indicates that psyllium husk, sugar and RO water can effectively replace the conventional medium comprising agar, sucrose and distilled water. The protocol can contribute to increased carnation production at comparatively reduced cost, and there by encourage wide scale adoption by the common growers.

  10. Survey is based on Synchronized and Asynchronized Approach of MAC Protocols in WSN

    Directory of Open Access Journals (Sweden)

    Soni Chaurasia

    2010-07-01

    Full Text Available A wireless network is made of spatially distributed autonomous devices. These devices are called sensors. The sensor is used for monitoring physical or environmental conditions. The potential application of wireless sensor network is environmental monitoring, healthcare applications and tactical systems. In this paper focus is on the MAC protocol for WSN. Wireless sensor network is deployed for wide range to send and receive data with the help of medium. Here literature survey of MAC protocol based on the synchronized and asynchronized approach is described which is used to meet different objective like access a medium, statistical channel allocation, spectrum utilization

  11. Computer network time synchronization the network time protocol on earth and in space

    CERN Document Server

    Mills, David L

    2010-01-01

    Carefully coordinated, reliable, and accurate time synchronization is vital to a wide spectrum of fields-from air and ground traffic control, to buying and selling goods and services, to TV network programming. Ill-gotten time could even lead to the unimaginable and cause DNS caches to expire, leaving the entire Internet to implode on the root servers.Written by the original developer of the Network Time Protocol (NTP), Computer Network Time Synchronization: The Network Time Protocol on Earth and in Space, Second Edition addresses the technological infrastructure of time dissemination, distrib

  12. Allowing Students to Select Deliverables for Peer Review: Analysis of a Free-Selection Protocol

    DEFF Research Database (Denmark)

    Papadopoulos, Pantelis M.; Lagkas, Thomas; Demetriadis, Stavros

    2011-01-01

    This study analyzes the benefits and limitations of a “free-selection” peer assignment protocol by comparing them to the widely implemented “assigned-pair” protocol. The primary motivation was to circumvent the issues that often appear to the instructors implementing peer review activities with pre......-Selection, where students were able to explore and select peer work for review. Result analysis showed a very strong tendency in favor of the Free-Selection students regarding both domain specific (conceptual) and domain-general (reviewing) knowledge....

  13. Consistency in the World Wide Web

    DEFF Research Database (Denmark)

    Thomsen, Jakob Grauenkjær

    Tim Berners-Lee envisioned that computers will behave as agents of humans on the World Wide Web, where they will retrieve, extract, and interact with information from the World Wide Web. A step towards this vision is to make computers capable of extracting this information in a reliable...... and consistent way. In this dissertation we study steps towards this vision by showing techniques for the specication, the verication and the evaluation of the consistency of information in the World Wide Web. We show how to detect certain classes of errors in a specication of information, and we show how...... the World Wide Web, in order to help perform consistent evaluations of web extraction techniques. These contributions are steps towards having computers reliable and consistently extract information from the World Wide Web, which in turn are steps towards achieving Tim Berners-Lee's vision. ii...

  14. Using Think Aloud Protocols to Assess E-Prescribing in Community Pharmacies

    Directory of Open Access Journals (Sweden)

    Olufunmilola K. Odukoya, BPharm, MS

    2012-01-01

    Full Text Available Introduction: Think aloud protocol has rarely been used as a method of data collection in community pharmacies.Purpose: The aim of the report is to describe how think aloud protocols were used to identify issues that arise when using e-prescribing technology in pharmacies. In this paper, we report on the benefits and challenges of using think aloud protocols in pharmacies to examine the use of e-prescribing systems.Methods: Sixteen pharmacists and pharmacy technicians were recruited from seven community pharmacies in Wisconsin. Data were collected using direct observation alongside think aloud protocol. Direct observations and think aloud protocols took place between January-February, 2011. Participants were asked to verbalize their thoughts as they process electronic prescriptions.Results: Participants identified weaknesses in e-prescribing that they had previously not conceived. This created heightened awareness for vigilance when processing e-prescriptions. The main challenge with using think aloud protocols was due to interruptions in the pharmacies. Also, a few participants found it challenging to remember to continue verbalizing their thought process during think aloud sessions.Conclusion: The use of think aloud protocols as method of data collection is a new way for understanding the issues related to technology use in community pharmacy practice. Think aloud protocol was beneficial in providing objective information on e-prescribing use not solely based on pharmacist’s or technician’s opinion of the technology. This method provided detailed information on a wide variety of real time challenges with e-prescribing technology use in community pharmacies. Using this data collection method can help identify potential patient safety issues when using e-prescribing and suggestions for redesign.

  15. Two-Layer Hierarchy Optimization Model for Communication Protocol in Railway Wireless Monitoring Networks

    Directory of Open Access Journals (Sweden)

    Xiaoping Ma

    2018-01-01

    Full Text Available The wireless monitoring system is always destroyed by the insufficient energy of the sensors in railway. Hence, how to optimize the communication protocol and extend the system lifetime is crucial to ensure the stability of system. However, the existing studies focused primarily on cluster-based or multihop protocols individually, which are ineffective in coping with the complex communication scenarios in the railway wireless monitoring system (RWMS. This study proposes a hybrid protocol which combines the cluster-based and multihop protocols (CMCP to minimize and balance the energy consumption in different sections of the RWMS. In the first hierarchy, the total energy consumption is minimized by optimizing the cluster quantities in the cluster-based protocol and the number of hops and the corresponding hop distances in the multihop protocol. In the second hierarchy, the energy consumption is balanced through rotating the cluster head (CH in the subnetworks and further optimizing the hops and the corresponding hop distances in the backbone network. On this basis, the system lifetime is maximized with the minimum and balance energy consumption among the sensors. Furthermore, the hybrid particle swarm optimization and genetic algorithm (PSO-GA are adopted to optimize the energy consumption from the two-layer hierarchy. Finally, the effectiveness of the proposed CMCP is verified in the simulation. The performances of the proposed CMCP in system lifetime, residual energy, and the corresponding variance are all superior to the LEACH protocol widely applied in the previous research. The effective protocol proposed in this study can facilitate the application of the wireless monitoring network in the railway system and enhance safety operation of the railway.

  16. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

    Science.gov (United States)

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S

    2015-11-01

    In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.

  17. Test Protocols for Advanced Inverter Interoperability Functions - Appendices

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, Jay Dean [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gonzalez, Sigifredo [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ralph, Mark E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ellis, Abraham [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Broderick, Robert Joseph [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2013-11-01

    Distributed energy resources (DER) such as photovoltaic (PV) systems, when deployed in a large scale, are capable of influencing significantly the operation of power systems. Looking to the future, stakeholders are working on standards to make it possible to manage the potentially complex interactions between DER and the power system. In 2009, the Electric Power Research Institute (EPRI), Sandia National Laboratories (SNL) with the U.S. Department of Energy (DOE), and the Solar Electric Power Association (SEPA) initiated a large industry collaborative to identify and standardize definitions for a set of DER grid support functions. While the initial effort concentrated on grid-tied PV inverters and energy storage systems, the concepts have applicability to all DER. A partial product of this on-going effort is a reference definitions document (IEC TR 61850-90-7, Object models for power converters in distributed energy resources (DER) systems) that has become a basis for expansion of related International Electrotechnical Commission (IEC) standards, and is supported by US National Institute of Standards and Technology (NIST) Smart Grid Interoperability Panel (SGIP). Some industry-led organizations advancing communications protocols have also embraced this work. As standards continue to evolve, it is necessary to develop test protocols to independently verify that the inverters are properly executing the advanced functions. Interoperability is assured by establishing common definitions for the functions and a method to test compliance with operational requirements. This document describes test protocols developed by SNL to evaluate the electrical performance and operational capabilities of PV inverters and energy storage, as described in IEC TR 61850-90-7. While many of these functions are not now required by existing grid codes or may not be widely available commercially, the industry is rapidly moving in that direction. Interoperability issues are already apparent as

  18. Test Protocols for Advanced Inverter Interoperability Functions – Main Document

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, Jay Dean [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gonzalez, Sigifredo [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ralph, Mark E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ellis, Abraham [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Broderick, Robert Joseph [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2013-11-01

    Distributed energy resources (DER) such as photovoltaic (PV) systems, when deployed in a large scale, are capable of influencing significantly the operation of power systems. Looking to the future, stakeholders are working on standards to make it possible to manage the potentially complex interactions between DER and the power system. In 2009, the Electric Power Research Institute (EPRI), Sandia National Laboratories (SNL) with the U.S. Department of Energy (DOE), and the Solar Electric Power Association (SEPA) initiated a large industry collaborative to identify and standardize definitions for a set of DER grid support functions. While the initial effort concentrated on grid-tied PV inverters and energy storage systems, the concepts have applicability to all DER. A partial product of this on-going effort is a reference definitions document (IEC TR 61850-90-7, Object models for power converters in distributed energy resources (DER) systems) that has become a basis for expansion of related International Electrotechnical Commission (IEC) standards, and is supported by US National Institute of Standards and Technology (NIST) Smart Grid Interoperability Panel (SGIP). Some industry-led organizations advancing communications protocols have also embraced this work. As standards continue to evolve, it is necessary to develop test protocols to independently verify that the inverters are properly executing the advanced functions. Interoperability is assured by establishing common definitions for the functions and a method to test compliance with operational requirements. This document describes test protocols developed by SNL to evaluate the electrical performance and operational capabilities of PV inverters and energy storage, as described in IEC TR 61850-90-7. While many of these functions are not currently required by existing grid codes or may not be widely available commercially, the industry is rapidly moving in that direction. Interoperability issues are already

  19. Taking an idea to a research protocol

    African Journals Online (AJOL)

    2013-11-13

    Nov 13, 2013 ... Review Article: Taking an idea to a research protocol ... step is to identify the knowledge gap within the intended field of research by examining the background ... be found by writing a critical narrative review of the literature.

