WorldWideScience

Sample records for protocol wap sites

  1. Business Applications of WAP.

    Science.gov (United States)

    van Steenderen, Margaret

    2002-01-01

    Explains the development of WAP (wireless application protocol), how it works, and what the major advantages and disadvantages are, especially when applied to the use of information. Topics include standardization; mobile communications; the effect of WAP on business tools, electronic commerce, and information services; consumers; corporate users;…

  2. Migrating an Online Service to WAP - A Case Study.

    Science.gov (United States)

    Klasen, Lars

    2002-01-01

    Discusses mobile access via wireless application protocol (WAP) to online services that is offered in Sweden through InfoTorg. Topics include the Swedish online market; filtering HTML data from an Internet/Web server into WML (wireless markup language); mobile phone technology; microbrowsers; WAP protocol; and future possibilities. (LRW)

  3. WAP - based telemedicine applications

    International Nuclear Information System (INIS)

    Hung, K.; Zhang, Y.T.

    2001-01-01

    Telemedicine refers to the utilization of telecommunication technology for medical diagnosis, treatment, and patient care. Its aim is to provide expert-based health care to remote sites through telecommunication and information technologies. The significant advances in technologies have enabled the introduction of a broad range of telemedicine applications, which are supported by computer networks, wireless communication, and information superhighway. For example, some hospitals are using tele-radiology for remote consultation. Such a system includes medical imaging devices networked with computers and databases. Another growing area is patient monitoring, in which sensors are used to acquire biomedical signals, such as electrocardiogram (ECG), blood pressure, and body temperature, from a remote patient, who could be in bed or moving freely. The signals are then relayed to remote systems for viewing and analysis. Telemedicine can be divided into two basic modes of operations: real-time mode, in which the patient data can be accessed remotely in real-time, and store-and-forward mode, in which the acquired data does not have to be accessed immediately. In the recent years, many parties have demonstrated various telemedicine applications based on the Internet and cellular phone as these two fields have been developing rapidly. A current, recognizable trend in telecommunication is the convergence of wireless communication and computer network technologies. This has been reflected in recently developed telemedicine systems. For example, in 1998 J. Reponen, et al. have demonstrated transmission and display of computerized tomography (CT) examinations using a remote portable computer wirelessly connected to a computer network through TCP/IP on a GSM cellular phone. Two years later, they carried out the same tests with a GSM-based wireless personal digital assistant (PDA). The WAP (Wireless Application Protocol) Forum was founded in 1997 to create a global protocol

  4. Phone Application Based Wireless Application Protocol (Wap)

    OpenAIRE

    Berrie Nugraha Adiwinata; Sunarto Usna

    2001-01-01

    WAP mobile phone sales in Indonesia is quite high, evidenced by a recent survey saidnearly about 5% of mobile phone users in Indonesia is a mobile phone using WAPtechnology. For those who always need accurate information and quick. WAPtechnology a ride on a GSM network still has weaknesses such as an expensiveaccess costs. But do not close the possibility that one day we will get a perfect WAPphones.

  5. WAP explained

    International Nuclear Information System (INIS)

    Kaiser, M.J.; Pulsipher, A.G.

    2004-01-01

    The Weatherization Assistance Program (WAP) is a federal block grant program administered by all 50 states and the District of Columbia through community action agencies, state energy offices, local government, and other nonprofit organizations to provide weatherization services to eligible households. The WAP was established in 1976 to increase the energy efficiency, reduce the energy expenditures, and improve the health and safety of low-income households, especially those households that are particularly vulnerable such as families with children, persons with disabilities, and the elderly. The manner in which WAP funds have been allocated to states, however, has been a contentious issue since the inception of the program. Southern states have argued that too much of the federal funding goes to cold-climate and rural states. Northern states disagree. In 1990, Congress amended the Energy Conservation and Production Act and required the Department of Energy to develop a new funding formula. The Department of Energy currently uses a three-factor formula developed in 1995 in conjunction with a two-factor formula developed in 1977 and a hold-harmless provision to allocate WAP funding. The purpose of this paper is to explain the WAP allocation mechanism and the assumptions associated with the 1977 and the 1995 funding formula. The factors that compose each funding formula are critically assessed and various implementation issues are reviewed, including the selection of the trigger point and program capacity levels. It is not possible to define the need for weatherization assistance objectively and in a unique manner, and this ambiguity is the main reason why the WAP allocation mechanism is expected to remain a lively topic of debate and contention

  6. A Proxy Architecture to Enhance the Performance of WAP 2.0 by Data Compression

    Directory of Open Access Journals (Sweden)

    Yin Zhanping

    2005-01-01

    Full Text Available This paper presents a novel proxy architecture for wireless application protocol (WAP employing an advanced data compression scheme. Though optional in WAP , a proxy can isolate the wireless from the wired domain to prevent error propagations and to eliminate wireless session delays (WSD by enabling long-lived connections between the proxy and wireless terminals. The proposed data compression scheme combines content compression together with robust header compression (ROHC, which minimizes the air-interface traffic data, thus significantly reduces the wireless access time. By using the content compression at the transport layer, it also enables TLS tunneling, which overcomes the end-to-end security problem in WAP 1.x. Performance evaluations show that while WAP 1.x is optimized for narrowband wireless channels, WAP utilizing TCP/IP outperforms WAP 1.x over wideband wireless channels even without compression. The proposed data compression scheme reduces the wireless access time of WAP by over in CDMA2000 1XRTT channels, and in low-speed IS-95 channels, substantially reduces access time to give comparable performance to WAP 1.x. The performance enhancement is mainly contributed by the reply content compression, with ROHC offering further enhancements.

  7. A Proxy Architecture to Enhance the Performance of WAP 2.0 by Data Compression

    Directory of Open Access Journals (Sweden)

    Yin Zhanping

    2005-01-01

    Full Text Available This paper presents a novel proxy architecture for wireless application protocol (WAP 2.0 employing an advanced data compression scheme. Though optional in WAP 2.0 , a proxy can isolate the wireless from the wired domain to prevent error propagations and to eliminate wireless session delays (WSD by enabling long-lived connections between the proxy and wireless terminals. The proposed data compression scheme combines content compression together with robust header compression (ROHC, which minimizes the air-interface traffic data, thus significantly reduces the wireless access time. By using the content compression at the transport layer, it also enables TLS tunneling, which overcomes the end-to-end security problem in WAP 1.x. Performance evaluations show that while WAP 1.x is optimized for narrowband wireless channels, WAP 2.0 utilizing TCP/IP outperforms WAP 1.x over wideband wireless channels even without compression. The proposed data compression scheme reduces the wireless access time of WAP 2.0 by over 45% in CDMA2000 1XRTT channels, and in low-speed IS-95 channels, substantially reduces access time to give comparable performance to WAP 1.x. The performance enhancement is mainly contributed by the reply content compression, with ROHC offering further enhancements.

  8. Diseño y montaje de una página wap que implemente el acceso a la información académica de la universidad francisco de paula santander

    Directory of Open Access Journals (Sweden)

    Dinael Guevara-Ibarra

    2003-01-01

    Full Text Available WAP is the acronym for Wireless Application Protocol (Wireless Application Protocol and is the means of transport communications between wireless devices and servers. The University Francisco de Paula Santander will from the second half of 2003 with a WAP portal that will allow students and interested, consult the information from the institution using the benefits of mobile communications equipment (cell. This article briefly describes the theoretical bases that were the subject of study for the project of the WAP page of the institution such as the WAP standard, the layers of the WAP protocol, the components and the operating model of a WAP system and the programming language to develop WAP applications; In addition, the parameters taken into account for the selection of the information to be displayed on the portal and the tools used in the manufacture and assembly of mobile Internet page of the University Francisco de Paula Santander exposed

  9. Towards the Design of a WAP-based Environmental Information Service

    Directory of Open Access Journals (Sweden)

    Joerg Westbomke

    2004-12-01

    Full Text Available Cellular phones have almost replaced conventional telephones for public use in Western European countries. Modern WAP enhanced phones or smart phones offer mobile access to the internet, anytime and anyplace. This technique therefore appears to be very attractive for transferring up-to-date information about the environmental situation to the public, i.e. air and water quality measurements or weather conditions as well as forecasted values of these processes. The Wireless Application Protocol (WAP is the key technology in this respect. According to the upcoming importance of mobile internet access the WAP technology has great potentials to play an important role in the design of modern information services which are user centered. Because of upcoming environmental laws in Europe the citizen will gain the right to access the environmental information collected and stored by the public authorities. But due to size and resolution of the displays used in the actual versions of the cellular phones it is not sufficient to transfer the concepts and architectures known from internet information systems to WAP-based systems. It is rather necessary to develop special concepts for the design of WAPbased services, with a special focus on the appropriate structuring and presentation of environmental data. This paper gives an overview of the main problems WAP system designer had actually to deal with and shows concepts how to solve them. At the end of the paper we present two mobile environmental information services, which were realized on the basis of the presented concepts.

  10. Safety evaluation of Whole Algalin Protein (WAP) from Chlorella protothecoides.

    Science.gov (United States)

    Szabo, Nancy J; Matulka, Ray A; Chan, Teresa

    2013-09-01

    Microalgae such as Chlorella spp., were once consumed as traditional human foods; now they are being developed as ingredients for modern diets. Whole Algalin Protein (WAP) from dried milled Chlorella protothecoides was evaluated for dietary safety in a 13-week feeding trial in rodents with genotoxic potential evaluated using in vitro and in vivo assays and the likelihood of food allergy potential evaluated via human repeat-insult patch test (HRIPT). In the subchronic study, rats consumed feed containing 0, 25,000, 50,000 or 100,000 ppm WAP for 92-93 days. No treatment-related mortalities or effects in general condition, body weight, food consumption, ophthalmology, urinalysis, hematology, clinical chemistry, gross pathology, organ weights, and histopathology occurred. Several endpoints exhibited statistically significant effects, but none was dose-related. The no-observed-adverse-effect level (NOAEL) was based on the highest WAP concentration consumed by the rats and was equivalent to 4805 mg/kg/day in males and 5518 mg/kg/day in females. No mutagenicity occurred in Salmonella typhimurium or Escherichia coli tester strains (≤5000 μg/plate WAP) with or without mutagenic activation. No clastogenic response occurred in bone marrow from mice administered a single oral dose (2000 mg/kg WAP). Skin sensitization was not induced by WAP via HRIPT, indicating little potential for food allergy. Copyright © 2013 Elsevier Ltd. All rights reserved.

  11. Web Air Permits (WAP R7)

    Data.gov (United States)

    U.S. Environmental Protection Agency — THIS DATA ASSET NO LONGER ACTIVE: This is metadata documentation for Web Air Permits in Region 7 (WAP R7), a Lotus Notes application that once tracked comment...

  12. Epigenetic modifications and chromatin loop organization explain the different expression profiles of the Tbrg4, WAP and Ramp3 genes

    International Nuclear Information System (INIS)

    Montazer-Torbati, Mohammad Bagher; Hue-Beauvais, Cathy; Droineau, Stephanie; Ballester, Maria; Coant, Nicolas; Aujean, Etienne; Petitbarat, Marie; Rijnkels, Monique; Devinoy, Eve

    2008-01-01

    Whey Acidic Protein (WAP) gene expression is specific to the mammary gland and regulated by lactogenic hormones to peak during lactation. It differs markedly from the more constitutive expression of the two flanking genes, Ramp3 and Tbrg4. Our results show that the tight regulation of WAP gene expression parallels variations in the chromatin structure and DNA methylation profile throughout the Ramp3-WAP-Tbrg4 locus. Three Matrix Attachment Regions (MAR) have been predicted in this locus. Two of them are located between regions exhibiting open and closed chromatin structures in the liver. The third, located around the transcription start site of the Tbrg4 gene, interacts with topoisomerase II in HC11 mouse mammary cells, and in these cells anchors the chromatin loop to the nuclear matrix. Furthermore, if lactogenic hormones are present in these cells, the chromatin loop surrounding the WAP gene is more tightly attached to the nuclear structure, as observed after a high salt treatment of the nuclei and the formation of nuclear halos. Taken together, our results point to a combination of several epigenetic events that may explain the differential expression pattern of the WAP locus in relation to tissue and developmental stages

  13. Demonstrating compliance with WAPS 1.3 in the Hanford waste vitrification plant process

    Energy Technology Data Exchange (ETDEWEB)

    Bryan, M.F.; Piepel, G.F.; Simpson, D.B.

    1996-03-01

    The high-level waste (HLW) vitrification plant at the Hanford Site was being designed to immobilize transuranic and high-level radioactive waste in borosilicate glass. This document describes the statistical procedure to be used in verifying compliance with requirements imposed by Section 1.3 of the Waste Acceptance Product Specifications (WAPS, USDOE 1993). WAPS 1.3 is a specification for ``product consistency,`` as measured by the Product Consistency Test (PCT, Jantzen 1992b), for each of three elements: lithium, sodium, and boron. Properties of a process batch and the resulting glass are largely determined by the composition of the feed material. Empirical models are being developed to estimate some property values, including PCT results, from data on feed composition. These models will be used in conjunction with measurements of feed composition to control the HLW vitrification process and product.

  14. Integración de un sistema de pago para móvil mediante un intermediario para una aplicación WAP

    OpenAIRE

    Paradell Cases, David

    2012-01-01

    Nou sistema de pagament per mòbil. [ANGLÈS] Integration of a mobile payment system using Mobile 365 company to a WAP application. [CASTELLÀ] Integración de un sistema de pago para móvil mediante Mobile 365 para una aplicación WAP. [CATALÀ] Integració d'un sistema de pagament per mòbil mitjançant Mobile 365 per a una aplicació WAP.

  15. WAP Based An Alternative Solution for Traffic Transportation Problem in Sidoarjo Surrounding Area Using AHP

    Directory of Open Access Journals (Sweden)

    Arna Fariza

    2009-08-01

    Full Text Available In line with the increasing interest on Lapindo mud disaster which causes several roadway covered by mud, there is a need to give an alternative solution for traffic transportation problem in surrounding area. The possible criteria for the solution of this road way are length, surface, traffic, and width of the road. Types of vehicle across the road also give a contribution to the criteria. By using Geography Information System (GIS, it is easy to all drivers to take decision which way has to be chosen based on the real condition. GIS is used to visualize the alternative road, which is possible to take. Analytic Hierarchy Processing (AHP is a decision method which is based on many criteria and alternatives. The input of AHP can be a preference or real value. Applied AHP to decide value of each alternative is based on application of Wireless Application Protocol (WAP assessment.

  16. The C-terminal domain of the nuclear factor I-B2 isoform is glycosylated and transactivates the WAP gene in the JEG-3 cells

    International Nuclear Information System (INIS)

    Mukhopadhyay, Sudit S.; Rosen, Jeffrey M.

    2007-01-01

    The transcription factor nuclear factor I (NFI) has been shown previously both in vivo and in vitro to be involved in the cooperative regulation of whey acidic protein (WAP) gene transcription along with the glucocorticoid receptor and STAT5. In addition, one of the specific NFI isoforms, NFI-B2, was demonstrated in transient co-transfection experiments in JEG cells, which lack endogenous NFI, to be preferentially involved in the cooperative regulation of WAP gene expression. A comparison of the DNA-binding specificities of the different NFI isoforms only partially explained their differential ability to activate the WAP gene transcription. Here, we analyzed the transactivation regions of two NFI isoforms by making chimeric proteins between the NFI-A and B isoforms. Though, their DNA-binding specificities were not altered as compared to the corresponding wild-type transcription factors, the C-terminal region of the NFI-B isoform was shown to preferentially activate WAP gene transcription in cooperation with GR and STAT5 in transient co-transfection assays in JEG-3 cells. Furthermore, determination of serine and threonine-specific glycosylation (O-linked N-acetylglucosamine) of the C-terminus of the NFI-B isoform suggested that the secondary modification by O-GlcNAc might play a role in the cooperative regulation of WAP gene transcription by NFI-B2 and STAT5

  17. A single WAP domain (SWD)-containing protein with antiviral activity from Pacific white shrimp Litopenaeus vannamei.

    Science.gov (United States)

    Yang, Linwei; Niu, Shengwen; Gao, Jiefeng; Zuo, Hongliang; Yuan, Jia; Weng, Shaoping; He, Jianguo; Xu, Xiaopeng

    2018-02-01

    The single whey acidic protein (WAP) domain (SWD)-containing proteins, also called type III crustins, are a group of antimicrobial peptides (AMPs) in crustaceans. At present, a number of SWDs have been identified in shrimp, which showed essential antibacterial activities. However, the roles of SWDs in antiviral immune responses have not been reported up to now. In this study, a novel SWD (LvSWD3) was identified from Pacific white shrimp, Litopenaeus vannamei, which contained a typical single WAP domain homologous to those of other crustacean SWDs. Although lacking the pro and arg-rich region between the signal peptide and the WAP domain, LvSWD3 was closely clustered with other shrimp SWDs in the phylogenetic tree. Similar to many shrimp SWDs, the highest expression of LvSWD3 was detected in hemocytes. The LvSWD3 expression exhibited only limited changes after challenges with Vibrio parahaemolyticus, Poly (I:C) and lipopolysaccharide, but was significantly up-regulated after white spot syndrome virus (WSSV) infection. Silencing of LvSWDs significantly accelerated the death of the WSSV-infected but not the V. parahaemolyticus-infected shrimp. The recombinant LvSWD3 protein did not show proteinase inhibitory and antibacterial activities but could significantly postpone the death of WSSV-infected shrimp and reduce the viral load in tissues. These suggested that LvSWD3 was a novel SWD with antiviral activity. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. Quality improvement initiative: Preventative Surgical Site Infection Protocol in Vascular Surgery.

    Science.gov (United States)

    Parizh, David; Ascher, Enrico; Raza Rizvi, Syed Ali; Hingorani, Anil; Amaturo, Michael; Johnson, Eric

    2018-02-01

    Objective A quality improvement initiative was employed to decrease single institution surgical site infection rate in open lower extremity revascularization procedures. In an attempt to lower patient morbidity, we developed and implemented the Preventative Surgical Site Infection Protocol in Vascular Surgery. Surgical site infections lead to prolonged hospital stays, adjunctive procedure, and additive costs. We employed targeted interventions to address the common risk factors that predispose patients to post-operative complications. Methods Retrospective review was performed between 2012 and 2016 for all surgical site infections after revascularization procedures of the lower extremity. A quality improvement protocol was initiated in January 2015. Primary outcome was the assessment of surgical site infection rate reduction in the pre-protocol vs. post-protocol era. Secondary outcomes evaluated patient demographics, closure method, perioperative antibiotic coverage, and management outcomes. Results Implementation of the protocol decreased the surgical site infection rate from 6.4% to 1.6% p = 0.0137). Patient demographics and comorbidities were assessed and failed to demonstrate a statistically significant difference among the infection and no-infection groups. Wound closure with monocryl suture vs. staple proved to be associated with decreased surgical site infection rate ( p site infections in the vascular surgery population are effective and necessary. Our data suggest that there may be benefit in the incorporation of MRSA and Gram-negative coverage as part of the Surgical Care Improvement Project perioperative guidelines.

  19. Effects of a Short Drilling Implant Protocol on Osteotomy Site Temperature and Drill Torque.

    Science.gov (United States)

    Mihali, Sorin G; Canjau, Silvana; Cernescu, Anghel; Bortun, Cristina M; Wang, Hom-Lay; Bratu, Emanuel

    2018-02-01

    To establish a protocol for reducing the drilling sequence during implant site preparation based on temperature and insertion torque. The traditional conventional drilling sequence (used several drills with 0.6-mm increment each time) was compared with the proposed short drilling protocol (only used 2 drills: initial and final drill). One hundred drilling osteotomies were performed in bovine and porcine bones. Sets of 2 osteotomy sites were created in 5 bone densities using 2 types of drilling protocols. Thermographic pictures were captured throughout all drilling procedures and analyzed using ThermaCAM Researcher Professional 2.10. Torque values were determined during drilling by measuring electrical input and drill speed. There were statistically significant differences in bone temperature between the conventional and short drilling protocols during implant site preparation (analysis of variance P = 0.0008). However, there were no significant differences between the 2 types of drilling protocols for both implant diameters. Implant site preparation time was significantly reduced when using the short drilling protocol compared with the conventional drilling protocol (P drilling protocol proposed herein may represent a safe approach for implant site preparation.

  20. The Changing Adventures of Mixed Low-Level Waste Disposal at the Nevada Test Site

    International Nuclear Information System (INIS)

    2007-01-01

    After a 15-year hiatus, the United States Department of Energy (DOE) National Nuclear Security Administration Nevada Site Office (NNSA/NSO) began accepting DOE off-site generated mixed low-level radioactive waste (MLLW) for disposal at the Nevada Test Site (NTS) in December 2005. This action was predicated on the acceptance by the Nevada Division of Environmental Protection (NDEP) of a waste analysis plan (WAP). The NNSA/NSO agreed to limit mixed waste disposal to 20,000 cubic meters (approximately 706,000 cubic feet) and close the facility by December 2010 or sooner, if the volume limit is reached. The WAP and implementing procedures were developed based on Hanford?s system of verification to the extent possible so the two regional disposal sites could have similar processes. Since the NNSA/NSO does not have a breaching facility to allow the opening of boxes at the site, verification of the waste occurs by visual inspection at the generator/treatment facility or by Real-Time-Radiography (RTR) at the NTS. This system allows the NTS to effectively, efficiently, and compliantly accept MLLW for disposal. The WAP, NTS Waste Acceptance Criteria, and procedures have been revised based on learning experiences. These changes include: RTR expectations; visual inspection techniques; tamper-indicating device selection; void space requirements; and chemical screening concerns. The NNSA/NSO, NDEP, and the generators have been working together throughout the debugging of the verification processes. Additionally, the NNSA/NSO will continue to refine the MLLW acceptance processes and strive for continual improvement of the program

  1. Gene expression profiling: cell cycle deregulation and aneuploidy do not cause breast cancer formation in WAP-SVT/t transgenic animals.

    Science.gov (United States)

    Klein, Andreas; Guhl, Eva; Zollinger, Raphael; Tzeng, Yin-Jeh; Wessel, Ralf; Hummel, Michael; Graessmann, Monika; Graessmann, Adolf

    2005-05-01

    Microarray studies revealed that as a first hit the SV40 T/t antigen causes deregulation of 462 genes in mammary gland cells (ME cells) of WAP-SVT/t transgenic animals. The majority of deregulated genes are cell proliferation specific and Rb-E2F dependent, causing ME cell proliferation and gland hyperplasia but not breast cancer formation. In the breast tumor cells a further 207 genes are differentially expressed, most of them belonging to the cell communication category. In tissue culture breast tumor cells frequently switch off WAP-SVT/t transgene expression and regain the morphology and growth characteristics of normal ME cells, although the tumor-revertant cells are aneuploid and only 114 genes regain the expression level of normal ME cells. The profile of retransformants shows that only 38 deregulated genes are tumor-specific, and that none of them is considered to be a typical breast cancer gene.

  2. Reduced Toxicity With Intensity Modulated Radiation Therapy (IMRT) for Desmoplastic Small Round Cell Tumor (DSRCT): An Update on the Whole Abdominopelvic Radiation Therapy (WAP-RT) Experience

    Energy Technology Data Exchange (ETDEWEB)

    Desai, Neil B. [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Stein, Nicholas F. [Department of Medical Physics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); LaQuaglia, Michael P. [Department of Surgery, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Alektiar, Kaled M. [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Kushner, Brian H.; Modak, Shakeel; Magnan, Heather M. [Department of Pediatrics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Goodman, Karyn [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wolden, Suzanne L., E-mail: woldens@mskcc.org [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)

    2013-01-01

    Purpose: Desmoplastic small round cell tumor (DSRCT) is a rare malignancy typically involving the peritoneum in young men. Whole abdominopelvic radiation therapy (WAP-RT) using conventional 2-dimensional (2D) radiation therapy (RT) is used to address local recurrence but has been limited by toxicity. Our objectives were to assess the benefit of intensity modulated radiation therapy (IMRT) on toxicity and to update the largest series on radiation for DSRCT. Methods and Materials: The records of 31 patients with DSRCT treated with WAP-RT (22 with 2D-RT and 9 with IMRT) between 1992 and 2011 were retrospectively reviewed. All received multi-agent chemotherapy and maximal surgical debulking followed by 30 Gy of WAP-RT. A further focal boost of 12 to 24 Gy was used in 12 cases. Boost RT and autologous stem cell transplantation were nearly exclusive to patients treated with 2D-RT. Toxicities were assessed with the Common Terminology Criteria for Adverse Events. Dosimetric analysis compared IMRT and simulated 2D-RT dose distributions. Results: Of 31 patients, 30 completed WAP-RT, with a median follow-up after RT of 19 months. Acute toxicity was reduced with IMRT versus 2D-RT: P=.04 for gastrointestinal toxicity of grade 2 or higher (33% vs 77%); P=.02 for grade 4 hematologic toxicity (33% vs 86%); P=.01 for rates of granulocyte colony-stimulating factor; and P=.04 for rates of platelet transfusion. Post treatment red blood cell and platelet transfusion rates were also reduced (P=.01). IMRT improved target homogeneity ([D05-D95]/D05 of 21% vs 46%) and resulted in a 21% mean bone dose reduction. Small bowel obstruction was the most common late toxicity (23% overall). Updated 3-year overall survival and progression-free survival rates were 50% and 24%, respectively. Overall survival was associated with distant metastasis at diagnosis on multivariate analysis. Most failures remained intraperitoneal (88%). Conclusions: IMRT for consolidative WAP-RT in DSRCT improves

  3. Hanford Site Transuranic (TRU) Waste Certification Plan

    International Nuclear Information System (INIS)

    GREAGER, T.M.

    2000-01-01

    As a generator of transuranic (TRU) and TRU mixed waste destined for disposal at the Waste Isolation Pilot Plant (WIPP), the Hanford Site must ensure that its TRU waste meets the requirements of US. Department of Energy (DOE) 0 435.1, ''Radioactive Waste Management,'' and the Contact-Handled (CH) Transuranic Waste Acceptance Criteria for the Waste Isolation Pilot Plant (WIPP-WAC). WIPP-WAC requirements are derived from the WIPP Technical Safety Requirements, WIPP Safety Analysis Report, TRUPACT-II SARP, WIPP Land Withdrawal Act, WIPP Hazardous Waste Facility Permit, and Title 40 Code of Federal Regulations (CFR) 191/194 Compliance Certification Decision. The WIPP-WAC establishes the specific physical, chemical, radiological, and packaging criteria for acceptance of defense TRU waste shipments at WIPP. The WPP-WAC also requires that participating DOE TRU waste generator/treatment/storage sites produce site-specific documents, including a certification plan, that describe their program for managing TRU waste and TRU waste shipments before transferring waste to WIPP. Waste characterization activities provide much of the data upon which certification decisions are based. Waste characterization requirements for TRU waste and TRU mixed waste that contains constituents regulated under the Resource Conservation and Recovery Act (RCRA) are established in the WIPP Hazardous Waste Facility Permit Waste Analysis Plan (WAP). The Hanford Site Quality Assurance Project Plan (QAPjP) (HNF-2599) implements the applicable requirements in the WAP and includes the qualitative and quantitative criteria for making hazardous waste determinations. The Hanford Site must also ensure that its TRU waste destined for disposal at WPP meets requirements for transport in the Transuranic Package Transporter-11 (TRUPACT-11). The US. Nuclear Regulatory Commission (NRC) establishes the TRUPACT-11 requirements in the Safety Analysis Report for the TRUPACT-II Shipping Package (TRUPACT-11 SARP). In

  4. On Equivalence between Critical Probabilities of Dynamic Gossip Protocol and Static Site Percolation

    Science.gov (United States)

    Ishikawa, Tetsuya; Hayakawa, Tomohisa

    The relationship between the critical probability of gossip protocol on the square lattice and the critical probability of site percolation on the square lattice is discussed. Specifically, these two critical probabilities are analytically shown to be equal to each other. Furthermore, we present a way of evaluating the critical probability of site percolation by approximating the saturation of gossip protocol. Finally, we provide numerical results which support the theoretical analysis.

  5. RCRA groundwater data analysis protocol for the Hanford Site, Washington

    International Nuclear Information System (INIS)

    Chou, C.J.; Jackson, R.L.

    1992-04-01

    The Resource Conservation and Recovery Act of 1976 (RCRA) groundwater monitoring program currently involves site-specific monitoring of 20 facilities on the Hanford Site in southeastern Washington. The RCRA groundwater monitoring program has collected abundant data on groundwater quality. These data are used to assess the impact of a facility on groundwater quality or whether remediation efforts under RCRA corrective action programs are effective. Both evaluations rely on statistical analysis of groundwater monitoring data. The need for information on groundwater quality by regulators and environmental managers makes statistical analysis of monitoring data an important part of RCRA groundwater monitoring programs. The complexity of groundwater monitoring programs and variabilities (spatial, temporal, and analytical) exhibited in groundwater quality variables indicate the need for a data analysis protocol to guide statistical analysis. A data analysis protocol was developed from the perspective of addressing regulatory requirements, data quality, and management information needs. This data analysis protocol contains four elements: data handling methods; graphical evaluation techniques; statistical tests for trend, central tendency, and excursion analysis; and reporting procedures for presenting results to users

  6. Standard protocol for evaluation of environmental transfer factors around NPP sites

    International Nuclear Information System (INIS)

    Hegde, A.G.; Verma, P.C.; Rao, D.D.

    2009-01-01

    This document presents the standard procedures for evaluation of site specific environmental transfer factors around NPP sites. The scope of this document is to provide standard protocol to be followed for evaluation of environmental transfer factors around NPP sites. The studies on transfer factors are being carried out at various NPP sites under DAE-BRNS projects for evaluation of site specific transfer factors for radionuclides released from power plants. This document contains a common methodology in terms of sampling, processing, measurements and analysis of elemental/radionuclides, while keeping the site specific requirements also in place. (author)

  7. Servicio de M-comercio: Sistema de interacción entre un centro comercial y sus visitantes utilizando las tecnologías WAP y Bluetooth M-commerce service: Interaction system between a mall and visitors using WAP and Bluetooth technologies

    Directory of Open Access Journals (Sweden)

    Jorge Gómez Rojas

    2013-04-01

    Full Text Available El servicio de interacción es un medio de comunicación que mejora las relaciones comerciales entre los centros comerciales y sus visitantes, utilizando las tecnologías de comunicaciones móviles WAP y Bluetooth como una nueva alternativa de negocios, y sin usar la red del operador de telefonía móvil celular. El sistema de interacción mencionado permite el intercambio de información de un grupo potencial de compradores entre los visitantes de un centro comercial y la administración de los diferentes comercios utilizando el teléfono celular. El sistema se compone de una aplicación móvil en J2ME, puntos de acceso Bluetooth y Wi-Fi, un servidor Bluetooth y un servidor Web con aplicaciones para ser accedidas por dispositivos móviles.The interaction service is a means of communication that improves trade relations between the mall and visitors using mobile communications technology WAP and Bluetooth, as a new business alternative, and without operator's network using the mobile phone. The proposed system of interaction, allows the exchange of information from a potential pool of buyers among visitors to a shopping center and the administration of the various shops, through the cell phone. The system consists of a mobile application in J2ME, the access points, Bluetooth server, and Web server with applications to mobile devices.

  8. Servicio de M-comercio: Sistema de interacción entre un centro comercial y sus visitantes utilizando las tecnologías WAP y Bluetooth M-commerce service: Interaction system between a mall and visitors using WAP and Bluetooth technologies

    OpenAIRE

    Jorge Gómez Rojas; Luis Leonardo Camargo Ariza; Byron Medina Delgado

    2013-01-01

    El servicio de interacción es un medio de comunicación que mejora las relaciones comerciales entre los centros comerciales y sus visitantes, utilizando las tecnologías de comunicaciones móviles WAP y Bluetooth como una nueva alternativa de negocios, y sin usar la red del operador de telefonía móvil celular. El sistema de interacción mencionado permite el intercambio de información de un grupo potencial de compradores entre los visitantes de un centro comercial y la administración de los difer...

  9. Sustainable and Practical Firmware Upgrade for Wireless Access Point Using Password-Based Authentication

    Directory of Open Access Journals (Sweden)

    Jaejin Jang

    2016-08-01

    Full Text Available Wireless access points (WAPs are devices that provide Internet connectivity to devices such as desktops, laptops, smartphones, and tablets. Hence, it is important to provide sufficient availability to devices and security for the traffic that is routed by a WAP. However, attackers can decrease the network bandwidth or obtain the traffic including private data such as search histories, login information, and device usage patterns by exploiting the vulnerabilities in firmware upgrades to install malicious firmware. To address this problem, we propose a sustainable and practical firmware upgrade for a WAP using password-based authentication. The proposed upgrade protocol ensures security by adding freshness to the firmware whenever a firmware upgrade occurs. This freshness is different for each event and each firmware; therefore, even if the freshness of one firmware is exposed, the others are secure. In addition, confidentiality, integrity, and authentication are ensured. Furthermore, the proposed protocol can be easily implemented and adapted to WAPs. Experiments are performed to evaluate the upgrade time, resource usage, and code size in wired and wireless connected environments by implementing a prototype and analyzing the security of the protocol. The results show that the proposed upgrade is secure and practical.

  10. Final Hanford Site Transuranic (TRU) Waste Characterization QA Project Plan

    International Nuclear Information System (INIS)

    GREAGER, T.M.

