WorldWideScience

Sample records for protocol wap sites

  1. Phone Application Based Wireless Application Protocol (Wap)

    OpenAIRE

    Berrie Nugraha Adiwinata; Sunarto Usna

    2001-01-01

    WAP mobile phone sales in Indonesia is quite high, evidenced by a recent survey saidnearly about 5% of mobile phone users in Indonesia is a mobile phone using WAPtechnology. For those who always need accurate information and quick. WAPtechnology a ride on a GSM network still has weaknesses such as an expensiveaccess costs. But do not close the possibility that one day we will get a perfect WAPphones.

  2. Business Applications of WAP.

    Science.gov (United States)

    van Steenderen, Margaret

    2002-01-01

    Explains the development of WAP (wireless application protocol), how it works, and what the major advantages and disadvantages are, especially when applied to the use of information. Topics include standardization; mobile communications; the effect of WAP on business tools, electronic commerce, and information services; consumers; corporate users;…

  3. WAP - based telemedicine applications

    International Nuclear Information System (INIS)

    Hung, K.; Zhang, Y.T.

    2001-01-01

    Telemedicine refers to the utilization of telecommunication technology for medical diagnosis, treatment, and patient care. Its aim is to provide expert-based health care to remote sites through telecommunication and information technologies. The significant advances in technologies have enabled the introduction of a broad range of telemedicine applications, which are supported by computer networks, wireless communication, and information superhighway. For example, some hospitals are using tele-radiology for remote consultation. Such a system includes medical imaging devices networked with computers and databases. Another growing area is patient monitoring, in which sensors are used to acquire biomedical signals, such as electrocardiogram (ECG), blood pressure, and body temperature, from a remote patient, who could be in bed or moving freely. The signals are then relayed to remote systems for viewing and analysis. Telemedicine can be divided into two basic modes of operations: real-time mode, in which the patient data can be accessed remotely in real-time, and store-and-forward mode, in which the acquired data does not have to be accessed immediately. In the recent years, many parties have demonstrated various telemedicine applications based on the Internet and cellular phone as these two fields have been developing rapidly. A current, recognizable trend in telecommunication is the convergence of wireless communication and computer network technologies. This has been reflected in recently developed telemedicine systems. For example, in 1998 J. Reponen, et al. have demonstrated transmission and display of computerized tomography (CT) examinations using a remote portable computer wirelessly connected to a computer network through TCP/IP on a GSM cellular phone. Two years later, they carried out the same tests with a GSM-based wireless personal digital assistant (PDA). The WAP (Wireless Application Protocol) Forum was founded in 1997 to create a global protocol

  4. WAP explained

    International Nuclear Information System (INIS)

    Kaiser, M.J.; Pulsipher, A.G.

    2004-01-01

    The Weatherization Assistance Program (WAP) is a federal block grant program administered by all 50 states and the District of Columbia through community action agencies, state energy offices, local government, and other nonprofit organizations to provide weatherization services to eligible households. The WAP was established in 1976 to increase the energy efficiency, reduce the energy expenditures, and improve the health and safety of low-income households, especially those households that are particularly vulnerable such as families with children, persons with disabilities, and the elderly. The manner in which WAP funds have been allocated to states, however, has been a contentious issue since the inception of the program. Southern states have argued that too much of the federal funding goes to cold-climate and rural states. Northern states disagree. In 1990, Congress amended the Energy Conservation and Production Act and required the Department of Energy to develop a new funding formula. The Department of Energy currently uses a three-factor formula developed in 1995 in conjunction with a two-factor formula developed in 1977 and a hold-harmless provision to allocate WAP funding. The purpose of this paper is to explain the WAP allocation mechanism and the assumptions associated with the 1977 and the 1995 funding formula. The factors that compose each funding formula are critically assessed and various implementation issues are reviewed, including the selection of the trigger point and program capacity levels. It is not possible to define the need for weatherization assistance objectively and in a unique manner, and this ambiguity is the main reason why the WAP allocation mechanism is expected to remain a lively topic of debate and contention

  5. Migrating an Online Service to WAP - A Case Study.

    Science.gov (United States)

    Klasen, Lars

    2002-01-01

    Discusses mobile access via wireless application protocol (WAP) to online services that is offered in Sweden through InfoTorg. Topics include the Swedish online market; filtering HTML data from an Internet/Web server into WML (wireless markup language); mobile phone technology; microbrowsers; WAP protocol; and future possibilities. (LRW)

  6. A Proxy Architecture to Enhance the Performance of WAP 2.0 by Data Compression

    Directory of Open Access Journals (Sweden)

    Yin Zhanping

    2005-01-01

    Full Text Available This paper presents a novel proxy architecture for wireless application protocol (WAP 2.0 employing an advanced data compression scheme. Though optional in WAP 2.0 , a proxy can isolate the wireless from the wired domain to prevent error propagations and to eliminate wireless session delays (WSD by enabling long-lived connections between the proxy and wireless terminals. The proposed data compression scheme combines content compression together with robust header compression (ROHC, which minimizes the air-interface traffic data, thus significantly reduces the wireless access time. By using the content compression at the transport layer, it also enables TLS tunneling, which overcomes the end-to-end security problem in WAP 1.x. Performance evaluations show that while WAP 1.x is optimized for narrowband wireless channels, WAP 2.0 utilizing TCP/IP outperforms WAP 1.x over wideband wireless channels even without compression. The proposed data compression scheme reduces the wireless access time of WAP 2.0 by over 45% in CDMA2000 1XRTT channels, and in low-speed IS-95 channels, substantially reduces access time to give comparable performance to WAP 1.x. The performance enhancement is mainly contributed by the reply content compression, with ROHC offering further enhancements.

  7. A Proxy Architecture to Enhance the Performance of WAP 2.0 by Data Compression

    Directory of Open Access Journals (Sweden)

    Yin Zhanping

    2005-01-01

    Full Text Available This paper presents a novel proxy architecture for wireless application protocol (WAP employing an advanced data compression scheme. Though optional in WAP , a proxy can isolate the wireless from the wired domain to prevent error propagations and to eliminate wireless session delays (WSD by enabling long-lived connections between the proxy and wireless terminals. The proposed data compression scheme combines content compression together with robust header compression (ROHC, which minimizes the air-interface traffic data, thus significantly reduces the wireless access time. By using the content compression at the transport layer, it also enables TLS tunneling, which overcomes the end-to-end security problem in WAP 1.x. Performance evaluations show that while WAP 1.x is optimized for narrowband wireless channels, WAP utilizing TCP/IP outperforms WAP 1.x over wideband wireless channels even without compression. The proposed data compression scheme reduces the wireless access time of WAP by over in CDMA2000 1XRTT channels, and in low-speed IS-95 channels, substantially reduces access time to give comparable performance to WAP 1.x. The performance enhancement is mainly contributed by the reply content compression, with ROHC offering further enhancements.

  8. Diseño y montaje de una página wap que implemente el acceso a la información académica de la universidad francisco de paula santander

    Directory of Open Access Journals (Sweden)

    Dinael Guevara-Ibarra

    2003-01-01

    Full Text Available WAP is the acronym for Wireless Application Protocol (Wireless Application Protocol and is the means of transport communications between wireless devices and servers. The University Francisco de Paula Santander will from the second half of 2003 with a WAP portal that will allow students and interested, consult the information from the institution using the benefits of mobile communications equipment (cell. This article briefly describes the theoretical bases that were the subject of study for the project of the WAP page of the institution such as the WAP standard, the layers of the WAP protocol, the components and the operating model of a WAP system and the programming language to develop WAP applications; In addition, the parameters taken into account for the selection of the information to be displayed on the portal and the tools used in the manufacture and assembly of mobile Internet page of the University Francisco de Paula Santander exposed

  9. Web Air Permits (WAP R7)

    Data.gov (United States)

    U.S. Environmental Protection Agency — THIS DATA ASSET NO LONGER ACTIVE: This is metadata documentation for Web Air Permits in Region 7 (WAP R7), a Lotus Notes application that once tracked comment...

  10. Towards the Design of a WAP-based Environmental Information Service

    Directory of Open Access Journals (Sweden)

    Joerg Westbomke

    2004-12-01

    Full Text Available Cellular phones have almost replaced conventional telephones for public use in Western European countries. Modern WAP enhanced phones or smart phones offer mobile access to the internet, anytime and anyplace. This technique therefore appears to be very attractive for transferring up-to-date information about the environmental situation to the public, i.e. air and water quality measurements or weather conditions as well as forecasted values of these processes. The Wireless Application Protocol (WAP is the key technology in this respect. According to the upcoming importance of mobile internet access the WAP technology has great potentials to play an important role in the design of modern information services which are user centered. Because of upcoming environmental laws in Europe the citizen will gain the right to access the environmental information collected and stored by the public authorities. But due to size and resolution of the displays used in the actual versions of the cellular phones it is not sufficient to transfer the concepts and architectures known from internet information systems to WAP-based systems. It is rather necessary to develop special concepts for the design of WAPbased services, with a special focus on the appropriate structuring and presentation of environmental data. This paper gives an overview of the main problems WAP system designer had actually to deal with and shows concepts how to solve them. At the end of the paper we present two mobile environmental information services, which were realized on the basis of the presented concepts.

  11. Epigenetic modifications and chromatin loop organization explain the different expression profiles of the Tbrg4, WAP and Ramp3 genes

    International Nuclear Information System (INIS)

    Montazer-Torbati, Mohammad Bagher; Hue-Beauvais, Cathy; Droineau, Stephanie; Ballester, Maria; Coant, Nicolas; Aujean, Etienne; Petitbarat, Marie; Rijnkels, Monique; Devinoy, Eve

    2008-01-01

    Whey Acidic Protein (WAP) gene expression is specific to the mammary gland and regulated by lactogenic hormones to peak during lactation. It differs markedly from the more constitutive expression of the two flanking genes, Ramp3 and Tbrg4. Our results show that the tight regulation of WAP gene expression parallels variations in the chromatin structure and DNA methylation profile throughout the Ramp3-WAP-Tbrg4 locus. Three Matrix Attachment Regions (MAR) have been predicted in this locus. Two of them are located between regions exhibiting open and closed chromatin structures in the liver. The third, located around the transcription start site of the Tbrg4 gene, interacts with topoisomerase II in HC11 mouse mammary cells, and in these cells anchors the chromatin loop to the nuclear matrix. Furthermore, if lactogenic hormones are present in these cells, the chromatin loop surrounding the WAP gene is more tightly attached to the nuclear structure, as observed after a high salt treatment of the nuclei and the formation of nuclear halos. Taken together, our results point to a combination of several epigenetic events that may explain the differential expression pattern of the WAP locus in relation to tissue and developmental stages

  12. Safety evaluation of Whole Algalin Protein (WAP) from Chlorella protothecoides.

    Science.gov (United States)

    Szabo, Nancy J; Matulka, Ray A; Chan, Teresa

    2013-09-01

    Microalgae such as Chlorella spp., were once consumed as traditional human foods; now they are being developed as ingredients for modern diets. Whole Algalin Protein (WAP) from dried milled Chlorella protothecoides was evaluated for dietary safety in a 13-week feeding trial in rodents with genotoxic potential evaluated using in vitro and in vivo assays and the likelihood of food allergy potential evaluated via human repeat-insult patch test (HRIPT). In the subchronic study, rats consumed feed containing 0, 25,000, 50,000 or 100,000 ppm WAP for 92-93 days. No treatment-related mortalities or effects in general condition, body weight, food consumption, ophthalmology, urinalysis, hematology, clinical chemistry, gross pathology, organ weights, and histopathology occurred. Several endpoints exhibited statistically significant effects, but none was dose-related. The no-observed-adverse-effect level (NOAEL) was based on the highest WAP concentration consumed by the rats and was equivalent to 4805 mg/kg/day in males and 5518 mg/kg/day in females. No mutagenicity occurred in Salmonella typhimurium or Escherichia coli tester strains (≤5000 μg/plate WAP) with or without mutagenic activation. No clastogenic response occurred in bone marrow from mice administered a single oral dose (2000 mg/kg WAP). Skin sensitization was not induced by WAP via HRIPT, indicating little potential for food allergy. Copyright © 2013 Elsevier Ltd. All rights reserved.

  13. Demonstrating compliance with WAPS 1.3 in the Hanford waste vitrification plant process

    Energy Technology Data Exchange (ETDEWEB)

    Bryan, M.F.; Piepel, G.F.; Simpson, D.B.

    1996-03-01

    The high-level waste (HLW) vitrification plant at the Hanford Site was being designed to immobilize transuranic and high-level radioactive waste in borosilicate glass. This document describes the statistical procedure to be used in verifying compliance with requirements imposed by Section 1.3 of the Waste Acceptance Product Specifications (WAPS, USDOE 1993). WAPS 1.3 is a specification for ``product consistency,`` as measured by the Product Consistency Test (PCT, Jantzen 1992b), for each of three elements: lithium, sodium, and boron. Properties of a process batch and the resulting glass are largely determined by the composition of the feed material. Empirical models are being developed to estimate some property values, including PCT results, from data on feed composition. These models will be used in conjunction with measurements of feed composition to control the HLW vitrification process and product.

  14. Shippingport Station Decommissioning Project site release protocol

    International Nuclear Information System (INIS)

    Handy, J.W.

    1988-01-01

    The Richland, Washington field office of the DOE and its Remedial Actions Contractor, GE, took possession of the SSDP site in September 1984. In February of the following year, DOE-HQ issued generic, site independent guidelines taken from existing radiation protection standards. Basic generic dose limits were English equivalents of 1 mSv (100 mrem) per year averaged over the lifetime of any individual member of the general public. Hot spot limits were given. Occupied or habitable structures were limited to 5.2 x 10 -9 C/Kg h (20mR/h). Surface contamination was limited to standards plus average and maximum contact dose rates of 2 microGy (0.2 mrad) per hour and 10 microGy (1 mrad) per hour respectively. In addition, ''all exposures ... were to be limited to levels that (were) as low as reasonably achievable (ALARA).'' Authorized limits higher than these guidelines were allowed under given exceptional circumstances. GE determined the allowable radionuclide concentrations that could remain in soil and included rubble, and not dose the resident farmer to more than 1 mSv (100 mrem) per year. Under more conservative scenarios, however, exposures were controlled for buried, potentially occupationally occupiable, concrete substructures, to souvenir items, or to buried, but potentially exposed, concrete slabs. GE incorporated the scenario's pathways into a document implementing specific site release criteria which cannot be exceeded if the site is to be released unconditionally. 3 refs., 1 fig

  15. WAP Based An Alternative Solution for Traffic Transportation Problem in Sidoarjo Surrounding Area Using AHP

    Directory of Open Access Journals (Sweden)

    Arna Fariza

    2009-08-01

    Full Text Available In line with the increasing interest on Lapindo mud disaster which causes several roadway covered by mud, there is a need to give an alternative solution for traffic transportation problem in surrounding area. The possible criteria for the solution of this road way are length, surface, traffic, and width of the road. Types of vehicle across the road also give a contribution to the criteria. By using Geography Information System (GIS, it is easy to all drivers to take decision which way has to be chosen based on the real condition. GIS is used to visualize the alternative road, which is possible to take. Analytic Hierarchy Processing (AHP is a decision method which is based on many criteria and alternatives. The input of AHP can be a preference or real value. Applied AHP to decide value of each alternative is based on application of Wireless Application Protocol (WAP assessment.

  16. RCRA groundwater data analysis protocol for the Hanford Site, Washington

    International Nuclear Information System (INIS)

    Chou, C.J.; Jackson, R.L.

    1992-04-01

    The Resource Conservation and Recovery Act of 1976 (RCRA) groundwater monitoring program currently involves site-specific monitoring of 20 facilities on the Hanford Site in southeastern Washington. The RCRA groundwater monitoring program has collected abundant data on groundwater quality. These data are used to assess the impact of a facility on groundwater quality or whether remediation efforts under RCRA corrective action programs are effective. Both evaluations rely on statistical analysis of groundwater monitoring data. The need for information on groundwater quality by regulators and environmental managers makes statistical analysis of monitoring data an important part of RCRA groundwater monitoring programs. The complexity of groundwater monitoring programs and variabilities (spatial, temporal, and analytical) exhibited in groundwater quality variables indicate the need for a data analysis protocol to guide statistical analysis. A data analysis protocol was developed from the perspective of addressing regulatory requirements, data quality, and management information needs. This data analysis protocol contains four elements: data handling methods; graphical evaluation techniques; statistical tests for trend, central tendency, and excursion analysis; and reporting procedures for presenting results to users

  17. Effects of a Short Drilling Implant Protocol on Osteotomy Site Temperature and Drill Torque.

    Science.gov (United States)

    Mihali, Sorin G; Canjau, Silvana; Cernescu, Anghel; Bortun, Cristina M; Wang, Hom-Lay; Bratu, Emanuel

    2018-02-01

    To establish a protocol for reducing the drilling sequence during implant site preparation based on temperature and insertion torque. The traditional conventional drilling sequence (used several drills with 0.6-mm increment each time) was compared with the proposed short drilling protocol (only used 2 drills: initial and final drill). One hundred drilling osteotomies were performed in bovine and porcine bones. Sets of 2 osteotomy sites were created in 5 bone densities using 2 types of drilling protocols. Thermographic pictures were captured throughout all drilling procedures and analyzed using ThermaCAM Researcher Professional 2.10. Torque values were determined during drilling by measuring electrical input and drill speed. There were statistically significant differences in bone temperature between the conventional and short drilling protocols during implant site preparation (analysis of variance P = 0.0008). However, there were no significant differences between the 2 types of drilling protocols for both implant diameters. Implant site preparation time was significantly reduced when using the short drilling protocol compared with the conventional drilling protocol (P drilling protocol proposed herein may represent a safe approach for implant site preparation.

  18. On Equivalence between Critical Probabilities of Dynamic Gossip Protocol and Static Site Percolation

    Science.gov (United States)

    Ishikawa, Tetsuya; Hayakawa, Tomohisa

    The relationship between the critical probability of gossip protocol on the square lattice and the critical probability of site percolation on the square lattice is discussed. Specifically, these two critical probabilities are analytically shown to be equal to each other. Furthermore, we present a way of evaluating the critical probability of site percolation by approximating the saturation of gossip protocol. Finally, we provide numerical results which support the theoretical analysis.

  19. Quality improvement initiative: Preventative Surgical Site Infection Protocol in Vascular Surgery.

    Science.gov (United States)

    Parizh, David; Ascher, Enrico; Raza Rizvi, Syed Ali; Hingorani, Anil; Amaturo, Michael; Johnson, Eric

    2018-02-01

    Objective A quality improvement initiative was employed to decrease single institution surgical site infection rate in open lower extremity revascularization procedures. In an attempt to lower patient morbidity, we developed and implemented the Preventative Surgical Site Infection Protocol in Vascular Surgery. Surgical site infections lead to prolonged hospital stays, adjunctive procedure, and additive costs. We employed targeted interventions to address the common risk factors that predispose patients to post-operative complications. Methods Retrospective review was performed between 2012 and 2016 for all surgical site infections after revascularization procedures of the lower extremity. A quality improvement protocol was initiated in January 2015. Primary outcome was the assessment of surgical site infection rate reduction in the pre-protocol vs. post-protocol era. Secondary outcomes evaluated patient demographics, closure method, perioperative antibiotic coverage, and management outcomes. Results Implementation of the protocol decreased the surgical site infection rate from 6.4% to 1.6% p = 0.0137). Patient demographics and comorbidities were assessed and failed to demonstrate a statistically significant difference among the infection and no-infection groups. Wound closure with monocryl suture vs. staple proved to be associated with decreased surgical site infection rate ( p site infections in the vascular surgery population are effective and necessary. Our data suggest that there may be benefit in the incorporation of MRSA and Gram-negative coverage as part of the Surgical Care Improvement Project perioperative guidelines.

  20. Standard protocol for evaluation of environmental transfer factors around NPP sites

    International Nuclear Information System (INIS)

    Hegde, A.G.; Verma, P.C.; Rao, D.D.

    2009-01-01

    This document presents the standard procedures for evaluation of site specific environmental transfer factors around NPP sites. The scope of this document is to provide standard protocol to be followed for evaluation of environmental transfer factors around NPP sites. The studies on transfer factors are being carried out at various NPP sites under DAE-BRNS projects for evaluation of site specific transfer factors for radionuclides released from power plants. This document contains a common methodology in terms of sampling, processing, measurements and analysis of elemental/radionuclides, while keeping the site specific requirements also in place. (author)

  1. Making sense of site declarations: Canadian declarations under article 2.a. (iii) of the Additional Protocol

    International Nuclear Information System (INIS)

    Cameron, J.K.; Benjamin, R.; Ghosh, A.

    2001-01-01

    Full text: While this paper will provide an overview of Additional Protocol implementation activities in Canada, this paper will also deal with a specific, albeit important, component of Canada's initial declaration under the Additional Protocol: site definitions and declarations. A clear description of the problems, solutions and compromises in making site declarations across a variety of sites in Canada would provide a useful insight into the process as other States prepare to do the same. Through the Model Protocol Additional to Safeguards Agreements Between Member States and the International Atomic Energy Agency, provisions exist to fulfil a longstanding gap in the coverage of international safeguards. The success of these new provisions are dependent on the extent to which declarations balance the intent of expanded declarations and the practical difficulties in making such declarations. The prerogative to delineate site boundaries lies with the Member State. In doing so, four factors merit careful consideration. First, Article 18.b of the Additional Protocol draws connections between facility definition and site delineation. Under comprehensive safeguards, information on facilities has already been submitted to the IAEA specifying site layouts in the design information questionnaire. Consistency between the site layouts specifications of the design information and site definition under the Additional Protocol is important, as differences will lead to inconsistencies, which will have to be resolved during implementation. Second, while Article 18.b specified that specific essential services, co-located in close geographic proximity, should be considered as part of the same site, there are instances where site definition is complicated by close proximity of other, but separate, safeguarded facilities and the existence of services related, but not essentials according to the definitions of the Additional Protocol, to the site. Third, practical limitations come

  2. Integración de un sistema de pago para móvil mediante un intermediario para una aplicación WAP

    OpenAIRE

    Paradell Cases, David

    2012-01-01

    Nou sistema de pagament per mòbil. [ANGLÈS] Integration of a mobile payment system using Mobile 365 company to a WAP application. [CASTELLÀ] Integración de un sistema de pago para móvil mediante Mobile 365 para una aplicación WAP. [CATALÀ] Integració d'un sistema de pagament per mòbil mitjançant Mobile 365 per a una aplicació WAP.

  3. Pilot studies for the North American Soil Geochemical Landscapes Project - Site selection, sampling protocols, analytical methods, and quality control protocols

    Science.gov (United States)

    Smith, D.B.; Woodruff, L.G.; O'Leary, R. M.; Cannon, W.F.; Garrett, R.G.; Kilburn, J.E.; Goldhaber, M.B.

    2009-01-01

    In 2004, the US Geological Survey (USGS) and the Geological Survey of Canada sampled and chemically analyzed soils along two transects across Canada and the USA in preparation for a planned soil geochemical survey of North America. This effort was a pilot study to test and refine sampling protocols, analytical methods, quality control protocols, and field logistics for the continental survey. A total of 220 sample sites were selected at approximately 40-km intervals along the two transects. The ideal sampling protocol at each site called for a sample from a depth of 0-5 cm and a composite of each of the O, A, and C horizons. The Ca, Fe, K, Mg, Na, S, Ti, Ag, As, Ba, Be, Bi, Cd, Ce, Co, Cr, Cs, Cu, Ga, In, La, Li, Mn, Mo, Nb, Ni, P, Pb, Rb, Sb, Sc, Sn, Sr, Te, Th, Tl, U, V, W, Y, and Zn by inductively coupled plasma-mass spectrometry and inductively coupled plasma-atomic emission spectrometry following a near-total digestion in a mixture of HCl, HNO3, HClO4, and HF. Separate methods were used for Hg, Se, total C, and carbonate-C on this same size fraction. Only Ag, In, and Te had a large percentage of concentrations below the detection limit. Quality control (QC) of the analyses was monitored at three levels: the laboratory performing the analysis, the USGS QC officer, and the principal investigator for the study. This level of review resulted in an average of one QC sample for every 20 field samples, which proved to be minimally adequate for such a large-scale survey. Additional QC samples should be added to monitor within-batch quality to the extent that no more than 10 samples are analyzed between a QC sample. Only Cr (77%), Y (82%), and Sb (80%) fell outside the acceptable limits of accuracy (% recovery between 85 and 115%) because of likely residence in mineral phases resistant to the acid digestion. A separate sample of 0-5-cm material was collected at each site for determination of organic compounds. A subset of 73 of these samples was analyzed for a suite of

  4. Surface and subsurface cleanup protocol for radionuclides, Gunnison, Colorado, UMTRA project processing site. Final [report

    Energy Technology Data Exchange (ETDEWEB)

    1993-09-01

    Surface and subsurface soil cleanup protocols for the Gunnison, Colorado, processing sits are summarized as follows: In accordance with EPA-promulgated land cleanup standards (40 CFR 192), in situ Ra-226 is to be cleaned up based on bulk concentrations not exceeding 5 and 15 pCi/g in 15-cm surface and subsurface depth increments, averaged over 100-m{sup 2} grid blocks, where the parent Ra-226 concentrations are greater than, or in secular equilibrium with, the Th-230 parent. A bulk interpretation of these EPA standards has been accepted by the Nuclear Regulatory Commission (NRC), and while the concentration of the finer-sized soil fraction less than a No. 4 mesh sieve contains the higher concentration of radioactivity, the bulk approach in effect integrates the total sample radioactivity over the entire sample mass. In locations where Th-230 has differentially migrated in subsoil relative to Ra-226, a Th-230 cleanup protocol has been developed in accordance with Supplemental Standard provisions of 40 CFR 192 for NRC/Colorado Department of Health (CDH) approval for timely implementation. Detailed elements of the protocol are contained in Appendix A, Generic Protocol from Thorium-230 Cleanup/Verification at UMTRA Project Processing Sites. The cleanup of other radionuclides or nonradiological hazards that pose a significant threat to the public and the environment will be determined and implemented in accordance with pathway analysis to assess impacts and the implications of ALARA specified in 40 CFR 192 relative to supplemental standards.

  5. Surface and subsurface cleanup protocol for radionuclides, Gunnison, Colorado, UMTRA project processing site

    International Nuclear Information System (INIS)

    1993-09-01

    Surface and subsurface soil cleanup protocols for the Gunnison, Colorado, processing sits are summarized as follows: In accordance with EPA-promulgated land cleanup standards (40 CFR 192), in situ Ra-226 is to be cleaned up based on bulk concentrations not exceeding 5 and 15 pCi/g in 15-cm surface and subsurface depth increments, averaged over 100-m 2 grid blocks, where the parent Ra-226 concentrations are greater than, or in secular equilibrium with, the Th-230 parent. A bulk interpretation of these EPA standards has been accepted by the Nuclear Regulatory Commission (NRC), and while the concentration of the finer-sized soil fraction less than a No. 4 mesh sieve contains the higher concentration of radioactivity, the bulk approach in effect integrates the total sample radioactivity over the entire sample mass. In locations where Th-230 has differentially migrated in subsoil relative to Ra-226, a Th-230 cleanup protocol has been developed in accordance with Supplemental Standard provisions of 40 CFR 192 for NRC/Colorado Department of Health (CDH) approval for timely implementation. Detailed elements of the protocol are contained in Appendix A, Generic Protocol from Thorium-230 Cleanup/Verification at UMTRA Project Processing Sites. The cleanup of other radionuclides or nonradiological hazards that pose a significant threat to the public and the environment will be determined and implemented in accordance with pathway analysis to assess impacts and the implications of ALARA specified in 40 CFR 192 relative to supplemental standards

  6. Surface and subsurface cleanup protocol for radionuclides, Gunnison, Colorado, UMTRA project processing site

    International Nuclear Information System (INIS)

    Gonzales, D.

    1993-12-01

    Surface and subsurface soil cleanup protocols for the Gunnison, Colorado, processing site are summarized as follows: In accordance with EPA-promulgated land cleanup standards, in situ Ra-226 is to be cleaned up based on bulk concentrations not exceeding 5 and 15 pCi/g in 15-cm surface and subsurface depth increments, averaged over 100m 2 grid blocks, where the parent Ra-226 concentrations are greater than, or in secular equilibrium with, the Th-230 parent. In locations where Th-230 has differentially migrated in subsoil relative to Ra-226, a Th-230 clean up protocol has been developed. The cleanup of other radionuclides or nonradiological hazards that pose a significant threat to the public and the environment will be determined and implemented in accordance with pathway analysis to assess impacts and the implications of ALARA specified in 40 CFR Part 192 relative to supplemental standards

  7. A hyper-temporal remote sensing protocol for high-resolution mapping of ecological sites.

    Science.gov (United States)

    Maynard, Jonathan J; Karl, Jason W

    2017-01-01

    ) spectral variability through time, 2) field sampling protocols that accurately characterize key soil properties (e.g., texture, depth) need to be adopted, and 3) additional environmental covariates (e.g. terrain attributes) need to be evaluated that may help further differentiate sites with similar spectral signals. Finally, the proposed hyper-temporal remote sensing framework may provide a standardized approach to evaluate and test our ecological site concepts through examining differences in vegetation dynamics in response to climatic variability and other drivers of land-use change. Results from this study demonstrate the efficacy of the hyper-temporal remote sensing approach for high resolution mapping of ecological sites, and highlights its utility in terms of reduced cost and time investment relative to traditional manual mapping approaches.

  8. Which dressing do donor site wounds need?: study protocol for a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Ubbink Dirk T

    2011-10-01

    Full Text Available Abstract Background Donor site wounds after split-skin grafting are rather 'standard' wounds. At present, lots of dressings and topical agents for donor site wounds are commercially available. This causes large variation in the local care of these wounds, while the optimum 'standard' dressing for local wound care is unclear. This protocol describes a trial in which we investigate the effectiveness of various treatment options for these donor site wounds. Methods A 14-center, six-armed randomized clinical trial is being carried out in the Netherlands. An a-priori power analysis and an anticipated dropout rate of 15% indicates that 50 patients per group are necessary, totaling 300 patients, to be able to detect a 25% quicker mean time to complete wound healing. Randomization has been computerized to ensure allocation concealment. Adult patients who need a split-skin grafting operation for any reason, leaving a donor site wound of at least 10 cm2 are included and receive one of the following dressings: hydrocolloid, alginate, film, hydrofiber, silicone dressing, or paraffin gauze. No combinations of products from other intervention groups in this trial are allowed. Optimum application and changes of these dressings are pursued according to the protocol as supplied by the dressing manufacturers. Primary outcomes are days to complete wound healing and pain (using a Visual Analogue Scale. Secondary outcomes are adverse effects, scarring, patient satisfaction, and costs. Outcome assessors unaware of the treatment allocation will assess whether or not an outcome has occurred. Results will be analyzed according to the intention to treat principle. The first patient was randomized October 1, 2009. Discussion This study will provide comprehensive data on the effectiveness of different treatment options for donor site wounds. The dressing(s that will prevail in effectiveness, satisfaction and costs will be promoted among clinicians dealing with such

  9. Development of a monitoring protocol to enhance mentoring in the IRIS REU site

    Science.gov (United States)

    Hubenthal, M.; Brudzinski, M. R.; Colella, H.

    2013-12-01

    Research Experiences for Undergraduate (REU) sites pair interns with scientists expected to oversee and guide an intern's scientific research, and assist in the development of skills, knowledge, and connections that will enhance the intern's professional and personal growth. This aspect of REU sites is generally recognized as a powerful, yet complicated, component that has a strong influence on the overall success of the intern's experience. Evaluations indicate that the quality and consistency of mentoring in REU sites can be highly variable. Traditional strategies to influence mentorship generally include reading lists or short trainings at the beginning of the summer. The efficacy of these approaches is questionable. As a result many REU Site facilitators are deeply interested in the question 'How can REU programs challenge scientists to raise their participation to the level of (truly) mentoring?' The Incorporated Research Institutions for Seismology (IRIS) REU site is developing a 13-item rubric measuring research skills, and a protocol of training and intern-mentor meetings to discuss progress. The goal of the intervention is to both increase the extent to which the mentoring relationship is centered on the intern, and to enable interns and mentors to feel more effective monitoring interns' personal/professional growth. This intervention was piloted in 2011, refined, and fully implemented in 2012. During the initial week of the program, interns assess their skills, complete the rubric independently, and discuss the completed rubric with their mentor. Midway through the summer interns and mentors each review the rubric and assess the intern's skills. The intern-mentor pairs then meet to collaborate and complete the rubric together. Finally, in the last week of the program, interns and mentors independently assess the intern's skills and complete the rubric, and the pairs again meet to discuss and negotiate these independent assessments. Survey data from 2012

  10. A Ten Step Protocol and Plan for CCS Site Characterization, Based on an Analysis of the Rocky Mountain Region, USA

    Energy Technology Data Exchange (ETDEWEB)

    McPherson, Brian; Matthews, Vince

    2013-09-15

    This report expresses a Ten-Step Protocol for CO2 Storage Site Characterization, the final outcome of an extensive Site Characterization analysis of the Rocky Mountain region, USA. These ten steps include: (1) regional assessment and data gathering; (2) identification and analysis of appropriate local sites for characterization; (3) public engagement; (4) geologic and geophysical analysis of local site(s); (5) stratigraphic well drilling and coring; (6) core analysis and interpretation with other data; (7) database assembly and static model development; (8) storage capacity assessment; (9) simulation and uncertainty assessment; (10) risk assessment. While the results detailed here are primarily germane to the Rocky Mountain region, the intent of this protocol is to be portable or generally applicable for CO2 storage site characterization.

  11. Diagnostic efficacy of a modified low-dose acquisition protocol for the preoperative evaluation of mini-implant sites

    Energy Technology Data Exchange (ETDEWEB)

    Tadinada, Aditya; Marczak, Alana; Yadav, Sumit [University of Connecticut School of Dental Medicine, Farmington (United States)

    2017-09-15

    The objective of this study was to compare the outcomes of surgical mini-implant placement when potential mini-implant sites were scanned using a lower-dose 180° acquisition protocol versus a conventional 360° acquisition protocol. Ten dentate human skulls were used to provide sites for potential mini-implant placement. The sites were randomly divided into 2 groups: 360° and 180° cone-beam computed tomography (CBCT) acquisition protocols. A small-volume 180° CBCT scan and a 360° CBCT scan of each site were acquired using a Morita Accuitomo-170 CBCT machine and then a mini-implant was placed. A follow-up 360° CBCT scan was done as a gold standard to evaluate the location of the mini-implant and root perforation. Two raters evaluated the scans. Ninety-eight percent of the mini-implants placed did not perforate any root structure. Two percent of the sites had an appearance suggestive of perforation. On a Likert scale, both raters agreed that their subjective evaluation of the diagnostic quality of the protocols, ability to make and read measurements of the sites, and preferences for the specified diagnostic task were comparable. The Cohen kappa showed high inter-rater and intra-rater agreement. In this ex vivo study, we found that the 180° rotational acquisition was as effective as the conventional 360° rotational acquisition for the preoperative evaluation of potential mini-implant sites.

  12. Surface and subsurface cleanup protocol for radionuclides Gunnison, Colorado, UMTRA Project Processing Site

    International Nuclear Information System (INIS)

    1994-05-01

    The supplemental standards provisions of Title 40, Code of Federal Regulations, Part 192 (40 CFR Part 192) require the cleanup of radionuclides other than radium-226 (Ra-226) to levels ''as low as reasonably achievable'' (ALARA), taking into account site-specific conditions, if sufficient quantities and concentrations are present to constitute a significant radiation hazard. In this context, thorium-230 (Th-230) at the Gunnison, Colorado, processing site will require remediation. However, a seasonally fluctuating groundwater table at the site significantly complicates conventional remedial action with respect to cleanup. Characterization data indicate that in the offpile areas, the removal of residual in situ bulk Ra-226 and Th-230 such that the 1000-year projected Ra-226 concentration (Ra-226 concentration in 1000 years due to the decay of in situ Ra-226 and the in-growth of Ra-226 from in situ Th-230) complies with the US Environmental Protection Agency (EPA) cleanup standard for in situ Ra-226 and the cleanup protocol for in situ Th-230 can be readily achieved using conventional excavation techniques for bulk contamination without encountering significant impacts due to groundwater. The EPA cleanup standard and criterion for Ra-226 and the 1000-year projected Ra-226 are 5 and 15 picocuries per gram (pCi/g) above background, respectively, averaged over 15-centimeter (cm) deep surface and subsurface intervals and 100-square-meter (m 2 ) grid areas. Significant differential migration of Th-230 relative to Ra-226 has occurred over 40 percent of the subpile area. To effectively remediate the site with respect to Ra-226 and Th-230, supplemental standard is proposed and discussed in this report

  13. A single WAP domain (SWD)-containing protein with antiviral activity from Pacific white shrimp Litopenaeus vannamei.

    Science.gov (United States)

    Yang, Linwei; Niu, Shengwen; Gao, Jiefeng; Zuo, Hongliang; Yuan, Jia; Weng, Shaoping; He, Jianguo; Xu, Xiaopeng

    2018-02-01

    The single whey acidic protein (WAP) domain (SWD)-containing proteins, also called type III crustins, are a group of antimicrobial peptides (AMPs) in crustaceans. At present, a number of SWDs have been identified in shrimp, which showed essential antibacterial activities. However, the roles of SWDs in antiviral immune responses have not been reported up to now. In this study, a novel SWD (LvSWD3) was identified from Pacific white shrimp, Litopenaeus vannamei, which contained a typical single WAP domain homologous to those of other crustacean SWDs. Although lacking the pro and arg-rich region between the signal peptide and the WAP domain, LvSWD3 was closely clustered with other shrimp SWDs in the phylogenetic tree. Similar to many shrimp SWDs, the highest expression of LvSWD3 was detected in hemocytes. The LvSWD3 expression exhibited only limited changes after challenges with Vibrio parahaemolyticus, Poly (I:C) and lipopolysaccharide, but was significantly up-regulated after white spot syndrome virus (WSSV) infection. Silencing of LvSWDs significantly accelerated the death of the WSSV-infected but not the V. parahaemolyticus-infected shrimp. The recombinant LvSWD3 protein did not show proteinase inhibitory and antibacterial activities but could significantly postpone the death of WSSV-infected shrimp and reduce the viral load in tissues. These suggested that LvSWD3 was a novel SWD with antiviral activity. Copyright © 2017 Elsevier Ltd. All rights reserved.

  14. Distribution of immunodeficiency fact files with XML – from Web to WAP

    Directory of Open Access Journals (Sweden)

    Riikonen Pentti

    2005-06-01

    Full Text Available Abstract Background Although biomedical information is growing rapidly, it is difficult to find and retrieve validated data especially for rare hereditary diseases. There is an increased need for services capable of integrating and validating information as well as proving it in a logically organized structure. A XML-based language enables creation of open source databases for storage, maintenance and delivery for different platforms. Methods Here we present a new data model called fact file and an XML-based specification Inherited Disease Markup Language (IDML, that were developed to facilitate disease information integration, storage and exchange. The data model was applied to primary immunodeficiencies, but it can be used for any hereditary disease. Fact files integrate biomedical, genetic and clinical information related to hereditary diseases. Results IDML and fact files were used to build a comprehensive Web and WAP accessible knowledge base ImmunoDeficiency Resource (IDR available at http://bioinf.uta.fi/idr/. A fact file is a user oriented user interface, which serves as a starting point to explore information on hereditary diseases. Conclusion The IDML enables the seamless integration and presentation of genetic and disease information resources in the Internet. IDML can be used to build information services for all kinds of inherited diseases. The open source specification and related programs are available at http://bioinf.uta.fi/idml/.

  15. [Effect of compliance with an antibiotic prophylaxis protocol in surgical site infections in appendectomies. Prospective cohort study].

    Science.gov (United States)

    Sánchez-Santana, Tomás; Del-Moral-Luque, Juan Antonio; Gil-Yonte, Pablo; Bañuelos-Andrío, Luis; Durán-Poveda, Manuel; Rodríguez-Caravaca, Gil

    Antibiotic prophylaxis is the most suitable tool for preventing surgical site infection. This study assessed compliance with antibiotic prophylaxis in surgery for acute appendicitis, and the effect of this compliance on surgical site infection. Prospective cohort study to evaluate compliance with antibiotic prophylaxis protocol in appendectomies. An assessment was made of the level of compliance with prophylaxis, as well as the causes of non-compliance. The incidence of surgical site infection was studied after a maximum incubation period of 30 days. The relative risk adjusted with a logistic regression model was used to assess the effect of non-compliance of prophylaxis on surgical site infection. The study included a total of 930 patients. Antibiotic prophylaxis was indicated in all patients, and administered in 71.3% of cases, with an overall protocol compliance of 86.1%. The principal cause of non-compliance was time of initiation. Cumulative incidence of surgical site infection was 4.6%. No relationship was found between inadequate prophylaxis compliance and infection (relative risk=0.5; 95% CI: 0.1-1.9) (P>.05). Compliance of antibiotic prophylaxis was high, but could be improved. No relationship was found between prophylaxis compliance and surgical site infection rate. Copyright © 2016 Academia Mexicana de Cirugía A.C. Publicado por Masson Doyma México S.A. All rights reserved.

  16. Effect of a Standardized Protocol of Antibiotic Therapy on Surgical Site Infection after Laparoscopic Surgery for Complicated Appendicitis.

    Science.gov (United States)

    Park, Hyoung-Chul; Kim, Min Jeong; Lee, Bong Hwa

    Although it is accepted that complicated appendicitis requires antibiotic therapy to prevent post-operative surgical infections, consensus protocols on the duration and regimens of treatment are not well established. This study aimed to compare the outcome of post-operative infectious complications in patients receiving old non-standardized and new standard antibiotic protocols, involving either 5 or 10 days of treatment, respectively. We enrolled 1,343 patients who underwent laparoscopic surgery for complicated appendicitis between January 2009 and December 2014. At the beginning of the new protocol, the patients were divided into two groups; 10 days of various antibiotic regimens (between January 2009 and June 2012, called the non-standardized protocol; n = 730) and five days of cefuroxime and metronidazole regimen (between July 2012 and December 2014; standardized protocol; n = 613). We compared the clinical outcomes, including surgical site infection (SSI) (superficial and deep organ/space infections) in the two groups. The standardized protocol group had a slightly shorter operative time (67 vs. 69 min), a shorter hospital stay (5 vs. 5.4 d), and lower medical cost (US$1,564 vs. US$1,654). Otherwise, there was no difference between the groups. No differences were found in the non-standardized and standard protocol groups with regard to the rate of superficial infection (10.3% vs. 12.7%; p = 0.488) or deep organ/space infection (2.3% vs. 2.1%; p = 0.797). In patients undergoing laparoscopic surgery for complicated appendicitis, five days of cefuroxime and metronidazole did not lead to more SSIs, and it decreased the medical costs compared with non-standardized antibiotic regimens.

  17. The C-terminal domain of the nuclear factor I-B2 isoform is glycosylated and transactivates the WAP gene in the JEG-3 cells

    International Nuclear Information System (INIS)

    Mukhopadhyay, Sudit S.; Rosen, Jeffrey M.

    2007-01-01

    The transcription factor nuclear factor I (NFI) has been shown previously both in vivo and in vitro to be involved in the cooperative regulation of whey acidic protein (WAP) gene transcription along with the glucocorticoid receptor and STAT5. In addition, one of the specific NFI isoforms, NFI-B2, was demonstrated in transient co-transfection experiments in JEG cells, which lack endogenous NFI, to be preferentially involved in the cooperative regulation of WAP gene expression. A comparison of the DNA-binding specificities of the different NFI isoforms only partially explained their differential ability to activate the WAP gene transcription. Here, we analyzed the transactivation regions of two NFI isoforms by making chimeric proteins between the NFI-A and B isoforms. Though, their DNA-binding specificities were not altered as compared to the corresponding wild-type transcription factors, the C-terminal region of the NFI-B isoform was shown to preferentially activate WAP gene transcription in cooperation with GR and STAT5 in transient co-transfection assays in JEG-3 cells. Furthermore, determination of serine and threonine-specific glycosylation (O-linked N-acetylglucosamine) of the C-terminus of the NFI-B isoform suggested that the secondary modification by O-GlcNAc might play a role in the cooperative regulation of WAP gene transcription by NFI-B2 and STAT5

  18. Evaluation of a biodegradation screening protocol for contaminated soil from manufactured gas plant sites

    International Nuclear Information System (INIS)

    Morgan, D.J.; Battaglia, A.; Smith, J.R.; Middleton, A.C.; Nakles, D.V.; Linz, D.G.