  20. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... results. The most important generalization is the support for all security properties of the geometric fragment proposed by [Gut14]....... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...

  1. Oxygen tolerance test : A standardised protocol

    Directory of Open Access Journals (Sweden)

    D K Ghosh

    2015-01-01

    Conclusion: By following a standardised protocol for Oxygen Tolerance Test, an objective assessment and recordkeeping is possible. This shall entail a more effective screening during the initial diving medical examination.

  2. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  3. Authentication Protocol using Quantum Superposition States

    Energy Technology Data Exchange (ETDEWEB)

    Kanamori, Yoshito [University of Alaska; Yoo, Seong-Moo [University of Alabama, Huntsville; Gregory, Don A. [University of Alabama, Huntsville; Sheldon, Frederick T [ORNL

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  4. Technical Analysis of SSP-21 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-09

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.

  5. Adaptive security protocol selection for mobile computing

    NARCIS (Netherlands)

    Pontes Soares Rocha, B.; Costa, D.N.O.; Moreira, R.A.; Rezende, C.G.; Loureiro, A.A.F.; Boukerche, A.

    2010-01-01

    The mobile computing paradigm has introduced new problems for application developers. Challenges include heterogeneity of hardware, software, and communication protocols, variability of resource limitations and varying wireless channel quality. In this scenario, security becomes a major concern for

  6. Entanglement distillation protocols and number theory

    International Nuclear Information System (INIS)

    Bombin, H.; Martin-Delgado, M.A.

    2005-01-01

    We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set Z D n associated with Bell diagonal states is a module rather than a vector space. We find that a partition of Z D n into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D. When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively

  7. Saudi Arabia and CERN sign protocol

    CERN Multimedia

    2008-01-01

    On 9 May 2008, Mohammed I. Al Suwaiyel, President of the King Abdulaziz City of Science and Technology, representing the Government of Saudi Arabia, and CERN Director-General, Robert Aymar, signed a protocol to the 2006 cooperation agreement between CERN and Saudi Arabia. Members of the Saudi Arabian Government visit ATLAS.The purpose of the protocol is to define the operational framework needed to carry out various specific tasks provided for in the cooperation agreement in order to promote the development of a high energy particle physics community in Saudi Arabia and its ultimate visible participation as a member of the global CERN community. Signing the protocol, Mohammed I. Al-Suwaiyel said: "The Saudi Arabian Government has taken a number of initiatives to promote R&D in the interests of our country’s development and the advancement of science. Thanks to this protocol, Saudi scientists will be able to work towards this go...

  8. Verbal protocols as methodological resources: research evidence

    Directory of Open Access Journals (Sweden)

    Alessandra Baldo

    2012-01-01

    Full Text Available This article aims at reflecting on the use of verbal protocols as a methodological resource in qualitative research, more specifically on the aspect regarded as the main limitation of a study about lexical inferencing in L2 (BALDO; VELASQUES, 2010: its subjective trait. The article begins with a brief literature review on protocols, followed by a description of the study in which they were employed as methodological resources. Based on that, protocol subjectivity is illustrated through samples of unparalleled data classification, carried out independently by two researchers. In the final section, the path followed to minimize the problem is presented, intending to contribute to improve efficiency in the use of verbal protocols in future research.

  9. Real-Time Fault Tolerant Networking Protocols

    National Research Council Canada - National Science Library

    Henzinger, Thomas A

    2004-01-01

    We made significant progress in the areas of video streaming, wireless protocols, mobile ad-hoc and sensor networks, peer-to-peer systems, fault tolerant algorithms, dependability and timing analysis...

  10. Development of measurement protocols for quantum magnetometry

    DEFF Research Database (Denmark)

    Stark, Alexander

    and protocols to enhance the lifetime and the coherences of the NV center with the overall goal of enhancing the capabilities of this sensor in the field of magnetometry. In order to realize complex protocols, a sophisticated software control of the measurement setup is required. A general software framework......, is serving as rigorous framework to reduce the complexity of the setup configuration by a fundamental separation of tasks. As a consequence, the general idea of this framework is not limited to experiments with color centers in diamond, but can find application in any laboratory environment. The measurement...... of magnetic fields in the high-frequency GHz regimes is challenging. In this thesis, a continuous dynamical decoupling protocol is developed and implemented, which extends the capabilities of the NV sensor to probe GHz signals with a narrow bandwidth. Moreover, the protocol protects the system from noise...

  11. How to write a research protocol

    African Journals Online (AJOL)

    A research protocol is best viewed as a key to open the gates between the researcher and ... studies will be quantitative designs and these form the focus of this paper. ..... applied to the underlying clinical problem addressed by the study.

  12. Language, Semantics, and Methods for Security Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico

    events. Methods like strand spaces and the inductive method of Paulson have been designed to support an intensional, event-based, style of reasoning. These methods have successfully tackled a number of protocols though in an ad hoc fashion. They make an informal spring from a protocol to its......-nets. They have persistent conditions and as we show in this thesis, unfold under reasonable assumptions to a more basic kind of nets. We relate SPL-nets to strand spaces and inductive rules, as well as trace languages and event structures so unifying a range of approaches, as well as providing conditions under...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...

  13. Implementation of the Additional Protocol in Japan

    International Nuclear Information System (INIS)

    Ogawa, T.

    2001-01-01

    The Additional Protocol between Japan and the IAEA entered into force in December 1999. To come into force a series of implementation trials of Additional Protocol was carried out at two Japanese representative nuclear research centers, i.e. Tokai Research Establishment of Japan Atomic Energy Research Institute (JAERI) and Oarai Engineering Center of Japan Nuclear Fuel Cycle Development Institute (JNC). These trials were proposed by Japan and were conducted in cooperation with the IAEA Secretariat. In addition, Japan amended 'the Law for the Regulation of Reactors etc.', to collect adequate information to submit to the IAEA, to arrange the surrounding for the complementary access, etc. In addition, Japan Submitted the Initial Declaration of the Additional Protocol within 180 days of the entry into force of the Protocol, in the middle of June, 2000

  14. Field Monitoring Protocol. Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Earle, L. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Christensen, D. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Maguire, J. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Wilson, E. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Hancock, C. E. [Mountain Energy Partnership, Longmont, CO (United States)

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  15. Field Monitoring Protocol: Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  16. An Evaluation Methodology for Protocol Analysis Systems

    Science.gov (United States)

    2007-03-01

    Main Memory Requirement NS: Needham-Schroeder NSL: Needham-Schroeder-Lowe OCaml : Objective Caml POSIX: Portable Operating System...methodology is needed. A. PROTOCOL ANALYSIS FIELD As with any field, there is a specialized language used within the protocol analysis community. Figure...ProVerif requires that Objective Caml ( OCaml ) be installed on the system, OCaml version 3.09.3 was installed. C. WINDOWS CONFIGURATION OS

  17. Topology Discovery Using Cisco Discovery Protocol

    OpenAIRE

    Rodriguez, Sergio R.

    2009-01-01

    In this paper we address the problem of discovering network topology in proprietary networks. Namely, we investigate topology discovery in Cisco-based networks. Cisco devices run Cisco Discovery Protocol (CDP) which holds information about these devices. We first compare properties of topologies that can be obtained from networks deploying CDP versus Spanning Tree Protocol (STP) and Management Information Base (MIB) Forwarding Database (FDB). Then we describe a method of discovering topology ...

  18. Emulation of Industrial Control Field Device Protocols

    Science.gov (United States)

    2013-03-01

    today. The protocol operates at the application layer of the open systems interconnection ( OSI ) model, meaning it operates independently of the...the OSI model. Their job is to receive serial data from an MTU in the Modbus RTU or ASCII protocol, encapsulate and transmit the data to another modem...facing connection and out-of-band logging capabilities over the other LAN -facing connection. Despite the fact that the hardware configuration of the

  19. A Review of Fair Exchange Protocols

    OpenAIRE

    Abdullah AlOtaibi; Hamza Aldabbas

    2012-01-01

    Recently, the Internet has become an essential business platform, aiding trading, distribution and sales between organisations, consumers and even between consumers themselves. This technology revolution has brought e-commerce to an entirely new level, which therefore has raised some new security issues. Security protocols in e-commerce are required to manage the transactions between buyers and sellers. In order to engage customers in e-commerce, these protocols should be well formulated and ...

  20. Recursion vs. Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2005-01-01

    We use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek's spect...... of messages in the sense of Amadio, Lugiez and Vanackere. We conclude by showing that reachability analysis for a replicative variant of the protocol becomes decidable....

  1. Broadening and Simplifying the First SETI Protocol

    Science.gov (United States)

    Michaud, M. A. G.

    The Declaration of Principles Concerning Activities Following the Detection of Extraterrestrial Intelligence, known informally as the First SETI Protocol, is the primary existing international guidance on this subject. During the fifteen years since the document was issued, several people have suggested revisions or additional protocols. This article proposes a broadened and simplified text that would apply to the detection of alien technology in our solar system as well as to electromagnetic signals from more remote sources.

  2. Hybrid Long-Distance Entanglement Distribution Protocol

    DEFF Research Database (Denmark)

    Brask, J.B.; Rigas, I.; Polzik, E.S.

    2010-01-01

    We propose a hybrid (continuous-discrete variable) quantum repeater protocol for long-distance entanglement distribution. Starting from states created by single-photon detection, we show how entangled coherent state superpositions can be generated by means of homodyne detection. We show that near......-deterministic entanglement swapping with such states is possible using only linear optics and homodyne detectors, and we evaluate the performance of our protocol combining these elements....