    2000-01-01

    The Quality Assurance Project Plan (QAPjP) has been prepared for waste characterization activities to be conducted by the Transuranic (TRU) Project at the Hanford Site to meet requirements set forth in the Waste Isolation Pilot Plan (WIPP) Hazardous Waste Facility Permit, 4890139088-TSDF, Attachment B, including Attachments B1 through B6 (WAP) (DOE, 1999a). The QAPjP describes the waste characterization requirements and includes test methods, details of planned waste sampling and analysis, and a description of the waste characterization and verification process. In addition, the QAPjP includes a description of the quality assurance/quality control (QA/QC) requirements for the waste characterization program. Before TRU waste is shipped to the WIPP site by the TRU Project, all applicable requirements of the QAPjP shall be implemented. Additional requirements necessary for transportation to waste disposal at WIPP can be found in the ''Quality Assurance Program Document'' (DOE 1999b) and HNF-2600, ''Hanford Site Transuranic Waste Certification Plan.'' TRU mixed waste contains both TRU radioactive and hazardous components, as defined in the WLPP-WAP. The waste is designated and separately packaged as either contact-handled (CH) or remote-handled (RH), based on the radiological dose rate at the surface of the waste container. RH TRU wastes are not currently shipped to the WIPP facility

  11. Making sense of site declarations: Canadian declarations under article 2.a. (iii) of the Additional Protocol

    International Nuclear Information System (INIS)

    Cameron, J.K.; Benjamin, R.; Ghosh, A.

    2001-01-01

    Full text: While this paper will provide an overview of Additional Protocol implementation activities in Canada, this paper will also deal with a specific, albeit important, component of Canada's initial declaration under the Additional Protocol: site definitions and declarations. A clear description of the problems, solutions and compromises in making site declarations across a variety of sites in Canada would provide a useful insight into the process as other States prepare to do the same. Through the Model Protocol Additional to Safeguards Agreements Between Member States and the International Atomic Energy Agency, provisions exist to fulfil a longstanding gap in the coverage of international safeguards. The success of these new provisions are dependent on the extent to which declarations balance the intent of expanded declarations and the practical difficulties in making such declarations. The prerogative to delineate site boundaries lies with the Member State. In doing so, four factors merit careful consideration. First, Article 18.b of the Additional Protocol draws connections between facility definition and site delineation. Under comprehensive safeguards, information on facilities has already been submitted to the IAEA specifying site layouts in the design information questionnaire. Consistency between the site layouts specifications of the design information and site definition under the Additional Protocol is important, as differences will lead to inconsistencies, which will have to be resolved during implementation. Second, while Article 18.b specified that specific essential services, co-located in close geographic proximity, should be considered as part of the same site, there are instances where site definition is complicated by close proximity of other, but separate, safeguarded facilities and the existence of services related, but not essentials according to the definitions of the Additional Protocol, to the site. Third, practical limitations come

  12. Diagnostic efficacy of a modified low-dose acquisition protocol for the preoperative evaluation of mini-implant sites

    Energy Technology Data Exchange (ETDEWEB)

    Tadinada, Aditya; Marczak, Alana; Yadav, Sumit [University of Connecticut School of Dental Medicine, Farmington (United States)

    2017-09-15

    The objective of this study was to compare the outcomes of surgical mini-implant placement when potential mini-implant sites were scanned using a lower-dose 180° acquisition protocol versus a conventional 360° acquisition protocol. Ten dentate human skulls were used to provide sites for potential mini-implant placement. The sites were randomly divided into 2 groups: 360° and 180° cone-beam computed tomography (CBCT) acquisition protocols. A small-volume 180° CBCT scan and a 360° CBCT scan of each site were acquired using a Morita Accuitomo-170 CBCT machine and then a mini-implant was placed. A follow-up 360° CBCT scan was done as a gold standard to evaluate the location of the mini-implant and root perforation. Two raters evaluated the scans. Ninety-eight percent of the mini-implants placed did not perforate any root structure. Two percent of the sites had an appearance suggestive of perforation. On a Likert scale, both raters agreed that their subjective evaluation of the diagnostic quality of the protocols, ability to make and read measurements of the sites, and preferences for the specified diagnostic task were comparable. The Cohen kappa showed high inter-rater and intra-rater agreement. In this ex vivo study, we found that the 180° rotational acquisition was as effective as the conventional 360° rotational acquisition for the preoperative evaluation of potential mini-implant sites.

  13. Survey of Recipients of WAP Services Assessment of Household Budget and Energy Behaviors Pre to Post Weatherization DOE

    Energy Technology Data Exchange (ETDEWEB)

    Tonn, Bruce Edward [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Rose, Erin M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Hawkins, Beth A. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2015-10-01

    This report presents results from the national survey of weatherization recipients. This research was one component of the retrospective and Recovery Act evaluations of the U.S. Department of Energy s Weatherization Assistance Program. Survey respondents were randomly selected from a nationally representative sample of weatherization recipients. The respondents and a comparison group were surveyed just prior to receiving their energy audits and then again approximately 18 months post-weatherization. This report focuses on budget issues faced by WAP households pre- and post-weatherization, whether household energy behaviors changed from pre- to post, the effectiveness of approaches to client energy education, and use and knowledge about thermostats.

  14. SYMMETRIC ENCRYPTION USING PRE-SHARED PUBLIC PARAMETERS FOR A SECURE TFTP PROTOCOL

    Directory of Open Access Journals (Sweden)

    N. N. MOHAMED

    2017-01-01

    Full Text Available Advances in the communication technology of embedded systems have led to the situation where nowadays almost all systems should implement security for data safety. Trivial File Transfer Protocol (TFTP has advantages for use in embedded systems due to its speed and simplicity, however without security mechanisms, it is vulnerable to various attacks. As an example, during upgrading of Wireless Access Points (WAPs, attackers can access the information and modify it, and then install malicious code to interrupt the system. This work proposes security implementation of Diffie Hellman Key Exchange in TFTP by pre-sharing public parameters that enable two parties to achieve same secret key without the risk of Man-In-The-Middle (MITM attacks. The implementation is integrated with compression and encryption methods to significantly reduce computational requirements in TFTP communication.

  15. A Ten Step Protocol and Plan for CCS Site Characterization, Based on an Analysis of the Rocky Mountain Region, USA

    Energy Technology Data Exchange (ETDEWEB)

    McPherson, Brian; Matthews, Vince

    2013-09-15

    This report expresses a Ten-Step Protocol for CO2 Storage Site Characterization, the final outcome of an extensive Site Characterization analysis of the Rocky Mountain region, USA. These ten steps include: (1) regional assessment and data gathering; (2) identification and analysis of appropriate local sites for characterization; (3) public engagement; (4) geologic and geophysical analysis of local site(s); (5) stratigraphic well drilling and coring; (6) core analysis and interpretation with other data; (7) database assembly and static model development; (8) storage capacity assessment; (9) simulation and uncertainty assessment; (10) risk assessment. While the results detailed here are primarily germane to the Rocky Mountain region, the intent of this protocol is to be portable or generally applicable for CO2 storage site characterization.

  16. Distribution of immunodeficiency fact files with XML – from Web to WAP

    Directory of Open Access Journals (Sweden)

    Riikonen Pentti

    2005-06-01

    Full Text Available Abstract Background Although biomedical information is growing rapidly, it is difficult to find and retrieve validated data especially for rare hereditary diseases. There is an increased need for services capable of integrating and validating information as well as proving it in a logically organized structure. A XML-based language enables creation of open source databases for storage, maintenance and delivery for different platforms. Methods Here we present a new data model called fact file and an XML-based specification Inherited Disease Markup Language (IDML, that were developed to facilitate disease information integration, storage and exchange. The data model was applied to primary immunodeficiencies, but it can be used for any hereditary disease. Fact files integrate biomedical, genetic and clinical information related to hereditary diseases. Results IDML and fact files were used to build a comprehensive Web and WAP accessible knowledge base ImmunoDeficiency Resource (IDR available at http://bioinf.uta.fi/idr/. A fact file is a user oriented user interface, which serves as a starting point to explore information on hereditary diseases. Conclusion The IDML enables the seamless integration and presentation of genetic and disease information resources in the Internet. IDML can be used to build information services for all kinds of inherited diseases. The open source specification and related programs are available at http://bioinf.uta.fi/idml/.

  17. Live-cell and super-resolution imaging reveal that the distribution of wall-associated protein A is correlated with the cell chain integrity of Streptococcus mutans.

    Science.gov (United States)

    Li, Y; Liu, Z; Zhang, Y; Su, Q P; Xue, B; Shao, S; Zhu, Y; Xu, X; Wei, S; Sun, Y

    2015-10-01

    Streptococcus mutans is a primary pathogen responsible for dental caries. It has an outstanding ability to form biofilm, which is vital for virulence. Previous studies have shown that knockout of Wall-associated protein A (WapA) affects cell chain and biofilm formation of S. mutans. As a surface protein, the distribution of WapA remains unknown, but it is important to understand the mechanism underlying the function of WapA. This study applied the fluorescence protein mCherry as a reporter gene to characterize the dynamic distribution of WapA in S. mutans via time-lapse and super-resolution fluorescence imaging. The results revealed interesting subcellular distribution patterns of WapA in single, dividing and long chains of S. mutans cells. It appears at the middle of the cell and moves to the poles as the cell grows and divides. In a cell chain, after each round of cell division, such dynamic relocation results in WapA distribution at the previous cell division sites, resulting in a pattern where WapA is located at the boundary of two adjacent cell pairs. This WapA distribution pattern corresponds to the breaking segmentation of wapA deletion cell chains. The dynamic relocation of WapA through the cell cycle increases our understanding of the mechanism of WapA in maintaining cell chain integrity and biofilm formation. © 2015 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  18. Tienda virtual de comercio móvil

    Directory of Open Access Journals (Sweden)

    Dinael Guevara-Ibarra

    2005-01-01

    Full Text Available Group Research and Development in Telecommunications GIDT developed the project of creating the platform of Virtual Store to be accessed by mobile devices through the Wireless Application Protocol (Wireless Applications Protocol , WAP , with the feature of sending messages the phones the clients; these messages are automatically created by the application. Elaborate platform Virtual Store integrates cellular mobile communications to electronic commerce , allowing users telephony Mobile phone consultations and procurement procedures from the cell phone . This article sets out the framework , the description, the procedure and the conclusions on the implementation of a virtual store selling books called WAP Books, as a specific application of a Virtual Store platform for mobile devices.

  19. Development of a monitoring protocol to enhance mentoring in the IRIS REU site

    Science.gov (United States)

    Hubenthal, M.; Brudzinski, M. R.; Colella, H.

    2013-12-01

    Research Experiences for Undergraduate (REU) sites pair interns with scientists expected to oversee and guide an intern's scientific research, and assist in the development of skills, knowledge, and connections that will enhance the intern's professional and personal growth. This aspect of REU sites is generally recognized as a powerful, yet complicated, component that has a strong influence on the overall success of the intern's experience. Evaluations indicate that the quality and consistency of mentoring in REU sites can be highly variable. Traditional strategies to influence mentorship generally include reading lists or short trainings at the beginning of the summer. The efficacy of these approaches is questionable. As a result many REU Site facilitators are deeply interested in the question 'How can REU programs challenge scientists to raise their participation to the level of (truly) mentoring?' The Incorporated Research Institutions for Seismology (IRIS) REU site is developing a 13-item rubric measuring research skills, and a protocol of training and intern-mentor meetings to discuss progress. The goal of the intervention is to both increase the extent to which the mentoring relationship is centered on the intern, and to enable interns and mentors to feel more effective monitoring interns' personal/professional growth. This intervention was piloted in 2011, refined, and fully implemented in 2012. During the initial week of the program, interns assess their skills, complete the rubric independently, and discuss the completed rubric with their mentor. Midway through the summer interns and mentors each review the rubric and assess the intern's skills. The intern-mentor pairs then meet to collaborate and complete the rubric together. Finally, in the last week of the program, interns and mentors independently assess the intern's skills and complete the rubric, and the pairs again meet to discuss and negotiate these independent assessments. Survey data from 2012

  20. [Effect of compliance with an antibiotic prophylaxis protocol in surgical site infections in appendectomies. Prospective cohort study].

    Science.gov (United States)

    Sánchez-Santana, Tomás; Del-Moral-Luque, Juan Antonio; Gil-Yonte, Pablo; Bañuelos-Andrío, Luis; Durán-Poveda, Manuel; Rodríguez-Caravaca, Gil

    Antibiotic prophylaxis is the most suitable tool for preventing surgical site infection. This study assessed compliance with antibiotic prophylaxis in surgery for acute appendicitis, and the effect of this compliance on surgical site infection. Prospective cohort study to evaluate compliance with antibiotic prophylaxis protocol in appendectomies. An assessment was made of the level of compliance with prophylaxis, as well as the causes of non-compliance. The incidence of surgical site infection was studied after a maximum incubation period of 30 days. The relative risk adjusted with a logistic regression model was used to assess the effect of non-compliance of prophylaxis on surgical site infection. The study included a total of 930 patients. Antibiotic prophylaxis was indicated in all patients, and administered in 71.3% of cases, with an overall protocol compliance of 86.1%. The principal cause of non-compliance was time of initiation. Cumulative incidence of surgical site infection was 4.6%. No relationship was found between inadequate prophylaxis compliance and infection (relative risk=0.5; 95% CI: 0.1-1.9) (P>.05). Compliance of antibiotic prophylaxis was high, but could be improved. No relationship was found between prophylaxis compliance and surgical site infection rate. Copyright © 2016 Academia Mexicana de Cirugía A.C. Publicado por Masson Doyma México S.A. All rights reserved.

  1. Pilot studies for the North American Soil Geochemical Landscapes Project - Site selection, sampling protocols, analytical methods, and quality control protocols

    Science.gov (United States)

    Smith, D.B.; Woodruff, L.G.; O'Leary, R. M.; Cannon, W.F.; Garrett, R.G.; Kilburn, J.E.; Goldhaber, M.B.

    2009-01-01

    In 2004, the US Geological Survey (USGS) and the Geological Survey of Canada sampled and chemically analyzed soils along two transects across Canada and the USA in preparation for a planned soil geochemical survey of North America. This effort was a pilot study to test and refine sampling protocols, analytical methods, quality control protocols, and field logistics for the continental survey. A total of 220 sample sites were selected at approximately 40-km intervals along the two transects. The ideal sampling protocol at each site called for a sample from a depth of 0-5 cm and a composite of each of the O, A, and C horizons. The Ca, Fe, K, Mg, Na, S, Ti, Ag, As, Ba, Be, Bi, Cd, Ce, Co, Cr, Cs, Cu, Ga, In, La, Li, Mn, Mo, Nb, Ni, P, Pb, Rb, Sb, Sc, Sn, Sr, Te, Th, Tl, U, V, W, Y, and Zn by inductively coupled plasma-mass spectrometry and inductively coupled plasma-atomic emission spectrometry following a near-total digestion in a mixture of HCl, HNO3, HClO4, and HF. Separate methods were used for Hg, Se, total C, and carbonate-C on this same size fraction. Only Ag, In, and Te had a large percentage of concentrations below the detection limit. Quality control (QC) of the analyses was monitored at three levels: the laboratory performing the analysis, the USGS QC officer, and the principal investigator for the study. This level of review resulted in an average of one QC sample for every 20 field samples, which proved to be minimally adequate for such a large-scale survey. Additional QC samples should be added to monitor within-batch quality to the extent that no more than 10 samples are analyzed between a QC sample. Only Cr (77%), Y (82%), and Sb (80%) fell outside the acceptable limits of accuracy (% recovery between 85 and 115%) because of likely residence in mineral phases resistant to the acid digestion. A separate sample of 0-5-cm material was collected at each site for determination of organic compounds. A subset of 73 of these samples was analyzed for a suite of

  2. Surface and subsurface cleanup protocol for radionuclides, Gunnison, Colorado, UMTRA project processing site

    International Nuclear Information System (INIS)

    1993-09-01

    Surface and subsurface soil cleanup protocols for the Gunnison, Colorado, processing sits are summarized as follows: In accordance with EPA-promulgated land cleanup standards (40 CFR 192), in situ Ra-226 is to be cleaned up based on bulk concentrations not exceeding 5 and 15 pCi/g in 15-cm surface and subsurface depth increments, averaged over 100-m 2 grid blocks, where the parent Ra-226 concentrations are greater than, or in secular equilibrium with, the Th-230 parent. A bulk interpretation of these EPA standards has been accepted by the Nuclear Regulatory Commission (NRC), and while the concentration of the finer-sized soil fraction less than a No. 4 mesh sieve contains the higher concentration of radioactivity, the bulk approach in effect integrates the total sample radioactivity over the entire sample mass. In locations where Th-230 has differentially migrated in subsoil relative to Ra-226, a Th-230 cleanup protocol has been developed in accordance with Supplemental Standard provisions of 40 CFR 192 for NRC/Colorado Department of Health (CDH) approval for timely implementation. Detailed elements of the protocol are contained in Appendix A, Generic Protocol from Thorium-230 Cleanup/Verification at UMTRA Project Processing Sites. The cleanup of other radionuclides or nonradiological hazards that pose a significant threat to the public and the environment will be determined and implemented in accordance with pathway analysis to assess impacts and the implications of ALARA specified in 40 CFR 192 relative to supplemental standards

  3. Surface and subsurface cleanup protocol for radionuclides, Gunnison, Colorado, UMTRA project processing site

    International Nuclear Information System (INIS)

    Gonzales, D.

    1993-12-01

    Surface and subsurface soil cleanup protocols for the Gunnison, Colorado, processing site are summarized as follows: In accordance with EPA-promulgated land cleanup standards, in situ Ra-226 is to be cleaned up based on bulk concentrations not exceeding 5 and 15 pCi/g in 15-cm surface and subsurface depth increments, averaged over 100m 2 grid blocks, where the parent Ra-226 concentrations are greater than, or in secular equilibrium with, the Th-230 parent. In locations where Th-230 has differentially migrated in subsoil relative to Ra-226, a Th-230 clean up protocol has been developed. The cleanup of other radionuclides or nonradiological hazards that pose a significant threat to the public and the environment will be determined and implemented in accordance with pathway analysis to assess impacts and the implications of ALARA specified in 40 CFR Part 192 relative to supplemental standards

  4. Protocol for development of authorized release limits for concrete at U.S. Department of Energy sites

    International Nuclear Information System (INIS)

    Arnish, J.; Kamboj, S.; Chen, S.-Y.; Parker, F. L.; Smith, A. M.; Meservey, R. H.; Tripp, J. L.

    2000-01-01

    The purpose of this protocol is to assist US Department of Energy (DOE) sites in releasing concrete for reuse. Current regulations allow the sites to release surface-contaminated materials if their radioactivity falls below certain levels and to possibly release materials with volumetric contamination or higher levels of surface contamination on a case-by-case basis. In all cases, an ALARA (as low as reasonably achievable) analysis that evaluates the risks of releasing volumetrically contaminated concrete or concrete with higher levels of surface contamination is required as a basis for proposing and setting new release limits that allow for reuse of the concrete material. To evaluate the dose impacts of reusing radioactively contaminated material, the measured radiation levels (pCi/g or disintegrations per minute [dpm]/100 cm 2 ) must be converted to the estimated dose (mrem/yr) that would be received by affected individuals. The dose depends on the amounts and types of isotopes present and the time, distance, and method of exposure (e.g., inhalation or external exposure). For each disposition alternative, the protocol provides a systematic method to evaluate the impact of the dose on the affected individuals. The cost impacts of reusing concrete also need to be evaluated. They too depend on the disposition alternative and the extent and type of contamination. The protocol provides a method to perform a detailed analysis of these factors and evaluate the dose and cost impacts for various disposition alternatives. Once the dose and cost impacts of the various alternatives have been estimated, the protocol outlines the steps required to propose new release standards that allow release and reuse of the concrete material

  5. Which dressing do donor site wounds need?: study protocol for a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Ubbink Dirk T

    2011-10-01

    Full Text Available Abstract Background Donor site wounds after split-skin grafting are rather 'standard' wounds. At present, lots of dressings and topical agents for donor site wounds are commercially available. This causes large variation in the local care of these wounds, while the optimum 'standard' dressing for local wound care is unclear. This protocol describes a trial in which we investigate the effectiveness of various treatment options for these donor site wounds. Methods A 14-center, six-armed randomized clinical trial is being carried out in the Netherlands. An a-priori power analysis and an anticipated dropout rate of 15% indicates that 50 patients per group are necessary, totaling 300 patients, to be able to detect a 25% quicker mean time to complete wound healing. Randomization has been computerized to ensure allocation concealment. Adult patients who need a split-skin grafting operation for any reason, leaving a donor site wound of at least 10 cm2 are included and receive one of the following dressings: hydrocolloid, alginate, film, hydrofiber, silicone dressing, or paraffin gauze. No combinations of products from other intervention groups in this trial are allowed. Optimum application and changes of these dressings are pursued according to the protocol as supplied by the dressing manufacturers. Primary outcomes are days to complete wound healing and pain (using a Visual Analogue Scale. Secondary outcomes are adverse effects, scarring, patient satisfaction, and costs. Outcome assessors unaware of the treatment allocation will assess whether or not an outcome has occurred. Results will be analyzed according to the intention to treat principle. The first patient was randomized October 1, 2009. Discussion This study will provide comprehensive data on the effectiveness of different treatment options for donor site wounds. The dressing(s that will prevail in effectiveness, satisfaction and costs will be promoted among clinicians dealing with such

  6. Surface and subsurface cleanup protocol for radionuclides, Gunnison, Colorado, UMTRA project processing site. Final [report

    Energy Technology Data Exchange (ETDEWEB)

    1993-09-01

    Surface and subsurface soil cleanup protocols for the Gunnison, Colorado, processing sits are summarized as follows: In accordance with EPA-promulgated land cleanup standards (40 CFR 192), in situ Ra-226 is to be cleaned up based on bulk concentrations not exceeding 5 and 15 pCi/g in 15-cm surface and subsurface depth increments, averaged over 100-m{sup 2} grid blocks, where the parent Ra-226 concentrations are greater than, or in secular equilibrium with, the Th-230 parent. A bulk interpretation of these EPA standards has been accepted by the Nuclear Regulatory Commission (NRC), and while the concentration of the finer-sized soil fraction less than a No. 4 mesh sieve contains the higher concentration of radioactivity, the bulk approach in effect integrates the total sample radioactivity over the entire sample mass. In locations where Th-230 has differentially migrated in subsoil relative to Ra-226, a Th-230 cleanup protocol has been developed in accordance with Supplemental Standard provisions of 40 CFR 192 for NRC/Colorado Department of Health (CDH) approval for timely implementation. Detailed elements of the protocol are contained in Appendix A, Generic Protocol from Thorium-230 Cleanup/Verification at UMTRA Project Processing Sites. The cleanup of other radionuclides or nonradiological hazards that pose a significant threat to the public and the environment will be determined and implemented in accordance with pathway analysis to assess impacts and the implications of ALARA specified in 40 CFR 192 relative to supplemental standards.

  7. Time-lapse imagery of Adélie penguins reveals differential winter strategies and breeding site occupation.

    Science.gov (United States)

    Black, Caitlin; Southwell, Colin; Emmerson, Louise; Lunn, Daniel; Hart, Tom

    2018-01-01

    Polar seabirds adopt different over-wintering strategies to survive and build condition during the critical winter period. Penguin species either reside at the colony during the winter months or migrate long distances. Tracking studies and survey methods have revealed differences in winter migration routes among penguin species and colonies, dependent on both biotic and abiotic factors present. However, scan sampling methods are rarely used to reveal non-breeding behaviors during winter and little is known about presence at the colony site over this period. Here we show that Adélie penguins on the Yalour Islands in the Western Antarctic Peninsula (WAP) are present year-round at the colony and undergo a mid-winter peak in abundance during winter. We found a negative relationship between daylight hours and penguin abundance when either open water or compact ice conditions were present, suggesting that penguins return to the breeding colony when visibility is lowest for at-sea foraging and when either extreme low or high levels of sea ice exist offshore. In contrast, Adélie penguins breeding in East Antarctica were not observed at the colonies during winter, suggesting that Adélie penguins undergo differential winter strategies in the marginal ice zone on the WAP compared to those in East Antarctica. These results demonstrate that cameras can successfully monitor wildlife year-round in areas that are largely inaccessible during winter.

  8. Effect of a Standardized Protocol of Antibiotic Therapy on Surgical Site Infection after Laparoscopic Surgery for Complicated Appendicitis.

    Science.gov (United States)

    Park, Hyoung-Chul; Kim, Min Jeong; Lee, Bong Hwa

    Although it is accepted that complicated appendicitis requires antibiotic therapy to prevent post-operative surgical infections, consensus protocols on the duration and regimens of treatment are not well established. This study aimed to compare the outcome of post-operative infectious complications in patients receiving old non-standardized and new standard antibiotic protocols, involving either 5 or 10 days of treatment, respectively. We enrolled 1,343 patients who underwent laparoscopic surgery for complicated appendicitis between January 2009 and December 2014. At the beginning of the new protocol, the patients were divided into two groups; 10 days of various antibiotic regimens (between January 2009 and June 2012, called the non-standardized protocol; n = 730) and five days of cefuroxime and metronidazole regimen (between July 2012 and December 2014; standardized protocol; n = 613). We compared the clinical outcomes, including surgical site infection (SSI) (superficial and deep organ/space infections) in the two groups. The standardized protocol group had a slightly shorter operative time (67 vs. 69 min), a shorter hospital stay (5 vs. 5.4 d), and lower medical cost (US$1,564 vs. US$1,654). Otherwise, there was no difference between the groups. No differences were found in the non-standardized and standard protocol groups with regard to the rate of superficial infection (10.3% vs. 12.7%; p = 0.488) or deep organ/space infection (2.3% vs. 2.1%; p = 0.797). In patients undergoing laparoscopic surgery for complicated appendicitis, five days of cefuroxime and metronidazole did not lead to more SSIs, and it decreased the medical costs compared with non-standardized antibiotic regimens.

  9. A hyper-temporal remote sensing protocol for high-resolution mapping of ecological sites.

    Science.gov (United States)

    Maynard, Jonathan J; Karl, Jason W

    2017-01-01

    ) spectral variability through time, 2) field sampling protocols that accurately characterize key soil properties (e.g., texture, depth) need to be adopted, and 3) additional environmental covariates (e.g. terrain attributes) need to be evaluated that may help further differentiate sites with similar spectral signals. Finally, the proposed hyper-temporal remote sensing framework may provide a standardized approach to evaluate and test our ecological site concepts through examining differences in vegetation dynamics in response to climatic variability and other drivers of land-use change. Results from this study demonstrate the efficacy of the hyper-temporal remote sensing approach for high resolution mapping of ecological sites, and highlights its utility in terms of reduced cost and time investment relative to traditional manual mapping approaches.

  10. Time-lapse imagery of Adélie penguins reveals differential winter strategies and breeding site occupation

    Science.gov (United States)

    Southwell, Colin; Emmerson, Louise; Lunn, Daniel

    2018-01-01

    Polar seabirds adopt different over-wintering strategies to survive and build condition during the critical winter period. Penguin species either reside at the colony during the winter months or migrate long distances. Tracking studies and survey methods have revealed differences in winter migration routes among penguin species and colonies, dependent on both biotic and abiotic factors present. However, scan sampling methods are rarely used to reveal non-breeding behaviors during winter and little is known about presence at the colony site over this period. Here we show that Adélie penguins on the Yalour Islands in the Western Antarctic Peninsula (WAP) are present year-round at the colony and undergo a mid-winter peak in abundance during winter. We found a negative relationship between daylight hours and penguin abundance when either open water or compact ice conditions were present, suggesting that penguins return to the breeding colony when visibility is lowest for at-sea foraging and when either extreme low or high levels of sea ice exist offshore. In contrast, Adélie penguins breeding in East Antarctica were not observed at the colonies during winter, suggesting that Adélie penguins undergo differential winter strategies in the marginal ice zone on the WAP compared to those in East Antarctica. These results demonstrate that cameras can successfully monitor wildlife year-round in areas that are largely inaccessible during winter. PMID:29561876

  11. Surface and subsurface cleanup protocol for radionuclides Gunnison, Colorado, UMTRA Project Processing Site

    International Nuclear Information System (INIS)

    1994-05-01

    The supplemental standards provisions of Title 40, Code of Federal Regulations, Part 192 (40 CFR Part 192) require the cleanup of radionuclides other than radium-226 (Ra-226) to levels ''as low as reasonably achievable'' (ALARA), taking into account site-specific conditions, if sufficient quantities and concentrations are present to constitute a significant radiation hazard. In this context, thorium-230 (Th-230) at the Gunnison, Colorado, processing site will require remediation. However, a seasonally fluctuating groundwater table at the site significantly complicates conventional remedial action with respect to cleanup. Characterization data indicate that in the offpile areas, the removal of residual in situ bulk Ra-226 and Th-230 such that the 1000-year projected Ra-226 concentration (Ra-226 concentration in 1000 years due to the decay of in situ Ra-226 and the in-growth of Ra-226 from in situ Th-230) complies with the US Environmental Protection Agency (EPA) cleanup standard for in situ Ra-226 and the cleanup protocol for in situ Th-230 can be readily achieved using conventional excavation techniques for bulk contamination without encountering significant impacts due to groundwater. The EPA cleanup standard and criterion for Ra-226 and the 1000-year projected Ra-226 are 5 and 15 picocuries per gram (pCi/g) above background, respectively, averaged over 15-centimeter (cm) deep surface and subsurface intervals and 100-square-meter (m 2 ) grid areas. Significant differential migration of Th-230 relative to Ra-226 has occurred over 40 percent of the subpile area. To effectively remediate the site with respect to Ra-226 and Th-230, supplemental standard is proposed and discussed in this report

  12. Development of a bedside viable ultrasound protocol to quantify appendicular lean tissue mass.

    Science.gov (United States)

    Paris, Michael T; Lafleur, Benoit; Dubin, Joel A; Mourtzakis, Marina

    2017-10-01

    Ultrasound is a non-invasive and readily available tool that can be prospectively applied at the bedside to assess muscle mass in clinical settings. The four-site protocol, which images two anatomical sites on each quadriceps, may be a viable bedside method, but its ability to predict musculature has not been compared against whole-body reference methods. Our primary objectives were to (i) compare the four-site protocol's ability to predict appendicular lean tissue mass from dual-energy X-ray absorptiometry; (ii) optimize the predictability of the four-site protocol with additional anatomical muscle thicknesses and easily obtained covariates; and (iii) assess the ability of the optimized protocol to identify individuals with low lean tissue mass. This observational cross-sectional study recruited 96 university and community dwelling adults. Participants underwent ultrasound scans for assessment of muscle thickness and whole-body dual-energy X-ray absorptiometry scans for assessment of appendicular lean tissue. Ultrasound protocols included (i) the nine-site protocol, which images nine anterior and posterior muscle groups in supine and prone positions, and (ii) the four-site protocol, which images two anterior sites on each quadriceps muscle group in a supine position. The four-site protocol was strongly associated (R 2  = 0.72) with appendicular lean tissue mass, but Bland-Altman analysis displayed wide limits of agreement (-5.67, 5.67 kg). Incorporating the anterior upper arm muscle thickness, and covariates age and sex, alongside the four-site protocol, improved the association (R 2  = 0.91) with appendicular lean tissue and displayed narrower limits of agreement (-3.18, 3.18 kg). The optimized protocol demonstrated a strong ability to identify low lean tissue mass (area under the curve = 0.89). The four-site protocol can be improved with the addition of the anterior upper arm muscle thickness, sex, and age when predicting appendicular lean tissue mass

  13. A Fast lattice-based polynomial digital signature system for m-commerce

    Science.gov (United States)

    Wei, Xinzhou; Leung, Lin; Anshel, Michael

    2003-01-01

    The privacy and data integrity are not guaranteed in current wireless communications due to the security hole inside the Wireless Application Protocol (WAP) version 1.2 gateway. One of the remedies is to provide an end-to-end security in m-commerce by applying application level security on top of current WAP1.2. The traditional security technologies like RSA and ECC applied on enterprise's server are not practical for wireless devices because wireless devices have relatively weak computation power and limited memory compared with server. In this paper, we developed a lattice based polynomial digital signature system based on NTRU's Polynomial Authentication and Signature Scheme (PASS), which enabled the feasibility of applying high-level security on both server and wireless device sides.

  14. Procedure manual: protocol for regulation of petroleum hydrocarbons in water under the special waste and contaminated sites regulation

    International Nuclear Information System (INIS)

    Evans, P.; Partridge, E.

    2002-05-01

    This document details the regulation governing numerical standards for petroleum hydrocarbons in water under the special waste and contaminated sites regulations of British Columbia. Groundwater containing benzene, toluene, ethylbenzene or xylenes in excess of the leachate standards is exempted from the regulatory regime of the Special Waste Regulation. The document contains a description of the conditions that apply to the management of petroleum hydrocarbons in water at contaminated sites. Some definitions are included, followed by an overview of the regulation. The third section deals with authorization and mandatory conditions, while additional requirements that might apply are enumerated in section four. This protocol directly affects the Environmental Management, and the Environmental Protection Regional Operations organizations. 1 tab

  15. Testing of toxicity based methods to develop site specific clean up objectives - phase 1: Toxicity protocol screening and applicability

    International Nuclear Information System (INIS)

    Hamilton, H.; Kerr, D.; Thorne, W.; Taylor, B.; Zadnik, M.; Goudey, S.; Birkholz, D.