    1991-01-01

    Bioremediation has been demonstrated to be a viable alternative for treating soils contaminated with PAHs. however, given the variability encountered in soils characteristics and contamination level, their susceptibility to biological treatment must be assessed on a case-by-case basis. This paper discusses a new treatability protocol, the GRI Accelerated Treatability Protocol. The mainstay of the protocol, which is designed to quickly provide treatability data for a given contaminated soil is a bioslurry experiment, in which the contaminated soil is continuously stirred and provided with abundant oxygen, nutrients and water, to maximize biological activity and thus contaminant removal. The results of using such protocol on four soils, widely differing in physical characteristics and contamination levels, are compared to the results of traditional pan studies, and an empirical equation, describing the observed soil concentrations as a function of time in both slurry and pans, is presented. Similarities and differences between achievable endpoints and biodegradation rates are discussed, and the applicability of the GRI Accelerated Treatability Protocol to full-scale engineered systems is addressed. Results to date indicate that, for soils with less than 10% fines slurry and pan experiments yield approximately the same endpoint, so that for those soils the GRI Accelerated Treatability Protocol can be used to assess the viability of an unsaturated bioremediation system. For soils with more than 10% fines, the slurry treatment endpoints are better than the pans. For those soils a traditional pan study experiment should be performed to evaluate the potential capabilities of unsaturated bioremediation

  19. Survey of Recipients of WAP Services Assessment of Household Budget and Energy Behaviors Pre to Post Weatherization DOE

    Energy Technology Data Exchange (ETDEWEB)

    Tonn, Bruce Edward [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Rose, Erin M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Hawkins, Beth A. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2015-10-01

    This report presents results from the national survey of weatherization recipients. This research was one component of the retrospective and Recovery Act evaluations of the U.S. Department of Energy s Weatherization Assistance Program. Survey respondents were randomly selected from a nationally representative sample of weatherization recipients. The respondents and a comparison group were surveyed just prior to receiving their energy audits and then again approximately 18 months post-weatherization. This report focuses on budget issues faced by WAP households pre- and post-weatherization, whether household energy behaviors changed from pre- to post, the effectiveness of approaches to client energy education, and use and knowledge about thermostats.

  20. Towards a protocol for the assessment of site-specific human health risks for consumption of vegetables from contaminated sites

    NARCIS (Netherlands)

    Swartjes FA; Dirven-van Breemen EM; Otte PF; Beelen P van; Rikken MGJ; Tuinstra J; Spijker J; Lijzen JPA; LER

    2007-01-01

    RIVM has developed an approach which allows human health risks of vegetable consumption from contaminated sites to be assessed. A tiered approach was used to guarantee the scientific basis and efficient use in practice. The underlying principle is: simple when possible and complex when necessary. If

  1. Testing of toxicity based methods to develop site specific clean up objectives - phase 1: Toxicity protocol screening and applicability

    International Nuclear Information System (INIS)

    Hamilton, H.; Kerr, D.; Thorne, W.; Taylor, B.; Zadnik, M.; Goudey, S.; Birkholz, D.

    1994-03-01

    A study was conducted to develop a cost-effective and practical protocol for using bio-assay based toxicity assessment methods for remediation of decommissioned oil and gas production, and processing facilities. The objective was to generate site-specific remediation criteria for contaminated sites. Most companies have used the chemical-specific approach which, however, did not meet the ultimate land use goal of agricultural production. The toxicity assessment method described in this study dealt with potential impairment to agricultural crop production and natural ecosystems. Human health concerns were not specifically addressed. It was suggested that chemical-specific methods should be used when human health concerns exist. . Results showed that toxicity tests will more directly identify ecological stress caused by site contamination than chemical-specific remediation criteria, which can be unnecessarily protective. 11 refs., 7 tabs., 6 figs

  2. Protocol for development of authorized release limits for concrete at U.S. Department of Energy sites

    International Nuclear Information System (INIS)

    Arnish, J.; Kamboj, S.; Chen, S.-Y.; Parker, F. L.; Smith, A. M.; Meservey, R. H.; Tripp, J. L.

    2000-01-01

    The purpose of this protocol is to assist US Department of Energy (DOE) sites in releasing concrete for reuse. Current regulations allow the sites to release surface-contaminated materials if their radioactivity falls below certain levels and to possibly release materials with volumetric contamination or higher levels of surface contamination on a case-by-case basis. In all cases, an ALARA (as low as reasonably achievable) analysis that evaluates the risks of releasing volumetrically contaminated concrete or concrete with higher levels of surface contamination is required as a basis for proposing and setting new release limits that allow for reuse of the concrete material. To evaluate the dose impacts of reusing radioactively contaminated material, the measured radiation levels (pCi/g or disintegrations per minute [dpm]/100 cm 2 ) must be converted to the estimated dose (mrem/yr) that would be received by affected individuals. The dose depends on the amounts and types of isotopes present and the time, distance, and method of exposure (e.g., inhalation or external exposure). For each disposition alternative, the protocol provides a systematic method to evaluate the impact of the dose on the affected individuals. The cost impacts of reusing concrete also need to be evaluated. They too depend on the disposition alternative and the extent and type of contamination. The protocol provides a method to perform a detailed analysis of these factors and evaluate the dose and cost impacts for various disposition alternatives. Once the dose and cost impacts of the various alternatives have been estimated, the protocol outlines the steps required to propose new release standards that allow release and reuse of the concrete material

  3. Application of biodegradation screening protocol to contaminated soils from manufactured gas plant sites

    International Nuclear Information System (INIS)

    Smith, J.R.; Nakles, D.V.; Cushey, M.A.; Morgan, D.J.; Linz, D.G.

    1990-01-01

    Bioremediation (i.e., land treatment) has been demonstrated to be a viable option for treating a variety of soils contamianted with organics. Conventional treatability studies utilize soil microcosm experiments to evaluate the potential for bioremediation of specific contaminated soils. Unfortunately, soil microcosms take from 4- to 6-months to complete and do not fully exploit the current understanding of the bioremediation process. This paper describes a treatability protocol that investigates underlying mechanisms and can be completed in 2- to 3-months. It is believed that soil bioremediation is governed by the sequential processes of contanate desorption from the soil into the aqueous phase and subsequent oxidation by microorganisms. The relative importance of each process depends upon the contaminant and soil. Accordingly, the treatability protocol has three steps. In the first step, tests are performed to determine soil characteristics. In the second step, tests are performed to characterize the desorption of contaminants from the soil. In the third step, the potential for biological oxidaiton is evaluated with a soil-water slurry reactor that maximizes desorption and provides an optimum environment for microbial growth. This paper provides a thorough discussion of the laboratory protocol including the primary theoretical tenets which serve as its basis. Preliminary procedures and results are presented for soils contaminated with manufactured gas plant (MGP) wastes. Particular attention is focused on biodegradation of polynuclear aromatic hydrocarbons (PAHs)

  4. Procedure manual: protocol for regulation of petroleum hydrocarbons in water under the special waste and contaminated sites regulation

    International Nuclear Information System (INIS)

    Evans, P.; Partridge, E.

    2002-05-01

    This document details the regulation governing numerical standards for petroleum hydrocarbons in water under the special waste and contaminated sites regulations of British Columbia. Groundwater containing benzene, toluene, ethylbenzene or xylenes in excess of the leachate standards is exempted from the regulatory regime of the Special Waste Regulation. The document contains a description of the conditions that apply to the management of petroleum hydrocarbons in water at contaminated sites. Some definitions are included, followed by an overview of the regulation. The third section deals with authorization and mandatory conditions, while additional requirements that might apply are enumerated in section four. This protocol directly affects the Environmental Management, and the Environmental Protection Regional Operations organizations. 1 tab

  5. Using a risk assessment protocol to develop soil cleanup criteria for petroleum contaminated sites

    International Nuclear Information System (INIS)

    Asante-Duah, D.K.

    1991-01-01

    Petroleum contaminated site may prose significant risks to the public because of potential health and environmental effects, and to Potentially Responsible Parties (PRPs) because of financial liabilities that could result from such effects. The effective management of petroleum contaminated sites has therefore become an important environmental priority and will be a growing challenge for years to come. It has also become evident that the proper management of such sites poses great challenges. Risk assessment seems to be one of the fastest evolving tools for developing appropriate management decisions, including those relating to the levels of cleanup warranty under specific scenarios. This paper reports that the U.S. Environmental Protection Agency (U.S. EPA) recognizes the use of risk assessment to facilitate decisions on whether or not remedial actions are needed to abate site-related risks, and also in the enforcement of regulatory standards. Risk assessment techniques have been used in various regulatory programs employed by federal, state, and local agencies

  6. A Site Characterization Protocol for Evaluating the Potential for Triggered or Induced Seismicity Resulting from Wastewater Injection and Hydraulic Fracturing

    Science.gov (United States)

    Walters, R. J.; Zoback, M. D.; Gupta, A.; Baker, J.; Beroza, G. C.

    2014-12-01

    Regulatory and governmental agencies, individual companies and industry groups and others have recently proposed, or are developing, guidelines aimed at reducing the risk associated with earthquakes triggered by waste water injection or hydraulic fracturing. While there are a number of elements common to the guidelines proposed, not surprisingly, there are also some significant differences among them and, in a number of cases, important considerations that are not addressed. The goal of this work is to develop a comprehensive protocol for site characterization based on a rigorous scientific understanding of the responsible processes. Topics addressed will include the geologic setting (emphasizing faults that might be affected), historical seismicity, hydraulic characterization of injection and adjacent intervals, geomechanical characterization to identify potentially active faults, plans for seismic monitoring and reporting, plans for monitoring and reporting injection (pressure, volumes, and rates), other factors contributing to risk (potentially affected population centers, structures, and facilities), and implementing a modified Probabilistic Seismic Hazard Analysis (PSHA). The guidelines will be risk based and adaptable, rather than prescriptive, for a proposed activity and region of interest. They will be goal oriented and will rely, to the degree possible, on established best practice procedures, referring to existing procedures and recommendations. By developing a risk-based site characterization protocol, we hope to contribute to the development of rational and effective measures for reducing the risk posed by activities that potentially trigger earthquakes.

  7. Cleanup protocols when encountering thorium-230 at U.S. DOE Uranium Mill Tailings Remedial Action (UMTRA) Project sites

    International Nuclear Information System (INIS)

    Miller, M.L.; Hylko, J.M.; Cornish, R.E.

    1995-01-01

    The passage of the Uranium Mill Tailings Radiation Control Act (UMTRCA) of 1978, established the regulatory framework, under which the US EPA charged with developing standards for the cleanup and disposal of tailings at 24 designated inactive uranium processing sites located in 10 states. 40 CFR 192.12 requires that the concentration of Ra-226 in land averaged over any area of 100 square meters shall not exceed the background level by more than 5 pCi/g, averaged over the first 15 cm of soil below the surface, 15 pCi/g, averaged over 15-cm-thick layers of soils more than 15 cm below the surface. However, Th-230 is not specifically addressed by the EPA in 40 CFR 192.12, which naturally decays with a half-life of 77,000 years to form Ra-226. Consequently, the cleanup of the initial Ra-226 contamination according to the standards will not necessarily mitigate against the eventual ingrowth of residual Ra-226 with time, due to the radioactive decay of residual Th-230. Therefore, to direct the excavation of residual Th-230, four generic protocols are being used at Uranium Mill Tailings Remedial Action (UMTRA) Project sites, as follows: Determining the allowable remaining concentration of Th-230 in surface and subsurface soils; Encountering Th-230 contamination in the unsaturated subsurface soil; Encountering Th-230 contamination in the saturated zone; and Verification sampling. The four generic protocols, developed in conjunction with the supplemental standards provision, ensure protection of the general public by reducing exposures to levels that are As Low As Reasonably Achievable, while considering practical measures necessary to excavate Th-230 under conditions encountered at the UMTRA Project site

  8. Cleanup protocol for 226Ra-contaminated cobbly soil at UMTRA Project sites

    International Nuclear Information System (INIS)

    Gonzales, D.E.; Millard, J.B.; Miller, M.L.; Metzler, D.

    1994-01-01

    The nonuniform distribution of 226Ra and other radiological contamination of cobbly soil encountered on several Uranium Mill Tailings Remedial Action Project sites is presented and discussed, and the concomitant challenges to the intent and implementation of the U.S. Environmental Protection Agency's soil cleanup standards are noted. In response to technical assessments and information presented to the U.S. Nuclear Regulatory Commission by the U.S. Department of Energy, the Nuclear Regulatory Commission has recently resolved the dilemma by concluding that compliance with Environmental Protection Agency soil cleanup standards for cobby soil at Uranium Mill Tailings Remedial Action Project sites would be adequately attained using bulk radionuclide concentrations, instead of requiring that the radionuclide concentration of the finer soil fraction passing a No. 4 mesh sieve met the standards. A Nuclear Regulatory Commission-approved procedure developed for cobbly soil remediation is outlined and discussed. The site-specific implementation of this procedure at Uranium Mill Tailings Remedial Action Project sites containing cobbly soil is estimated to save millions of dollars

  9. Use of the Multi-Agency Radiological Laboratory Analytical Protocols Manual (MARLAP) for site cleanup activities

    International Nuclear Information System (INIS)

    Griggs, J.

    1999-01-01

    MARLAP is being developed as a multi-agency guidance manual for project managers and radioanalytical laboratories. The document uses a performance based approach and will provide guidance and a framework to assure that laboratory radioanalytical data meets the specific project or program needs and requirements. MARLAP supports a wide range of data collection activities including site characterization and compliance demonstration activities. Current participants include: US Environmental Protection Agency (EPA), US Department of Energy (DOE), US Nuclear Regulatory Commission (NRC), US Department of Defense (DoD), US National Institutes of Standards and Technology (NIST), US Geologic Survey (USGS), US Food and Drug Administration (FDA), Commonwealth of Kentucky, and the State of California. MARLAP is the radioanalytical laboratory counterpart to the Multi-Agency Radiological Survey and Site Investigation Manual (MARSSIM). MARLAP is currently in a preliminary draft stage. (author)

  10. Surface and subsurface cleanup protocol for radionuclides, Gunnison, Colorado, UMTRA project processing site: Final

    International Nuclear Information System (INIS)

    1994-01-01

    Thorium 230 (Th-230) at the Gunnison, Colorado processing site will require remediation, however, a seasonally fluctuating groundwater table at the site significantly complicates conventional remedial action with respect to cleanup. Therefore, to effectively remediate the site with respect to Radium 226 (Ra-226) and Th-230, the following supplemental standard is proposed: In situ Ra-26 will be remediated to the EPA soil cleanup standards independent of groundwater considerations. In situ Th-230 concentrations will be remediated in the region above the encountered water table so the 1000-year projected Ra-226 concentration complies with the EPA soil cleanup concentration limits. If elevated Th-230 persists to the water table, an additional foot of excavation will be performed and the grid will be backfilled. Excavated grids will be backfilled to the final remedial action grade with clean cobbly soil. Final grid verification that is required below the water table will be performed by extracting and analyzing a single bulk soil sample with the bucket of a backhoe. Modeled surface radon flux values will be estimated and documented. A recommendation will be made that land records should be annotated to identify the presence of residual Th-230

  11. Effect of a preoperative decontamination protocol on surgical site infections in patients undergoing elective orthopedic surgery with hardware implantation.

    Science.gov (United States)

    Bebko, Serge P; Green, David M; Awad, Samir S

    2015-05-01

    Surgical site infections (SSIs), commonly caused by methicillin-resistant Staphylococcus aureus (MRSA), are associated with significant morbidity and mortality, specifically when hardware is implanted in the patient. Previously, we have demonstrated that a preoperative decontamination protocol using chlorhexidine gluconate washcloths and intranasal antiseptic ointment is effective in eradicating MRSA in the nose and on the skin of patients. To examine the effect of a decontamination protocol on SSIs in patients undergoing elective orthopedic surgery with hardware implantation. A prospective database of patients undergoing elective orthopedic surgery with hardware implantation at the Michael E. DeBakey Veterans Affairs Medical Center in Houston, Texas, was analyzed from October 1, 2012, to December 31, 2013. Cohort groups before and after the intervention were compared. Starting in May 2013, during their preoperative visit, all of the patients watched an educational video about MRSA decontamination and were given chlorhexidine washcloths and oral rinse and nasal povidone-iodine solution to be used the night before and the morning of scheduled surgery. Thirty-day SSI rates were collected according to the definitions of the Centers for Disease Control and Prevention National Nosocomial Infections Surveillance. Data on demographics, comorbidities such as chronic obstructive pulmonary disease and coronary artery disease, tobacco use, alcohol use, and body mass index were also collected. Univariate analysis was performed between the 2 groups of patients. Multivariate analysis was used to identify independent predictors of SSI. A total of 709 patients were analyzed (344 controls and 365 patients who were decolonized). Both groups were well matched with no significant differences in age, body mass index, sex, or comorbidities. All of the patients (100%) completed the MRSA decontamination protocol. The SSI rate in the intervention group was significantly lower (1.1%; 4 of

  12. Selling Culture: Implementation of e-Commerce and WAP-based Prototypes

    OpenAIRE

    Zafeiri, Konstantina; Gavalas, Damianos; Balla, Aikaterini

    2010-01-01

    Museum stores represent integral parts of the museums that have also a lot to benefit from a successful presence on the web arena. In addition to traditional web sites, carefully designed electronic commerce (e-commerce) sites may increase the potential of museum stores offering possibilities for on-line shopping and other commercial functions. In parallel, the recent convergence of the traditionally separate technologies of the Internet and mobile telephony has brought the concept of 'wirele...

  13. Gene expression profiling: cell cycle deregulation and aneuploidy do not cause breast cancer formation in WAP-SVT/t transgenic animals.

    Science.gov (United States)

    Klein, Andreas; Guhl, Eva; Zollinger, Raphael; Tzeng, Yin-Jeh; Wessel, Ralf; Hummel, Michael; Graessmann, Monika; Graessmann, Adolf

    2005-05-01

    Microarray studies revealed that as a first hit the SV40 T/t antigen causes deregulation of 462 genes in mammary gland cells (ME cells) of WAP-SVT/t transgenic animals. The majority of deregulated genes are cell proliferation specific and Rb-E2F dependent, causing ME cell proliferation and gland hyperplasia but not breast cancer formation. In the breast tumor cells a further 207 genes are differentially expressed, most of them belonging to the cell communication category. In tissue culture breast tumor cells frequently switch off WAP-SVT/t transgene expression and regain the morphology and growth characteristics of normal ME cells, although the tumor-revertant cells are aneuploid and only 114 genes regain the expression level of normal ME cells. The profile of retransformants shows that only 38 deregulated genes are tumor-specific, and that none of them is considered to be a typical breast cancer gene.

  14. Draft no-migration variance petition. Volume 7, Appendices: SUM, SURV, VOC, WAP

    International Nuclear Information System (INIS)

    1995-01-01

    The Department of Energy is responsible for the disposition of transuranic (TRU) waste generated by national defense-related activities. Approximately 2,6 million cubic feet of these waste have been generated and are stored at various facilities across the country. The Waste Isolation Pilot Plant (WIPP), was sited and constructed to meet stringent disposal requirements. In order to permanently dispose of TRU waste, the DOE has elected to petition the US EPA for a variance from the Land Disposal Restrictions of RCRA. This document fulfills the reporting requirements for the petition. This report is volume 7 of the petition which presents details about the waste analysis plan for WIPP. VOC screening methodologies; and a summary of the site characterization studies conducted from 1983 through 1987 at WIPP

  15. Reduced Toxicity With Intensity Modulated Radiation Therapy (IMRT) for Desmoplastic Small Round Cell Tumor (DSRCT): An Update on the Whole Abdominopelvic Radiation Therapy (WAP-RT) Experience

    Energy Technology Data Exchange (ETDEWEB)

    Desai, Neil B. [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Stein, Nicholas F. [Department of Medical Physics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); LaQuaglia, Michael P. [Department of Surgery, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Alektiar, Kaled M. [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Kushner, Brian H.; Modak, Shakeel; Magnan, Heather M. [Department of Pediatrics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Goodman, Karyn [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wolden, Suzanne L., E-mail: woldens@mskcc.org [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)

    2013-01-01

    Purpose: Desmoplastic small round cell tumor (DSRCT) is a rare malignancy typically involving the peritoneum in young men. Whole abdominopelvic radiation therapy (WAP-RT) using conventional 2-dimensional (2D) radiation therapy (RT) is used to address local recurrence but has been limited by toxicity. Our objectives were to assess the benefit of intensity modulated radiation therapy (IMRT) on toxicity and to update the largest series on radiation for DSRCT. Methods and Materials: The records of 31 patients with DSRCT treated with WAP-RT (22 with 2D-RT and 9 with IMRT) between 1992 and 2011 were retrospectively reviewed. All received multi-agent chemotherapy and maximal surgical debulking followed by 30 Gy of WAP-RT. A further focal boost of 12 to 24 Gy was used in 12 cases. Boost RT and autologous stem cell transplantation were nearly exclusive to patients treated with 2D-RT. Toxicities were assessed with the Common Terminology Criteria for Adverse Events. Dosimetric analysis compared IMRT and simulated 2D-RT dose distributions. Results: Of 31 patients, 30 completed WAP-RT, with a median follow-up after RT of 19 months. Acute toxicity was reduced with IMRT versus 2D-RT: P=.04 for gastrointestinal toxicity of grade 2 or higher (33% vs 77%); P=.02 for grade 4 hematologic toxicity (33% vs 86%); P=.01 for rates of granulocyte colony-stimulating factor; and P=.04 for rates of platelet transfusion. Post treatment red blood cell and platelet transfusion rates were also reduced (P=.01). IMRT improved target homogeneity ([D05-D95]/D05 of 21% vs 46%) and resulted in a 21% mean bone dose reduction. Small bowel obstruction was the most common late toxicity (23% overall). Updated 3-year overall survival and progression-free survival rates were 50% and 24%, respectively. Overall survival was associated with distant metastasis at diagnosis on multivariate analysis. Most failures remained intraperitoneal (88%). Conclusions: IMRT for consolidative WAP-RT in DSRCT improves

  16. Surveillance of surgical site infection after cholecystectomy using the hospital in Europe link for infection control through surveillance protocol.

    Science.gov (United States)

    Bogdanic, Branko; Bosnjak, Zrinka; Budimir, Ana; Augustin, Goran; Milosevic, Milan; Plecko, Vanda; Kalenic, Smilja; Fiolic, Zlatko; Vanek, Maja

    2013-06-01

    The third most common healthcare-associated infection is surgical site infection (SSI), accounting for 14%-16% of infections. These SSIs are associated with high morbidity, numerous deaths, and greater cost. A prospective study was conducted to assess the incidence of SSI in a single university hospital in Croatia. We used the Hospital in Europe Link for Infection Control through Surveillance (HELICS) protocol for surveillance. The SSIs were classified using the standard definition of the National Nosocomial Infections Surveillance (NNIS) system. The overall incidence of SSI was 1.44%. The incidence of infection in the open cholecystectomy group was 6.06%, whereas in the laparoscopic group, it was only 0.60%. The incidence density of in-hospital SSIs per 1,000 post-operative days was 5.76. Patients who underwent a laparoscopic cholecystectomy were significantly younger (53.65±14.65 vs. 64.42±14.17 years; pconcept for the monitoring of SSI, but in the case of cholecystectomy, additional factors such as antibiotic appropriateness, gallbladder entry, empyema of the gallbladder, and obstructive jaundice must be considered.

  17. Improving biofeedback for the treatment of fecal incontinence in women: implementation of a standardized multi-site manometric biofeedback protocol.

    Science.gov (United States)

    Markland, A D; Jelovsek, J E; Whitehead, W E; Newman, D K; Andy, U U; Dyer, K; Harm-Ernandes, I; Cichowski, S; McCormick, J; Rardin, C; Sutkin, G; Shaffer, A; Meikle, S

    2017-01-01

    Standardized training and clinical protocols using biofeedback for the treatment of fecal incontinence (FI) are important for clinical care. Our primary aims were to develop, implement, and evaluate adherence to a standardized protocol for manometric biofeedback to treat FI. In a Pelvic Floor Disorders Network (PFDN) trial, participants were enrolled from eight PFDN clinical centers across the United States. A team of clinical and equipment experts developed biofeedback software on a novel tablet computer platform for conducting standardized anorectal manometry with separate manometric biofeedback protocols for improving anorectal muscle strength, sensation, and urge resistance. The training protocol also included education on bowel function, anal sphincter exercises, and bowel diary monitoring. Study interventionists completed online training prior to attending a centralized, standardized certification course. For the certification, expert trainers assessed the ability of the interventionists to perform the protocol components for a paid volunteer who acted as a standardized patient. Postcertification, the trainers audited interventionists during trial implementation to improve protocol adherence. Twenty-four interventionists attended the in-person training and certification, including 46% advanced practice registered nurses (11/24), 50% (12/24) physical therapists, and 4% physician assistants (1/24). Trainers performed audio audits for 88% (21/24), representing 84 audited visits. All certified interventionists met or exceeded the prespecified 80% pass rate for the audit process, with an average passing rate of 93%. A biofeedback protocol can be successfully imparted to experienced pelvic floor health care providers from various disciplines. Our process promoted high adherence to a standard protocol and is applicable to many clinical settings. © 2016 John Wiley & Sons Ltd.

  18. Interim pressure garment therapy (4-6 mmHg) and its effect on donor site healing in burn patients: study protocol for a randomised controlled trial.

    Science.gov (United States)

    Donovan, Michelle L; Muller, Michael J; Simpson, Claire; Rudd, Michael; Paratz, Jennifer

    2016-04-26

    Pressure garment therapy (PGT) is well accepted and commonly used by clinicians in the treatment of burns scars and grafts. The medium to high pressures (24-40 mmHg) in these garments can support scar minimisation, and evidence is well documented for this particular application. However, PGT specifically for burn donor sites, of which a sequela is also scarring, is not well documented. This study protocol investigates the impact of a low pressure (4-6 mmHg) interim garment on donor site healing and scarring. With a primary purpose of holding donor dressings in place, the application of the interim pressure garment (IPG) appears to have been twofold. IPGs for donor sites have involved inconsistent application with a focus on securing wound dressing rather than scar management. However, anecdotal and observational evidence suggests that IPGs also make a difference to some patient's scar outcomes for donor sites. This study protocol outlines a randomised controlled trial designed to test the effectiveness of this treatment on reducing scarring to burn donor sites. This study is a single-centre, single (assessor)-blinded, randomised control trial in patients with burns donor sites to their thighs. Patients will be randomly allocated to a control group (with no compression to donor sites) or to an experimental group (with compression to donor sites) as the comparative treatment. Groups will be compared at baseline regarding the important prognostic indicators: donor site location, depth, size, age, and time since graft (5 days). The IPG treatment will be administered post-operatively (on day 5). Follow-up assessments and garment replacement will be undertaken fortnightly for a period of 2 months. This study focuses on a unique area of burns scar management using a low-pressure tubular support garment for the reduction of donor site scars. Such therapy specifically for donor scar management is poorly represented in the literature. This study was designed to test a

  19. New Computational Approaches for NMR-based Drug Design: A Protocol for Ligand Docking to Flexible Target Sites

    International Nuclear Information System (INIS)

    Gracia, Luis; Speidel, Joshua A.; Weinstein, Harel

    2006-01-01

    NMR-based drug design has met with some success in the last decade, as illustrated in numerous instances by Fesik's ''ligand screening by NMR'' approach. Ongoing efforts to generalize this success have led us to the development of a new paradigm in which quantitative computational approaches are being integrated with NMR derived data and biological assays. The key component of this work is the inclusion of the intrinsic dynamic quality of NMR structures in theoretical models and its use in docking. A new computational protocol is introduced here, designed to dock small molecule ligands to flexible proteins derived from NMR structures. The algorithm makes use of a combination of simulated annealing monte carlo simulations (SA/MC) and a mean field potential informed by the NMR data. The new protocol is illustrated in the context of an ongoing project aimed at developing new selective inhibitors for the PCAF bromodomains that interact with HIV Tat

  20. Effect of impregnation protocol in the metallic sites of Pt–Ag/activated carbon catalysts for water denitration

    Energy Technology Data Exchange (ETDEWEB)

    Aristizábal, A. [Departament d’Enginyeria Química, Universitat Rovira i Virgili, Campus Sescelades, Av. Països Catalans 26, 43007 Tarragona (Spain); Contreras, S., E-mail: sandra.contreras@urv.cat [Departament d’Enginyeria Química, Universitat Rovira i Virgili, Campus Sescelades, Av. Països Catalans 26, 43007 Tarragona (Spain); Divins, N.J.; Llorca, J. [Institut de Tècniques Energètiques i Centre de Recerca en Nanoenginyeria, Universitat Politècnica de Catalunya, Diagonal 647, 08028 Barcelona (Spain); Medina, F. [Departament d’Enginyeria Química, Universitat Rovira i Virgili, Campus Sescelades, Av. Països Catalans 26, 43007 Tarragona (Spain)

    2014-04-01

    Highlights: • Mean particle size is tuned by the Pt precursor. H{sub 2}PtCl{sub 6} leads to smaller size. • H{sub 2}PtCl{sub 6} leads to higher extent of Pt–Ag particles with a composition richer in silver. • Pt(NH{sub 3}){sub 4}(NO{sub 3}){sub 2} leads to Ag{sup 0} particles and some Pt–Ag ensembles in less extent. • Nitrate and nitrite rates are linearly related to mean metal particle size. • Physical mixture of catalysts enhances N{sub 2} selectivities. - Abstract: The influence of the Pt precursor and the impregnation protocol in the catalytic behavior of 3%Pt–1.5%Ag supported on activated carbon for water denitration in a continuous reactor was studied. Pt(NH{sub 3}){sub 4}(NO{sub 3}){sub 2} and H{sub 2}PtCl{sub 6} were selected as Pt precursors. Five protocols were investigated: sequential impregnations (both sequences), co-impregnation, physical mixture of monometallic catalysts, and physical mixture of a bimetallic catalyst with a Pt monometallic catalyst. The samples were characterized by XRD, XPS, TPR, HRTEM and physisorption. It was found that the catalytic activity strongly depends on the synthesis protocol and the Pt precursor, which modify the particle size. Higher nitrate rates are achieved using H{sub 2}PtCl{sub 6} than Pt(NH{sub 3}){sub 4}(NO{sub 3}){sub 2}; this is mainly related to the smaller metal particle size of the former, evidenced by HRTEM. Nitrate consumption rate is directly related with the mean particle size. The physical mixture of monometallic catalysts resulted in the highest nitrogen rate.

  1. Servicio de M-comercio: Sistema de interacción entre un centro comercial y sus visitantes utilizando las tecnologías WAP y Bluetooth M-commerce service: Interaction system between a mall and visitors using WAP and Bluetooth technologies

    OpenAIRE

    Jorge Gómez Rojas; Luis Leonardo Camargo Ariza; Byron Medina Delgado

    2013-01-01

    El servicio de interacción es un medio de comunicación que mejora las relaciones comerciales entre los centros comerciales y sus visitantes, utilizando las tecnologías de comunicaciones móviles WAP y Bluetooth como una nueva alternativa de negocios, y sin usar la red del operador de telefonía móvil celular. El sistema de interacción mencionado permite el intercambio de información de un grupo potencial de compradores entre los visitantes de un centro comercial y la administración de los difer...

  2. Wireless access to a pharmaceutical database: A demonstrator for data driven Wireless Application Prorocol (WAP) applications in medical information processing

    DEFF Research Database (Denmark)

    Hansen, Michael Schacht; Dørup, Jens

    2001-01-01

    script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2......) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. RESULTS: A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol...... service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. CONCLUSIONS: We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further...

  3. A tiered analytical protocol for the characterization of heavy oil residues at petroleum-contaminated hazardous waste sites

    International Nuclear Information System (INIS)

    Pollard, S.J.T.; Kenefick, S.L.; Hrudey, S.E.; Fuhr, B.J.; Holloway, L.R.; Rawluk, M.

    1994-01-01

    The analysis of hydrocarbon-contaminated soils from abandoned refinery sites in Alberta, Canada is used to illustrate a tiered analytical approach to the characterization of complex hydrocarbon wastes. Soil extracts isolated from heavy oil- and creosote-contaminated sites were characterized by thin layer chromatography with flame ionization detection (TLC-FID), ultraviolet fluorescence, simulated distillation (GC-SIMDIS) and chemical ionization GC-MS analysis. The combined screening and detailed analytical methods provided information essential to remedial technology selection including the extent of contamination, the class composition of soil extracts, the distillation profile of component classes and the distribution of individual class components within various waste fractions. Residual contamination was characteristic of heavy, degraded oils, consistent with documented site operations and length of hydrocarbon exposure at the soil surface

  4. Servicio de M-comercio: Sistema de interacción entre un centro comercial y sus visitantes utilizando las tecnologías WAP y Bluetooth M-commerce service: Interaction system between a mall and visitors using WAP and Bluetooth technologies

    Directory of Open Access Journals (Sweden)

    Jorge Gómez Rojas

    2013-04-01

    Full Text Available El servicio de interacción es un medio de comunicación que mejora las relaciones comerciales entre los centros comerciales y sus visitantes, utilizando las tecnologías de comunicaciones móviles WAP y Bluetooth como una nueva alternativa de negocios, y sin usar la red del operador de telefonía móvil celular. El sistema de interacción mencionado permite el intercambio de información de un grupo potencial de compradores entre los visitantes de un centro comercial y la administración de los diferentes comercios utilizando el teléfono celular. El sistema se compone de una aplicación móvil en J2ME, puntos de acceso Bluetooth y Wi-Fi, un servidor Bluetooth y un servidor Web con aplicaciones para ser accedidas por dispositivos móviles.The interaction service is a means of communication that improves trade relations between the mall and visitors using mobile communications technology WAP and Bluetooth, as a new business alternative, and without operator's network using the mobile phone. The proposed system of interaction, allows the exchange of information from a potential pool of buyers among visitors to a shopping center and the administration of the various shops, through the cell phone. The system consists of a mobile application in J2ME, the access points, Bluetooth server, and Web server with applications to mobile devices.

  5. Dose-response relationship between cigarette smoking and site-specific cancer risk: protocol for a systematic review with an original design combining umbrella and traditional reviews.

    Science.gov (United States)

    Lugo, Alessandra; Bosetti, Cristina; Peveri, Giulia; Rota, Matteo; Bagnardi, Vincenzo; Gallus, Silvano

    2017-11-01

    Only a limited number of meta-analyses providing risk curve functions of dose-response relationships between various smoking-related variables and cancer-specific risk are available. To identify all relevant original publications on the issue, we will conduct a series of comprehensive systematic reviews based on three subsequent literature searches: (1) an umbrella review, to identify meta-analyses, pooled analyses and systematic reviews published before 28 April 2017 on the association between cigarette smoking and the risk of 28 (namely all) malignant neoplasms; (2) for each cancer site, an updated review of original publications on the association between cigarette smoking and cancer risk, starting from the last available comprehensive review identified through the umbrella review; and (3) a review of all original articles on the association between cigarette smoking and site-specific cancer risk included in the publications identified through the umbrella review and the updated reviews. The primary outcomes of interest will be (1) the excess incidence/mortality of various cancers for smokers compared with never smokers; and (2) the dose-response curves describing the association between smoking intensity, duration and time since stopping and incidence/mortality for various cancers. For each cancer site, we will perform a meta-analysis by pooling study-specific estimates for smoking status. We will also estimate the dose-response curves for other smoking-related variables through random-effects meta-regression models based on a non-linear dose-response relationship framework. Ethics approval is not required for this study. Main results will be published in peer-reviewed journals and will also be included in a publicly available website. We will provide therefore the most complete and updated estimates on the association between various measures of cigarette smoking and site-specific cancer risk. This will allow us to obtain precise estimates on the cancer burden

  6. Hanford Site Transuranic (TRU) Waste Certification Plan

    International Nuclear Information System (INIS)

    GREAGER, T.M.

    2000-01-01

    As a generator of transuranic (TRU) and TRU mixed waste destined for disposal at the Waste Isolation Pilot Plant (WIPP), the Hanford Site must ensure that its TRU waste meets the requirements of US. Department of Energy (DOE) 0 435.1, ''Radioactive Waste Management,'' and the Contact-Handled (CH) Transuranic Waste Acceptance Criteria for the Waste Isolation Pilot Plant (WIPP-WAC). WIPP-WAC requirements are derived from the WIPP Technical Safety Requirements, WIPP Safety Analysis Report, TRUPACT-II SARP, WIPP Land Withdrawal Act, WIPP Hazardous Waste Facility Permit, and Title 40 Code of Federal Regulations (CFR) 191/194 Compliance Certification Decision. The WIPP-WAC establishes the specific physical, chemical, radiological, and packaging criteria for acceptance of defense TRU waste shipments at WIPP. The WPP-WAC also requires that participating DOE TRU waste generator/treatment/storage sites produce site-specific documents, including a certification plan, that describe their program for managing TRU waste and TRU waste shipments before transferring waste to WIPP. Waste characterization activities provide much of the data upon which certification decisions are based. Waste characterization requirements for TRU waste and TRU mixed waste that contains constituents regulated under the Resource Conservation and Recovery Act (RCRA) are established in the WIPP Hazardous Waste Facility Permit Waste Analysis Plan (WAP). The Hanford Site Quality Assurance Project Plan (QAPjP) (HNF-2599) implements the applicable requirements in the WAP and includes the qualitative and quantitative criteria for making hazardous waste determinations. The Hanford Site must also ensure that its TRU waste destined for disposal at WPP meets requirements for transport in the Transuranic Package Transporter-11 (TRUPACT-11). The US. Nuclear Regulatory Commission (NRC) establishes the TRUPACT-11 requirements in the Safety Analysis Report for the TRUPACT-II Shipping Package (TRUPACT-11 SARP). In

  7. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  8. From human monocytes to genome-wide binding sites--a protocol for small amounts of blood: monocyte isolation/ChIP-protocol/library amplification/genome wide computational data analysis.

    Directory of Open Access Journals (Sweden)

    Sebastian Weiterer

    Full Text Available Chromatin immunoprecipitation in combination with a genome-wide analysis via high-throughput sequencing is the state of the art method to gain genome-wide representation of histone modification or transcription factor binding profiles. However, chromatin immunoprecipitation analysis in the context of human experimental samples is limited, especially in the case of blood cells. The typically extremely low yields of precipitated DNA are usually not compatible with library amplification for next generation sequencing. We developed a highly reproducible protocol to present a guideline from the first step of isolating monocytes from a blood sample to analyse the distribution of histone modifications in a genome-wide manner.The protocol describes the whole work flow from isolating monocytes from human blood samples followed by a high-sensitivity and small-scale chromatin immunoprecipitation assay with guidance for generating libraries compatible with next generation sequencing from small amounts of immunoprecipitated DNA.

  9. Final Hanford Site Transuranic (TRU) Waste Characterization QA Project Plan

    International Nuclear Information System (INIS)

    GREAGER, T.M.

    2000-01-01

    The Quality Assurance Project Plan (QAPjP) has been prepared for waste characterization activities to be conducted by the Transuranic (TRU) Project at the Hanford Site to meet requirements set forth in the Waste Isolation Pilot Plan (WIPP) Hazardous Waste Facility Permit, 4890139088-TSDF, Attachment B, including Attachments B1 through B6 (WAP) (DOE, 1999a). The QAPjP describes the waste characterization requirements and includes test methods, details of planned waste sampling and analysis, and a description of the waste characterization and verification process. In addition, the QAPjP includes a description of the quality assurance/quality control (QA/QC) requirements for the waste characterization program. Before TRU waste is shipped to the WIPP site by the TRU Project, all applicable requirements of the QAPjP shall be implemented. Additional requirements necessary for transportation to waste disposal at WIPP can be found in the ''Quality Assurance Program Document'' (DOE 1999b) and HNF-2600, ''Hanford Site Transuranic Waste Certification Plan.'' TRU mixed waste contains both TRU radioactive and hazardous components, as defined in the WLPP-WAP. The waste is designated and separately packaged as either contact-handled (CH) or remote-handled (RH), based on the radiological dose rate at the surface of the waste container. RH TRU wastes are not currently shipped to the WIPP facility

  10. The Changing Adventures of Mixed Low-Level Waste Disposal at the Nevada Test Site

    International Nuclear Information System (INIS)

    2007-01-01

    After a 15-year hiatus, the United States Department of Energy (DOE) National Nuclear Security Administration Nevada Site Office (NNSA/NSO) began accepting DOE off-site generated mixed low-level radioactive waste (MLLW) for disposal at the Nevada Test Site (NTS) in December 2005. This action was predicated on the acceptance by the Nevada Division of Environmental Protection (NDEP) of a waste analysis plan (WAP). The NNSA/NSO agreed to limit mixed waste disposal to 20,000 cubic meters (approximately 706,000 cubic feet) and close the facility by December 2010 or sooner, if the volume limit is reached. The WAP and implementing procedures were developed based on Hanford?s system of verification to the extent possible so the two regional disposal sites could have similar processes. Since the NNSA/NSO does not have a breaching facility to allow the opening of boxes at the site, verification of the waste occurs by visual inspection at the generator/treatment facility or by Real-Time-Radiography (RTR) at the NTS. This system allows the NTS to effectively, efficiently, and compliantly accept MLLW for disposal. The WAP, NTS Waste Acceptance Criteria, and procedures have been revised based on learning experiences. These changes include: RTR expectations; visual inspection techniques; tamper-indicating device selection; void space requirements; and chemical screening concerns. The NNSA/NSO, NDEP, and the generators have been working together throughout the debugging of the verification processes. Additionally, the NNSA/NSO will continue to refine the MLLW acceptance processes and strive for continual improvement of the program

  11. SYMMETRIC ENCRYPTION USING PRE-SHARED PUBLIC PARAMETERS FOR A SECURE TFTP PROTOCOL

    Directory of Open Access Journals (Sweden)

    N. N. MOHAMED

    2017-01-01

    Full Text Available Advances in the communication technology of embedded systems have led to the situation where nowadays almost all systems should implement security for data safety. Trivial File Transfer Protocol (TFTP has advantages for use in embedded systems due to its speed and simplicity, however without security mechanisms, it is vulnerable to various attacks. As an example, during upgrading of Wireless Access Points (WAPs, attackers can access the information and modify it, and then install malicious code to interrupt the system. This work proposes security implementation of Diffie Hellman Key Exchange in TFTP by pre-sharing public parameters that enable two parties to achieve same secret key without the risk of Man-In-The-Middle (MITM attacks. The implementation is integrated with compression and encryption methods to significantly reduce computational requirements in TFTP communication.

  12. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  13. Protocol to disseminate a hospital-site controlled intervention using audit and feedback to implement guidelines concerning inappropriate treatment of asymptomatic bacteriuria.

    Science.gov (United States)

    Trautner, Barbara W; Prasad, Pooja; Grigoryan, Larissa; Hysong, Sylvia J; Kramer, Jennifer R; Rajan, Suja; Petersen, Nancy J; Rosen, Tracey; Drekonja, Dimitri M; Graber, Christopher; Patel, Payal; Lichtenberger, Paola; Gauthier, Timothy P; Wiseman, Steve; Jones, Makoto; Sales, Anne; Krein, Sarah; Naik, Aanand Dinkar

    2018-01-19

    Antimicrobial stewardship to combat the spread of antibiotic-resistant bacteria has become a national priority. This project focuses on reducing inappropriate use of antimicrobials for asymptomatic bacteriuria (ASB), a very common condition that leads to antimicrobial overuse in acute and long-term care. We previously conducted a successful intervention, entitled "Kicking Catheter Associated Urinary Tract Infection (CAUTI): the No Knee-Jerk Antibiotics Campaign," to decrease guideline-discordant ordering of urine cultures and antibiotics for ASB. The current objective is to facilitate implementation of a scalable version of the Kicking CAUTI campaign across four geographically diverse Veterans Health Administration facilities while assessing what aspects of an antimicrobial stewardship intervention are essential to success and sustainability. This project uses an interrupted time series design with four control sites. The two main intervention tools are (1) an evidence-based algorithm that distills the guidelines into a streamlined clinical pathway and (2) case-based audit and feedback to train clinicians to use the algorithm. Our conceptual framework for the development and implementation of this intervention draws on May's General Theory of Implementation. The intervention is directed at providers in acute and long-term care, and the goal is to reduce inappropriate screening for and treatment of ASB in all patients and residents, not just those with urinary catheters. The start-up for each facility consists of centrally-led phone calls with local site champions and baseline surveys. Case-based audit and feedback will begin at a given site after the start-up period and continue for 12 months, followed by a sustainability assessment. In addition to the clinical outcomes, we will explore the relationship between the dose of the intervention and clinical outcomes. This project moves from a proof-of-concept effectiveness study to implementation involving

  14. Immunochemical protocols

    National Research Council Canada - National Science Library

    Pound, John D

    1998-01-01

    ... easy and important refinements often are not published. This much anticipated 2nd edition of Immunochemzcal Protocols therefore aims to provide a user-friendly up-to-date handbook of reliable techniques selected to suit the needs of molecular biologists. It covers the full breadth of the relevant established immunochemical methods, from protein blotting and immunoa...