  3. Dynamic Aggregation Protocol for Wireless Sensor Networks

    OpenAIRE

    Mounir Said , Adel; William Ibrahim , Ashraf; Soua , Ahmed; Afifi , Hossam

    2013-01-01

    International audience; Sensor networks suffer from limited capabilities such as bandwidth, low processing power, and memory size. There is therefore a need for protocols that deliver sensor data in an energy-efficient way to the sink. One of those techniques, it gathers sensors' data in a small size packet suitable for transmission. In this paper, we propose a new Effective Data Aggregation Protocol (DAP) to reduce the energy consumption in Wireless Sensor Networks (WSNs), which prolongs the...

  4. Optimistic protocol for partitioned distributed database systems

    International Nuclear Information System (INIS)

    Davidson, S.B.

    1982-01-01

    A protocol for transaction processing during partition failures is presented which guarantees mutual consistency between copies of data-items after repair is completed. The protocol is optimistic in that transactions are processed without restrictions during the failure; conflicts are detected at repair time using a precedence graph and are resolved by backing out transactions according to some backout strategy. The protocol is then evaluated using simulation and probabilistic modeling. In the simulation, several parameters are varied such as the number of transactions processed in a group, the type of transactions processed, the number of data-items present in the database, and the distribution of references to data-items. The simulation also uses different backout strategies. From these results we note conditions under which the protocol performs well, i.e., conditions under which the protocol backs out a small percentage of the transaction run. A probabilistic model is developed to estimate the expected number of transactions backed out using most of the above database and transaction parameters, and is shown to agree with simulation results. Suggestions are then made on how to improve the performance of the protocol. Insights gained from the simulation and probabilistic modeling are used to develop a backout strategy which takes into account individual transaction costs and attempts to minimize total backout cost. Although the problem of choosing transactions to minimize total backout cost is, in general, NP-complete, the backout strategy is efficient and produces very good results

  5. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  6. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  7. The World Wide Web of War

    National Research Council Canada - National Science Library

    Smith, Craig A

    2006-01-01

    Modern communications, combined with the near instantaneous publication of information on the World Wide Web, are providing the means to dramatically affect the pursuit, conduct, and public opinion of war on both sides...

  8. Nasa-wide Standard Administrative Systems

    Science.gov (United States)

    Schneck, P.

    1984-01-01

    Factors to be considered in developing agency-wide standard administrative systems for NASA include uniformity of hardware and software; centralization vs. decentralization; risk exposure; and models for software development.

  9. IOT Overview: Wide-Field Imaging

    Science.gov (United States)

    Selman, F. J.

    The Wide Field Imager (WFI) instrument at La Silla has been the workhorse of wide-field imaging instruments at ESO for several years. In this contribution I will summarize the issues relating to its productivity for the community both in terms of the quality and quantity of data that has come out of it. Although only surveys of limited scope have been completed using WFI, it is ESO's stepping-stone to the new generation of survey telescopes.

  10. AA, wide quadrupole on measurement stand

    CERN Multimedia

    CERN PhotoLab

    1981-01-01

    Please look up 8101024 first. Shims and washers on the wide quadrupoles (QFW, QDW; located in the lattice where dispersion was large) served mostly for corrections of those lattice parameters which were a function of momentum. After mounting shims and washers, the quadrupoles were measured to determine their magnetic centre and to catalogue the effect of washer constellations. Raymond Brown is busy measuring a wide quad.

  11. AA, assembly of wide bending magnet

    CERN Multimedia

    CERN PhotoLab

    1980-01-01

    The very particular lattice of the AA required 2 types of dipoles (bending magnets; BST, short and wide; BLG, long and narrow). The wide ones had a steel length of 2.71 m, a "good field" width of 0.564 m, and a weight of about 75 t. Here we see the copper coils being hoisted onto the lower half of a BST. See also 7811105, 8006050. For a BLG, see 8001044.

  12. Emergency Medicine for medical students world wide!

    DEFF Research Database (Denmark)

    Perinpam, Larshan; Thi Huynh, Anh-Nhi

    2015-01-01

    A guest blog from Larshan Perinpam (President of ISAEM) and Anh-Nhi Thi Huynh (Vice president of external affairs, ISAEM) - http://blogs.bmj.com/emj/2015/04/17/emergency-medicine-for-medical-students-world-wide/......A guest blog from Larshan Perinpam (President of ISAEM) and Anh-Nhi Thi Huynh (Vice president of external affairs, ISAEM) - http://blogs.bmj.com/emj/2015/04/17/emergency-medicine-for-medical-students-world-wide/...

  13. Three-Stage Quantum Cryptography Protocol under Collective-Rotation Noise

    Directory of Open Access Journals (Sweden)

    Linsen Wu

    2015-05-01

    Full Text Available Information security is increasingly important as society migrates to the information age. Classical cryptography widely used nowadays is based on computational complexity, which means that it assumes that solving some particular mathematical problems is hard on a classical computer. With the development of supercomputers and, potentially, quantum computers, classical cryptography has more and more potential risks. Quantum cryptography provides a solution which is based on the Heisenberg uncertainty principle and no-cloning theorem. While BB84-based quantum protocols are only secure when a single photon is used in communication, the three-stage quantum protocol is multi-photon tolerant. However, existing analyses assume perfect noiseless channels. In this paper, a multi-photon analysis is performed for the three-stage quantum protocol under the collective-rotation noise model. The analysis provides insights into the impact of the noise level on a three-stage quantum cryptography system.

  14. [Professor Xu Fu-song's traditional Chinese medicine protocols for male diseases: A descriptive analysis].

    Science.gov (United States)

    Liu, Cheng-yong; Xu, Fu-song

    2015-04-01

    To analyze the efficacy and medication principles of Professor Xu Fu-songs traditional Chinese medicine (TCM) protocols for male diseases. We reviewed and descriptively analyzed the unpublished complete medical records of 100 male cases treated by Professor Xu Fu-song with his TCM protocols from 1978 to 1992. The 100 cases involved 32 male diseases, most of which were difficult and complicated cases. The drug compliance was 95%. Each prescription was made up of 14 traditional Chinese drugs on average. The cure rate was 32% , and the effective rate was 85%. Professor Xu Fu-song advanced and proved some new theories and therapeutic methods. Professor Xu Fu-song's TCM protocols can be applied to a wide range of male diseases, mostly complicated, and are characterized by accurate differentiation of symptoms and signs, high drug compliance, and excellent therapeutic efficacy.

  15. Enhanced Secure Trusted AODV (ESTA Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dilraj Singh

    2015-09-01

    Full Text Available The self-organizing nature of the Mobile Ad hoc Networks (MANETs provide a communication channel anywhere, anytime without any pre-existing network infrastructure. However, it is exposed to various vulnerabilities that may be exploited by the malicious nodes. One such malicious behavior is introduced by blackhole nodes, which can be easily introduced in the network and, in turn, such nodes try to crumble the working of the network by dropping the maximum data under transmission. In this paper, a new protocol is proposed which is based on the widely used Ad hoc On-Demand Distance Vector (AODV protocol, Enhanced Secure Trusted AODV (ESTA, which makes use of multiple paths along with use of trust and asymmetric cryptography to ensure data security. The results, based on NS-3 simulation, reveal that the proposed protocol is effectively able to counter the blackhole nodes in three different scenarios.

  16. Methods for culturing retinal pigment epithelial cells: a review of current protocols and future recommendations

    Directory of Open Access Journals (Sweden)

    Aaron H Fronk

    2016-07-01

    Full Text Available The retinal pigment epithelium is an important part of the vertebrate eye, particularly in studying the causes and possible treatment of age-related macular degeneration. The retinal pigment epithelium is difficult to access in vivo due to its location at the back of the eye, making experimentation with age-related macular degeneration treatments problematic. An alternative to in vivo experimentation is cultivating the retinal pigment epithelium in vitro, a practice that has been going on since the 1970s, providing a wide range of retinal pigment epithelial culture protocols, each producing cells and tissue of varying degrees of similarity to natural retinal pigment epithelium. The purpose of this review is to provide researchers with a ready list of retinal pigment epithelial protocols, their effects on cultured tissue, and their specific possible applications. Protocols using human and animal retinal pigment epithelium cells, derived from tissue or cell lines, are discussed, and recommendations for future researchers included.

  17. Final report for the protocol extensions for ATM Security Laboratory Directed Research and Development Project

    Energy Technology Data Exchange (ETDEWEB)

    Tarman, T.D.; Pierson, L.G.; Brenkosh, J.P. [and others

    1996-03-01

    This is the summary report for the Protocol Extensions for Asynchronous Transfer Mode project, funded under Sandia`s Laboratory Directed Research and Development program. During this one-year effort, techniques were examined for integrating security enhancements within standard ATM protocols, and mechanisms were developed to validate these techniques and to provide a basic set of ATM security assurances. Based on our experience during this project, recommendations were presented to the ATM Forum (a world-wide consortium of ATM product developers, service providers, and users) to assist with the development of security-related enhancements to their ATM specifications. As a result of this project, Sandia has taken a leading role in the formation of the ATM Forum`s Security Working Group, and has gained valuable alliances and leading-edge experience with emerging ATM security technologies and protocols.