    1994-03-01

    A study was conducted to develop a cost-effective and practical protocol for using bio-assay based toxicity assessment methods for remediation of decommissioned oil and gas production, and processing facilities. The objective was to generate site-specific remediation criteria for contaminated sites. Most companies have used the chemical-specific approach which, however, did not meet the ultimate land use goal of agricultural production. The toxicity assessment method described in this study dealt with potential impairment to agricultural crop production and natural ecosystems. Human health concerns were not specifically addressed. It was suggested that chemical-specific methods should be used when human health concerns exist. . Results showed that toxicity tests will more directly identify ecological stress caused by site contamination than chemical-specific remediation criteria, which can be unnecessarily protective. 11 refs., 7 tabs., 6 figs

  16. Preparation of waste analysis plans under the Resource Conservation and Recovery Act (Interim guidance)

    International Nuclear Information System (INIS)

    1993-03-01

    This document is organized to coincide with the suggested structure of the actual Waste Analysis Plans (WAP) discussed in the previous section. The contents of the remaining eleven chapters and appendices that comprise this document are described below: Chapter 2 addresses waste streams, test parameters, and rationale for sampling and analytical method selection; test methods for analyzing parameters; proceduresfor collecting representative samples; and frequency of sample collection and analyses. These are the core WAP requirements. Chapter 3 addresses analysis requirements for waste received from off site. Chapter 4addresses additional requirements for ignitable, reactive, or incompatible wastes. Chapter 5 addresses unit-specific requirements. Chapter 6 addresses special procedures for radioactive mixed waste. Chapter 7 addresses wastes subject to the land disposal restrictions. Chapter 8 addresses QA/QC procedures. Chapter 9 compares the waste analysis requirements of an interim status facility with those of a permitted facility. Chapter 10 describes the petition process required for sampling and analytical procedures to deviate from accepted methods, such as those identified in promulgated regulations. Chapter 11 reviews the process for modification of WAPs as waste type or handling practices change at a RCRA permitted TSDF. Chapter 12 is the list of references that were used in the preparation of this guidance. Appendix A is a sample WAP addressing physical/chemical treatment and container storage. Appendix B is a sample WAP addressing an incinerator and tank systems. Appendix C discusses the relationship of the WAP to other permitting requirements and includes specific examples of how waste analysis is used to comply with certain parts of a RCRA permit. Appendix D contains the exact wording for the notification/certification requirements under theland disposal restrictions

  17. Cleanup protocols when encountering thorium-230 at U.S. DOE Uranium Mill Tailings Remedial Action (UMTRA) Project sites

    International Nuclear Information System (INIS)

    Miller, M.L.; Hylko, J.M.; Cornish, R.E.

    1995-01-01

    The passage of the Uranium Mill Tailings Radiation Control Act (UMTRCA) of 1978, established the regulatory framework, under which the US EPA charged with developing standards for the cleanup and disposal of tailings at 24 designated inactive uranium processing sites located in 10 states. 40 CFR 192.12 requires that the concentration of Ra-226 in land averaged over any area of 100 square meters shall not exceed the background level by more than 5 pCi/g, averaged over the first 15 cm of soil below the surface, 15 pCi/g, averaged over 15-cm-thick layers of soils more than 15 cm below the surface. However, Th-230 is not specifically addressed by the EPA in 40 CFR 192.12, which naturally decays with a half-life of 77,000 years to form Ra-226. Consequently, the cleanup of the initial Ra-226 contamination according to the standards will not necessarily mitigate against the eventual ingrowth of residual Ra-226 with time, due to the radioactive decay of residual Th-230. Therefore, to direct the excavation of residual Th-230, four generic protocols are being used at Uranium Mill Tailings Remedial Action (UMTRA) Project sites, as follows: Determining the allowable remaining concentration of Th-230 in surface and subsurface soils; Encountering Th-230 contamination in the unsaturated subsurface soil; Encountering Th-230 contamination in the saturated zone; and Verification sampling. The four generic protocols, developed in conjunction with the supplemental standards provision, ensure protection of the general public by reducing exposures to levels that are As Low As Reasonably Achievable, while considering practical measures necessary to excavate Th-230 under conditions encountered at the UMTRA Project site

  18. Protocol-based care: the standardisation of decision-making?

    Science.gov (United States)

    Rycroft-Malone, Jo; Fontenla, Marina; Seers, Kate; Bick, Debra

    2009-05-01

    To explore how protocol-based care affects clinical decision-making. In the context of evidence-based practice, protocol-based care is a mechanism for facilitating the standardisation of care and streamlining decision-making through rationalising the information with which to make judgements and ultimately decisions. However, whether protocol-based care does, in the reality of practice, standardise decision-making is unknown. This paper reports on a study that explored the impact of protocol-based care on nurses' decision-making. Theoretically informed by realistic evaluation and the promoting action on research implementation in health services framework, a case study design using ethnographic methods was used. Two sites were purposively sampled; a diabetic and endocrine unit and a cardiac medical unit. Within each site, data collection included observation, postobservation semi-structured interviews with staff and patients, field notes, feedback sessions and document review. Data were inductively and thematically analysed. Decisions made by nurses in both sites were varied according to many different and interacting factors. While several standardised care approaches were available for use, in reality, a variety of information sources informed decision-making. The primary approach to knowledge exchange and acquisition was person-to-person; decision-making was a social activity. Rarely were standardised care approaches obviously referred to; nurses described following a mental flowchart, not necessarily linked to a particular guideline or protocol. When standardised care approaches were used, it was reported that they were used flexibly and particularised. While the logic of protocol-based care is algorithmic, in the reality of clinical practice, other sources of information supported nurses' decision-making process. This has significant implications for the political goal of standardisation. The successful implementation and judicious use of tools such as

  19. A milk protein gene promoter directs the expression of human tissue plasminogen activator cDNA to the mammary gland in transgenic mice

    International Nuclear Information System (INIS)

    Pittius, C.W.; Hennighausen, L.; Lee, E.; Westphal, H.; Nicols, E.; Vitale, J.; Gordon, K.

    1988-01-01

    Whey acidic protein (WAP) is a major whey protein in mouse milk. Its gene is expressed in the lactating mammary gland and is inducible by steroid and peptide hormones. A series of transgenic mice containing a hybrid gene in which human tissue plasminogen activator (tPA) cDNA is under the control of the murine WAP gene promoter had previously been generated. In this study, 21 tissues from lactating and virgin transgenic female mice containing the WAP-tPA hybrid gene were screened for the distribution of murine WAP and human tPA transcripts. Like the endogenous WAP RNA, WAP-tPA RNA was expressed predominantly in mammary gland tissue and appeared to be inducible by lactation. Whereas WAP transcripts were not detected in 22 tissues of virgin mice, low levels of WAP-tPA RNA, which were not modulated during lactation, were found in tongue, kidney, and sublingual gland. These studies demonstrate that the WAP gene promoter can target the expression of a transgene to the mammary gland and that this expression is inducible during lactation

  20. A Site Characterization Protocol for Evaluating the Potential for Triggered or Induced Seismicity Resulting from Wastewater Injection and Hydraulic Fracturing

    Science.gov (United States)

    Walters, R. J.; Zoback, M. D.; Gupta, A.; Baker, J.; Beroza, G. C.

    2014-12-01

    Regulatory and governmental agencies, individual companies and industry groups and others have recently proposed, or are developing, guidelines aimed at reducing the risk associated with earthquakes triggered by waste water injection or hydraulic fracturing. While there are a number of elements common to the guidelines proposed, not surprisingly, there are also some significant differences among them and, in a number of cases, important considerations that are not addressed. The goal of this work is to develop a comprehensive protocol for site characterization based on a rigorous scientific understanding of the responsible processes. Topics addressed will include the geologic setting (emphasizing faults that might be affected), historical seismicity, hydraulic characterization of injection and adjacent intervals, geomechanical characterization to identify potentially active faults, plans for seismic monitoring and reporting, plans for monitoring and reporting injection (pressure, volumes, and rates), other factors contributing to risk (potentially affected population centers, structures, and facilities), and implementing a modified Probabilistic Seismic Hazard Analysis (PSHA). The guidelines will be risk based and adaptable, rather than prescriptive, for a proposed activity and region of interest. They will be goal oriented and will rely, to the degree possible, on established best practice procedures, referring to existing procedures and recommendations. By developing a risk-based site characterization protocol, we hope to contribute to the development of rational and effective measures for reducing the risk posed by activities that potentially trigger earthquakes.

  1. 75 FR 16787 - Environmental Impact Statements and Regulations; Availability of EPA Comments

    Science.gov (United States)

    2010-04-02

    .... EIS No. 20100039, ERP No. F-WAP-K08017-00, ADOPTION--Southwest Intertie Project, Construction and... substation site in the Dry Lake Valley of Las Vegas, NV area to a point near Delta, UT, Permits Approval and...

  2. Ha-ras oncogene expression directed by a milk protein gene promoter: tissue specificity, hormonal regulation, and tumor induction in transgenic mice

    International Nuclear Information System (INIS)

    Andres, A.C.; Schoenenberger, C.A.; Groner, B.; Henninghausen, L.; LeMeur, M.; Gelinger, P.

    1987-01-01

    The activated human Ha-ras oncogene was subjected to the control of the promoter region of the murine whey acidic protein (Wap) gene, which is expressed in mammary epithelial cells in response to lactogenic hormones. The Wap-ras gene was stably introduced into the mouse germ line of five transgenic mice (one male and four females). Wap-ras expression was observed in the mammary glands of lactating females in two lines derived from female founders. The tissue-directed and hormone-dependent Wap expression was conferred on the Ha-ras oncogene. The signals governing Wap expression are located within 2.5 kilobases of 5' flanking sequence. The other two lines derived from female founders did not express the chimeric gene. In the line derived from the male founder the Wap-ras gene is integrated into the Y chromosome. Expression was found in the salivary gland of male animals only. After a long latency, Wap-ras-expressing mice developed tumors. The tumors arose in tissues expressing Wap-ras - i.e., mammary or salivary glands. Compared to the corresponding nonmalignant tissues, Wap-ras expression was enhanced in the tumors

  3. Gamma camera performance: technical assessment protocol

    International Nuclear Information System (INIS)

    Bolster, A.A.; Waddington, W.A.

    1996-01-01

    This protocol addresses the performance assessment of single and dual headed gamma cameras. No attempt is made to assess the performance of any associated computing systems. Evaluations are usually performed on a gamma camera commercially available within the United Kingdom and recently installed at a clinical site. In consultation with the manufacturer, GCAT selects the site and liaises with local staff to arrange a mutually convenient time for assessment. The manufacturer is encouraged to have a representative present during the evaluation. Three to four days are typically required for the evaluation team to perform the necessary measurements. When access time is limited, the team will modify the protocol to test the camera as thoroughly as possible. Data are acquired on the camera's computer system and are subsequently transferred to the independent GCAT computer system for analysis. This transfer from site computer to the independent system is effected via a hardware interface and Interfile data transfer. (author)

  4. Gamma camera performance: technical assessment protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bolster, A.A. [West Glasgow Hospitals NHS Trust, London (United Kingdom). Dept. of Clinical Physics; Waddington, W.A. [University College London Hospitals NHS Trust, London (United Kingdom). Inst. of Nuclear Medicine

    1996-12-31

    This protocol addresses the performance assessment of single and dual headed gamma cameras. No attempt is made to assess the performance of any associated computing systems. Evaluations are usually performed on a gamma camera commercially available within the United Kingdom and recently installed at a clinical site. In consultation with the manufacturer, GCAT selects the site and liaises with local staff to arrange a mutually convenient time for assessment. The manufacturer is encouraged to have a representative present during the evaluation. Three to four days are typically required for the evaluation team to perform the necessary measurements. When access time is limited, the team will modify the protocol to test the camera as thoroughly as possible. Data are acquired on the camera`s computer system and are subsequently transferred to the independent GCAT computer system for analysis. This transfer from site computer to the independent system is effected via a hardware interface and Interfile data transfer. (author).

  5. Shippingport Station Decommissioning Project site release protocol

    International Nuclear Information System (INIS)

    Handy, J.W.

    1988-01-01

    The Richland, Washington field office of the DOE and its Remedial Actions Contractor, GE, took possession of the SSDP site in September 1984. In February of the following year, DOE-HQ issued generic, site independent guidelines taken from existing radiation protection standards. Basic generic dose limits were English equivalents of 1 mSv (100 mrem) per year averaged over the lifetime of any individual member of the general public. Hot spot limits were given. Occupied or habitable structures were limited to 5.2 x 10 -9 C/Kg h (20mR/h). Surface contamination was limited to standards plus average and maximum contact dose rates of 2 microGy (0.2 mrad) per hour and 10 microGy (1 mrad) per hour respectively. In addition, ''all exposures ... were to be limited to levels that (were) as low as reasonably achievable (ALARA).'' Authorized limits higher than these guidelines were allowed under given exceptional circumstances. GE determined the allowable radionuclide concentrations that could remain in soil and included rubble, and not dose the resident farmer to more than 1 mSv (100 mrem) per year. Under more conservative scenarios, however, exposures were controlled for buried, potentially occupationally occupiable, concrete substructures, to souvenir items, or to buried, but potentially exposed, concrete slabs. GE incorporated the scenario's pathways into a document implementing specific site release criteria which cannot be exceeded if the site is to be released unconditionally. 3 refs., 1 fig

  6. Protocol - RPD | LSDB Archive [Life Science Database Archive metadata

    Lifescience Database Archive (English)

    Full Text Available switchLanguage; BLAST Search Image Search Home About Archive Update History Data ...e version) File URL: ftp://ftp.biosciencedbc.jp/archive/rpd/LATEST/rpd_protocol_jp.zip File size: 535 KB Fil...e name: rpd_protocol_en.zip (English version) File URL: ftp://ftp.biosciencedbc.jp/archiv...tabase Database Description Download License Update History of This Database Site Policy | Contact Us Protocol - RPD | LSDB Archive ...

  7. DWPF glass transition temperatures: What they are and why they are important

    International Nuclear Information System (INIS)

    Marra, S.L.; Jantzen, C.M.; Ramsey, A.A.

    1991-01-01

    The Defense Waste Processing Facility (DWPF) at the Savannah River Site will immobilize high-level radioactive liquid waste in borosilicate glass. The glass will be poured into stainless steel canisters for eventual disposal in a geologic repository. The Department of Energy has defined a set of requirements for the DWPF canistered waste form which must be met in order to assure compatibility with, and acceptance by, the repository. These requirements are the Waste Acceptance Preliminary Specifications (WAPS). The WAPS require DWPF to report glass transition temperatures for the projected range of compositions. This information will be used by the repository to establish waste package design limits

  8. An Experimental Performance Measurement of Implemented Wireless Access Point for Interworking Wi-Fi and HSDPA Networks

    Science.gov (United States)

    Byun, Tae-Young

    This paper presents a prototype of WAP(Wireless Access Point) that provides the wireless Internet access anywhere. Implemented WAP can be equipped with various wireless WAN interfaces such as WCDMA and HSDPA. WAP in the IP mechanism has to process connection setup procedure to one wireless WAN. Also, WAP can provide connection management procedures to reconnect interrupted connection automatically. By using WAP, several mobile devices such as netbook, UMPC and smart-phone in a moving vehicle can access to HSDPA network simultaneously. So, it has more convenient for using the WAP when there are needs to access wireless Internet more than two mobile devices in restricted spaces such as car, train and ship.

  9. The Drosophila wings apart gene anchors a novel, evolutionarily conserved pathway of neuromuscular development.

    Science.gov (United States)

    Morriss, Ginny R; Jaramillo, Carmelita T; Mikolajczak, Crystal M; Duong, Sandy; Jaramillo, Maryann S; Cripps, Richard M

    2013-11-01

    wings apart (wap) is a recessive, semilethal gene located on the X chromosome in Drosophila melanogaster, which is required for normal wing-vein patterning. We show that the wap mutation also results in loss of the adult jump muscle. We use complementation mapping and gene-specific RNA interference to localize the wap locus to the proximal X chromosome. We identify the annotated gene CG14614 as the gene affected by the wap mutation, since one wap allele contains a non-sense mutation in CG14614, and a genomic fragment containing only CG14614 rescues the jump-muscle phenotypes of two wap mutant alleles. The wap gene lies centromere-proximal to touch-insensitive larva B and centromere-distal to CG14619, which is tentatively assigned as the gene affected in introverted mutants. In mutant wap animals, founder cell precursors for the jump muscle are specified early in development, but are later lost. Through tissue-specific knockdowns, we demonstrate that wap function is required in both the musculature and the nervous system for normal jump-muscle formation. wap/CG14614 is homologous to vertebrate wdr68, DDB1 and CUL4 associated factor 7, which also are expressed in neuromuscular tissues. Thus, our findings provide insight into mechanisms of neuromuscular development in higher animals and facilitate the understanding of neuromuscular diseases that may result from mis-expression of muscle-specific or neuron-specific genes.

  10. Worry About Caregiving Performance: A Confirmatory Factor Analysis

    Directory of Open Access Journals (Sweden)

    Ruijie Li

    2018-03-01

    Full Text Available Recent studies on the Zarit Burden Interview (ZBI support the existence of a unique factor, worry about caregiving performance (WaP, beyond role and personal strain. Our current study aims to confirm the existence of WaP within the multidimensionality of ZBI and to determine if predictors of WaP differ from the role and personal strain. We performed confirmatory factor analysis (CFA on 466 caregiver-patient dyads to compare between one-factor (total score, two-factor (role/personal strain, three-factor (role/personal strain and WaP, and four-factor models (role strain split into two factors. We conducted linear regression analyses to explore the relationships between different ZBI factors with socio-demographic and disease characteristics, and investigated the stage-dependent differences between WaP with role and personal strain by dyadic relationship. The four-factor structure that incorporated WaP and split role strain into two factors yielded the best fit. Linear regression analyses reveal that different variables significantly predict WaP (adult child caregiver and Neuropsychiatric Inventory Questionnaire (NPI-Q severity from role/personal strain (adult child caregiver, instrumental activities of daily living, and NPI-Q distress. Unlike other factors, WaP was significantly endorsed in early cognitive impairment. Among spouses, WaP remained low across Clinical Dementia Rating (CDR stages until a sharp rise in CDR 3; adult child and sibling caregivers experience a gradual rise throughout the stages. Our results affirm the existence of WaP as a unique factor. Future research should explore the potential of WaP as a possible intervention target to improve self-efficacy in the milder stages of burden.

  11. Evaluation of a biodegradation screening protocol for contaminated soil from manufactured gas plant sites

    International Nuclear Information System (INIS)

    Morgan, D.J.; Battaglia, A.; Smith, J.R.; Middleton, A.C.; Nakles, D.V.; Linz, D.G.

    1991-01-01

    Bioremediation has been demonstrated to be a viable alternative for treating soils contaminated with PAHs. however, given the variability encountered in soils characteristics and contamination level, their susceptibility to biological treatment must be assessed on a case-by-case basis. This paper discusses a new treatability protocol, the GRI Accelerated Treatability Protocol. The mainstay of the protocol, which is designed to quickly provide treatability data for a given contaminated soil is a bioslurry experiment, in which the contaminated soil is continuously stirred and provided with abundant oxygen, nutrients and water, to maximize biological activity and thus contaminant removal. The results of using such protocol on four soils, widely differing in physical characteristics and contamination levels, are compared to the results of traditional pan studies, and an empirical equation, describing the observed soil concentrations as a function of time in both slurry and pans, is presented. Similarities and differences between achievable endpoints and biodegradation rates are discussed, and the applicability of the GRI Accelerated Treatability Protocol to full-scale engineered systems is addressed. Results to date indicate that, for soils with less than 10% fines slurry and pan experiments yield approximately the same endpoint, so that for those soils the GRI Accelerated Treatability Protocol can be used to assess the viability of an unsaturated bioremediation system. For soils with more than 10% fines, the slurry treatment endpoints are better than the pans. For those soils a traditional pan study experiment should be performed to evaluate the potential capabilities of unsaturated bioremediation

  12. Protocol for VOC-Arid ID remediation performance characterization

    International Nuclear Information System (INIS)

    Tegner, B.J.; Hassig, N.L.; Last, G.V.

    1994-09-01

    The Volatile Organic Compound-Arid Integrated Demonstration (VOC-Arid ID) is a technology development program sponsored by the US Department of Energy's Office of Technology Development that is targeted to acquire, develop, demonstrate, and deploy new technologies for the remediation of VOC contaminants in the soils and groundwaters of arid DOE sites. Technologies cannot be adequately evaluated unless sufficient site characterization and technology performance data have been collection and analyzed. The responsibility for identifying these data needs has been placed largely on the Principal Investigators (PIs) developing the remediation technology, who usually are not experts in site characterization or in identification of appropriate sampling, analysis, and monitoring techniques to support the field testing. This document provides a protocol for planning the collection of data before, during, and after a test of a new technology. This generic protocol provides the PIs and project managers with a set of steps to follow. The protocol is based on a data collection planning process called the Data Quality Objectives (DQO) process, which was originally developed by the US Environmental Protection Agency and has been expanded by DOE to support site cleanup decisions. The DQO process focuses on the quality and quantity of data required to make decision. Stakeholders to the decisions must negotiate such key inputs to the process as the decision rules that will be used and the acceptable probabilities of making decision errors

  13. Partial-mouth periodontal examination protocols for the determination of the prevalence and extent of gingival bleeding in adolescents.

    Science.gov (United States)

    Machado, Michely Ediani; Tomazoni, Fernanda; Casarin, Maísa; Ardenghi, Thiago M; Zanatta, Fabricio Batistin

    2017-10-01

    To compare the performance of partial-mouth periodontal examination (PMPE) protocols with different cut-off points to the full-mouth examination (FME) in the assessment of the prevalence and extent of gingival bleeding in adolescents. A cross-sectional study was conducted involving 12-year-old adolescents. Following a systematic two-stage cluster sampling process, 1134 individuals were evaluated. Different PMPE protocols were compared to the FME with six sites per tooth. Sensitivity, specificity, area under the ROC curve (AUC), intraclass correlation coefficient (ICC), relative and absolute biases and the inflation factor were assessed for each PMPE protocol with different cut-off points for the severity of gingival bleeding. The highest AUC values were found for the six-site two-diagonal quadrant (2-4) (0.97), six-site random half-mouth (0.95) and Community Periodontal Index (0.95) protocols. The assessment of three sites [mesiobuccal (MB), buccal (B) and distolingual (DL)] in two diagonal quadrants and the random half-mouth protocol had higher sensitivity and lower specificity than the same protocols with distobuccal (DB) sites. However, the use of DB sites led to better specificity and improved the balance between sensitivity and specificity, except for the two-diagonal quadrant (1-3) protocol. The ≥1 cut-off point led to the most discrepant results from the FME. Six-site two-diagonal quadrant (2-4) and random half-mouth assessments perform better in the evaluation of gingival bleeding in adolescents. However, when a faster protocol is needed, a two-diagonal quadrant assessment using only MB, B and DL sites can be used with no important loss of information. © 2017 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  14. Quantifying and visualizing site performance in clinical trials

    OpenAIRE

    Eric Yang; Christopher O'Donovan; JodiLyn Phillips; Leone Atkinson; Krishnendu Ghosh; Dimitris K. Agrafiotis

    2018-01-01

    Background: One of the keys to running a successful clinical trial is the selection of high quality clinical sites, i.e., sites that are able to enroll patients quickly, engage them on an ongoing basis to prevent drop-out, and execute the trial in strict accordance to the clinical protocol. Intuitively, the historical track record of a site is one of the strongest predictors of its future performance; however, issues such as data availability and wide differences in protocol complexity can co...

  15. Inter-laboratory variation in DNA damage using a standard comet assay protocol

    DEFF Research Database (Denmark)

    Forchhammer, Lykke; Ersson, Clara; Loft, Steffen

    2012-01-01

    determined the baseline level of DNA strand breaks (SBs)/alkaline labile sites and formamidopyrimidine DNA glycosylase (FPG)-sensitive sites in coded samples of mononuclear blood cells (MNBCs) from healthy volunteers. There were technical problems in seven laboratories in adopting the standard protocol...... analysed by the standard protocol. The SBs and FPG-sensitive sites were measured in the same experiment, indicating that the large spread in the latter lesions was the main reason for the reduced inter-laboratory variation. However, it remains worrying that half of the participating laboratories obtained...

  16. Delivering 3D advertising to mobile phones.

    OpenAIRE

    Chehimi, Fadi; Coulton, Paul; Edwards, Reuben

    2006-01-01

    Directing advertising to mobile phones currently is limited to commercial text messages, short-code text-back messages, two dimensional (2D) images, or wireless access protocol (WAP) clickable push links. All of these traditional methods do not facilitate advertising approach were consumers can interact with prospective purchases. In this paper we introduce a novel and highly interactive location- and permission-based advertising system that allows 3D product adverts to be displayed on users'...

  17. Selling Culture: Implementation of e-Commerce and WAP-based Prototypes

    OpenAIRE

    Zafeiri, Konstantina; Gavalas, Damianos; Balla, Aikaterini

    2010-01-01

    Museum stores represent integral parts of the museums that have also a lot to benefit from a successful presence on the web arena. In addition to traditional web sites, carefully designed electronic commerce (e-commerce) sites may increase the potential of museum stores offering possibilities for on-line shopping and other commercial functions. In parallel, the recent convergence of the traditionally separate technologies of the Internet and mobile telephony has brought the concept of 'wirele...

  18. Anthropic reasoning and typicality in multiverse cosmology and string theory

    International Nuclear Information System (INIS)

    Weinstein, Steven

    2006-01-01

    Anthropic arguments in multiverse cosmology and string theory rely on the weak anthropic principle (WAP). We show that the principle is fundamentally ambiguous. It can be formulated in one of two ways, which we refer to as WAP 1 and WAP 2 . We show that WAP 2 , the version most commonly used in anthropic reasoning, makes no physical predictions unless supplemented by a further assumption of 'typicality', and we argue that this assumption is both misguided and unjustified. WAP 1 , however, requires no such supplementation; it directly implies that any theory that assigns a non-zero probability to our universe predicts that we will observe our universe with probability one. We argue, therefore, that WAP 1 is preferable, and note that it has the benefit of avoiding the inductive overreach characteristic of much anthropic reasoning

  19. Establishment, Growth and Biomass yield of three Grass species on a degraded Ultisol and their effect on soil loss.

    Directory of Open Access Journals (Sweden)

    2016-11-01

    Full Text Available Erosion is a cause for concern; this is because of its effects on the soil used for both agricultural and non-agricultural purposes. Experiments were carried out to check the establishment, growth and biomass field of 3 tropical plants and their effects on soil loss during 2007 planting season. The treatments comprised 3 grasses viz. Azonopus compressus. Panicum maximum and Andropogon gayanus. The grasses were laid our in the field using a randomized complete block design replicated 4 times. Bare soil was used as the control. The parameters tested were plant height, leaf area index, root density, root establishment and the amount of soil loss using erosion pins. The result showed that Andropogon gayanus has an edge over Panicum maximum and Axonopus compressus with reference to plant height, root establishment, root density and leaf area index. Andropogon gayanus had a higher plant height from 3,6,9 and 12WAP with plant heights of 3.30cm, 3.63cm,3.93cm and 4.30cm representing 15.7%, 19.3% and 28.8% respectively. It was followed by P. maximum while A. compressus maintained the lowest plant height from 3,6,9 and 12 WAP with plant height of 2.83cm, 3.05cm, 3.20cm and 3.45cm respectively. In terms of root density, A. compressus did not have much root density which was 0.02t/ha, also at 12WAP, P. maximum did not have much root density which was 0.06t/ha though it was higher than A. compressus. The trend was the same for A. gayanus whose root density was 0.75t/ha. In terms of leaf area index (LAI, it was shown that at 3WAP and 6WAP, A. compressus had the lowest leaf area index of 58.25 and 65.75 respectively. Also at 9WAP and 12WAP A. compressus had 72.28 and 75.08t/ha respectively. At 3WAP and 6WAP P.maximum had a high leaf area index of 66.60 and 77.25 respectively. A. gayanus at 3WAP and 6WAP had 87.73 gayanus at 3WAP and 6WAP had 87.73 and 90.80 for 9WAP and 12WAP respectively. A. compressus protected the soil, reducing soil loss as a total of 9

  20. Anthropic reasoning and typicality in multiverse cosmology and string theory

    Energy Technology Data Exchange (ETDEWEB)

    Weinstein, Steven [Perimeter Institute for Theoretical Physics, 31 Caroline St, Waterloo, ON N2L 2Y5 (Canada); Department of Philosophy, University of Waterloo, Waterloo, ON N2L 3G1 (Canada); Department of Physics, University of Waterloo, Waterloo, ON N2L 3G1 (Canada)

    2006-06-21

    Anthropic arguments in multiverse cosmology and string theory rely on the weak anthropic principle (WAP). We show that the principle is fundamentally ambiguous. It can be formulated in one of two ways, which we refer to as WAP{sub 1} and WAP{sub 2}. We show that WAP{sub 2}, the version most commonly used in anthropic reasoning, makes no physical predictions unless supplemented by a further assumption of 'typicality', and we argue that this assumption is both misguided and unjustified. WAP{sub 1}, however, requires no such supplementation; it directly implies that any theory that assigns a non-zero probability to our universe predicts that we will observe our universe with probability one. We argue, therefore, that WAP{sub 1} is preferable, and note that it has the benefit of avoiding the inductive overreach characteristic of much anthropic reasoning.

  1. Interim pressure garment therapy (4-6 mmHg) and its effect on donor site healing in burn patients: study protocol for a randomised controlled trial.

    Science.gov (United States)

    Donovan, Michelle L; Muller, Michael J; Simpson, Claire; Rudd, Michael; Paratz, Jennifer

    2016-04-26

    Pressure garment therapy (PGT) is well accepted and commonly used by clinicians in the treatment of burns scars and grafts. The medium to high pressures (24-40 mmHg) in these garments can support scar minimisation, and evidence is well documented for this particular application. However, PGT specifically for burn donor sites, of which a sequela is also scarring, is not well documented. This study protocol investigates the impact of a low pressure (4-6 mmHg) interim garment on donor site healing and scarring. With a primary purpose of holding donor dressings in place, the application of the interim pressure garment (IPG) appears to have been twofold. IPGs for donor sites have involved inconsistent application with a focus on securing wound dressing rather than scar management. However, anecdotal and observational evidence suggests that IPGs also make a difference to some patient's scar outcomes for donor sites. This study protocol outlines a randomised controlled trial designed to test the effectiveness of this treatment on reducing scarring to burn donor sites. This study is a single-centre, single (assessor)-blinded, randomised control trial in patients with burns donor sites to their thighs. Patients will be randomly allocated to a control group (with no compression to donor sites) or to an experimental group (with compression to donor sites) as the comparative treatment. Groups will be compared at baseline regarding the important prognostic indicators: donor site location, depth, size, age, and time since graft (5 days). The IPG treatment will be administered post-operatively (on day 5). Follow-up assessments and garment replacement will be undertaken fortnightly for a period of 2 months. This study focuses on a unique area of burns scar management using a low-pressure tubular support garment for the reduction of donor site scars. Such therapy specifically for donor scar management is poorly represented in the literature. This study was designed to test a

  2. Research on mobile electronic commerce security technology based on WPKI

    Science.gov (United States)

    Zhang, Bo

    2013-07-01

    Through the in-depth study on the existing mobile e-commerce and WAP protocols, this paper presents a security solution of e-commerce system based on WPKI, and describes its implementation process and specific implementation details. This solution uniformly distributes the key used by the various participating entities , to fully ensure the confidentiality, authentication, fairness and integrity of mobile e-commerce payments, therefore has some pract ical value for improving the security of e-commerce system.

  3. A secure distributed logistic regression protocol for the detection of rare adverse drug events.

    Science.gov (United States)

    El Emam, Khaled; Samet, Saeed; Arbuckle, Luk; Tamblyn, Robyn; Earle, Craig; Kantarcioglu, Murat

    2013-05-01

    There is limited capacity to assess the comparative risks of medications after they enter the market. For rare adverse events, the pooling of data from multiple sources is necessary to have the power and sufficient population heterogeneity to detect differences in safety and effectiveness in genetic, ethnic and clinically defined subpopulations. However, combining datasets from different data custodians or jurisdictions to perform an analysis on the pooled data creates significant privacy concerns that would need to be addressed. Existing protocols for addressing these concerns can result in reduced analysis accuracy and can allow sensitive information to leak. To develop a secure distributed multi-party computation protocol for logistic regression that provides strong privacy guarantees. We developed a secure distributed logistic regression protocol using a single analysis center with multiple sites providing data. A theoretical security analysis demonstrates that the protocol is robust to plausible collusion attacks and does not allow the parties to gain new information from the data that are exchanged among them. The computational performance and accuracy of the protocol were evaluated on simulated datasets. The computational performance scales linearly as the dataset sizes increase. The addition of sites results in an exponential growth in computation time. However, for up to five sites, the time is still short and would not affect practical applications. The model parameters are the same as the results on pooled raw data analyzed in SAS, demonstrating high model accuracy. The proposed protocol and prototype system would allow the development of logistic regression models in a secure manner without requiring the sharing of personal health information. This can alleviate one of the key barriers to the establishment of large-scale post-marketing surveillance programs. We extended the secure protocol to account for correlations among patients within sites through

  4. Development of a manualized protocol of massage therapy for clinical trials in osteoarthritis

    Directory of Open Access Journals (Sweden)

    Ali Ather

    2012-10-01

    Full Text Available Abstract Background Clinical trial design of manual therapies may be especially challenging as techniques are often individualized and practitioner-dependent. This paper describes our methods in creating a standardized Swedish massage protocol tailored to subjects with osteoarthritis of the knee while respectful of the individualized nature of massage therapy, as well as implementation of this protocol in two randomized clinical trials. Methods The manualization process involved a collaborative process between methodologic and clinical experts, with the explicit goals of creating a reproducible semi-structured protocol for massage therapy, while allowing some latitude for therapists’ clinical judgment and maintaining consistency with a prior pilot study. Results The manualized protocol addressed identical specified body regions with distinct 30- and 60-min protocols, using standard Swedish strokes. Each protocol specifies the time allocated to each body region. The manualized 30- and 60-min protocols were implemented in a dual-site 24-week randomized dose-finding trial in patients with osteoarthritis of the knee, and is currently being implemented in a three-site 52-week efficacy trial of manualized Swedish massage therapy. In the dose-finding study, therapists adhered to the protocols and significant treatment effects were demonstrated. Conclusions The massage protocol was manualized, using standard techniques, and made flexible for individual practitioner and subject needs. The protocol has been applied in two randomized clinical trials. This manualized Swedish massage protocol has real-world utility and can be readily utilized both in the research and clinical settings. Trial registration Clinicaltrials.gov NCT00970008 (18 August 2009

  5. Multi-site Study of Diffusion Metric Variability: Characterizing the Effects of Site, Vendor, Field Strength, and Echo Time using the Histogram Distance

    Science.gov (United States)

    Helmer, K. G.; Chou, M-C.; Preciado, R. I.; Gimi, B.; Rollins, N. K.; Song, A.; Turner, J.; Mori, S.