  15. CHERISH (collaboration for hospitalised elders reducing the impact of stays in hospital): protocol for a multi-site improvement program to reduce geriatric syndromes in older inpatients.

    Science.gov (United States)

    Mudge, Alison M; Banks, Merrilyn D; Barnett, Adrian G; Blackberry, Irene; Graves, Nicholas; Green, Theresa; Harvey, Gillian; Hubbard, Ruth E; Inouye, Sharon K; Kurrle, Sue; Lim, Kwang; McRae, Prue; Peel, Nancye M; Suna, Jessica; Young, Adrienne M

    2017-01-09

    Older inpatients are at risk of hospital-associated geriatric syndromes including delirium, functional decline, incontinence, falls and pressure injuries. These contribute to longer hospital stays, loss of independence, and death. Effective interventions to reduce geriatric syndromes remain poorly implemented due to their complexity, and require an organised approach to change care practices and systems. Eat Walk Engage is a complex multi-component intervention with structured implementation, which has shown reduced geriatric syndromes and length of stay in pilot studies at one hospital. This study will test effectiveness of implementing Eat Walk Engage using a multi-site cluster randomised trial to inform transferability of this intervention. A hybrid study design will evaluate the effectiveness and implementation strategy of Eat Walk Engage in a real-world setting. A multisite cluster randomised study will be conducted in 8 medical and surgical wards in 4 hospitals, with one ward in each site randomised to implement Eat Walk Engage (intervention) and one to continue usual care (control). Intervention wards will be supported to develop and implement locally tailored strategies to enhance early mobility, nutrition, and meaningful activities. Resources will include a trained, mentored facilitator, audit support, a trained healthcare assistant, and support by an expert facilitator team using the i-PARIHS implementation framework. Patient outcomes and process measures before and after intervention will be compared between intervention and control wards. Primary outcomes are any hospital-associated geriatric syndrome (delirium, functional decline, falls, pressure injuries, new incontinence) and length of stay. Secondary outcomes include discharge destination; 30-day mortality, function and quality of life; 6 month readmissions; and cost-effectiveness. Process measures including patient interviews, activity mapping and mealtime audits will inform interventions in each

  16. Implementation of an efficacious intervention for high risk women in Mexico: protocol for a multi-site randomized trial with a parallel study of organizational factors

    Directory of Open Access Journals (Sweden)

    Patterson Thomas L

    2012-10-01

    Full Text Available Abstract Background Studies of implementation of efficacious human immunodeficiency virus (HIV prevention interventions are rare, especially in resource-poor settings, but important, because they have the potential to increase the impact of interventions by improving uptake and sustainability. Few studies have focused on provider and organizational factors that may influence uptake and fidelity to core intervention components. Using a hybrid design, we will study the implementation of an efficacious intervention to reduce sexually transmitted infections (STIs among female sex workers (FSWs in 12 cities across Mexico. Our protocol will test a ‘train-the-trainer’ implementation model for transporting the Mujer Segura (Healthy Woman intervention into community-based organizations (CBOs. Methods We have partnered with Mexican Foundation for Family Planning (Mexfam, a non-governmental organization that has CBOs throughout Mexico. At each CBO, trained ethnographers will survey CBO staff on characteristics of their organization and on their attitudes toward their CBO and toward the implementation of evidence-based interventions (EBIs. Then, after CBO staff recruit a sample of 80 eligible FSWs and deliver a standard-care, didactic intervention to 40 women randomly selected from that pool, a Mexfam staff person will be trained in the Mujer Segura intervention and will then train other counselors to deliver Mujer Segura to the 40 remaining participating FSWs. FSW participants will receive a baseline behavioral assessment and be tested for HIV and STIs (syphilis, gonorrhea, and chlamydia; they will be reassessed at six months post-intervention to measure for possible intervention effects. At the same time, both qualitative and quantitative data will be collected on the implementation process, including measures of counselors’ fidelity to the intervention model. After data collection at each CBO is complete, the relative efficacy of the Mujer Segura

  17. Researching effective approaches to cleaning in hospitals: protocol of the REACH study, a multi-site stepped-wedge randomised trial.

    Science.gov (United States)

    Hall, Lisa; Farrington, Alison; Mitchell, Brett G; Barnett, Adrian G; Halton, Kate; Allen, Michelle; Page, Katie; Gardner, Anne; Havers, Sally; Bailey, Emily; Dancer, Stephanie J; Riley, Thomas V; Gericke, Christian A; Paterson, David L; Graves, Nicholas

    2016-03-24

    The Researching Effective Approaches to Cleaning in Hospitals (REACH) study will generate evidence about the effectiveness and cost-effectiveness of a novel cleaning initiative that aims to improve the environmental cleanliness of hospitals. The initiative is an environmental cleaning bundle, with five interdependent, evidence-based components (training, technique, product, audit and communication) implemented with environmental services staff to enhance hospital cleaning practices. The REACH study will use a stepped-wedge randomised controlled design to test the study intervention, an environmental cleaning bundle, in 11 Australian hospitals. All trial hospitals will receive the intervention and act as their own control, with analysis undertaken of the change within each hospital based on data collected in the control and intervention periods. Each site will be randomised to one of the 11 intervention timings with staggered commencement dates in 2016 and an intervention period between 20 and 50 weeks. All sites complete the trial at the same time in 2017. The inclusion criteria allow for a purposive sample of both public and private hospitals that have higher-risk patient populations for healthcare-associated infections (HAIs). The primary outcome (objective one) is the monthly number of Staphylococcus aureus bacteraemias (SABs), Clostridium difficile infections (CDIs) and vancomycin resistant enterococci (VRE) infections, per 10,000 bed days. Secondary outcomes for objective one include the thoroughness of hospital cleaning assessed using fluorescent marker technology, the bio-burden of frequent touch surfaces post cleaning and changes in staff knowledge and attitudes about environmental cleaning. A cost-effectiveness analysis will determine the second key outcome (objective two): the incremental cost-effectiveness ratio from implementation of the cleaning bundle. The study uses the integrated Promoting Action on Research Implementation in Health Services (i

  18. Bill authorizing the approval of the additional protocol to the construction agreement between the French government and the International organization of fusion energy for the joint implementation of the ITER project, and relative to the role of the labour inspection on the ITER international organization site and dealing with occupational health and safety

    International Nuclear Information System (INIS)

    2009-10-01

    The aim of the additional protocol to the construction agreement between the French Government and the ITER Organization is to allow the French labour inspection services to control the good respect of the French occupational health and safety regulation at the project site (Cadarache, Bouches du Rhone) and to play its role of adviser to the persons responsible for the organization. This bill gives permission to the approval of this additional protocol. It allows the labour inspectors to do their job on the ITER site. (J.S.)

  19. Connecting Smartphone and Wearable Fitness Tracker Data with a Nationally Used Electronic Health Record System for Diabetes Education to Facilitate Behavioral Goal Monitoring in Diabetes Care: Protocol for a Pragmatic Multi-Site Randomized Trial.

    Science.gov (United States)

    Wang, Jing; Coleman, Deidra Carroll; Kanter, Justin; Ummer, Brad; Siminerio, Linda

    2018-04-02

    Mobile and wearable technology have been shown to be effective in improving diabetes self-management; however, integrating data from these technologies into clinical diabetes care to facilitate behavioral goal monitoring has not been explored. The objective of this paper is to report on a study protocol for a pragmatic multi-site trial along with the intervention components, including the detailed connected health interface. This interface was developed to integrate patient self-monitoring data collected from a wearable fitness tracker and its companion smartphone app to an electronic health record system for diabetes self-management education and support (DSMES) to facilitate behavioral goal monitoring. A 3-month multi-site pragmatic clinical trial was conducted with eligible patients with diabetes mellitus from DSMES programs. The Chronicle Diabetes system is currently freely available to diabetes educators through American Diabetes Association-recognized DSMES programs to set patient nutrition and physical activity goals. To integrate the goal-setting and self-monitoring intervention into the DSMES process, a connected interface in the Chronicle Diabetes system was developed. With the connected interface, patient self-monitoring information collected from smartphones and wearable fitness trackers can facilitate educators' monitoring of patients' adherence to their goals. Feasibility outcomes of the 3-month trial included hemoglobin A 1c levels, weight, and the usability of the connected system. An interface designed to connect data from a wearable fitness tracker with a companion smartphone app for nutrition and physical activity self-monitoring into a diabetes education electronic health record system was successfully developed to enable diabetes educators to facilitate goal setting and monitoring. A total of 60 eligible patients with type 2 diabetes mellitus were randomized into either group 1) standard diabetes education or 2) standard education enhanced with

  20. Reasons for unmet need for family planning, with attention to the measurement of fertility preferences: protocol for a multi-site cohort study.

    Science.gov (United States)

    Machiyama, Kazuyo; Casterline, John B; Mumah, Joyce N; Huda, Fauzia Akhter; Obare, Francis; Odwe, George; Kabiru, Caroline W; Yeasmin, Sharifa; Cleland, John

    2017-02-09

    Unmet need for family planning points to the gap between women's reproductive desire to avoid pregnancy and contraceptive behaviour. An estimated 222 million women in low- and middle-income countries have unmet need for modern contraception. Despite its prevalence, there has been little rigorous research during the past fifteen years on reasons for this widespread failure to implement childbearing desires in contraceptive practice. There is demographic survey data on women's self-reported reasons for non-use, but these data provide limited insight on the full set of possible obstacles to use, and one may doubt the meaningfulness of explanations provided by non-users alone. To rectify this evidence gap, this study will gather extensive information on women's perceptions of contraception (generic and method-specific) and their past contraceptive experience, and it will allow for more complexity in fertility preferences than is standard in demographic surveys. A multi-site cohort study will be conducted in urban Kenya, rural Kenya, and rural Bangladesh. In each setting trained fieldworkers will recruit and interview 2600 women, with participants re-interviewed at 12 and 18 months. Data will be collected using a questionnaire whose development was informed by a review of existing literature and instruments from past studies in both developed and developing countries. Dozens of experts in the field were consulted as the instrument was developed. The questionnaire has three main components: a sub-set of Demographic and Health Survey items measuring socio-demographic characteristics, reproductive history, and sexual activity; additional questions on prospective and retrospective fertility preferences designed to capture ambivalence and uncertainty; and two large blocks of items on (i) generic concerns about contraception and (ii) method-specific attributes. The method-specific items encompass eight modern and traditional methods. Policy and programmes intended to reduce

  1. Study protocol

    DEFF Research Database (Denmark)

    Smith, Benjamin E; Hendrick, Paul; Bateman, Marcus

    2017-01-01

    avoidance behaviours, catastrophising, self-efficacy, sport and leisure activity participation, and general quality of life. Follow-up will be 3 and 6 months. The analysis will focus on descriptive statistics and confidence intervals. The qualitative components will follow a thematic analysis approach....... DISCUSSION: This study will evaluate the feasibility of running a definitive large-scale trial on patients with patellofemoral pain, within the NHS in the UK. We will identify strengths and weaknesses of the proposed protocol and the utility and characteristics of the outcome measures. The results from...... this study will inform the design of a multicentre trial. TRIAL REGISTRATION: ISRCTN35272486....

  2. To what extent do site-based training, mentoring, and operational research improve district health system management and leadership in low- and middle-income countries: a systematic review protocol.

    Science.gov (United States)

    Belrhiti, Zakaria; Booth, Andrew; Marchal, Bruno; Verstraeten, Roosmarijn

    2016-04-27

    controlled trials (RCT) and non RCT studies and Critical Appraisal Skills Programme checklists for qualitative studies. We will assess strength of recommendations with the GRADE tool for quantitative studies, and the CERQual approach for qualitative studies. Synthesis of quantitative studies will be performed through meta-analysis when appropriate. Best fit framework synthesis will be used to synthesize qualitative studies. This protocol paper describes a systematic review assessing the effectiveness of site-based training (with or without mentoring programmes or operational research) on the improvement of district health system management and leadership. PROSPERO CRD42015032351.

  3. A multi-site randomized study to compare the effects of Eye Movement Desensitization and Reprocessing (EMDR) added to TAU versus TAU to reduce craving and drinking behavior in alcohol dependent outpatients: study protocol.

    Science.gov (United States)

    Markus, Wiebren; de Weert-van Oene, Gerdien H; Becker, Eni S; DeJong, Cor A J

    2015-03-18

    Addiction constitutes a major public health problem, and despite treatment, relapse rates remain very high. Preliminary findings suggest that Eye Movement Desensitization and Reprocessing (EMDR), an evidence-based treatment for PTSD, may also reduce craving and relapse rates when applied in substance abuse. This study aims to determine the feasibility, efficacy and effectiveness of EMDR when added to treatment as usual (TAU) for addiction in alcohol dependent outpatients, compared to TAU only. A single blinded study in which 100 adult patients with a primary DSM-IV-TR diagnosis of alcohol dependence or abuse receiving treatment in one of six Dutch outpatient addiction care facility sites, will be enrolled. After baseline assessment participants will be allocated to one of two treatment conditions (allocation ratio of 1:1) using a stratified (per site, per care pathway), blocked randomization procedure. The intervention consists of EMDR (seven weekly 90 minute sessions) + TAU or TAU only. Assessments are scheduled pre-treatment (t0), post-treatment (t0 + eight weeks), and one and six months post treatment. The effects of both treatment arms are compared on indices of (a) drinking behavior, (b) mediators, moderators and predictors of treatment outcome, (c) quality of life and d) safety, acceptability and feasibility of treatment. Repeated measures ANOVA's will be conducted using an intention-to-treat and per-protocol approach. Multiple imputation will be used to deal with missing values when possible. This study adapts and extends the standard EMDR treatment for traumatized patients for use with patients with alcohol use disorders without psychological trauma. ClinicalTrial.gov: NCT01828866.

  4. Beyond protocols

    DEFF Research Database (Denmark)

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impact...... information on risk and the exploration of improved methods for decision making on biodiversity management. This is crucial for efficient conservation resource allocation and uptake by stakeholders and the public......., transparency and repeatability of assessments as well as the incorporation of uncertainty should all be explicitly considered. We recommend improved quality control of risk assessments through formalized peer review with clear feedback between assessors and reviewers. Alternatively, a consensus building...

  5. Review of Project Permits under the London Protocol - An Assessment of the Proposed P18-4 CO2 Storage Site: 13th International Conference on Greenhouse Gas Control Technologies, GHGT 2016. 14 November 2016 through 18 November

    NARCIS (Netherlands)

    Mikunda, T.; Dixon, T.

    2017-01-01

    The London Protocol (1996) is a global agreement to promote the protection of the marine environment by prohibiting the dumping of wastes and other matter into the sea. Under the Protocol all dumping is prohibited, with the exception of a limited number of selected wastes on the so-called "reverse

  6. Mapping Soil Water-Holding Capacity Index to Evaluate the Effectiveness of Phytoremediation Protocols and ExposureRisk to Contaminated Soils in a National Interest Priority Site of the Campania Region (Southern Italy).

    Science.gov (United States)

    Romano, N.

    2015-12-01

    Soil moisture is an important state variable that influences water flow and solute transport in the soil-vegetation-atmosphere system, and plays a key role in securing agricultural ecosystem services for nutrition and food security. Especially when environmental studies should be carried out at relatively large spatial scales, there is a need to synthesize the complex interactions between soil, plant behavior, and local atmospheric conditions. Although it relies on the somewhat loosely defined concepts of "field capacity" and "wilting point", the soil water-holding capacity seems a suitable indicator to meet the above-mentioned requirement, yet easily understandable by the public and stakeholders. This parameter is employed in this work to evaluate the effectiveness of phytoremediation protocols funded by the EU-Life project EcoRemed and being implemented to remediate and restore contaminated agricultural soils of the National Interest Priority Site Litorale Domizio-Agro Aversano. The study area is located in the Campania Region (Southern Italy) and has an extent of about 200,000 hectares. A high-level spotted soil contamination is mostly due to the legal or outlaw industrial and municipal wastes, with hazardous consequences also on groundwater quality. With the availability of soil and land systems maps for this study area, disturbed and undisturbed soil samples were collected at two different soil depths to determine basic soil physico-chemical properties for the subsequent application of pedotransfer functions (PTFs). Soil water retention and hydraulic conductivity functions were determined for a number of soil cores, in the laboratory with the evaporation experiments, and used to calibrate the PTFs. Efficient mapping of the soil hydraulic properties benefitted greatly from the use of the PTFs and the physically-based scaling procedure developed by Nasta et al. (2013, WRR, 49:4219-4229).

  7. Review of Project Permits under the London Protocol - An Assessment of the Proposed P18-4 CO2 Storage Site: 13th International Conference on Greenhouse Gas Control Technologies, GHGT 2016. 14 November 2016 through 18 November

    OpenAIRE

    Mikunda, T.; Dixon, T.

    2017-01-01

    The London Protocol (1996) is a global agreement to promote the protection of the marine environment by prohibiting the dumping of wastes and other matter into the sea. Under the Protocol all dumping is prohibited, with the exception of a limited number of selected wastes on the so-called "reverse list", which can be considered for dumping. In 2007, an amendment entered into force which permitted CO2 streams to be considered for dumping under the London Protocol. The amendment was shortly fol...

  8. Time-lapse imagery of Adélie penguins reveals differential winter strategies and breeding site occupation.

    Science.gov (United States)

    Black, Caitlin; Southwell, Colin; Emmerson, Louise; Lunn, Daniel; Hart, Tom

    2018-01-01

    Polar seabirds adopt different over-wintering strategies to survive and build condition during the critical winter period. Penguin species either reside at the colony during the winter months or migrate long distances. Tracking studies and survey methods have revealed differences in winter migration routes among penguin species and colonies, dependent on both biotic and abiotic factors present. However, scan sampling methods are rarely used to reveal non-breeding behaviors during winter and little is known about presence at the colony site over this period. Here we show that Adélie penguins on the Yalour Islands in the Western Antarctic Peninsula (WAP) are present year-round at the colony and undergo a mid-winter peak in abundance during winter. We found a negative relationship between daylight hours and penguin abundance when either open water or compact ice conditions were present, suggesting that penguins return to the breeding colony when visibility is lowest for at-sea foraging and when either extreme low or high levels of sea ice exist offshore. In contrast, Adélie penguins breeding in East Antarctica were not observed at the colonies during winter, suggesting that Adélie penguins undergo differential winter strategies in the marginal ice zone on the WAP compared to those in East Antarctica. These results demonstrate that cameras can successfully monitor wildlife year-round in areas that are largely inaccessible during winter.

  9. Time-lapse imagery of Adélie penguins reveals differential winter strategies and breeding site occupation

    Science.gov (United States)

    Southwell, Colin; Emmerson, Louise; Lunn, Daniel

    2018-01-01

    Polar seabirds adopt different over-wintering strategies to survive and build condition during the critical winter period. Penguin species either reside at the colony during the winter months or migrate long distances. Tracking studies and survey methods have revealed differences in winter migration routes among penguin species and colonies, dependent on both biotic and abiotic factors present. However, scan sampling methods are rarely used to reveal non-breeding behaviors during winter and little is known about presence at the colony site over this period. Here we show that Adélie penguins on the Yalour Islands in the Western Antarctic Peninsula (WAP) are present year-round at the colony and undergo a mid-winter peak in abundance during winter. We found a negative relationship between daylight hours and penguin abundance when either open water or compact ice conditions were present, suggesting that penguins return to the breeding colony when visibility is lowest for at-sea foraging and when either extreme low or high levels of sea ice exist offshore. In contrast, Adélie penguins breeding in East Antarctica were not observed at the colonies during winter, suggesting that Adélie penguins undergo differential winter strategies in the marginal ice zone on the WAP compared to those in East Antarctica. These results demonstrate that cameras can successfully monitor wildlife year-round in areas that are largely inaccessible during winter. PMID:29561876

  10. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  11. Mochovce site

    International Nuclear Information System (INIS)

    1997-01-01

    In Mochovce site the construction of four units of WWER 440 NPP with V-213 type of reactor is being carried out. The financing of Mochovce units completion was resolved in April 1996. The completion work commenced at the construction site under leadership of SKODA Prague, the general supplier. The completion work on building part and tests of constructional electric distributions and lightning constructors started. The revisions in technological part were finished, and final protocols from revisions are the basis for starting of completion work. The assembly of transport container anchorage,ventilation system in hermetic areas and hermetic coverage of pools for stored spent nuclear fuel is being carried out. The pre-completion tests of instrumentation and control of ventilation systems, individual dosimetric control in medical station, and tests of nuclear programme according to commissioning and assembling work schedule at the equipment for physical protection of the NPP area started. Inspection activities at Mochovce were performed in accordance with inspection plan for 1996. Evaluation of routine inspections was performed by means of quarterly protocols. Main findings from the inspections performed in Mochovce were in the following areas: (a) deficiencies in the knowledge of the respective regulation and conditions from the Resolution of the state regulatory body, concerning selected employees; (b) training of the selected employees; (c) aim of the measures imposes by inspectors is to eliminate deficiencies in preparation of programmes for pre-completion and completion testing. NRA SR assessment activities at Mochovce NPP were focused mainly on approving and inspecting of design modification to approving programmes for pre-completion and completion testing of system s and equipment and on approving quality assurance programmes. The suggestions of international missions, which reviewed Mochovce safety in the years, were taken into consideration in the programme

  12. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  13. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  14. Site Closure Strategy Model for Creosote Site

    International Nuclear Information System (INIS)

    Coll, F.R.; Gray, D.R.

    2009-01-01

    In conjunction with RCRA site corrective action at an active wood preserving facility, a risk-based site closure strategy was developed and incorporated the performance of a dense non-aqueous phase liquid (DNAPL) source recovery remedy, a monitored natural attenuation (MNA) remedy for dissolved phase groundwater, and institutional controls. Innovative creosote DNAPL source recovery has been undertaken at the Site since 1998. Pooled creosote DNAPL is present 90 feet below ground within a transmissive sand and gravel aquifer with a saturated thickness of approximately 80 feet. The creosote DNAPL source is situated on the property boundary of the site and has generated a 1/2 mile off-site dissolved phase plume, creating significant NAPL management and remedial technology verification issues. To date, over 120,000 gallons of creosote DNAPL have been recovered from the subsurface utilizing a modified circulation well technology. A mass discharge flux protocol was developed to serve as a major performance metrics for the continuation of source removal efforts and to support the application of monitored natural attenuation as an associated remedial technology for groundwater. The mass removal success has supported the MNA remedy for dissolved phase groundwater and the associated development of institutional controls. The enacted site management strategy outlines the current and future risk management activities for the Site and represents an appropriate site closure strategy for the Site. (authors)

  15. Protocol - RPD | LSDB Archive [Life Science Database Archive metadata

    Lifescience Database Archive (English)

    Full Text Available switchLanguage; BLAST Search Image Search Home About Archive Update History Data ...e version) File URL: ftp://ftp.biosciencedbc.jp/archive/rpd/LATEST/rpd_protocol_jp.zip File size: 535 KB Fil...e name: rpd_protocol_en.zip (English version) File URL: ftp://ftp.biosciencedbc.jp/archiv...tabase Database Description Download License Update History of This Database Site Policy | Contact Us Protocol - RPD | LSDB Archive ...

  16. Report made on behalf of the commission of foreign affairs, defence and military forces about the bill authorizing the approval of the additional protocol to the construction agreement between the French government and the International organization of fusion energy for the joint implementation of the ITER project, and relative to the role of the labour inspection on the ITER international organization site and dealing with occupational health and safety

    International Nuclear Information System (INIS)

    2009-12-01

    This additional protocol to the construction agreement between the French Government and the ITER Organization aims at allowing the French labour inspection services to control the good respect of the French occupational health and safety regulation at the project site (Cadarache, Bouches du Rhone) and to play its role of adviser to the persons responsible for the organization. The report briefly recalls the ITER project and its organization, and then presents the actual situation and the objective of the additional protocol. (J.S.)

  17. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  18. Standard abdominal wound edge protection with surgical dressings vs coverage with a sterile circular polyethylene drape for prevention of surgical site infections (BaFO: study protocol for a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Mihaljevic André L

    2012-05-01

    Full Text Available Abstract Background Postoperative surgical site infections cause substantial morbidity, prolonged hospitalization, costs and even mortality and remain one of the most frequent surgical complications. Approximately 14% to 30% of all patients undergoing elective open abdominal surgery are affected and methods to reduce surgical site infection rates warrant further investigation and evaluation in randomized controlled trials. Methods/design To investigate whether the application of a circular plastic wound protector reduces the rate of surgical site infections in general and visceral surgical patients that undergo midline or transverse laparotomy by 50%. BaFO is a randomized, controlled, patient-blinded and observer-blinded multicenter clinical trial with two parallel surgical groups. The primary outcome measure will be the rate of surgical site infections within 45 days postoperative assessed according to the definition of the Center for Disease Control. Statistical analysis of the primary endpoint will be based on the intention-to-treat population. The global level of significance is set at 5% (2 sided and sample size (n = 258 per group is determined to assure a power of 80% with a planned interim analysis for the primary endpoint after the inclusion of 340 patients. Discussion The BaFO trial will explore if the rate of surgical site infections can be reduced by a single, simple, inexpensive intervention in patients undergoing open elective abdominal surgery. Its pragmatic design guarantees high external validity and clinical relevance. Trial registration http://www.clinicaltrials.gov NCT01181206. Date of registration: 11 August 2010; date of first patient randomized: 8 September 2010

  19. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  20. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  1. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  2. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  3. Gamma camera performance: technical assessment protocol

    International Nuclear Information System (INIS)

    Bolster, A.A.; Waddington, W.A.

    1996-01-01

    This protocol addresses the performance assessment of single and dual headed gamma cameras. No attempt is made to assess the performance of any associated computing systems. Evaluations are usually performed on a gamma camera commercially available within the United Kingdom and recently installed at a clinical site. In consultation with the manufacturer, GCAT selects the site and liaises with local staff to arrange a mutually convenient time for assessment. The manufacturer is encouraged to have a representative present during the evaluation. Three to four days are typically required for the evaluation team to perform the necessary measurements. When access time is limited, the team will modify the protocol to test the camera as thoroughly as possible. Data are acquired on the camera's computer system and are subsequently transferred to the independent GCAT computer system for analysis. This transfer from site computer to the independent system is effected via a hardware interface and Interfile data transfer. (author)

  4. Gamma camera performance: technical assessment protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bolster, A.A. [West Glasgow Hospitals NHS Trust, London (United Kingdom). Dept. of Clinical Physics; Waddington, W.A. [University College London Hospitals NHS Trust, London (United Kingdom). Inst. of Nuclear Medicine

    1996-12-31

    This protocol addresses the performance assessment of single and dual headed gamma cameras. No attempt is made to assess the performance of any associated computing systems. Evaluations are usually performed on a gamma camera commercially available within the United Kingdom and recently installed at a clinical site. In consultation with the manufacturer, GCAT selects the site and liaises with local staff to arrange a mutually convenient time for assessment. The manufacturer is encouraged to have a representative present during the evaluation. Three to four days are typically required for the evaluation team to perform the necessary measurements. When access time is limited, the team will modify the protocol to test the camera as thoroughly as possible. Data are acquired on the camera`s computer system and are subsequently transferred to the independent GCAT computer system for analysis. This transfer from site computer to the independent system is effected via a hardware interface and Interfile data transfer. (author).

  5. Evaluation Protocol To Assess an Integrated Framework for the Implementation of the Childhood Obesity Research Demonstration Project at the California (CA-CORD) and Massachusetts (MA-CORD) Sites

    OpenAIRE

    Chuang, Emmeline; Ayala, Guadalupe X.; Schmied, Emily; Ganter, Claudia; Gittelsohn, Joel; Davison, Kirsten K.

    2015-01-01

    Background: The long-term success of child obesity prevention and control efforts depends not only on the efficacy of the approaches selected, but also on the strategies through which they are implemented and sustained. This study introduces the Multilevel Implementation Framework (MIF), a conceptual model of factors affecting the implementation of multilevel, multisector interventions, and describes its application to the evaluation of two of three state sites (CA and MA) participating in th...

  6. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  7. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  8. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  9. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  10. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  11. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  12. A two-site, two-arm, 34-week, double-blind, parallel-group, randomized controlled trial of reduced nicotine cigarettes in smokers with mood and/or anxiety disorders: trial design and protocol

    Directory of Open Access Journals (Sweden)

    Sophia I. Allen

    2017-01-01

    Full Text Available Abstract Background The U.S. Food and Drug Administration can set standards for cigarettes that could include reducing their nicotine content. Such a standard should improve public health without causing unintended serious consequences for sub-populations. This study evaluates the effect of progressive nicotine reduction in cigarettes on smoking behavior, toxicant exposure, and psychiatric symptoms in smokers with comorbid mood and/or anxiety disorders using a two-site, two-arm, double-blind, parallel group, randomized controlled trial (RCT in four phases over 34 weeks. Methods Adult smokers (N = 200 of 5 or more cigarettes per day will be randomized across two sites (Penn State and Massachusetts General. Participants must have not had a quit attempt in the prior month, nor be planning to quit in the next 6 months, meet criteria for a current or lifetime unipolar mood and/or anxiety disorder based on the structured Mini-International Neuropsychiatric Interview, and must not have an unstable medical or psychiatric condition. After a week of smoking their own cigarettes, participants receive two weeks of Spectrum research cigarettes with usual nicotine content (11.6 mg. After this baseline period, participants will be randomly assigned to continue smoking Spectrum research cigarettes that contain either (a Usual Nicotine Content (11.6 mg; or (b Reduced Nicotine Content: the nicotine content per cigarette is progressively reduced from approximately 11.6 mg to 0.2 mg in five steps over 18 weeks. At the end of the randomization phase, participants will be offered the choice to either (a quit smoking with assistance, (b continue smoking free research cigarettes, or (c return to purchasing their own cigarettes, for the final 12 weeks of the study. The primary outcome measure is blood cotinine; key secondary outcomes are: exhaled carbon monoxide, urinary total NNAL- 4-(methylnitrosamino-1-(3-pyridyl-1-butanol and 1-hydroxypyrene, oxidative

  13. Protocol Monitoring Energy Conservation; Protocol Monitoring Energiebesparing

    Energy Technology Data Exchange (ETDEWEB)

    Boonekamp, P.G.M. [ECN Beleidsstudies, Petten (Netherlands); Mannaerts, H. [Centraal Planburea CPB, Den Haag (Netherlands); Tinbergen, W. [Centraal Bureau voor de Statistiek CBS, Den Haag (Netherlands); Vreuls, H.H.J. [Nederlandse onderneming voor energie en milieu Novem, Utrecht (Netherlands); Wesselink, B. [Rijksinstituut voor Volksgezondheid en Milieuhygiene RIVM, Bilthoven (Netherlands)

    2001-12-01

    On request of the Dutch ministry of Economic Affairs five institutes have collaborated to create a 'Protocol Monitoring Energy Conservation', a common method and database to calculate the amount of energy savings realised in past years. The institutes concerned are the Central Bureau of Statistics (CBS), the Netherlands Bureau for Economic Policy Analysis (CPB), the Energy research Centre of the Netherlands (ECN), the National Agency for Energy and Environment (Novem) and the Netherlands Institute of Public Health and the Environment (RIVM). The institutes have agreed upon a clear definition of energy use and energy savings. The demarcation with renewable energy, the saving effects of substitution between energy carriers and the role of import and export of energy have been elaborated. A decomposition method is used to split up the observed change in energy use in a number of effects, on a national and sectoral level. This method includes an analysis of growth effects, effects of structural changes in production and consumption activities and savings on end use or with more efficient conversion processes. To calculate these effects the total energy use is desegregated as much as possible. For each segment a reference energy use is calculated according to the trend in a variable which is supposed to be representative for the use without savings. The difference with the actual energy use is taken as the savings realised. Results are given for the sectors households, industry, agriculture, services and government, transportation and the energy sector; as well as a national figure. A special feature of the protocol method is the application of primary energy use figures in the determination of savings for end users. This means that the use of each energy carrier is increased with a certain amount, according to the conversion losses caused elsewhere in the energy system. The losses concern the base year energy sector and losses abroad for imports of secondary

  14. Immunocytochemical methods and protocols

    National Research Council Canada - National Science Library

    Javois, Lorette C

    1999-01-01

    ... monoclonal antibodies to study cell differentiation during embryonic development. For a select few disciplines volumes have been published focusing on the specific application of immunocytochemical techniques to that discipline. What distinguished Immunocytochemical Methods and Protocols from earlier books when it was first published four years ago was i...

  15. Critical Response Protocol

    Science.gov (United States)

    Ellingson, Charlene; Roehrig, Gillian; Bakkum, Kris; Dubinsky, Janet M.

    2016-01-01

    This article introduces the Critical Response Protocol (CRP), an arts-based technique that engages students in equitable critical discourse and aligns with the "Next Generation Science Standards" vision for providing students opportunities for language learning while advancing science learning (NGSS Lead States 2013). CRP helps teachers…

  16. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification. In r...

  17. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one...

  18. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  19. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  20. Epistemic Protocols for Distributed Gossiping

    Directory of Open Access Journals (Sweden)

    Krzysztof R. Apt

    2016-06-01

    Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.

  1. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  2. Diplomacy and Diplomatic Protocol

    Directory of Open Access Journals (Sweden)

    Lect. Ph.D Oana Iucu

    2008-12-01

    Full Text Available The present study aims to observe relationships and determining factors between diplomacyand diplomatic protocol as outlined by historical and contextual analyses. The approach is very dynamic,provided that concepts are able to show their richness, antiquity and polyvalence at the level of connotations,semantics, grammatical and social syntax. The fact that this information is up to date determines anattitude of appreciation and a state of positive contamination.

  3. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  4. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  5. Dysphonia risk screening protocol

    Science.gov (United States)

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  6. Site Features

    Data.gov (United States)

    U.S. Environmental Protection Agency — This dataset consists of various site features from multiple Superfund sites in U.S. EPA Region 8. These data were acquired from multiple sources at different times...

  7. Site decontamination

    International Nuclear Information System (INIS)

    Bicker, A.E.

    1981-01-01

    Among the several DOE sites that have been radiologically decontaminated under the auspices of the Nevada Operations Office are three whose physical characteristics are unique. These are the Tatum Dome Test Site (TDTS) near Hattiesburg, Mississippi; a location of mountainous terrain (Pahute Mesa) on the Nevada Test Site; and the GNOME site near Carlsbad, New Mexico. In each case the contamination, the terrain, and the climate conditions were different. This presentation includes a brief description of each site, the methods used to perform radiological surveys, the logistics required to support the decontamination (including health physics and sample analysis), and the specific techniques used to reduce or remove the contamination

  8. Field evaluation of hazardous waste site bioassessment protocols

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, J.M.; Cline, J.F.; Cushing, C.E.; McShane, M.C.; Rogers, J.E.; Rogers, L.E.; Simpson, J.C.; Skalski, J.R.

    1983-04-01

    The goals were: (1) determine the variability (both within and between laboratories) for the various bioassay procedures using contaminated soil samples from the Rocky Mountain Arsenal (RMA); (2) assess variability within and between plots for several assessment techniques (for sampling small mammals, plants, insects including honeybees and microarthropods) so that field studies could be designed to detect a defined biotic change; (3) establish three field plant transects which are apparently (a) contaminated, (b) appear contaminated and (c) could serve as a control; (4) assess the feasibility (in the laboratory) of using Basin F water to contaminate RMA soil artificially, and to supply information for the design of a field plot study in 1983; (5) attempt to obtain preliminary data on any promising field or laboratory bioassessment techniques not currently mentioned in the statement of work; and (6) obtain field data to assess the ecological status of RMA lakes and compare these observations to results from bioassessment testing.

  9. Implementation of the Gautrans LTPP protocol at three sites

    CSIR Research Space (South Africa)

    Paige-Green, P

    2004-03-01

    Full Text Available , but testing for properties with results that are more susceptible to operator and technique variability was all carried out by PPC Group Laboratory Services, Jupiter. The following test results were requested for the cements: Standard chemical tests...

  10. Field evaluation of hazardous waste site bioassessment protocols. Volume 2

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, J.M.; Cline, J.F.; Gano, K.A.; McShane, M.C.; Rogers, J.E.; Rogers, L.E.; Simpson, J.C.; Skalski, J.R.

    1984-04-01

    The overall goal of the plan was to demonstrate that honeybees could be used in detecting likely areas of chemical pollution, to demonstrate the usefulness of microbial and plant phytoassays, and to demonstrate a relationship between laboratory derived phytotoxicity results and field observations of plant community structure and diversity. Field studies were conducted through a cooperative arrangement with the US Army arsenal in Commerce City, Colorado.

  11. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  12. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Human Resources Division

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  13. Sincalide - the final protocol

    International Nuclear Information System (INIS)

    Clarke, E.A.; Notghi, A.; Hesslewood, S.R.; Harding, L.K.

    2002-01-01

    Full text: HIDA biliary studies examine the gallbladder (GB) to give a percentage ejection fraction (EF). Porcine CCK was an accepted agent for stimulating the GB prior to being withdrawn in the UK from 1998. Sincalide (a synthetic CCK) was the suggested replacement. We have tried many administration regimes in an attempt to get results comparable with our established CCK protocols. Dose concentration and length of infusion times have been studied. Initially a dose of 10 ngm/kg/min given over 2 minutes (manufacturer's recommended dose) was used. This gave falsely low ejection fractions. The dose was reduced to 3 ngm/kg/min over 3 minutes as it was felt the higher dose may be causing constriction of the sphincter of Oddi. This gave a slight improvement with 22 % of patients having normal EF (>35 %). The length of infusion was extended to 15 minutes and the dose concentration reduced again to 0.6 ngm/kg/min. 62 % of patients had a normal EF. However, on many of the curves the gallbladder was still contracting on completion of the 15 minute infusion and began to refill immediately after stopping Sincalide. A further change of protocol was indicated. The infusion time was extended to 30 minutes and the dose concentration per minute kept the same. Imaging began at 30 minutes post HIDA injection and continued for a total of 50 minutes. Sincalide infusion began at 35 minutes if a GB was visualized. This protocol has been performed on 17 patients. 53 % of these had a normal result (comparable with a normal rate of 40 % previously established with CCK) with a mean EF of 60 %. The mean EF of patients with abnormal studies was 15 %. Curves showed a plateau by 30 minutes in 94 % of patients indicating that gallbladder contraction was complete. No normal range is available so results were compared with ultrasound (US). All patients who had an abnormal US scan also had abnormal HIDA results. Three patients had a normal US scan and abnormal HIDA study. These are currently

  14. Distributed Network Protocols

    Science.gov (United States)

    1980-07-01

    MONITORING AGENCY NAME & ADDRESS(II different from Controlting Office) IS. SECURITY CLASS. (of this report) S Office of Naval Research Unclassified...All protocols are extended to networks with changing. topology. S80 8 4 246 DD0I iA 1473 EDITION OF INOV 65 IS OBSOLETE 8 0 24 SECURITY CLASSIFICATION...to the netowrk . f) Each node knows its adjacent links, but not necessarily the identity of its neighbors, i.e. the nodes at the other end of the links

  15. Reducing the sampling periods required in protocols for establishing ammonia emissions from pig fattening buildings using measurements and modelling

    NARCIS (Netherlands)

    Mosquera Losada, J.; Ogink, N.W.M.

    2011-01-01

    Ammonia (NH(3)) emission factors for animal housing systems in the Netherlands are based on measurements using standardised measurement protocols. Both the original Green Label (GL) protocol and the newly developed multi-site sampling protocol are based on year-round sampling periods. The objective

  16. Bayesian adaptive survey protocols for resource management

    Science.gov (United States)

    Halstead, Brian J.; Wylie, Glenn D.; Coates, Peter S.; Casazza, Michael L.

    2011-01-01

    Transparency in resource management decisions requires a proper accounting of uncertainty at multiple stages of the decision-making process. As information becomes available, periodic review and updating of resource management protocols reduces uncertainty and improves management decisions. One of the most basic steps to mitigating anthropogenic effects on populations is determining if a population of a species occurs in an area that will be affected by human activity. Species are rarely detected with certainty, however, and falsely declaring a species absent can cause improper conservation decisions or even extirpation of populations. We propose a method to design survey protocols for imperfectly detected species that accounts for multiple sources of uncertainty in the detection process, is capable of quantitatively incorporating expert opinion into the decision-making process, allows periodic updates to the protocol, and permits resource managers to weigh the severity of consequences if the species is falsely declared absent. We developed our method using the giant gartersnake (Thamnophis gigas), a threatened species precinctive to the Central Valley of California, as a case study. Survey date was negatively related to the probability of detecting the giant gartersnake, and water temperature was positively related to the probability of detecting the giant gartersnake at a sampled location. Reporting sampling effort, timing and duration of surveys, and water temperatures would allow resource managers to evaluate the probability that the giant gartersnake occurs at sampled sites where it is not detected. This information would also allow periodic updates and quantitative evaluation of changes to the giant gartersnake survey protocol. Because it naturally allows multiple sources of information and is predicated upon the idea of updating information, Bayesian analysis is well-suited to solving the problem of developing efficient sampling protocols for species of

  17. Site organization and site arrangement

    International Nuclear Information System (INIS)

    Boissonnet, B.; Macqueron, J.F.

    1976-01-01

    The present paper deals with criteria for the choice of a production unit or power plant site, the organization and development of a site in terms of its particular characteristics and takes into account personnel considerations in site organizations as well as the problem of integrating the architecture into the environment. (RW) [de

  18. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  19. Site operations

    International Nuclear Information System (INIS)

    House, W.B.; Ebenhack, D.G.

    1989-01-01

    This chapter is a discussion of the management and operations practices used at the Barnwell Waste Management Facility in Barnwell, SC. The following topics are discussed: (1) Waste receiving and inspection, including manifest and certificates of compliance, radiological surveys, disposition of nonconforming items, and decontamination and disposition of secondary waste streams; (2) Waste disposal, including Title 10 CFR 61 requirements, disposal area evaluations, shipment offloading, container emplacement, and radiation protection; (3) Trench closure, including trench backfilling, trench capping, and permanent markers; (4) Site maintenance and stabilization, including trench maintenance, surface water management, and site closure activities; (5) Site monitoring programs, including operational monitoring, and environmental monitoring program; (6) Personnel training and qualifications, including basic training program, safety training program, special skills training, and physical qualifications; (7) Records management, including waste records, personnel training records, personnel dosimetry records, site monitoring records, trench qualification and construction records, and site drawings and stabilization records; (8) Site security; (9) Emergency response plans; and (10) Quality assurance

  20. [Computerized clinical protocol for occlusion].

    Science.gov (United States)

    Salsench, J; Ferrer, J; Nogueras, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself. In this work we all data collected in the protocol and we give the explanations of each concept.

  1. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  2. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  3. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  4. Protocol-based care: the standardisation of decision-making?

    Science.gov (United States)

    Rycroft-Malone, Jo; Fontenla, Marina; Seers, Kate; Bick, Debra

    2009-05-01

    To explore how protocol-based care affects clinical decision-making. In the context of evidence-based practice, protocol-based care is a mechanism for facilitating the standardisation of care and streamlining decision-making through rationalising the information with which to make judgements and ultimately decisions. However, whether protocol-based care does, in the reality of practice, standardise decision-making is unknown. This paper reports on a study that explored the impact of protocol-based care on nurses' decision-making. Theoretically informed by realistic evaluation and the promoting action on research implementation in health services framework, a case study design using ethnographic methods was used. Two sites were purposively sampled; a diabetic and endocrine unit and a cardiac medical unit. Within each site, data collection included observation, postobservation semi-structured interviews with staff and patients, field notes, feedback sessions and document review. Data were inductively and thematically analysed. Decisions made by nurses in both sites were varied according to many different and interacting factors. While several standardised care approaches were available for use, in reality, a variety of information sources informed decision-making. The primary approach to knowledge exchange and acquisition was person-to-person; decision-making was a social activity. Rarely were standardised care approaches obviously referred to; nurses described following a mental flowchart, not necessarily linked to a particular guideline or protocol. When standardised care approaches were used, it was reported that they were used flexibly and particularised. While the logic of protocol-based care is algorithmic, in the reality of clinical practice, other sources of information supported nurses' decision-making process. This has significant implications for the political goal of standardisation. The successful implementation and judicious use of tools such as

  5. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Aquino de Muro, Marilena; Rapley, Ralph

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  6. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  7. Superfund Sites

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This layer represents active Superfund Sites published by the Environmental Protection Agency (EPA). These data were extracted from the Superfund Enterprise...

  8. Site development

    International Nuclear Information System (INIS)

    Noack, J.

    1975-01-01

    The subject of this paper is a general view over all necessary considerations to develop the site after it has been chosen and before starting with the construction of a nuclear power plant. (orig./RW) [de

  9. Site selection

    International Nuclear Information System (INIS)

    Olsen, C.W.