  18. MDEP Protocol VICWG-01. MDEP Protocol: Witnessed, Joint, and Multinational Vendor Inspection Protocol

    International Nuclear Information System (INIS)

    2014-01-01

    The Multinational Design Evaluation Programme (MDEP) was launched in 2006 by the US Nuclear Regulatory Commission (NRC) and the French Nuclear Safety Authority (ASN) with the aim of developing innovative approaches to leverage the resources and knowledge of national regulatory authorities reviewing new reactor designs. MDEP full members are regulators from Canada, People's Republic of China, Finland, France, India, Japan, Republic of Korea, Russian Federation, South Africa, Sweden, the United Kingdom and the United States of America. The United Arab Emirates and Turkey are associate members. The OECD Nuclear Energy Agency (NEA) acts as the Technical Secretariat for the MDEP. The International Atomic Energy Agency (IAEA) participates in many of the MDEP activities, including harmonisation efforts. The Vendor Inspection Cooperation Working Group (VICWG) is one of the issue-specific working groups that the MDEP members are undertaking with one long term goal of the VICWG being to maximize the use of the results obtained from other regulator's efforts in inspecting vendors. To accomplish this goal, it is vital that the regulators learn about each other's procedures, processes, and regulations. To facilitate the learning process the VICWG is coordinating vendor inspections among the involved regulatory authorities with the purpose of enhancing the understanding of each other's vendor inspection procedures. This programme is administered by the NEA. Involvement in specific inspections provides a number of opportunities for member state regulators to witness other regulators' inspection methods, gain useful information on the quality systems and manufacturing arrangements of specific vendors and where appropriate, actively participate in the inspection. The purpose of this protocol is to provide guidance to regulators that wish to carry out vendor inspections or participate in or witness other regulators' vendor inspections. It also provides

  19. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  20. The SHIP: A SIP to HTTP Interaction Protocol

    Science.gov (United States)

    Zeiß, Joachim; Gabner, Rene; Bessler, Sandford; Happenhofer, Marco

    IMS is capable of providing a wide range of services. As a result, terminal software becomes more and more complex to deliver network intelligence to user applications. Currently mobile terminal software needs to be permanently updated so that the latest network services and functionality can be delivered to the user. In the Internet, browser based user interfaces assure that an interface is made available to the user which offers the latest services in the net immediately. Our approach combines the benefits of the Session Initiation Protocol (SIP) and those of the HTTP protocol to bring the same type of user interfacing to IMS. SIP (IMS) realizes authentication, session management, charging and Quality of Service (QoS), HTTP provides access to Internet services and allows the user interface of an application to run on a mobile terminal while processing and orchestration is done on the server. A SHIP enabled IMS client only needs to handle data transport and session management via SIP, HTTP and RTP and render streaming media, HTML and Javascript. SHIP allows new kinds of applications, which combine audio, video and data within a single multimedia session.

  1. EFFICACY OF DIFFERENT ENDODONTIC IRRIGATION PROTOCOLS IN CALCIUM HYDROXIDE REMOVAL

    Directory of Open Access Journals (Sweden)

    Elka N. Radeva

    2016-10-01

    Full Text Available Introduction: Calcium hydroxide is widely used in the field of endodontics as a temporary root canal filling. This medicament significantly increases pH and optimizes the treatment outcome. Its total removal before final obturation is very important. Otherwise it could affect the hermetic filling and respectively the endodontic success. Aim: To evaluate the most effective irrigation protocol of calcium hydroxide removal from root canals. Materials and methods: In this study 36 single root canal teeth were observed. They were randomly divided into three groups (n=10 each group according to the technique applied for calcium hydroxide removal - manual irrigation, irrigation and Revo-S rotary instrumentation; and passive ultrasonic irrigation, and a control group (n=6 – irrigation with distilled water only. After calcium hydroxide removals following the procedures above, teeth were separated longitudinally in a buccal-lingual direction and remnants of medicaments were observed in the apical, middle and coronal part of each tooth. Then all of the specimens were observed using scanning electron microscopy and evaluated by a specified scale. The results have undergone statistical analysis. Results: In the case of calcium hydroxide in the apex and in the middle with highest average is Revo-S, followed by Ultrasonic and irrigation. In the coronal part the highest average belongs to Revo-S, irrigation and Ultrasonic. In all groups the highest average is represented by control group. Conclusion: There is not a universal technique for removal of intracanal medicaments and applying more than one protocol is required.

  2. Secure Group Formation Protocol for a Medical Sensor Network Prototype

    DEFF Research Database (Denmark)

    Andersen, Jacob

    2009-01-01

    , and experience from user workshops and observations of clinicians at work on a hospital ward show that if the security mechanisms are not well designed, the technology is either rejected altogether, or they are circumvented leaving the system wide open to attacks. Our work targets the problem of designing......Designing security mechanisms such as privacy and access control for medical sensor networks is a challenging task; as such systems may be operated very frequently, at a quick pace, and at times in emergency situations. Understandably, clinicians hold extra unproductive tasks in low regard...... wireless sensors to be both secure and usable by exploring different solutions on a fully functional prototype platform. In this paper, we present an Elliptic Curve Cryptography (ECC) based protocol, which offers fully secure sensor set-up in a few seconds on standard (Telos) hardware. We evaluate...

  3. Generalized fragment picking in Rosetta: design, protocols and applications.

    Directory of Open Access Journals (Sweden)

    Dominik Gront

    Full Text Available The Rosetta de novo structure prediction and loop modeling protocols begin with coarse grained Monte Carlo searches in which the moves are based on short fragments extracted from a database of known structures. Here we describe a new object oriented program for picking fragments that greatly extends the functionality of the previous program (nnmake and opens the door for new approaches to structure modeling. We provide a detailed description of the code design and architecture, highlighting its modularity, and new features such as extensibility, total control over the fragment picking workflow and scoring system customization. We demonstrate that the program provides at least as good building blocks for ab-initio structure prediction as the previous program, and provide examples of the wide range of applications that are now accessible.

  4. MODELLING AND VERIFICATION OF KITSAT PACKET COMMUNICATION PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Young-Ro Lee

    1996-06-01

    Full Text Available In this paper, in order to verify KITSAT 1/2 packet communication protocols, we model the AX.25 protocol and PACSAT protocol by using an extended Petri net and then verify the correctness, boundedness, liveness and deadlock freeness of packet protocols by utilizing reachability trees.

  5. Differential phase-time shifting protocol for QKD (DPTS)

    DEFF Research Database (Denmark)

    Usuga Castaneda, Mario A.; Bacco, Davide; Christensen, Jesper Bjerge

    2016-01-01

    We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols.......We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols....

  6. Proteome-wide characterization of seed aging in Arabidopsis. A comparison between artificial and natural aging protocols

    NARCIS (Netherlands)

    Rajjou, L.; Lovigny, Y.; Groot, S.P.C.; Belghazi, M.; Job, C.; Job, D.

    2008-01-01

    A variety of mechanisms has been proposed to account for the extension of life span in seeds (seed longevity). In the present work, we have used Arabidopsis thaliana seeds as a model and carried out differential proteomics to investigate this trait, which is of both ecological and agricultural

  7. An action research protocol to strengthen system-wide inter-professional learning and practice [LP0775514

    Directory of Open Access Journals (Sweden)

    Travaglia Joanne

    2007-09-01

    Full Text Available Abstract Background Inter-professional learning (IPL and inter-professional practice (IPP are thought to be critical determinants of effective care, improved quality and safety and enhanced provider morale, yet few empirical studies have demonstrated this. Whole-of-system research is even less prevalent. We aim to provide a four year, multi-method, multi-collaborator action research program of IPL and IPP in defined, bounded health and education systems located in the Australian Capital Territory (ACT. The project is funded by the Australian Research Council under its industry Linkage Program. Methods/Design The program of research will examine in four inter-related, prospective studies, progress with IPL and IPP across tertiary education providers, professional education, regulatory and registration bodies, the ACT health system's streams of care activities and teams, units and wards of the provider facilities of the ACT health system. One key focus will be on push-pull mechanisms, ie, how the education sector creates student-enabled IPP and the health sector demands IPL-oriented practitioners. The studies will examine four research aims and meet 20 research project objectives in a comprehensive evaluation of ongoing progress with IPL and IPP. Discussion IPP and IPL are said to be cornerstones of health system reforms. We will measure progress across an entire health system and the clinical and professional education systems that feed into it. The value of multi-methods, partnership research and a bi-directional push-pull model of IPL and IPP will be tested. Widespread dissemination of results to practitioners, policymakers, managers and researchers will be a key project goal.

  8. A Cryptographic Moving-Knife Cake-Cutting Protocol

    Directory of Open Access Journals (Sweden)

    Yoshifumi Manabe

    2012-02-01

    Full Text Available This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum.

  9. Welfare Quality assessment protocol for laying hens = Welfare Quality assessment protocol voor leghennen

    NARCIS (Netherlands)

    Niekerk, van T.G.C.M.; Gunnink, H.; Reenen, van C.G.

    2012-01-01

    Results of a study on the Welfare Quality® assessment protocol for laying hens. It reports the development of the integration of welfare assessment as scores per criteria as well as simplification of the Welfare Quality® assessment protocol. Results are given from assessment of 122 farms.

  10. Nursing Music Protocol and Postoperative Pain.

    Science.gov (United States)

    Poulsen, Michael J; Coto, Jeffrey

    2018-04-01

    Pain has always been a major concern for patients and nurses during the postoperative period. Therapies, medicines, and protocols have been developed to improve pain and anxiety but have undesirable risks to the patient. Complementary and alternative medicine therapies have been studied but have not been applied as regular protocols in the hospital setting. Music is one type of complementary and alternative medicine therapy that has been reported to have favorable results on reducing postoperative pain, anxiety, and opioid usage. However, music lacks a protocol that nurses can implement during the perioperative process. This paper is an in-depth literature review assessing a best practice recommendation and protocol that establishes a consensus in the use of music therapy. The results suggest that music therapy may consist of calming, soft tones of 60-80 beats per minute for at least 15-30 minutes at least twice daily during the pre- and postoperative periods. It is suggested that music only be used in conjunction with standards of care and not as the primary intervention of pain or anxiety. This evidence suggests that proper use of music therapy can significantly reduce surgical pain. Implementing these protocols and allowing the freedom of nursing staff to use them may lead to greater reductions in surgical pain and anxiety and a reduction in opioid use. Copyright © 2017 American Society for Pain Management Nursing. Published by Elsevier Inc. All rights reserved.