    2016-01-01

    MRI-based multi-site trials now routinely include some form of diffusion-weighted imaging (DWI) in their protocol. These studies can include data originating from scanners built by different vendors, each with their own set of unique protocol restrictions, including restrictions on the number of available gradient directions, whether an externally-generated list of gradient directions can be used, and restrictions on the echo time (TE). One challenge of multi-site studies is to create a common imaging protocol that will result in a reliable and accurate set of diffusion metrics. The present study describes the effect of site, scanner vendor, field strength, and TE on two common metrics: the first moment of the diffusion tensor field (mean diffusivity, MD), and the fractional anisotropy (FA). We have shown in earlier work that ROI metrics and the mean of MD and FA histograms are not sufficiently sensitive for use in site characterization. Here we use the distance between whole brain histograms of FA and MD to investigate within- and between-site effects. We concluded that the variability of DTI metrics due to site, vendor, field strength, and echo time could influence the results in multi-center trials and that histogram distance is sensitive metrics for each of these variables. PMID:27350723

  6. Multi-site Study of Diffusion Metric Variability: Characterizing the Effects of Site, Vendor, Field Strength, and Echo Time using the Histogram Distance.

    Science.gov (United States)

    Helmer, K G; Chou, M-C; Preciado, R I; Gimi, B; Rollins, N K; Song, A; Turner, J; Mori, S

    2016-02-27

    MRI-based multi-site trials now routinely include some form of diffusion-weighted imaging (DWI) in their protocol. These studies can include data originating from scanners built by different vendors, each with their own set of unique protocol restrictions, including restrictions on the number of available gradient directions, whether an externally-generated list of gradient directions can be used, and restrictions on the echo time (TE). One challenge of multi-site studies is to create a common imaging protocol that will result in a reliable and accurate set of diffusion metrics. The present study describes the effect of site, scanner vendor, field strength, and TE on two common metrics: the first moment of the diffusion tensor field (mean diffusivity, MD), and the fractional anisotropy (FA). We have shown in earlier work that ROI metrics and the mean of MD and FA histograms are not sufficiently sensitive for use in site characterization. Here we use the distance between whole brain histograms of FA and MD to investigate within- and between-site effects. We concluded that the variability of DTI metrics due to site, vendor, field strength, and echo time could influence the results in multi-center trials and that histogram distance is sensitive metrics for each of these variables.

  7. Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols

    International Nuclear Information System (INIS)

    Gerber, Naamit Kurshan; Wexler, Leonard H.; Singer, Samuel; Alektiar, Kaled M.; Keohan, Mary Louise; Shi, Weiji; Zhang, Zhigang; Wolden, Suzanne

    2013-01-01

    Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low risk, 61 (44%) at intermediate risk, and 44 (32%) at high risk. Forty-six percent were treated on or according to a prospective RMS protocol. The 5-year rate of overall survival (OS) was 45% for patients with nonmetastatic disease. The failure rates at 5 years for patients with nonmetastatic disease were 34% for local failure and 42% for distant failure. Among patients with nonmetastatic disease (n=94), significant factors associated with OS were histologic diagnosis, site, risk group, age, and protocol treatment. On multivariate analysis, risk group and protocol treatment were significant after adjustment for age. The 5-year OS was 54% for protocol patients versus 36% for nonprotocol patients. Conclusions: Survival in adult patients with nonmetastatic disease was significantly improved for those treated on RMS protocols, most of which are now open to adults

  8. Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Gerber, Naamit Kurshan [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wexler, Leonard H. [Department of Pediatrics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Singer, Samuel [Department of Surgery, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Alektiar, Kaled M. [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Keohan, Mary Louise [Department of Medicine, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Shi, Weiji; Zhang, Zhigang [Department of Epidemiology and Biostatistics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wolden, Suzanne, E-mail: woldens@mskcc.org [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)

    2013-05-01

    Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low risk, 61 (44%) at intermediate risk, and 44 (32%) at high risk. Forty-six percent were treated on or according to a prospective RMS protocol. The 5-year rate of overall survival (OS) was 45% for patients with nonmetastatic disease. The failure rates at 5 years for patients with nonmetastatic disease were 34% for local failure and 42% for distant failure. Among patients with nonmetastatic disease (n=94), significant factors associated with OS were histologic diagnosis, site, risk group, age, and protocol treatment. On multivariate analysis, risk group and protocol treatment were significant after adjustment for age. The 5-year OS was 54% for protocol patients versus 36% for nonprotocol patients. Conclusions: Survival in adult patients with nonmetastatic disease was significantly improved for those treated on RMS protocols, most of which are now open to adults.

  9. Impaired CK1 delta activity attenuates SV40-induced cellular transformation in vitro and mouse mammary carcinogenesis in vivo.

    Directory of Open Access Journals (Sweden)

    Heidrun Hirner

    Full Text Available Simian virus 40 (SV40 is a powerful tool to study cellular transformation in vitro, as well as tumor development and progression in vivo. Various cellular kinases, among them members of the CK1 family, play an important role in modulating the transforming activity of SV40, including the transforming activity of T-Ag, the major transforming protein of SV40, itself. Here we characterized the effects of mutant CK1δ variants with impaired kinase activity on SV40-induced cell transformation in vitro, and on SV40-induced mammary carcinogenesis in vivo in a transgenic/bi-transgenic mouse model. CK1δ mutants exhibited a reduced kinase activity compared to wtCK1δ in in vitro kinase assays. Molecular modeling studies suggested that mutation N172D, located within the substrate binding region, is mainly responsible for impaired mutCK1δ activity. When stably over-expressed in maximal transformed SV-52 cells, CK1δ mutants induced reversion to a minimal transformed phenotype by dominant-negative interference with endogenous wtCK1δ. To characterize the effects of CK1δ on SV40-induced mammary carcinogenesis, we generated transgenic mice expressing mutant CK1δ under the control of the whey acidic protein (WAP gene promoter, and crossed them with SV40 transgenic WAP-T-antigen (WAP-T mice. Both WAP-T mice as well as WAP-mutCK1δ/WAP-T bi-transgenic mice developed breast cancer. However, tumor incidence was lower and life span was significantly longer in WAP-mutCK1δ/WAP-T bi-transgenic animals. The reduced CK1δ activity did not affect early lesion formation during tumorigenesis, suggesting that impaired CK1δ activity reduces the probability for outgrowth of in situ carcinomas to invasive carcinomas. The different tumorigenic potential of SV40 in WAP-T and WAP-mutCK1δ/WAP-T tumors was also reflected by a significantly different expression of various genes known to be involved in tumor progression, specifically of those involved in wnt-signaling and DNA

  10. Limnological regime shifts caused by climate warming and Lesser Snow Goose population expansion in the western Hudson Bay Lowlands (Manitoba, Canada).

    Science.gov (United States)

    MacDonald, Lauren A; Farquharson, Nicole; Merritt, Gillian; Fooks, Sam; Medeiros, Andrew S; Hall, Roland I; Wolfe, Brent B; Macrae, Merrin L; Sweetman, Jon N

    2015-02-01

    Shallow lakes are dominant features in subarctic and Arctic landscapes and are responsive to multiple stressors, which can lead to rapid changes in limnological regimes with consequences for aquatic resources. We address this theme in the coastal tundra region of Wapusk National Park, western Hudson Bay Lowlands (Canada), where climate has warmed during the past century and the Lesser Snow Goose (LSG; Chen caerulescens caerulescens) population has grown rapidly during the past ∽40 years. Integration of limnological and paleolimnological analyses documents profound responses of productivity, nutrient cycling, and aquatic habitat to warming at three ponds ("WAP 12", "WAP 20", and "WAP 21″), and to LSG disturbance at the two ponds located in an active nesting area (WAP 20, WAP 21). Based on multiparameter analysis of (210)Pb-dated sediment records from all three ponds, a regime shift occurred between 1875 and 1900 CE marked by a transition from low productivity, turbid, and nutrient-poor conditions of the Little Ice Age to conditions of higher productivity, lower nitrogen availability, and the development of benthic biofilm habitat as a result of climate warming. Beginning in the mid-1970s, sediment records from WAP 20 and WAP 21 reveal a second regime shift characterized by accelerated productivity and increased nitrogen availability. Coupled with 3 years of limnological data, results suggest that increased productivity at WAP 20 and WAP 21 led to atmospheric CO2 invasion to meet algal photosynthetic demand. This limnological regime shift is attributed to an increase in the supply of catchment-derived nutrients from the arrival of LSG and their subsequent disturbance to the landscape. Collectively, findings discriminate the consequences of warming and LSG disturbance on tundra ponds from which we identify a suite of sensitive limnological and paleolimnological measures that can be utilized to inform aquatic ecosystem monitoring.

  11. Report on July 2015 Additional Protocol Coordinators Best Practices Workshop

    Energy Technology Data Exchange (ETDEWEB)

    Gitau, Ernest T.N. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Burbank, Roberta L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Finch, Valerie A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-07-31

    After 10 years of implementation experience, the Office of Nonproliferation and Arms Control (NPAC) within the Department of Energy/National Nuclear Security Administration (DOE/NNSA) conducted the Additional Protocol (AP) Coordinators Best Practices Workshop at Oak Ridge National Laboratory from July 29-30, 2015. The goal of this workshop was to identify implementation best practices, lessons learned, and compliance challenges from the various Additional Protocol Coordinators (APCs) at each laboratory in the DOE/NNSA complex and associated sites. The workshop provided the opportunity for participants to share their insights and establish networks that APCs can utilize to continue to discuss challenges (new and old), identify best practices, and enhance communication and coordination for reporting multi-lab research projects during review activities. Workshop participants included DOE/NNSA HQ, laboratory and site APCs, seasoned experts, members of the original implementation outreach team, and Field Element and site security representatives.

  12. WE-E-304-00: Implementing SBRT Protocols

    International Nuclear Information System (INIS)

    2015-01-01

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective even unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation

  13. WE-E-304-00: Implementing SBRT Protocols

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2015-06-15

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective even unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation.

  14. Site Closure Strategy Model for Creosote Site

    International Nuclear Information System (INIS)

    Coll, F.R.; Gray, D.R.

    2009-01-01

    In conjunction with RCRA site corrective action at an active wood preserving facility, a risk-based site closure strategy was developed and incorporated the performance of a dense non-aqueous phase liquid (DNAPL) source recovery remedy, a monitored natural attenuation (MNA) remedy for dissolved phase groundwater, and institutional controls. Innovative creosote DNAPL source recovery has been undertaken at the Site since 1998. Pooled creosote DNAPL is present 90 feet below ground within a transmissive sand and gravel aquifer with a saturated thickness of approximately 80 feet. The creosote DNAPL source is situated on the property boundary of the site and has generated a 1/2 mile off-site dissolved phase plume, creating significant NAPL management and remedial technology verification issues. To date, over 120,000 gallons of creosote DNAPL have been recovered from the subsurface utilizing a modified circulation well technology. A mass discharge flux protocol was developed to serve as a major performance metrics for the continuation of source removal efforts and to support the application of monitored natural attenuation as an associated remedial technology for groundwater. The mass removal success has supported the MNA remedy for dissolved phase groundwater and the associated development of institutional controls. The enacted site management strategy outlines the current and future risk management activities for the Site and represents an appropriate site closure strategy for the Site. (authors)

  15. Application of biodegradation screening protocol to contaminated soils from manufactured gas plant sites

    International Nuclear Information System (INIS)

    Smith, J.R.; Nakles, D.V.; Cushey, M.A.; Morgan, D.J.; Linz, D.G.

    1990-01-01

    Bioremediation (i.e., land treatment) has been demonstrated to be a viable option for treating a variety of soils contamianted with organics. Conventional treatability studies utilize soil microcosm experiments to evaluate the potential for bioremediation of specific contaminated soils. Unfortunately, soil microcosms take from 4- to 6-months to complete and do not fully exploit the current understanding of the bioremediation process. This paper describes a treatability protocol that investigates underlying mechanisms and can be completed in 2- to 3-months. It is believed that soil bioremediation is governed by the sequential processes of contanate desorption from the soil into the aqueous phase and subsequent oxidation by microorganisms. The relative importance of each process depends upon the contaminant and soil. Accordingly, the treatability protocol has three steps. In the first step, tests are performed to determine soil characteristics. In the second step, tests are performed to characterize the desorption of contaminants from the soil. In the third step, the potential for biological oxidaiton is evaluated with a soil-water slurry reactor that maximizes desorption and provides an optimum environment for microbial growth. This paper provides a thorough discussion of the laboratory protocol including the primary theoretical tenets which serve as its basis. Preliminary procedures and results are presented for soils contaminated with manufactured gas plant (MGP) wastes. Particular attention is focused on biodegradation of polynuclear aromatic hydrocarbons (PAHs)

  16. Waste acceptance product specifications for vitrified high-level waste forms

    International Nuclear Information System (INIS)

    Applewhite-Ramsey, A.; Sproull, J.F.

    1994-01-01

    The Department of Energy (DOE) Office of Environmental Restoration and Waste Management (EM) has developed Waste Acceptance Product Specifications (EM-WAPS). The EM-WAPS will be the basis for defining product acceptance criteria compatible with the requirements of the Civilian Radioactive Waste Management System (CRWMS). The relationship between the EM-WAPS and the CRWMS Systems Requirements document (WA-SRD) will be discussed. The impact of the EM-WAPS on the Savannah River Sit (SRS) Defense Waste Processing Facility's (DWPF) Waste Acceptance Program, Waste Qualification Run planning, and startup schedule will also be reported. 14 refs., 2 tabs

  17. Effect of a preoperative decontamination protocol on surgical site infections in patients undergoing elective orthopedic surgery with hardware implantation.

    Science.gov (United States)

    Bebko, Serge P; Green, David M; Awad, Samir S

    2015-05-01

    Surgical site infections (SSIs), commonly caused by methicillin-resistant Staphylococcus aureus (MRSA), are associated with significant morbidity and mortality, specifically when hardware is implanted in the patient. Previously, we have demonstrated that a preoperative decontamination protocol using chlorhexidine gluconate washcloths and intranasal antiseptic ointment is effective in eradicating MRSA in the nose and on the skin of patients. To examine the effect of a decontamination protocol on SSIs in patients undergoing elective orthopedic surgery with hardware implantation. A prospective database of patients undergoing elective orthopedic surgery with hardware implantation at the Michael E. DeBakey Veterans Affairs Medical Center in Houston, Texas, was analyzed from October 1, 2012, to December 31, 2013. Cohort groups before and after the intervention were compared. Starting in May 2013, during their preoperative visit, all of the patients watched an educational video about MRSA decontamination and were given chlorhexidine washcloths and oral rinse and nasal povidone-iodine solution to be used the night before and the morning of scheduled surgery. Thirty-day SSI rates were collected according to the definitions of the Centers for Disease Control and Prevention National Nosocomial Infections Surveillance. Data on demographics, comorbidities such as chronic obstructive pulmonary disease and coronary artery disease, tobacco use, alcohol use, and body mass index were also collected. Univariate analysis was performed between the 2 groups of patients. Multivariate analysis was used to identify independent predictors of SSI. A total of 709 patients were analyzed (344 controls and 365 patients who were decolonized). Both groups were well matched with no significant differences in age, body mass index, sex, or comorbidities. All of the patients (100%) completed the MRSA decontamination protocol. The SSI rate in the intervention group was significantly lower (1.1%; 4 of

  18. Implementation of an Evidence-Based Protocol for Surgical Infection Prophylaxis

    National Research Council Canada - National Science Library

    Savino, John A; Smeland, Jane; Flink, Ellen L; Ruperto, Angelo; Hines, Amanda; Sullivan, Thomas; Galvin, Kerri; Risucci, Donald A

    2005-01-01

    An evidence-based surgical antimicrobial prophylaxis (AMP) protocol was implemented in multiple facilities to determine if compliance led to a decrease in New York State reportable surgical site infections (SSIs...

  19. Study protocol for the Cities Changing Diabetes programme

    DEFF Research Database (Denmark)

    Napier, A David; Nolan, John J; Bagger, Malene

    2017-01-01

    and management are improving, complications remain common, and diabetes is among the leading causes of vision loss, amputation, neuropathy and renal and cardiovascular disease worldwide. We present a research protocol for exploring the drivers of type 2 diabetes and its complications in urban settings through...... the Cities Changing Diabetes (CCD) partnership programme. METHODS AND ANALYSIS: A global study protocol is implemented in eight collaborating CCD partner cities. In each city, academic institutions, municipal representatives and local stakeholders collaborate to set research priorities and plan...... Assessment explores the urban context in vulnerability to type 2 diabetes and identifies social factors and cultural determinants relevant to health, well-being and diabetes. ETHICS AND DISSEMINATION: The protocol steers the collection of primary and secondary data across the study sites. Research ethics...

  20. Advance pre-operative chlorhexidine reduces the incidence of surgical site infections in knee arthroplasty.

    Science.gov (United States)

    Zywiel, Michael G; Daley, Jacqueline A; Delanois, Ronald E; Naziri, Qais; Johnson, Aaron J; Mont, Michael A

    2011-07-01

    Surgical site infections following elective knee arthroplasties occur most commonly as a result of colonisation by the patient's native skin flora. The purpose of this study was to evaluate the incidence of deep surgical site infections in knee arthroplasty patients who used an advance cutaneous disinfection protocol and who were compared to patients who had peri-operative preparation only. All adult reconstruction surgeons at a single institution were approached to voluntarily provide patients with chlorhexidine gluconate-impregnated cloths and a printed sheet instructing their use the night before and morning of surgery. Records for all knee arthroplasties performed between January 2007 and December 2008 were reviewed to determine the incidence of deep incisional and periprosthetic surgical site infections. Overall, the advance pre-operative protocol was used in 136 of 912 total knee arthroplasties (15%). A lower incidence of surgical site infection was found in patients who used the advance cutaneous preparation protocol as compared to patients who used the in-hospital protocol alone. These findings were maintained when patients were stratified by surgical infection risk category. No surgical site infections occurred in the 136 patients who completed the protocol as compared to 21 infections in 711 procedures (3.0%) performed in patients who did not. Patient-directed skin disinfection using chlorhexidine gluconate-impregnated cloths the evening before, and the morning of, elective knee arthroplasty appeared to effectively reduce the incidence of surgical site infection when compared to patients who underwent in-hospital skin preparation only.

  1. Issues on a tritium measurement system's qualification on a dismantling site

    Energy Technology Data Exchange (ETDEWEB)

    Pigeon, Benoit; Met, Frederic [Waste Treatment and Nuclear Safety Service - SASN, Waste and Measurement Laboratory - LDM, CEA/SASN/LDM, DAM, DIF, Bruyeres Le Chatel, F-91297 Arpajon (France)

    2015-07-01

    In order to choose the suitable outlet, final disposal of radioactive package requires good knowledge of radiological characteristics of the waste. As part of a nuclear facility's dismantling within tritium proceeds, {sup 3}H contamination is evaluated by using wipe tests which are measured by liquid scintillation. The industrialist's choice is a triple coincidence to double coincidence ratio (TDCR) method with a dry counting protocol. The initial protocol had been defined to reduce the quantity of radioactive liquid waste and to perform an automatic quenching correction. A based on TDCR method liquid scintillation analyser was installed on the decommissioning site. It had had to be used by operator non specialized in metrology, This poster presents the laboratory's feedback on the use of the TDCR method on a site: - problems encountered about protocol on a decommissioning site - protocol adjustments and their consequences. (authors)

  2. Inter-comparison of NIOSH and IMPROVE protocols for OC and EC determination: implications for inter-protocol data conversion

    Science.gov (United States)

    Wu, Cheng; Huang, X. H. Hilda; Ng, Wai Man; Griffith, Stephen M.; Zhen Yu, Jian

    2016-09-01

    Organic carbon (OC) and elemental carbon (EC) are operationally defined by analytical methods. As a result, OC and EC measurements are protocol dependent, leading to uncertainties in their quantification. In this study, more than 1300 Hong Kong samples were analyzed using both National Institute for Occupational Safety and Health (NIOSH) thermal optical transmittance (TOT) and Interagency Monitoring of Protected Visual Environment (IMPROVE) thermal optical reflectance (TOR) protocols to explore the cause of EC disagreement between the two protocols. EC discrepancy mainly (83 %) arises from a difference in peak inert mode temperature, which determines the allocation of OC4NSH, while the rest (17 %) is attributed to a difference in the optical method (transmittance vs. reflectance) applied for the charring correction. Evidence shows that the magnitude of the EC discrepancy is positively correlated with the intensity of the biomass burning signal, whereby biomass burning increases the fraction of OC4NSH and widens the disagreement in the inter-protocol EC determination. It is also found that the EC discrepancy is positively correlated with the abundance of metal oxide in the samples. Two approaches (M1 and M2) that translate NIOSH TOT OC and EC data into IMPROVE TOR OC and EC data are proposed. M1 uses direct relationship between ECNSH_TOT and ECIMP_TOR for reconstruction: M1 : ECIMP_TOR = a × ECNSH_TOT + b; while M2 deconstructs ECIMP_TOR into several terms based on analysis principles and applies regression only on the unknown terms: M2 : ECIMP_TOR = AECNSH + OC4NSH - (a × PCNSH_TOR + b), where AECNSH, apparent EC by the NIOSH protocol, is the carbon that evolves in the He-O2 analysis stage, OC4NSH is the carbon that evolves at the fourth temperature step of the pure helium analysis stage of NIOSH, and PCNSH_TOR is the pyrolyzed carbon as determined by the NIOSH protocol. The implementation of M1 to all urban site data (without considering seasonal specificity

  3. FY94 site characterization and multilevel well installation at a west Bear Creek Valley research site on the Oak Ridge Reservation

    International Nuclear Information System (INIS)

    Moline, G.R.; Schreiber, M.E.

    1996-03-01

    The goals of this project are to collect data that will assist in determining what constitutes a representative groundwater sample in fractured shale typical of much of the geology underlying the ORR waste disposal sites, and to determine how monitoring-well construction and sampling methods impact the representativeness of the sample. This report details the FY94 field activities at a research site in west Bear Creek Valley on the Oak Ridge Reservation (ORR). These activities funded by the Energy Systems Groundwater Program Office through the Oak Ridge Reservation Hydrologic and Geologic Studies (ORRHAGS) task, focus on developing appropriate sampling protocols for the type of fractured media that underlies many of the ORR waste disposal sites. Currently accepted protocols were developed for porous media and are likely to result in nonrepresentative samples in fractured systems

  4. Clinical benefits after the implementation of a multimodal perioperative protocol in elderly patients.

    Science.gov (United States)

    Aguilar-Nascimento, José Eduardo de; Salomão, Alberto Bicudo; Caporossi, Cervantes; Diniz, Breno Nadaf

    2010-01-01

    Multimodal protocol of perioperative care may enhance recovery after surgery. Based on evidence these new routines of perioperative care changed conventional prescriptions in surgery. To evaluate the results of a multimodal protocol (ACERTO protocol) in elderly patients. Non-randomized historical cohort study was performed at the surgical ward of a tertiary university hospital. One hundred seventeen patients aged 60 and older were submitted to elective abdominal operations under either conventional (n = 42; conventional group, January 2004-June 2005) or a fast-track perioperative protocol named ACERTO (n = 75; ACERTO group, July 2005-December 2007). Main endpoints were preoperative fasting time, postoperative day of re-feeding, volume of intravenous fluids, length of hospital stay and morbidity. The implantation of the ACERTO protocol was followed by a decrease in both preoperative fasting (15 [8-20] vs 4 [2-20] hours, P<0.001) and postoperative day of refeeding (1st [1st-10th] vs 0 [0-5th] PO day; P<0.01), and intravenous fluids (10.7 [2.5-57.5] vs 2.5 [0.5-82] L, P<0.001). The changing of protocols reduced the mean length of hospital stay by 4 days (6[1-43] vs 2[1-97] days; P = 0.002) and surgical site infection rate by 85.7% (19%; 8/42 vs 2.7%; 2/75, P<0.001; relative risk = 1.20; 95% confidence interval = 1.03-1.39). Per-protocol analysis showed that hospital stay in major operations diminished only in patients who completed the protocol (P<0.01). The implementation of multidisciplinary routines of the ACERTO protocol diminished both hospitalization and surgical site infection in elderly patients submitted to abdominal operations.

  5. Protocol: methodology for chromatin immunoprecipitation (ChIP in Chlamydomonas reinhardtii

    Directory of Open Access Journals (Sweden)

    Strenkert Daniela

    2011-11-01

    Full Text Available Abstract We report on a detailed chromatin immunoprecipitation (ChIP protocol for the unicellular green alga Chlamydomonas reinhardtii. The protocol is suitable for the analysis of nucleosome occupancy, histone modifications and transcription factor binding sites at the level of mononucleosomes for targeted and genome-wide studies. We describe the optimization of conditions for crosslinking, chromatin fragmentation and antibody titer determination and provide recommendations and an example for the normalization of ChIP results as determined by real-time PCR.

  6. Declarative Specification of Fault Tolerant Auction Protocols: The English Auction Case Study

    DEFF Research Database (Denmark)

    Dragoni, Nicola; Gaspari, Mauro

    2012-01-01

    Auction mechanisms are nowadays widely used in electronic commerce Web sites for buying and selling items among different users. The increasing importance of auction protocols in the negotiation phase is not limited to online marketplaces. In fact, the wide applicability of auctions as resource‐a...... about the specification of an English Auction protocol which tolerate crashes of bidding agents and we discuss its properties....

  7. Reducing the sampling periods required in protocols for establishing ammonia emissions from pig fattening buildings using measurements and modelling

    NARCIS (Netherlands)

    Mosquera Losada, J.; Ogink, N.W.M.

    2011-01-01

    Ammonia (NH(3)) emission factors for animal housing systems in the Netherlands are based on measurements using standardised measurement protocols. Both the original Green Label (GL) protocol and the newly developed multi-site sampling protocol are based on year-round sampling periods. The objective

  8. Improving biofeedback for the treatment of fecal incontinence in women: implementation of a standardized multi-site manometric biofeedback protocol.

    Science.gov (United States)

    Markland, A D; Jelovsek, J E; Whitehead, W E; Newman, D K; Andy, U U; Dyer, K; Harm-Ernandes, I; Cichowski, S; McCormick, J; Rardin, C; Sutkin, G; Shaffer, A; Meikle, S

    2017-01-01

    Standardized training and clinical protocols using biofeedback for the treatment of fecal incontinence (FI) are important for clinical care. Our primary aims were to develop, implement, and evaluate adherence to a standardized protocol for manometric biofeedback to treat FI. In a Pelvic Floor Disorders Network (PFDN) trial, participants were enrolled from eight PFDN clinical centers across the United States. A team of clinical and equipment experts developed biofeedback software on a novel tablet computer platform for conducting standardized anorectal manometry with separate manometric biofeedback protocols for improving anorectal muscle strength, sensation, and urge resistance. The training protocol also included education on bowel function, anal sphincter exercises, and bowel diary monitoring. Study interventionists completed online training prior to attending a centralized, standardized certification course. For the certification, expert trainers assessed the ability of the interventionists to perform the protocol components for a paid volunteer who acted as a standardized patient. Postcertification, the trainers audited interventionists during trial implementation to improve protocol adherence. Twenty-four interventionists attended the in-person training and certification, including 46% advanced practice registered nurses (11/24), 50% (12/24) physical therapists, and 4% physician assistants (1/24). Trainers performed audio audits for 88% (21/24), representing 84 audited visits. All certified interventionists met or exceeded the prespecified 80% pass rate for the audit process, with an average passing rate of 93%. A biofeedback protocol can be successfully imparted to experienced pelvic floor health care providers from various disciplines. Our process promoted high adherence to a standard protocol and is applicable to many clinical settings. © 2016 John Wiley & Sons Ltd.

  9. Protocols of radiocontaminant air monitoring for inhalation exposure estimates

    International Nuclear Information System (INIS)

    Shinn, J.H.

    1995-09-01

    Monitoring the plutonium and americium particle emissions from soils contaminated during atmospheric nuclear testing or due to accidental releases is important for several reasons. First, it is important to quantify the extent of potential human exposure from inhalation of alpha-emitting particles, which is the major exposure pathway from transuranic radionuclides. Second, the information provided by resuspension monitoring is the basis of criteria that determine the target soil concentrations for management and cleanup of contaminated soil sites. There are other radioactive aerosols, such as the fission products (cesium and strontium) and neutron-activation products (europium isotopes), which may be resuspended and therefore necessary to monitor as well. This Standard Protocol (SP) provides the method used for radiocontaminant air monitoring by the Health and Ecological Assessment Division (formerly Environmental Sciences Division), Lawrence Livermore National Laboratory, as developed and tested at Nevada Test Site (NTS) and in the Marshall Islands. The objective of this SP is to document the applications and methods of monitoring of all the relevant variables. This protocol deals only with measuring air concentrations of radionuclides and total suspended particulates (TSP, or open-quotes dustclose quotes). A separate protocol presents the more difficult measurements required to determine transuranic aerosol emission rates, or open-quotes resuspension rateclose quotes

  10. Antibiotic prophylaxis in orthopedic surgeries: the results of an implemented protocol

    Directory of Open Access Journals (Sweden)

    Raquel Queiroz

    Full Text Available Though the basic principles of antibiotic prophylaxis have been well established, there is still considerable incorrect usage, including how much is prescribed and especially in the duration of treatment, which is generally superior to what is indicated. The adequate use of these drugs contributes towards decreasing the time of internment of the patient, prevents surgical site infection (SSI, decreasing the development of resistant microorganisms, and towards reduced costs for the hospital pharmacy. A protocol for the use of antibiotic prophylaxis in the Orthopedics and Traumatology Service of the Hospital do Servidor Público Estadual de São Paulo was developed. The objectives of the study were to promote rational antibiotic surgical prophylaxis, through the implantation of a protocol for the use of these drugs in a surgical unit, with the direct contribution of a druggist in collaboration with the Infection Control Committee, to evaluate the adhesion of the health team to the protocol during three distinct periods (daily pre-protocol, early post-protocol and late post-protocol and to define the consumption of antimicrobials used, measured as daily defined dose.

  11. Multi-site calibration, validation, and sensitivity analysis of the MIKE SHE Model for a large watershed in northern China

    Directory of Open Access Journals (Sweden)

    S. Wang

    2012-12-01

    Full Text Available Model calibration is essential for hydrologic modeling of large watersheds in a heterogeneous mountain environment. Little guidance is available for model calibration protocols for distributed models that aim at capturing the spatial variability of hydrologic processes. This study used the physically-based distributed hydrologic model, MIKE SHE, to contrast a lumped calibration protocol that used streamflow measured at one single watershed outlet to a multi-site calibration method which employed streamflow measurements at three stations within the large Chaohe River basin in northern China. Simulation results showed that the single-site calibrated model was able to sufficiently simulate the hydrographs for two of the three stations (Nash-Sutcliffe coefficient of 0.65–0.75, and correlation coefficient 0.81–0.87 during the testing period, but the model performed poorly for the third station (Nash-Sutcliffe coefficient only 0.44. Sensitivity analysis suggested that streamflow of upstream area of the watershed was dominated by slow groundwater, whilst streamflow of middle- and down- stream areas by relatively quick interflow. Therefore, a multi-site calibration protocol was deemed necessary. Due to the potential errors and uncertainties with respect to the representation of spatial variability, performance measures from the multi-site calibration protocol slightly decreased for two of the three stations, whereas it was improved greatly for the third station. We concluded that multi-site calibration protocol reached a compromise in term of model performance for the three stations, reasonably representing the hydrographs of all three stations with Nash-Sutcliffe coefficient ranging from 0.59–072. The multi-site calibration protocol applied in the analysis generally has advantages to the single site calibration protocol.

  12. Standard protocol for conducting pre-operational environmental surveillance around nuclear facilities

    International Nuclear Information System (INIS)

    Hegde, A.G.; Verma, P.C.; Rajan, M.P.

    2009-02-01

    This document presents the standard procedures for evaluation of site specific environmental transfer factors around NPP sites. The scope of this document is to provide standard protocol to be followed for conducting pre-operational environmental surveillance around nuclear facilities. Such surveillances have been proposed to be carried out by university professionals under DAE-BRNS projects. This document contains a common methodology in terms of sampling, processing, measurements and analysis of elemental/radionuclides, while keeping the site specific requirements also in place. (author)

  13. Standard protocol for conducting pre-operational environmental surveillance around nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Hegde, A G; Verma, P C; Rajan, M P [Health Safety and Environment Group, Bhabha Atomic Research Centre, Mumbai (India)

    2009-02-15

    This document presents the standard procedures for evaluation of site specific environmental transfer factors around NPP sites. The scope of this document is to provide standard protocol to be followed for conducting pre-operational environmental surveillance around nuclear facilities. Such surveillances have been proposed to be carried out by university professionals under DAE-BRNS projects. This document contains a common methodology in terms of sampling, processing, measurements and analysis of elemental/radionuclides, while keeping the site specific requirements also in place. (author)

  14. Nuclear waste glass product consistency test (PCT), Version 5.0

    International Nuclear Information System (INIS)

    Jantzen, C.M.; Bibler, N.E.; Beam, D.C.; Ramsey, W.G.; Waters, B.J.