    1983-07-01

    The conditions and criteria for selecting a site for a nuclear weapons test at the Nevada Test Site are summarized. Factors considered are: (1) scheduling of drill rigs, (2) scheduling of site preparation (dirt work, auger hole, surface casing, cementing), (3) schedule of event (when are drill hole data needed), (4) depth range of proposed W.P., (5) geologic structure (faults, Pz contact, etc.), (6) stratigraphy (alluvium, location of Grouse Canyon Tuff, etc.), (7) material properties (particularly montmorillonite and CO 2 content), (8) water table depth, (9) potential drilling problems (caving), (10) adjacent collapse craters and chimneys, (11) adjacent expended but uncollapsed sites, (12) adjacent post-shot or other small diameter holes, (13) adjacent stockpile emplacement holes, (14) adjacent planned events (including LANL), (15) projected needs of Test Program for various DOB's and operational separations, and (16) optimal use of NTS real estate

  10. Development of a bedside viable ultrasound protocol to quantify appendicular lean tissue mass.

    Science.gov (United States)

    Paris, Michael T; Lafleur, Benoit; Dubin, Joel A; Mourtzakis, Marina

    2017-10-01

    Ultrasound is a non-invasive and readily available tool that can be prospectively applied at the bedside to assess muscle mass in clinical settings. The four-site protocol, which images two anatomical sites on each quadriceps, may be a viable bedside method, but its ability to predict musculature has not been compared against whole-body reference methods. Our primary objectives were to (i) compare the four-site protocol's ability to predict appendicular lean tissue mass from dual-energy X-ray absorptiometry; (ii) optimize the predictability of the four-site protocol with additional anatomical muscle thicknesses and easily obtained covariates; and (iii) assess the ability of the optimized protocol to identify individuals with low lean tissue mass. This observational cross-sectional study recruited 96 university and community dwelling adults. Participants underwent ultrasound scans for assessment of muscle thickness and whole-body dual-energy X-ray absorptiometry scans for assessment of appendicular lean tissue. Ultrasound protocols included (i) the nine-site protocol, which images nine anterior and posterior muscle groups in supine and prone positions, and (ii) the four-site protocol, which images two anterior sites on each quadriceps muscle group in a supine position. The four-site protocol was strongly associated (R 2  = 0.72) with appendicular lean tissue mass, but Bland-Altman analysis displayed wide limits of agreement (-5.67, 5.67 kg). Incorporating the anterior upper arm muscle thickness, and covariates age and sex, alongside the four-site protocol, improved the association (R 2  = 0.91) with appendicular lean tissue and displayed narrower limits of agreement (-3.18, 3.18 kg). The optimized protocol demonstrated a strong ability to identify low lean tissue mass (area under the curve = 0.89). The four-site protocol can be improved with the addition of the anterior upper arm muscle thickness, sex, and age when predicting appendicular lean tissue mass

  11. Protocols for Scholarly Communication

    Science.gov (United States)

    Pepe, A.; Yeomans, J.

    2007-10-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should guide authors naturally towards OA publication, and CERN wants to help reach a full open access publishing environment for the particle physics community and related sciences in the next few years.

  12. Implementation of an Evidence-Based Protocol for Surgical Infection Prophylaxis

    National Research Council Canada - National Science Library

    Savino, John A; Smeland, Jane; Flink, Ellen L; Ruperto, Angelo; Hines, Amanda; Sullivan, Thomas; Galvin, Kerri; Risucci, Donald A

    2005-01-01

    An evidence-based surgical antimicrobial prophylaxis (AMP) protocol was implemented in multiple facilities to determine if compliance led to a decrease in New York State reportable surgical site infections (SSIs...

  13. Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols

    International Nuclear Information System (INIS)

    Gerber, Naamit Kurshan; Wexler, Leonard H.; Singer, Samuel; Alektiar, Kaled M.; Keohan, Mary Louise; Shi, Weiji; Zhang, Zhigang; Wolden, Suzanne

    2013-01-01

    Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low risk, 61 (44%) at intermediate risk, and 44 (32%) at high risk. Forty-six percent were treated on or according to a prospective RMS protocol. The 5-year rate of overall survival (OS) was 45% for patients with nonmetastatic disease. The failure rates at 5 years for patients with nonmetastatic disease were 34% for local failure and 42% for distant failure. Among patients with nonmetastatic disease (n=94), significant factors associated with OS were histologic diagnosis, site, risk group, age, and protocol treatment. On multivariate analysis, risk group and protocol treatment were significant after adjustment for age. The 5-year OS was 54% for protocol patients versus 36% for nonprotocol patients. Conclusions: Survival in adult patients with nonmetastatic disease was significantly improved for those treated on RMS protocols, most of which are now open to adults

  14. Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Gerber, Naamit Kurshan [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wexler, Leonard H. [Department of Pediatrics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Singer, Samuel [Department of Surgery, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Alektiar, Kaled M. [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Keohan, Mary Louise [Department of Medicine, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Shi, Weiji; Zhang, Zhigang [Department of Epidemiology and Biostatistics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wolden, Suzanne, E-mail: woldens@mskcc.org [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)

    2013-05-01

    Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low risk, 61 (44%) at intermediate risk, and 44 (32%) at high risk. Forty-six percent were treated on or according to a prospective RMS protocol. The 5-year rate of overall survival (OS) was 45% for patients with nonmetastatic disease. The failure rates at 5 years for patients with nonmetastatic disease were 34% for local failure and 42% for distant failure. Among patients with nonmetastatic disease (n=94), significant factors associated with OS were histologic diagnosis, site, risk group, age, and protocol treatment. On multivariate analysis, risk group and protocol treatment were significant after adjustment for age. The 5-year OS was 54% for protocol patients versus 36% for nonprotocol patients. Conclusions: Survival in adult patients with nonmetastatic disease was significantly improved for those treated on RMS protocols, most of which are now open to adults.

  15. Effectiveness of oxaliplatin desensitization protocols.

    Science.gov (United States)

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  16. Deterministic secure communication protocol without using entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

  17. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  18. The HPA photon protocol and proposed electron protocol

    International Nuclear Information System (INIS)

    Pitchford, W.G.

    1985-01-01

    The Hospital Physicists Association (HPA) photon dosimetry protocol has been produced and was published in 1983. Revised values of some components of Csub(lambda) and refinements introduced into the theory in the last few years have enabled new Csub(lambda) values to be produced. The proposed HPA electron protocol is at present in draft form and will be published shortly. Both protocels are discussed. (Auth.)

  19. Report on July 2015 Additional Protocol Coordinators Best Practices Workshop

    Energy Technology Data Exchange (ETDEWEB)

    Gitau, Ernest T.N. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Burbank, Roberta L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Finch, Valerie A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-07-31

    After 10 years of implementation experience, the Office of Nonproliferation and Arms Control (NPAC) within the Department of Energy/National Nuclear Security Administration (DOE/NNSA) conducted the Additional Protocol (AP) Coordinators Best Practices Workshop at Oak Ridge National Laboratory from July 29-30, 2015. The goal of this workshop was to identify implementation best practices, lessons learned, and compliance challenges from the various Additional Protocol Coordinators (APCs) at each laboratory in the DOE/NNSA complex and associated sites. The workshop provided the opportunity for participants to share their insights and establish networks that APCs can utilize to continue to discuss challenges (new and old), identify best practices, and enhance communication and coordination for reporting multi-lab research projects during review activities. Workshop participants included DOE/NNSA HQ, laboratory and site APCs, seasoned experts, members of the original implementation outreach team, and Field Element and site security representatives.

  20. Site development

    International Nuclear Information System (INIS)

    Gaynor, R.K.

    1989-01-01

    Development of a low-level radioactive waste land disposal facility is little different than any industrial development of similar scope. Consideration must be made for normal business and operations management, security, facility maintenance, traffic control and necessary amenities for personnel. The item specific to the low-level waste site is the handling of radioactive waste materials and the regulatory and environmental protection procedures that must be planned for and accomodated in the site design and development. Each of these elements and the facility as a whole must be designed to be compatible with local land use plans, available transportation and support services, and the social and economic goals of the local community. Plans should also be made for quality control and orderly construction. This chapter deals with those aspects of the facility, its design and construction which are integral parts to the overall performance of the site

  1. Site Practice

    DEFF Research Database (Denmark)

    Wahedi, Haseebullah

    2016-01-01

    different practices in the construction phase. The research is based on an ethnographic study of a case in Denmark. The empirical data were collected through direct observations and semi-structured interviews with site managers, contract managers, foremen and craftsmen. Findings revealed...... that the construction phase comprises several communities and practices, leading to various uses of the drawings. The results indicated that the craftsmen used drawings to position themselves in the correct location, and that the site managers and contract managers used them as management tools and legal documents...

  2. Antibody engineering: methods and protocols

    National Research Council Canada - National Science Library

    Chames, Patrick

    2012-01-01

    "Antibody Engineering: Methods and Protocols, Second Edition was compiled to give complete and easy access to a variety of antibody engineering techniques, starting from the creation of antibody repertoires and efficient...

  3. Implementation of postoperative handoff protocol

    African Journals Online (AJOL)

    Background: Standardised handoff protocols have become necessary patient ... improve the perioperative handoff communications from the cardiac operating theatres to the ICU. ..... as you can imagine, there was push-back to the change.

  4. Site selection

    CERN Multimedia

    CERN PhotoLab

    1968-01-01

    To help resolve the problem of site selection for the proposed 300 GeV machine, the Council selected "three wise men" (left to right, J H Bannier of the Netherlands, A Chavanne of Switzerland and L K Boggild of Denmark).

  5. Site Restoration

    Energy Technology Data Exchange (ETDEWEB)

    Noynaert, L.; Bruggeman, A.; Cornelissen, R.; Massaut, V.; Rahier, A

    2001-04-01

    The objectives, the programme, and the achievements of the Site Restoration Department of SCK-CEN in 2000 are summarised. Main activities include the decommissioning of the BR3 PWR-reactor as well as other clean-up activities, projects on waste minimisation and activities related to the management of decommissioning projects. The department provides consultancy and services to external organisations.

  6. Site Restoration

    International Nuclear Information System (INIS)

    Noynaert, L.; Bruggeman, A.; Cornelissen, R.; Massaut, V.; Rahier, A.

    2001-01-01

    The objectives, the programme, and the achievements of the Site Restoration Department of SCK-CEN in 2000 are summarised. Main activities include the decommissioning of the BR3 PWR-reactor as well as other clean-up activities, projects on waste minimisation and activities related to the management of decommissioning projects. The department provides consultancy and services to external organisations

  7. Data Exchange Protocol in Repsail

    Directory of Open Access Journals (Sweden)

    Gucma Maciej

    2017-12-01

    Full Text Available Article presents implantation and theoretical considerations of data exchange protocol developed for the RepSail project, where main objective was design and building innovative hybrid yacht. One of problems during the design process was improper functioning of data exchange protocols that were available in the commercially available devices to mention navigation purpose NMEA183 or 2000 as well as automation dedicated ones (CAN and similar. Author shows the basis of the dedicated format of exchange for in board devices.

  8. The Groningen protocol: another perspective

    OpenAIRE

    Jotkowitz, A B; Glick, S

    2006-01-01

    The Groningen protocol allows for the euthanasia of severely ill newborns with a hopeless prognosis and unbearable suffering. We understand the impetus for such a protocol but have moral and ethical concerns with it. Advocates for euthanasia in adults have relied on the concept of human autonomy, which is lacking in the case of infants. In addition, biases can potentially influence the decision making of both parents and physicians. It is also very difficult to weigh the element of quality of...

  9. A novel protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery under cardiopulmonary bypass.

    Science.gov (United States)

    Odaka, Mizuho; Minakata, Kenji; Toyokuni, Hideaki; Yamazaki, Kazuhiro; Yonezawa, Atsushi; Sakata, Ryuzo; Matsubara, Kazuo

    2015-08-01

    This study aimed to develop and assess the effectiveness of a protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery. We established a protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery. This novel protocol was assessed by comparing patients undergoing open heart surgery before (control group; n = 30) and after its implementation (protocol group; n = 31) at Kyoto University Hospital between July 2012 and January 2013. Surgical site infections (SSIs) were observed in 4 control group patients (13.3 %), whereas no SSIs were observed in the protocol group patients (P open heart surgery.

  10. Monoclonal antibodies technology. Protocols

    International Nuclear Information System (INIS)

    Acevado Castro, B.E.

    1997-01-01

    Full text: Immunization. The first step in preparing useful monoclonal antibodies (MAbs) is to immunize an animal (Balb/c for example) with an appropriate antigen. Methods (only for soluble antigen): Solubilize selected antigen in Phosphate buffer solution (PBS) at pH 7.2-7.4, ideally at a final concentration per animal between 10 to 50 μg/ml. It is recommended that the antigen under consideration be incorporated into the emulsion adjuvants in 1:1 volumetric relation. We commonly use Frend's adjuvant (FA) to prepared immunized solution. The first immunization should be prepared with complete FA, and the another could be prepared with incomplete FA. It is recommended to inject mice with 0.2 ml intraperitoneal (ip) or subcutaneous (sc). Our experience suggests the sc route is the preferred route. A minimum protocol for immunizing mice to generate cells for preparing hybridomas is s follows: immunize sc on day 0, boost sc on day 21, take a trial bleeding on day 26; if antibody titters are satisfactory, boost ip on day 35 with antigen only, and remove the spleen to obtain cells for fusion on day 38. Fusion protocol. The myeloma cell line we are using is X63 Ag8.653. At the moment of fusion myeloma cells need a good viability (at least a 95%). 1. Remove the spleen cells from immunized mice using sterile conditions. An immune spleen should yield between 7 a 10x10 7 nucleated cells. 2. Place the spleen in 20 ml of serum-free RPMI 1640 in a Petri dish. Using a needle and syringe, inject the spleen with medium to distend and disrupt the spleen stroma and free the nucleated cells. 3. Flush the cell suspension with a Pasteur pipet to disperse clumps of cells. 4. Centrifuge the spleen cell suspension at 250g for 10 min. Resuspend the pellet in serum-free RPMI 1640. Determine cell concentration using Neuhabuer chamber. 5. Mix the myeloma cells and spleen cells in a conical 50-ml tube in serum-free RPMI 1640, 1 x10 7 spleen cells to 1x10 6 myeloma cells (ratio 10:1). Centrifuge

  11. Protocol for VOC-Arid ID remediation performance characterization

    International Nuclear Information System (INIS)

    Tegner, B.J.; Hassig, N.L.; Last, G.V.

    1994-09-01

    The Volatile Organic Compound-Arid Integrated Demonstration (VOC-Arid ID) is a technology development program sponsored by the US Department of Energy's Office of Technology Development that is targeted to acquire, develop, demonstrate, and deploy new technologies for the remediation of VOC contaminants in the soils and groundwaters of arid DOE sites. Technologies cannot be adequately evaluated unless sufficient site characterization and technology performance data have been collection and analyzed. The responsibility for identifying these data needs has been placed largely on the Principal Investigators (PIs) developing the remediation technology, who usually are not experts in site characterization or in identification of appropriate sampling, analysis, and monitoring techniques to support the field testing. This document provides a protocol for planning the collection of data before, during, and after a test of a new technology. This generic protocol provides the PIs and project managers with a set of steps to follow. The protocol is based on a data collection planning process called the Data Quality Objectives (DQO) process, which was originally developed by the US Environmental Protection Agency and has been expanded by DOE to support site cleanup decisions. The DQO process focuses on the quality and quantity of data required to make decision. Stakeholders to the decisions must negotiate such key inputs to the process as the decision rules that will be used and the acceptable probabilities of making decision errors

  12. Standardized CT protocols and nomenclature: better, but not yet there

    Energy Technology Data Exchange (ETDEWEB)

    Singh, Sarabjeet; Kalra, Mannudeep K. [Harvard Medical School, Department of Radiology, Massachusetts General Hospital, Boston, MA (United States)

    2014-10-15

    Radiation dose associated with CT is an important safety concern in patient care, especially in children. Technical advancements in multidetector-row CT scanner technology offer several advantages for clinical applications; these advancements have considerably increased CT utilization and enhanced the complexity of CT scanning protocols. Furthermore there are several scan manufacturers spearheading these technical advancements, leading to different commercial names causing confusion among the users, especially at imaging sites with scanners from different vendors. Several scientific studies and the National Council on Radiation Protection and Measurements (NCRP) have shown variation in CT radiation doses for same body region and similar scanning protocols. Therefore there is a need for standardization of scanning protocols and nomenclature of scan parameters. The following material reviews the status and challenges in standardization of CT scanning and nomenclature. (orig.)

  13. Study protocol for the Cities Changing Diabetes programme

    DEFF Research Database (Denmark)

    Napier, A David; Nolan, John J; Bagger, Malene

    2017-01-01

    and management are improving, complications remain common, and diabetes is among the leading causes of vision loss, amputation, neuropathy and renal and cardiovascular disease worldwide. We present a research protocol for exploring the drivers of type 2 diabetes and its complications in urban settings through...... the Cities Changing Diabetes (CCD) partnership programme. METHODS AND ANALYSIS: A global study protocol is implemented in eight collaborating CCD partner cities. In each city, academic institutions, municipal representatives and local stakeholders collaborate to set research priorities and plan...... Assessment explores the urban context in vulnerability to type 2 diabetes and identifies social factors and cultural determinants relevant to health, well-being and diabetes. ETHICS AND DISSEMINATION: The protocol steers the collection of primary and secondary data across the study sites. Research ethics...

  14. A high performance totally ordered multicast protocol

    Science.gov (United States)

    Montgomery, Todd; Whetten, Brian; Kaplan, Simon

    1995-01-01

    This paper presents the Reliable Multicast Protocol (RMP). RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service such as IP Multicasting. RMP is fully and symmetrically distributed so that no site bears un undue portion of the communication load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These QoS guarantees are selectable on a per packet basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, an implicit naming service, mutually exclusive handlers for messages, and mutually exclusive locks. It has commonly been held that a large performance penalty must be paid in order to implement total ordering -- RMP discounts this. On SparcStation 10's on a 1250 KB/sec Ethernet, RMP provides totally ordered packet delivery to one destination at 842 KB/sec throughput and with 3.1 ms packet latency. The performance stays roughly constant independent of the number of destinations. For two or more destinations on a LAN, RMP provides higher throughput than any protocol that does not use multicast or broadcast.

  15. Families of quantum fingerprinting protocols

    Science.gov (United States)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  16. Data-sharing protocol: A prototype implementation

    International Nuclear Information System (INIS)

    Gibney, T.; Greenwood, D.

    1992-12-01

    This paper describes a client/server communication protocol which will allow physicists to access data from cooperating remote experiments. Special low-level ''client'' software within the user's ''home'' data-access library formulates a request for data from the remote experiment. This request is sent over a network to a server at the remote site. The server has specific knowledge about the location and format of the requested data. The server gets the data and sends it over the network to the requesting client, which reformats the data according to the local library's conventions. Our prototype is being developed to suppose remote access to data from ATF, PBX, and micro Vax data from Tore-Supra. We have attempted to create a flexible design which should accommodate data from other experiments as well

  17. Fault recovery in the reliable multicast protocol

    Science.gov (United States)

    Callahan, John R.; Montgomery, Todd L.; Whetten, Brian

    1995-01-01

    The Reliable Multicast Protocol (RMP) provides a unique, group-based model for distributed programs that need to handle reconfiguration events at the application layer. This model, called membership views, provides an abstraction in which events such as site failures, network partitions, and normal join-leave events are viewed as group reformations. RMP provides access to this model through an application programming interface (API) that notifies an application when a group is reformed as the result of a some event. RMP provides applications with reliable delivery of messages using an underlying IP Multicast (12, 5) media to other group members in a distributed environment even in the case of reformations. A distributed application can use various Quality of Service (QoS) levels provided by RMP to tolerate group reformations. This paper explores the implementation details of the mechanisms in RMP that provide distributed applications with membership view information and fault recovery capabilities.

  18. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  19. Understanding protocol performance: impact of test performance.

    Science.gov (United States)

    Turner, Robert G

    2013-01-01

    This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as

  20. Live-cell and super-resolution imaging reveal that the distribution of wall-associated protein A is correlated with the cell chain integrity of Streptococcus mutans.

    Science.gov (United States)

    Li, Y; Liu, Z; Zhang, Y; Su, Q P; Xue, B; Shao, S; Zhu, Y; Xu, X; Wei, S; Sun, Y

    2015-10-01

    Streptococcus mutans is a primary pathogen responsible for dental caries. It has an outstanding ability to form biofilm, which is vital for virulence. Previous studies have shown that knockout of Wall-associated protein A (WapA) affects cell chain and biofilm formation of S. mutans. As a surface protein, the distribution of WapA remains unknown, but it is important to understand the mechanism underlying the function of WapA. This study applied the fluorescence protein mCherry as a reporter gene to characterize the dynamic distribution of WapA in S. mutans via time-lapse and super-resolution fluorescence imaging. The results revealed interesting subcellular distribution patterns of WapA in single, dividing and long chains of S. mutans cells. It appears at the middle of the cell and moves to the poles as the cell grows and divides. In a cell chain, after each round of cell division, such dynamic relocation results in WapA distribution at the previous cell division sites, resulting in a pattern where WapA is located at the boundary of two adjacent cell pairs. This WapA distribution pattern corresponds to the breaking segmentation of wapA deletion cell chains. The dynamic relocation of WapA through the cell cycle increases our understanding of the mechanism of WapA in maintaining cell chain integrity and biofilm formation. © 2015 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  1. The Geneva Protocol of 1925

    International Nuclear Information System (INIS)

    Mc Elroy, R.J.

    1991-01-01

    This paper reports that when President Gerald Ford signed the instruments of ratification for the Geneva Protocol of 1925 on January 22, 1975, a tortured, half-century-long chapter in U.S. arms control policy was brought to a close. Fifty years earlier, at the Geneva Conference for the Control of the International Trade in Arms, Munitions and Implements of War, the United States had played a key role in drafting and reaching agreement on the Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases and of Bacteriological Methods of Warfare. The protocol, signed by thirty nations, including the United States, on June 17, 1925, prohibits the use in war of asphyxiating, poisonous or other gases, and of all analogous liquids, materials or devices as well as the use of bacteriological methods of warfare

  2. National protocol framework for the inventory and monitoring of bees

    Science.gov (United States)

    Droege, Sam; Engler, Joseph D.; Sellers, Elizabeth A.; Lee O'Brien,

    2016-01-01

    This national protocol framework is a standardized tool for the inventory and monitoring of the approximately 4,200 species of native and non-native bee species that may be found within the National Wildlife Refuge System (NWRS) administered by the U.S. Fish and Wildlife Service (USFWS). However, this protocol framework may also be used by other organizations and individuals to monitor bees in any given habitat or location. Our goal is to provide USFWS stations within the NWRS (NWRS stations are land units managed by the USFWS such as national wildlife refuges, national fish hatcheries, wetland management districts, conservation areas, leased lands, etc.) with techniques for developing an initial baseline inventory of what bee species are present on their lands and to provide an inexpensive, simple technique for monitoring bees continuously and for monitoring and evaluating long-term population trends and management impacts. The latter long-term monitoring technique requires a minimal time burden for the individual station, yet can provide a good statistical sample of changing populations that can be investigated at the station, regional, and national levels within the USFWS’ jurisdiction, and compared to other sites within the United States and Canada. This protocol framework was developed in cooperation with the United States Geological Survey (USGS), the USFWS, and a worldwide network of bee researchers who have investigated the techniques and methods for capturing bees and tracking population changes. The protocol framework evolved from field and lab-based investigations at the USGS Bee Inventory and Monitoring Laboratory at the Patuxent Wildlife Research Center in Beltsville, Maryland starting in 2002 and was refined by a large number of USFWS, academic, and state groups. It includes a Protocol Introduction and a set of 8 Standard Operating Procedures or SOPs and adheres to national standards of protocol content and organization. The Protocol Narrative

  3. Olkiluoto site description 2006

    International Nuclear Information System (INIS)

    Andersson, J.; Ahokas, H.; Hudson, J.A.

    2007-03-01

    subjective criteria are used for identifying faults; Regarding the rock mechanics description, presented in Chapter 5, additional data have been assessed and the overall level of rock mechanics understanding has increased compared with previous model versions; A new hydrogeological model has been developed, which is presented in Chapter 6, which places more emphasis on the hydraulic data. Pressure anomalies are now stronger drivers for including hydraulic zones in the model and the number of explicit uncertain cases is greater; The hydrogeochemical description, presented in Chapter 7, is consistent with the previous model and there is an increased level of internal consistency in the hydrogeochemical understanding. Information on gases and understanding of their origin has increased significantly. Based on these descriptions, the report also makes a second set of predictions in Chapter 9 concerning the expected geology and rock mechanics properties to be found during the excavation of the ONKALO and also predicts the hydrogeological and hydrogeochemical impacts of these excavations. Two types of predictions are made: type A predictions, that use only the latest version of the overall Site Model; and type B predictions, that also use all the data from the tunnel, which are derived from activities, such as tunnel mapping and Pilot holes. The Site Descriptive Modelling involves uncertainties and it is necessary to assess the confidence in such modelling. This has been assessed through special protocols in a technical auditing exercise, which is presented in Chapter 10. These protocols investigate whether all data have been considered and understood; where the uncertainties lie and what the potential is for alternative interpretations; whether there is sufficient consistency between disciplines and consistency with the past evolution of the site; as well as comparisons with previous model versions. Chapter 11 concludes that, overall, the uncertainty and confidence assessment

  4. The Kyoto protocol development; La viabilite du protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)

    2002-04-01

    From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)

  5. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    We present our work on using abstract models for formally analysing cryptographic protocols: First, we present an ecient method for verifying trace-based authenticity properties of protocols using nonces, symmetric encryption, and asymmetric encryption. The method is based on a type system...... of Gordon et al., which we modify to support fully-automated type inference. Tests conducted via an implementation of our algorithm found it to be very ecient. Second, we show how privacy may be captured in a symbolic model using an equivalencebased property and give a formal denition. We formalise...

  6. Inter-laboratory variation in DNA damage using a standard comet assay protocol

    DEFF Research Database (Denmark)

    Forchhammer, Lykke; Ersson, Clara; Loft, Steffen

    2012-01-01

    determined the baseline level of DNA strand breaks (SBs)/alkaline labile sites and formamidopyrimidine DNA glycosylase (FPG)-sensitive sites in coded samples of mononuclear blood cells (MNBCs) from healthy volunteers. There were technical problems in seven laboratories in adopting the standard protocol...... analysed by the standard protocol. The SBs and FPG-sensitive sites were measured in the same experiment, indicating that the large spread in the latter lesions was the main reason for the reduced inter-laboratory variation. However, it remains worrying that half of the participating laboratories obtained...

  7. Development of a manualized protocol of massage therapy for clinical trials in osteoarthritis

    Directory of Open Access Journals (Sweden)

    Ali Ather

    2012-10-01

    Full Text Available Abstract Background Clinical trial design of manual therapies may be especially challenging as techniques are often individualized and practitioner-dependent. This paper describes our methods in creating a standardized Swedish massage protocol tailored to subjects with osteoarthritis of the knee while respectful of the individualized nature of massage therapy, as well as implementation of this protocol in two randomized clinical trials. Methods The manualization process involved a collaborative process between methodologic and clinical experts, with the explicit goals of creating a reproducible semi-structured protocol for massage therapy, while allowing some latitude for therapists’ clinical judgment and maintaining consistency with a prior pilot study. Results The manualized protocol addressed identical specified body regions with distinct 30- and 60-min protocols, using standard Swedish strokes. Each protocol specifies the time allocated to each body region. The manualized 30- and 60-min protocols were implemented in a dual-site 24-week randomized dose-finding trial in patients with osteoarthritis of the knee, and is currently being implemented in a three-site 52-week efficacy trial of manualized Swedish massage therapy. In the dose-finding study, therapists adhered to the protocols and significant treatment effects were demonstrated. Conclusions The massage protocol was manualized, using standard techniques, and made flexible for individual practitioner and subject needs. The protocol has been applied in two randomized clinical trials. This manualized Swedish massage protocol has real-world utility and can be readily utilized both in the research and clinical settings. Trial registration Clinicaltrials.gov NCT00970008 (18 August 2009

  8. Site Restoration

    Energy Technology Data Exchange (ETDEWEB)

    Noynaert, L.; Bruggeman, A.; Cornelissen, R.; Massaut, V.; Rahier, A

    2002-04-01

    The objectives, the programme, and the achievements of SCK-CEN's Site Restoration Department for 2001 are described. Main activities include the decommissioning of the BR3 PWR-reactor as well as other clean-up activities, projects on waste minimisation and the management of spent fuel and the flow of dismantled materials and the recycling of materials from decommissioning activities based on the smelting of metallic materials in specialised foundries. The department provides consultancy and services to external organisations and performs R and D on new techniques including processes for the treatment of various waste components including the reprocessing of spent fuel, the treatment of tritium, the treatment of liquid alkali metals into cabonates through oxidation, the treatment of radioactive organic waste and the reconditioning of bituminised waste products.

  9. Petri Nets in Cryptographic Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Winskel, Glynn

    2001-01-01

    A process language for security protocols is presented together with a semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. By means of an example we illustrate...

  10. Improving the DGK comparison protocol

    NARCIS (Netherlands)

    Veugen, P.J.M.

    2012-01-01

    When processing signals in the encrypted domain, homomorphic encryption can be used to enable linear operations on encrypted data. Comparison of encrypted data however requires an additional protocol between the parties and will be relatively expensive. A well-known and frequently used comparison

  11. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use...... of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools....

  12. Art. 1 Eerste Protocol EVRM

    NARCIS (Netherlands)

    Poelmann, E.

    2014-01-01

    Het recht op bezit is niet in het Europees Verdrag ter bescherming van de rechten van de mens en de fundamentele vrijheden (hierna: EVRM) neergelegd, maar in het Eerste Protocol daarbij (hierna: EP), dat in 1954 in werking is getreden. Het is van belang voor ogen te houden dat de Tweede Wereldoorlog

  13. Bundle Security Protocol for ION

    Science.gov (United States)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  14. Affinity biosensors: techniques and protocols

    National Research Council Canada - National Science Library

    Rogers, Kim R; Mulchandani, Ashok

    1998-01-01

    ..., and government to begin or expand their biosensors research. This volume, Methods in Biotechnology vol. 7: Affinity Biosensors: Techniques and Protocols, describes a variety of classical and emerging transduction technologies that have been interfaced to bioaffinity elements (e.g., antibodies and receptors). Some of the reas...

  15. High Entropy Random Selection Protocols

    NARCIS (Netherlands)

    H. Buhrman (Harry); M. Christandl (Matthias); M. Koucky (Michal); Z. Lotker (Zvi); B. Patt-Shamir; M. Charikar; K. Jansen; O. Reingold; J. Rolim

    2007-01-01

    textabstractIn this paper, we construct protocols for two parties that do not trust each other, to generate random variables with high Shannon entropy. We improve known bounds for the trade off between the number of rounds, length of communication and the entropy of the outcome.

  16. A Student Teamwork Induction Protocol

    Science.gov (United States)

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  17. Cognitive Communications Protocols for SATCOM

    Science.gov (United States)

    2017-10-20

    communications protocols for satellite and space communications with possible broad applications in defense, homeland-security as well as consumer ...communications with possible broad applications in defense, homeland-security, and civilian as well as consumer telecommunications. Such cognitive...vulnerable against smart jammers that may attempt to learn the cognitive radios own behavior . In response, our second class of proposed algorithms

  18. Group covariant protocols for quantum string commitment

    International Nuclear Information System (INIS)

    Tsurumaru, Toyohiro

    2006-01-01

    We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next using this result, we prove that for every irreducible representation of a finite group, there always exists a corresponding nontrivial QSC protocol which reaches a level of security impossible to achieve classically

  19. Assessing health systems for type 1 diabetes in sub-Saharan Africa: developing a 'Rapid Assessment Protocol for Insulin Access'

    DEFF Research Database (Denmark)

    Beran, David; Yudkin, John S; de Courten, Maximilian

    2006-01-01

    In order to improve the health of people with Type 1 diabetes in developing countries, a clear analysis of the constraints to insulin access and diabetes care is needed. We developed a Rapid Assessment Protocol for Insulin Access, comprising a series of questionnaires as well as a protocol...... for the gathering of other data through site visits, discussions, and document reviews....

  20. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  1. Voluntary vs directed siting -- or somewhere in-between?

    Energy Technology Data Exchange (ETDEWEB)

    Peelle, E.B.

    1994-04-01

    Waste siting gridlock in the United States and Canada has led to experimentation with voluntary and hybrid or ``mixed mode`` siting. We review nuclear and hazardous waste voluntary siting (VS) results for selected cases in the U.S, and Canada. Findings indicate that VS is not a panacea, but that current siting efforts are inadequate tests of its potential. We suggest trials of improved VS protocols and more effort on hybrid approaches in which the developer chooses the site but is required to reach agreement on conditions with local stakeholders. Mixed mode siting may be better suited to the US context and its three-tiered governmental system.

  2. Quantifying and visualizing site performance in clinical trials

    OpenAIRE

    Eric Yang; Christopher O'Donovan; JodiLyn Phillips; Leone Atkinson; Krishnendu Ghosh; Dimitris K. Agrafiotis

    2018-01-01

    Background: One of the keys to running a successful clinical trial is the selection of high quality clinical sites, i.e., sites that are able to enroll patients quickly, engage them on an ongoing basis to prevent drop-out, and execute the trial in strict accordance to the clinical protocol. Intuitively, the historical track record of a site is one of the strongest predictors of its future performance; however, issues such as data availability and wide differences in protocol complexity can co...

  3. A Push-pull Protocol to Reduce Colonization of Bird Nest Boxes by Honey Bees.

    Science.gov (United States)

    Efstathion, Caroline A; Kern, William H

    2016-09-04

    Introduction of the invasive Africanized honey bee (AHB) into the Neotropics is a serious problem for many cavity nesting birds, specifically parrots. These bees select cavities that are suitable nest sites for birds, resulting in competition. The difficulty of removing bees and their defensive behavior makes a prevention protocol necessary. Here, we describe a push-pull integrated pest management protocol to deter bees from inhabiting bird boxes by applying a bird safe insecticide, permethrin, to repel bees from nest boxes, while simultaneously attracting them to pheromone-baited swarm traps. Shown here is an example experiment using Barn Owl nest boxes. This protocol successfully reduced colonization of Barn Owl nest boxes by Africanized honey bees. This protocol is flexible, allowing adjustments to accommodate a wide range of bird species and habitats. This protocol could benefit conservation efforts where AHB are located.

  4. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  5. National Ignition Facility Project Site Safety Program

    International Nuclear Information System (INIS)

    Dun, C

    2003-01-01

    This Safety Program for the National Ignition Facility (NIF) presents safety protocols and requirements that management and workers shall follow to assure a safe and healthful work environment during activities performed on the NIF Project site. The NIF Project Site Safety Program (NPSSP) requires that activities at the NIF Project site be performed in accordance with the ''LLNL ES and H Manual'' and the augmented set of controls and processes described in this NIF Project Site Safety Program. Specifically, this document: (1) Defines the fundamental NIF site safety philosophy. (2) Defines the areas covered by this safety program (see Appendix B). (3) Identifies management roles and responsibilities. (4) Defines core safety management processes. (5) Identifies NIF site-specific safety requirements. This NPSSP sets forth the responsibilities, requirements, rules, policies, and regulations for workers involved in work activities performed on the NIF Project site. Workers are required to implement measures to create a universal awareness that promotes safe practice at the work site and will achieve NIF management objectives in preventing accidents and illnesses. ES and H requirements are consistent with the ''LLNL ES and H Manual''. This NPSSP and implementing procedures (e.g., Management Walkabout, special work procedures, etc.,) are a comprehensive safety program that applies to NIF workers on the NIF Project site. The NIF Project site includes the B581/B681 site and support areas shown in Appendix B

  6. Phase Transition in Protocols Minimizing Work Fluctuations

    Science.gov (United States)

    Solon, Alexandre P.; Horowitz, Jordan M.

    2018-05-01

    For two canonical examples of driven mesoscopic systems—a harmonically trapped Brownian particle and a quantum dot—we numerically determine the finite-time protocols that optimize the compromise between the standard deviation and the mean of the dissipated work. In the case of the oscillator, we observe a collection of protocols that smoothly trade off between average work and its fluctuations. However, for the quantum dot, we find that as we shift the weight of our optimization objective from average work to work standard deviation, there is an analog of a first-order phase transition in protocol space: two distinct protocols exchange global optimality with mixed protocols akin to phase coexistence. As a result, the two types of protocols possess qualitatively different properties and remain distinct even in the infinite duration limit: optimal-work-fluctuation protocols never coalesce with the minimal-work protocols, which therefore never become quasistatic.

  7. Database communication protocol analyses and security detection

    International Nuclear Information System (INIS)

    Luo Qun; Liu Qiushi

    2003-01-01

    In this paper we introduced the analysis of TDS protocol in the communication application between Client and Server about SYBASE and MICROSOFT SQL SERVER and do some test for some bugs existed in the protocol. (authors)

  8. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  9. Heavy vehicle simulator operations: protocol for instrumentation, data collection and data storage - 2nd draft

    CSIR Research Space (South Africa)

    Jones, DJ

    2002-09-01

    Full Text Available The instrumentation used is discussed under the relevant sections. Keywords: Accelerated pavement testing (APT), Heavy Vehicle Simulator (HVS) Proposals for implementation: Follow protocol in all future HVS testing. Update as required... future HVS testing. The protocol discusses staffing, site selection and establishment, and data collection, analysis and storage. 1.2. Accelerated Pavement Testing Accelerated Pavement Testing (APT) can be described as a controlled application...

  10. Declarative Specification of Fault Tolerant Auction Protocols: The English Auction Case Study

    DEFF Research Database (Denmark)

    Dragoni, Nicola; Gaspari, Mauro

    2012-01-01

    Auction mechanisms are nowadays widely used in electronic commerce Web sites for buying and selling items among different users. The increasing importance of auction protocols in the negotiation phase is not limited to online marketplaces. In fact, the wide applicability of auctions as resource‐a...... about the specification of an English Auction protocol which tolerate crashes of bidding agents and we discuss its properties....

  11. Partial-mouth periodontal examination protocols for the determination of the prevalence and extent of gingival bleeding in adolescents.

    Science.gov (United States)

    Machado, Michely Ediani; Tomazoni, Fernanda; Casarin, Maísa; Ardenghi, Thiago M; Zanatta, Fabricio Batistin

    2017-10-01

    To compare the performance of partial-mouth periodontal examination (PMPE) protocols with different cut-off points to the full-mouth examination (FME) in the assessment of the prevalence and extent of gingival bleeding in adolescents. A cross-sectional study was conducted involving 12-year-old adolescents. Following a systematic two-stage cluster sampling process, 1134 individuals were evaluated. Different PMPE protocols were compared to the FME with six sites per tooth. Sensitivity, specificity, area under the ROC curve (AUC), intraclass correlation coefficient (ICC), relative and absolute biases and the inflation factor were assessed for each PMPE protocol with different cut-off points for the severity of gingival bleeding. The highest AUC values were found for the six-site two-diagonal quadrant (2-4) (0.97), six-site random half-mouth (0.95) and Community Periodontal Index (0.95) protocols. The assessment of three sites [mesiobuccal (MB), buccal (B) and distolingual (DL)] in two diagonal quadrants and the random half-mouth protocol had higher sensitivity and lower specificity than the same protocols with distobuccal (DB) sites. However, the use of DB sites led to better specificity and improved the balance between sensitivity and specificity, except for the two-diagonal quadrant (1-3) protocol. The ≥1 cut-off point led to the most discrepant results from the FME. Six-site two-diagonal quadrant (2-4) and random half-mouth assessments perform better in the evaluation of gingival bleeding in adolescents. However, when a faster protocol is needed, a two-diagonal quadrant assessment using only MB, B and DL sites can be used with no important loss of information. © 2017 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  12. From protocol to published report

    DEFF Research Database (Denmark)

    Berendt, Louise; Callréus, Torbjörn; Petersen, Lene Grejs

    2016-01-01

    and published reports of academic clinical drug trials. METHODS: A comparison was made between study protocols and their corresponding published reports. We assessed the overall consistency, which was defined as the absence of discrepancy regarding study type (categorized as either exploratory or confirmatory...... in 1999, 2001, and 2003, 95 of which fulfilled the eligibility criteria and had at least one corresponding published report reporting data on trial subjects. Overall consistency was observed in 39% of the trials (95% CI: 29 to 49%). Randomized controlled trials (RCTs) constituted 72% (95% CI: 63 to 81......%) of the sample, and 87% (95% CI: 80 to 94%) of the trials were hospital based. CONCLUSIONS: Overall consistency between protocols and their corresponding published reports was low. Motivators for the inconsistencies are unknown but do not seem restricted to economic incentives....

  13. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  14. Feasible quantum communication complexity protocol

    International Nuclear Information System (INIS)

    Galvao, Ernesto F.

    2002-01-01

    I show that a simple multiparty communication task can be performed more efficiently with quantum communication than with classical communication, even with low detection efficiency η. The task is a communication complexity problem in which distant parties need to compute a function of the distributed inputs, while minimizing the amount of communication between them. A realistic quantum optical setup is suggested that can demonstrate a five-party quantum protocol with higher-than-classical performance, provided η>0.33

  15. Cost estimation of Kyoto Protocol

    International Nuclear Information System (INIS)

    Di Giulio, Enzo

    2005-01-01

    This article proposes a reflection on important aspects in the costs determination performance of Kyoto Protocol. The evaluation of the main models evidence possible impacts on the economies. A key role in the determination of the cost is represented by the relative hypothesis to emission trading and the projects CDM-JI and from the political capacity at the cost negative or equal to zero [it

  16. Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, Robert [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht, Cheryn [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  17. Behavior Protocols for Software Components

    Czech Academy of Sciences Publication Activity Database

    Plášil, František; Višňovský, Stanislav

    2002-01-01

    Roč. 28, č. 11 (2002), s. 1056-1076 ISSN 0098-5589 R&D Projects: GA AV ČR IAA2030902; GA ČR GA201/99/0244 Grant - others:Eureka(XE) Pepita project no.2033 Institutional research plan: AV0Z1030915 Keywords : behavior protocols * component-based programming * software architecture Subject RIV: JC - Computer Hardware ; Software Impact factor: 1.170, year: 2002

  18. Desensitization protocols and their outcome.

    Science.gov (United States)

    Marfo, Kwaku; Lu, Amy; Ling, Min; Akalin, Enver

    2011-04-01

    In the last decade, transplantation across previously incompatible barriers has increasingly become popular because of organ donor shortage, availability of better methods of detecting and characterizing anti-HLA antibodies, ease of diagnosis, better understanding of antibody-mediated rejection, and the availability of effective regimens. This review summarizes all manuscripts published since the first publication in 2000 on desensitized patients and discusses clinical outcomes including acute and chronic antibody-mediated rejection rate, the new agents available, kidney paired exchange programs, and the future directions in sensitized patients. There were 21 studies published between 2000 and 2010, involving 725 patients with donor-specific anti-HLA antibodies (DSAs) who underwent kidney transplantation with different desensitization protocols. All studies were single center and retrospective. The patient and graft survival were 95% and 86%, respectively, at a 2-year median follow-up. Despite acceptable short-term patient and graft survivals, acute rejection rate was 36% and acute antibody-mediated rejection rate was 28%, which is significantly higher than in nonsensitized patients. Recent studies with longer follow-up of those patients raised concerns about long-term success of desensitization protocols. The studies utilizing protocol biopsies in desensitized patients also reported higher subclinical and chronic antibody-mediated rejection. An association between the strength of DSAs determined by median fluorescence intensity values of Luminex single-antigen beads and risk of rejection was observed. Two new agents, bortezomib, a proteasome inhibitor, and eculizumab, an anti-complement C5 antibody, were recently introduced to desensitization protocols. An alternative intervention is kidney paired exchange, which should be considered first for sensitized patients. © 2011 by the American Society of Nephrology

  19. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  20. Formal analysis of a fair payment protocol

    NARCIS (Netherlands)

    J.G. Cederquist; M.T. Dashti (Mohammad)

    2004-01-01

    textabstractWe formally specify a payment protocol. This protocol is intended for fair exchange of time-sensitive data. Here the ?-CRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free ?-calculus. These properties are then verified

  1. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, M.T.