  11. WDM Network and Multicasting Protocol Strategies

    Directory of Open Access Journals (Sweden)

    Pinar Kirci

    2014-01-01

    Full Text Available Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM, it is easier to take the advantage of optical networks and optical burst switching (OBS and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET and Just In Time (JIT reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes.

  12. A Lightweight Protocol for Secure Video Streaming.

    Science.gov (United States)

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  13. Supporting Adaptation of Wireless Communication Protocols

    International Nuclear Information System (INIS)

    Dhomeja, L.D.; Soomro, I.A.; Malkani, Y.A.

    2016-01-01

    Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants) come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity), Bluetooth, IrDA (Infrared), etc. In order for pervasive devices to interact with each other, they need to have matching (alike) communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth) from what the server has (e.g. WiFi), connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange), L2CAP (Logical Link Control and Adaptation Protocol), RFCOM (Radio Frequency Communication) and WiFi protocol and can run on (J2MW (Java 2 Micro Edition) enabled mobile phones which support both Bluetooth and WiFi capabilities. (author)

  14. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  15. Decellularization of placentas: establishing a protocol

    Directory of Open Access Journals (Sweden)

    L.C.P.C. Leonel

    2017-11-01

    Full Text Available Biological biomaterials for tissue engineering purposes can be produced through tissue and/or organ decellularization. The remaining extracellular matrix (ECM must be acellular and preserve its proteins and physical features. Placentas are organs of great interest because they are discarded after birth and present large amounts of ECM. Protocols for decellularization are tissue-specific and have not been established for canine placentas yet. This study aimed at analyzing a favorable method for decellularization of maternal and fetal portions of canine placentas. Canine placentas were subjected to ten preliminary tests to analyze the efficacy of parameters such as the type of detergents, freezing temperatures and perfusion. Two protocols were chosen for further analyses using histology, scanning electron microscopy, immunofluorescence and DNA quantification. Sodium dodecyl sulfate (SDS was the most effective detergent for cell removal. Freezing placentas before decellularization required longer periods of incubation in different detergents. Both perfusion and immersion methods were capable of removing cells. Placentas decellularized using Protocol I (1% SDS, 5 mM EDTA, 50 mM TRIS, and 0.5% antibiotic preserved the ECM structure better, but Protocol I was less efficient to remove cells and DNA content from the ECM than Protocol II (1% SDS, 5 mM EDTA, 0.05% trypsin, and 0.5% antibiotic.

  16. A More Efficient Contextuality Distillation Protocol

    Science.gov (United States)

    Meng, Hui-xian; Cao, Huai-xin; Wang, Wen-hua; Fan, Ya-jing; Chen, Liang

    2018-03-01

    Based on the fact that both nonlocality and contextuality are resource theories, it is natural to ask how to amplify them more efficiently. In this paper, we present a contextuality distillation protocol which produces an n-cycle box B ∗ B ' from two given n-cycle boxes B and B '. It works efficiently for a class of contextual n-cycle ( n ≥ 4) boxes which we termed as "the generalized correlated contextual n-cycle boxes". For any two generalized correlated contextual n-cycle boxes B and B ', B ∗ B ' is more contextual than both B and B '. Moreover, they can be distilled toward to the maximally contextual box C H n as the times of iteration goes to infinity. Among the known protocols, our protocol has the strongest approximate ability and is optimal in terms of its distillation rate. What is worth noting is that our protocol can witness a larger set of nonlocal boxes that make communication complexity trivial than the protocol in Brunner and Skrzypczyk (Phys. Rev. Lett. 102, 160403 2009), this might be helpful for exploring the problem that why quantum nonlocality is limited.

  17. Efficient Communication Protocols for Deciding Edit Distance

    DEFF Research Database (Denmark)

    Jowhari, Hossein

    2012-01-01

    In this paper we present two communication protocols on computing edit distance. In our first result, we give a one-way protocol for the following Document Exchange problem. Namely given x ∈ Σn to Alice and y ∈ Σn to Bob and integer k to both, Alice sends a message to Bob so that he learns x...... or truthfully reports that the edit distance between x and y is greater than k. For this problem, we give a randomized protocol in which Alice transmits at most O ˜ (klog 2 n) bits and each party’s time complexity is O ˜ (nlogn+k 2 log 2 n) . Our second result is a simultaneous protocol for edit distance over...... permutations. Here Alice and Bob both send a message to a third party (the referee) who does not have access to the input strings. Given the messages, the referee decides if the edit distance between x and y is at most k or not. For this problem we give a protocol in which Alice and Bob run a O...

  18. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  19. An Individualized, Perception-Based Protocol to Investigate Human Physiological Responses to Cooling

    Science.gov (United States)

    Coolbaugh, Crystal L.; Bush, Emily C.; Galenti, Elizabeth S.; Welch, E. Brian; Towse, Theodore F.

    2018-01-01

    Cold exposure, a known stimulant of the thermogenic effects of brown adipose tissue (BAT), is the most widely used method to study BAT physiology in adult humans. Recently, individualized cooling has been recommended to standardize the physiological cold stress applied across participants, but critical experimental details remain unclear. The purpose of this work was to develop a detailed methodology for an individualized, perception-based protocol to investigate human physiological responses to cooling. Participants were wrapped in two water-circulating blankets and fitted with skin temperature probes to estimate BAT activity and peripheral vasoconstriction. We created a thermoesthesia graphical user interface (tGUI) to continuously record the subject's perception of cooling and shivering status during the cooling protocol. The protocol began with a 15 min thermoneutral phase followed by a series of 10 min cooling phases and concluded when sustained shivering (>1 min duration) occurred. Researchers used perception of cooling feedback (tGUI ratings) to manually adjust and personalize the water temperature at each cooling phase. Blanket water temperatures were recorded continuously during the protocol. Twelve volunteers (ages: 26.2 ± 1.4 years; 25% female) completed a feasibility study to evaluate the proposed protocol. Water temperature, perception of cooling, and shivering varied considerably across participants in response to cooling. Mean clavicle skin temperature, a surrogate measure of BAT activity, decreased (−0.99°C, 95% CI: −1.7 to −0.25°C, P = 0.16) after the cooling protocol, but an increase in supraclavicular skin temperature was observed in 4 participants. A strong positive correlation was also found between thermoesthesia and peripheral vasoconstriction (ρ = 0.84, P < 0.001). The proposed individualized, perception-based protocol therefore has potential to investigate the physiological responses to cold stress applied across populations with

  20. Role of Librarian in Internet and World Wide Web Environment

    Directory of Open Access Journals (Sweden)

    K. Nageswara Rao

    2001-01-01

    Full Text Available The transition of traditional library collections to digital or virtual collections presented the librarian with new opportunities. The Internet, Web en-vironment and associated sophisticated tools have given the librarian a new dynamic role to play and serve the new information based society in bet-ter ways than hitherto. Because of the powerful features of Web i.e. distributed, heterogeneous, collaborative, multimedia, multi-protocol, hyperme-dia-oriented architecture, World Wide Web has revolutionized the way people access information, and has opened up new possibilities in areas such as digital libraries, virtual libraries, scientific information retrieval and dissemination. Not only the world is becoming interconnected, but also the use of Internet and Web has changed the fundamental roles, paradigms, and organizational culture of libraries and librarians as well. The article describes the limitless scope of Internet and Web, the existence of the librarian in the changing environment, parallelism between information sci-ence and information technology, librarians and intelligent agents, working of intelligent agents, strengths, weaknesses, threats and opportunities in-volved in the relationship between librarians and the Web. The role of librarian in Internet and Web environment especially as intermediary, facilita-tor, end-user trainer, Web site builder, researcher, interface designer, knowledge manager and sifter of information resources is also described.

  1. A class-chest for deriving transport protocols

    Energy Technology Data Exchange (ETDEWEB)

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  2. A review on transport layer protocol performance for delivering video on an adhoc network

    Science.gov (United States)

    Suherman; Suwendri; Al-Akaidi, Marwan

    2017-09-01

    The transport layer protocol is responsible for the end to end data transmission. Transmission control protocol (TCP) provides a reliable connection and user datagram protocol (UDP) offers fast but unguaranteed data transfer. Meanwhile, the 802.11 (wireless fidelity/WiFi) networks have been widely used as internet hotspots. This paper evaluates TCP, TCP variants and UDP performances for video transmission on an adhoc network. The transport protocol - medium access cross-layer is proposed by prioritizing TCP acknowledgement to reduce delay. The NS-2 evaluations show that the average delays increase linearly for all the evaluated protocols and the average packet losses grow logarithmically. UDP produces the lowest transmission delay; 5.4% and 5.8% lower than TCP and TCP variant, but experiences the highest packet loss. Both TCP and TCP Vegas maintain packet loss as low as possible. The proposed cross-layer successfully decreases TCP and TCP Vegas delay about 0.12 % and 0.15%, although losses remain similar.