    1992-06-01

    Liquid high-level nuclear waste will be immobilized at the Savannah River Site (SRS) by vitrification in borosilicate glass. The glass will be produced in the Defense Waste Processing Facility (DWPF), poured into stainless steel canisters, and eventually disposed of in a geologic repository. In order to comply with the Waste Acceptance Preliminary Specifications (WAPS), the durability of the glass needs to be measured during production to assure its long term stability and radionuclide release properties. A durability test, designated the Produce Consistency Test (PCT), was developed for DWPF glass in order to meet the WAPS requirements. The response of the PCT procedure was based on extensive testing with glasses of widely different compositions. The PCT was determined to be very reproducible, to yield reliable results rapidly, and to be easily performed in shielded cell facilities with radioactive samples. Version 5.0 of the PCT procedure is attached

  15. Three-stage treatment protocol for recalcitrant distal femoral nonunion.

    Science.gov (United States)

    Ma, Ching-Hou; Chiu, Yen-Chun; Tu, Yuan-Kun; Yen, Cheng-Yo; Wu, Chin-Hsien

    2017-04-01

    In this study, we proposed a three-stage treatment protocol for recalcitrant distal femoral nonunion and aimed to analyze the clinical results. We retrospective reviewed 12 consecutive patients with recalcitrant distal femoral nonunion undergoing our three-stage treatment protocol from January 2010 to December 2014 in our institute. The three-stage treatment protocol comprised debridement of the nonunion site, lengthening to eliminate leg length discrepancy, deformity correction, stabilization with a locked plate, filling of the defect with cement spacer for inducing membrane formation, and bone reconstruction using a cancellous bone autograft (Masquelet technique) or free vascularized fibular bone graft. The bone union time, wound complication, lower limbs alignment, amount of lengthening, knee range of motion, and functional outcomes were evaluated. Osseous union with angular deformity lengthening was 5.88 cm (range 3.5-12 cm). Excellent or good outcomes were obtained in 9 patients. Although the current study involved only a small number of patients and the intervention comprised three stages, we believe that such a protocol may be a valuable alternative for the treatment of recalcitrant distal femoral nonunion.

  16. Defining robustness protocols: a method to include and evaluate robustness in clinical plans

    International Nuclear Information System (INIS)

    McGowan, S E; Albertini, F; Lomax, A J; Thomas, S J

    2015-01-01

    We aim to define a site-specific robustness protocol to be used during the clinical plan evaluation process. Plan robustness of 16 skull base IMPT plans to systematic range and random set-up errors have been retrospectively and systematically analysed. This was determined by calculating the error-bar dose distribution (ebDD) for all the plans and by defining some metrics used to define protocols aiding the plan assessment. Additionally, an example of how to clinically use the defined robustness database is given whereby a plan with sub-optimal brainstem robustness was identified. The advantage of using different beam arrangements to improve the plan robustness was analysed. Using the ebDD it was found range errors had a smaller effect on dose distribution than the corresponding set-up error in a single fraction, and that organs at risk were most robust to the range errors, whereas the target was more robust to set-up errors. A database was created to aid planners in terms of plan robustness aims in these volumes. This resulted in the definition of site-specific robustness protocols. The use of robustness constraints allowed for the identification of a specific patient that may have benefited from a treatment of greater individuality. A new beam arrangement showed to be preferential when balancing conformality and robustness for this case. The ebDD and error-bar volume histogram proved effective in analysing plan robustness. The process of retrospective analysis could be used to establish site-specific robustness planning protocols in proton therapy. These protocols allow the planner to determine plans that, although delivering a dosimetrically adequate dose distribution, have resulted in sub-optimal robustness to these uncertainties. For these cases the use of different beam start conditions may improve the plan robustness to set-up and range uncertainties. (paper)

  17. Defining robustness protocols: a method to include and evaluate robustness in clinical plans

    Science.gov (United States)

    McGowan, S. E.; Albertini, F.; Thomas, S. J.; Lomax, A. J.

    2015-04-01

    We aim to define a site-specific robustness protocol to be used during the clinical plan evaluation process. Plan robustness of 16 skull base IMPT plans to systematic range and random set-up errors have been retrospectively and systematically analysed. This was determined by calculating the error-bar dose distribution (ebDD) for all the plans and by defining some metrics used to define protocols aiding the plan assessment. Additionally, an example of how to clinically use the defined robustness database is given whereby a plan with sub-optimal brainstem robustness was identified. The advantage of using different beam arrangements to improve the plan robustness was analysed. Using the ebDD it was found range errors had a smaller effect on dose distribution than the corresponding set-up error in a single fraction, and that organs at risk were most robust to the range errors, whereas the target was more robust to set-up errors. A database was created to aid planners in terms of plan robustness aims in these volumes. This resulted in the definition of site-specific robustness protocols. The use of robustness constraints allowed for the identification of a specific patient that may have benefited from a treatment of greater individuality. A new beam arrangement showed to be preferential when balancing conformality and robustness for this case. The ebDD and error-bar volume histogram proved effective in analysing plan robustness. The process of retrospective analysis could be used to establish site-specific robustness planning protocols in proton therapy. These protocols allow the planner to determine plans that, although delivering a dosimetrically adequate dose distribution, have resulted in sub-optimal robustness to these uncertainties. For these cases the use of different beam start conditions may improve the plan robustness to set-up and range uncertainties.

  18. Testing contamination risk assessment methods for toxic elements from mine waste sites

    Science.gov (United States)

    Abdaal, A.; Jordan, G.; Szilassi, P.; Kiss, J.; Detzky, G.

    2012-04-01

    Major incidents involving mine waste facilities and poor environmental management practices have left a legacy of thousands of contaminated sites like in the historic mining areas in the Carpathian Basin. Associated environmental risks have triggered the development of new EU environmental legislation to prevent and minimize the effects of such incidents. The Mine Waste Directive requires the risk-based inventory of all mine waste sites in Europe by May 2012. In order to address the mining problems a standard risk-based Pre-selection protocol has been developed by the EU Commission. This paper discusses the heavy metal contamination in acid mine drainage (AMD) for risk assessment (RA) along the Source-Pathway-Receptor chain using decision support methods which are intended to aid national and regional organizations in the inventory and assessment of potentially contaminated mine waste sites. Several recognized methods such as the European Environmental Agency (EEA) standard PRAMS model for soil contamination, US EPA-based AIMSS and Irish HMS-IRC models for RA of abandoned sites are reviewed, compared and tested for the mining waste environment. In total 145 ore mine waste sites have been selected for scientific testing using the EU Pre-selection protocol as a case study from Hungary. The proportion of uncertain to certain responses for a site and for the total number of sites may give an insight of specific and overall uncertainty in the data we use. The Pre-selection questions are efficiently linked to a GIS system as database inquiries using digital spatial data to directly generate answers. Key parameters such as distance to the nearest surface and ground water bodies, to settlements and protected areas are calculated and statistically evaluated using STATGRAPHICS® in order to calibrate the RA models. According to our scientific research results, of the 145 sites 11 sites are the most risky having foundation slope >20o, 57 sites are within distance 66 (class VI

  19. Novel Techniques with the Aid of a Staged CBCT Guided Surgical Protocol

    Directory of Open Access Journals (Sweden)

    Evdokia Chasioti

    2015-01-01

    Full Text Available The case report will present some novel techniques for using a “staged” protocol utilizing strategic periodontally involved teeth as transitional abutments in combination with CBCT guided implant surgery. Staging the case prevented premature loading of the grafted sites during the healing phase. A CBCT following a tenting screw guided bone regeneration procedure ensured adequate bone to place an implant fixture. Proper assessment of the CBCT allowed the surgeon to do an osteotome internal sinus lift in an optimum location. The depth of the bone needed for the osteotome sinus floor elevation was planned. The staged appliance allowed these sinus-augmented sites to heal for an extended period of time compared to implants, which were uncovered and loaded at an earlier time frame. The staged protocol and CBCT analysis enabled the immediate implants to be placed in proper alignment to the adjacent fixture. After teeth were extracted, the osseointegrated implants were converted to abutments for the transitional appliance. Finally, the staged protocol allowed for soft tissue enhancement in the implant and pontic areas prior to final insertion of the prosthesis.

  20. Assessing the Potential of Social Networks as a Means for Information Diffusion the Weatherization Experiences (WE) Project.

    Energy Technology Data Exchange (ETDEWEB)

    Rose, Erin M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Hawkins, Beth A. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2015-04-01

    In April 2009, U.S. Department of Energy (DOE) formally tasked Oak Ridge National Laboratory (ORNL) with conducting two impact and process evaluations of DOE’s Weatherization Assistance Program (WAP), known as the retrospective and American Recovery and Reinvestment Act of 2009 (ARRA) period evaluations, respectively. The former focused on WAP Program Year (PY) 2008, which covers the period from April 2008 to June 2009. The latter focused on PY 2010. This report presents in-depth analyses from ORNL’s social network study, the Weatherization Experiences (WE) Project, an exploratory study conducted as part of the ARRA period WAP evaluation. The WE Project explored the potential for WAP recipients and staff to influence energy savings beyond their homes and day jobs. Several studies conducted through ORNL’s evaluation of WAP found that the program has the ability to profoundly impact the lives of the people it serves (Tonn et al. 2014b). Recipients of WAP provided statements ranging from the newfound ability to pay utility bills and prescription medication to reduced emergency department visits for asthma and medical conditions associated with thermal stress. Through this exploratory research project, the stories of hundreds of weatherization recipients and providers were documented. The WE Project was designed to further investigate whether or not shared experiences with weatherization have the power to stimulate home energy saving action within an individual’s social network.

  1. Quantifying and visualizing site performance in clinical trials.

    Science.gov (United States)

    Yang, Eric; O'Donovan, Christopher; Phillips, JodiLyn; Atkinson, Leone; Ghosh, Krishnendu; Agrafiotis, Dimitris K

    2018-03-01

    One of the keys to running a successful clinical trial is the selection of high quality clinical sites, i.e., sites that are able to enroll patients quickly, engage them on an ongoing basis to prevent drop-out, and execute the trial in strict accordance to the clinical protocol. Intuitively, the historical track record of a site is one of the strongest predictors of its future performance; however, issues such as data availability and wide differences in protocol complexity can complicate interpretation. Here, we demonstrate how operational data derived from central laboratory services can provide key insights into the performance of clinical sites and help guide operational planning and site selection for new clinical trials. Our methodology uses the metadata associated with laboratory kit shipments to clinical sites (such as trial and anonymized patient identifiers, investigator names and addresses, sample collection and shipment dates, etc.) to reconstruct the complete schedule of patient visits and derive insights about the operational performance of those sites, including screening, enrollment, and drop-out rates and other quality indicators. This information can be displayed in its raw form or normalized to enable direct comparison of site performance across studies of varied design and complexity. Leveraging Covance's market leadership in central laboratory services, we have assembled a database of operational metrics that spans more than 14,000 protocols, 1400 indications, 230,000 unique investigators, and 23 million patient visits and represents a significant fraction of all clinical trials run globally in the last few years. By analyzing this historical data, we are able to assess and compare the performance of clinical investigators across a wide range of therapeutic areas and study designs. This information can be aggregated across trials and geographies to gain further insights into country and regional trends, sometimes with surprising results. The

  2. Wireless access to a pharmaceutical database: A demonstrator for data driven Wireless Application Prorocol (WAP) applications in medical information processing

    DEFF Research Database (Denmark)

    Hansen, Michael Schacht; Dørup, Jens

    2001-01-01

    script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2......) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. RESULTS: A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol...... service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. CONCLUSIONS: We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further...

  3. Standardized CT protocols and nomenclature: better, but not yet there

    Energy Technology Data Exchange (ETDEWEB)

    Singh, Sarabjeet; Kalra, Mannudeep K. [Harvard Medical School, Department of Radiology, Massachusetts General Hospital, Boston, MA (United States)

    2014-10-15

    Radiation dose associated with CT is an important safety concern in patient care, especially in children. Technical advancements in multidetector-row CT scanner technology offer several advantages for clinical applications; these advancements have considerably increased CT utilization and enhanced the complexity of CT scanning protocols. Furthermore there are several scan manufacturers spearheading these technical advancements, leading to different commercial names causing confusion among the users, especially at imaging sites with scanners from different vendors. Several scientific studies and the National Council on Radiation Protection and Measurements (NCRP) have shown variation in CT radiation doses for same body region and similar scanning protocols. Therefore there is a need for standardization of scanning protocols and nomenclature of scan parameters. The following material reviews the status and challenges in standardization of CT scanning and nomenclature. (orig.)

  4. Effect of Unshaven Hair with Absorbable Sutures and Early Postoperative Shampoo on Cranial Surgery Site Infection.

    Science.gov (United States)

    Oh, Won-Oak; Yeom, Insun; Kim, Dong-Seok; Park, Eun-Kyung; Shim, Kyu-Won

    2018-01-01

    Cranial surgical site infection is a significant cause of morbidity and mortality in hospitals. Preoperative hair shaving for cranial neurosurgical procedures is performed traditionally in an attempt to protect patients against complications from infections at cranial surgical sites. However, preoperative shaving of surgical incision sites using traditional surgical blades without properly washing the head after surgery can cause infections at surgical sites. Therefore, a rapid protocol in which the scalp remains unshaven and absorbable sutures are used for scalp closure with early postoperative shampooing is examined in this study. A retrospective comparative study was conducted from January 2008 to December 2012. A total of 2,641 patients who underwent unshaven cranial surgery with absorbable sutures for scalp closure were enrolled in this study. Data of 1,882 patients who underwent surgery with the traditional protocol from January 2005 to December 2007 were also analyzed for comparison. Of 2,641 patients who underwent cranial surgery with the rapid protocol, all but 2 (0.07%) patients experienced satisfactory wound healing. Of 1,882 patients who underwent cranial surgery with the traditional protocol, 3 patients (0.15%) had infections. Each infection occurred at the superficial incisional surgical site. Unshaven cranial surgery using absorbable sutures for scalp closure with early postoperative shampooing is safe and effective in the cranial neurosurgery setting. This protocol has a positive psychological effect. It can help patients accept neurosurgical procedures and improve their self-image after the operation. © 2017 S. Karger AG, Basel.

  5. Draft no-migration variance petition. Volume 7, Appendices: SUM, SURV, VOC, WAP

    International Nuclear Information System (INIS)

    1995-01-01

    The Department of Energy is responsible for the disposition of transuranic (TRU) waste generated by national defense-related activities. Approximately 2,6 million cubic feet of these waste have been generated and are stored at various facilities across the country. The Waste Isolation Pilot Plant (WIPP), was sited and constructed to meet stringent disposal requirements. In order to permanently dispose of TRU waste, the DOE has elected to petition the US EPA for a variance from the Land Disposal Restrictions of RCRA. This document fulfills the reporting requirements for the petition. This report is volume 7 of the petition which presents details about the waste analysis plan for WIPP. VOC screening methodologies; and a summary of the site characterization studies conducted from 1983 through 1987 at WIPP

  6. Voluntary vs directed siting -- or somewhere in-between?

    Energy Technology Data Exchange (ETDEWEB)

    Peelle, E.B.

    1994-04-01

    Waste siting gridlock in the United States and Canada has led to experimentation with voluntary and hybrid or ``mixed mode`` siting. We review nuclear and hazardous waste voluntary siting (VS) results for selected cases in the U.S, and Canada. Findings indicate that VS is not a panacea, but that current siting efforts are inadequate tests of its potential. We suggest trials of improved VS protocols and more effort on hybrid approaches in which the developer chooses the site but is required to reach agreement on conditions with local stakeholders. Mixed mode siting may be better suited to the US context and its three-tiered governmental system.

  7. Methicillin-Resistant Staphylococcus aureus Infections: A Comprehensive Review and a Plastic Surgeon's Approach to the Occult Sites.

    Science.gov (United States)

    Hunter, Cedric; Rosenfield, Lorne; Silverstein, Elena; Petrou-Zeniou, Panayiota

    2016-08-01

    Up to 20 percent of the general population is persistently colonized with Staphylococcus aureus, and 1 to 3 percent of the population is colonized with community-acquired methicillin-resistant S. aureus. Currently, the knowledge of methicillin-resistant Staphylococcus aureus carriage sites other than the nose, and their effect on surgical site infections in cosmetic surgery, is lacking. A comprehensive literature review using the PubMed database to analyze prevalence, anatomical carrier sites, current screening and decontamination protocols and guidelines, and methicillin-resistant S. aureus in cosmetic surgery was performed. The senior author's (L.R.) methicillin-resistant S. aureus infection experience and prevention protocols were also reviewed. Nasal swabs detect only 50.5 percent of methicillin-resistant S. aureus colonization, and broad screening has noted the presence of methicillin-resistant S. aureus in the ear canal and umbilicus. Decolonization protocols within the orthopedic and cardiothoracic surgery literature have reduced rates of methicillin-resistant S. aureus surgical-site infections. There are no decolonization guidelines for plastic surgeons. Since instituting their decolonization protocol, the authors have had no cases of methicillin-resistant S. aureus infection in nearly 1000 cosmetic surgery procedures. There are very limited, if any, Level I or II data regarding methicillin-resistant S. aureus screening and decolonization. As the sequelae of a surgical-site infection can be disastrous, expert opinions recommend that plastic surgeons vigorously address methicillin-resistant S. aureus colonization and infection. The authors have developed and recommend a simple decolonization protocol that includes treatment of the umbilicus, ear canal, and nares to limit surgical-site infection and improve surgical outcomes.

  8. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  9. Lightweight UDP Pervasive Protocol in Smart Home Environment Based on Labview

    Science.gov (United States)

    Kurniawan, Wijaya; Hannats Hanafi Ichsan, Mochammad; Rizqika Akbar, Sabriansyah; Arwani, Issa

    2017-04-01

    TCP (Transmission Control Protocol) technology in a reliable environment was not a problem, but not in an environment where the entire Smart Home network connected locally. Currently employing pervasive protocols using TCP technology, when data transmission is sent, it would be slower because they have to perform handshaking process in advance and could not broadcast the data. On smart home environment, it does not need large size and complex data transmission between monitoring site and monitoring center required in Smart home strain monitoring system. UDP (User Datagram Protocol) technology is quick and simple on data transmission process. UDP can broadcast messages because the UDP did not require handshaking and with more efficient memory usage. LabVIEW is a programming language software for processing and visualization of data in the field of data acquisition. This paper proposes to examine Pervasive UDP protocol implementations in smart home environment based on LabVIEW. UDP coded in LabVIEW and experiments were performed on a PC and can work properly.

  10. Surveillance of surgical site infection after cholecystectomy using the hospital in Europe link for infection control through surveillance protocol.

    Science.gov (United States)

    Bogdanic, Branko; Bosnjak, Zrinka; Budimir, Ana; Augustin, Goran; Milosevic, Milan; Plecko, Vanda; Kalenic, Smilja; Fiolic, Zlatko; Vanek, Maja

    2013-06-01

    The third most common healthcare-associated infection is surgical site infection (SSI), accounting for 14%-16% of infections. These SSIs are associated with high morbidity, numerous deaths, and greater cost. A prospective study was conducted to assess the incidence of SSI in a single university hospital in Croatia. We used the Hospital in Europe Link for Infection Control through Surveillance (HELICS) protocol for surveillance. The SSIs were classified using the standard definition of the National Nosocomial Infections Surveillance (NNIS) system. The overall incidence of SSI was 1.44%. The incidence of infection in the open cholecystectomy group was 6.06%, whereas in the laparoscopic group, it was only 0.60%. The incidence density of in-hospital SSIs per 1,000 post-operative days was 5.76. Patients who underwent a laparoscopic cholecystectomy were significantly younger (53.65±14.65 vs. 64.42±14.17 years; pconcept for the monitoring of SSI, but in the case of cholecystectomy, additional factors such as antibiotic appropriateness, gallbladder entry, empyema of the gallbladder, and obstructive jaundice must be considered.

  11. A Push-pull Protocol to Reduce Colonization of Bird Nest Boxes by Honey Bees.

    Science.gov (United States)

    Efstathion, Caroline A; Kern, William H

    2016-09-04

    Introduction of the invasive Africanized honey bee (AHB) into the Neotropics is a serious problem for many cavity nesting birds, specifically parrots. These bees select cavities that are suitable nest sites for birds, resulting in competition. The difficulty of removing bees and their defensive behavior makes a prevention protocol necessary. Here, we describe a push-pull integrated pest management protocol to deter bees from inhabiting bird boxes by applying a bird safe insecticide, permethrin, to repel bees from nest boxes, while simultaneously attracting them to pheromone-baited swarm traps. Shown here is an example experiment using Barn Owl nest boxes. This protocol successfully reduced colonization of Barn Owl nest boxes by Africanized honey bees. This protocol is flexible, allowing adjustments to accommodate a wide range of bird species and habitats. This protocol could benefit conservation efforts where AHB are located.

  12. Innate immune defences in the human endometrium

    Directory of Open Access Journals (Sweden)

    Kelly Rodney W

    2003-11-01

    Full Text Available Abstract The human endometrium is an important site of innate immune defence, giving protection against uterine infection. Such protection is critical to successful implantation and pregnancy. Infection is a major cause of preterm birth and can also cause infertility and ectopic pregnancy. Natural anti-microbial peptides are key mediators of the innate immune system. These peptides, between them, have anti-bacterial, anti-fungal and anti-viral activity and are expressed at epithelial surfaces throughout the female genital tract. Two families of natural anti-microbials, the defensins and the whey acidic protein (WAP motif proteins, appear to be prominent in endometrium. The human endometrial epithelium expresses beta-defensins 1–4 and the WAP motif protein, secretory leukocyte protease inhibitor. Each beta-defensin has a different expression profile in relation to the stage of the menstrual cycle, providing potential protection throughout the cycle. Secretory leukocyte protease inhibitor is expressed during the secretory phase of the cycle and has a range of possible roles including anti-protease and anti-microbial activity as well as having effects on epithelial cell growth. The leukocyte populations in the endometrium are also a source of anti-microbial production. Neutrophils are a particularly rich source of alpha-defensins, lactoferrin, lysozyme and the WAP motif protein, elafin. The presence of neutrophils during menstruation will enhance anti-microbial protection at a time when the epithelial barrier is disrupted. Several other anti-microbials including the natural killer cell product, granulysin, are likely to have a role in endometrium. The sequential production of natural anti-microbial peptides by the endometrium throughout the menstrual cycle and at other sites in the female genital tract will offer protection from many pathogens, including those that are sexually transmitted.

  13. Effect of sunn hemp (Crotalaria juncea L.) cutting date and planting density on weed suppression in Georgia, USA.

    Science.gov (United States)

    Morris, J Bradley; Chase, Carlene; Treadwell, Danielle; Koenig, Rosie; Cho, Alyssa; Morales-Payan, Jose Pable; Murphy, Tim; Antonious, George F

    2015-01-01

    A field study was conducted in 2008 and 2009 at the USDA, ARS, Plant Genetic Resources Conservation Unit in Griffin, GA, to investigate weed suppression by sunn hemp (Crotalaria juncea L). The objectives were to (1) evaluate the effects of apical meristem removal (AMR) at three dates [5, 6, and 7 wks after planting (WAP) on May 14, 2008 and May 21, 2009] and (2) assess the impact of seeding rates (11, 28, and 45 kg ha(-1)) on weed biomass reduction. Weed species were identified at 4, 8, and 12 wks after sunn hemp planting. Sunn hemp cutting date had no significant effect on weed suppression in 2008 but significant differences for grass weeds at 4, 8, and 12 WAP and for yellow nutsedge at 8 and 12 WAP did occur when compared to the control in 2009. In comparison to the sunn hemp-free control plot in 2009, all three seeding rates had reduced grass weed dry weights at 4, 8, and 12 WAP. The total mass of yellow nutsedge when grown with sunn hemp was reduced compared to the total mass of yellow nutsedge grown in the weedy check for all seeding rates at 8 and 12 WAP. Lower grass weed biomass was observed by 12 WAP for cutting dates and seeding rates during 2008 and 2009. Sunn hemp cutting date and seeding rate reduced branch numbers in both years. The reduction in sunn hemp seeding rates revealed a decrease in weed populations.

  14. Anthropometric protocols for the construction of new international fetal and newborn growth standards: the INTERGROWTH-21st Project.

    Science.gov (United States)

    Cheikh Ismail, L; Knight, H E; Bhutta, Z; Chumlea, W C

    2013-09-01

    The primary aim of the INTERGROWTH-21(st) Project is to construct new, prescriptive standards describing optimal fetal and preterm postnatal growth. The anthropometric measurements include the head circumference, recumbent length and weight of the infants, and the stature and weight of the parents. In such a large, international, multicentre project, it is critical that all study sites follow standardised protocols to ensure maximal validity of the growth and nutrition indicators used. This paper describes, in detail, the selection of anthropometric personnel, equipment, and measurement and calibration protocols used to construct the new standards. Implementing these protocols at each study site ensures that the anthropometric data are of the highest quality to construct the international standards. © 2013 Royal College of Obstetricians and Gynaecologists.

  15. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  16. 75 FR 74007 - Federal Aquatic Nuisance Species Research Risk Analysis Protocol

    Science.gov (United States)

    2010-11-30

    ... site, http://anstaskforce.gov/documents.php . To obtain a hard copy of the Protocol, see Document... aquatic species that are the target of this risk analysis. Language used in the NANPCA differentiates...: http://anstaskforce.gov/documents.php Write: Susan Pasko, National Oceanic and Atmospheric...

  17. Bill authorizing the approval of the additional protocol to the construction agreement between the French government and the International organization of fusion energy for the joint implementation of the ITER project, and relative to the role of the labour inspection on the ITER international organization site and dealing with occupational health and safety

    International Nuclear Information System (INIS)

    2009-10-01

    The aim of the additional protocol to the construction agreement between the French Government and the ITER Organization is to allow the French labour inspection services to control the good respect of the French occupational health and safety regulation at the project site (Cadarache, Bouches du Rhone) and to play its role of adviser to the persons responsible for the organization. This bill gives permission to the approval of this additional protocol. It allows the labour inspectors to do their job on the ITER site. (J.S.)

  18. Heavy vehicle simulator operations: protocol for instrumentation, data collection and data storage - 2nd draft

    CSIR Research Space (South Africa)

    Jones, DJ

    2002-09-01

    Full Text Available The instrumentation used is discussed under the relevant sections. Keywords: Accelerated pavement testing (APT), Heavy Vehicle Simulator (HVS) Proposals for implementation: Follow protocol in all future HVS testing. Update as required... future HVS testing. The protocol discusses staffing, site selection and establishment, and data collection, analysis and storage. 1.2. Accelerated Pavement Testing Accelerated Pavement Testing (APT) can be described as a controlled application...

  19. The einkorn wheat (Triticum monococcum) mutant, maintained vegetative phase, is caused by a deletion in the VRN1 gene

    International Nuclear Information System (INIS)

    Shitsukawa, N.; Ikari, C.; Shimada, S.; Kitagawa, S.; Sakamoto, K.; Saito, H.; Ryuto, H.; Fukunishi, N.; Abe, T.; Takumi, S.; Nasuda, S.; Murai, K.

    2007-01-01

    The einkorn wheat (Triticum monococcum) mutant, maintained vegetative phase (mvp), was induced by nitrogen ion-beam treatment and was identified by its inability to transit from the vegetative to reproductive phase. In our previous study, we showed that WAP1 (wheat APETALA1) is a key gene in the regulatory pathway that controls phase transition from vegetative to reproductive growth in common wheat. WAP1 is an ortholog of the VRN1 gene that is responsible for vernalization insensitivity in einkorn wheat. The mvp mutation resulted from deletion of the VRN1 coding and promoter regions, demonstrating that WAP1/VRN1 is an indispensable gene for phase transition in wheat. Expression analysis of flowering-related genes in mvp plants indicated that wheat GIGANTIA (GI), CONSTANS (CO) and SUPRESSOR OF OVEREXPRESSION OF CONSTANS 1 (SOC1) genes either act upstream of or in a different pathway to WAP1/VRN1

  20. Early Spring Phytoplankton Dynamics in the Western Antarctic Peninsula

    Science.gov (United States)

    Arrigo, Kevin R.; van Dijken, Gert L.; Alderkamp, Anne-Carlijn; Erickson, Zachary K.; Lewis, Kate M.; Lowry, Kate E.; Joy-Warren, Hannah L.; Middag, Rob; Nash-Arrigo, Janice E.; Selz, Virginia; van de Poll, Willem

    2017-12-01

    The Palmer Long-Term Ecological Research program has sampled waters of the western Antarctic Peninsula (wAP) annually each summer since 1990. However, information about the wAP prior to the peak of the phytoplankton bloom in January is sparse. Here we present results from a spring process cruise that sampled the wAP in the early stages of phytoplankton bloom development in 2014. Sea ice concentrations were high on the shelf relative to nonshelf waters, especially toward the south. Macronutrients were high and nonlimiting to phytoplankton growth in both shelf and nonshelf waters, while dissolved iron concentrations were high only on the shelf. Phytoplankton were in good physiological condition throughout the wAP, although biomass on the shelf was uniformly low, presumably because of heavy sea ice cover. In contrast, an early stage phytoplankton bloom was observed beneath variable sea ice cover just seaward of the shelf break. Chlorophyll a concentrations in the bloom reached 2 mg m-3 within a 100-150 km band between the SBACC and SACCF. The location of the bloom appeared to be controlled by a balance between enhanced vertical mixing at the position of the two fronts and increased stratification due to melting sea ice between them. Unlike summer, when diatoms overwhelmingly dominate the phytoplankton population of the wAP, the haptophyte Phaeocystis antarctica dominated in spring, although diatoms were common. These results suggest that factors controlling phytoplankton abundance and composition change seasonally and may differentially affect phytoplankton populations as environmental conditions within the wAP region continue to change.

  1. Cleanup protocol for 226Ra-contaminated cobbly soil at UMTRA Project sites

    International Nuclear Information System (INIS)

    Gonzales, D.E.; Millard, J.B.; Miller, M.L.; Metzler, D.

    1994-01-01

    The nonuniform distribution of 226Ra and other radiological contamination of cobbly soil encountered on several Uranium Mill Tailings Remedial Action Project sites is presented and discussed, and the concomitant challenges to the intent and implementation of the U.S. Environmental Protection Agency's soil cleanup standards are noted. In response to technical assessments and information presented to the U.S. Nuclear Regulatory Commission by the U.S. Department of Energy, the Nuclear Regulatory Commission has recently resolved the dilemma by concluding that compliance with Environmental Protection Agency soil cleanup standards for cobby soil at Uranium Mill Tailings Remedial Action Project sites would be adequately attained using bulk radionuclide concentrations, instead of requiring that the radionuclide concentration of the finer soil fraction passing a No. 4 mesh sieve met the standards. A Nuclear Regulatory Commission-approved procedure developed for cobbly soil remediation is outlined and discussed. The site-specific implementation of this procedure at Uranium Mill Tailings Remedial Action Project sites containing cobbly soil is estimated to save millions of dollars

  2. Exploring two methods of usability testing: concurrent versus retrospective think-aloud protocols

    NARCIS (Netherlands)

    van den Haak, M.J.; de Jong, Menno D.T.

    2003-01-01

    Think-aloud protocols are commonly used for the usability testing of instructional documents, Web sites and interfaces. This paper addresses the benefits and drawbacks of two think-aloud variations: the traditional concurrent think-aloud method and the less familiar retrospective think-aloud

  3. Exploring Two Methods of Usability Testing : Concurrent versus Retrospective Think-Aloud Protocols

    NARCIS (Netherlands)

    Van den Haak, Maaike J.; De Jong, Menno D. T.

    2003-01-01

    Think-aloud protocols are commonly used for the usability testing of instructional documents, web sites and interfaces. This paper addresses the benefits and drawbacks of two think-aloud variations: the traditional concurrent think-aloud method and the less familiar retrospective think-aloud

  4. Bayesian adaptive survey protocols for resource management

    Science.gov (United States)

    Halstead, Brian J.; Wylie, Glenn D.; Coates, Peter S.; Casazza, Michael L.

    2011-01-01

    Transparency in resource management decisions requires a proper accounting of uncertainty at multiple stages of the decision-making process. As information becomes available, periodic review and updating of resource management protocols reduces uncertainty and improves management decisions. One of the most basic steps to mitigating anthropogenic effects on populations is determining if a population of a species occurs in an area that will be affected by human activity. Species are rarely detected with certainty, however, and falsely declaring a species absent can cause improper conservation decisions or even extirpation of populations. We propose a method to design survey protocols for imperfectly detected species that accounts for multiple sources of uncertainty in the detection process, is capable of quantitatively incorporating expert opinion into the decision-making process, allows periodic updates to the protocol, and permits resource managers to weigh the severity of consequences if the species is falsely declared absent. We developed our method using the giant gartersnake (Thamnophis gigas), a threatened species precinctive to the Central Valley of California, as a case study. Survey date was negatively related to the probability of detecting the giant gartersnake, and water temperature was positively related to the probability of detecting the giant gartersnake at a sampled location. Reporting sampling effort, timing and duration of surveys, and water temperatures would allow resource managers to evaluate the probability that the giant gartersnake occurs at sampled sites where it is not detected. This information would also allow periodic updates and quantitative evaluation of changes to the giant gartersnake survey protocol. Because it naturally allows multiple sources of information and is predicated upon the idea of updating information, Bayesian analysis is well-suited to solving the problem of developing efficient sampling protocols for species of

  5. WE-E-304-02: Implementing SBRT Protocols: A NRG CIRO Perspective

    International Nuclear Information System (INIS)

    Xiao, Y.

    2015-01-01

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective even unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation

  6. WE-E-304-02: Implementing SBRT Protocols: A NRG CIRO Perspective

    Energy Technology Data Exchange (ETDEWEB)

    Xiao, Y. [Thomas Jefferson University, Philadelphia, PA (United States)

    2015-06-15

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective even unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation.

  7. Hazardous Waste Code Determination for First/Second-Stage Sludge Waste Stream (IDCs 001, 002, 800)

    International Nuclear Information System (INIS)

    Arbon, R.E.