    2004-01-01

    We formally specify a payment protocol. This protocol is intended for fair exchange of timesensitive data. Here the μCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free μ-calculus. These properties are then verified using the finite

  2. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi; Dimitrakos, Theo; Martinelli, Fabio

    We formally specify a payment protocol described by Vogt et al. This protocol is intended for fair exchange of time-sensitive data. Here the mCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free mu-calculus. These properties are then

  3. Advanced dementia pain management protocols.

    Science.gov (United States)

    Montoro-Lorite, Mercedes; Canalias-Reverter, Montserrat

    Pain management in advanced dementia is complex because of neurological deficits present in these patients, and nurses are directly responsible for providing interventions for the evaluation, management and relief of pain for people suffering from this health problem. In order to facilitate and help decision-makers, pain experts recommend the use of standardized protocols to guide pain management, but in Spain, comprehensive pain management protocols have not yet been developed for advanced dementia. This article reflects the need for an integrated management of pain in advanced dementia. From the review and analysis of the most current and relevant studies in the literature, we performed an approximation of the scales for the determination of pain in these patients, with the observational scale PAINAD being the most recommended for the hospital setting. In addition, we provide an overview for comprehensive management of pain in advanced dementia through the conceptual framework «a hierarchy of pain assessment techniques by McCaffery and Pasero» for the development and implementation of standardized protocols, including a four-phase cyclical process (evaluation, planning/performance, revaluation and recording), which can facilitate the correct management of pain in these patients. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.

  4. WE-E-304-00: Implementing SBRT Protocols

    International Nuclear Information System (INIS)

    2015-01-01

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective even unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation

  5. The intergroup protocols: Scalable group communication for the internet

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo [Univ. of California, Santa Barbara, CA (United States)

    2000-12-04

    Reliable group ordered delivery of multicast messages in a distributed system is a useful service that simplifies the programming of distributed applications. Such a service helps to maintain the consistency of replicated information and to coordinate the activities of the various processes. With the increasing popularity of the Internet, there is an increasing interest in scaling the protocols that provide this service to the environment of the Internet. The InterGroup protocol suite, described in this dissertation, provides such a service, and is intended for the environment of the Internet with scalability to large numbers of nodes and high latency links. The InterGroup protocols approach the scalability problem from various directions. They redefine the meaning of group membership, allow voluntary membership changes, add a receiver-oriented selection of delivery guarantees that permits heterogeneity of the receiver set, and provide a scalable reliability service. The InterGroup system comprises several components, executing at various sites within the system. Each component provides part of the services necessary to implement a group communication system for the wide-area. The components can be categorized as: (1) control hierarchy, (2) reliable multicast, (3) message distribution and delivery, and (4) process group membership. We have implemented a prototype of the InterGroup protocols in Java, and have tested the system performance in both local-area and wide-area networks.

  6. Three-stage treatment protocol for recalcitrant distal femoral nonunion.

    Science.gov (United States)

    Ma, Ching-Hou; Chiu, Yen-Chun; Tu, Yuan-Kun; Yen, Cheng-Yo; Wu, Chin-Hsien

    2017-04-01

    In this study, we proposed a three-stage treatment protocol for recalcitrant distal femoral nonunion and aimed to analyze the clinical results. We retrospective reviewed 12 consecutive patients with recalcitrant distal femoral nonunion undergoing our three-stage treatment protocol from January 2010 to December 2014 in our institute. The three-stage treatment protocol comprised debridement of the nonunion site, lengthening to eliminate leg length discrepancy, deformity correction, stabilization with a locked plate, filling of the defect with cement spacer for inducing membrane formation, and bone reconstruction using a cancellous bone autograft (Masquelet technique) or free vascularized fibular bone graft. The bone union time, wound complication, lower limbs alignment, amount of lengthening, knee range of motion, and functional outcomes were evaluated. Osseous union with angular deformity lengthening was 5.88 cm (range 3.5-12 cm). Excellent or good outcomes were obtained in 9 patients. Although the current study involved only a small number of patients and the intervention comprised three stages, we believe that such a protocol may be a valuable alternative for the treatment of recalcitrant distal femoral nonunion.

  7. WE-E-304-00: Implementing SBRT Protocols

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2015-06-15

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective even unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation.

  8. Inter-comparison of NIOSH and IMPROVE protocols for OC and EC determination: implications for inter-protocol data conversion

    Science.gov (United States)

    Wu, Cheng; Huang, X. H. Hilda; Ng, Wai Man; Griffith, Stephen M.; Zhen Yu, Jian

    2016-09-01

    Organic carbon (OC) and elemental carbon (EC) are operationally defined by analytical methods. As a result, OC and EC measurements are protocol dependent, leading to uncertainties in their quantification. In this study, more than 1300 Hong Kong samples were analyzed using both National Institute for Occupational Safety and Health (NIOSH) thermal optical transmittance (TOT) and Interagency Monitoring of Protected Visual Environment (IMPROVE) thermal optical reflectance (TOR) protocols to explore the cause of EC disagreement between the two protocols. EC discrepancy mainly (83 %) arises from a difference in peak inert mode temperature, which determines the allocation of OC4NSH, while the rest (17 %) is attributed to a difference in the optical method (transmittance vs. reflectance) applied for the charring correction. Evidence shows that the magnitude of the EC discrepancy is positively correlated with the intensity of the biomass burning signal, whereby biomass burning increases the fraction of OC4NSH and widens the disagreement in the inter-protocol EC determination. It is also found that the EC discrepancy is positively correlated with the abundance of metal oxide in the samples. Two approaches (M1 and M2) that translate NIOSH TOT OC and EC data into IMPROVE TOR OC and EC data are proposed. M1 uses direct relationship between ECNSH_TOT and ECIMP_TOR for reconstruction: M1 : ECIMP_TOR = a × ECNSH_TOT + b; while M2 deconstructs ECIMP_TOR into several terms based on analysis principles and applies regression only on the unknown terms: M2 : ECIMP_TOR = AECNSH + OC4NSH - (a × PCNSH_TOR + b), where AECNSH, apparent EC by the NIOSH protocol, is the carbon that evolves in the He-O2 analysis stage, OC4NSH is the carbon that evolves at the fourth temperature step of the pure helium analysis stage of NIOSH, and PCNSH_TOR is the pyrolyzed carbon as determined by the NIOSH protocol. The implementation of M1 to all urban site data (without considering seasonal specificity

  9. Protocols of radiocontaminant air monitoring for inhalation exposure estimates

    International Nuclear Information System (INIS)

    Shinn, J.H.

    1995-09-01

    Monitoring the plutonium and americium particle emissions from soils contaminated during atmospheric nuclear testing or due to accidental releases is important for several reasons. First, it is important to quantify the extent of potential human exposure from inhalation of alpha-emitting particles, which is the major exposure pathway from transuranic radionuclides. Second, the information provided by resuspension monitoring is the basis of criteria that determine the target soil concentrations for management and cleanup of contaminated soil sites. There are other radioactive aerosols, such as the fission products (cesium and strontium) and neutron-activation products (europium isotopes), which may be resuspended and therefore necessary to monitor as well. This Standard Protocol (SP) provides the method used for radiocontaminant air monitoring by the Health and Ecological Assessment Division (formerly Environmental Sciences Division), Lawrence Livermore National Laboratory, as developed and tested at Nevada Test Site (NTS) and in the Marshall Islands. The objective of this SP is to document the applications and methods of monitoring of all the relevant variables. This protocol deals only with measuring air concentrations of radionuclides and total suspended particulates (TSP, or open-quotes dustclose quotes). A separate protocol presents the more difficult measurements required to determine transuranic aerosol emission rates, or open-quotes resuspension rateclose quotes

  10. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  11. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  12. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  13. Asymptotic adaptive bipartite entanglement-distillation protocol

    International Nuclear Information System (INIS)

    Hostens, Erik; Dehaene, Jeroen; De Moor, Bart

    2006-01-01

    We present an asymptotic bipartite entanglement-distillation protocol that outperforms all existing asymptotic schemes. This protocol is based on the breeding protocol with the incorporation of two-way classical communication. Like breeding, the protocol starts with an infinite number of copies of a Bell-diagonal mixed state. Breeding can be carried out as successive stages of partial information extraction, yielding the same result: one bit of information is gained at the cost (measurement) of one pure Bell state pair (ebit). The basic principle of our protocol is at every stage to replace measurements on ebits by measurements on a finite number of copies, whenever there are two equiprobable outcomes. In that case, the entropy of the global state is reduced by more than one bit. Therefore, every such replacement results in an improvement of the protocol. We explain how our protocol is organized as to have as many replacements as possible. The yield is then calculated for Werner states

  14. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  15. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  16. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  17. Contaminated Sites in Iowa

    Data.gov (United States)

    Iowa State University GIS Support and Research Facility — Sites contaminated by hazardous materials or wastes. These sites are those administered by the Contaminated Sites Section of Iowa DNR. Many are sites which are...

  18. JNC's experience of complementary accesses provided by the additional protocol

    International Nuclear Information System (INIS)

    Miura, Yasushi

    2001-01-01

    JNC (Japan Nuclear Cycle Development Institute) examined problems on implementation of the Additional Protocol to Japan/IAEA Safeguards Agreement with the Government of Japan and International Atomic Energy Agency through trials performed at Oarai Engineering Center before it entered into force. On December 16th 1999, the Additional Protocol entered into force, and in last January JNC provided the first JNC site information to STA. Then our Government provided it of all Japan to IAEA in last June. Also in this January, we sent the additional information changed from old one to MEXT (Ministry of Education, Culture, Sports, Science and Technology). The first Complementary Access of not only JNC but also Japan was implemented on JNC Ningyo-Toge Environmental Engineering Center on the end of last November. Since then, we have had over 10 times experience of Complementary Accesses for about one year especially on Tokai works and Ningyo-Toge. JNC's experience of Complementary Accesses will be introduced. (author)

  19. Clinical benefits after the implementation of a multimodal perioperative protocol in elderly patients.

    Science.gov (United States)

    Aguilar-Nascimento, José Eduardo de; Salomão, Alberto Bicudo; Caporossi, Cervantes; Diniz, Breno Nadaf

    2010-01-01

    Multimodal protocol of perioperative care may enhance recovery after surgery. Based on evidence these new routines of perioperative care changed conventional prescriptions in surgery. To evaluate the results of a multimodal protocol (ACERTO protocol) in elderly patients. Non-randomized historical cohort study was performed at the surgical ward of a tertiary university hospital. One hundred seventeen patients aged 60 and older were submitted to elective abdominal operations under either conventional (n = 42; conventional group, January 2004-June 2005) or a fast-track perioperative protocol named ACERTO (n = 75; ACERTO group, July 2005-December 2007). Main endpoints were preoperative fasting time, postoperative day of re-feeding, volume of intravenous fluids, length of hospital stay and morbidity. The implantation of the ACERTO protocol was followed by a decrease in both preoperative fasting (15 [8-20] vs 4 [2-20] hours, P<0.001) and postoperative day of refeeding (1st [1st-10th] vs 0 [0-5th] PO day; P<0.01), and intravenous fluids (10.7 [2.5-57.5] vs 2.5 [0.5-82] L, P<0.001). The changing of protocols reduced the mean length of hospital stay by 4 days (6[1-43] vs 2[1-97] days; P = 0.002) and surgical site infection rate by 85.7% (19%; 8/42 vs 2.7%; 2/75, P<0.001; relative risk = 1.20; 95% confidence interval = 1.03-1.39). Per-protocol analysis showed that hospital stay in major operations diminished only in patients who completed the protocol (P<0.01). The implementation of multidisciplinary routines of the ACERTO protocol diminished both hospitalization and surgical site infection in elderly patients submitted to abdominal operations.

  20. Protein blotting protocol for beginners.

    Science.gov (United States)

    Petrasovits, Lars A

    2014-01-01

    The transfer and immobilization of biological macromolecules onto solid nitrocellulose or nylon (polyvinylidene difluoride (PVDF)) membranes subsequently followed by specific detection is referred to as blotting. DNA blots are called Southerns after the inventor of the technique, Edwin Southern. By analogy, RNA blots are referred to as northerns and protein blots as westerns (Burnette, Anal Biochem 112:195-203, 1981). With few exceptions, western blotting involves five steps, namely, sample collection, preparation, separation, immobilization, and detection. In this chapter, protocols for the entire process from sample collection to detection are described.

  1. Optical protocols for terabit networks

    Science.gov (United States)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  2. A secure distributed logistic regression protocol for the detection of rare adverse drug events.

    Science.gov (United States)

    El Emam, Khaled; Samet, Saeed; Arbuckle, Luk; Tamblyn, Robyn; Earle, Craig; Kantarcioglu, Murat

    2013-05-01

    There is limited capacity to assess the comparative risks of medications after they enter the market. For rare adverse events, the pooling of data from multiple sources is necessary to have the power and sufficient population heterogeneity to detect differences in safety and effectiveness in genetic, ethnic and clinically defined subpopulations. However, combining datasets from different data custodians or jurisdictions to perform an analysis on the pooled data creates significant privacy concerns that would need to be addressed. Existing protocols for addressing these concerns can result in reduced analysis accuracy and can allow sensitive information to leak. To develop a secure distributed multi-party computation protocol for logistic regression that provides strong privacy guarantees. We developed a secure distributed logistic regression protocol using a single analysis center with multiple sites providing data. A theoretical security analysis demonstrates that the protocol is robust to plausible collusion attacks and does not allow the parties to gain new information from the data that are exchanged among them. The computational performance and accuracy of the protocol were evaluated on simulated datasets. The computational performance scales linearly as the dataset sizes increase. The addition of sites results in an exponential growth in computation time. However, for up to five sites, the time is still short and would not affect practical applications. The model parameters are the same as the results on pooled raw data analyzed in SAS, demonstrating high model accuracy. The proposed protocol and prototype system would allow the development of logistic regression models in a secure manner without requiring the sharing of personal health information. This can alleviate one of the key barriers to the establishment of large-scale post-marketing surveillance programs. We extended the secure protocol to account for correlations among patients within sites through

  3. Fault discovery protocol for passive optical networks

    Science.gov (United States)

    Hajduczenia, Marek; Fonseca, Daniel; da Silva, Henrique J. A.; Monteiro, Paulo P.

    2007-06-01

    All existing flavors of passive optical networks (PONs) provide an attractive alternative to legacy copper-based access lines deployed between a central office (CO) of the service provider (SP) and a customer site. One of the most challenging tasks for PON network planners is the reduction of the overall cost of employing protection schemes for the optical fiber plant while maintaining a reasonable level of survivability and reducing the downtime, thus ensuring acceptable levels of quality of service (QoS) for end subscribers. The recently growing volume of Ethernet PONs deployment [Kramer, IEEE 802.3, CFI (2006)], connected with low-cost electronic and optical components used in the optical network unit (ONU) modules, results in the situation where remote detection of faulty/active subscriber modules becomes indispensable for proper operation of an EPON system. The problem of the remote detection of faulty ONUs in the system is addressed where the upstream channel is flooded with the cw transmission from one or more damaged ONUs and standard communication is severed, providing a solution that is applicable in any type of PON network, regardless of the operating protocol, physical structure, and data rate.

  4. Using semantics for representing experimental protocols.

    Science.gov (United States)

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  5. Physical Therapy Protocols for Arthroscopic Bankart Repair.

    Science.gov (United States)

    DeFroda, Steven F; Mehta, Nabil; Owens, Brett D

    Outcomes after arthroscopic Bankart repair can be highly dependent on compliance and participation in physical therapy. Additionally, there are many variations in physician-recommended physical therapy protocols. The rehabilitation protocols of academic orthopaedic surgery departments vary widely despite the presence of consensus protocols. Descriptive epidemiology study. Level 3. Web-based arthroscopic Bankart rehabilitation protocols available online from Accreditation Council for Graduate Medical Education (ACGME)-accredited orthopaedic surgery programs were included for review. Individual protocols were reviewed to evaluate for the presence or absence of recommended therapies, goals for completion of ranges of motion, functional milestones, exercise start times, and recommended time to return to sport. Thirty protocols from 27 (16.4%) total institutions were identified out of 164 eligible for review. Overall, 9 (30%) protocols recommended an initial period of strict immobilization. Variability existed between the recommended time periods for sling immobilization (mean, 4.8 ± 1.8 weeks). The types of exercises and their start dates were also inconsistent. Goals to full passive range of motion (mean, 9.2 ± 2.8 weeks) and full active range of motion (mean, 12.2 ± 2.8 weeks) were consistent with other published protocols; however, wide ranges existed within the reviewed protocols as a whole. Only 10 protocols (33.3%) included a timeline for return to sport, and only 3 (10%) gave an estimate for return to game competition. Variation also existed when compared with the American Society of Shoulder and Elbow Therapists' (ASSET) consensus protocol. Rehabilitation protocols after arthroscopic Bankart repair were found to be highly variable. They also varied with regard to published consensus protocols. This discrepancy may lead to confusion among therapists and patients. This study highlights the importance of attending surgeons being very clear and specific with

  6. Site investigations: Strategy for rock mechanics site descriptive model

    International Nuclear Information System (INIS)

    Andersson, Johan; Christiansson, Rolf; Hudson, John

    2002-05-01

    As a part of the planning work for the Site Investigations, SKB has developed a Rock Mechanics Site Descriptive Modelling Strategy. Similar strategies are being developed for other disciplines. The objective of the strategy is that it should guide the practical implementation of evaluating site specific data during the Site Investigations. It is also understood that further development may be needed. This methodology enables the crystalline rock mass to be characterised in terms of the quality at different sites, for considering rock engineering constructability, and for providing the input to numerical models and performance assessment calculations. The model describes the initial stresses and the distribution of deformation and strength properties of the intact rock, of fractures and fracture zones, and of the rock mass. The rock mass mechanical properties are estimated by empirical relations and by numerical simulations. The methodology is based on estimation of mechanical properties using both empirical and heroretical/numerical approaches; and estimation of in situ rock stress using judgement and numerical modelling, including the influence of fracture zones. These approaches are initially used separately, and then combined to produce the required characterisation estimates. The methodology was evaluated with a Test Case at the Aespoe Hard Rock Laboratory in Sweden. The quality control aspects are an important feature of the methodology: these include Protocols to ensure the structure and coherence of the procedures used, regular meetings to enhance communication, feedback from internal and external reviewing, plus the recording of an audit trail of the development steps and decisions made. The strategy will be reviewed and, if required, updated as appropriate

  7. Site investigations: Strategy for rock mechanics site descriptive model

    Energy Technology Data Exchange (ETDEWEB)

    Andersson, Johan [JA Streamflow AB, Aelvsjoe (Sweden); Christiansson, Rolf [Swedish Nuclear Fuel and Waste Management Co., Stockholm (Sweden); Hudson, John [Rock Engineering Consultants, Welwyn Garden City (United Kingdom)

    2002-05-01

    As a part of the planning work for the Site Investigations, SKB has developed a Rock Mechanics Site Descriptive Modelling Strategy. Similar strategies are being developed for other disciplines. The objective of the strategy is that it should guide the practical implementation of evaluating site specific data during the Site Investigations. It is also understood that further development may be needed. This methodology enables the crystalline rock mass to be characterised in terms of the quality at different sites, for considering rock engineering constructability, and for providing the input to numerical models and performance assessment calculations. The model describes the initial stresses and the distribution of deformation and strength properties of the intact rock, of fractures and fracture zones, and of the rock mass. The rock mass mechanical properties are estimated by empirical relations and by numerical simulations. The methodology is based on estimation of mechanical properties using both empirical and heroretical/numerical approaches; and estimation of in situ rock stress using judgement and numerical modelling, including the influence of fracture zones. These approaches are initially used separately, and then combined to produce the required characterisation estimates. The methodology was evaluated with a Test Case at the Aespoe Hard Rock Laboratory in Sweden. The quality control aspects are an important feature of the methodology: these include Protocols to ensure the structure and coherence of the procedures used, regular meetings to enhance communication, feedback from internal and external reviewing, plus the recording of an audit trail of the development steps and decisions made. The strategy will be reviewed and, if required, updated as appropriate.

  8. Implementation of the Kyoto protocol

    International Nuclear Information System (INIS)

    2006-07-01

    The Rio Earth summit in 1992 has been the starting point of an international awareness about the global risk of climatic change. At this occasion, the richest countries committed themselves to stabilize their greenhouse gas emissions and to reach by the year 2000 an emissions level equivalent to the one of 1990. The Kyoto protocol in 1997 has permitted to convert this will into juridically constraining quantitative commitments. In 2005, Russia ratified the protocol while in 2001 the USA refused to do so. Because the commitments signed are ambitious, flexibility mechanisms have been implemented: 'emission permits' (emissions trading), 'joint implementation' allowing the investments abroad for greenhouse gases abatement in another developed country, and 'clean development mechanisms' when investments are made in a developing country. The Marrakech conference of December 2001 has permitted to fix up the eligibility criteria of projects belonging to the joint implementation and clean development mechanisms. The effective implementation of these mechanisms still raises technical difficulties to evaluate and measure the effective abatement of greenhouse gas emissions. (J.S.)

  9. Latest approaches of Kyoto protocol

    International Nuclear Information System (INIS)

    Matei, M.; Matei, L.

    2005-01-01

    Recently EURELECTRIC welcome the proposal of new EC Directive concerning the inclusion in the EU Emissions Trading Scheme (ETS) of credits from the project mechanisms - Joint Implementation (JI) and Clean Development Mechanism (CDM). The proposed Directive is an amendment to the EU Emissions Trading Directive adopted in June 2003. EURELECTRIC calls for unlimited use of credits in ETS. The draft Directive provides for the application of these mechanisms to begin as of 2008, on condition that the Kyoto Protocol does actually enter into force, an event which is still dependent on Russia's ratification. Such ratification has been subject to contradictory statements from the Russian Government, and the question of whether their signature to the Protocol is forthcoming is still fraught with uncertainty. Although it is not anticipated that significant quantities of JI or CDM certified credits will be available in the period 2005-2007, those that do become available would provide some additional liquidity in the emissions trading market. There is a direct relation between the coming ETS and electricity pricing: environmental policy is the driver, based on the need to switch to a low-carbon future and manage the necessary investments in a rational manner - and emissions trading is the best solution available. Romania has good opportunities to be involved in the greenhouse gases market, both in ETS and JI mechanisms. Some JI projects between Romanian and The Netherlands are already done or underway. (author)

  10. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  11. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  12. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... active and adaptive corruptions in the random oracle model. Due to its simplicity, the protocol is extremely efficient and it allows to perform m 1-out-of-n OTs using only: - Computation: (n+1)m+2 exponentiations (mn for the receiver, mn+2 for the sender) and - Communication: 32(m+1) bytes (for the group...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  13. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  14. Blockchain Consensus Protocols in the Wild

    OpenAIRE

    Cachin, Christian; Vukolić, Marko

    2017-01-01

    A blockchain is a distributed ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received renewed attention because they also address blockchain systems. This work discusses the process o...

  15. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol h...

  16. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  17. Bitcoin-NG: A Scalable Blockchain Protocol

    OpenAIRE

    Eyal, Ittay; Gencer, Adem Efe; Sirer, Emin Gun; van Renesse, Robbert

    2015-01-01

    Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is By...

  18. Telomerase Repeated Amplification Protocol (TRAP).

    Science.gov (United States)

    Mender, Ilgen; Shay, Jerry W

    2015-11-20

    Telomeres are found at the end of eukaryotic linear chromosomes, and proteins that bind to telomeres protect DNA from being recognized as double-strand breaks thus preventing end-to-end fusions (Griffith et al. , 1999). However, due to the end replication problem and other factors such as oxidative damage, the limited life span of cultured cells (Hayflick limit) results in progressive shortening of these protective structures (Hayflick and Moorhead, 1961; Olovnikov, 1973). The ribonucleoprotein enzyme complex telomerase-consisting of a protein catalytic component hTERT and a functional RNA component hTR or hTERC - counteracts telomere shortening by adding telomeric repeats to the end of chromosomes in ~90% of primary human tumors and in some transiently proliferating stem-like cells (Shay and Wright, 1996; Shay and Wright, 2001). This results in continuous proliferation of cells which is a hallmark of cancer. Therefore, telomere biology has a central role in aging, cancer progression/metastasis as well as targeted cancer therapies. There are commonly used methods in telomere biology such as Telomere Restriction Fragment (TRF) (Mender and Shay, 2015b), Telomere Repeat Amplification Protocol (TRAP) and Telomere dysfunction Induced Foci (TIF) analysis (Mender and Shay, 2015a). In this detailed protocol we describe Telomere Repeat Amplification Protocol (TRAP). The TRAP assay is a popular method to determine telomerase activity in mammalian cells and tissue samples (Kim et al. , 1994). The TRAP assay includes three steps: extension, amplification, and detection of telomerase products. In the extension step, telomeric repeats are added to the telomerase substrate (which is actually a non telomeric oligonucleotide, TS) by telomerase. In the amplification step, the extension products are amplified by the polymerase chain reaction (PCR) using specific primers (TS upstream primer and ACX downstream primer) and in the detection step, the presence or absence of telomerase is

  19. Search and nonsearch protocols for radiographic consultation

    International Nuclear Information System (INIS)

    Swensson, R.G.; Theodore, G.H.

    1989-01-01

    Six radiologists, acting as film reviewers, used two different consultation protocols to differentiate among 292 ambiguous findings on chest films: 120 simulated nodules and 172 normal findings (previous readers' false-positive reports of nodules). The non-search protocol identified each finding (by location), and reviewers rated its likelihood as a nodule. The search protocol, which asked reviewers to report and rate all locations regarded as possible nodules on each film, assigned a default negative rating to any unreported finding (nodule or normal). Receiver operator characteristic analyses demonstrated a significantly higher accuracy for each reviewer's search- protocol discriminations between these nodules and confusing normal findings

  20. Adaptive Protocols for Mobile Wireless Networks

    National Research Council Canada - National Science Library

    Pursley, Michael B

    2005-01-01

    .... Research results are presented on adaptive, energy-efficient, distributed protocols for mobile wireless networks that must operate effectively over unreliable communication links in highly dynamic...

  1. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  2. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  3. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  4. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  5. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  6. Combined Protocol for Acute Malnutrition Study (ComPAS) in rural South Sudan and urban Kenya

    DEFF Research Database (Denmark)

    Bailey, Jeanette; Lelijveld, Natasha; Marron, Bethany

    2018-01-01

    Background: Acute malnutrition is a continuum condition, but severe and moderate forms are treated separately, with different protocols and therapeutic products, managed by separate United Nations agencies. The Combined Protocol for Acute Malnutrition Study (ComPAS) aims to simplify and unify...... the treatment of uncomplicated severe and moderate acute malnutrition (SAM and MAM) for children 6-59 months into one protocol in order to improve the global coverage, quality, continuity of care and cost-effectiveness of acute malnutrition treatment in resource-constrained settings.  Methods/design: This study...... is a multi-site, cluster randomized non-inferiority trial with 12 clusters in Kenya and 12 clusters in South Sudan. Participants are 3600 children aged 6-59 months with uncomplicated acute malnutrition. This study will evaluate the impact of a simplified and combined protocol for the treatment of SAM and MAM...

  7. Nuclear installations sites safety

    International Nuclear Information System (INIS)

    Barber, P.; Candes, P.; Duclos, P.; Doumenc, A.; Faure, J.; Hugon, J.; Mohammadioun, B.

    1988-11-01

    This report is divided into ten parts bearing: 1 Safety analysis procedures for Basis Nuclear Installations sites (BNI) in France 2 Site safety for BNI in France 3 Industrial and transport activities risks for BNI in France 4 Demographic characteristics near BNI sites in France 5 Meteorologic characteristics of BNI sites in France 6 Geological aspects near the BNI sites in France 7 Seismic studies for BNI sites in France 8 Hydrogeological aspects near BNI sites in France 9 Hydrological aspects near BNI sites in France 10 Ecological and radioecological studies of BNI sites in France [fr

  8. Secure Multi-Player Protocols

    DEFF Research Database (Denmark)

    Fehr, Serge

    While classically cryptography is concerned with the problem of private communication among two entities, say players, in modern cryptography multi-player protocols play an important role. And among these, it is probably fair to say that secret sharing, and its stronger version verifiable secret...... sharing (VSS), as well as multi-party computation (MPC) belong to the most appealing and/or useful ones. The former two are basic tools to achieve better robustness of cryptographic schemes against malfunction or misuse by “decentralizing” the security from one single to a whole group of individuals...... (captured by the term threshold cryptography). The latter allows—at least in principle—to execute any collaboration among a group of players in a secure way that guarantees the correctness of the outcome but simultaneously respects the privacy of the participants. In this work, we study three aspects...

  9. Software for simulating IMRT protocol

    Energy Technology Data Exchange (ETDEWEB)

    Fonseca, Thelma C.F.; Campos, Tarcisio P.R. de, E-mail: tcff@ufmg.b, E-mail: campos@nuclear.ufmg.b [Universidade Federal de Minas Gerais (UFMG), Belo Horizonte, MG (Brazil). Dept. de Engenharia Nuclear

    2009-07-01

    The Intensity Modulated Radiation Therapy - IMRT is an advanced technique to cancer treatment widely used on oncology around the world. The present paper describes the SOFT-RT software which is a tool for simulating IMRT protocol. Also, it will be present a cerebral tumor case of studied in which three irradiation windows with distinct orientation were applied. The SOFT-RT collect and export data to MCNP code. This code simulates the photon transport on the voxel model. Later, a out-module from SOFT-RT import the results and express the dose-response superimposing dose and voxel model in a tree-dimensional graphic representation. The present paper address the IMRT software and its function as well a cerebral tumor case of studied is showed. The graphic interface of the SOFT-RT illustrates the example case. (author)

  10. Software for simulating IMRT protocol

    International Nuclear Information System (INIS)

    Fonseca, Thelma C.F.; Campos, Tarcisio P.R. de

    2009-01-01

    The Intensity Modulated Radiation Therapy - IMRT is an advanced technique to cancer treatment widely used on oncology around the world. The present paper describes the SOFT-RT software which is a tool for simulating IMRT protocol. Also, it will be present a cerebral tumor case of studied in which three irradiation windows with distinct orientation were applied. The SOFT-RT collect and export data to MCNP code. This code simulates the photon transport on the voxel model. Later, a out-module from SOFT-RT import the results and express the dose-response superimposing dose and voxel model in a tree-dimensional graphic representation. The present paper address the IMRT software and its function as well a cerebral tumor case of studied is showed. The graphic interface of the SOFT-RT illustrates the example case. (author)

  11. Fetal MRI: techniques and protocols

    International Nuclear Information System (INIS)

    Prayer, Daniela; Brugger, Peter Christian; Prayer, Lucas

    2004-01-01

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  12. Analysing Protocol Stacks for Services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    We show an approach, CaPiTo, to model service-oriented applications using process algebras such that, on the one hand, we can achieve a certain level of abstraction without being overwhelmed by the underlying implementation details and, on the other hand, we respect the concrete industrial...... standards used for implementing the service-oriented applications. By doing so, we will be able to not only reason about applications at different levels of abstractions, but also to build a bridge between the views of researchers on formal methods and developers in industry. We apply our approach...... to the financial case study taken from Chapter 0-3. Finally, we develop a static analysis to analyse the security properties as they emerge at the level of concrete industrial protocols....

  13. Protocol Monitoring Passive Solar Energy

    International Nuclear Information System (INIS)

    Van den Ham, E.R.; Bosselaar, L.

    1998-01-01

    A method has been developed by means of which the contribution of passive solar energy to the Dutch energy balance can be quantified univocally. The contribution was 57 PJ in 1990 and also 57 PJ in 1995. The efficiency of passive solar energy systems increased from -31.5% to -28.1% in the period 1990-1995, mainly as a result of the use of extra insulating glazing. As a result of the reduction of energy consumption for heating in houses it is expected that the extra contribution of 2 PJ will not be realized in the year 2010. It is suggested that the method to determine the absolute contribution of passive solar energy to the energy demand of dwellings is to be included in the protocol monitoring renewable energy. For the method to be included in the energy statistics of Statistics Netherlands (CBS) it can be considered only to take into account the difference compared to 1990. 11 refs

  14. Fetal MRI: techniques and protocols

    Energy Technology Data Exchange (ETDEWEB)

    Prayer, Daniela [Department of Neuroradiology, University Clinics of Radiodiagnostics, Medical University Vienna, Waehringerguertel 18-10, 1090, Vienna (Austria); Brugger, Peter Christian [Department of Anatomy, Integrative Morphology Group, Medical University Vienna (Austria); Prayer, Lucas [Diagnosezentrum Urania, Vienna (Austria)

    2004-09-01

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  15. Social Media Sites

    Science.gov (United States)

    Media Sites Site Registration Contact Us Search AF.mil: Home > AF Sites > Social Media Sites Social Media Welcome to the Air Force social media directory! The directory is a one-stop shop of official Air Force social media pages across various social media sites. Social media is all about

  16. Site selection for new nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Rizzo, Paul C.; Dubinsky, Melissa; Tastan, Erdem Onur, E-mail: paul.rizzo@rizzoassoc.com, E-mail: melissa.dubinsky@rizzoassoc.com, E-mail: onur.tastan@rizzoassoc.com [RIZZO Associates Inc., Pittsburgh, PA (United States); Miano, Sandra C., E-mail: scm27@psu.edu [Eletrobras Termonuclear S.A. (ELETRONUCLEAR), RJ (Brazil); Pennsylvania State University, Department of Mechanical and Nuclear Engineering, State College, PA (United States)

    2015-07-01

    The current methodology for selecting the most advantageous site(s) for nuclear power plant (NPP) development is based on the latest evolution of protocols originally established in the 1990's by the Electric Power Research Institute (EPRI) and others for programs in the USA, and more recently by the International Atomic Energy Agency (IAEA), among others. The methodology includes protocols that account for lessons learned from both the Gen III projects and the catastrophic event at Fukushima, Japan. In general, the approach requires consideration of Exclusionary or 'fatal flaw' Criteria first, based on safety as well as significant impact to the environment or human health. Sites must meet all of these Exclusionary Criteria to be considered for NPP development. Next, the remaining sites are evaluated for Avoidance Criteria that affect primarily ease of construction and operations, which allow a ranking of sites best suited for NPP development. Finally, Suitability Criteria are applied to the potential sites to better differentiate between closely ranked sites. Generally, final selection of a Preferred and an Alternate Site will require balancing of factors, expert judgment, and client input, as sites being compared will differ in their scores associated with different Avoidance Criteria and Suitability Criteria. RIZZO Associates (RIZZO) offers in this paper a modification to this methodology for selecting the site for NPP development, which accords to the categories of Exclusionary, Avoidance and Suitability Criteria strict definitions which can be considered as Absolute Factors, Critical Factors, and Economic Factors for a more focused approach to site selection. Absolute Factors include all of the safety-related Exclusionary Criteria. Critical Factors are those that are difficult to overcome unless extraordinary mitigation measures are implemented; they have a significant impact on the ability of the project to be successful and may cause the

  17. Site selection for new nuclear power plants

    International Nuclear Information System (INIS)

    Rizzo, Paul C.; Dubinsky, Melissa; Tastan, Erdem Onur; Miano, Sandra C.

    2015-01-01

    The current methodology for selecting the most advantageous site(s) for nuclear power plant (NPP) development is based on the latest evolution of protocols originally established in the 1990's by the Electric Power Research Institute (EPRI) and others for programs in the USA, and more recently by the International Atomic Energy Agency (IAEA), among others. The methodology includes protocols that account for lessons learned from both the Gen III projects and the catastrophic event at Fukushima, Japan. In general, the approach requires consideration of Exclusionary or 'fatal flaw' Criteria first, based on safety as well as significant impact to the environment or human health. Sites must meet all of these Exclusionary Criteria to be considered for NPP development. Next, the remaining sites are evaluated for Avoidance Criteria that affect primarily ease of construction and operations, which allow a ranking of sites best suited for NPP development. Finally, Suitability Criteria are applied to the potential sites to better differentiate between closely ranked sites. Generally, final selection of a Preferred and an Alternate Site will require balancing of factors, expert judgment, and client input, as sites being compared will differ in their scores associated with different Avoidance Criteria and Suitability Criteria. RIZZO Associates (RIZZO) offers in this paper a modification to this methodology for selecting the site for NPP development, which accords to the categories of Exclusionary, Avoidance and Suitability Criteria strict definitions which can be considered as Absolute Factors, Critical Factors, and Economic Factors for a more focused approach to site selection. Absolute Factors include all of the safety-related Exclusionary Criteria. Critical Factors are those that are difficult to overcome unless extraordinary mitigation measures are implemented; they have a significant impact on the ability of the project to be successful and may cause the

  18. Examining recombinant human TSH primed {sup 131}I therapy protocol in patients with metastatic differentiated thyroid carcinoma: comparison with the traditional thyroid hormone withdrawal protocol

    Energy Technology Data Exchange (ETDEWEB)

    Rani, Deepa; Kaisar, Sushma; Awasare, Sushma; Kamaldeep; Abhyankar, Amit; Basu, Sandip [Bhabha Atomic Research Centre (BARC), Radiation Medicine Centre, Mumbai (India)

    2014-09-15

    the difference was not found to be statistically significant (p = 0.301). The mean tumor radiation absorbed dose per mCi was less during the rhTSH protocol (6.04 rad/mCi) than during the thyroid hormone withdrawal protocol (8.68 rad/mCi), and the difference was statistically significant (p = 0.049), though visual analysis of the rhTSH posttherapy scans showed avid concentration of {sup 131}I in the metastatic sites and revealed more lesions in 30 % of the patients compared to the traditional large dose scan and equal number of lesions in 65 % of the patients. Visual analysis of the traditional large dose scan, rhTSH pretreatment scan, and rhTSH posttherapy scans showed that the traditional large dose scan is better compared to the rhTSH 1 mCi scan as it showed more lesions in 19 of 37 patients (51.35 %). rhTSH posttherapy scans were better compared to the traditional large dose scans and rhTSH pretreatment scans. More lesions were seen on rhTSH posttherapy scans in 11 of 37 patients (29.7 %) compared to the traditional large dose scans and in 24 of 37 (64.86 %) patients compared to the rhTSH 1 mCi scans. Our findings demonstrate that the rhTSH primed pretreatment scan undertaken at 24 h after diagnostic dose is suboptimal to evaluate whether a metastatic lesion concentrates {sup 131}I. The majority of these lesions demonstrated radioiodine accumulation in the posttreatment scan. Quality of life as assessed using EORTC QOL-3 forms clearly showed that rhTSH improved the quality of life of patients compared to the thyroid hormone withdrawal protocol. Functional scale and global health status were significantly better in the rhTSH protocol compared to the thyroid hormone withdrawal protocol (p < 0.001). The mean symptom scale score was significantly higher in the thyroid hormone withdrawal protocol (45.25) compared to the rhTSH protocol (13.59) (p < 0.001). Of the 20 patients, 4 (20 %) had more than 25 % increase in the TG value on follow-up. The median hospital stay of

  19. Design, Implementation, and Verification of the Reliable Multicast Protocol. Thesis

    Science.gov (United States)

    Montgomery, Todd L.

    1995-01-01

    This document describes the Reliable Multicast Protocol (RMP) design, first implementation, and formal verification. RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service. RMP is fully and symmetrically distributed so that no site bears an undue portion of the communications load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These guarantees are selectable on a per message basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, a client/server model of delivery, mutually exclusive handlers for messages, and mutually exclusive locks. It has been commonly believed that total ordering of messages can only be achieved at great performance expense. RMP discounts this. The first implementation of RMP has been shown to provide high throughput performance on Local Area Networks (LAN). For two or more destinations a single LAN, RMP provides higher throughput than any other protocol that does not use multicast or broadcast technology. The design, implementation, and verification activities of RMP have occurred concurrently. This has allowed the verification to maintain a high fidelity between design model, implementation model, and the verification model. The restrictions of implementation have influenced the design earlier than in normal sequential approaches. The protocol as a whole has matured smoother by the inclusion of several different perspectives into the product development.

  20. A markerless protocol for genetic analysis of Aggregatibacter actinomycetemcomitans

    Science.gov (United States)

    Cheng, Ya-An; Jee, Jason; Hsu, Genie; Huang, Yanyan; Chen, Casey; Lin, Chun-Pin

    2015-01-01

    Background/Purpose The genomes of different Aggregatibacter actinomycetemcomitans strains contain many strain-specific genes and genomic islands (defined as DNA found in some but not all strains) of unknown functions. Genetic analysis for the functions of these islands will be constrained by the limited availability of genetic markers and vectors for A. actinomycetemcomitans. In this study we tested a novel genetic approach of gene deletion and restoration in a naturally competent A. actinomycetemcomitans strain D7S-1. Methods Specific genes’ deletion mutants and mutants restored with the deleted genes were constructed by a markerless loxP/Cre system. In mutants with sequential deletion of multiple genes loxP with different spacer regions were used to avoid unwanted recombinations between loxP sites. Results Eight single-gene deletion mutants, four multiple-gene deletion mutants, and two mutants with restored genes were constructed. No unintended non-specific deletion mutants were generated by this protocol. The protocol did not negatively affect the growth and biofilm formation of A. actinomycetemcomitans. Conclusion The protocol described in this study is efficient and specific for genetic manipulation of A. actinomycetemcomitans, and will be amenable for functional analysis of multiple genes in A. actinomycetemcomitans. PMID:24530245

  1. Ocean Disposal Site Monitoring

    Science.gov (United States)

    EPA is responsible for managing all designated ocean disposal sites. Surveys are conducted to identify appropriate locations for ocean disposal sites and to monitor the impacts of regulated dumping at the disposal sites.

  2. Promoting Your Web Site.

    Science.gov (United States)

    Raeder, Aggi

    1997-01-01

    Discussion of ways to promote sites on the World Wide Web focuses on how search engines work and how they retrieve and identify sites. Appropriate Web links for submitting new sites and for Internet marketing are included. (LRW)

  3. Particle Physics Education Sites

    Science.gov (United States)

    back to home page Particle Physics Education Sites quick reference Education and Information - National Laboratory Education Programs - Women and Minorities in Physics - Other Physics Sites - Physics Alliance - Accelerators at National Laboratories icon Particle Physics Education and Information sites: top

  4. 75 FR 74007 - Federal Aquatic Nuisance Species Research Risk Analysis Protocol

    Science.gov (United States)

    2010-11-30

    ... site, http://anstaskforce.gov/documents.php . To obtain a hard copy of the Protocol, see Document... aquatic species that are the target of this risk analysis. Language used in the NANPCA differentiates...: http://anstaskforce.gov/documents.php Write: Susan Pasko, National Oceanic and Atmospheric...

  5. Exploring two methods of usability testing: concurrent versus retrospective think-aloud protocols

    NARCIS (Netherlands)

    van den Haak, M.J.; de Jong, Menno D.T.

    2003-01-01

    Think-aloud protocols are commonly used for the usability testing of instructional documents, Web sites and interfaces. This paper addresses the benefits and drawbacks of two think-aloud variations: the traditional concurrent think-aloud method and the less familiar retrospective think-aloud

  6. Exploring Two Methods of Usability Testing : Concurrent versus Retrospective Think-Aloud Protocols

    NARCIS (Netherlands)

    Van den Haak, Maaike J.; De Jong, Menno D. T.

    2003-01-01

    Think-aloud protocols are commonly used for the usability testing of instructional documents, web sites and interfaces. This paper addresses the benefits and drawbacks of two think-aloud variations: the traditional concurrent think-aloud method and the less familiar retrospective think-aloud

  7. Wind power agreement protocol; Protocole d'accord eolien

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-10-01

    The aim of this protocol of agreement is to propose to wind turbine fitters some models of contracts allowing the setting up of wind turbines on agricultural lots. These documents, which make an indissociable ensemble, apply to both phases of development of a wind power project: the feasibility study phase, for a duration comprised between 2 and 5 years (studies, administrative procedures, precise definition of the project), and the construction, exploitation and dismantling phase. These documents will serve as common guidelines for both the farmers and the wind turbine designers. Both parties agree to meet together in the future to propose some modifications of these texts if necessary. The four models of contracts are attached to the document: contract for the feasibility study phase, first contract between the landlord and the farmer for the cancellation of the rural lease, second contract between the landlord and the wind power exploitation company for the common right lease, and the third contract between the farmer and the wind power company for the indemnification convention. (J.S.)

  8. Hanford Site Development Plan

    Energy Technology Data Exchange (ETDEWEB)

    Rinne, C.A.; Curry, R.H.; Hagan, J.W.; Seiler, S.W.; Sommer, D.J. (Westinghouse Hanford Co., Richland, WA (USA)); Yancey, E.F. (Pacific Northwest Lab., Richland, WA (USA))

    1990-01-01

    The Hanford Site Development Plan (Site Development Plan) is intended to guide the short- and long-range development and use of the Hanford Site. All acquisition, development, and permanent facility use at the Hanford Site will conform to the approved plan. The Site Development Plan also serves as the base document for all subsequent studies that involve use of facilities at the Site. This revision is an update of a previous plan. The executive summary presents the highlights of the five major topics covered in the Site Development Plan: general site information, existing conditions, planning analysis, Master Plan, and Five-Year Plan. 56 refs., 67 figs., 31 tabs.