  3. The Comparative Study Some of Reactive and Proactive Routing Protocols in The Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Anas Ali Hussien

    2018-02-01

    Full Text Available The wireless sensor network (WSN consists mostly of a large number of nodes in a large area where not all nodes are directly connected. The applications of comprise a wide variety of scenarios.The mobile nodes are free to move because this network has selfــstructured topology. Routing protocols are responsible for detecting and maintaining paths in the network, and it classified into reactive (OnـــDemand, proactive (Table driven, and hybrid. In this paper represents a performance study of some WSN routing protocols: the Dynamic Source Routing (DSR, Ad hoc On-Demand Distance Vector (AODV, and Destination-Sequenced Distance-Vector (DSDV. The comparison made according to important metrics like packet delivery ratio (PDR, total packets dropped, Average end-to-end delay (Avg EED, and normalized routing load under the Transmission Control Protocol (TCP and User Datagram Protocol (UDP traffic connection and with varying number of nodes, pause time; and  varying speed. In this work used (NSــ2.35 that installed on (Ubuntu 14.04 operating system to implementing the scenario. Conclude that the DSR has better performance in TCP connection; while the DSDV has better performance in UDP protocol.

  4. Developing an optimum protocol for thermoluminescence dosimetry with gr-200 chips using Taguchi method

    International Nuclear Information System (INIS)

    Sadeghi, Maryam; Faghihi, Reza; Sina, Sedigheh

    2017-01-01

    Thermoluminescence dosimetry (TLD) is a powerful technique with wide applications in personal, environmental and clinical dosimetry. The optimum annealing, storage and reading protocols are very effective in accuracy of TLD response. The purpose of this study is to obtain an optimum protocol for GR-200; LiF: Mg, Cu, P, by optimizing the effective parameters, to increase the reliability of the TLD response using Taguchi method. Taguchi method has been used in this study for optimization of annealing, storage and reading protocols of the TLDs. A number of 108 GR-200 chips were divided into 27 groups, each containing four chips. The TLDs were exposed to three different doses, and stored, annealed and read out by different procedures as suggested by Taguchi Method. By comparing the signal-to-noise ratios the optimum dosimetry procedure was obtained. According to the results, the optimum values for annealing temperature (de.C), Annealing Time (s), Annealing to Exposure time (d), Exposure to Readout time (d), Pre-heat Temperature (de.C), Pre-heat Time (s), Heating Rate (de.C/s), Maximum Temperature of Readout (de.C), readout time (s) and Storage Temperature (de.C) are 240, 90, 1, 2, 50, 0, 15, 240, 13 and -20, respectively. Using the optimum protocol, an efficient glow curve with low residual signals can be achieved. Using optimum protocol obtained by Taguchi method, the dosimetry can be effectively performed with great accuracy. (authors)

  5. A Review on State of Art Variants of LEACH Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yuvaraj P.

    2015-03-01

    Full Text Available Recent advances in wireless communication lead to many improvements in application specific wireless sensor network (WSN deployment. Sensing different data from different environments is essential to monitor and control the situations. For instance, it is very important to sense the forest fire as early as possible to control the upshot. So efficient and timely gathering of the data from a network of small sensor nodes is necessary. In WSN, the small sized sensor nodes are working with very small batteries with limited energy. Since those are randomly deployed over a wide area, replacement of battery or recharging is not feasible. So, for getting prolonged life time of WSN, energy efficient operation is the key factor. Among many protocols proposed for enhancing the life time of WSN, the clustering based hierarchical protocols are popular and gaining the attention of researchers because of their high energy efficiency. Low Energy Adaptive Clustering Hierarchy (LEACH is energy efficient hierarchical, clustering based protocol. It is considered as the base of many hierarchical clustering protocols. In this paper, some of the recent tailored protocols proposed to strengthen LEACH are examined.

  6. Evaluating Protocol Lifecycle Time Intervals in HIV/AIDS Clinical Trials

    Science.gov (United States)

    Schouten, Jeffrey T.; Dixon, Dennis; Varghese, Suresh; Cope, Marie T.; Marci, Joe; Kagan, Jonathan M.

    2014-01-01

    Background Identifying efficacious interventions for the prevention and treatment of human diseases depends on the efficient development and implementation of controlled clinical trials. Essential to reducing the time and burden of completing the clinical trial lifecycle is determining which aspects take the longest, delay other stages, and may lead to better resource utilization without diminishing scientific quality, safety, or the protection of human subjects. Purpose In this study we modeled time-to-event data to explore relationships between clinical trial protocol development and implementation times, as well as identify potential correlates of prolonged development and implementation. Methods We obtained time interval and participant accrual data from 111 interventional clinical trials initiated between 2006 and 2011 by NIH’s HIV/AIDS Clinical Trials Networks. We determined the time (in days) required to complete defined phases of clinical trial protocol development and implementation. Kaplan-Meier estimates were used to assess the rates at which protocols reached specified terminal events, stratified by study purpose (therapeutic, prevention) and phase group (pilot/phase I, phase II, and phase III/ IV). We also examined several potential correlates to prolonged development and implementation intervals. Results Even though phase grouping did not determine development or implementation times of either therapeutic or prevention studies, overall we observed wide variation in protocol development times. Moreover, we detected a trend toward phase III/IV therapeutic protocols exhibiting longer developmental (median 2 ½ years) and implementation times (>3years). We also found that protocols exceeding the median number of days for completing the development interval had significantly longer implementation. Limitations The use of a relatively small set of protocols may have limited our ability to detect differences across phase groupings. Some timing effects

  7. Development of a Competent and Trouble Free DNA Isolation Protocol for Downstream Genetic Analyses in Glycine Species

    Directory of Open Access Journals (Sweden)

    Muhammad Amjad Nawaz

    2016-08-01

    Full Text Available Extraction of deoxyribose nucleic acid (DNA from plants is preliminary step in molecular biology. Fast and cost effective genomic DNA isolation from Glycine species for downstream application is a major bottleneck. Here we report a high throughput and trouble free method for genomic DNA extraction from leaf and seeds of Glycine species with high quality and quantity. Protocol reports the optimization by employing different concentrations of CTAB and PVP in extraction buffer. Efficiency of optimized protocol was compared with frequently used DNA extraction methods. Wide adoptability and utility of this protocol was confirmed by DNA extraction from leaves as well as seeds of G. max, G. soja, G. tomentella and G. latifolia. Extracted DNA was successfully subjected to PCR amplification of five microsatellite markers and four putative glycosyltransferase genes. DNA extraction protocol is reproducible, trouble free, rapid and can be adopted for plant molecular biology applications.

  8. An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP

    Directory of Open Access Journals (Sweden)

    Alaauldin Ibrahim

    2017-01-01

    Full Text Available Information in patients’ medical histories is subject to various security and privacy concerns. Meanwhile, any modification or error in a patient’s medical data may cause serious or even fatal harm. To protect and transfer this valuable and sensitive information in a secure manner, radio-frequency identification (RFID technology has been widely adopted in healthcare systems and is being deployed in many hospitals. In this paper, we propose a mutual authentication protocol for RFID tags based on elliptic curve cryptography and advanced encryption standard. Unlike existing authentication protocols, which only send the tag ID securely, the proposed protocol could also send the valuable data stored in the tag in an encrypted pattern. The proposed protocol is not simply a theoretical construct; it has been coded and tested on an experimental RFID tag. The proposed scheme achieves mutual authentication in just two steps and satisfies all the essential security requirements of RFID-based healthcare systems.

  9. Musculoskeletal wide detector CT: Principles, techniques and applications in clinical practice and research

    International Nuclear Information System (INIS)

    Gondim Teixeira, Pedro Augusto; Gervaise, Alban; Louis, Matthias; Lecocq, Sophie; Raymond, Ariane; Aptel, Sabine; Blum, Alain

    2015-01-01

    Highlights: • Wide area-detector CT availability is growing steadily. • Advanced techniques such as Dynamic CT, Perfusion CT and dual energy can be used in clinical practice. • Optimal acquisition protocol is needed to increase diagnostic performance and limit dose exposure. • Guidelines for data acquisition and interpretation may increase diagnostic performance and reproducibility. - Abstract: A progressive increase in the detector width in CT scanners has meant that advanced techniques such as dynamic, perfusion and dual-energy CT are now at the radiologist's disposal. Although these techniques may be important for the diagnosis of various musculoskeletal diseases, data acquisition and interpretation can be challenging. This article offers a practical guide for the use of these tools including acquisition protocol, post-processing options and data interpretation based on 7 years of clinical experience in a tertiary university hospital

  10. An one-time-pad key communication protocol with entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We present an one-time-pad key communication protocol that allows secure direct communication with entanglement. Alice can send message to Bob in a deterministic manner by using local measurements and public communication. The theoretical efficiency of this protocol is double compared with BB84 protocol. We show this protocol is unconditional secure under arbitrary quantum attack. And we discuss that this protocol can be perfectly implemented with current technologies.

  11. Data-Based Energy Efficient Clustered Routing Protocol for Wireless Sensors Networks – Tabuk Flood Monitoring System Case Study

    Directory of Open Access Journals (Sweden)

    Ammar Babiker

    2017-10-01

    Full Text Available Energy efficiency has been considered as the most important issue in wireless sensor networks. As in many applications, wireless sensors are scattered in a wide harsh area, where the battery replacement or charging will be quite difficult and it is the most important challenge. Therefore, the design of energy saving mechanism becomes mandatory in most recent research. In this paper, a new energy efficient clustered routing protocol is proposed: the proposed protocol is based on analyzing the data collected from the sensors in a base-station. Based on this analysis the cluster head will be selected as the one with the most useful data. Then, a variable time slot is specified to each sensor to minimize the transmission of repetitive and un-useful data. The proposed protocol Data-Based Energy Efficient Clustered Routing Protocol for Wireless Sensors Networks (DCRP was compared with the famous energy efficient LEACH protocol and also with one of the recent energy efficient routing protocols named Position Responsive Routing Protocol (PRRP. DCRP has been used in monitoring the floods in Tabuk area –Saudi Arabia. It shows comparatively better results.