    2001-01-01

    This document, Hazardous Waste Code Determination for the First/Second-Stage Sludge Waste Stream, summarizes the efforts performed at the Idaho National Engineering and Environmental Laboratory (INEEL) to make a hazardous waste code determination on Item Description Codes (IDCs) 001, 002, and 800 drums. This characterization effort included a thorough review of acceptable knowledge (AK), physical characterization, waste form sampling, chemical analyses, and headspace gas data. This effort included an assessment of pre-Waste Analysis Plan (WAP) solidified sampling and analysis data (referred to as preliminary data). Seventy-five First/Second-Stage Sludge Drums, provided in Table 1-1, have been subjected to core sampling and analysis using the requirements defined in the Quality Assurance Program Plan (QAPP). Based on WAP defined statistical reduction, of preliminary data, a sample size of five was calculated. That is, five additional drums should be core sampled and analyzed. A total of seven drums were sampled, analyzed, and validated in compliance with the WAP criteria. The pre-WAP data (taken under the QAPP) correlated very well with the WAP compliant drum data. As a result, no additional sampling is required. Based upon the information summarized in this document, an accurate hazardous waste determination has been made for the First/Second-Stage Sludge Waste Stream

  8. Weatherization Works--Summary of Findings from the Retrospective Evaluation of the U.S. DOE's Weatherization Assistance Program

    Energy Technology Data Exchange (ETDEWEB)

    Tonn, Bruce Edward [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Carroll, David [APPRISE, Inc., Princeton, NJ (United States); Pigg, Scott [Energy Center of Wisconsin, Madison, WI (United States); Blasnik, Michael [Blasnik & Associates, Roslindale, MA (United States); Dalhoff, Greg [Dalhoff & Associates, Verona, WI (United States); Berger, Jacqueline [APPRISE, Inc., Princeton, NJ (United States); Rose, Erin M [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Hawkins, Beth A. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Eisenberg, Joel Fred [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Ucar, Ferit [APPRISE, Inc., Princeton, NJ (United States); Bensch, Ingo [Energy Center of Wisconsin, Madison, WI (United States); Cowan, Claire [Energy Center of Wisconsin, Madison, WI (United States)

    2015-10-01

    This report presents a summary of the studies and analyses that compose the retrospective evaluation of the U.S. Department of Energy s low-income Weatherization Assistance Program (WAP). WAP provides grants to Grantees (i.e., states) that then provide grants to Subgrantees (i.e., local weatherization agencies) to weatherize low-income homes. This evaluation focused on the WAP Program Year 2008. The retrospective evaluation produced twenty separate reports, including this summary. Four separate reports address the energy savings, energy cost savings, and cost effectiveness of WAP across four housing types: single family, mobile home, small multifamily, and large multifamily. Other reports address the environmental emissions, macroeconomic, and health and household-related benefits attributable to WAP, and characterize the program, its recipients, and those eligible for the program. Major field studies are also summarized, including a major indoor air quality study and a follow-up ventilation study, an in-depth in-field assessment of weatherization work and quality, and a study that assesses reasons for variations in energy savings across homes. Results of surveys of weatherization staff, occupants, occupants satisfaction with weatherization services provided, and weatherization trainees are summarized. Lastly, this report summarizes a set of fifteen case studies of high-performing and unique local weatherization agencies.

  9. Effect of oil palm sludge on cowpea nodulation and weed control in ...

    African Journals Online (AJOL)

    STORAGESEVER

    2008-08-18

    Aug 18, 2008 ... weed control in the humid forest zone of Nigeria ... tropics, where rainfall is scanty and soils are sandy with ... Impact of oil palm sludge on 3 cultivars of cowpea length or roots at 6 and 8 WAP in wet and dry season. 6 WAP.

  10. Does Infection Site Matter? A Systematic Review of Infection Site Mortality in Sepsis.

    Science.gov (United States)

    Motzkus, Christine A; Luckmann, Roger

    2017-09-01

    Sepsis treatment protocols emphasize source control with empiric antibiotics and fluid resuscitation. Previous reviews have examined the impact of infection site and specific pathogens on mortality from sepsis; however, no recent review has addressed the infection site. This review focuses on the impact of infection site on hospital mortality among patients with sepsis. The PubMed database was searched for articles from 2001 to 2014. Studies were eligible if they included (1) one or more statistical models with hospital mortality as the outcome and considered infection site for inclusion in the model and (2) adult patients with sepsis, severe sepsis, or septic shock. Data abstracted included stage of sepsis, infection site, and raw and adjusted effect estimates. Nineteen studies were included. Infection sites most studied included respiratory (n = 19), abdominal (n = 19), genitourinary (n = 18), and skin and soft tissue infections (n = 11). Several studies found a statistically significant lower mortality risk for genitourinary infections on hospital mortality when compared to respiratory infections. Based on studies included in this review, the impact of infection site in patients with sepsis on hospital mortality could not be reliably estimated. Misclassification among infections and disease states remains a serious possibility in studies on this topic.

  11. A Molecular Toolbox to Engineer Site-Specific DNA Replication Perturbation.

    Science.gov (United States)

    Larsen, Nicolai B; Hickson, Ian D; Mankouri, Hocine W

    2018-01-01

    Site-specific arrest of DNA replication is a useful tool for analyzing cellular responses to DNA replication perturbation. The E. coli Tus-Ter replication barrier can be reconstituted in eukaryotic cells as a system to engineer an unscheduled collision between a replication fork and an "alien" impediment to DNA replication. To further develop this system as a versatile tool, we describe a set of reagents and a detailed protocol that can be used to engineer Tus-Ter barriers into any locus in the budding yeast genome. Because the Tus-Ter complex is a bipartite system with intrinsic DNA replication-blocking activity, the reagents and protocols developed and validated in yeast could also be optimized to engineer site-specific replication fork barriers into other eukaryotic cell types.

  12. A Molecular Toolbox to Engineer Site-Specific DNA Replication Perturbation

    DEFF Research Database (Denmark)

    Larsen, Nicolai B; Hickson, Ian D; Mankouri, Hocine W

    2018-01-01

    " impediment to DNA replication. To further develop this system as a versatile tool, we describe a set of reagents and a detailed protocol that can be used to engineer Tus-Ter barriers into any locus in the budding yeast genome. Because the Tus-Ter complex is a bipartite system with intrinsic DNA replication......Site-specific arrest of DNA replication is a useful tool for analyzing cellular responses to DNA replication perturbation. The E. coli Tus-Ter replication barrier can be reconstituted in eukaryotic cells as a system to engineer an unscheduled collision between a replication fork and an "alien......-blocking activity, the reagents and protocols developed and validated in yeast could also be optimized to engineer site-specific replication fork barriers into other eukaryotic cell types....

  13. Embargo on Lion Hunting Trophies from West Africa: An Effective Measure or a Threat to Lion Conservation?

    Science.gov (United States)

    Bouché, Philippe; Crosmary, William; Kafando, Pierre; Doamba, Benoit; Kidjo, Ferdinand Claude; Vermeulen, Cédric; Chardonnet, Philippe

    2016-01-01

    The W-Arly-Pendjari (WAP) ecosystem, shared among Benin, Burkina Faso and Niger, represents the last lion stronghold of West Africa. To assess the impact of trophy hunting on lion populations in hunting areas of the WAP, we analyzed trends in harvest rates from 1999 to 2014. We also investigated whether the hunting areas with higher initial hunting intensity experienced steeper declines in lion harvest between 1999 and 2014, and whether lion densities in hunting areas were lower than in national parks. Lion harvest rate remained overall constant in the WAP. At initial hunting intensities below 1.5 lions/1000km2, most hunting areas experienced an increase in lion harvest rate, although that increase was of lower magnitude for hunting areas with higher initial hunting intensity. The proportion of hunting areas that experienced a decline in lion harvest rate increased at initial hunting intensities above 1.5 lions/1000km2. In 2014, the lion population of the WAP was estimated with a spoor count at 418 (230-648) adults and sub-adult individuals, comparable to the 311 (123-498) individuals estimated in the previous 2012 spoor survey. We found no significant lion spoor density differences between national parks and hunting areas. Hunting areas with higher mean harvest rates did not have lower lion densities. The ratio of large adult males, females and sub-adults was similar between the national parks and the hunting areas. These results suggested that the lion population was not significantly affected by hunting in the WAP. We concluded that a quota of 1 lion/1000km2 would be sustainable for the WAP. Based on our results, an import embargo on lion trophies from the WAP would not be justified. It could ruin the incentive of local actors to conserve lions in hunting areas, and lead to a drastic reduction of lion range in West Africa.

  14. Site selection for new nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Rizzo, Paul C.; Dubinsky, Melissa; Tastan, Erdem Onur, E-mail: paul.rizzo@rizzoassoc.com, E-mail: melissa.dubinsky@rizzoassoc.com, E-mail: onur.tastan@rizzoassoc.com [RIZZO Associates Inc., Pittsburgh, PA (United States); Miano, Sandra C., E-mail: scm27@psu.edu [Eletrobras Termonuclear S.A. (ELETRONUCLEAR), RJ (Brazil); Pennsylvania State University, Department of Mechanical and Nuclear Engineering, State College, PA (United States)

    2015-07-01

    The current methodology for selecting the most advantageous site(s) for nuclear power plant (NPP) development is based on the latest evolution of protocols originally established in the 1990's by the Electric Power Research Institute (EPRI) and others for programs in the USA, and more recently by the International Atomic Energy Agency (IAEA), among others. The methodology includes protocols that account for lessons learned from both the Gen III projects and the catastrophic event at Fukushima, Japan. In general, the approach requires consideration of Exclusionary or 'fatal flaw' Criteria first, based on safety as well as significant impact to the environment or human health. Sites must meet all of these Exclusionary Criteria to be considered for NPP development. Next, the remaining sites are evaluated for Avoidance Criteria that affect primarily ease of construction and operations, which allow a ranking of sites best suited for NPP development. Finally, Suitability Criteria are applied to the potential sites to better differentiate between closely ranked sites. Generally, final selection of a Preferred and an Alternate Site will require balancing of factors, expert judgment, and client input, as sites being compared will differ in their scores associated with different Avoidance Criteria and Suitability Criteria. RIZZO Associates (RIZZO) offers in this paper a modification to this methodology for selecting the site for NPP development, which accords to the categories of Exclusionary, Avoidance and Suitability Criteria strict definitions which can be considered as Absolute Factors, Critical Factors, and Economic Factors for a more focused approach to site selection. Absolute Factors include all of the safety-related Exclusionary Criteria. Critical Factors are those that are difficult to overcome unless extraordinary mitigation measures are implemented; they have a significant impact on the ability of the project to be successful and may cause the

  15. Site selection for new nuclear power plants

    International Nuclear Information System (INIS)

    Rizzo, Paul C.; Dubinsky, Melissa; Tastan, Erdem Onur; Miano, Sandra C.

    2015-01-01

    The current methodology for selecting the most advantageous site(s) for nuclear power plant (NPP) development is based on the latest evolution of protocols originally established in the 1990's by the Electric Power Research Institute (EPRI) and others for programs in the USA, and more recently by the International Atomic Energy Agency (IAEA), among others. The methodology includes protocols that account for lessons learned from both the Gen III projects and the catastrophic event at Fukushima, Japan. In general, the approach requires consideration of Exclusionary or 'fatal flaw' Criteria first, based on safety as well as significant impact to the environment or human health. Sites must meet all of these Exclusionary Criteria to be considered for NPP development. Next, the remaining sites are evaluated for Avoidance Criteria that affect primarily ease of construction and operations, which allow a ranking of sites best suited for NPP development. Finally, Suitability Criteria are applied to the potential sites to better differentiate between closely ranked sites. Generally, final selection of a Preferred and an Alternate Site will require balancing of factors, expert judgment, and client input, as sites being compared will differ in their scores associated with different Avoidance Criteria and Suitability Criteria. RIZZO Associates (RIZZO) offers in this paper a modification to this methodology for selecting the site for NPP development, which accords to the categories of Exclusionary, Avoidance and Suitability Criteria strict definitions which can be considered as Absolute Factors, Critical Factors, and Economic Factors for a more focused approach to site selection. Absolute Factors include all of the safety-related Exclusionary Criteria. Critical Factors are those that are difficult to overcome unless extraordinary mitigation measures are implemented; they have a significant impact on the ability of the project to be successful and may cause the

  16. Reduction of halo pin site morbidity with a new pin care regimen.

    Science.gov (United States)

    Kazi, Hussain Anthony; de Matas, Marcus; Pillay, Robin

    2013-06-01

    A retrospective analysis of halo device associated morbidity over a 4-year period. To assess the impact of a new pin care regimen on halo pin site related morbidity. Halo orthosis treatment still has a role in cervical spine pathology, despite increasing possibilities of open surgical treatment. Published figures for pin site infection range from 12% to 22% with pin loosening from 7% to 50%. We assessed the outcome of a new pin care regimen on morbidity associated with halo spinal orthoses, using a retrospective cohort study from 2001 to 2004. In the last two years, our pin care regimen was changed. This involved pin site care using chlorhexidene & regular torque checking as part of a standard protocol. Previously, povidone iodine was used as skin preparation in theatre, followed by regular sterile saline cleansing when pin sites became encrusted with blood. There were 37 patients in the series, the median age was 49 (range, 22-83) and 20 patients were male. The overall infection rate prior to the new pin care protocol was 30% (n=6) and after the introduction, it dropped to 5.9% (n=1). This difference was statistically significant (p<0.05). Pin loosening occurred in one patient in the group prior to the formal pin care protocol (3%) and none thereafter. Reduced morbidity from halo use can be achieved with a modified pin cleansing and tightening regimen.

  17. A novel protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery under cardiopulmonary bypass.

    Science.gov (United States)

    Odaka, Mizuho; Minakata, Kenji; Toyokuni, Hideaki; Yamazaki, Kazuhiro; Yonezawa, Atsushi; Sakata, Ryuzo; Matsubara, Kazuo

    2015-08-01

    This study aimed to develop and assess the effectiveness of a protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery. We established a protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery. This novel protocol was assessed by comparing patients undergoing open heart surgery before (control group; n = 30) and after its implementation (protocol group; n = 31) at Kyoto University Hospital between July 2012 and January 2013. Surgical site infections (SSIs) were observed in 4 control group patients (13.3 %), whereas no SSIs were observed in the protocol group patients (P open heart surgery.

  18. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  19. Evaluation of the US Department of Energy Weatherization Innovation Pilot Program (2010-2014)

    Energy Technology Data Exchange (ETDEWEB)

    Tonn, Bruce Edward [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Rose, Erin M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Hawkins, Beth A. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-05-01

    This report contains results from analysis conducted on each of the Weatherization Innovation Pilot Program (WIPP) grants awarded to 16 organizations by the US Department of Energy (DOE) in 2010. The purpose of WIPP was to explore the potential adoptability or replicability of innovative processes or technologies for the enhancement of DOE’s Weatherization Assistance Program (WAP). DOE initiated the WIPP grant to accelerate effective innovations in home energy efficiency and other WAP mission-related goals for income-qualifying households of low socioeconomic status. This study was performed alongside a broader, national evaluation of WAP conducted by Oak Ridge National Laboratory (ORNL) for DOE.

  20. National protocol framework for the inventory and monitoring of bees

    Science.gov (United States)

    Droege, Sam; Engler, Joseph D.; Sellers, Elizabeth A.; Lee O'Brien,

    2016-01-01

    This national protocol framework is a standardized tool for the inventory and monitoring of the approximately 4,200 species of native and non-native bee species that may be found within the National Wildlife Refuge System (NWRS) administered by the U.S. Fish and Wildlife Service (USFWS). However, this protocol framework may also be used by other organizations and individuals to monitor bees in any given habitat or location. Our goal is to provide USFWS stations within the NWRS (NWRS stations are land units managed by the USFWS such as national wildlife refuges, national fish hatcheries, wetland management districts, conservation areas, leased lands, etc.) with techniques for developing an initial baseline inventory of what bee species are present on their lands and to provide an inexpensive, simple technique for monitoring bees continuously and for monitoring and evaluating long-term population trends and management impacts. The latter long-term monitoring technique requires a minimal time burden for the individual station, yet can provide a good statistical sample of changing populations that can be investigated at the station, regional, and national levels within the USFWS’ jurisdiction, and compared to other sites within the United States and Canada. This protocol framework was developed in cooperation with the United States Geological Survey (USGS), the USFWS, and a worldwide network of bee researchers who have investigated the techniques and methods for capturing bees and tracking population changes. The protocol framework evolved from field and lab-based investigations at the USGS Bee Inventory and Monitoring Laboratory at the Patuxent Wildlife Research Center in Beltsville, Maryland starting in 2002 and was refined by a large number of USFWS, academic, and state groups. It includes a Protocol Introduction and a set of 8 Standard Operating Procedures or SOPs and adheres to national standards of protocol content and organization. The Protocol Narrative

  1. Waste analysis plan for the low-level burial grounds

    International Nuclear Information System (INIS)

    Barnes, B.M.

    1996-01-01

    This waste analysis plan (WAP) has been prepared for the Low-Level Burial Grounds that are located in the 200 East and 200 West Areas of the Hanford Facility, Richland, Washington. This WAP documents the methods used to characterize and obtain and analyze representative samples of waste managed at this unit

  2. Waste analysis plan for the low-level burial grounds

    Energy Technology Data Exchange (ETDEWEB)

    Haas, C.R.

    1996-09-19

    This waste analysis plan (WAP) has been prepared for the Low-Level Burial Grounds (LLBG) which are located in the 200 East and West Areas of the Hanford Facility, Richland, Washington. This WAP documents the methods used to characterize, and obtain and analyze representative samples of waste managed at this unit.

  3. The intergroup protocols: Scalable group communication for the internet

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo [Univ. of California, Santa Barbara, CA (United States)

    2000-12-04

    Reliable group ordered delivery of multicast messages in a distributed system is a useful service that simplifies the programming of distributed applications. Such a service helps to maintain the consistency of replicated information and to coordinate the activities of the various processes. With the increasing popularity of the Internet, there is an increasing interest in scaling the protocols that provide this service to the environment of the Internet. The InterGroup protocol suite, described in this dissertation, provides such a service, and is intended for the environment of the Internet with scalability to large numbers of nodes and high latency links. The InterGroup protocols approach the scalability problem from various directions. They redefine the meaning of group membership, allow voluntary membership changes, add a receiver-oriented selection of delivery guarantees that permits heterogeneity of the receiver set, and provide a scalable reliability service. The InterGroup system comprises several components, executing at various sites within the system. Each component provides part of the services necessary to implement a group communication system for the wide-area. The components can be categorized as: (1) control hierarchy, (2) reliable multicast, (3) message distribution and delivery, and (4) process group membership. We have implemented a prototype of the InterGroup protocols in Java, and have tested the system performance in both local-area and wide-area networks.

  4. Time-Series Analyses of Transcriptomes and Proteomes Reveal Molecular Networks Underlying Oil Accumulation in Canola.

    Science.gov (United States)

    Wan, Huafang; Cui, Yixin; Ding, Yijuan; Mei, Jiaqin; Dong, Hongli; Zhang, Wenxin; Wu, Shiqi; Liang, Ying; Zhang, Chunyu; Li, Jiana; Xiong, Qing; Qian, Wei

    2016-01-01

    Understanding the regulation of lipid metabolism is vital for genetic engineering of canola ( Brassica napus L.) to increase oil yield or modify oil composition. We conducted time-series analyses of transcriptomes and proteomes to uncover the molecular networks associated with oil accumulation and dynamic changes in these networks in canola. The expression levels of genes and proteins were measured at 2, 4, 6, and 8 weeks after pollination (WAP). Our results show that the biosynthesis of fatty acids is a dominant cellular process from 2 to 6 WAP, while the degradation mainly happens after 6 WAP. We found that genes in almost every node of fatty acid synthesis pathway were significantly up-regulated during oil accumulation. Moreover, significant expression changes of two genes, acetyl-CoA carboxylase and acyl-ACP desaturase, were detected on both transcriptomic and proteomic levels. We confirmed the temporal expression patterns revealed by the transcriptomic analyses using quantitative real-time PCR experiments. The gene set association analysis show that the biosynthesis of fatty acids and unsaturated fatty acids are the most significant biological processes from 2-4 WAP and 4-6 WAP, respectively, which is consistent with the results of time-series analyses. These results not only provide insight into the mechanisms underlying lipid metabolism, but also reveal novel candidate genes that are worth further investigation for their values in the genetic engineering of canola.

  5. Combined Protocol for Acute Malnutrition Study (ComPAS) in rural South Sudan and urban Kenya

    DEFF Research Database (Denmark)

    Bailey, Jeanette; Lelijveld, Natasha; Marron, Bethany

    2018-01-01

    Background: Acute malnutrition is a continuum condition, but severe and moderate forms are treated separately, with different protocols and therapeutic products, managed by separate United Nations agencies. The Combined Protocol for Acute Malnutrition Study (ComPAS) aims to simplify and unify...... the treatment of uncomplicated severe and moderate acute malnutrition (SAM and MAM) for children 6-59 months into one protocol in order to improve the global coverage, quality, continuity of care and cost-effectiveness of acute malnutrition treatment in resource-constrained settings.  Methods/design: This study...... is a multi-site, cluster randomized non-inferiority trial with 12 clusters in Kenya and 12 clusters in South Sudan. Participants are 3600 children aged 6-59 months with uncomplicated acute malnutrition. This study will evaluate the impact of a simplified and combined protocol for the treatment of SAM and MAM...

  6. TU-A-201-02: Treatment Site-Specific Considerations for Clinical IGRT

    Energy Technology Data Exchange (ETDEWEB)

    Wijesooriya, K. [University of Virginia Health Systems (United States)

    2016-06-15

    Recent years have seen a widespread proliferation of available in-room image guidance systems for radiation therapy target localization with many centers having multiple in-room options. In this session, available imaging systems for in-room IGRT will be reviewed highlighting the main differences in workflow efficiency, targeting accuracy and image quality as it relates to target visualization. Decision-making strategies for integrating these tools into clinical image guidance protocols that are tailored to specific disease sites like H&N, lung, pelvis, and spine SBRT will be discussed. Learning Objectives: Major system characteristics of a wide range of available in-room imaging systems for IGRT. Advantages / disadvantages of different systems for site-specific IGRT considerations. Concepts of targeting accuracy and time efficiency in designing clinical imaging protocols.

  7. How do HIV and AIDS impact the use of natural resources by poor rural populations? The case of wild animal products

    Directory of Open Access Journals (Sweden)

    Charles M. Shackleton

    2012-01-01

    Full Text Available As a result of heightened financial and food insecurity, populations adversely affected by HIV and/or AIDS may be more likely to utilise wild natural resources to supplement their diet and livelihoods. Should this effect be pronounced, HIV and AIDS may pose a serious environmental threat. We explored the hypothesis that the presence of factors in the household, such as chronic illness in and recent mortality of individuals in a high HIV-risk age group, as well as the fostering of orphans, are associated with increased utilisation of wild animal products (WAPs at the household level. We randomly surveyed 519 households from four sites in rural South Africa, recording household socio-economic status, the utilisation of wild animal products and health and demographic factors attributed to HIV or AIDS. Binary logistic regressions were used to test if households with markers of HIV and/or AIDS affliction were more likely to have a higher incidence and frequency of WAP utilisation relative to non-afflicted households, after adjusting for socio-economic and demographic variables. We found that, although households with markers of HIV and/or AIDS were generally poorer and had higher dependency ratios, there was no evidence to support the hypothesis that WAP harvesting was associated with either poverty, or markers of HIV and/or AIDS affliction. Our findings suggest that generalisations about a possible interaction between HIV and/or AIDS and the environment may not uniformly apply to all categories of natural resources or to all user groups.

  8. Nuclear waste glass product consistency test (PCT): Version 7.0. Revision 3

    International Nuclear Information System (INIS)

    Jantzen, C.M.; Bibler, N.E.; Beam, D.C.; Ramsey, W.G.

    1994-06-01

    Liquid high-level nuclear waste will be immobilized at the Savannah River Site (SRS) by vitrification in borosilicate glass. The glass will be produced in the Defense Waste Processing Facility (DWPF), poured into stainless steel canisters, and eventually disposed of in a geologic repository. In order to comply with the Waste Acceptance Product Specifications (WAPS), the durability of the glass needs to be measured during production to assure its long term stability and radionuclide release properties. A durability test, designated the Product Consistency Test (PCT), was developed for DWPF glass in order to meet the WAPS requirements. The response of the PCT procedure was based on extensive testing with glasses of widely different compositions. The PCT was determined to be very reproducible, to yield reliable results rapidly, and to be easily performed in shielded cell facilities with radioactive samples. Version 7.0 of the PCT procedure is attached. This draft version has been submitted to ASTM for full committee (C26, Nuclear Fuel Cycle) ballot after being balloted successfully through subcommittee C26.13 on Repository Waste Package Materials Testing

  9. Multi-site study of diffusion metric variability: effects of site, vendor, field strength, and echo time on regions-of-interest and histogram-bin analyses.

    Science.gov (United States)

    Helmer, K G; Chou, M-C; Preciado, R I; Gimi, B; Rollins, N K; Song, A; Turner, J; Mori, S

    2016-02-27

    It is now common for magnetic-resonance-imaging (MRI) based multi-site trials to include diffusion-weighted imaging (DWI) as part of the protocol. It is also common for these sites to possess MR scanners of different manufacturers, different software and hardware, and different software licenses. These differences mean that scanners may not be able to acquire data with the same number of gradient amplitude values and number of available gradient directions. Variability can also occur in achievable b-values and minimum echo times. The challenge of a multi-site study then, is to create a common protocol by understanding and then minimizing the effects of scanner variability and identifying reliable and accurate diffusion metrics. This study describes the effect of site, scanner vendor, field strength, and TE on two diffusion metrics: the first moment of the diffusion tensor field (mean diffusivity, MD), and the fractional anisotropy (FA) using two common analyses (region-of-interest and mean-bin value of whole brain histograms). The goal of the study was to identify sources of variability in diffusion-sensitized imaging and their influence on commonly reported metrics. The results demonstrate that the site, vendor, field strength, and echo time all contribute to variability in FA and MD, though to different extent. We conclude that characterization of the variability of DTI metrics due to site, vendor, field strength, and echo time is a worthwhile step in the construction of multi-center trials.

  10. A markerless protocol for genetic analysis of Aggregatibacter actinomycetemcomitans

    Science.gov (United States)

    Cheng, Ya-An; Jee, Jason; Hsu, Genie; Huang, Yanyan; Chen, Casey; Lin, Chun-Pin

    2015-01-01

    Background/Purpose The genomes of different Aggregatibacter actinomycetemcomitans strains contain many strain-specific genes and genomic islands (defined as DNA found in some but not all strains) of unknown functions. Genetic analysis for the functions of these islands will be constrained by the limited availability of genetic markers and vectors for A. actinomycetemcomitans. In this study we tested a novel genetic approach of gene deletion and restoration in a naturally competent A. actinomycetemcomitans strain D7S-1. Methods Specific genes’ deletion mutants and mutants restored with the deleted genes were constructed by a markerless loxP/Cre system. In mutants with sequential deletion of multiple genes loxP with different spacer regions were used to avoid unwanted recombinations between loxP sites. Results Eight single-gene deletion mutants, four multiple-gene deletion mutants, and two mutants with restored genes were constructed. No unintended non-specific deletion mutants were generated by this protocol. The protocol did not negatively affect the growth and biofilm formation of A. actinomycetemcomitans. Conclusion The protocol described in this study is efficient and specific for genetic manipulation of A. actinomycetemcomitans, and will be amenable for functional analysis of multiple genes in A. actinomycetemcomitans. PMID:24530245

  11. Replication protocol analysis: a method for the study of real-world design thinking

    DEFF Research Database (Denmark)

    Galle, Per; Kovacs, L. B.

    1996-01-01

    Given the brief of an architectural competition on site planning, and the design awarded the first prize, the first author (trained as an architect but not a participant in the competition) produced a line of reasoning that might have led from brief to design. In the paper, such ‘design replication......’ is refined into a method called ‘replication protocol analysis’ (RPA), and discussed from a methodological perspective of design research. It is argued that for the study of real-world design thinking this method offers distinct advantages over traditional ‘design protocol analysis’, which seeks to capture...

  12. Marked phylogeographic structure of Gentoo penguin reveals an ongoing diversification process along the Southern Ocean.

    Science.gov (United States)

    Vianna, Juliana A; Noll, Daly; Dantas, Gisele P M; Petry, Maria Virginia; Barbosa, Andrés; González-Acuña, Daniel; Le Bohec, Céline; Bonadonna, Francesco; Poulin, Elie

    2017-02-01

    Two main hypotheses have been debated about the biogeography of the Southern Ocean: (1) the Antarctic Polar Front (APF), acting as a barrier between Antarctic and sub-Antarctic provinces, and (2) the Antarctic Circumpolar Current (ACC), promoting gene flow among sub-Antarctic areas. The Gentoo penguin is distributed throughout these two provinces, separated by the APF. We analyzed mtDNA (HVR1) and 12 microsatellite loci of 264 Gentoo penguins, Pygoscelis papua, from 12 colonies spanning from the Western Antarctic Peninsula and the South Shetland Islands (WAP) to the sub-Antarctic Islands (SAI). While low genetic structure was detected among WAP colonies (mtDNA Ф ST =0.037-0.133; microsatellite F ST =0.009-0.063), high differentiation was found between all SAI and WAP populations (mtDNA Ф ST =0.678-0.930; microsatellite F ST =0.110-0.290). These results suggest that contemporary dispersal around the Southern Ocean is very limited or absent. As predicted, the APF appears to be a significant biogeographical boundary for Gentoo penguin populations; however, the ACC does not promote connectivity in this species. Our data suggest demographic expansion in the WAP during the last glacial maximum (LGM, about 20kya), but stability in SAI. Phylogenetic analyses showed a deep divergence between populations from the WAP and those from the SAI. Therefore, taxonomy should be further revised. The Crozet Islands resulted as a basal clade (3.57Mya), followed by the Kerguelen Islands (2.32Mya) as well as a more recent divergence between the Falkland/Malvinas Islands and the WAP (1.27Mya). Historical isolation, local adaptation, and past climate scenarios of those Evolutionarily Significant Units may have led to different potentials to respond to climate changes. Copyright © 2016 Elsevier Inc. All rights reserved.

  13. Waste Analysis Plan for the Low-Level Burial Grounds [CANCELLED] Reissued as HNF-5841

    International Nuclear Information System (INIS)

    ELLEFSON, M.D.

    2000-01-01

    Canceled see HNF-5841 Rev 0. This waste analysis plan (WAP) has been prepared for the Low-Level Burial Grounds which are located in the 200 East and West Areas of the Hanford Facility, Richland, Washington. This WAP documents the methods used to characterize, obtain and analyze representative samples of waste managed at this unit

  14. An Intraoperative Site-specific Bone Density Device: A Pilot Test Case.

    Science.gov (United States)

    Arosio, Paolo; Moschioni, Monica; Banfi, Luca Maria; Di Stefano, Anilo Alessio

    2015-08-01

    This paper reports a case of all-on-four rehabilitation where bone density at implant sites was assessed both through preoperative computed tomographic (CT) scans and using a micromotor working as an intraoperative bone density measurement device. Implant-supported rehabilitation is a predictable treatment option for tooth replacement whose success depends on the clinician's experience, the implant characteristics and location and patient-related factors. Among the latter, bone density is a determinant for the achievement of primary implant stability and, eventually, for implant success. The ability to measure bone density at the placement site before implant insertion could be important in the clinical setting. A patient complaining of masticatory impairment was presented with a plan calling for extraction of all her compromised teeth, followed by implant rehabilitation. A week before surgery, she underwent CT examination, and the bone density on the CT scans was measured. When the implant osteotomies were created, the bone density was again measured with a micromotor endowed with an instantaneous torque-measuring system. The implant placement protocols were adapted for each implant, according to the intraoperative measurements, and the patient was rehabilitated following an all-on-four immediate loading protocol. The bone density device provided valuable information beyond that obtained from CT scans, allowing for site-specific, intraoperative assessment of bone density immediately before implant placement and an estimation of primary stability just after implant insertion. Measuring jaw-bone density could help clinicians to select implant-placement protocols and loading strategies based on site-specific bone features.

  15. Replication protocol analysis: a method for the study of real-world design thinking

    DEFF Research Database (Denmark)

    Galle, Per; Kovacs, L. B.

    1996-01-01

    ’ is refined into a method called ‘replication protocol analysis’ (RPA), and discussed from a methodological perspective of design research. It is argued that for the study of real-world design thinking this method offers distinct advantages over traditional ‘design protocol analysis’, which seeks to capture......Given the brief of an architectural competition on site planning, and the design awarded the first prize, the first author (trained as an architect but not a participant in the competition) produced a line of reasoning that might have led from brief to design. In the paper, such ‘design replication...... the designer’s authentic line of reasoning. To illustrate how RPA can be used, the site planning case is briefly presented, and part of the replicated line of reasoning analysed. One result of the analysis is a glimpse of a ‘logic of design’; another is an insight which sheds new light on Darke’s classical...

  16. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  17. Assessing health systems for type 1 diabetes in sub-Saharan Africa: developing a 'Rapid Assessment Protocol for Insulin Access'

    DEFF Research Database (Denmark)

    Beran, David; Yudkin, John S; de Courten, Maximilian

    2006-01-01

    In order to improve the health of people with Type 1 diabetes in developing countries, a clear analysis of the constraints to insulin access and diabetes care is needed. We developed a Rapid Assessment Protocol for Insulin Access, comprising a series of questionnaires as well as a protocol...... for the gathering of other data through site visits, discussions, and document reviews....