  9. Hanford Site Development Plan

    International Nuclear Information System (INIS)

    Rinne, C.A.; Curry, R.H.; Hagan, J.W.; Seiler, S.W.; Sommer, D.J.; Yancey, E.F.

    1990-01-01

    The Hanford Site Development Plan (Site Development Plan) is intended to guide the short- and long-range development and use of the Hanford Site. All acquisition, development, and permanent facility use at the Hanford Site will conform to the approved plan. The Site Development Plan also serves as the base document for all subsequent studies that involve use of facilities at the Site. This revision is an update of a previous plan. The executive summary presents the highlights of the five major topics covered in the Site Development Plan: general site information, existing conditions, planning analysis, Master Plan, and Five-Year Plan. 56 refs., 67 figs., 31 tabs

  10. Analysis of a security protocol in ?CRL

    NARCIS (Netherlands)

    J. Pang

    2002-01-01

    textabstractNeedham-Schroeder public-key protocol; With the growth and commercialization of the Internet, the security of communication between computers becomes a crucial point. A variety of security protocols based on cryptographic primitives are used to establish secure communication over

  11. An Argument Approach to Observation Protocol Validity

    Science.gov (United States)

    Bell, Courtney A.; Gitomer, Drew H.; McCaffrey, Daniel F.; Hamre, Bridget K.; Pianta, Robert C.; Qi, Yi

    2012-01-01

    This article develops a validity argument approach for use on observation protocols currently used to assess teacher quality for high-stakes personnel and professional development decisions. After defining the teaching quality domain, we articulate an interpretive argument for observation protocols. To illustrate the types of evidence that might…

  12. Model checking the HAVi leader election protocol

    NARCIS (Netherlands)

    J.M.T. Romijn (Judi)

    1999-01-01

    textabstractThe HAVi specification proposes an architecture for audio/video interoperability in home networks. Part of the HAVi specification is a distributed leader election protocol. We have modelled this leader election protocol in Promela and Lotos and have checked several properties with the

  13. Climate Change And The Kyoto Protocol

    International Nuclear Information System (INIS)

    Comsan, M.N.H.

    2007-01-01

    The problem of global warming is addressed. Changes in earth surface temperature, emission of CO 2 and other four major green house gases are presented. Effect of global warming on weather, ocean, and ecosystem is discussed. A brief history of the Kyoto protocol starting from the 151 Earth Summit in 1972 is outlined. An overview of the protocol and a brief summary are given

  14. Kyoto Protocol: trade versus the environment

    International Nuclear Information System (INIS)

    Loose, H.

    2001-01-01

    Could the signatories to the Kyoto Protocol find themselves up against the WTO? This paper examines how the climate change agreement could conflict with trade rules, and shows that there are potentially serious conflicts in the interface between the WTO and the Kyoto Protocol. It argues for dialogue and debate before it is too late. (author)

  15. Network Coding Protocols for Smart Grid Communications

    DEFF Research Database (Denmark)

    Prior, Rui; Roetter, Daniel Enrique Lucani; Phulpin, Yannick

    2014-01-01

    We propose a robust network coding protocol for enhancing the reliability and speed of data gathering in smart grids. At the heart of our protocol lies the idea of tunable sparse network coding, which adopts the transmission of sparsely coded packets at the beginning of the transmission process b...

  16. Results of ERAS protocol in patients with colorectal cancer

    Directory of Open Access Journals (Sweden)

    A. O. Rasulov

    2016-01-01

    Full Text Available Objective: explore the use of enhanced recovery after surgery (ERAS in the treatment of patients with colorectal cancer, evaluate its efficacy and safety.Materials and methods. Prospective, single-site, randomized study for the implementation of enhanced recovery after surgery in patients with colorectal cancer has been conducted from October 2014 till the present time. All patients after laparoscopic surgeries undergo treatment according to ERAS protocol, patients after open surgeries are randomized (1:1 in groups of the standard treatment or treatment according to ERAS protocol. The study included patients with localized and locally disseminated colorectal cancer aged from 18 to 75 years, ECOG score ≤ 2. The primary evaluated parameters were the following: the number of postoperative complications (according to Clavien– Dindo classification, postoperative hospital days, incidence of complications and mortality in the 30-day period, timing of activation.Results. Up to date, the study includes 105 patients: laparoscopic group – 51 patients, open-surgery group of patients treated by ERAS protocol – 27 patients, open-surgery group of patients with the standard post-op treatment – 26 patients. Complications requiring emergency surgery for anastomotic leak (p = 0.159 developed in 3.7 % of patients with the standard post-op treatment and in 3.9 % of patients after laparoscopic surgery, while 1 patient required repeat hospitalization. The total number of complications was significantly lower in opensurgery group of patients treated by ERAS protocol compared with the standard post-op treatment (p = 0.021. However, there were no differences between laparoscopic and open-surgery group with the standard post-op treatment (p = 0.159. An average hospitalization stay in patients with the standard post-op treatment was equal to 10 days compared to 7 days in patients treated by ERAS protocol (p = 0.067 and 6 days after laparoscopic

  17. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  18. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  19. Nucleic acid protocols: Extraction and optimization

    Directory of Open Access Journals (Sweden)

    Saeed El-Ashram

    2016-12-01

    Full Text Available Yield and quality are fundamental features for any researchers during nucleic acid extraction. Here, we describe a simplified, semi-unified, effective, and toxic material free protocol for extracting DNA and RNA from different prokaryotic and eukaryotic sources exploiting the physical and chemical properties of nucleic acids. Furthermore, this protocol showed that DNA and RNA are under triple protection (i.e. EDTA, SDS and NaCl during lysis step, and this environment is improper for RNase to have DNA liberated of RNA and even for DNase to degrade the DNA. Therefore, the complete removal of RNA under RNase influence is achieved when RNase is added after DNA extraction, which gives optimal quality with any protocols. Similarly, DNA contamination in an isolated RNA is degraded by DNase to obtain high-quality RNA. Our protocol is the protocol of choice in terms of simplicity, recovery time, environmental safety, amount, purity, PCR and RT-PCR applicability.

  20. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  1. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  2. SITE COMPREHENSIVE LISTING (CERCLIS) (Superfund) - NPL Sites

    Data.gov (United States)

    U.S. Environmental Protection Agency — National Priorities List (NPL) Sites - The Comprehensive Environmental Response, Compensation and Liability Information System (CERCLIS) (Superfund) Public Access...

  3. Superfund Site Information - Site Sampling Data

    Data.gov (United States)

    U.S. Environmental Protection Agency — This asset includes Superfund site-specific sampling information including location of samples, types of samples, and analytical chemistry characteristics of...

  4. A family of multi-party authentication protocols

    NARCIS (Netherlands)

    Cremers, C.J.F.; Mauw, S.

    2006-01-01

    We introduce a family of multi-party authentication protocols and discuss six novel protocols, which are members of this family. The first three generalize the well-known Needham-Schroeder-Lowe public-key protocol, the Needham-Schroeder private-key protocol, and the Bilateral Key Exchange protocol.

  5. Universally composable protocols with relaxed set-up assumptions

    DEFF Research Database (Denmark)

    Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus

    2004-01-01

    A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally composable (UC) protocols provide this guarantee in a strong sense: A protocol remains secure even when composed concurrently with an unbounded number of ...

  6. Examining recombinant human TSH primed 131I therapy protocol in patients with metastatic differentiated thyroid carcinoma: comparison with the traditional thyroid hormone withdrawal protocol

    International Nuclear Information System (INIS)

    Rani, Deepa; Kaisar, Sushma; Awasare, Sushma; Kamaldeep; Abhyankar, Amit; Basu, Sandip

    2014-01-01

    difference was not found to be statistically significant (p = 0.301). The mean tumor radiation absorbed dose per mCi was less during the rhTSH protocol (6.04 rad/mCi) than during the thyroid hormone withdrawal protocol (8.68 rad/mCi), and the difference was statistically significant (p = 0.049), though visual analysis of the rhTSH posttherapy scans showed avid concentration of 131 I in the metastatic sites and revealed more lesions in 30 % of the patients compared to the traditional large dose scan and equal number of lesions in 65 % of the patients. Visual analysis of the traditional large dose scan, rhTSH pretreatment scan, and rhTSH posttherapy scans showed that the traditional large dose scan is better compared to the rhTSH 1 mCi scan as it showed more lesions in 19 of 37 patients (51.35 %). rhTSH posttherapy scans were better compared to the traditional large dose scans and rhTSH pretreatment scans. More lesions were seen on rhTSH posttherapy scans in 11 of 37 patients (29.7 %) compared to the traditional large dose scans and in 24 of 37 (64.86 %) patients compared to the rhTSH 1 mCi scans. Our findings demonstrate that the rhTSH primed pretreatment scan undertaken at 24 h after diagnostic dose is suboptimal to evaluate whether a metastatic lesion concentrates 131 I. The majority of these lesions demonstrated radioiodine accumulation in the posttreatment scan. Quality of life as assessed using EORTC QOL-3 forms clearly showed that rhTSH improved the quality of life of patients compared to the thyroid hormone withdrawal protocol. Functional scale and global health status were significantly better in the rhTSH protocol compared to the thyroid hormone withdrawal protocol (p 131 I therapy with the rhTSH protocol was shorter (2 days, range 2-8 days) compared to the thyroid hormone withdrawal protocol (3 days, range 1-8 days) and the difference was found to be statistically significant (p = 0.007). The mean serum creatinine level was significantly lower in the rhTSH protocol

  7. Live chat alternative security protocol

    Science.gov (United States)

    Rahman, J. P. R.; Nugraha, E.; Febriany, A.

    2018-05-01

    Indonesia is one of the largest e-commerce markets in Southeast Asia, as many as 5 million people do transactions in e-commerce, therefore more and more people use live chat service to communicate with customer service. In live chat, the customer service often asks customers’ data such as, full name, address, e-mail, transaction id, which aims to verify the purchase of the product. One of the risks that will happen is sniffing which will lead to the theft of confidential information that will cause huge losses to the customer. The anticipation that will be done is build an alternative security protocol for user interaction in live chat by using a cryptographic algorithm that is useful for protecting confidential messages. Live chat requires confidentiality and data integration with encryption and hash functions. The used algorithm are Rijndael 256 bits, RSA, and SHA256. To increase the complexity, the Rijndael algorithm will be modified in the S-box and ShiftRow sections based on the shannon principle rule, the results show that all pass the Randomness test, but the modification in Shiftrow indicates a better avalanche effect. Therefore the message will be difficult to be stolen or changed.

  8. Site specific information in site selection

    International Nuclear Information System (INIS)

    Aeikaes, T.; Hautojaervi, A.

    1998-01-01

    The programme for the siting of a deep repository for final disposal of spent nuclear fuel was started already in 1983 and is carried out today by Posiva Oy which continues the work started by Teollisuuden Voima Oy. The programme aims at site selection by the end of the year 2000. The programme has progressed in successive interim stages with defined goals. After an early phase for site identification, five sites were selected in 1987 for preliminary site characterisation. Three of these were selected and judged to be best suited for the more detailed characterisation in 1992. An additional new site was included into the programme based on a separate feasibility study in the beginning of 1997. Since the year 1983 several safety assessments together with technical plans of the facility have been completed. When approaching the site selection the needs for more detailed consideration of the site specific properties in the safety assessment have been increased. The Finnish regulator STUK has published a proposal for general safety requirements for the final disposal of spent nuclear fuel in Finland. This set of requirements has been projected to be used in conjunction of the decision making by the end 2000. Based on the site evaluation all sites can provide a stable environment and there is evidence that the requirements for the longevity of the canister can be fulfilled at each site. In this manner the four candidate sites do not differ too much from each other. The main difference between the sites is in the salinity of the deep groundwater. The significance of differences in the salinity for the long-term safety cannot be defined yet. The differences may contribute to the discussion of the longevity of the bentonite buffer and also to the modelling of the groundwater flow and transport. The use of the geosphere as a transport barrier is basically culminated on the questions about sparse but fast flow routes and 'how bad channeling can be'. To answer these questions

  9. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  10. Guideline for environmental site investigations in Manitoba : June 1998

    International Nuclear Information System (INIS)

    1998-06-01

    The procedures for the investigation and characterization of contaminated sites in Manitoba are described in an effort to provide a baseline for developing applicable risk-based remedial action and management plans. This document presents information regarding the methods and protocols for sites where the quality of groundwater, surface water, sediments or soil may have been affected by pollutants as a result of past or present usage of the site. The 1998 document focuses on petroleum impacted sites and also includes the requirements for the investigation of sites potentially impacted by other pollutants. It is based on the principles established by the Canadian Council of Ministers of the Environment for the management of sites in Canada and the requirements of the Manitoba Contaminated Sites Remediation and Consequential Amendments Act. Manitoba's petroleum storage program and the hazardous waste management program, including the disposal or treatment of contaminated soils are also summarized

  11. Hanford Site Development Plan

    International Nuclear Information System (INIS)

    Hathaway, H.B.; Daly, K.S.; Rinne, C.A.; Seiler, S.W.

    1993-05-01

    The Hanford Site Development Plan (HSDP) provides an overview of land use, infrastructure, and facility requirements to support US Department of Energy (DOE) programs at the Hanford Site. The HSDP's primary purpose is to inform senior managers and interested parties of development activities and issues that require a commitment of resources to support the Hanford Site. The HSDP provides an existing and future land use plan for the Hanford Site. The HSDP is updated annually in accordance with DOE Order 4320.1B, Site Development Planning, to reflect the mission and overall site development process. Further details about Hanford Site development are defined in individual area development plans

  12. Determination of site-specific glycan heterogeneity on glycoproteins

    DEFF Research Database (Denmark)

    Kolarich, Daniel; Jensen, Pia Hønnerup; Altmann, Friedrich

    2012-01-01

    and the determination of site-specific glycan heterogeneity. The described workflow takes approximately 3-5 d, including sample preparation and data analysis. The data obtained from analyzing released glycans of rHuEPO and IgG, described in the second protocol of this series (10.1038/nprot.2012.063), provide...

  13. The Development of Korea Additional Protocol System

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yeo, Jin Kyun

    2008-01-01

    The Agreement between the Republic of Korea (ROK) and the IAEA for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Safeguards Agreement) entered into force on 14 November 1975. The Additional Protocol to the Safeguards Agreement (the Additional Protocol) was signed on 21 June 1999 and entered into force on 19 February 2004. ROK has been submitting annual updated reports of initial declaration on every May 15th since August 2004. Additional protocol reports were submitted through Protocol Reporter provided by IAEA. Annual declarations were simply uploaded and stored in the Accounting Information Treatment System of KINAC, which did not provide data analysis and management function. There have been demands for improvement to handle ever-increasing information. KAPS (Korea Additional Protocol System) has been developed to assist and administrate the additional protocol related works effectively. The new system enables integrated management including composition of additional protocol report and version control, periodical update of related information, results of IAEA complementary access to each facility

  14. New logistics protocols for distributed interactive simulation

    Science.gov (United States)

    Taylor, Darrin; Morrison, John; Katz, Warren; Felton, Erik; Herman, Deborah A.

    1995-06-01

    In today's environment, the transportation and maintenance of military forces is nearly as important as combat operations. Rapid deployment to regions of low-intensity conflict will become a very common training scenario for the U.S. military. Thus it is desirable to apply distributed simulation technology to train logistics personnel in their combat support roles. Currently, distributed interactive simulation (DIS) only contains rudimentary logistics protocols. This paper introduces new protocols designed to handle the logistics problem. The Newtonian protocol takes a physics-based approach to modeling interactions on the simulation network. This protocol consists of a family of protocol data units (PDUs) which are used to communicate forces in different circumstances. The protocol implements a small set of physical relations. This represents a flexible and general mechanism to describe battlefield interactions between network entities. The migratory object protocol (MOP) family addresses the transfer of control. General mechanisms provide the means to simulate resupply, repair, and maintenance of entities at any level of abstraction (individual soldier to division). It can also increase the fidelity of mine laying, enable handover of weapons for terminal guidance, allow for the distribution of aggregate-level simulation entities, provide capabilities for the simulation of personnel, etc.

  15. Region 9 NPL Sites (Superfund Sites 2013)

    Science.gov (United States)

    NPL site POINT locations for the US EPA Region 9. NPL (National Priorities List) sites are hazardous waste sites that are eligible for extensive long-term cleanup under the Superfund program. Eligibility is determined by a scoring method called Hazard Ranking System. Sites with high scores are listed on the NPL. The majority of the locations are derived from polygon centroids of digitized site boundaries. The remaining locations were generated from address geocoding and digitizing. Area covered by this data set include Arizona, California, Nevada, Hawaii, Guam, American Samoa, Northern Marianas and Trust Territories. Attributes include NPL status codes, NPL industry type codes and environmental indicators. Related table, NPL_Contaminants contains information about contaminated media types and chemicals. This is a one-to-many relate and can be related to the feature class using the relationship classes under the Feature Data Set ENVIRO_CONTAMINANT.

  16. The Kyoto Protocol. An economic appraisal

    International Nuclear Information System (INIS)

    Grubb, M.

    2000-05-01

    This paper examines the overall economics of the Kyoto Protocol on climate change, in three main parts. The first part explores the structure of the Protocol and how this matches against classical economic criteria of an 'optimal' climate change agreement. This discussion also considers the nature of and reasons for shortcomings, and the prospects for its evolution. Given the various flexibilities in the agreement, the Kyoto Protocol is far more economically efficient in its structure than any previous global environmental agreement. The central conclusion is that, from an economic perspective, the Protocol's structure for industrialised country commitments is as good as could reasonably be expected. The second part of the paper explores more closely the economics of the commitments themselves and how they combine with the various flexibilities, briefly reviewing the available literature and using a simple spreadsheet model of how the commitments might combine with trading mechanisms under a range of assumptions. Flexibility is intrinsic and necessary, but it is argued that the allocations to Russia and Ukraine in particular mean that unlimited flexibility could render the Protocol's commitments weaker in their impacts than is economically desirable to address climate change. It is argued that, should this prove to be the case, access to the large surplus in the transition economies could be used as a control valve to limit the costs of the Protocol to within acceptable limits. Finally, the paper considers the issues of developing country involvement in the Kyoto Protocol, and the Protocol's longer-term impact and evolution, including its impact on technological evolution and dissemination and the evolution of future commitments. It is argued that taking account of such issues critically affects views of the Protocol

  17. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  18. Antibiotic prophylaxis in orthopedic surgeries: the results of an implemented protocol

    Directory of Open Access Journals (Sweden)

    Raquel Queiroz

    Full Text Available Though the basic principles of antibiotic prophylaxis have been well established, there is still considerable incorrect usage, including how much is prescribed and especially in the duration of treatment, which is generally superior to what is indicated. The adequate use of these drugs contributes towards decreasing the time of internment of the patient, prevents surgical site infection (SSI, decreasing the development of resistant microorganisms, and towards reduced costs for the hospital pharmacy. A protocol for the use of antibiotic prophylaxis in the Orthopedics and Traumatology Service of the Hospital do Servidor Público Estadual de São Paulo was developed. The objectives of the study were to promote rational antibiotic surgical prophylaxis, through the implantation of a protocol for the use of these drugs in a surgical unit, with the direct contribution of a druggist in collaboration with the Infection Control Committee, to evaluate the adhesion of the health team to the protocol during three distinct periods (daily pre-protocol, early post-protocol and late post-protocol and to define the consumption of antimicrobials used, measured as daily defined dose.

  19. Energy Efficient Network Protocols for Wireless and Mobile Networks

    National Research Council Canada - National Science Library

    Sivalingam, Krishna

    2001-01-01

    ... (also called power aware) network protocols for wireless and mobile networks. Battery power limitations are a very serious concern, and it is essential to study energy efficient protocol design at different layers of the network protocol stack...

  20. Event-by-event simulation of quantum cryptography protocols

    NARCIS (Netherlands)

    Zhao, S.; Raedt, H. De

    We present a new approach to simulate quantum cryptography protocols using event-based processes. The method is validated by simulating the BB84 protocol and the Ekert protocol, both without and with the presence of an eavesdropper.

  1. Protocolized hyperventilation enhances electroconvulsive therapy.

    Science.gov (United States)

    de Arriba-Arnau, Aida; Dalmau, Antonia; Soria, Virginia; Salvat-Pujol, Neus; Ribes, Carmina; Sánchez-Allueva, Ana; Menchón, José Manuel; Urretavizcaya, Mikel

    2017-08-01

    Hyperventilation is recommended in electroconvulsive therapy (ECT) to enhance seizures and to increase patients' safety. However, more evidence is needed regarding its effects and the optimum method of application. This prospective study involving 21 subjects compared two procedures, protocolized hyperventilation (PHV) and hyperventilation as usual (HVau), applied to the same patient in two consecutive sessions. Transcutaneous partial pressure of carbon dioxide (TcPCO 2 ) was measured throughout all sessions. Ventilation parameters, hemodynamic measures, seizure characteristics, and side effects were also explored. PHV resulted in lower TcPCO 2 after hyperventilation (p=.008) and over the whole session (p=.035). The lowest TcPCO 2 was achieved after voluntary hyperventilation. Changes in TcPCO 2 from baseline showed differences between HVau and PHV at each session time-point (all p<.05). Between- and within-subjects factors were statistically significant in a general linear model. Seizure duration was greater in PHV sessions (p=.028), without differences in other seizure quality parameters or adverse effects. Correlations were found between hypocapnia induction and seizure quality indexes. Secondary outcomes could be underpowered. PHV produces hypocapnia before the stimulus, modifies patients' TcPCO 2 values throughout the ECT session and lengthens seizure duration. Voluntary hyperventilation is the most important part of the PHV procedure with respect to achieving hypocapnia. A specific ventilation approach, CO 2 quantification and monitoring may be advisable in ECT. PHV is easy to apply in daily clinical practice and does not imply added costs. Ventilation management has promising effects in terms of optimizing ECT technique. Copyright © 2017 Elsevier B.V. All rights reserved.

  2. The protocol amending the 1963 Vienna Convention

    International Nuclear Information System (INIS)

    Lamm, V.

    2006-01-01

    Technically the Vienna Convention was revised by the adoption of the protocol to amend the instrument. and according to Article 19 of the protocol 'A State which is Party to this Protocol but not to the 1963 Vienna Convention shall be bound by the provisions of that Convention as amended by this Protocol in relation to other States Parties hereto, and failing an expression of a different intention by that State at the time of deposit of an instrument referred to in Article 20 shall be bound by the provisions of the 1963 Vienna Convention in relation to States which are only Parties thereto'. This solution has created a special situation, because after the entry into force of the protocol there will be living together or operating in practice 'two' Vienna Conventions, notably the convention's original text of 1963 and its new version as amended by the protocol. After the protocol has come into force, a state may only accede to the amended version, but in the inter se relations of the States Party to the 'old' Vienna Convention the provisions of that convention will remain in force until such time as they have acceded to the new protocol. This rather complicated situation is nevertheless understandable and is fully in accord with Article 40 of the 1969 Vienna Convention on the Law of Treaties, which provides for the amendment of multilateral treaties. In 1989 the negotiations on the revision of the Vienna Convention had begun with the aim of strengthening the existing nuclear liability regime and of improving the situation of potential victims of nuclear accidents. The Protocol to Amend the Vienna Convention serves those purposes; it also reflects a good compromise, since it is the outcome of a negotiation process in which experts from both nuclear and non-nuclear states, from Contacting Parties and non-Contracting Parties were very active. That affords some assurance that the compromise solution reached is acceptable to all States participating in the adoption of

  3. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  4. Security Protocol Review Method Analyzer(SPRMAN)

    OpenAIRE

    Navaz, A. S. Syed; Narayanan, H. Iyyappa; Vinoth, R.

    2013-01-01

    This Paper is designed using J2EE (JSP, SERVLET), HTML as front end and a Oracle 9i is back end. SPRMAN is been developed for the client British Telecom (BT) UK., Telecom company. Actually the requirement of BT is, they are providing Network Security Related Products to their IT customers like Virtusa,Wipro,HCL etc., This product is framed out by set of protocols and these protocols are been associated with set of components. By grouping all these protocols and components together, product is...

  5. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...

  6. Establishing treatment protocols for clinical mastitis.

    Science.gov (United States)

    Roberson, Jerry R

    2003-03-01

    Each farm has a unique mix of mastitis pathogens and management procedures that have evolved over time. The herd veterinarian should work with the manager/owner to systematically develop treatment protocols that meet the needs and management of the farm. To establish a mastitis treatment protocol, it is necessary to develop a system to routinely identify clinical mastitis cases, develop a herd-specific severity level assessment system, manage the clinical mastitis cases based on severity level and culture result (when available), avoid antibiotic residues, and monitor the success of the system and alter the protocol as necessary.

  7. Overview of the InterGroup protocols

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah A. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Melliar-Smith, P. Michael [Univ. of California, Santa Barbara, CA (United States); Moser, Louise E. [Univ. of California, Santa Barbara, CA (United States)

    2001-03-01

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

  8. The Singapore protocol [for quantum cryptography

    International Nuclear Information System (INIS)

    Englert, B.

    2005-01-01

    The qubit protocol for quantum key distribution presented in this talk is fully tomographic and more efficient than other tomographic protocols. Under ideal circumstances the efficiency is log 2 (4/3) = 0.415 key bits per qubit sent, which is 25% more than the efficiency of 1/3 = 0.333 for the standard 6-state protocol. One can extract 0.4 key bits per qubit by a simple two-way communication scheme, and can so get close to the information-theoretical limit. The noise thresholds for secure key bit generation in the presence of unbiased noise will be reported and discussed. (author)

  9. A Logical Analysis of Quantum Voting Protocols

    Science.gov (United States)

    Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja

    2017-12-01

    In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.

  10. Temelin 3,4 Siting

    International Nuclear Information System (INIS)

    Kubanova, Iva; Fuzer, Jiri

    2011-01-01

    In the future the Czech Republic will need new energetic resources in spite of current decrease of electricity consumption due to economical crisis. Nuclear power generation is considered as important part of energetic mix of the Czech Republic and this opinion is newly reflected in new government official statement issued in August 2010. CEZ, a. s. prepares new nuclear power plants projects accordingly governmental expectations. Currently 3 projects are in preparation. Temelin 3, 4 project is in the most advanced status, tender is in progress. Potential construction of Dukovany unit 5 and new Jaslovske Bohunice units are analyzed in feasibility studies. Temelin 3, 4 project activities were started 4 years ago. Preparatory analyses, market investigation, feasibility study including many particular studies were elaborated in years 2006-2008. Later on decision to work on bid invitation specification was done and followed. EIA process was started in July 2008 by Intention Announcement and continues. Public tender for EPC contract was announced in August 2009 and it is in progress accordingly schedule. Siting process is in the initial stage. EIA process started in July 2008 through Intention Announcement in spite of anti - nuclear political climate in the Czech Republic. EIA process is interstate process, Austria and Germany participate. Investigation Process Protocol was issued by Ministry of Environment in February 2009 with 34 main conditions and 165 additional comments, requirements, statements. CEZ, a. s. adopted the positive approach with philosophy to deal with all conditions and requirements properly. Elaboration of EIA documentation took 18 months. In May 2010 CEZ, a. s. handed over the EIA documentation to the Ministry of Environment and consequently all legal steps followed including hand-over of EIA documentation to Austria and Germany. In next weeks and months all comments will be gathered by Ministry of Environment and relevant decisions and legal steps

  11. Standard protocol for conducting pre-operational environmental surveillance around nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Hegde, A G; Verma, P C; Rajan, M P [Health Safety and Environment Group, Bhabha Atomic Research Centre, Mumbai (India)

    2009-02-15

    This document presents the standard procedures for evaluation of site specific environmental transfer factors around NPP sites. The scope of this document is to provide standard protocol to be followed for conducting pre-operational environmental surveillance around nuclear facilities. Such surveillances have been proposed to be carried out by university professionals under DAE-BRNS projects. This document contains a common methodology in terms of sampling, processing, measurements and analysis of elemental/radionuclides, while keeping the site specific requirements also in place. (author)

  12. Standard protocol for conducting pre-operational environmental surveillance around nuclear facilities

    International Nuclear Information System (INIS)

    Hegde, A.G.; Verma, P.C.; Rajan, M.P.

    2009-02-01

    This document presents the standard procedures for evaluation of site specific environmental transfer factors around NPP sites. The scope of this document is to provide standard protocol to be followed for conducting pre-operational environmental surveillance around nuclear facilities. Such surveillances have been proposed to be carried out by university professionals under DAE-BRNS projects. This document contains a common methodology in terms of sampling, processing, measurements and analysis of elemental/radionuclides, while keeping the site specific requirements also in place. (author)

  13. Protocol: methodology for chromatin immunoprecipitation (ChIP in Chlamydomonas reinhardtii

    Directory of Open Access Journals (Sweden)

    Strenkert Daniela

    2011-11-01

    Full Text Available Abstract We report on a detailed chromatin immunoprecipitation (ChIP protocol for the unicellular green alga Chlamydomonas reinhardtii. The protocol is suitable for the analysis of nucleosome occupancy, histone modifications and transcription factor binding sites at the level of mononucleosomes for targeted and genome-wide studies. We describe the optimization of conditions for crosslinking, chromatin fragmentation and antibody titer determination and provide recommendations and an example for the normalization of ChIP results as determined by real-time PCR.

  14. Replication protocol analysis: a method for the study of real-world design thinking

    DEFF Research Database (Denmark)

    Galle, Per; Kovacs, L. B.

    1996-01-01

    Given the brief of an architectural competition on site planning, and the design awarded the first prize, the first author (trained as an architect but not a participant in the competition) produced a line of reasoning that might have led from brief to design. In the paper, such ‘design replication......’ is refined into a method called ‘replication protocol analysis’ (RPA), and discussed from a methodological perspective of design research. It is argued that for the study of real-world design thinking this method offers distinct advantages over traditional ‘design protocol analysis’, which seeks to capture...

  15. Issues on a tritium measurement system's qualification on a dismantling site

    Energy Technology Data Exchange (ETDEWEB)

    Pigeon, Benoit; Met, Frederic [Waste Treatment and Nuclear Safety Service - SASN, Waste and Measurement Laboratory - LDM, CEA/SASN/LDM, DAM, DIF, Bruyeres Le Chatel, F-91297 Arpajon (France)

    2015-07-01

    In order to choose the suitable outlet, final disposal of radioactive package requires good knowledge of radiological characteristics of the waste. As part of a nuclear facility's dismantling within tritium proceeds, {sup 3}H contamination is evaluated by using wipe tests which are measured by liquid scintillation. The industrialist's choice is a triple coincidence to double coincidence ratio (TDCR) method with a dry counting protocol. The initial protocol had been defined to reduce the quantity of radioactive liquid waste and to perform an automatic quenching correction. A based on TDCR method liquid scintillation analyser was installed on the decommissioning site. It had had to be used by operator non specialized in metrology, This poster presents the laboratory's feedback on the use of the TDCR method on a site: - problems encountered about protocol on a decommissioning site - protocol adjustments and their consequences. (authors)

  16. Methodology of site studies

    International Nuclear Information System (INIS)

    Caries, J.C.; Hugon, J.; Grauby, A.

    1980-01-01

    This methodology consists in an essentially dynamic, estimated and follow-up analysis of the impact of discharges on all the environment compartments, whether natural or not, that play a part in the protection of man and his environment. It applies at two levels, to wit: the choice of site, or the detailed study of the site selected. Two examples of its application will be developed, namely: at the choice of site level in the case of marine sites, and of the detailed study level of the chosen site in that of a riverside site [fr

  17. Taking an idea to a research protocol

    African Journals Online (AJOL)

    2013-11-13

    Nov 13, 2013 ... Review Article: Taking an idea to a research protocol ... step is to identify the knowledge gap within the intended field of research by examining the background ... be found by writing a critical narrative review of the literature.

  18. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... results. The most important generalization is the support for all security properties of the geometric fragment proposed by [Gut14]....... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...

  19. Oxygen tolerance test : A standardised protocol

    Directory of Open Access Journals (Sweden)

    D K Ghosh

    2015-01-01

    Conclusion: By following a standardised protocol for Oxygen Tolerance Test, an objective assessment and recordkeeping is possible. This shall entail a more effective screening during the initial diving medical examination.

  20. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  1. Authentication Protocol using Quantum Superposition States

    Energy Technology Data Exchange (ETDEWEB)

    Kanamori, Yoshito [University of Alaska; Yoo, Seong-Moo [University of Alabama, Huntsville; Gregory, Don A. [University of Alabama, Huntsville; Sheldon, Frederick T [ORNL

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  2. Technical Analysis of SSP-21 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-09

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.

  3. Adaptive security protocol selection for mobile computing

    NARCIS (Netherlands)

    Pontes Soares Rocha, B.; Costa, D.N.O.; Moreira, R.A.; Rezende, C.G.; Loureiro, A.A.F.; Boukerche, A.

    2010-01-01

    The mobile computing paradigm has introduced new problems for application developers. Challenges include heterogeneity of hardware, software, and communication protocols, variability of resource limitations and varying wireless channel quality. In this scenario, security becomes a major concern for

  4. Entanglement distillation protocols and number theory

    International Nuclear Information System (INIS)

    Bombin, H.; Martin-Delgado, M.A.

    2005-01-01

    We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set Z D n associated with Bell diagonal states is a module rather than a vector space. We find that a partition of Z D n into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D. When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively

  5. Saudi Arabia and CERN sign protocol

    CERN Multimedia

    2008-01-01

    On 9 May 2008, Mohammed I. Al Suwaiyel, President of the King Abdulaziz City of Science and Technology, representing the Government of Saudi Arabia, and CERN Director-General, Robert Aymar, signed a protocol to the 2006 cooperation agreement between CERN and Saudi Arabia. Members of the Saudi Arabian Government visit ATLAS.The purpose of the protocol is to define the operational framework needed to carry out various specific tasks provided for in the cooperation agreement in order to promote the development of a high energy particle physics community in Saudi Arabia and its ultimate visible participation as a member of the global CERN community. Signing the protocol, Mohammed I. Al-Suwaiyel said: "The Saudi Arabian Government has taken a number of initiatives to promote R&D in the interests of our country’s development and the advancement of science. Thanks to this protocol, Saudi scientists will be able to work towards this go...

  6. Verbal protocols as methodological resources: research evidence

    Directory of Open Access Journals (Sweden)

    Alessandra Baldo

    2012-01-01

    Full Text Available This article aims at reflecting on the use of verbal protocols as a methodological resource in qualitative research, more specifically on the aspect regarded as the main limitation of a study about lexical inferencing in L2 (BALDO; VELASQUES, 2010: its subjective trait. The article begins with a brief literature review on protocols, followed by a description of the study in which they were employed as methodological resources. Based on that, protocol subjectivity is illustrated through samples of unparalleled data classification, carried out independently by two researchers. In the final section, the path followed to minimize the problem is presented, intending to contribute to improve efficiency in the use of verbal protocols in future research.

  7. Real-Time Fault Tolerant Networking Protocols

    National Research Council Canada - National Science Library

    Henzinger, Thomas A

    2004-01-01

    We made significant progress in the areas of video streaming, wireless protocols, mobile ad-hoc and sensor networks, peer-to-peer systems, fault tolerant algorithms, dependability and timing analysis...

  8. Development of measurement protocols for quantum magnetometry

    DEFF Research Database (Denmark)

    Stark, Alexander

    and protocols to enhance the lifetime and the coherences of the NV center with the overall goal of enhancing the capabilities of this sensor in the field of magnetometry. In order to realize complex protocols, a sophisticated software control of the measurement setup is required. A general software framework......, is serving as rigorous framework to reduce the complexity of the setup configuration by a fundamental separation of tasks. As a consequence, the general idea of this framework is not limited to experiments with color centers in diamond, but can find application in any laboratory environment. The measurement...... of magnetic fields in the high-frequency GHz regimes is challenging. In this thesis, a continuous dynamical decoupling protocol is developed and implemented, which extends the capabilities of the NV sensor to probe GHz signals with a narrow bandwidth. Moreover, the protocol protects the system from noise...

  9. How to write a research protocol

    African Journals Online (AJOL)

    A research protocol is best viewed as a key to open the gates between the researcher and ... studies will be quantitative designs and these form the focus of this paper. ..... applied to the underlying clinical problem addressed by the study.

  10. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  11. Language, Semantics, and Methods for Security Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico

    events. Methods like strand spaces and the inductive method of Paulson have been designed to support an intensional, event-based, style of reasoning. These methods have successfully tackled a number of protocols though in an ad hoc fashion. They make an informal spring from a protocol to its......-nets. They have persistent conditions and as we show in this thesis, unfold under reasonable assumptions to a more basic kind of nets. We relate SPL-nets to strand spaces and inductive rules, as well as trace languages and event structures so unifying a range of approaches, as well as providing conditions under...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...

  12. Implementation of the Additional Protocol in Japan

    International Nuclear Information System (INIS)

    Ogawa, T.

    2001-01-01

    The Additional Protocol between Japan and the IAEA entered into force in December 1999. To come into force a series of implementation trials of Additional Protocol was carried out at two Japanese representative nuclear research centers, i.e. Tokai Research Establishment of Japan Atomic Energy Research Institute (JAERI) and Oarai Engineering Center of Japan Nuclear Fuel Cycle Development Institute (JNC). These trials were proposed by Japan and were conducted in cooperation with the IAEA Secretariat. In addition, Japan amended 'the Law for the Regulation of Reactors etc.', to collect adequate information to submit to the IAEA, to arrange the surrounding for the complementary access, etc. In addition, Japan Submitted the Initial Declaration of the Additional Protocol within 180 days of the entry into force of the Protocol, in the middle of June, 2000

  13. Field Monitoring Protocol. Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Earle, L. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Christensen, D. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Maguire, J. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Wilson, E. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Hancock, C. E. [Mountain Energy Partnership, Longmont, CO (United States)

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  14. Field Monitoring Protocol: Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  15. An Evaluation Methodology for Protocol Analysis Systems

    Science.gov (United States)

    2007-03-01

    Main Memory Requirement NS: Needham-Schroeder NSL: Needham-Schroeder-Lowe OCaml : Objective Caml POSIX: Portable Operating System...methodology is needed. A. PROTOCOL ANALYSIS FIELD As with any field, there is a specialized language used within the protocol analysis community. Figure...ProVerif requires that Objective Caml ( OCaml ) be installed on the system, OCaml version 3.09.3 was installed. C. WINDOWS CONFIGURATION OS

  16. Topology Discovery Using Cisco Discovery Protocol

    OpenAIRE

    Rodriguez, Sergio R.

    2009-01-01

    In this paper we address the problem of discovering network topology in proprietary networks. Namely, we investigate topology discovery in Cisco-based networks. Cisco devices run Cisco Discovery Protocol (CDP) which holds information about these devices. We first compare properties of topologies that can be obtained from networks deploying CDP versus Spanning Tree Protocol (STP) and Management Information Base (MIB) Forwarding Database (FDB). Then we describe a method of discovering topology ...

  17. Emulation of Industrial Control Field Device Protocols

    Science.gov (United States)

    2013-03-01

    today. The protocol operates at the application layer of the open systems interconnection ( OSI ) model, meaning it operates independently of the...the OSI model. Their job is to receive serial data from an MTU in the Modbus RTU or ASCII protocol, encapsulate and transmit the data to another modem...facing connection and out-of-band logging capabilities over the other LAN -facing connection. Despite the fact that the hardware configuration of the

  18. A Review of Fair Exchange Protocols

    OpenAIRE

    Abdullah AlOtaibi; Hamza Aldabbas

    2012-01-01

    Recently, the Internet has become an essential business platform, aiding trading, distribution and sales between organisations, consumers and even between consumers themselves. This technology revolution has brought e-commerce to an entirely new level, which therefore has raised some new security issues. Security protocols in e-commerce are required to manage the transactions between buyers and sellers. In order to engage customers in e-commerce, these protocols should be well formulated and ...

  19. Recursion vs. Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2005-01-01

    We use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek's spect...... of messages in the sense of Amadio, Lugiez and Vanackere. We conclude by showing that reachability analysis for a replicative variant of the protocol becomes decidable....

  20. Broadening and Simplifying the First SETI Protocol

    Science.gov (United States)

    Michaud, M. A. G.

    The Declaration of Principles Concerning Activities Following the Detection of Extraterrestrial Intelligence, known informally as the First SETI Protocol, is the primary existing international guidance on this subject. During the fifteen years since the document was issued, several people have suggested revisions or additional protocols. This article proposes a broadened and simplified text that would apply to the detection of alien technology in our solar system as well as to electromagnetic signals from more remote sources.

  1. Hybrid Long-Distance Entanglement Distribution Protocol

    DEFF Research Database (Denmark)

    Brask, J.B.; Rigas, I.; Polzik, E.S.

    2010-01-01

    We propose a hybrid (continuous-discrete variable) quantum repeater protocol for long-distance entanglement distribution. Starting from states created by single-photon detection, we show how entangled coherent state superpositions can be generated by means of homodyne detection. We show that near......-deterministic entanglement swapping with such states is possible using only linear optics and homodyne detectors, and we evaluate the performance of our protocol combining these elements....

  2. Dynamic Aggregation Protocol for Wireless Sensor Networks

    OpenAIRE

    Mounir Said , Adel; William Ibrahim , Ashraf; Soua , Ahmed; Afifi , Hossam

    2013-01-01

    International audience; Sensor networks suffer from limited capabilities such as bandwidth, low processing power, and memory size. There is therefore a need for protocols that deliver sensor data in an energy-efficient way to the sink. One of those techniques, it gathers sensors' data in a small size packet suitable for transmission. In this paper, we propose a new Effective Data Aggregation Protocol (DAP) to reduce the energy consumption in Wireless Sensor Networks (WSNs), which prolongs the...

  3. Optimistic protocol for partitioned distributed database systems

    International Nuclear Information System (INIS)

    Davidson, S.B.

    1982-01-01

    A protocol for transaction processing during partition failures is presented which guarantees mutual consistency between copies of data-items after repair is completed. The protocol is optimistic in that transactions are processed without restrictions during the failure; conflicts are detected at repair time using a precedence graph and are resolved by backing out transactions according to some backout strategy. The protocol is then evaluated using simulation and probabilistic modeling. In the simulation, several parameters are varied such as the number of transactions processed in a group, the type of transactions processed, the number of data-items present in the database, and the distribution of references to data-items. The simulation also uses different backout strategies. From these results we note conditions under which the protocol performs well, i.e., conditions under which the protocol backs out a small percentage of the transaction run. A probabilistic model is developed to estimate the expected number of transactions backed out using most of the above database and transaction parameters, and is shown to agree with simulation results. Suggestions are then made on how to improve the performance of the protocol. Insights gained from the simulation and probabilistic modeling are used to develop a backout strategy which takes into account individual transaction costs and attempts to minimize total backout cost. Although the problem of choosing transactions to minimize total backout cost is, in general, NP-complete, the backout strategy is efficient and produces very good results

  4. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  5. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  6. NPL Site Locations

    Data.gov (United States)

    U.S. Environmental Protection Agency — The National Priorities List (NPL) is a list published by EPA of Superfund sites. A site must be added to this list before remediation can begin under Superfund. The...

  7. Site Area Boundaries

    Data.gov (United States)

    U.S. Environmental Protection Agency — This dataset consists of site boundaries from multiple Superfund sites in U.S. EPA Region 8. These data were acquired from multiple sources at different times and...

  8. NPL Site Boundaries

    Data.gov (United States)

    U.S. Environmental Protection Agency — The National Priorities List (NPL) is a list published by EPA of Superfund sites. A site must be added to this list before remediation can begin under Superfund. The...

  9. Drupal 7 Multilingual Sites

    CERN Document Server

    Pol, Kristen

    2012-01-01

    A practical book with plenty of screenshots to guide you through the many features of multilingual Drupal. A demo ecommerce site is provided if you want to practice on a sample site, although you can apply the techniques learnt in the book directly to your site too. Any Drupal users who know the basics of building a Drupal site and are familiar with the Drupal UI, will benefit from this book. No previous knowledge of localization or internationalization is required.

  10. Nuclear waste repository siting

    International Nuclear Information System (INIS)

    Soloman, B.D.; Cameron, D.M.

    1987-01-01

    This paper discusses the geopolitics of nuclear waste disposal in the USA. Constitutional choice and social equity perspectives are used to argue for a more open and just repository siting program. The authors assert that every potential repository site inevitably contains geologic, environmental or other imperfections and that the political process is the correct one for determining sites selected

  11. Site Calibration report

    DEFF Research Database (Denmark)

    Yordanova, Ginka; Vesth, Allan

    The report describes site calibration measurements carried out on a site in Denmark. The measurements are carried out in accordance to Ref. [1]. The site calibration is carried out before a power performance measurement on a given turbine to clarify the influence from the terrain on the ratio...