  12. Wide dynamic range beam profile monitor

    International Nuclear Information System (INIS)

    Lee, D.M.; Brown, D.; Hardekopf, R.; Bilskie, J.R.; van Dyck, O.B.V.

    1985-01-01

    An economical harp multiplexer system has been developed to achieve a wide dynamic range. The harp system incorporates a pneumatically actuated harp detector with ceramic boards and carbon wires; a high-sensitivity multiplexer packaged in a double-wide NIM module; and flat, shielded ribbon cable consisting of individual twisted pairs. The system multiplexes 30 wires in each of the x and y planes simultaneously and operates with or without computer control. The system has operated in beams of 100 nA to 1 mA, 1- to 120-Hz repetition rate, with a signal-to-noise ratio of greater than 10/1

  13. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols.

    Science.gov (United States)

    Campagne, Fabien

    2008-02-29

    The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79-0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86-0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these protocols can fully substitute

  14. Analysis of Security Protocols by Annotations

    DEFF Research Database (Denmark)

    Gao, Han

    . The development of formal techniques, e.g. control flow analyses, that can check various security properties, is an important tool to meet this challenge. This dissertation contributes to the development of such techniques. In this dissertation, security protocols are modelled in the process calculus LYSA......The trend in Information Technology is that distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great...... deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal. It has long been a challenge to determine conclusively whether a given protocol is secure or not...

  15. Breaking Megrelishvili protocol using matrix diagonalization

    Science.gov (United States)

    Arzaki, Muhammad; Triantoro Murdiansyah, Danang; Adi Prabowo, Satrio

    2018-03-01

    In this article we conduct a theoretical security analysis of Megrelishvili protocol—a linear algebra-based key agreement between two participants. We study the computational complexity of Megrelishvili vector-matrix problem (MVMP) as a mathematical problem that strongly relates to the security of Megrelishvili protocol. In particular, we investigate the asymptotic upper bounds for the running time and memory requirement of the MVMP that involves diagonalizable public matrix. Specifically, we devise a diagonalization method for solving the MVMP that is asymptotically faster than all of the previously existing algorithms. We also found an important counterintuitive result: the utilization of primitive matrix in Megrelishvili protocol makes the protocol more vulnerable to attacks.

  16. Automatic Generation of Network Protocol Gateways

    DEFF Research Database (Denmark)

    Bromberg, Yérom-David; Réveillère, Laurent; Lawall, Julia

    2009-01-01

    for describing protocol behaviors, message structures, and the gateway logic.  Z2z includes a compiler that checks essential correctness properties and produces efficient code. We have used z2z to develop a number of gateways, including SIP to RTSP, SLP to UPnP, and SMTP to SMTP via HTTP, involving a range......The emergence of networked devices in the home has made it possible to develop applications that control a variety of household functions. However, current devices communicate via a multitude of incompatible protocols, and thus gateways are needed to translate between them.  Gateway construction......, however, requires an intimate knowledge of the relevant protocols and a substantial understanding of low-level network programming, which can be a challenge for many application programmers. This paper presents a generative approach to gateway construction, z2z, based on a domain-specific language...

  17. Magnetic resonance imaging protocols for paediatric neuroradiology

    International Nuclear Information System (INIS)

    Saunders, Dawn E.; Thompson, Clare; Gunny, Roxanne; Jones, Rod; Cox, Tim; Chong, Wui Khean

    2007-01-01

    Increasingly, radiologists are encouraged to have protocols for all imaging studies and to include imaging guidelines in care pathways set up by the referring clinicians. This is particularly advantageous in MRI where magnet time is limited and a radiologist's review of each patient's images often results in additional sequences and longer scanning times without the advantage of improvement in diagnostic ability. The difficulties of imaging small children and the challenges presented to the radiologist as the brain develops are discussed. We present our protocols for imaging the brain and spine of children based on 20 years experience of paediatric neurological MRI. The protocols are adapted to suit children under the age of 2 years, small body parts and paediatric clinical scenarios. (orig.)

  18. Demarcation of Security in Authentication Protocols

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security analysis of communication protocols is a slippery business; many “secure” protocols later turn out to be insecure. Among many, two complains are more frequent: inadequate definition of security and unstated assumptions in the security model. In our experience, one principal cause...... for such state of affairs is an apparent overlap of security and correctness, which may lead to many sloppy security definitions and security models. Although there is no inherent need to separate security and correctness requirements, practically, such separation is significant. It makes security analysis...... easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...

  19. Will OPEC lose from the Kyoto Protocol?

    International Nuclear Information System (INIS)

    Barnett, Jon; Dessai, Suraje; Webber, Michael

    2004-01-01

    A range of energy-economy models forecast losses to members of the Organisation of Petroleum Exporting Countries (OPEC) should the Kyoto Protocol come into force. These forecasts are a powerful influence in the United Nations Framework Convention on Climate Change negotiations. They are used by OPEC to advance the agenda on the impacts of response measures, covertly arguing for compensation for lost oil revenues arising from implementation of the Protocol. This paper discusses this issue, and explores the key assumptions of these models and their uncertainties. Assumptions about carbon leakage, future availability of oil reserves, substitution, innovation, and capital turnover are considered. The paper suggests that losses will not affect OPEC countries equally, and that these losses are not likely to be as substantial as the models forecast. A range of policy measures are proposed to lessen any impact the Protocol may have on OPEC

  20. Structured Transition Protocol for Children with Cystinosis

    Directory of Open Access Journals (Sweden)

    Rupesh Raina

    2017-08-01

    Full Text Available The transition from pediatric to adult medical services has a greater impact on the care of adolescents or young adults with chronic diseases such as cystinosis. This transition period is a time of psychosocial development and new responsibilities placing these patients at increased risk of non-adherence. This can lead to serious adverse effects such as graft loss and progression of the disease. Our transition protocol will provide patients, families, physicians, and all those involved a structured guide to transitioning cystinosis patients. This structured protocol depends on four areas of competency: Recognition, Insight, Self-reliance, and Establishment of healthy habits (RISE. This protocol has not been tested and therefore challenges not realized. With a focus on medical, social, and educational/vocational aspects, we aim to improve transition for cystinosis patients in all aspects of their lives.

  1. An Energy-efficient Clock Synchronization Protocol for Wireless Sensor Networks

    OpenAIRE

    Albu, Roxana; Labit, Yann; Thierry, Gayraud; Pascal, Berthou

    2010-01-01

    5p.; International audience; The behavior of Wireless Sensor Networks (WSN) is nowadays widely analyzed. One of the most important issues is related to their energy consumption, as this has a major impact on the network lifetime. Another important application requirement is to ensure data sensing synchronization, which leads to additional energy consumption as a high number of messages is sent and received at each node. Our proposal consists in implementing a combined synchronization protocol...

  2. Protocol for disposition of tank farm equipment lists and tank farm drawings for year 2000 compliance

    International Nuclear Information System (INIS)

    ADAMS, M.R.

    1999-01-01

    A program has been initiated to assess, renovate, document and certify tank farm field equipment for year 2000 compliance. The program is necessary to assure no adverse effects occur in tank farm operations as a result of equipment malfunction due to what is widely known as the ''millennium bug''. This document elaborates the protocols for reviewing field equipment lists and tank farm drawings for the purpose of identifying and resolving year 2000 compliance problems in tank farm equipment

  3. FLOWER, an Innovative Fuzzy Lower-than-Best-Effort Transport Protocol

    OpenAIRE

    Trang, Si Quoc Viet; Lochin, Emmanuel

    2016-01-01

    We present a new delay-based transport protocol named FLOWER, that aims at providing a Lower-than-Best-Effort (LBE) service. The objective is to propose an alternative to the Low Extra Delay Background Transport (LEDBAT) widely deployed within the official BitTorrent client. Indeed, besides its intra-fairness problem, known as latecomer unfairness, LEDBAT can be too aggressive against TCP, making it ill suited for providing LBE services over certain networks such as constrained wireless netwo...

  4. Utilization of Neurophysiological Protocols to Characterize Soldier Response to Irritant Gases. Phase 1.

    Science.gov (United States)

    1990-02-15

    DAMM7-89-C-9136 7. PERFORMING ORGANIZATION NAME(S) AND AOO«£S$<£S) Northeast Reserach Institute, Inc Suite A-100 309 Farmington Avenue...is no widely accepted methodology or protocol lor the assessment of human toxicity induced by exposure to irritant gases. Most procedures used by the...employing the appropriate analytical methodologies necessary to more precisely characterize the complex mixture of low-boiling volatilcs, aerosols, and

  5. Analysis of the radius and diameter protocols in terms of pricing telecommunication services

    Directory of Open Access Journals (Sweden)

    Vesna M. Radonjić

    2013-06-01

    Full Text Available Accounting of telecommunication services is closely related to the functions of authentication and authorization. These functions are usually considered together and implemented within the same server using a common protocol. The most renowned protocols for authentication, authorization and accounting are the RADIUS and Diameter protocols.   AAA functions and related protocols   In this chapter, the accounting management architecture developed by IETF is presented. It includes the interaction between network elements, accounting servers and billing and charging servers. Accounting data can be used for management, planning and charging users as well as other (specific purposes. Authentication is the process of confirming a user's digital identity, usually through some type of identifiers and related data. Authorization determines whether a particular entity is authorized to perform an activity.   Basic Functions of the RADIUS Protocol   The RADIUS architecture is based on a client-server model. It uses UDP on the transport layer. Transactions between the client and the server are authenticated, which is achieved by using a common secret key that is never sent through the network. Given the limited resources available to network devices, RADIUS facilitates and centralizes charging end users, provides some protection against active attacks by unauthorized users and it has great support from different network equipment vendors. Although RADIUS is a widely accepted protocol for the mechanisms of authentication, authorization and accounting, it has certain shortcomings that may be caused by the protocol itself or by its poor implementation.   Architecture and Operation of the Diameter Protocol   Diameter is a scalable protocol designed by the IETF working group in order to eliminate shortcomings and functional limitations of the RADIUS protocol and eventually to replace it in the near future. Most of the basic Diameter mechanisms and its

  6. Genus-Wide Assessment of Lignocellulose Utilization in the Extremely Thermophilic Genus Caldicellulosiruptor by Genomic, Pangenomic, and Metagenomic Analyses.