  18. Site investigations: Strategy for rock mechanics site descriptive model

    International Nuclear Information System (INIS)

    Andersson, Johan; Christiansson, Rolf; Hudson, John

    2002-05-01

    As a part of the planning work for the Site Investigations, SKB has developed a Rock Mechanics Site Descriptive Modelling Strategy. Similar strategies are being developed for other disciplines. The objective of the strategy is that it should guide the practical implementation of evaluating site specific data during the Site Investigations. It is also understood that further development may be needed. This methodology enables the crystalline rock mass to be characterised in terms of the quality at different sites, for considering rock engineering constructability, and for providing the input to numerical models and performance assessment calculations. The model describes the initial stresses and the distribution of deformation and strength properties of the intact rock, of fractures and fracture zones, and of the rock mass. The rock mass mechanical properties are estimated by empirical relations and by numerical simulations. The methodology is based on estimation of mechanical properties using both empirical and heroretical/numerical approaches; and estimation of in situ rock stress using judgement and numerical modelling, including the influence of fracture zones. These approaches are initially used separately, and then combined to produce the required characterisation estimates. The methodology was evaluated with a Test Case at the Aespoe Hard Rock Laboratory in Sweden. The quality control aspects are an important feature of the methodology: these include Protocols to ensure the structure and coherence of the procedures used, regular meetings to enhance communication, feedback from internal and external reviewing, plus the recording of an audit trail of the development steps and decisions made. The strategy will be reviewed and, if required, updated as appropriate

  19. Site investigations: Strategy for rock mechanics site descriptive model

    Energy Technology Data Exchange (ETDEWEB)

    Andersson, Johan [JA Streamflow AB, Aelvsjoe (Sweden); Christiansson, Rolf [Swedish Nuclear Fuel and Waste Management Co., Stockholm (Sweden); Hudson, John [Rock Engineering Consultants, Welwyn Garden City (United Kingdom)

    2002-05-01

    As a part of the planning work for the Site Investigations, SKB has developed a Rock Mechanics Site Descriptive Modelling Strategy. Similar strategies are being developed for other disciplines. The objective of the strategy is that it should guide the practical implementation of evaluating site specific data during the Site Investigations. It is also understood that further development may be needed. This methodology enables the crystalline rock mass to be characterised in terms of the quality at different sites, for considering rock engineering constructability, and for providing the input to numerical models and performance assessment calculations. The model describes the initial stresses and the distribution of deformation and strength properties of the intact rock, of fractures and fracture zones, and of the rock mass. The rock mass mechanical properties are estimated by empirical relations and by numerical simulations. The methodology is based on estimation of mechanical properties using both empirical and heroretical/numerical approaches; and estimation of in situ rock stress using judgement and numerical modelling, including the influence of fracture zones. These approaches are initially used separately, and then combined to produce the required characterisation estimates. The methodology was evaluated with a Test Case at the Aespoe Hard Rock Laboratory in Sweden. The quality control aspects are an important feature of the methodology: these include Protocols to ensure the structure and coherence of the procedures used, regular meetings to enhance communication, feedback from internal and external reviewing, plus the recording of an audit trail of the development steps and decisions made. The strategy will be reviewed and, if required, updated as appropriate.

  20. Determination of site-specific glycan heterogeneity on glycoproteins

    DEFF Research Database (Denmark)

    Kolarich, Daniel; Jensen, Pia Hønnerup; Altmann, Friedrich

    2012-01-01

    and the determination of site-specific glycan heterogeneity. The described workflow takes approximately 3-5 d, including sample preparation and data analysis. The data obtained from analyzing released glycans of rHuEPO and IgG, described in the second protocol of this series (10.1038/nprot.2012.063), provide...

  1. Big GABA: Edited MR spectroscopy at 24 research sites.

    Science.gov (United States)

    Mikkelsen, Mark; Barker, Peter B; Bhattacharyya, Pallab K; Brix, Maiken K; Buur, Pieter F; Cecil, Kim M; Chan, Kimberly L; Chen, David Y-T; Craven, Alexander R; Cuypers, Koen; Dacko, Michael; Duncan, Niall W; Dydak, Ulrike; Edmondson, David A; Ende, Gabriele; Ersland, Lars; Gao, Fei; Greenhouse, Ian; Harris, Ashley D; He, Naying; Heba, Stefanie; Hoggard, Nigel; Hsu, Tun-Wei; Jansen, Jacobus F A; Kangarlu, Alayar; Lange, Thomas; Lebel, R Marc; Li, Yan; Lin, Chien-Yuan E; Liou, Jy-Kang; Lirng, Jiing-Feng; Liu, Feng; Ma, Ruoyun; Maes, Celine; Moreno-Ortega, Marta; Murray, Scott O; Noah, Sean; Noeske, Ralph; Noseworthy, Michael D; Oeltzschner, Georg; Prisciandaro, James J; Puts, Nicolaas A J; Roberts, Timothy P L; Sack, Markus; Sailasuta, Napapon; Saleh, Muhammad G; Schallmo, Michael-Paul; Simard, Nicholas; Swinnen, Stephan P; Tegenthoff, Martin; Truong, Peter; Wang, Guangbin; Wilkinson, Iain D; Wittsack, Hans-Jörg; Xu, Hongmin; Yan, Fuhua; Zhang, Chencheng; Zipunnikov, Vadim; Zöllner, Helge J; Edden, Richard A E

    2017-10-01

    Magnetic resonance spectroscopy (MRS) is the only biomedical imaging method that can noninvasively detect endogenous signals from the neurotransmitter γ-aminobutyric acid (GABA) in the human brain. Its increasing popularity has been aided by improvements in scanner hardware and acquisition methodology, as well as by broader access to pulse sequences that can selectively detect GABA, in particular J-difference spectral editing sequences. Nevertheless, implementations of GABA-edited MRS remain diverse across research sites, making comparisons between studies challenging. This large-scale multi-vendor, multi-site study seeks to better understand the factors that impact measurement outcomes of GABA-edited MRS. An international consortium of 24 research sites was formed. Data from 272 healthy adults were acquired on scanners from the three major MRI vendors and analyzed using the Gannet processing pipeline. MRS data were acquired in the medial parietal lobe with standard GABA+ and macromolecule- (MM-) suppressed GABA editing. The coefficient of variation across the entire cohort was 12% for GABA+ measurements and 28% for MM-suppressed GABA measurements. A multilevel analysis revealed that most of the variance (72%) in the GABA+ data was accounted for by differences between participants within-site, while site-level differences accounted for comparatively more variance (20%) than vendor-level differences (8%). For MM-suppressed GABA data, the variance was distributed equally between site- (50%) and participant-level (50%) differences. The findings show that GABA+ measurements exhibit strong agreement when implemented with a standard protocol. There is, however, increased variability for MM-suppressed GABA measurements that is attributed in part to differences in site-to-site data acquisition. This study's protocol establishes a framework for future methodological standardization of GABA-edited MRS, while the results provide valuable benchmarks for the MRS community

  2. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  3. Exploring the feasibility of multi-site flow cytometric processing of gut associated lymphoid tissue with centralized data analysis for multi-site clinical trials.

    Directory of Open Access Journals (Sweden)

    Ian McGowan

    Full Text Available The purpose of this study was to determine whether the development of a standardized approach to the collection of intestinal tissue from healthy volunteers, isolation of gut associated lymphoid tissue mucosal mononuclear cells (MMC, and characterization of mucosal T cell phenotypes by flow cytometry was sufficient to minimize differences in the normative ranges of flow parameters generated at two trial sites. Forty healthy male study participants were enrolled in Pittsburgh and Los Angeles. MMC were isolated from rectal biopsies using the same biopsy acquisition and enzymatic digestion protocols. As an additional comparator, peripheral blood mononuclear cells (PBMC were collected from the study participants. For quality control, cryopreserved PBMC from a single donor were supplied to both sites from a central repository (qPBMC. Using a jointly optimized standard operating procedure, cells were isolated from tissue and blood and stained with monoclonal antibodies targeted to T cell phenotypic markers. Site-specific flow data were analyzed by an independent center which analyzed all data from both sites. Ranges for frequencies for overall CD4+ and CD8+ T cells, derived from the qPBMC samples, were equivalent at both UCLA and MWRI. However, there were significant differences across sites for the majority of T cell activation and memory subsets in qPBMC as well as PBMC and MMC. Standardized protocols to collect, stain, and analyze MMC and PBMC, including centralized analysis, can reduce but not exclude variability in reporting flow data within multi-site studies. Based on these data, centralized processing, flow cytometry, and analysis of samples may provide more robust data across multi-site studies. Centralized processing requires either shipping of fresh samples or cryopreservation and the decision to perform centralized versus site processing needs to take into account the drawbacks and restrictions associated with each method.

  4. Exploring the feasibility of multi-site flow cytometric processing of gut associated lymphoid tissue with centralized data analysis for multi-site clinical trials.

    Science.gov (United States)

    McGowan, Ian; Anton, Peter A; Elliott, Julie; Cranston, Ross D; Duffill, Kathryn; Althouse, Andrew D; Hawkins, Kevin L; De Rosa, Stephen C

    2015-01-01

    The purpose of this study was to determine whether the development of a standardized approach to the collection of intestinal tissue from healthy volunteers, isolation of gut associated lymphoid tissue mucosal mononuclear cells (MMC), and characterization of mucosal T cell phenotypes by flow cytometry was sufficient to minimize differences in the normative ranges of flow parameters generated at two trial sites. Forty healthy male study participants were enrolled in Pittsburgh and Los Angeles. MMC were isolated from rectal biopsies using the same biopsy acquisition and enzymatic digestion protocols. As an additional comparator, peripheral blood mononuclear cells (PBMC) were collected from the study participants. For quality control, cryopreserved PBMC from a single donor were supplied to both sites from a central repository (qPBMC). Using a jointly optimized standard operating procedure, cells were isolated from tissue and blood and stained with monoclonal antibodies targeted to T cell phenotypic markers. Site-specific flow data were analyzed by an independent center which analyzed all data from both sites. Ranges for frequencies for overall CD4+ and CD8+ T cells, derived from the qPBMC samples, were equivalent at both UCLA and MWRI. However, there were significant differences across sites for the majority of T cell activation and memory subsets in qPBMC as well as PBMC and MMC. Standardized protocols to collect, stain, and analyze MMC and PBMC, including centralized analysis, can reduce but not exclude variability in reporting flow data within multi-site studies. Based on these data, centralized processing, flow cytometry, and analysis of samples may provide more robust data across multi-site studies. Centralized processing requires either shipping of fresh samples or cryopreservation and the decision to perform centralized versus site processing needs to take into account the drawbacks and restrictions associated with each method.

  5. Mochovce site

    International Nuclear Information System (INIS)

    1997-01-01

    In Mochovce site the construction of four units of WWER 440 NPP with V-213 type of reactor is being carried out. The financing of Mochovce units completion was resolved in April 1996. The completion work commenced at the construction site under leadership of SKODA Prague, the general supplier. The completion work on building part and tests of constructional electric distributions and lightning constructors started. The revisions in technological part were finished, and final protocols from revisions are the basis for starting of completion work. The assembly of transport container anchorage,ventilation system in hermetic areas and hermetic coverage of pools for stored spent nuclear fuel is being carried out. The pre-completion tests of instrumentation and control of ventilation systems, individual dosimetric control in medical station, and tests of nuclear programme according to commissioning and assembling work schedule at the equipment for physical protection of the NPP area started. Inspection activities at Mochovce were performed in accordance with inspection plan for 1996. Evaluation of routine inspections was performed by means of quarterly protocols. Main findings from the inspections performed in Mochovce were in the following areas: (a) deficiencies in the knowledge of the respective regulation and conditions from the Resolution of the state regulatory body, concerning selected employees; (b) training of the selected employees; (c) aim of the measures imposes by inspectors is to eliminate deficiencies in preparation of programmes for pre-completion and completion testing. NRA SR assessment activities at Mochovce NPP were focused mainly on approving and inspecting of design modification to approving programmes for pre-completion and completion testing of system s and equipment and on approving quality assurance programmes. The suggestions of international missions, which reviewed Mochovce safety in the years, were taken into consideration in the programme

  6. The HPA photon protocol and proposed electron protocol

    International Nuclear Information System (INIS)

    Pitchford, W.G.

    1985-01-01

    The Hospital Physicists Association (HPA) photon dosimetry protocol has been produced and was published in 1983. Revised values of some components of Csub(lambda) and refinements introduced into the theory in the last few years have enabled new Csub(lambda) values to be produced. The proposed HPA electron protocol is at present in draft form and will be published shortly. Both protocels are discussed. (Auth.)

  7. Hanford site transuranic waste sampling plan

    International Nuclear Information System (INIS)

    GREAGER, T.M.

    1999-01-01

    This sampling plan (SP) describes the selection of containers for sampling of homogeneous solids and soil/gravel and for visual examination of transuranic and mixed transuranic (collectively referred to as TRU) waste generated at the U.S. Department of Energy (DOE) Hanford Site. The activities described in this SP will be conducted under the Hanford Site TRU Waste Certification Program. This SP is designed to meet the requirements of the Transuranic Waste Characterization Quality Assurance Program Plan (CAO-94-1010) (DOE 1996a) (QAPP), site-specific implementation of which is described in the Hanford Site Transuranic Waste Characterization Program Quality Assurance Project Plan (HNF-2599) (Hanford 1998b) (QAPP). The QAPP defines the quality assurance (QA) requirements and protocols for TRU waste characterization activities at the Hanford Site. In addition, the QAPP identifies responsible organizations, describes required program activities, outlines sampling and analysis strategies, and identifies procedures for characterization activities. The QAPP identifies specific requirements for TRU waste sampling plans. Table 1-1 presents these requirements and indicates sections in this SP where these requirements are addressed

  8. From human monocytes to genome-wide binding sites--a protocol for small amounts of blood: monocyte isolation/ChIP-protocol/library amplification/genome wide computational data analysis.

    Directory of Open Access Journals (Sweden)

    Sebastian Weiterer

    Full Text Available Chromatin immunoprecipitation in combination with a genome-wide analysis via high-throughput sequencing is the state of the art method to gain genome-wide representation of histone modification or transcription factor binding profiles. However, chromatin immunoprecipitation analysis in the context of human experimental samples is limited, especially in the case of blood cells. The typically extremely low yields of precipitated DNA are usually not compatible with library amplification for next generation sequencing. We developed a highly reproducible protocol to present a guideline from the first step of isolating monocytes from a blood sample to analyse the distribution of histone modifications in a genome-wide manner.The protocol describes the whole work flow from isolating monocytes from human blood samples followed by a high-sensitivity and small-scale chromatin immunoprecipitation assay with guidance for generating libraries compatible with next generation sequencing from small amounts of immunoprecipitated DNA.

  9. Evaluation factors for verification and validation of low-level waste disposal site models

    International Nuclear Information System (INIS)

    Moran, M.S.; Mezga, L.J.

    1982-01-01

    The purpose of this paper is to identify general evaluation factors to be used to verify and validate LLW disposal site performance models in order to assess their site-specific applicability and to determine their accuracy and sensitivity. It is intended that the information contained in this paper be employed by model users involved with LLW site performance model verification and validation. It should not be construed as providing protocols, but rather as providing a framework for the preparation of specific protocols or procedures. A brief description of each evaluation factor is provided. The factors have been categorized according to recommended use during either the model verification or the model validation process. The general responsibilities of the developer and user are provided. In many cases it is difficult to separate the responsibilities of the developer and user, but the user is ultimately accountable for both verification and validation processes. 4 refs

  10. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  11. Guideline for environmental site investigations in Manitoba : June 1998

    International Nuclear Information System (INIS)

    1998-06-01

    The procedures for the investigation and characterization of contaminated sites in Manitoba are described in an effort to provide a baseline for developing applicable risk-based remedial action and management plans. This document presents information regarding the methods and protocols for sites where the quality of groundwater, surface water, sediments or soil may have been affected by pollutants as a result of past or present usage of the site. The 1998 document focuses on petroleum impacted sites and also includes the requirements for the investigation of sites potentially impacted by other pollutants. It is based on the principles established by the Canadian Council of Ministers of the Environment for the management of sites in Canada and the requirements of the Manitoba Contaminated Sites Remediation and Consequential Amendments Act. Manitoba's petroleum storage program and the hazardous waste management program, including the disposal or treatment of contaminated soils are also summarized

  12. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  13. Time-dependent recovery of in vivo binding sites after drug dosing: A method for radiotracer evaluation

    International Nuclear Information System (INIS)

    Kilbourn, Michael R.

    1997-01-01

    The recovery of in vivo binding sites for (±)-α-[ 11 C]methoxytetrabenazine, a radioligand for the monoamine vesicular transporter (VMAT2), was determined in mouse brain at various times following a pharmacological dose of tetrabenazine. Concentrations of in vivo radioligand binding sites progressively increased and had reached control values by 8.5 h, and this recovery was consistent with the pharmacokinetics of the competing drug tetrabenazine and its active metabolite, dihydrotetrabenazine. This study demonstrates a simple experimental protocol of using a single dose of a reversible competing drug and time-dependent measurements of in vivo binding of a radioligand. This protocol is suitable for testing the sensitivity of an in vivo radiotracer for measurement of varying concentrations of in vivo binding sites

  14. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  15. Measurement of enzyme-sensitive sites in uv- or. gamma. -irradiated human cells using Micrococcus luteus extracts

    Energy Technology Data Exchange (ETDEWEB)

    Paterson, M C; Smith, B P; Smith, P J

    1979-01-01

    The study of DNA damage and its enzymatic repair has undergone rapid expansion in recent years. Laboratory observations at the molecular level have been facilitated greatly by the availability of a battery of physicochemical techniques capable of monitoring hallmarks of different repair mechanisms. One technique exploits the unique ability of certain putative repair enzymes (endonucleases and DNA glycosylases of prokaryotic origin) to selectively attack DNA at sites containing altered base or sugar residues; the sites are subsequently observed as single-strand break, by velocity sedimentatn of the DNA in an alkaline sucrose gradient. Incubation of carcinogen-treated cell cultures for varying times, followed by enzymatic analysis of their radionuclide-labeled DNA, yields the time course of disappearace of such sites; this is taken as an indirect expression of the kinetics of lesion repair. Although there are several variations of the enzymatic assay two basic protocols are in current use. The only major difference is the way in which the damaged DNA is treated with the lesion-detecting enzyme(s). In one protocol this is achieved by rendering the cells porous to extracellular proteins prior to incubation with the test enzyme(s). In the second protocol the damaged DNA is extracted from the cells and is then exposed to the lesion-recognizing enzyme(s) in vitro. The enzymatic assay developed in our laboratory follows this second protocol, and the procedure is described.

  16. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  17. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  18. New Computational Approaches for NMR-based Drug Design: A Protocol for Ligand Docking to Flexible Target Sites

    International Nuclear Information System (INIS)

    Gracia, Luis; Speidel, Joshua A.; Weinstein, Harel

    2006-01-01

    NMR-based drug design has met with some success in the last decade, as illustrated in numerous instances by Fesik's ''ligand screening by NMR'' approach. Ongoing efforts to generalize this success have led us to the development of a new paradigm in which quantitative computational approaches are being integrated with NMR derived data and biological assays. The key component of this work is the inclusion of the intrinsic dynamic quality of NMR structures in theoretical models and its use in docking. A new computational protocol is introduced here, designed to dock small molecule ligands to flexible proteins derived from NMR structures. The algorithm makes use of a combination of simulated annealing monte carlo simulations (SA/MC) and a mean field potential informed by the NMR data. The new protocol is illustrated in the context of an ongoing project aimed at developing new selective inhibitors for the PCAF bromodomains that interact with HIV Tat

  19. Using a risk assessment protocol to develop soil cleanup criteria for petroleum contaminated sites

    International Nuclear Information System (INIS)

    Asante-Duah, D.K.

    1991-01-01

    Petroleum contaminated site may prose significant risks to the public because of potential health and environmental effects, and to Potentially Responsible Parties (PRPs) because of financial liabilities that could result from such effects. The effective management of petroleum contaminated sites has therefore become an important environmental priority and will be a growing challenge for years to come. It has also become evident that the proper management of such sites poses great challenges. Risk assessment seems to be one of the fastest evolving tools for developing appropriate management decisions, including those relating to the levels of cleanup warranty under specific scenarios. This paper reports that the U.S. Environmental Protection Agency (U.S. EPA) recognizes the use of risk assessment to facilitate decisions on whether or not remedial actions are needed to abate site-related risks, and also in the enforcement of regulatory standards. Risk assessment techniques have been used in various regulatory programs employed by federal, state, and local agencies

  20. Stirring Up the Biological Pump: Vertical Mixing and Carbon Export in the Southern Ocean

    Science.gov (United States)

    Stukel, Michael R.; Ducklow, Hugh W.

    2017-09-01

    The biological carbon pump (BCP) transports organic carbon from the surface to the ocean's interior via sinking particles, vertically migrating organisms, and passive transport of organic matter by advection and diffusion. While many studies have quantified sinking particles, the magnitude of passive transport remains poorly constrained. In the Southern Ocean weak thermal stratification, strong vertical gradients in particulate organic matter, and weak vertical nitrate gradients suggest that passive transport from the euphotic zone may be particularly important. We compile data from seasonal time series at a coastal site near Palmer Station, annual regional cruises in the Western Antarctic Peninsula (WAP), cruises throughout the broader Southern Ocean, and SOCCOM (Southern Ocean Carbon and Climate Observations and Modeling) autonomous profiling floats to estimate spatial and temporal patterns in vertical gradients of nitrate, particulate nitrogen (PN), and dissolved organic carbon. Under a steady state approximation, the ratio of ∂PN/∂z to ∂NO3-/∂z suggests that passive transport of PN may be responsible for removing 46% (37%-58%) of the nitrate introduced into the surface ocean of the WAP (with dissolved organic matter contributing an additional 3-6%) and for 23% (19%-28%) of the BCP in the broader Southern Ocean. A simple model parameterized with in situ nitrate, PN, and primary production data suggested that passive transport was responsible for 54% of the magnitude of the BCP in the WAP. Our results highlight the potential importance of passive transport (by advection and diffusion) of organic matter in the Southern Ocean but should only be considered indicative of high passive transport (rather than conclusive evidence) due to our steady state assumptions.

  1. Weatherization Works II - Summary of Findings from the ARRA Period Evaluation of the U.S. Department of Energy's Weatherization Assistance Program

    Energy Technology Data Exchange (ETDEWEB)

    Tonn, Bruce Edward [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Carroll, David [APPRISE, Inc.. Princeton, NJ (United States); Rose, Erin M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Hawkins, Beth A. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Pigg, Scott [Energy Center of Wisconsin, Madison, WI (United States); Dalhoff, Greg [Dalhoff & Associates. Verona, WI (United STates); Blasnik, Michael [Blasnik & Associates, Boston, MA (United States); Eisenberg, Joel Fred [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Cowan, Claire [Energy Center of Wisconsin, Madison, WI (United States); Conlon, Brian [Univ. of Tennessee, Knoxville, TN (United States)

    2015-10-01

    This report presents a summary of the American Recovery and Reinvestment Act of 2009 (ARRA) evaluation of the U.S. Department of Energy s low-income Weatherization Program. This evaluation focused on the WAP Program Year 2010. The ARRA evaluation produced fourteen separate reports, including this summary. Three separate reports address the energy savings, energy cost savings, and cost effectiveness of WAP across four housing types: single family, mobile home, and large multifamily. Other reports address the environmental emissions benefits attributable to WAP, and characterize the program. Special studies were conducted to: estimate the impacts of weatherization and healthy homes interventions on asthma-related Medicaid claims in a small cohort in Washington State; assess how weatherization recipients communicate their weatherization experiences to those in their social network, and assess processes implemented to defer homes for weatherization. Small studies addressed energy use in refrigerators, WAP as implemented in the U.S. territories for the first time, and weatherization s impacts on air conditioning energy savings. The national occupant survey was mined for additional insights on the impacts of weatherization on household budgets and energy behaviors post-weatherization. Lastly, the results of a survey of weatherization training centers are summarized.

  2. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  3. Schizophrenia research participants' responses to protocol safeguards: recruitment, consent, and debriefing.

    Science.gov (United States)

    Roberts, Laura Weiss; Warner, Teddy D; Anderson, Charles T; Smithpeter, Megan V; Rogers, Melinda K

    2004-04-01

    To examine the perspectives and preferences regarding ethically important aspects of recruitment, consent, and debriefing of people with schizophrenia who volunteered for research protocols. A structured interview to assess research-related views of people with schizophrenia was developed and piloted. Data collection occurred at three sites. For this analysis, we examined the subset of responses from schizophrenia patients currently enrolled in a protocol. Data from 28 schizophrenia research volunteers were analyzed. Of these, 22 were men and 11 were voluntary inpatients. Most (n=23) recalled speaking with someone before enrolling in the protocol, and most (n=26) reported trusting the person who told them about it. Participants reported a moderate understanding of their protocols. All but one person (n=27) remembered signing a consent form. Twenty-one volunteers indicated that consent forms are meant to help both the patient and the researcher. Most (n=23) reported making the enrollment decision alone, with 22 making this decision prior to reviewing the consent form. The decision was described as relatively easy. Respondents felt some pressure to enroll, with women experiencing more pressure. Debriefing practices were strongly endorsed by participants. All 28 of the volunteers wished to be informed if a health problem (i.e., "something wrong") was discovered during the protocol. The persons living with schizophrenia who were interviewed for this project expressed interesting perspectives and preferences regarding ethically important aspects of recruitment, consent, and debriefing in clinical research that may help guide efforts to make research processes more attuned to participants and merit further inquiry.

  4. Iran to sign additional protocol and suspend uranium enrichment and reprocessing

    International Nuclear Information System (INIS)

    2003-01-01

    Full text: Iran's representative to the IAEA, Ambassador Ali Akbar Salehi, today delivered a letter to IAEA Director General, Mohamed ElBaradei conveying his Government's acceptance of the Additional Protocol. Mr. Salehi also informed the Director General that Iran had decided, as of today, to suspend all uranium enrichment-related and reprocessing activities in Iran - specifically, to suspend all activities on the site of Natanz, not to produce feed material for enrichment processes and not to import enrichment-related items. 'This is a welcome and positive development,' IAEA Director General Mohamed ElBaradei said. The IAEA intends to verify, in the context of the Safeguards Agreement and the Additional Protocol, the implementation by Iran of these decisions. At its meeting on 12 September, the IAEA Board of Governors adopted a resolution calling on Iran to sign, ratify and fully implement the Additional Protocol promptly and unconditionally, and as a confidence building measure to act henceforth in accordance with the Additional Protocol. The Board also called on Iran to suspend all further uranium enrichment and reprocessing activities, pending provision by the Director General of the assurances required by Member States and pending satisfactory application of the provisions of the Additional Protocol. Also today, Mr. ElBaradei has released his report to IAEA Member States on the 'Implementation of the NPT Safeguards Agreement in the Islamic Republic of Iran' for consideration at the 20 November Board of Governors' meeting. Unless the IAEA Board decides otherwise, the document's circulation is restricted and it cannot be released to the press. (IAEA)

  5. Effect of impregnation protocol in the metallic sites of Pt–Ag/activated carbon catalysts for water denitration

    Energy Technology Data Exchange (ETDEWEB)

    Aristizábal, A. [Departament d’Enginyeria Química, Universitat Rovira i Virgili, Campus Sescelades, Av. Països Catalans 26, 43007 Tarragona (Spain); Contreras, S., E-mail: sandra.contreras@urv.cat [Departament d’Enginyeria Química, Universitat Rovira i Virgili, Campus Sescelades, Av. Països Catalans 26, 43007 Tarragona (Spain); Divins, N.J.; Llorca, J. [Institut de Tècniques Energètiques i Centre de Recerca en Nanoenginyeria, Universitat Politècnica de Catalunya, Diagonal 647, 08028 Barcelona (Spain); Medina, F. [Departament d’Enginyeria Química, Universitat Rovira i Virgili, Campus Sescelades, Av. Països Catalans 26, 43007 Tarragona (Spain)

    2014-04-01

    Highlights: • Mean particle size is tuned by the Pt precursor. H{sub 2}PtCl{sub 6} leads to smaller size. • H{sub 2}PtCl{sub 6} leads to higher extent of Pt–Ag particles with a composition richer in silver. • Pt(NH{sub 3}){sub 4}(NO{sub 3}){sub 2} leads to Ag{sup 0} particles and some Pt–Ag ensembles in less extent. • Nitrate and nitrite rates are linearly related to mean metal particle size. • Physical mixture of catalysts enhances N{sub 2} selectivities. - Abstract: The influence of the Pt precursor and the impregnation protocol in the catalytic behavior of 3%Pt–1.5%Ag supported on activated carbon for water denitration in a continuous reactor was studied. Pt(NH{sub 3}){sub 4}(NO{sub 3}){sub 2} and H{sub 2}PtCl{sub 6} were selected as Pt precursors. Five protocols were investigated: sequential impregnations (both sequences), co-impregnation, physical mixture of monometallic catalysts, and physical mixture of a bimetallic catalyst with a Pt monometallic catalyst. The samples were characterized by XRD, XPS, TPR, HRTEM and physisorption. It was found that the catalytic activity strongly depends on the synthesis protocol and the Pt precursor, which modify the particle size. Higher nitrate rates are achieved using H{sub 2}PtCl{sub 6} than Pt(NH{sub 3}){sub 4}(NO{sub 3}){sub 2}; this is mainly related to the smaller metal particle size of the former, evidenced by HRTEM. Nitrate consumption rate is directly related with the mean particle size. The physical mixture of monometallic catalysts resulted in the highest nitrogen rate.

  6. Using Remote Sensing to Evaluate Wetland Recovery in the Northern Tampa Bay Area Following Reduction in Groundwater Withdrawals

    Science.gov (United States)

    Elder, Amor

    In the past, the Northern Tampa Bay Area (NTBA) wetlands saw severe declines in hydrologic conditions due to excessive groundwater withdrawal rates. Eventually these rates were reduced to allow the wetlands to recover. To monitor this recovery, the Southwest Florida Water Management district (SWFWMD) set up a fieldwork based scoring methodology, called the Wetlands Assessment Procedure (WAP). WAP has been used in many studies of the area since groundwater withdrawal reductions; with many of those studies finding the recovery to be mixed at best. However, these studies were very limited in the number of wetlands they could assess due to the limitations of fieldwork. Therefore, it was proposed that remotely sensed variables associated with water consumption and stress be used to assess the recovery of the NTBA wetlands, as remote sensing allows for efficient assessments of targets over large area. Utilizing ASTER imagery scenes from 2005 and 2014, 211 wetlands' remotely sensed responses of NDVI, Land Surface Temperature (LST), and Evapotranspiration (ET) were mapped and statistically examined for trends indicating improvement or decline. Furthermore, a subset of WAP scores for the two years were examined and compared to the remotely sensed values. The results were contradictory, with remotely sensed responses showing an improvement over the time period, WAP scores indicating a decline in hydrologic conditions, and the two methods showing little to no fit when modeled against each other. As such, it is believed at this time that the remotely sensed method is not suitable for measuring the indicators of wetland recovery used in the WAP methodology.

  7. Respons Agronomi Tiga Varietas Ubi Kayu pada Berbagai Tingkat Kadar Air Tanah

    Directory of Open Access Journals (Sweden)

    Suwarto

    2018-04-01

    Full Text Available Cassava has been cultivated in almost the all region of Indonesia as a raw material of food, feed, and industries. The productivity of cassava was varied among the region due to the variation of varieties used and growth environment, especially rainfall or water availability. Water deficit or drought stress will decrease the growth and yield of cassava. Selecting tolerant variety to drought will be important to get high productivity. An experimental pot in the greenhouse has been conducted to know the growth and yield response to drought. Three varieties of cassava i.e Adira-1, Gajah, and Mangu were planted in the pot at three level of soil moisture content (SMC 4060, 6080, and 80100% of field capacity (FC. The cassava growth traits were influenced by SMC starting at 6 weeks after planting (WAP for a number of leaves, at 8 WAP for stem girth, at 10 WAP for plant height, at 14 WAP for lobus width, and 15 WAP for lobus length. Root, stem, and leaves dry weight in the SMC of 4060% FC were 64.4; 43.98, and 31.19% of the dry weight in 8000% FC. Roots yield in the soil moisture content of 4060% FC decreased by 76.2% and in the SMC of 4060%, FC decreased by 38.4% compared to in the SMC of 80100% FC. The water use efficiency and roots yield of Gajah variety were highest.

  8. Cross-Layer Protocol as a Better Option in Wireless Mesh Network with Respect to Layered-Protocol

    OpenAIRE

    Ahmed Abdulwahab Al-Ahdal; Dr. V. P. Pawar; G. N. Shinde

    2014-01-01

    The Optimal way to improve Wireless Mesh Networks (WMNs) performance is to use a better network protocol, but whether layered-protocol design or cross-layer design is a better option to optimize protocol performance in WMNs is still an on-going research topic. In this paper, we focus on cross-layer protocol as a better option with respect to layered-protocol. The layered protocol architecture (OSI) model divides networking tasks into layers and defines a pocket of services for each layer to b...

  9. A high performance totally ordered multicast protocol

    Science.gov (United States)

    Montgomery, Todd; Whetten, Brian; Kaplan, Simon

    1995-01-01

    This paper presents the Reliable Multicast Protocol (RMP). RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service such as IP Multicasting. RMP is fully and symmetrically distributed so that no site bears un undue portion of the communication load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These QoS guarantees are selectable on a per packet basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, an implicit naming service, mutually exclusive handlers for messages, and mutually exclusive locks. It has commonly been held that a large performance penalty must be paid in order to implement total ordering -- RMP discounts this. On SparcStation 10's on a 1250 KB/sec Ethernet, RMP provides totally ordered packet delivery to one destination at 842 KB/sec throughput and with 3.1 ms packet latency. The performance stays roughly constant independent of the number of destinations. For two or more destinations on a LAN, RMP provides higher throughput than any protocol that does not use multicast or broadcast.

  10. Optimizing the use of X and VNC protocols for support of remote observing

    Science.gov (United States)

    Kibrick, Robert I.; Allen, Steven L.; Conrad, Al; Stickel, Terry; Wirth, Gregory D.

    2004-09-01

    Remote observing is the dominant mode of operation for both Keck Telescopes and their associated instruments. Over 90% of all Keck observations are carried out remotely from the Keck Headquarters in Waimea, Hawaii (located 40 kilometers from the telescopes on the summit of Mauna Kea). In addition, an increasing number of observations are now conducted by geographically-dispersed observing teams, with some team members working from Waimea while others collaborate from Keck remote observing facilities located in California. Such facilities are now operational on the Santa Cruz and San Diego campuses of the University of California, and at the California Institute of Technology in Pasadena. This report describes our use of the X and VNC protocols for providing remote and shared graphical displays to distributed teams of observers and observing assistants located at multiple sites. We describe the results of tests involving both protocols, and explore the limitations and performance of each under different regimes of network bandwidth and latency. We also examine other constraints imposed by differences in the processing performance and bit depth of the various frame buffers used to generate these graphical displays. Other topics covered include the use of ssh tunnels for securely encapsulating both X and VNC protocol streams and the results of tests of ssh compression to improve performance under conditions of limited network bandwidth. We also examine trade-offs between different topologies for locating VNC servers and clients when sharing displays between multiple sites.