  12. CCS site characterisation criteria

    Energy Technology Data Exchange (ETDEWEB)

    Bachu, S.; Hawkes, C.; Lawton, D.; Pooladi-Darvish, M.; Perkins, E.

    2009-12-15

    IEA GHG recently commissioned the Alberta Research Counil in Canada to conduct a review of storage site selection criteria and site characterisation methods in order to produce a synthesis report. This report reviews the literature on the subject on the site seleciton and characterisation since the publication of the IPCC Special Report on CCS, and provides a synthesis and classification of criteria. 161 refs.

  13. MDEP Protocol VICWG-01. MDEP Protocol: Witnessed, Joint, and Multinational Vendor Inspection Protocol

    International Nuclear Information System (INIS)

    2014-01-01

    The Multinational Design Evaluation Programme (MDEP) was launched in 2006 by the US Nuclear Regulatory Commission (NRC) and the French Nuclear Safety Authority (ASN) with the aim of developing innovative approaches to leverage the resources and knowledge of national regulatory authorities reviewing new reactor designs. MDEP full members are regulators from Canada, People's Republic of China, Finland, France, India, Japan, Republic of Korea, Russian Federation, South Africa, Sweden, the United Kingdom and the United States of America. The United Arab Emirates and Turkey are associate members. The OECD Nuclear Energy Agency (NEA) acts as the Technical Secretariat for the MDEP. The International Atomic Energy Agency (IAEA) participates in many of the MDEP activities, including harmonisation efforts. The Vendor Inspection Cooperation Working Group (VICWG) is one of the issue-specific working groups that the MDEP members are undertaking with one long term goal of the VICWG being to maximize the use of the results obtained from other regulator's efforts in inspecting vendors. To accomplish this goal, it is vital that the regulators learn about each other's procedures, processes, and regulations. To facilitate the learning process the VICWG is coordinating vendor inspections among the involved regulatory authorities with the purpose of enhancing the understanding of each other's vendor inspection procedures. This programme is administered by the NEA. Involvement in specific inspections provides a number of opportunities for member state regulators to witness other regulators' inspection methods, gain useful information on the quality systems and manufacturing arrangements of specific vendors and where appropriate, actively participate in the inspection. The purpose of this protocol is to provide guidance to regulators that wish to carry out vendor inspections or participate in or witness other regulators' vendor inspections. It also provides

  14. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  15. Protocol for Monitoring Fish Assemblages in Pacific Northwest National Parks

    Science.gov (United States)

    Brenkman, Samuel J.; Connolly, Patrick J.

    2008-01-01

    Rivers and streams that drain from Olympic, Mount Rainier, and North Cascades National Parks are among the most protected corridors in the lower 48 States, and represent some of the largest tracts of contiguous, undisturbed habitat throughout the range of several key fish species of the Pacific Northwest. These watersheds are of high regional importance as freshwater habitat sanctuaries for native fish, where habitat conditions are characterized as having little to no disturbance from development, channelization, impervious surfaces, roads, diversions, or hydroelectric projects. Fishery resources are of high ecological and cultural importance in Pacific Northwest National Parks, and significantly contribute to economically important recreational, commercial, and tribal fisheries. This protocol describes procedures to monitor trends in fish assemblages, fish abundance, and water temperature in eight rivers and five wadeable streams in Olympic National Park during summer months, and is based on 4 years of field testing. Fish assemblages link freshwater, marine, and terrestrial ecosystems. They also serve as focal resources of national parks and are excellent indicators of ecological conditions of rivers and streams. Despite the vital importance of native anadromous and resident fish populations, there is no existing monitoring program for fish assemblages in the North Coast and Cascades Network. Specific monitoring objectives of this protocol are to determine seasonal and annual trends in: (1) fish species composition, (2) timing of migration of adult fish, (3) relative abundance, (4) age and size structure, (5) extent of non-native and hatchery fish, and (6) water temperature. To detect seasonal and annual trends in fish assemblages in reference sites, we rely on repeated and consistent annual sampling at each monitoring site. The general rationale for the repeated sampling of reference sites is to ensure that we account for the high interannual variability in fish

  16. Advance pre-operative chlorhexidine reduces the incidence of surgical site infections in knee arthroplasty.

    Science.gov (United States)

    Zywiel, Michael G; Daley, Jacqueline A; Delanois, Ronald E; Naziri, Qais; Johnson, Aaron J; Mont, Michael A

    2011-07-01

    Surgical site infections following elective knee arthroplasties occur most commonly as a result of colonisation by the patient's native skin flora. The purpose of this study was to evaluate the incidence of deep surgical site infections in knee arthroplasty patients who used an advance cutaneous disinfection protocol and who were compared to patients who had peri-operative preparation only. All adult reconstruction surgeons at a single institution were approached to voluntarily provide patients with chlorhexidine gluconate-impregnated cloths and a printed sheet instructing their use the night before and morning of surgery. Records for all knee arthroplasties performed between January 2007 and December 2008 were reviewed to determine the incidence of deep incisional and periprosthetic surgical site infections. Overall, the advance pre-operative protocol was used in 136 of 912 total knee arthroplasties (15%). A lower incidence of surgical site infection was found in patients who used the advance cutaneous preparation protocol as compared to patients who used the in-hospital protocol alone. These findings were maintained when patients were stratified by surgical infection risk category. No surgical site infections occurred in the 136 patients who completed the protocol as compared to 21 infections in 711 procedures (3.0%) performed in patients who did not. Patient-directed skin disinfection using chlorhexidine gluconate-impregnated cloths the evening before, and the morning of, elective knee arthroplasty appeared to effectively reduce the incidence of surgical site infection when compared to patients who underwent in-hospital skin preparation only.

  17. Outcomes of a rapid refeeding protocol in Adolescent Anorexia Nervosa.

    Science.gov (United States)

    Madden, Sloane; Miskovic-Wheatley, Jane; Clarke, Simon; Touyz, Stephen; Hay, Phillipa; Kohn, Michael R

    2015-01-01

    The impact of severe malnutrition and medical instability in adolescent Anorexia Nervosa (AN) on immediate health and long-term development underscores the need for safe and efficient methods of refeeding. Current refeeding guidelines in AN advocate low initial caloric intake with slow increases in energy intake to avoid refeeding syndrome. This study demonstrates the potential for more rapid refeeding to promote initial weight recovery and correct medical instability in adolescent AN. Seventy-eight adolescents with AN (12-18 years), hospitalised in two specialist paediatric eating disorder units, for medical instability (bradycardia, hypotension, hypothermia, orthostatic instability and/or cardiac arrhythmia) were followed during a 2.5 week admission. Patients were refed using a standardised protocol commencing with 24-72 hours of continuous nasogastric feeds (ceased with daytime medical stability) and routine oral phosphate supplementation, followed by nocturnal feeds and a meal plan of 1200-2400 kcal/day aiming for a total caloric intake of 2400-3000 kcal/day. Along with indicators of medical stability, weight, phosphate and glucose levels were recorded. All patients gained weight in week one (M = 2.79 kg, SD = 1.27 kg) and at subsequent measurement points with an average gain of 5.12 kg (SD = 2.96) at 2.5 weeks. No patient developed hypophosphatemia, hypoglycaemia, or stigmata of the refeeding syndrome. The refeeding protocol resulted in immediate weight gain and was well tolerated with no indicators of refeeding syndrome. There were no significant differences in outcomes between the treatment sites, suggesting the protocol is replicable. Australian Clinical Trials Register number: ACTRN012607000009415.

  18. Site Environmental Report, 1993

    Energy Technology Data Exchange (ETDEWEB)

    1994-06-01

    The Site Environmental Report (SER) is prepared annually in accordance with DOE Order 5400.1, ``General Environmental Protection Program.`` This 1993 SER provides the general public as well as scientists and engineers with the results from the site`s ongoing Environmental Monitoring Program. Also included in this report is information concerning the site`s progress toward achieving full compliance with requirements set forth by DOE, US Environmental Protection Agency (USEPA), and Ohio EPA (OEPA). For some readers, the highlights provided in the Executive Summary may provide sufficient information. Many readers, however, may wish to read more detailed descriptions of the information than those which are presented here.

  19. Olkiluoto site description 2011

    International Nuclear Information System (INIS)

    2012-12-01

    This fourth version of the Olkiluoto Site Report, produced by the OMTF (Olkiluoto Modelling Task Force), updates the Olkiluoto Site Report 2008 with the data and knowledge obtained up to December 2010. A descriptive model of the site (the Site Descriptive Model, SDM), i.e. a model describing the geological and hydrogeological structure of the site, properties of the bedrock and the groundwater and its flow, and the associated interacting processes and mechanisms. The SDM is divided into six parts: surface system, geology, rock mechanics, hydrogeology, hydrogeochemistry and transport properties

  20. Olkiluoto site description 2011

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-12-15

    This fourth version of the Olkiluoto Site Report, produced by the OMTF (Olkiluoto Modelling Task Force), updates the Olkiluoto Site Report 2008 with the data and knowledge obtained up to December 2010. A descriptive model of the site (the Site Descriptive Model, SDM), i.e. a model describing the geological and hydrogeological structure of the site, properties of the bedrock and the groundwater and its flow, and the associated interacting processes and mechanisms. The SDM is divided into six parts: surface system, geology, rock mechanics, hydrogeology, hydrogeochemistry and transport properties.

  1. Does Infection Site Matter? A Systematic Review of Infection Site Mortality in Sepsis.

    Science.gov (United States)

    Motzkus, Christine A; Luckmann, Roger

    2017-09-01

    Sepsis treatment protocols emphasize source control with empiric antibiotics and fluid resuscitation. Previous reviews have examined the impact of infection site and specific pathogens on mortality from sepsis; however, no recent review has addressed the infection site. This review focuses on the impact of infection site on hospital mortality among patients with sepsis. The PubMed database was searched for articles from 2001 to 2014. Studies were eligible if they included (1) one or more statistical models with hospital mortality as the outcome and considered infection site for inclusion in the model and (2) adult patients with sepsis, severe sepsis, or septic shock. Data abstracted included stage of sepsis, infection site, and raw and adjusted effect estimates. Nineteen studies were included. Infection sites most studied included respiratory (n = 19), abdominal (n = 19), genitourinary (n = 18), and skin and soft tissue infections (n = 11). Several studies found a statistically significant lower mortality risk for genitourinary infections on hospital mortality when compared to respiratory infections. Based on studies included in this review, the impact of infection site in patients with sepsis on hospital mortality could not be reliably estimated. Misclassification among infections and disease states remains a serious possibility in studies on this topic.

  2. Hanford Site Infrastructure Plan

    International Nuclear Information System (INIS)

    1990-01-01

    The Hanford Site Infrastructure Plan (HIP) has been prepared as an overview of the facilities, utilities, systems, and services that support all activities on the Hanford Site. Its purpose is three-fold: to examine in detail the existing condition of the Hanford Site's aging utility systems, transportation systems, Site services and general-purpose facilities; to evaluate the ability of these systems to meet present and forecasted Site missions; to identify maintenance and upgrade projects necessary to ensure continued safe and cost-effective support to Hanford Site programs well into the twenty-first century. The HIP is intended to be a dynamic document that will be updated accordingly as Site activities, conditions, and requirements change. 35 figs., 25 tabs

  3. Hanford Site Development Plan

    International Nuclear Information System (INIS)

    Hathaway, H.B.; Daly, K.S.; Rinne, C.A.; Seiler, S.W.

    1992-05-01

    The Hanford Site Development Plan (HSDP) provides an overview of land use, infrastructure, and facility requirements to support US Department of Energy (DOE) programs at the Hanford Site. The HSDP's primary purpose is to inform senior managers and interested parties of development activities and issues that require a commitment of resources to support the Hanford Site. The HSDP provides a land use plan for the Hanford Site and presents a picture of what is currently known and anticipated in accordance with DOE Order 4320.1B. Site Development Planning. The HSDP wig be updated annually as future decisions further shape the mission and overall site development process. Further details about Hanford Site development are defined in individual area development plans

  4. Hanford site transuranic waste sampling plan

    International Nuclear Information System (INIS)

    GREAGER, T.M.

    1999-01-01

    This sampling plan (SP) describes the selection of containers for sampling of homogeneous solids and soil/gravel and for visual examination of transuranic and mixed transuranic (collectively referred to as TRU) waste generated at the U.S. Department of Energy (DOE) Hanford Site. The activities described in this SP will be conducted under the Hanford Site TRU Waste Certification Program. This SP is designed to meet the requirements of the Transuranic Waste Characterization Quality Assurance Program Plan (CAO-94-1010) (DOE 1996a) (QAPP), site-specific implementation of which is described in the Hanford Site Transuranic Waste Characterization Program Quality Assurance Project Plan (HNF-2599) (Hanford 1998b) (QAPP). The QAPP defines the quality assurance (QA) requirements and protocols for TRU waste characterization activities at the Hanford Site. In addition, the QAPP identifies responsible organizations, describes required program activities, outlines sampling and analysis strategies, and identifies procedures for characterization activities. The QAPP identifies specific requirements for TRU waste sampling plans. Table 1-1 presents these requirements and indicates sections in this SP where these requirements are addressed

  5. MODELLING AND VERIFICATION OF KITSAT PACKET COMMUNICATION PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Young-Ro Lee

    1996-06-01

    Full Text Available In this paper, in order to verify KITSAT 1/2 packet communication protocols, we model the AX.25 protocol and PACSAT protocol by using an extended Petri net and then verify the correctness, boundedness, liveness and deadlock freeness of packet protocols by utilizing reachability trees.

  6. Differential phase-time shifting protocol for QKD (DPTS)

    DEFF Research Database (Denmark)

    Usuga Castaneda, Mario A.; Bacco, Davide; Christensen, Jesper Bjerge

    2016-01-01

    We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols.......We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols....

  7. National protocol for quality assurance in DXA-bone densitometry

    Science.gov (United States)

    Slavchev, A.; Avramova-Cholakova, S.; Vassileva, J.

    2008-01-01

    Osteoporosis becomes largely one of the most important socially significant and costly diseases. Modern techniques (DXA, US) are applied for bone densitometry. The paper presents a protocol for quality assurance especially of DXA-bone densitometers including quality control made in compliance with international standards (ISCD, IOF). The methodology has been tested in practice by measurements on site-functional assessment, entrance dose, radiation protection, calibration, in-vitro precision. It is expected to raise the quality of the diagnostic process in concert with the EU Medical Directive 97/43 particularly for population screening and sensitive groups. The protocol is an essential part of the National Program for constraining osteoporosis which has been elaborated at the Ministry of Health and at present under implementation throughout the country. It aims at reducing the risk, factors spreading, at diminishing the fracture risk the morbidity and the mortality from osteoporosis. An integral multidisciplinary approach to the problem solving is applied as well as training on three levels — doctors, patients, population, which effectively will contribute for obtaining real results in preventing osteoporosis.

  8. An electromagnetic field measurement protocol for monitoring power lines

    International Nuclear Information System (INIS)

    Lubritto, C.; Iavazzo, A.; D'Onofrio, A.; Palmieri, A.; Sabbarese, C.; Terrasi, F.

    2002-01-01

    In the actions aiming to prevent risks related to the exposure to Low Frequencies Non Ionising electromagnetic Radiations (ELF-NIR), always arises the need to perform measurements in order to assess the field level existing in the considered sites. As a matter of fact very often it turns out difficult to predict, on the base of calculations, with sufficient approximation the field levels, due to extended variability of environmental conditions (e.g. coexistence of several sources, ground and building conformation, etc..). The measurement procedures must follow a methodology that could allow to minimise the interferences with the measurement set-up and the systematic and accidental errors. Risks for the operator and damages to the instrument should also be taken into account. One of the goal set for this research program was then the definition of the measurement protocol for electromagnetic field generated by low frequency non ionising radiation sources. In particular sources like power lines will be considered in order to validate the protocol by means of in-field measurements

  9. Protocol and the post-human performativity of security techniques.

    Science.gov (United States)

    O'Grady, Nathaniel

    2016-07-01

    This article explores the deployment of exercises by the United Kingdom Fire and Rescue Service. Exercises stage, simulate and act out potential future emergencies and in so doing help the Fire and Rescue Service prepare for future emergencies. Specifically, exercises operate to assess and develop protocol; sets of guidelines which plan out the actions undertaken by the Fire and Rescue Service in responding to a fire. In the article I outline and assess the forms of knowledge and technologies, what I call the 'aesthetic forces', by which the exercise makes present and imagines future emergencies. By critically engaging with Karen Barad's notion of post-human performativity, I argue that exercises provide a site where such forces can entangle with one another; creating a bricolage through which future emergencies are evoked sensually and representatively, ultimately making it possible to experience emergencies in the present. This understanding of exercises allows also for critical appraisal of protocol both as phenomena that are produced through the enmeshing of different aesthetic forces and as devices which premise the operation of the security apparatus on contingency.

  10. Transfer learning improves supervised image segmentation across imaging protocols.

    Science.gov (United States)

    van Opbroek, Annegreet; Ikram, M Arfan; Vernooij, Meike W; de Bruijne, Marleen

    2015-05-01

    The variation between images obtained with different scanners or different imaging protocols presents a major challenge in automatic segmentation of biomedical images. This variation especially hampers the application of otherwise successful supervised-learning techniques which, in order to perform well, often require a large amount of labeled training data that is exactly representative of the target data. We therefore propose to use transfer learning for image segmentation. Transfer-learning techniques can cope with differences in distributions between training and target data, and therefore may improve performance over supervised learning for segmentation across scanners and scan protocols. We present four transfer classifiers that can train a classification scheme with only a small amount of representative training data, in addition to a larger amount of other training data with slightly different characteristics. The performance of the four transfer classifiers was compared to that of standard supervised classification on two magnetic resonance imaging brain-segmentation tasks with multi-site data: white matter, gray matter, and cerebrospinal fluid segmentation; and white-matter-/MS-lesion segmentation. The experiments showed that when there is only a small amount of representative training data available, transfer learning can greatly outperform common supervised-learning approaches, minimizing classification errors by up to 60%.

  11. A Cryptographic Moving-Knife Cake-Cutting Protocol

    Directory of Open Access Journals (Sweden)

    Yoshifumi Manabe

    2012-02-01

    Full Text Available This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum.

  12. Welfare Quality assessment protocol for laying hens = Welfare Quality assessment protocol voor leghennen

    NARCIS (Netherlands)

    Niekerk, van T.G.C.M.; Gunnink, H.; Reenen, van C.G.

    2012-01-01

    Results of a study on the Welfare Quality® assessment protocol for laying hens. It reports the development of the integration of welfare assessment as scores per criteria as well as simplification of the Welfare Quality® assessment protocol. Results are given from assessment of 122 farms.

  13. Nursing Music Protocol and Postoperative Pain.

    Science.gov (United States)

    Poulsen, Michael J; Coto, Jeffrey

    2018-04-01

    Pain has always been a major concern for patients and nurses during the postoperative period. Therapies, medicines, and protocols have been developed to improve pain and anxiety but have undesirable risks to the patient. Complementary and alternative medicine therapies have been studied but have not been applied as regular protocols in the hospital setting. Music is one type of complementary and alternative medicine therapy that has been reported to have favorable results on reducing postoperative pain, anxiety, and opioid usage. However, music lacks a protocol that nurses can implement during the perioperative process. This paper is an in-depth literature review assessing a best practice recommendation and protocol that establishes a consensus in the use of music therapy. The results suggest that music therapy may consist of calming, soft tones of 60-80 beats per minute for at least 15-30 minutes at least twice daily during the pre- and postoperative periods. It is suggested that music only be used in conjunction with standards of care and not as the primary intervention of pain or anxiety. This evidence suggests that proper use of music therapy can significantly reduce surgical pain. Implementing these protocols and allowing the freedom of nursing staff to use them may lead to greater reductions in surgical pain and anxiety and a reduction in opioid use. Copyright © 2017 American Society for Pain Management Nursing. Published by Elsevier Inc. All rights reserved.

  14. WDM Network and Multicasting Protocol Strategies

    Directory of Open Access Journals (Sweden)

    Pinar Kirci

    2014-01-01

    Full Text Available Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM, it is easier to take the advantage of optical networks and optical burst switching (OBS and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET and Just In Time (JIT reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes.

  15. A Lightweight Protocol for Secure Video Streaming.

    Science.gov (United States)

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  16. Two Cheers for the Trafficking Protocol

    Directory of Open Access Journals (Sweden)

    Anne T Gallagher

    2015-04-01

    Full Text Available The Trafficking Protocol makes an easy target for attack. Its origins lie in an attempt to control a particularly exploitative form of migration that was challenging the ability of States to control their own borders. Its parent instrument is a framework agreement to address transnational organised crime. While paying fleeting attention to the rights of victims, the Protocol, with its emphasis on criminalisation and border protection is nowhere near being a human rights treaty. On top of all that it does not even have a credible enforcement mechanism, allowing states parties wide latitude in interpreting and applying their obligations. Strangely, these seemingly insurmountable flaws have not stopped the Protocol’s emergence as perhaps the single most important development in the fight against human trafficking. Without the Protocol, arguments around definitions would have continued to block the evolution of principles and rules. Without the Protocol it is likely that the human rights system would have continued its shameful tradition of sidelining issues such as forced labour, forced sex, forced marriage and the ritual exploitation of migrant workers through debt. Most critically, the Protocol provided the impetus and template for a series of legal and political developments that, over time, have served to ameliorate some of its greatest weaknesses, including the lack of human rights protections and of a credible oversight mechanism.

  17. Supporting Adaptation of Wireless Communication Protocols

    International Nuclear Information System (INIS)

    Dhomeja, L.D.; Soomro, I.A.; Malkani, Y.A.

    2016-01-01

    Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants) come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity), Bluetooth, IrDA (Infrared), etc. In order for pervasive devices to interact with each other, they need to have matching (alike) communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth) from what the server has (e.g. WiFi), connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange), L2CAP (Logical Link Control and Adaptation Protocol), RFCOM (Radio Frequency Communication) and WiFi protocol and can run on (J2MW (Java 2 Micro Edition) enabled mobile phones which support both Bluetooth and WiFi capabilities. (author)

  18. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  19. Decellularization of placentas: establishing a protocol

    Directory of Open Access Journals (Sweden)

    L.C.P.C. Leonel

    2017-11-01

    Full Text Available Biological biomaterials for tissue engineering purposes can be produced through tissue and/or organ decellularization. The remaining extracellular matrix (ECM must be acellular and preserve its proteins and physical features. Placentas are organs of great interest because they are discarded after birth and present large amounts of ECM. Protocols for decellularization are tissue-specific and have not been established for canine placentas yet. This study aimed at analyzing a favorable method for decellularization of maternal and fetal portions of canine placentas. Canine placentas were subjected to ten preliminary tests to analyze the efficacy of parameters such as the type of detergents, freezing temperatures and perfusion. Two protocols were chosen for further analyses using histology, scanning electron microscopy, immunofluorescence and DNA quantification. Sodium dodecyl sulfate (SDS was the most effective detergent for cell removal. Freezing placentas before decellularization required longer periods of incubation in different detergents. Both perfusion and immersion methods were capable of removing cells. Placentas decellularized using Protocol I (1% SDS, 5 mM EDTA, 50 mM TRIS, and 0.5% antibiotic preserved the ECM structure better, but Protocol I was less efficient to remove cells and DNA content from the ECM than Protocol II (1% SDS, 5 mM EDTA, 0.05% trypsin, and 0.5% antibiotic.

  20. A More Efficient Contextuality Distillation Protocol

    Science.gov (United States)

    Meng, Hui-xian; Cao, Huai-xin; Wang, Wen-hua; Fan, Ya-jing; Chen, Liang

    2018-03-01

    Based on the fact that both nonlocality and contextuality are resource theories, it is natural to ask how to amplify them more efficiently. In this paper, we present a contextuality distillation protocol which produces an n-cycle box B ∗ B ' from two given n-cycle boxes B and B '. It works efficiently for a class of contextual n-cycle ( n ≥ 4) boxes which we termed as "the generalized correlated contextual n-cycle boxes". For any two generalized correlated contextual n-cycle boxes B and B ', B ∗ B ' is more contextual than both B and B '. Moreover, they can be distilled toward to the maximally contextual box C H n as the times of iteration goes to infinity. Among the known protocols, our protocol has the strongest approximate ability and is optimal in terms of its distillation rate. What is worth noting is that our protocol can witness a larger set of nonlocal boxes that make communication complexity trivial than the protocol in Brunner and Skrzypczyk (Phys. Rev. Lett. 102, 160403 2009), this might be helpful for exploring the problem that why quantum nonlocality is limited.

  1. Efficient Communication Protocols for Deciding Edit Distance

    DEFF Research Database (Denmark)

    Jowhari, Hossein

    2012-01-01

    In this paper we present two communication protocols on computing edit distance. In our first result, we give a one-way protocol for the following Document Exchange problem. Namely given x ∈ Σn to Alice and y ∈ Σn to Bob and integer k to both, Alice sends a message to Bob so that he learns x...... or truthfully reports that the edit distance between x and y is greater than k. For this problem, we give a randomized protocol in which Alice transmits at most O ˜ (klog 2 n) bits and each party’s time complexity is O ˜ (nlogn+k 2 log 2 n) . Our second result is a simultaneous protocol for edit distance over...... permutations. Here Alice and Bob both send a message to a third party (the referee) who does not have access to the input strings. Given the messages, the referee decides if the edit distance between x and y is at most k or not. For this problem we give a protocol in which Alice and Bob run a O...

  2. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  3. A class-chest for deriving transport protocols

    Energy Technology Data Exchange (ETDEWEB)

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  4. Transfer learning improves supervised image segmentation across imaging protocols

    DEFF Research Database (Denmark)

    van Opbroek, Annegreet; Ikram, M. Arfan; Vernooij, Meike W.

    2015-01-01

    with slightly different characteristics. The performance of the four transfer classifiers was compared to that of standard supervised classification on two MRI brain-segmentation tasks with multi-site data: white matter, gray matter, and CSF segmentation; and white-matter- /MS-lesion segmentation......The variation between images obtained with different scanners or different imaging protocols presents a major challenge in automatic segmentation of biomedical images. This variation especially hampers the application of otherwise successful supervised-learning techniques which, in order to perform...... well, often require a large amount of labeled training data that is exactly representative of the target data. We therefore propose to use transfer learning for image segmentation. Transfer-learning techniques can cope with differences in distributions between training and target data, and therefore...

  5. Defining robustness protocols: a method to include and evaluate robustness in clinical plans

    International Nuclear Information System (INIS)

    McGowan, S E; Albertini, F; Lomax, A J; Thomas, S J

    2015-01-01

    We aim to define a site-specific robustness protocol to be used during the clinical plan evaluation process. Plan robustness of 16 skull base IMPT plans to systematic range and random set-up errors have been retrospectively and systematically analysed. This was determined by calculating the error-bar dose distribution (ebDD) for all the plans and by defining some metrics used to define protocols aiding the plan assessment. Additionally, an example of how to clinically use the defined robustness database is given whereby a plan with sub-optimal brainstem robustness was identified. The advantage of using different beam arrangements to improve the plan robustness was analysed. Using the ebDD it was found range errors had a smaller effect on dose distribution than the corresponding set-up error in a single fraction, and that organs at risk were most robust to the range errors, whereas the target was more robust to set-up errors. A database was created to aid planners in terms of plan robustness aims in these volumes. This resulted in the definition of site-specific robustness protocols. The use of robustness constraints allowed for the identification of a specific patient that may have benefited from a treatment of greater individuality. A new beam arrangement showed to be preferential when balancing conformality and robustness for this case. The ebDD and error-bar volume histogram proved effective in analysing plan robustness. The process of retrospective analysis could be used to establish site-specific robustness planning protocols in proton therapy. These protocols allow the planner to determine plans that, although delivering a dosimetrically adequate dose distribution, have resulted in sub-optimal robustness to these uncertainties. For these cases the use of different beam start conditions may improve the plan robustness to set-up and range uncertainties. (paper)

  6. Defining robustness protocols: a method to include and evaluate robustness in clinical plans

    Science.gov (United States)

    McGowan, S. E.; Albertini, F.; Thomas, S. J.; Lomax, A. J.

    2015-04-01

    We aim to define a site-specific robustness protocol to be used during the clinical plan evaluation process. Plan robustness of 16 skull base IMPT plans to systematic range and random set-up errors have been retrospectively and systematically analysed. This was determined by calculating the error-bar dose distribution (ebDD) for all the plans and by defining some metrics used to define protocols aiding the plan assessment. Additionally, an example of how to clinically use the defined robustness database is given whereby a plan with sub-optimal brainstem robustness was identified. The advantage of using different beam arrangements to improve the plan robustness was analysed. Using the ebDD it was found range errors had a smaller effect on dose distribution than the corresponding set-up error in a single fraction, and that organs at risk were most robust to the range errors, whereas the target was more robust to set-up errors. A database was created to aid planners in terms of plan robustness aims in these volumes. This resulted in the definition of site-specific robustness protocols. The use of robustness constraints allowed for the identification of a specific patient that may have benefited from a treatment of greater individuality. A new beam arrangement showed to be preferential when balancing conformality and robustness for this case. The ebDD and error-bar volume histogram proved effective in analysing plan robustness. The process of retrospective analysis could be used to establish site-specific robustness planning protocols in proton therapy. These protocols allow the planner to determine plans that, although delivering a dosimetrically adequate dose distribution, have resulted in sub-optimal robustness to these uncertainties. For these cases the use of different beam start conditions may improve the plan robustness to set-up and range uncertainties.

  7. Site characterization plan:

    International Nuclear Information System (INIS)

    1988-01-01

    The Yucca Mountain site in Nevada is one of three candidate sites for the first geologic repository for radioactive waste. On May 28, 1986, it was recommended for detailed study in a program of site characterization. This site characterization plan (SCP) has been prepared in accordance with the requirements of the Nuclear Waste Policy Act to summarize the information collected to date about the geologic conditions at the site;to describe the conceptual designs for the repository and the waste package;and to present the plans for obtaining the geologic information necessary to demonstrate the suitability of the site for repository, to design the repository and the waste package, to prepare an environmental impact statement, and to obtain from the US Nuclear Regulatory Commission (NRC) an authorization to construct the repository. This introduction begins with a brief section on the process for siting and developing a repository, followed by a discussion of the pertinent legislation and regulations. A description of site characterization is presented next;it describes the facilities to be constructed for the site characterization program and explains the principal activities to be conducted during the program. Finally, the purpose, content, organizing principles, and organization of this site characterization plan are outlined, and compliance with applicable regulations is discussed

  8. Site characterization plan:

    International Nuclear Information System (INIS)

    1988-01-01

    The Yucca Mountain site in Nevada is one of three candidate sites for the first geologic repository for radioactive waste. On May 28, 1986, it was recommended for detailed study in a program of site characterization. This site characterization plan (SCP) has been prepared in acordance with the requirements of the Nuclear Waste Policy Act to summarize the information collected to date about the geologic conditions at the site;to describe the conceptual designs for the repository and the waste package and to present the plans for obtaining the geologic information necessary to demonstrate the suitability of the site for a repository, to design the repository and the waste package, to prepare an environmental impact statement, and to obtain from the US Nuclear Regulatory Commission (NRC) an authorization to construct the repository. This introduction begins with a brief section on the process for siting and eveloping a repository, followed by a discussion of the pertinent legislation and regulations. A description of site characterization is presented next;it describes the facilities to be constructed for the site characterization program and explains the principal activities to be conducted during the program. Finally, the purpose, content, organizing prinicples, and organization of this site characterization plan are outlined, and compliance with applicable regulations is discussed. 880 refs., 130 figs., 25 tabs

  9. An one-time-pad key communication protocol with entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We present an one-time-pad key communication protocol that allows secure direct communication with entanglement. Alice can send message to Bob in a deterministic manner by using local measurements and public communication. The theoretical efficiency of this protocol is double compared with BB84 protocol. We show this protocol is unconditional secure under arbitrary quantum attack. And we discuss that this protocol can be perfectly implemented with current technologies.

  10. Commercial satellite data as support to the additional protocol declarations

    International Nuclear Information System (INIS)

    Joensson, Camilla; Andersson, Christer

    2001-01-01

    Full text: Objectives - The overall objective of the project is to show how commercial satellite data can be used for safeguard purposes both at SKI and the International Atomic Energy Agency. Furthermore this project will support IAEA in its process to develop methods to make the best use of provided information such as digitised maps and satellite images. Finally it will give IAEA a case study of the usefulness of satellite data for change detection purposes. Background - The protocol calls among others for an extended/complete declaration of all nuclear fuel cycle-related research and development activities as well as sites where nuclear material is or was customarily used. The declaration shall include descriptions of all buildings at the sites as well as maps. In parallel to the development of the additional protocol IAEA has started to use a variety of measures/techniques both to verify that declarations are complete and correct but also to be able to come to the conclusion that a state has no undeclared nuclear material or undeclared nuclear activities. One such technique is the use of commercial satellite data. The IAEA is now in the process of evaluating the usefulness and effectiveness of such data for safeguard purposes. In order to come to a decision on how to use satellite data IAEA is highly dependant on support from member states which can provide results from case studies etc. Analysis - This project shall provide SKI with digitised maps and commercial satellite data by the means of GIS to verify the descriptions provided by two of the nuclear operators. Furthermore those digital data can be included in the declaration given to IAEA. The overall aim is to enhance the quality of the Swedish declaration including support to IAEA to develop methods to use commercial satellite data. Results - The paper will present experiences and mapping results made during the work. (author)

  11. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols.

    Science.gov (United States)

    Campagne, Fabien

    2008-02-29

    The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79-0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86-0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these protocols can fully substitute

  12. Analysis of Security Protocols by Annotations

    DEFF Research Database (Denmark)

    Gao, Han

    . The development of formal techniques, e.g. control flow analyses, that can check various security properties, is an important tool to meet this challenge. This dissertation contributes to the development of such techniques. In this dissertation, security protocols are modelled in the process calculus LYSA......The trend in Information Technology is that distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great...... deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal. It has long been a challenge to determine conclusively whether a given protocol is secure or not...

  13. Breaking Megrelishvili protocol using matrix diagonalization

    Science.gov (United States)

    Arzaki, Muhammad; Triantoro Murdiansyah, Danang; Adi Prabowo, Satrio

    2018-03-01

    In this article we conduct a theoretical security analysis of Megrelishvili protocol—a linear algebra-based key agreement between two participants. We study the computational complexity of Megrelishvili vector-matrix problem (MVMP) as a mathematical problem that strongly relates to the security of Megrelishvili protocol. In particular, we investigate the asymptotic upper bounds for the running time and memory requirement of the MVMP that involves diagonalizable public matrix. Specifically, we devise a diagonalization method for solving the MVMP that is asymptotically faster than all of the previously existing algorithms. We also found an important counterintuitive result: the utilization of primitive matrix in Megrelishvili protocol makes the protocol more vulnerable to attacks.

  14. Automatic Generation of Network Protocol Gateways

    DEFF Research Database (Denmark)

    Bromberg, Yérom-David; Réveillère, Laurent; Lawall, Julia

    2009-01-01

    for describing protocol behaviors, message structures, and the gateway logic.  Z2z includes a compiler that checks essential correctness properties and produces efficient code. We have used z2z to develop a number of gateways, including SIP to RTSP, SLP to UPnP, and SMTP to SMTP via HTTP, involving a range......The emergence of networked devices in the home has made it possible to develop applications that control a variety of household functions. However, current devices communicate via a multitude of incompatible protocols, and thus gateways are needed to translate between them.  Gateway construction......, however, requires an intimate knowledge of the relevant protocols and a substantial understanding of low-level network programming, which can be a challenge for many application programmers. This paper presents a generative approach to gateway construction, z2z, based on a domain-specific language...

  15. Magnetic resonance imaging protocols for paediatric neuroradiology

    International Nuclear Information System (INIS)

    Saunders, Dawn E.; Thompson, Clare; Gunny, Roxanne; Jones, Rod; Cox, Tim; Chong, Wui Khean

    2007-01-01

    Increasingly, radiologists are encouraged to have protocols for all imaging studies and to include imaging guidelines in care pathways set up by the referring clinicians. This is particularly advantageous in MRI where magnet time is limited and a radiologist's review of each patient's images often results in additional sequences and longer scanning times without the advantage of improvement in diagnostic ability. The difficulties of imaging small children and the challenges presented to the radiologist as the brain develops are discussed. We present our protocols for imaging the brain and spine of children based on 20 years experience of paediatric neurological MRI. The protocols are adapted to suit children under the age of 2 years, small body parts and paediatric clinical scenarios. (orig.)

  16. Demarcation of Security in Authentication Protocols

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security analysis of communication protocols is a slippery business; many “secure” protocols later turn out to be insecure. Among many, two complains are more frequent: inadequate definition of security and unstated assumptions in the security model. In our experience, one principal cause...... for such state of affairs is an apparent overlap of security and correctness, which may lead to many sloppy security definitions and security models. Although there is no inherent need to separate security and correctness requirements, practically, such separation is significant. It makes security analysis...... easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...

  17. Will OPEC lose from the Kyoto Protocol?

    International Nuclear Information System (INIS)

    Barnett, Jon; Dessai, Suraje; Webber, Michael

    2004-01-01

    A range of energy-economy models forecast losses to members of the Organisation of Petroleum Exporting Countries (OPEC) should the Kyoto Protocol come into force. These forecasts are a powerful influence in the United Nations Framework Convention on Climate Change negotiations. They are used by OPEC to advance the agenda on the impacts of response measures, covertly arguing for compensation for lost oil revenues arising from implementation of the Protocol. This paper discusses this issue, and explores the key assumptions of these models and their uncertainties. Assumptions about carbon leakage, future availability of oil reserves, substitution, innovation, and capital turnover are considered. The paper suggests that losses will not affect OPEC countries equally, and that these losses are not likely to be as substantial as the models forecast. A range of policy measures are proposed to lessen any impact the Protocol may have on OPEC

  18. Structured Transition Protocol for Children with Cystinosis

    Directory of Open Access Journals (Sweden)

    Rupesh Raina

    2017-08-01

    Full Text Available The transition from pediatric to adult medical services has a greater impact on the care of adolescents or young adults with chronic diseases such as cystinosis. This transition period is a time of psychosocial development and new responsibilities placing these patients at increased risk of non-adherence. This can lead to serious adverse effects such as graft loss and progression of the disease. Our transition protocol will provide patients, families, physicians, and all those involved a structured guide to transitioning cystinosis patients. This structured protocol depends on four areas of competency: Recognition, Insight, Self-reliance, and Establishment of healthy habits (RISE. This protocol has not been tested and therefore challenges not realized. With a focus on medical, social, and educational/vocational aspects, we aim to improve transition for cystinosis patients in all aspects of their lives.

  19. Newborn hearing screening protocol in tuscany region.

    Science.gov (United States)

    Berrettini, Stefano; Ghirri, Paolo; Lazzerini, Francesco; Lenzi, Giovanni; Forli, Francesca

    2017-09-20

    Newborn hearing screening has to be considered the first step of a program for the identification, diagnosis, treatment and habilitation/rehabilitation of children with hearing impairment. In Tuscany Region of Italy, the universal newborn hearing screening is mandatory since november 2007. The first guidelines for the execution of the screening have been released in June 2008; then many other Italian regions partially or totally adopted these guidelines. On the basis of the experience from 2008 and according to the recent evidences in the scientific literature, a new screening protocol was released in Tuscany region. The new protocol is an evolution of the previous one. Some issues reported in the previous protocol and in the Joint Committee on Infant Hearing statement published in 2007 were revised, such as the risk factors for auditory neuropathy and for late onset, progressive or acquired hearing loss. The new updated guidelines were submitted to the Sanitary Regional Council and then they have been approved in August 2016. The updated screening protocol is mainly aimed to identify newborns with a congenital moderate-to-profound hearing loss, but it also provides indications for the audiological follow-up of children with risk's factor for progressive or late onset hearing loss; further it provides indications for the audiological surveillance of children at risk for acquired hearing impairment. Then, in the new guidelines the role of the family paediatrician in the newborn hearing screening and audiological follow-up and surveillance is underscored. Finally the new guidelines provide indications for the treatment with hearing aids and cochlear implant, in accordance with the recent Italian Health Technology Assessment (HTA) guidelines. In the paper we report the modality of execution of the universal newborn hearing screening in the Tuscany Region, according to the recently updated protocol. The main features of the protocol and the critical issues are

  20. Replication protocol analysis: a method for the study of real-world design thinking

    DEFF Research Database (Denmark)

    Galle, Per; Kovacs, L. B.

    1996-01-01

    ’ is refined into a method called ‘replication protocol analysis’ (RPA), and discussed from a methodological perspective of design research. It is argued that for the study of real-world design thinking this method offers distinct advantages over traditional ‘design protocol analysis’, which seeks to capture......Given the brief of an architectural competition on site planning, and the design awarded the first prize, the first author (trained as an architect but not a participant in the competition) produced a line of reasoning that might have led from brief to design. In the paper, such ‘design replication...... the designer’s authentic line of reasoning. To illustrate how RPA can be used, the site planning case is briefly presented, and part of the replicated line of reasoning analysed. One result of the analysis is a glimpse of a ‘logic of design’; another is an insight which sheds new light on Darke’s classical...

  1. Site environmental programs

    Energy Technology Data Exchange (ETDEWEB)

    Schmidt, J.W.; Hanf, R.W.

    1995-06-01

    This section of the 1994 Hanford Site Environmental Report summarizes the site environmental programs. Effluent monitoring and environmental surveillance programs monitor for impacts from operations in several areas. The first area consists of the point of possible release into the environment. The second area consists of possible contamination adjacent to DOE facilities, and the third area is the general environment both on and off the site.

  2. Site environmental report summary

    International Nuclear Information System (INIS)

    1992-01-01

    In this summary of the Fernald 1992 Site Environmental Report the authors will describe the impact of the Fernald site on man and the environment and provide results from the ongoing Environmental Monitoring Program. Also included is a summary of the data obtained from sampling conducted to determine if the site complies with DOE, US Environmental Protection Agency (USEPA), and Ohio EPA (OEPA) requirements. These requirements are set to protect both man and the environment

  3. Site environmental programs

    International Nuclear Information System (INIS)

    Schmidt, J.W.; Hanf, R.W.

    1995-01-01

    This section of the 1994 Hanford Site Environmental Report summarizes the site environmental programs. Effluent monitoring and environmental surveillance programs monitor for impacts from operations in several areas. The first area consists of the point of possible release into the environment. The second area consists of possible contamination adjacent to DOE facilities, and the third area is the general environment both on and off the site

  4. Turf Conversion Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)

    2017-12-05

    This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings as a result of water conservation measures (WCMs) in energy performance contracts associated with converting turfgrass or other water-intensive plantings to water-wise and sustainable landscapes. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.

  5. Outdoor Irrigation Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)

    2017-12-05

    This measurement and verification (M&V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with outdoor irrigation efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M&V plan, and details the procedures to use to determine water savings.

  6. Study Application of RADIUS Protocol on Ethernet

    Institute of Scientific and Technical Information of China (English)

    GUO Fang; YANG Huan-yu; LI Hong

    2004-01-01

    This paper presents how to apply the RADIUS (Remote Authentication Dial In User Service)protocol ,which is generally applied to dial-up network, to the authentication & charge of Broad Band accessing control system on Ethernet. It is provided that the Broad Band accessing control system included a self-designed communication protocol is used in communicating between an terminal user and Network Access Server .The interface module on the servers side and the Radius system is also given in this article.

  7. Vicissitudes of Nagoya Protocol in Colombia

    International Nuclear Information System (INIS)

    Rojas Blanco, Diana Lorena

    2013-01-01

    The fair and equitable sharing of benefits arising from the utilization of genetic resources is not only one of the central objectives of the Nagoya Protocol, but also a challenge for communities of scientists, researchers, and indigenous ancestral generally for the educational community. It is therefore essential to know what the real and material implications for the population, the ratification of the Nagoya Protocol, which despite having sufficient justification and argued, highlights the need to develop legal tools, economic, technological and education for proper and fair implementation.

  8. Evolution of a C2 protocol gateway

    CSIR Research Space (South Africa)

    Duvenhage, A

    2008-06-01

    Full Text Available real-time or slower than real-time, depending on the type of link and the data source: The gateway normally reads logged raw protocol data much faster than real-time; a simulation could also start running slower than real-time if it requires too... inherent support for logging and playback of the raw protocol data. From a software architecture perspective, each link has a corresponding link component that is responsible for opening and closing the connection, as well as reading and writing...

  9. Sessions and Separability in Security Protocols

    DEFF Research Database (Denmark)

    Carbone, Marco; Guttman, Joshua

    2013-01-01

    Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any uncomprom......Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any...