    Science.gov (United States)

    Lee, Laura L; Blumer-Schuette, Sara E; Izquierdo, Javier A; Zurawski, Jeffrey V; Loder, Andrew J; Conway, Jonathan M; Elkins, James G; Podar, Mircea; Clum, Alicia; Jones, Piet C; Piatek, Marek J; Weighill, Deborah A; Jacobson, Daniel A; Adams, Michael W W; Kelly, Robert M

    2018-05-01

    Metagenomic data from Obsidian Pool (Yellowstone National Park, USA) and 13 genome sequences were used to reassess genus-wide biodiversity for the extremely thermophilic Caldicellulosiruptor The updated core genome contains 1,401 ortholog groups (average genome size for 13 species = 2,516 genes). The pangenome, which remains open with a revised total of 3,493 ortholog groups, encodes a variety of multidomain glycoside hydrolases (GHs). These include three cellulases with GH48 domains that are colocated in the glucan degradation locus (GDL) and are specific determinants for microcrystalline cellulose utilization. Three recently sequenced species, Caldicellulosiruptor sp. strain Rt8.B8 (renamed here Caldicellulosiruptor morganii ), Thermoanaerobacter cellulolyticus strain NA10 (renamed here Caldicellulosiruptor naganoensis ), and Caldicellulosiruptor sp. strain Wai35.B1 (renamed here Caldicellulosiruptor danielii ), degraded Avicel and lignocellulose (switchgrass). C. morganii was more efficient than Caldicellulosiruptor bescii in this regard and differed from the other 12 species examined, both based on genome content and organization and in the specific domain features of conserved GHs. Metagenomic analysis of lignocellulose-enriched samples from Obsidian Pool revealed limited new information on genus biodiversity. Enrichments yielded genomic signatures closely related to that of Caldicellulosiruptor obsidiansis , but there was also evidence for other thermophilic fermentative anaerobes ( Caldanaerobacter , Fervidobacterium , Caloramator , and Clostridium ). One enrichment, containing 89.8% Caldicellulosiruptor and 9.7% Caloramator , had a capacity for switchgrass solubilization comparable to that of C. bescii These results refine the known biodiversity of Caldicellulosiruptor and indicate that microcrystalline cellulose degradation at temperatures above 70°C, based on current information, is limited to certain members of this genus that produce GH48 domain

  7. Newborn hearing screening protocol in tuscany region.

    Science.gov (United States)

    Berrettini, Stefano; Ghirri, Paolo; Lazzerini, Francesco; Lenzi, Giovanni; Forli, Francesca

    2017-09-20

    Newborn hearing screening has to be considered the first step of a program for the identification, diagnosis, treatment and habilitation/rehabilitation of children with hearing impairment. In Tuscany Region of Italy, the universal newborn hearing screening is mandatory since november 2007. The first guidelines for the execution of the screening have been released in June 2008; then many other Italian regions partially or totally adopted these guidelines. On the basis of the experience from 2008 and according to the recent evidences in the scientific literature, a new screening protocol was released in Tuscany region. The new protocol is an evolution of the previous one. Some issues reported in the previous protocol and in the Joint Committee on Infant Hearing statement published in 2007 were revised, such as the risk factors for auditory neuropathy and for late onset, progressive or acquired hearing loss. The new updated guidelines were submitted to the Sanitary Regional Council and then they have been approved in August 2016. The updated screening protocol is mainly aimed to identify newborns with a congenital moderate-to-profound hearing loss, but it also provides indications for the audiological follow-up of children with risk's factor for progressive or late onset hearing loss; further it provides indications for the audiological surveillance of children at risk for acquired hearing impairment. Then, in the new guidelines the role of the family paediatrician in the newborn hearing screening and audiological follow-up and surveillance is underscored. Finally the new guidelines provide indications for the treatment with hearing aids and cochlear implant, in accordance with the recent Italian Health Technology Assessment (HTA) guidelines. In the paper we report the modality of execution of the universal newborn hearing screening in the Tuscany Region, according to the recently updated protocol. The main features of the protocol and the critical issues are

  8. Turf Conversion Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)

    2017-12-05

    This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings as a result of water conservation measures (WCMs) in energy performance contracts associated with converting turfgrass or other water-intensive plantings to water-wise and sustainable landscapes. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.

  9. Outdoor Irrigation Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)

    2017-12-05

    This measurement and verification (M&V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with outdoor irrigation efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M&V plan, and details the procedures to use to determine water savings.

  10. Study Application of RADIUS Protocol on Ethernet

    Institute of Scientific and Technical Information of China (English)

    GUO Fang; YANG Huan-yu; LI Hong

    2004-01-01

    This paper presents how to apply the RADIUS (Remote Authentication Dial In User Service)protocol ,which is generally applied to dial-up network, to the authentication & charge of Broad Band accessing control system on Ethernet. It is provided that the Broad Band accessing control system included a self-designed communication protocol is used in communicating between an terminal user and Network Access Server .The interface module on the servers side and the Radius system is also given in this article.

  11. Vicissitudes of Nagoya Protocol in Colombia

    International Nuclear Information System (INIS)

    Rojas Blanco, Diana Lorena

    2013-01-01

    The fair and equitable sharing of benefits arising from the utilization of genetic resources is not only one of the central objectives of the Nagoya Protocol, but also a challenge for communities of scientists, researchers, and indigenous ancestral generally for the educational community. It is therefore essential to know what the real and material implications for the population, the ratification of the Nagoya Protocol, which despite having sufficient justification and argued, highlights the need to develop legal tools, economic, technological and education for proper and fair implementation.

  12. Evolution of a C2 protocol gateway

    CSIR Research Space (South Africa)

    Duvenhage, A

    2008-06-01

    Full Text Available real-time or slower than real-time, depending on the type of link and the data source: The gateway normally reads logged raw protocol data much faster than real-time; a simulation could also start running slower than real-time if it requires too... inherent support for logging and playback of the raw protocol data. From a software architecture perspective, each link has a corresponding link component that is responsible for opening and closing the connection, as well as reading and writing...

  13. Sessions and Separability in Security Protocols

    DEFF Research Database (Denmark)

    Carbone, Marco; Guttman, Joshua

    2013-01-01

    Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any uncomprom......Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any...

  14. So Wide a Web, So Little Time.

    Science.gov (United States)

    McConville, David; And Others

    1996-01-01

    Discusses new trends in the World Wide Web. Highlights include multimedia; digitized audio-visual files; compression technology; telephony; virtual reality modeling language (VRML); open architecture; and advantages of Java, an object-oriented programming language, including platform independence, distributed development, and pay-per-use software.…

  15. Enterprise-Wide Process & Performance Excellence:

    DEFF Research Database (Denmark)

    Edgeman, Rick; Kristensen, Kai; Eskildsen, Jacob Kjær

    2013-01-01

    Program value proposition, content, organization, and strategy are elaborated herein. This elaboration is the result of careful study of business and social trends, along with careful listening to collaborating enterprises. It is in this latter sense that the Enterprise-Wide Process & Performance...... Excellence certificate program is a product of a co-creation process....

  16. Review The Ooty Wide Field Array

    Indian Academy of Sciences (India)

    c Indian Academy of Sciences. DOI 10.1007/s12036-017-9430-4. Review. The Ooty Wide Field ... salient features of the upgrade, as well as its main science drivers. There are three ..... tecture for low frequency arrays, Ph.D. thesis, Jawaharalal.

  17. Happy 20th Birthday, World Wide Web!

    CERN Multimedia

    2009-01-01

    On 13 March CERN celebrated the 20th anniversary of the World Wide Web. Check out the video interview with Web creator Tim Berners-Lee and find out more about the both the history and future of the Web. To celebrate CERN also launched a brand new website, CERNland, for kids.

  18. Wide Band to ''Double Band'' upgrade

    International Nuclear Information System (INIS)

    Kasper, P.; Currier, R.; Garbincius, P.; Butler, J.

    1988-06-01

    The Wide Band beam currently uses electrons obtained from secondary photon conversions to produce the photon beam incident on the experimental targets. By transporting the positrons produced in these conversions as well as the electrons it is possible to almost double the number of photons delivered to the experiments per primary beam proton. 11 figs

  19. WorldWide Web: Hypertext from CERN.

    Science.gov (United States)

    Nickerson, Gord

    1992-01-01

    Discussion of software tools for accessing information on the Internet focuses on the WorldWideWeb (WWW) system, which was developed at the European Particle Physics Laboratory (CERN) in Switzerland to build a worldwide network of hypertext links using available networking technology. Its potential for use with multimedia documents is also…

  20. Wide-band segmented power distribution networks

    NARCIS (Netherlands)

    Tereshchenko, O.V.; Buesink, Frederik Johannes Karel; Leferink, Frank Bernardus Johannes

    2013-01-01

    This paper discusses a novel design of Power Distribution Network (PDN). By physical structuring of the power plane into repetitive symmetrical and asymmetrical segments of varying size, suppression of the propagation of unwanted noise throughout the PDN over a wide frequency range is achieved.