  10. CERCLA site assessment workbook

    International Nuclear Information System (INIS)

    1994-08-01

    This contains comments for each chapter of exercises (in Vol. 1) which illustrate how to conduct site assessments for CERCLA regulation. A through analysis of the exercises is provided so that work and solutions from Vol 1 can be critiqued and comments are also included on the strategy of site assessment whereas the exercises illustrate the principles involved. Covered exercises include the following: A preliminary assessment of a ground water site; waste characteristics and characterization of sources; documentation of observed releases and actual contamination of targets; the strategy of an SI at a surface water site; the soil exposure pathway; the air pathway

  11. Nuclear site selection studies

    International Nuclear Information System (INIS)

    Gharib, A.; Zohoorian Izadpanah, A.A.; Iranmanesh, H.

    2000-01-01

    It is of special importance, especially from the nuclear safety viewpoint, to select suitable sites for different nuclear structures with the considered future activities. Site selection sometimes involves high costs not necessarily for merely selecting of site but for some preliminary measures to be taken so as the site may have the necessary characteristics. The more suitable the natural characteristics of the site for the considered project, the more successful and efficient the project, the lower the project costs and the longer the project operation period. If so, the project will cause the growth of public culture and sustainable socioeconomic development. This paper is the result of the conclusion of numerous massive reports of this activity in the preliminary phase based on theories, practices and the related safety principles on this ground as well as the application of data and information of the past and a glance to the future. The conception of need for a site for medium structures and nuclear research projects and how to perform this process are presented step by step here with a scientific approach to its selection during the investigations. In this study, it is practically described how the site is selected, by determining and defining the characteristics of research and nuclear projects with medium structures and also its fitting to the optimum site. The discovered sites typically involve the best advantages in technical and economic aspects and no particular contrast with the concerned structures

  12. Meteorology in site operations

    International Nuclear Information System (INIS)

    Anon.

    1986-01-01

    During the site selection and design phases of a plant, meteorological assistance must be based on past records, usually accumulated at stations not actually on the site. These preliminary atadvices will be averages and extremes that might be expected. After a location has been chosen and work has begun, current and forecast weather conditions become of immediate concern. On-site meteorological observations and forecasts have many applications to the operating program of an atomic energy site. Requirements may range from observations of the daily minimum temperatures to forecasts of radiation dosages from airborne clouds

  13. 1994 Site environmental report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-07-01

    The Fernald site is a Department of Energy (DOE)-owned facility that produced high-quality uranium metals for military defense for nearly 40 years. DOE suspended production at the site in 1989 and formally ended production in 1991. Although production activities have ceased, the site continues to examine the air and liquid pathways as possible routes through which pollutants from past operations and current remedial activities may leave the site. The Site Environmental Report (SER) is prepared annually in accordance with DOE Order 5400.1, General Environmental Protection Program. This 1994 SER provides the general public as well as scientists and engineers with the results from the site`s ongoing Environmental Monitoring Program. Also included in this report is information concerning the site`s progress toward achieving full compliance with requirements set forth by DOE, U.S. Environmental Protection Agency (USEPA), and Ohio EPA (OEPA). For some readers, the highlights provided in this Executive Summary may provide sufficient information. Many readers, however, may wish to read more detailed descriptions of the information than those which are presented here. All information presented in this summary is discussed more fully in the main body of this report.

  14. Disinfection Contact Time study plan (100-N Area tracer protocol). Revision 1

    International Nuclear Information System (INIS)

    Kretzschmar, S.P.; Bedi, G.S.; Martinez, P.; Ervin, K.

    1996-07-01

    Bechtel Hanford, Inc. will prepare an Engineering Tracer Study Protocol for the determination of contact time for the disinfection process at Group A Non-transient Non-community water treatment plant for the 100-N Water Plant at the Hanford Site in Richland, Washington. Included in this report are the results of a study that determine the actual detention time within the plant clearwell, and thus the disinfection contact time at several clearwell effluent flow rates

  15. Release protocol to address DOE moratorium on shipments of waste generated in radiologically controlled areas

    International Nuclear Information System (INIS)

    Rathbun, L.A.; Boothe, G.F.

    1992-10-01

    On May 17, 1991 the US DOE Office of Waste Operations issued a moratorium on the shipment of hazardous waste from radiologically contaminated or potentially contaminated areas on DOE sites to offsite facilities not licensed for radiological material. This document describes a release protocol generated by Westinghouse Hanford submitted for US DOE approval. Topics considered include designating Radiological Materials Management Areas (RMMAs), classification of wastes, handling of mixed wastes, detection limits

  16. Indicators and measurement tools for health system integration : a knowledge synthesis protocol

    OpenAIRE

    Oelke, Nelly Donszelmann; Suter, Esther; Lima, Maria Alice Dias da Silva; Vliet-Brown, Cheryl Van

    2015-01-01

    Background: Health system integration is a key component of health system reform with the goal of improving outcomes for patients, providers, and the health system. Although health systems continue to strive for better integration, current delivery of health services continues to be fragmented. A key gap in the literature is the lack of information on what successful integration looks like and how to measure achievement towards an integrated system. This multi-site study protocol builds on a ...

  17. Effect of Unshaven Hair with Absorbable Sutures and Early Postoperative Shampoo on Cranial Surgery Site Infection.

    Science.gov (United States)

    Oh, Won-Oak; Yeom, Insun; Kim, Dong-Seok; Park, Eun-Kyung; Shim, Kyu-Won

    2018-01-01

    Cranial surgical site infection is a significant cause of morbidity and mortality in hospitals. Preoperative hair shaving for cranial neurosurgical procedures is performed traditionally in an attempt to protect patients against complications from infections at cranial surgical sites. However, preoperative shaving of surgical incision sites using traditional surgical blades without properly washing the head after surgery can cause infections at surgical sites. Therefore, a rapid protocol in which the scalp remains unshaven and absorbable sutures are used for scalp closure with early postoperative shampooing is examined in this study. A retrospective comparative study was conducted from January 2008 to December 2012. A total of 2,641 patients who underwent unshaven cranial surgery with absorbable sutures for scalp closure were enrolled in this study. Data of 1,882 patients who underwent surgery with the traditional protocol from January 2005 to December 2007 were also analyzed for comparison. Of 2,641 patients who underwent cranial surgery with the rapid protocol, all but 2 (0.07%) patients experienced satisfactory wound healing. Of 1,882 patients who underwent cranial surgery with the traditional protocol, 3 patients (0.15%) had infections. Each infection occurred at the superficial incisional surgical site. Unshaven cranial surgery using absorbable sutures for scalp closure with early postoperative shampooing is safe and effective in the cranial neurosurgery setting. This protocol has a positive psychological effect. It can help patients accept neurosurgical procedures and improve their self-image after the operation. © 2017 S. Karger AG, Basel.

  18. Anthropometric protocols for the construction of new international fetal and newborn growth standards: the INTERGROWTH-21st Project.

    Science.gov (United States)

    Cheikh Ismail, L; Knight, H E; Bhutta, Z; Chumlea, W C

    2013-09-01

    The primary aim of the INTERGROWTH-21(st) Project is to construct new, prescriptive standards describing optimal fetal and preterm postnatal growth. The anthropometric measurements include the head circumference, recumbent length and weight of the infants, and the stature and weight of the parents. In such a large, international, multicentre project, it is critical that all study sites follow standardised protocols to ensure maximal validity of the growth and nutrition indicators used. This paper describes, in detail, the selection of anthropometric personnel, equipment, and measurement and calibration protocols used to construct the new standards. Implementing these protocols at each study site ensures that the anthropometric data are of the highest quality to construct the international standards. © 2013 Royal College of Obstetricians and Gynaecologists.

  19. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  20. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  1. Savannah River Site's Site Specific Plan

    International Nuclear Information System (INIS)

    1991-01-01

    This Site Specific Plan (SSP) has been prepared by the Savannah River Site (SRS) in order to show the Environmental Restoration and Waste Management activities that were identified during the preparation of the Department of Energy-Headquarters (DOE-HQ) Environmental Restoration and Waste Management Five-Year Plan (FYP) for FY 1992--1996. The SSP has been prepared in accordance with guidance received from DOE-HQ. DOE-SR is accountable to DOE-HQ for the implementation of this plan. The purpose of the SSP is to develop a baseline for policy, budget, and schedules for the DOE Environmental Restoration and Waste Management activities. The plan explains accomplishments since the Fiscal Year (FY) 1990 plan, demonstrates how present and future activities are prioritized, identifies currently funded activities and activities that are planned to be funded in the upcoming fiscal year, and describes future activities that SRS is considering

  2. SITE-94. Mineralogy of the Aespoe site

    International Nuclear Information System (INIS)

    Andersson, Karin

    1996-12-01

    The water composition has several impacts on the repository. It will influence the behaviour of the engineered materials (e.g. corrosion). It may also determine the possible solubility and speciation of released radionuclides. It also acts as a transport medium for the released elements. The groundwater composition and the potential development of the composition due to the presence of the repository as well as due to external variations is thus an important issue in a safety analysis. The development of the groundwater composition is strongly dependent on reactions with the minerals present in water bearing fractures. Here equilibrium chemistry may be of importance, but also reaction kinetics is important to the long-term behaviour. Within the SITE-94 project, a safety analysis is performed for the conditions at the Aespoe site. The mineralogy of the area has been evaluated from drill cores at various places at the site. In this report a recommendation for selection of mineralogy to be used in geochemical modelling of the repository is given. Calcite and iron containing minerals dominate the fracture filling mineralogy at the Aespoe site. Some typical fracture filling mineralogies may be identified in the fractures: epidote, chlorite, calcite, hematite, some illite/smectite + quartz, fluorite, pyrite and goethite. In addition to these a number of minor minerals are found in the fractures. Uncertainties in the fracture filling data may be due to problems when taking out the drill cores. Drilling water may remove important clay minerals and sealed fractures may be reopened mechanically and treated as water conducting fractures. The problem of determining the variability of the mineralogy along the flow paths also remains. This problem will never be solved when the investigation is performed by drilling investigation holes

  3. Preliminary Site Characterization Report, Rulsion Site, Colorado

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-08-01

    This report is a summary of environmental information gathered during a review of the documents pertaining to Project Rulison and interviews with personnel who worked on the project. Project Rulison was part of Operation Plowshare (a program designed to explore peaceful uses for nuclear devices). The project consisted of detonating a 43-kiloton nuclear device on September 10, 1969, in western Colorado to stimulate natural gas production. Following the detonation, a reentry well was drilled and several gas production tests were conducted. The reentry well was shut-in after the last gas production test and was held in standby condition until the general cleanup was undertaken in 1972. A final cleanup was conducted after the emplacement and testing wells were plugged in 1976. However, some surface radiologic contamination resulted from decontamination of the drilling equipment and fallout from the gas flaring during drilling operations. With the exception of the drilling effluent pond, all surface contamination at the Rulison Site was removed during the cleanup operations. All mudpits and other excavations were backfilled, and both upper and lower drilling pads were leveled and dressed. This report provides information regarding known or suspected areas of contamination, previous cleanup activities, analytical results, a review of the regulatory status, the site`s physical environment, and future recommendations for Project Ruhson. Based on this research, several potential areas of contamination have been identified. These include the drilling effluent pond and mudpits used during drilling operations. In addition, contamination could migrate in the gas horizon.

  4. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  5. Site-Specific Innovation

    DEFF Research Database (Denmark)

    Reeh, Henrik; Hemmersam, Peter

    2015-01-01

    Currently, cities across the Northern European region are actively redeveloping their former industrial harbours. Indeed, harbours areas are essential in the long-term transition from industrial to information and experience societies; harbours are becoming sites for new businesses and residences...... question is how innovation may contribute to urban life and site-specific qualities....

  6. Criminal Justice Web Sites.

    Science.gov (United States)

    Dodge, Timothy

    1998-01-01

    Evaluates 15 criminal justice Web sites that have been selected according to the following criteria: authority, currency, purpose, objectivity, and potential usefulness to researchers. The sites provide narrative and statistical information concerning crime, law enforcement, the judicial system, and corrections. Searching techniques are also…

  7. The site selection process

    International Nuclear Information System (INIS)

    Kittel, J.H.

    1989-01-01

    One of the most arduous tasks associated with the management of radioactive wastes is the siting of new disposal facilities. Experience has shown that the performance of the disposal facility during and after disposal operations is critically dependent on the characteristics of the site itself. The site selection process consists of defining needs and objectives, identifying geographic regions of interest, screening and selecting candidate sites, collecting data on the candidate sites, and finally selecting the preferred site. Before the site selection procedures can be implemented, however, a formal legal system must be in place that defines broad objectives and, most importantly, clearly establishes responsibilities and accompanying authorities for the decision-making steps in the procedure. Site selection authorities should make every effort to develop trust and credibility with the public, local officials, and the news media. The responsibilities of supporting agencies must also be spelled out. Finally, a stable funding arrangement must be established so that activities such as data collection can proceed without interruption. Several examples, both international and within the US, are given

  8. Static Validation of a Voting Protocol

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde; Andersen, Esben Heltoft; Nielson, Hanne Riis

    2005-01-01

    is formalised in an extension of the LySa process calculus with blinding signatures. The analysis, which is fully automatic, pinpoints previously undiscovered flaws related to verifiability and accuracy and we suggest modifications of the protocol needed for validating these properties....

  9. Development of bull trout sampling protocols

    Science.gov (United States)

    R. F. Thurow; J. T. Peterson; J. W. Guzevich

    2001-01-01

    This report describes results of research conducted in Washington in 2000 through Interagency Agreement #134100H002 between the U.S. Fish and Wildlife Service (USFWS) and the U.S. Forest Service Rocky Mountain Research Station (RMRS). The purpose of this agreement is to develop a bull trout (Salvelinus confluentus) sampling protocol by integrating...

  10. A Verifiable Language for Cryptographic Protocols

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde

    We develop a formal language for specifying cryptographic protocols in a structured and clear manner, which allows verification of many interesting properties; in particular confidentiality and integrity. The study sheds new light on the problem of creating intuitive and human readable languages...

  11. The Nagoya Protocol: Fragmentation or Consolidation?

    Directory of Open Access Journals (Sweden)

    Carmen Richerzhagen

    2014-02-01

    Full Text Available In October, 2010, a protocol on access and benefit-sharing (ABS of genetic resources was adopted, the so-called Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity. Before the adoption of the Nagoya Protocol, the governance architecture of ABS was already characterized by a multifaceted institutional environment. The use of genetic resources is confronted with many issues (conservation, research and development, intellectual property rights, food security, health issues, climate change that are governed by different institutions and agreements. The Nagoya Protocol contributes to increased fragmentation. However, the question arises whether this new regulatory framework can help to advance the implementation of the ABS provisions of the Convention on Biological Diversity (CBD. This paper attempts to find an answer to that question by following three analytical steps. First, it analyzes the causes of change against the background of theories of institutional change. Second, it aims to assess the typology of the architecture in order to find out if this new set of rules will contribute to a more synergistic, cooperative or conflictive architecture of ABS governance. Third, the paper looks at the problem of “fit” and identifies criteria that can be used to assess the new ABS governance architecture with regard to its effectiveness.

  12. Real-time communication protocols: an overview

    NARCIS (Netherlands)

    Hanssen, F.T.Y.; Jansen, P.G.

    2003-01-01

    This paper describes several existing data link layer protocols that provide real-time capabilities on wired networks, focusing on token-ring and Carrier Sense Multiple Access based networks. Existing modifications to provide better real-time capabilities and performance are also described. Finally

  13. Protocol design and implementation using formal methods

    NARCIS (Netherlands)

    van Sinderen, Marten J.; Ferreira Pires, Luis; Pires, L.F.; Vissers, C.A.

    1992-01-01

    This paper reports on a number of formal methods that support correct protocol design and implementation. These methods are placed in the framework of a design methodology for distributed systems that was studied and developed within the ESPRIT II Lotosphere project (2304). The paper focuses on

  14. On BAN logics for industrial security protocols

    NARCIS (Netherlands)

    Agray, N.; Hoek, van der W.; Vink, de E.P.; Dunin-Keplicz, B.; Nawarecki, E.

    2002-01-01

    This paper reports on two case-studies of applying BAN logic to industrial strength security protocols. These studies demonstrate the flexibility of the BAN language, as it caters for the addition of appropriate constructs and rules. We argue that, although a semantical foundation of the formalism

  15. Radiotherapy QA of the DAHANCA 19 protocol

    DEFF Research Database (Denmark)

    Samsøe, E.; Andersen, E.; Hansen, C. R.

    2015-01-01

    Purpose/Objective: It has been demonstrated that nonadherence to protocol-specified radiotherapy (RT) requirements is associated with reduced survival, local control and potentially increased toxicity [1]. Thus, quality assurance (QA) of RT is important when evaluating the results of clinical...

  16. Recursion Versus Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Hüttel, Hans; Srba, Jiri

    2005-01-01

    We use some very recent techniques from process algebra to draw interesting conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbee...

  17. Semantics and logic for security protocols

    NARCIS (Netherlands)

    Jacobs, B.P.F.; Hasuo, I.

    2009-01-01

    This paper presents a sound BAN-like logic for reasoning about security protocols with theorem prover support. The logic has formulas for sending and receiving messages (with nonces, public and private encryptions, etc.), and has both temporal and epistemic operators (describing the knowledge of

  18. Monitoring System with Two Central Facilities Protocol

    Directory of Open Access Journals (Sweden)

    Caesar Firdaus

    2017-03-01

    Full Text Available The security of data and information on government’s information system required proper way of defending against threat. Security aspect can be achieved by using cryptography algorithm, applying information hiding concept, and implementing security protocol. In this research, two central facilities protocol was implemented on Research and Development Center of Mineral and Coal Technology’s Cooperation Contract Monitoring System by utilizing AES and whitespace manipulation algorithm. Adjustment on the protocol by creating several rule of validation ID’s generation and checking processes could fulfill two of four cryptography objectives, consist of authentication and non-repudiation. The solid collaboration between central legitimization agency (CLA, central tabulating facility (CTF, and client is the main idea in two central facilities protocol. The utilization of AES algorithm could defend the data on transmission from man in the middle attack scenario. On the other hand, whitespace manipulation algorithm provided data integrity aspect of the document that is uploaded to the system itself. Both of the algorithm fulfill confidentiality, data integrity, and authentication.

  19. Formalization of Quantum Protocols using Coq

    Directory of Open Access Journals (Sweden)

    Jaap Boender

    2015-11-01

    Full Text Available Quantum Information Processing, which is an exciting area of research at the intersection of physics and computer science, has great potential for influencing the future development of information processing systems. The building of practical, general purpose Quantum Computers may be some years into the future. However, Quantum Communication and Quantum Cryptography are well developed. Commercial Quantum Key Distribution systems are easily available and several QKD networks have been built in various parts of the world. The security of the protocols used in these implementations rely on information-theoretic proofs, which may or may not reflect actual system behaviour. Moreover, testing of implementations cannot guarantee the absence of bugs and errors. This paper presents a novel framework for modelling and verifying quantum protocols and their implementations using the proof assistant Coq. We provide a Coq library for quantum bits (qubits, quantum gates, and quantum measurement. As a step towards verifying practical quantum communication and security protocols such as Quantum Key Distribution, we support multiple qubits, communication and entanglement. We illustrate these concepts by modelling the Quantum Teleportation Protocol, which communicates the state of an unknown quantum bit using only a classical channel.

  20. Equilibria of Generalized Cut and Choose Protocols

    DEFF Research Database (Denmark)

    Branzei, Simina; Caragiannis, Ioannis; Kurokawa, David

    Classic cake cutting protocols — which fairly allocate a divisible good among agents with heterogeneous preferences — are susceptible to manipulation. Do their strategic outcomes still guarantee fairness? To answer this question we adopt a novel algo rithmic approach, proposing a concrete computa...

  1. Behaviour Protocols Verification: Fighting State Explosion

    Czech Academy of Sciences Publication Activity Database

    Mach, M.; Plášil, František; Kofroň, Jan

    2005-01-01

    Roč. 6, č. 2 (2005), s. 22-30 ISSN 1525-9293 R&D Projects: GA ČR(CZ) GA102/03/0672 Institutional research plan: CEZ:AV0Z10300504 Keywords : formal verification * software components * stateexplos ion * behavior protocols * parse trees Subject RIV: JC - Computer Hardware ; Software

  2. An evidence based blunt trauma protocol

    NARCIS (Netherlands)

    Vugt, R. van; Kool, D.R.; Lubeek, S.F.K.; Dekker, H.M.; Brink, M.; Deunk, J.; Edwards, M.J.R.

    2013-01-01

    OBJECTIVE: Currently CT is rapidly implemented in the evaluation of trauma patients. In anticipation of a large international multicentre trial, this study's aim was to evaluate the clinical feasibility of a new diagnostic protocol, used for the primary radiological evaluation in adult blunt

  3. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 8; Issue 3. IPv6: The Next Generation Internet Protocol - IPv4 and its Shortcomings. Harsha Srinath. General Article Volume 8 Issue 3 March 2003 pp 33-41. Fulltext. Click here to view fulltext PDF. Permanent link:

  4. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 8; Issue 4. IPv6: The Next Generation Internet Protocol - New Features in IPv6. Harsha Srinath. General Article Volume 8 Issue 4 April 2003 pp 8-16. Fulltext. Click here to view fulltext PDF. Permanent link:

  5. Rethinking Protocol Analysis from a Cultural Perspective.

    Science.gov (United States)

    Smagorinsky, Peter

    2001-01-01

    Outlines a cultural-historical activity theory (CHAT) perspective that accounts for protocol analysis along three key dimensions: the relationship between thinking and speech from a representational standpoint; the social role of speech in research methodology; and the influence of speech on thinking and data collection. (Author/VWL)

  6. Current Sterilization Protocols-An Orthodontic Perspective

    Directory of Open Access Journals (Sweden)

    Abraham Vinod Korath

    2010-01-01

    Part I of this article focuses on the working principles of various methods of sterilization with an appraisalof their effects on orthodontic instruments. Additionally,contributory factors of instrument damage is enumerated to emphasis the importance of adhering to precise protocols and manufacturer recommendations as well as in alleviating some misconceptions about sterilization induced instrument damage.

  7. A Geographical Heuristic Routing Protocol for VANETs

    Science.gov (United States)

    Urquiza-Aguiar, Luis; Tripp-Barba, Carolina; Aguilar Igartua, Mónica

    2016-01-01

    Vehicular ad hoc networks (VANETs) leverage the communication system of Intelligent Transportation Systems (ITS). Recently, Delay-Tolerant Network (DTN) routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR) protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation). PMID:27669254

  8. International protocol on volatile organic compounds

    International Nuclear Information System (INIS)

    Gauthier, J.-P.

    1992-01-01

    In August 1991, negotiations between Canada, the USA, and 33 European countries led to an international protocol on reducing the emissions of volatile organic compounds (VOC), which are responsible for serious ozone pollution problems. This was the third transborder pollution agreement developed under the auspices of the United Nations Economic Commission for Europe. Certain aspects of negotiations related to an earlier protocol developed for SO 2 and nitrogen oxide emissions had reappeared during the VOC negotiations, and these aspects are discussed. The VOC protocol proposes three approaches to satisfy basic obligations: reducing VOC emissions of a country by 30%, reducing VOC emissions by 30% in certain regions, and ensuring a freeze in VOC emissions in a country starting on a specified date. The protocol also introduces a new concept, that of zones of tropospheric ozone management. In Canada, plans for management of nitrogen oxides and VOC have been adapted to the ozone problem, and the management plan has been developed by a consultation process involving all sectors of society including industry, environmental groups, and governments. In Canada, it will be sufficient to reduce total VOC emissions by 16% during a first phase and to increase these reductions slightly in the second phase. Special ozone management zones in the Quebec City/Windsor corridor and the Fraser River valley have been established

  9. Performance comparison of secure comparison protocols

    NARCIS (Netherlands)

    Kerschbaum, F.; Biswas, D.; Hoogh, de S.J.A.

    2009-01-01

    Secure multiparty computation (SMC) has gained tremendous importance with the growth of the Internet and e-commerce, where mutually untrusted parties need to jointly compute a function of their private inputs. However, SMC protocols usually have very high computational complexities, rendering them

  10. Novel protocol for persister cells isolation.

    Directory of Open Access Journals (Sweden)

    Silvia J Cañas-Duarte

    Full Text Available Bacterial persistence, where a fraction of a population presents a transient resistance to bactericidal substances, has great medical importance due to its relation with the appearance of antibiotic resistances and untreatable bacterial chronic infections. The mechanisms behind this phenomenon remain largely unknown in spite of recent advances, in great part because of the difficulty in isolating the very small fraction of the population that is in this state at any given time. Current protocols for persister isolation have resulted in possible biases because of the induction of this state by the protocol itself. Here we present a novel protocol that allows rapid isolation of persister cells both from exponential and stationary phase. Moreover, it is capable of differentiating between type I and type II persister cells, which should allow the field to move beyond its current state of studying only one type. While this protocol prompts a revision of many of the current results, it should greatly facilitate further advances in the field.

  11. Direct data access protocols benchmarking on DPM

    Science.gov (United States)

    Furano, Fabrizio; Devresse, Adrien; Keeble, Oliver; Mancinelli, Valentina

    2015-12-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring information about any data access protocol to the same monitoring infrastructure that is used to monitor the Xrootd deployments. Our goal is to evaluate under which circumstances the HTTP-based protocols can be good enough for batch or interactive data access. In this contribution we show and discuss the results that our test systems have collected under the circumstances that include ROOT analyses using TTreeCache and stress tests on the metadata performance.

  12. Quantum protocols within Spekkens' toy model

    Science.gov (United States)

    Disilvestro, Leonardo; Markham, Damian

    2017-05-01

    Quantum mechanics is known to provide significant improvements in information processing tasks when compared to classical models. These advantages range from computational speedups to security improvements. A key question is where these advantages come from. The toy model developed by Spekkens [R. W. Spekkens, Phys. Rev. A 75, 032110 (2007), 10.1103/PhysRevA.75.032110] mimics many of the features of quantum mechanics, such as entanglement and no cloning, regarded as being important in this regard, despite being a local hidden variable theory. In this work, we study several protocols within Spekkens' toy model where we see it can also mimic the advantages and limitations shown in the quantum case. We first provide explicit proofs for the impossibility of toy bit commitment and the existence of a toy error correction protocol and consequent k -threshold secret sharing. Then, defining a toy computational model based on the quantum one-way computer, we prove the existence of blind and verified protocols. Importantly, these two last quantum protocols are known to achieve a better-than-classical security. Our results suggest that such quantum improvements need not arise from any Bell-type nonlocality or contextuality, but rather as a consequence of steering correlations.

  13. Siting nuclear power plants

    International Nuclear Information System (INIS)

    Yellin, J.; Joskow, P.L.

    1980-01-01

    The first edition of this journal is devoted to the policies and problems of siting nuclear power plants and the question of how far commercial reactors should be placed from urban areas. The article is divided into four major siting issues: policies, risk evaluation, accident consequences, and economic and physical constraints. One concern is how to treat currently operating reactors and those under construction that were established under less-stringent criteria if siting is to be used as a way to limit the consequences of accidents. Mehanical cost-benefit analyses are not as appropriate as the systematic use of empirical observations in assessing the values involved. Stricter siting rules are justified because (1) opposition because of safety is growing: (2) remote siting will make the industry more stable; (3) the conflict is eliminated between regulatory policies and the probability basis for nuclear insurance; and (4) joint ownership of utilities and power-pooling are increasing. 227 references, 7 tables

  14. Site directed recombination

    Science.gov (United States)

    Jurka, Jerzy W.

    1997-01-01

    Enhanced homologous recombination is obtained by employing a consensus sequence which has been found to be associated with integration of repeat sequences, such as Alu and ID. The consensus sequence or sequence having a single transition mutation determines one site of a double break which allows for high efficiency of integration at the site. By introducing single or double stranded DNA having the consensus sequence flanking region joined to a sequence of interest, one can reproducibly direct integration of the sequence of interest at one or a limited number of sites. In this way, specific sites can be identified and homologous recombination achieved at the site by employing a second flanking sequence associated with a sequence proximal to the 3'-nick.

  15. Site decommissioning management plan

    International Nuclear Information System (INIS)

    Fauver, D.N.; Austin, J.H.; Johnson, T.C.; Weber, M.F.; Cardile, F.P.; Martin, D.E.; Caniano, R.J.; Kinneman, J.D.

    1993-10-01

    The Nuclear Regulatory Commission (NRC) staff has identified 48 sites contaminated with radioactive material that require special attention to ensure timely decommissioning. While none of these sites represent an immediate threat to public health and safety they have contamination that exceeds existing NRC criteria for unrestricted use. All of these sites require some degree of remediation, and several involve regulatory issues that must be addressed by the Commission before they can be released for unrestricted use and the applicable licenses terminated. This report contains the NRC staff's strategy for addressing the technical, legal, and policy issues affecting the timely decommissioning of the 48 sites and describes the status of decommissioning activities at the sites

  16. Site decommissioning management plan

    Energy Technology Data Exchange (ETDEWEB)

    Fauver, D.N.; Austin, J.H.; Johnson, T.C.; Weber, M.F.; Cardile, F.P.; Martin, D.E.; Caniano, R.J.; Kinneman, J.D.

    1993-10-01

    The Nuclear Regulatory Commission (NRC) staff has identified 48 sites contaminated with radioactive material that require special attention to ensure timely decommissioning. While none of these sites represent an immediate threat to public health and safety they have contamination that exceeds existing NRC criteria for unrestricted use. All of these sites require some degree of remediation, and several involve regulatory issues that must be addressed by the Commission before they can be released for unrestricted use and the applicable licenses terminated. This report contains the NRC staff`s strategy for addressing the technical, legal, and policy issues affecting the timely decommissioning of the 48 sites and describes the status of decommissioning activities at the sites.

  17. SPECT/CT workflow and imaging protocols

    Energy Technology Data Exchange (ETDEWEB)

    Beckers, Catherine [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Hustinx, Roland [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Domaine Universitaire du Sart Tilman, Service de Medecine Nucleaire et Imagerie Oncologique, CHU de Liege, Liege (Belgium)

    2014-05-15

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  18. SPECT/CT workflow and imaging protocols

    International Nuclear Information System (INIS)

    Beckers, Catherine; Hustinx, Roland

    2014-01-01

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  19. Protocol for Tier 2 Evaluation of Vapor Intrusion at Corrective Action Sites

    Science.gov (United States)

    2012-07-01

    and Evaluation o condition the evalu Contro negati buildi pressu Vapo intrusio “on” Contro positiv buildi pressu Vapo intrusio “off” Figure 2...of Vapor Intrusion 11 Table 3.1: Performance Objectives Performance Objective Data Requirements Success Criteria Results Quantitative ...defined in Appendix D of the demonstration plan. Quantitative objectives for Precision, Accuracy, Completeness, Representativeness, and Comparability

  20. Bats and wind turbines : pre-siting and pre-construction survey protocols

    Energy Technology Data Exchange (ETDEWEB)

    Lausen, C.; Baerwald, E.; Gruver, J.; Barclay, R. [Calgary Univ., AB (Canada)

    2008-05-15

    Studies have shown that a number of bats are killed by moving wind turbine blades at wind farms throughout North America. The studies have shown that over 80 per cent of the fatalities involve migratory bat species. Hoary bats, eastern red bats, and silver-haired bats dominate the fatalities during the fall migration period. Fatality rates vary among wind energy developments. Some data suggest that fatalities are higher on nights with lower wind speeds, and increased fatalities have been associated with taller wind turbines. This report outlined pre-construction survey requirements for preventing bat fatalities at wind power plants. A pre-construction survey was recommended to achieve a representative sampling of bat activity and determine the relative risk to bats. The study suggested that monitoring data from locations across the province should be pooled to provide a better understanding of the landscape-scale patterns of bat migration. Monitoring for bats should be conducted continuously due to the sporadic nature of peaks in bat activity, the influence of temperature, moon phase, and weather variables. Sampling techniques for acoustic detection, radar tracking, and mist-netting should be implemented to determine the abundance of susceptible species and the location of migration routes. All existing meteorological towers should be used as sampling stations with bat detectors installed at ground level and near the top of the tower. Additional detector stations should be distributed throughout the wind resource area. Specialized anabat microphones should be calibrated to record bat activity. Acoustic data should be presented as total bat passes and mean passes per night and matched with corresponding meteorological data. It was concluded that pre-construction monitoring data should be gathered and made available for collaborative and cumulative research efforts. 28 refs., 1 fig.

  1. 1994 Site environmental report

    International Nuclear Information System (INIS)

    1995-07-01

    The Fernald site is a Department of Energy (DOE)-owned facility that produced high-quality uranium metals for military defense for nearly 40 years. DOE suspended production at the site in 1989 and formally ended production in 1991. Although production activities have ceased, the site continues to examine the air and liquid pathways as possible routes through which pollutants from past operations and current remedial activities may leave the site. The Site Environmental Report (SER) is prepared annually in accordance with DOE Order 5400.1, General Environmental Protection Program. This 1994 SER provides the general public as well as scientists and engineers with the results from the site's ongoing Environmental Monitoring Program. Also included in this report is information concerning the site's progress toward achieving full compliance with requirements set forth by DOE, U.S. Environmental Protection Agency (USEPA), and Ohio EPA (OEPA). For some readers, the highlights provided in this Executive Summary may provide sufficient information. Many readers, however, may wish to read more detailed descriptions of the information than those which are presented here. All information presented in this summary is discussed more fully in the main body of this report

  2. SITE-94. Radionuclide solubilities for SITE-94

    Energy Technology Data Exchange (ETDEWEB)

    Arthur, R.; Apted, M. [QuantiSci, Denver, CO (United States)

    1996-12-01

    In this report, solubility constraints are evaluated on radioelement source-term concentrations supporting the SITE-94 performance assessment. Solubility models are based on heterogeneous-equilibrium, mass- and charge-balance constraints incorporated into the EQ3/6 geochemical software package, which is used to calculate the aqueous speciation behavior and solubilities of U, Th, Pu, Np, Am, Ni, Ra, Se, Sn, Sr, Tc and Zr in site groundwaters and near-field solutions. The chemical evolution of the near field is approximated using EQ3/6 in terms of limiting conditions at equilibrium, or steady state, in three closed systems representing fully saturated bentonite, Fe{sup o} corrosion products of the canister, and spent fuel. The calculations consider both low-temperature (15 deg C) and high-temperature (80 deg C) conditions in the near field, and the existence of either reducing or strongly oxidizing conditions in each of the bentonite, canister, and spent-fuel barriers. Heterogeneities in site characteristics are evaluated through consideration of a range of initial groundwaters and their interactions with engineered barriers. Aqueous speciation models for many radioelements are constrained by thermodynamic data that are estimated with varying degrees of accuracy. An important question, however, is how accurate do these models need to be for purposes of estimating source-term concentrations? For example, it is unrealistic to expect a high degree of accuracy in speciation models if such models predict solubilities that are below the analytical detection limit for a given radioelement. From a practical standpoint, such models are irrelevant if calculated solubilities cannot be tested by direct comparison to experimental data. In the absence of models that are both accurate and relevant for conditions of interest, the detection limit could define a pragmatic upper limit on radioelement solubility 56 refs, 25 tabs, 10 figs

  3. SITE-94. Radionuclide solubilities for SITE-94

    International Nuclear Information System (INIS)

    Arthur, R.; Apted, M.

    1996-12-01

    In this report, solubility constraints are evaluated on radioelement source-term concentrations supporting the SITE-94 performance assessment. Solubility models are based on heterogeneous-equilibrium, mass- and charge-balance constraints incorporated into the EQ3/6 geochemical software package, which is used to calculate the aqueous speciation behavior and solubilities of U, Th, Pu, Np, Am, Ni, Ra, Se, Sn, Sr, Tc and Zr in site groundwaters and near-field solutions. The chemical evolution of the near field is approximated using EQ3/6 in terms of limiting conditions at equilibrium, or steady state, in three closed systems representing fully saturated bentonite, Fe o corrosion products of the canister, and spent fuel. The calculations consider both low-temperature (15 deg C) and high-temperature (80 deg C) conditions in the near field, and the existence of either reducing or strongly oxidizing conditions in each of the bentonite, canister, and spent-fuel barriers. Heterogeneities in site characteristics are evaluated through consideration of a range of initial groundwaters and their interactions with engineered barriers. Aqueous speciation models for many radioelements are constrained by thermodynamic data that are estimated with varying degrees of accuracy. An important question, however, is how accurate do these models need to be for purposes of estimating source-term concentrations? For example, it is unrealistic to expect a high degree of accuracy in speciation models if such models predict solubilities that are below the analytical detection limit for a given radioelement. From a practical standpoint, such models are irrelevant if calculated solubilities cannot be tested by direct comparison to experimental data. In the absence of models that are both accurate and relevant for conditions of interest, the detection limit could define a pragmatic upper limit on radioelement solubility

  4. The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol

    OpenAIRE

    Seema Mehla; Bhawna Gupta

    2010-01-01

    the Extensible Authentication Protocol (EAP) is a generic framework supporting multiple types of authentication methods. In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP exchange with another authenticator. The EAP reauthentication Protocol provides a consistent, methodindependentand low-latency re-authentication. It is extension to current EAP mechanism to support intradomain handoff authentication. This paper analyzed the performance of the EAP r...

  5. Site Environmental Report, 1993

    International Nuclear Information System (INIS)

    1994-06-01

    The Site Environmental Report (SER) is prepared annually in accordance with DOE Order 5400.1, ''General Environmental Protection Program.'' This 1993 SER provides the general public as well as scientists and engineers with the results from the site's ongoing Environmental Monitoring Program. Also included in this report is information concerning the site's progress toward achieving full compliance with requirements set forth by DOE, US Environmental Protection Agency (USEPA), and Ohio EPA (OEPA). For some readers, the highlights provided in the Executive Summary may provide sufficient information. Many readers, however, may wish to read more detailed descriptions of the information than those which are presented here

  6. Cross-Layer Protocol as a Better Option in Wireless Mesh Network with Respect to Layered-Protocol

    OpenAIRE

    Ahmed Abdulwahab Al-Ahdal; Dr. V. P. Pawar; G. N. Shinde

    2014-01-01

    The Optimal way to improve Wireless Mesh Networks (WMNs) performance is to use a better network protocol, but whether layered-protocol design or cross-layer design is a better option to optimize protocol performance in WMNs is still an on-going research topic. In this paper, we focus on cross-layer protocol as a better option with respect to layered-protocol. The layered protocol architecture (OSI) model divides networking tasks into layers and defines a pocket of services for each layer to b...

  7. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  8. A Web Resource for Standardized Benchmark Datasets, Metrics, and Rosetta Protocols for Macromolecular Modeling and Design.

    Directory of Open Access Journals (Sweden)

    Shane Ó Conchúir

    Full Text Available The development and validation of computational macromolecular modeling and design methods depend on suitable benchmark datasets and informative metrics for comparing protocols. In addition, if a method is intended to be adopted broadly in diverse biological applications, there needs to be information on appropriate parameters for each protocol, as well as metrics describing the expected accuracy compared to experimental data. In certain disciplines, there exist established benchmarks and public resources where experts in a particular methodology are encouraged to supply their most efficient implementation of each particular benchmark. We aim to provide such a resource for protocols in macromolecular modeling and design. We present a freely accessible web resource (https://kortemmelab.ucsf.edu/benchmarks to guide the development of protocols for protein modeling and design. The site provides benchmark datasets and metrics to compare the performance of a variety of modeling protocols using different computational sampling methods and energy functions, providing a "best practice" set of parameters for each method. Each benchmark has an associated downloadable benchmark capture archive containing the input files, analysis scripts, and tutorials for running the benchmark. The captures may be run with any suitable modeling method; we supply command lines for running the benchmarks using the Rosetta software suite. We have compiled initial benchmarks for the resource spanning three key areas: prediction of energetic effects of mutations, protein design, and protein structure prediction, each with associated state-of-the-art modeling protocols. With the help of the wider macromolecular modeling community, we hope to expand the variety of benchmarks included on the website and continue to evaluate new iterations of current methods as they become available.

  9. Retroviral integration: Site matters

    Science.gov (United States)

    Demeulemeester, Jonas; De Rijck, Jan

    2015-01-01

    Here, we review genomic target site selection during retroviral integration as a multistep process in which specific biases are introduced at each level. The first asymmetries are introduced when the virus takes a specific route into the nucleus. Next, by co‐opting distinct host cofactors, the integration machinery is guided to particular chromatin contexts. As the viral integrase captures a local target nucleosome, specific contacts introduce fine‐grained biases in the integration site distribution. In vivo, the established population of proviruses is subject to both positive and negative selection, thereby continuously reshaping the integration site distribution. By affecting stochastic proviral expression as well as the mutagenic potential of the virus, integration site choice may be an inherent part of the evolutionary strategies used by different retroviruses to maximise reproductive success. PMID:26293289

  10. Siting controversial facilities

    International Nuclear Information System (INIS)

    Baird, R.D.; Blacker, P.B.

    1985-01-01

    There is often significant difficulty involved with siting controversial facilities. The social and political problems are frequently far more difficult to resolve than the technical and economic issues. The tendancy for most developing organizations is to address only technical issues in the search for a technically optimal site, to the exclusion of such weighting considerations as the social and political climate associated with potential sites--an approach which often imperils the success of the project. The site selection processes currently suggested is summarized and two contemporary examples of their application are cited. The difference between developers' real objectives and the objectives they have implicitly assumed by adopting the recommended approaches without augmentation are noted. The resulting morass of public opposition is attributed to the failure to consider the needs of individuals and groups who stand to be negatively impacted by the development. A comprehensive implementation strategy which addresses non-technical consideration in parallel with technical ones is presented and evaluated

  11. Vatwa Resettlement Sites

    International Development Research Centre (IDRC) Digital Library (Canada)

    The BSUP sites, constructed under the Government of India's .... conflicts over paying for maintenance lead to unrepaired water and ... So some women reacted and broke things in the office." ... workplaces, leading many to drop out of work or.

  12. Safety aspects of siting

    International Nuclear Information System (INIS)

    Rosen, M.

    1976-01-01

    Outline of parameters to be considered in site selection, radiation safety, and mechanisms of radiation release. Radiation doses in tablular form for areas at various distances from the plant. (HP) [de

  13. Site Specific Vendor's License

    Data.gov (United States)

    Montgomery County of Maryland — This dataset contains information of a site-specific vendor's license which is required if an individual sells or offers to sell goods or services from a stationary...

  14. Surgical site infections

    African Journals Online (AJOL)

    Surgical site infections (SSIs) are a worldwide problem that has ... deep tissue is found on clinical examination, re-opening, histopathological or radiological investigation ..... Esposito S, Immune system and SSI, Journal of Chemotherapy, 2001.

  15. Superfund Site Information

    Data.gov (United States)

    U.S. Environmental Protection Agency — This asset includes a number of individual data sets related to site-specific information for Superfund, which is governed under the Comprehensive Environmental...

  16. Outdoor Recreation Sites Inventory

    Data.gov (United States)

    Vermont Center for Geographic Information — The RECSITES data layer contains a wide range of recreational sites in Vermont. This point data layer includes parks, ski areas, boat access points, and many other...

  17. Coal mine site reclamation

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-02-15

    Coal mine sites can have significant effects on local environments. In addition to the physical disruption of land forms and ecosystems, mining can also leave behind a legacy of secondary detrimental effects due to leaching of acid and trace elements from discarded materials. This report looks at the remediation of both deep mine and opencast mine sites, covering reclamation methods, back-filling issues, drainage and restoration. Examples of national variations in the applicable legislation and in the definition of rehabilitation are compared. Ultimately, mine site rehabilitation should return sites to conditions where land forms, soils, hydrology, and flora and fauna are self-sustaining and compatible with surrounding land uses. Case studies are given to show what can be achieved and how some landscapes can actually be improved as a result of mining activity.

  18. Summer Meal Sites

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — Information pertaining to Summer Meal Sites, as collected by Citiparks in the City of Pittsburgh Department of Parks and Recreation. This dataset includes the...

  19. Jet Car Track Site

    Data.gov (United States)

    Federal Laboratory Consortium — Located in Lakehurst, New Jersey, the Jet Car Track Site supports jet cars with J57 engines and has a maximum jet car thrust of 42,000 pounds with a maximum speed of...

  20. Sufficient Conditions for Vertical Composition of Security Protocols (Extended Version)

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Viganò, Luca

    a certain kind of channel as a goal and another secure protocol P2 that assumes this kind of channel, can we then derive that their vertical composition P2[P1] is secure? It is well known that protocol composition can lead to attacks even when the individual protocols are all secure in isolation......Vertical composition of security protocols means that an application protocol (e.g., a banking service) runs over a channel established by another protocol (e.g., a secure channel provided by TLS). This naturally gives rise to a compositionality question: given a secure protocol P1 that provides....... In this paper, we formalize seven easy-to-check static conditions that support a large class of channels and applications and that we prove to be su_cient for vertical security protocol composition....