  11. Ice melt influence on summertime net community production along the Western Antarctic Peninsula

    Science.gov (United States)

    Eveleth, R.; Cassar, N.; Sherrell, R. M.; Ducklow, H.; Meredith, M. P.; Venables, H. J.; Lin, Y.; Li, Z.

    2017-05-01

    The Western Antarctic Peninsula (WAP) is a highly productive marine environment that is undergoing rapid change, with consequences for productivity and total ecosystem carbon cycling. We present continuous underway O2/Ar estimates of net community production (NCPO2Ar) in austral summer 2012, 2013 and 2014 at sub-kilometer horizontal resolution within the Palmer Long-Term Ecological Research (Pal-LTER) grid region of the WAP. Substantial spatial variability is observed with NCPO2Ar ranging from 0 to 790 mmol O2 m-2 d-1 and considerable interannual variability with mean values in the grid region of 54.4±48.5, 44.6±40.5, and 85.6±75.9 mmol O2 m-2 d-1 in 2012, 2013 and 2014 respectively. Based on a strong correlation (r2=0.83) between residence time integrated NCPO2Ar and NCPDIC derived from seasonal DIC drawdown, we find the observed NCPO2Ar spatial and interannual variability to be consistent with the December-January NCPDIC magnitude. Seeking to explain the mechanistic drivers of NCP in the WAP, we observe a linear relationship between NCPO2Ar and meteoric water content derived from δ18O and salinity. This correlation may be due to Fe supply from glacial melt and/or strengthening of stratification and relief of light limitation. Elevated surface Fe availability, as indicated by Fv/Fm and measurements of surface water dissolved Fe and Mn (a rough proxy for recent potential Fe availability), and shallower, more stable mixed layers are present where meteoric water and/or sea ice melt is high near the coast. Light limitation is evident in the WAP when mixed layer depths are greater than 40 m. Additionally we document hotspots of NCP associated with submarine canyons along the WAP. While it is difficult to predict how the physical-biological system might evolve under changing climatic conditions, it is evident that NCP, and potentially carbon flux out of the mixed layer, along the WAP will be sensitive to shifts in meltwater input and timing.

  12. [Multidisciplinary protocol for computed tomography imaging and angiographic embolization of splenic injury due to trauma: assessment of pre-protocol and post-protocol outcomes].

    Science.gov (United States)

    Koo, M; Sabaté, A; Magalló, P; García, M A; Domínguez, J; de Lama, M E; López, S

    2011-11-01

    To assess conservative treatment of splenic injury due to trauma, following a protocol for computed tomography (CT) and angiographic embolization. To quantify the predictive value of CT for detecting bleeding and need for embolization. The care protocol developed by the multidisciplinary team consisted of angiography with embolization of lesions revealed by contrast extravasation under CT as well as embolization of grade III-V injuries observed, or grade I-II injuries causing hemodynamic instability and/or need for blood transfusion. We collected data on demographic variables, injury severity score (ISS), angiographic findings, and injuries revealed by CT. Pre-protocol and post-protocol outcomes were compared. The sensitivity and specificity of CT findings were calculated for all patients who required angiographic embolization. Forty-four and 30 angiographies were performed in the pre- and post-protocol periods, respectively. The mean (SD) ISSs in the two periods were 25 (11) and 26 (12), respectively. A total of 24 (54%) embolizations were performed in the pre-protocol period and 28 (98%) after implementation of the protocol. Two and 7 embolizations involved the spleen in the 2 periods, respectively; abdominal laparotomies numbered 32 and 25, respectively, and 10 (31%) vs 4 (16%) splenectomies were performed. The specificity and sensitivity values for contrast extravasation found on CT and followed by embolization were 77.7% and 79.5%. The implementation of this multidisciplinary protocol using CT imaging and angiographic embolization led to a decrease in the number of splenectomies. The protocol allows us to take a more conservative treatment approach.

  13. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  14. Examining recombinant human TSH primed 131I therapy protocol in patients with metastatic differentiated thyroid carcinoma: comparison with the traditional thyroid hormone withdrawal protocol

    International Nuclear Information System (INIS)

    Rani, Deepa; Kaisar, Sushma; Awasare, Sushma; Kamaldeep; Abhyankar, Amit; Basu, Sandip

    2014-01-01

    difference was not found to be statistically significant (p = 0.301). The mean tumor radiation absorbed dose per mCi was less during the rhTSH protocol (6.04 rad/mCi) than during the thyroid hormone withdrawal protocol (8.68 rad/mCi), and the difference was statistically significant (p = 0.049), though visual analysis of the rhTSH posttherapy scans showed avid concentration of 131 I in the metastatic sites and revealed more lesions in 30 % of the patients compared to the traditional large dose scan and equal number of lesions in 65 % of the patients. Visual analysis of the traditional large dose scan, rhTSH pretreatment scan, and rhTSH posttherapy scans showed that the traditional large dose scan is better compared to the rhTSH 1 mCi scan as it showed more lesions in 19 of 37 patients (51.35 %). rhTSH posttherapy scans were better compared to the traditional large dose scans and rhTSH pretreatment scans. More lesions were seen on rhTSH posttherapy scans in 11 of 37 patients (29.7 %) compared to the traditional large dose scans and in 24 of 37 (64.86 %) patients compared to the rhTSH 1 mCi scans. Our findings demonstrate that the rhTSH primed pretreatment scan undertaken at 24 h after diagnostic dose is suboptimal to evaluate whether a metastatic lesion concentrates 131 I. The majority of these lesions demonstrated radioiodine accumulation in the posttreatment scan. Quality of life as assessed using EORTC QOL-3 forms clearly showed that rhTSH improved the quality of life of patients compared to the thyroid hormone withdrawal protocol. Functional scale and global health status were significantly better in the rhTSH protocol compared to the thyroid hormone withdrawal protocol (p 131 I therapy with the rhTSH protocol was shorter (2 days, range 2-8 days) compared to the thyroid hormone withdrawal protocol (3 days, range 1-8 days) and the difference was found to be statistically significant (p = 0.007). The mean serum creatinine level was significantly lower in the rhTSH protocol

  15. Revised Mechanism and Improved Efficiency of the QuikChange Site-Directed Mutagenesis Method.

    Science.gov (United States)

    Xia, Yongzhen; Xun, Luying

    2017-01-01

    Site-directed mutagenesis has been widely used for the substitution, addition or deletion of nucleotide residues in a defined DNA sequence. QuikChange™ site-directed mutagenesis and its related protocols have been widely used for this purpose because of convenience and efficiency. We have recently demonstrated that the mechanism of the QuikChange™ site-directed mutagenesis process is different from that being proposed. The new mechanism promotes the use of partially overlapping primers and commercial PCR enzymes for efficient PCR and mutagenesis.

  16. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  17. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  18. DWPF glass transition temperatures - What they are and why they are important

    International Nuclear Information System (INIS)

    Marra, S.L.; Applewhite-Ramsey, A.L.; Jantzen, C.M.

    1991-01-01

    The Department of Energy has defined a set of requirements for the DWPF canistered waste form which must be met in order to assure compatibility with, and acceptance by, the first geologic repository. These requirements are the Waste Acceptance Preliminary Specifications (WAPS). The WAPS require DWPF to report glass transition temperatures for the projected range of compositions. This information will be used by the repository to establish waste package design limits

  19. Protocol for Monitoring Fish Assemblages in Pacific Northwest National Parks

    Science.gov (United States)

    Brenkman, Samuel J.; Connolly, Patrick J.

    2008-01-01

    Rivers and streams that drain from Olympic, Mount Rainier, and North Cascades National Parks are among the most protected corridors in the lower 48 States, and represent some of the largest tracts of contiguous, undisturbed habitat throughout the range of several key fish species of the Pacific Northwest. These watersheds are of high regional importance as freshwater habitat sanctuaries for native fish, where habitat conditions are characterized as having little to no disturbance from development, channelization, impervious surfaces, roads, diversions, or hydroelectric projects. Fishery resources are of high ecological and cultural importance in Pacific Northwest National Parks, and significantly contribute to economically important recreational, commercial, and tribal fisheries. This protocol describes procedures to monitor trends in fish assemblages, fish abundance, and water temperature in eight rivers and five wadeable streams in Olympic National Park during summer months, and is based on 4 years of field testing. Fish assemblages link freshwater, marine, and terrestrial ecosystems. They also serve as focal resources of national parks and are excellent indicators of ecological conditions of rivers and streams. Despite the vital importance of native anadromous and resident fish populations, there is no existing monitoring program for fish assemblages in the North Coast and Cascades Network. Specific monitoring objectives of this protocol are to determine seasonal and annual trends in: (1) fish species composition, (2) timing of migration of adult fish, (3) relative abundance, (4) age and size structure, (5) extent of non-native and hatchery fish, and (6) water temperature. To detect seasonal and annual trends in fish assemblages in reference sites, we rely on repeated and consistent annual sampling at each monitoring site. The general rationale for the repeated sampling of reference sites is to ensure that we account for the high interannual variability in fish

  20. Epistemic Protocols for Distributed Gossiping

    Directory of Open Access Journals (Sweden)

    Krzysztof R. Apt

    2016-06-01

    Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.

  1. A mobile information management system used in textile enterprises

    Science.gov (United States)

    Huang, C.-R.; Yu, W.-D.

    2008-02-01

    The mobile information management system (MIMS) for textile enterprises is based on Microsoft Visual Studios. NET2003 Server, Microsoft SQL Server 2000, C++ language and wireless application protocol (WAP) and wireless markup language (WML) technology. The portable MIMS is composed of three-layer structures, i.e. showing layer; operating layer; and data visiting layer corresponding to the port-link module; processing module; and database module. By using the MIMS, not only the information exchanges become more convenient and easier, but also the compatible between the giant information capacity and a micro-cell phone and functional expansion nature in operating and designing can be realized by means of build-in units. The development of MIMS is suitable for the utilization in textile enterprises.

  2. A mobile information management system used in textile enterprises

    Energy Technology Data Exchange (ETDEWEB)

    Huang, C-R; Yu, W-D [College of Textiles, Donghua University, 1882 west Yan-an Road, Shanghai 200051 (China)], E-mail: wdyu@dhu.edu.cn

    2008-02-15

    The mobile information management system (MIMS) for textile enterprises is based on Microsoft Visual Studios. NET2003 Server, Microsoft SQL Server 2000, C{sup ++} language and wireless application protocol (WAP) and wireless markup language (WML) technology. The portable MIMS is composed of three-layer structures, i.e. showing layer; operating layer; and data visiting layer corresponding to the port-link module; processing module; and database module. By using the MIMS, not only the information exchanges become more convenient and easier, but also the compatible between the giant information capacity and a micro-cell phone and functional expansion nature in operating and designing can be realized by means of build-in units. The development of MIMS is suitable for the utilization in textile enterprises.

  3. A mobile information management system used in textile enterprises

    International Nuclear Information System (INIS)

    Huang, C-R; Yu, W-D

    2008-01-01

    The mobile information management system (MIMS) for textile enterprises is based on Microsoft Visual Studios. NET2003 Server, Microsoft SQL Server 2000, C ++ language and wireless application protocol (WAP) and wireless markup language (WML) technology. The portable MIMS is composed of three-layer structures, i.e. showing layer; operating layer; and data visiting layer corresponding to the port-link module; processing module; and database module. By using the MIMS, not only the information exchanges become more convenient and easier, but also the compatible between the giant information capacity and a micro-cell phone and functional expansion nature in operating and designing can be realized by means of build-in units. The development of MIMS is suitable for the utilization in textile enterprises

  4. Using Adobe Flash Lite on mobile phones for psychological research: Reaction time measurement reliability and interdevice variability.

    Science.gov (United States)

    Reimers, Stian; Stewart, Neil

    2008-11-01

    Mobile telephones have significant potential for use in psychological research, possessing unique characteristics-not least their ubiquity--that may make them useful tools for psychologists. We examined whether it is possible to measure reaction times (RTs) accurately using Adobe Flash Lite on mobile phones. We ran simple and choice RT experiments on two widely available mobile phones, a Nokia 6110 Navigator and a Sony Ericsson W810i, using a wireless application protocol (WAP) connection to access the Internet from the devices. RTs were compared within subjects with those obtained using a Linux-based millisecond-accurate measurement system. Results show that measured RTs were significantly longer on mobile devices, and that overall RTs and distribution of RTs varied across devices.

  5. Using semantics for representing experimental protocols.

    Science.gov (United States)

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  6. National Ignition Facility Project Site Safety Program

    International Nuclear Information System (INIS)

    Dun, C

    2003-01-01

    This Safety Program for the National Ignition Facility (NIF) presents safety protocols and requirements that management and workers shall follow to assure a safe and healthful work environment during activities performed on the NIF Project site. The NIF Project Site Safety Program (NPSSP) requires that activities at the NIF Project site be performed in accordance with the ''LLNL ES and H Manual'' and the augmented set of controls and processes described in this NIF Project Site Safety Program. Specifically, this document: (1) Defines the fundamental NIF site safety philosophy. (2) Defines the areas covered by this safety program (see Appendix B). (3) Identifies management roles and responsibilities. (4) Defines core safety management processes. (5) Identifies NIF site-specific safety requirements. This NPSSP sets forth the responsibilities, requirements, rules, policies, and regulations for workers involved in work activities performed on the NIF Project site. Workers are required to implement measures to create a universal awareness that promotes safe practice at the work site and will achieve NIF management objectives in preventing accidents and illnesses. ES and H requirements are consistent with the ''LLNL ES and H Manual''. This NPSSP and implementing procedures (e.g., Management Walkabout, special work procedures, etc.,) are a comprehensive safety program that applies to NIF workers on the NIF Project site. The NIF Project site includes the B581/B681 site and support areas shown in Appendix B

  7. Weekly azathioprine pulse versus daily azathioprine in the treatment of Parthenium dermatitis: A non-inferiority randomized controlled study

    Directory of Open Access Journals (Sweden)

    Kaushal K Verma

    2015-01-01

    Full Text Available Background: Azathioprine in daily doses has been shown to be effective and safe in the treatment of Parthenium dermatitis. Weekly pulses of azathioprine (WAP are also effective, but there are no reports comparing the effectiveness and safety of these two regimens in this condition. Aims: To study the efficacy and safety of WAP and daily azathioprine in Parthenium dermatitis. Methods: Sixty patients with Parthenium dermatitis were randomly assigned to treatment with azathioprine 300 mg weekly pulse or azathioprine 100 mg daily for 6 months. Patients were evaluated every month to assess the response to treatment and side effects. Results: The study included 32 patients in the weekly azathioprine group and 28 in the daily azathioprine group, of whom 25 and 22 patients respectively completed the study. Twenty-three (92% patients on WAP and 21 (96% on daily azathioprine had a good or excellent response. The mean pretreatment clinical severity score decreased from 26.4 ± 14.5 to 4.7 ± 5.1 in the WAP group, and from 36.1 ± 18.1 to 5.7 ± 6.0 in the daily azathioprine group, which was statistically significant and comparable (P = 0.366. Patients on WAP had a higher incidence of adverse effects (P = 0.02. Limitations: The study had a small sample size and the amount of clobetasol propionate used in each patient was not determined, though it may not have affected the study outcome due to its comparable use in both groups. Conclusions: Azathioprine 300 mg weekly pulse and 100 mg daily dose are equally effective and safe in the treatment of Parthenium dermatitis.

  8. Nitrogen contribution proportion from soil, fertilizer and pseudomonas putida like in sorghum plantation on South Sumatra's inceptisols

    International Nuclear Information System (INIS)

    Kesumadewi, A.A.I.; Anas, Iswandi; Santosa, D.A.; Sisworo, Elsje L.

    2000-01-01

    The proportion of N which absorbed either from natural source (soil), N-fertilizer or N sub.2-fixing microorganism on sorghum plantation in marginal alang-alang lands that group to inceptisol should be studied in securing the soil fertility. In this experiment, N contribution of those N sources was determined during vegetative stage of sorghum on three subgroup of south sumatera's inceptisols. A greenhouse experiment that arranged in randomized complete block design using 2 factorial split plot was carried out in IPB Bogor from May-December 1998. The observation was focused on partition of N contribution from the soil, N-fertilizer and Pseudomonas putida like(N sub.2-fixing microorganism) on total plant-content 4 and 8 weeks after plantations (WAP). N-partition from those N-sources was done based o A-value method. Sorghum was absorb larger proportion of N from soil(63,36%-48,83% on 4 WAP and 64,58 % on WAP) than from fertilizer and P.putida like on all of the soil subgroups. Soil-N absorption was highest on oxic dystropept. Pseudomonas putida like was not able to subtite soil-N and fertilizer-N in sufficient amount to vigorous plant growth particularly on typica humitropept and typic dystropept. The microorganism was only provide a small amount of N to sorghum on oxic dystropept (23,05-23,95 % on 4 WAP and 15,91-34,44 % on 8WAP). The increment of plant root surface area could be enhance in greater extent of plant-N absorption than N sub.2-fixation. Thus, plantation of marginal tolerant sorghum still need addition of N-fertilizer

  9. Nitrogen contribution proportion from soil, fertilizer and pseudomonas putida like in sorghum plantation on South Sumatra's inceptisols; Proposi Sumbangan Nitrogen Oleh Tanah, Pupuk Dan Pseudomonas putida like Dalam Tanaman Sorghum Pada Inceptisol Sumatera Selatan

    Energy Technology Data Exchange (ETDEWEB)

    Kesumadewi, A A.I. [Departement Agriculture Udayana, Bali (Indonesia); Anas, Iswandi; Santosa, D A [Departement Agriculture, Bogor Agriculture Institute (Indonesia); Sisworo, Elsje L [Center for Application of Isotop and Radiation, National Nuclear Energy Agency, Jakarta (Indonesia)

    2000-02-23

    The proportion of N which absorbed either from natural source (soil), N-fertilizer or N sub.2-fixing microorganism on sorghum plantation in marginal alang-alang lands that group to inceptisol should be studied in securing the soil fertility. In this experiment, N contribution of those N sources was determined during vegetative stage of sorghum on three subgroup of south sumatera's inceptisols. A greenhouse experiment that arranged in randomized complete block design using 2 factorial split plot was carried out in IPB Bogor from May-December 1998. The observation was focused on partition of N contribution from the soil, N-fertilizer and Pseudomonas putida like(N sub.2-fixing microorganism) on total plant-content 4 and 8 weeks after plantations (WAP). N-partition from those N-sources was done based o A-value method. Sorghum was absorb larger proportion of N from soil(63,36%-48,83% on 4 WAP and 64,58 % on WAP) than from fertilizer and P.putida like on all of the soil subgroups. Soil-N absorption was highest on oxic dystropept. Pseudomonas putida like was not able to subtite soil-N and fertilizer-N in sufficient amount to vigorous plant growth particularly on typica humitropept and typic dystropept. The microorganism was only provide a small amount of N to sorghum on oxic dystropept (23,05-23,95 % on 4 WAP and 15,91-34,44 % on 8WAP). The increment of plant root surface area could be enhance in greater extent of plant-N absorption than N sub.2-fixation. Thus, plantation of marginal tolerant sorghum still need addition of N-fertilizer.

  10. JNC's experience of complementary accesses provided by the additional protocol

    International Nuclear Information System (INIS)

    Miura, Yasushi

    2001-01-01

    JNC (Japan Nuclear Cycle Development Institute) examined problems on implementation of the Additional Protocol to Japan/IAEA Safeguards Agreement with the Government of Japan and International Atomic Energy Agency through trials performed at Oarai Engineering Center before it entered into force. On December 16th 1999, the Additional Protocol entered into force, and in last January JNC provided the first JNC site information to STA. Then our Government provided it of all Japan to IAEA in last June. Also in this January, we sent the additional information changed from old one to MEXT (Ministry of Education, Culture, Sports, Science and Technology). The first Complementary Access of not only JNC but also Japan was implemented on JNC Ningyo-Toge Environmental Engineering Center on the end of last November. Since then, we have had over 10 times experience of Complementary Accesses for about one year especially on Tokai works and Ningyo-Toge. JNC's experience of Complementary Accesses will be introduced. (author)

  11. Understanding protocol performance: impact of test performance.

    Science.gov (United States)

    Turner, Robert G

    2013-01-01

    This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as

  12. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  13. Seismic site-response characterization of high-velocity sites using advanced geophysical techniques: application to the NAGRA-Net

    Science.gov (United States)

    Poggi, V.; Burjanek, J.; Michel, C.; Fäh, D.

    2017-08-01

    The Swiss Seismological Service (SED) has recently finalised the installation of ten new seismological broadband stations in northern Switzerland. The project was led in cooperation with the National Cooperative for the Disposal of Radioactive Waste (Nagra) and Swissnuclear to monitor micro seismicity at potential locations of nuclear-waste repositories. To further improve the quality and usability of the seismic recordings, an extensive characterization of the sites surrounding the installation area was performed following a standardised investigation protocol. State-of-the-art geophysical techniques have been used, including advanced active and passive seismic methods. The results of all analyses converged to the definition of a set of best-representative 1-D velocity profiles for each site, which are the input for the computation of engineering soil proxies (traveltime averaged velocity and quarter-wavelength parameters) and numerical amplification models. Computed site response is then validated through comparison with empirical site amplification, which is currently available for any station connected to the Swiss seismic networks. With the goal of a high-sensitivity network, most of the NAGRA stations have been installed on stiff-soil sites of rather high seismic velocity. Seismic characterization of such sites has always been considered challenging, due to lack of relevant velocity contrast and the large wavelengths required to investigate the frequency range of engineering interest. We describe how ambient vibration techniques can successfully be applied in these particular conditions, providing practical recommendations for best practice in seismic site characterization of high-velocity sites.

  14. A class-chest for deriving transport protocols

    Energy Technology Data Exchange (ETDEWEB)

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  15. Successful characterization of radioactive waste at the Savannah River Site

    International Nuclear Information System (INIS)

    Hughes, M.B.; Miles, G.M.

    1995-01-01

    Characterization of the low-level radioactive waste generated by forty five independent operating facilities at The Savannah River Site (SRS) experienced a slow start. However, the site effectively accelerated waste characterization based on findings of an independent assessment that recommended several changes to the existing process. The new approach included the development of a generic waste characterization protocol and methodology and the formulation of a technical board to approve waste characterization. As a result, consistent, detailed characterization of waste streams from SRS facilities was achieved in six months

  16. Importance of protocol target definition on the ability to spare normal tissue: An IMRT and 3D-CRT planning comparison for intraorbital tumors

    International Nuclear Information System (INIS)

    Hein, Patrick A.; Gladstone, David J.; Bellerive, Marc R.; Hug, Eugen B.

    2005-01-01

    Purpose: We selected five intraorbital tumor sites that are frequently found in clinical practice in children diagnosed with orbital rhabdomyosarcoma and performed three-dimensional conformal radiotherapy (3D-CRT) and intensity-modulated photon radiotherapy (IMRT) planning. Results of target coverage and doses to critical structures were compared. The goal of this study was to evaluate and to document realistic expectations as to organ-sparing capabilities of modern radiation therapy planning technologies with a focus on lens-sparing irradiation. Furthermore, we investigated potential added benefits of IMRT compared with 3D-CRT and the influence of protocol volume criteria definitions on the ability to obtain normal tissue dose sparing using the orbit as an example of a complex anatomic site. Methods and Materials: The five intraorbital tumor sites were placed retrobulbar, temporal, nasal, in the upper inner and upper outer quadrant, the latter two more complex in shape. Gross tumor volume (GTV), clinical target volume (CTV), and planning target volume (PTV) were defined in image-fused computed tomography and magnetic resonance data sets. 3D-CRT and IMRT photon plans, using equal beam angles and collimation for direct comparison, were designed to 45 Gy prescription dose according to Intergroup Rhabdomyosarcoma Study Group-D9602 (IRSG-D9602) protocol (Intergroup Rhabdomyosarcoma Study V [IRS-V] protocol) for Stage I, Clinical Group 3 orbital rhabdomyosarcoma. To compare the impact of changed target definitions in IMRT planning, additional IMRT plans were generated using modified volume and dose coverage criteria. The minimum dose constraint (95%) of the PTV was substituted by a required minimum volume coverage (95%) with the prescribed dose. Dose-volume histograms (DVHs) were obtained, including target volumes, lens, optic nerves, optic chiasm, lacrimal gland, bony orbit, pituitary gland, frontal and temporal lobes. Results: Protocol target volume coverage criteria

  17. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    International Nuclear Information System (INIS)

    Soares, M. R.; Maia, A. F.; Batista, W. O. G.; Lara, P. A.

    2014-08-01

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  18. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    Energy Technology Data Exchange (ETDEWEB)

    Soares, M. R.; Maia, A. F. [Universidade Federal de Sergipe, Departamento de Fisica, Cidade Universitaria Prof. Jose Aloisio de Campos, Marechal Rondon s/n, Jardim Rosa Elze, 49-100000 Sao Cristovao, Sergipe (Brazil); Batista, W. O. G. [Instituto Federal da Bahia, Rua Emidio dos Santos s/n, Barbalho, Salvador, 40301015 Bahia (Brazil); Lara, P. A., E-mail: wilsonottobatista@gmail.com [Instituto de Pesquisas Energeticas e Nucleares / CNEN, Av. Lineu Prestes 2242, Cidade Universitaria, 05508-000 Sao Paulo (Brazil)

    2014-08-15

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  19. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  20. National protocol for quality assurance in DXA-bone densitometry

    Science.gov (United States)

    Slavchev, A.; Avramova-Cholakova, S.; Vassileva, J.

    2008-01-01

    Osteoporosis becomes largely one of the most important socially significant and costly diseases. Modern techniques (DXA, US) are applied for bone densitometry. The paper presents a protocol for quality assurance especially of DXA-bone densitometers including quality control made in compliance with international standards (ISCD, IOF). The methodology has been tested in practice by measurements on site-functional assessment, entrance dose, radiation protection, calibration, in-vitro precision. It is expected to raise the quality of the diagnostic process in concert with the EU Medical Directive 97/43 particularly for population screening and sensitive groups. The protocol is an essential part of the National Program for constraining osteoporosis which has been elaborated at the Ministry of Health and at present under implementation throughout the country. It aims at reducing the risk, factors spreading, at diminishing the fracture risk the morbidity and the mortality from osteoporosis. An integral multidisciplinary approach to the problem solving is applied as well as training on three levels — doctors, patients, population, which effectively will contribute for obtaining real results in preventing osteoporosis.

  1. An electromagnetic field measurement protocol for monitoring power lines

    International Nuclear Information System (INIS)

    Lubritto, C.; Iavazzo, A.; D'Onofrio, A.; Palmieri, A.; Sabbarese, C.; Terrasi, F.

    2002-01-01

    In the actions aiming to prevent risks related to the exposure to Low Frequencies Non Ionising electromagnetic Radiations (ELF-NIR), always arises the need to perform measurements in order to assess the field level existing in the considered sites. As a matter of fact very often it turns out difficult to predict, on the base of calculations, with sufficient approximation the field levels, due to extended variability of environmental conditions (e.g. coexistence of several sources, ground and building conformation, etc..). The measurement procedures must follow a methodology that could allow to minimise the interferences with the measurement set-up and the systematic and accidental errors. Risks for the operator and damages to the instrument should also be taken into account. One of the goal set for this research program was then the definition of the measurement protocol for electromagnetic field generated by low frequency non ionising radiation sources. In particular sources like power lines will be considered in order to validate the protocol by means of in-field measurements

  2. Protocol and the post-human performativity of security techniques.

    Science.gov (United States)

    O'Grady, Nathaniel

    2016-07-01

    This article explores the deployment of exercises by the United Kingdom Fire and Rescue Service. Exercises stage, simulate and act out potential future emergencies and in so doing help the Fire and Rescue Service prepare for future emergencies. Specifically, exercises operate to assess and develop protocol; sets of guidelines which plan out the actions undertaken by the Fire and Rescue Service in responding to a fire. In the article I outline and assess the forms of knowledge and technologies, what I call the 'aesthetic forces', by which the exercise makes present and imagines future emergencies. By critically engaging with Karen Barad's notion of post-human performativity, I argue that exercises provide a site where such forces can entangle with one another; creating a bricolage through which future emergencies are evoked sensually and representatively, ultimately making it possible to experience emergencies in the present. This understanding of exercises allows also for critical appraisal of protocol both as phenomena that are produced through the enmeshing of different aesthetic forces and as devices which premise the operation of the security apparatus on contingency.

  3. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  4. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  5. Examining recombinant human TSH primed {sup 131}I therapy protocol in patients with metastatic differentiated thyroid carcinoma: comparison with the traditional thyroid hormone withdrawal protocol

    Energy Technology Data Exchange (ETDEWEB)

    Rani, Deepa; Kaisar, Sushma; Awasare, Sushma; Kamaldeep; Abhyankar, Amit; Basu, Sandip [Bhabha Atomic Research Centre (BARC), Radiation Medicine Centre, Mumbai (India)

    2014-09-15

    the difference was not found to be statistically significant (p = 0.301). The mean tumor radiation absorbed dose per mCi was less during the rhTSH protocol (6.04 rad/mCi) than during the thyroid hormone withdrawal protocol (8.68 rad/mCi), and the difference was statistically significant (p = 0.049), though visual analysis of the rhTSH posttherapy scans showed avid concentration of {sup 131}I in the metastatic sites and revealed more lesions in 30 % of the patients compared to the traditional large dose scan and equal number of lesions in 65 % of the patients. Visual analysis of the traditional large dose scan, rhTSH pretreatment scan, and rhTSH posttherapy scans showed that the traditional large dose scan is better compared to the rhTSH 1 mCi scan as it showed more lesions in 19 of 37 patients (51.35 %). rhTSH posttherapy scans were better compared to the traditional large dose scans and rhTSH pretreatment scans. More lesions were seen on rhTSH posttherapy scans in 11 of 37 patients (29.7 %) compared to the traditional large dose scans and in 24 of 37 (64.86 %) patients compared to the rhTSH 1 mCi scans. Our findings demonstrate that the rhTSH primed pretreatment scan undertaken at 24 h after diagnostic dose is suboptimal to evaluate whether a metastatic lesion concentrates {sup 131}I. The majority of these lesions demonstrated radioiodine accumulation in the posttreatment scan. Quality of life as assessed using EORTC QOL-3 forms clearly showed that rhTSH improved the quality of life of patients compared to the thyroid hormone withdrawal protocol. Functional scale and global health status were significantly better in the rhTSH protocol compared to the thyroid hormone withdrawal protocol (p < 0.001). The mean symptom scale score was significantly higher in the thyroid hormone withdrawal protocol (45.25) compared to the rhTSH protocol (13.59) (p < 0.001). Of the 20 patients, 4 (20 %) had more than 25 % increase in the TG value on follow-up. The median hospital stay of

  6. A family of multi-party authentication protocols

    NARCIS (Netherlands)

    Cremers, C.J.F.; Mauw, S.

    2006-01-01

    We introduce a family of multi-party authentication protocols and discuss six novel protocols, which are members of this family. The first three generalize the well-known Needham-Schroeder-Lowe public-key protocol, the Needham-Schroeder private-key protocol, and the Bilateral Key Exchange protocol.

  7. Data-sharing protocol: A prototype implementation

    International Nuclear Information System (INIS)

    Gibney, T.; Greenwood, D.

    1992-12-01

    This paper describes a client/server communication protocol which will allow physicists to access data from cooperating remote experiments. Special low-level ''client'' software within the user's ''home'' data-access library formulates a request for data from the remote experiment. This request is sent over a network to a server at the remote site. The server has specific knowledge about the location and format of the requested data. The server gets the data and sends it over the network to the requesting client, which reformats the data according to the local library's conventions. Our prototype is being developed to suppose remote access to data from ATF, PBX, and micro Vax data from Tore-Supra. We have attempted to create a flexible design which should accommodate data from other experiments as well

  8. The network architecture and site test of DCIS in Lungmen nuclear power station

    International Nuclear Information System (INIS)

    Lee, C. K.

    2006-01-01

    The Lungmen Nuclear Power Station (LMNPS) is located in North-Eastern Seashore of Taiwan. LMNPP has two units. Each unit generates 1350 Megawatts. It is the first ABWR Plant in Taiwan and is under-construction now. Due to contractual arrangement, there are seven large I and C suppliers/designers, which are GE NUMAC, DRS, Invensys, GEIS, Hitachi, MHI, and Stone and Webster company. The Distributed Control and Information System (DCIS) in Lungmen are fully integrated with the state-of-the-art computer and network technology. General Electric is the leading designer for integration of DCIS. This paper presents Network Architecture and the Site Test of DCIS. The network architectures are follows. GE NUMAC System adopts the point to point architecture, DRS System adopts Ring type architecture with SCRAMNET protocol, Inevnsys system adopts IGiga Byte Backbone mesh network with Rapid Spanning Tree Protocol, GEIS adopts Ethernet network with EGD protocol, Hitachi adopts ring type network with proprietary protocol. MHI adopt Ethernet network with UDP. The data-links are used for connection between different suppliers. The DCIS architecture supports the plant automation, the alarm prioritization and alarm suppression, and uniform MMI screen for entire plant. The Test Program regarding the integration of different network architectures and Initial DCIS architecture Setup for 161KV Energization will be discussed. Test tool for improving site test schedule, and lessons learned from FAT will be discussed too. And conclusions are at the end of this paper. (authors)

  9. The network architecture and site test of DCIS in Lungmen nuclear power station

    Energy Technology Data Exchange (ETDEWEB)

    Lee, C. K. [Instrument and Control Section, Lungmen Nuclear Power Station, Taiwan Power Company, Taipei County Taiwan (China)

    2006-07-01

    The Lungmen Nuclear Power Station (LMNPS) is located in North-Eastern Seashore of Taiwan. LMNPP has two units. Each unit generates 1350 Megawatts. It is the first ABWR Plant in Taiwan and is under-construction now. Due to contractual arrangement, there are seven large I and C suppliers/designers, which are GE NUMAC, DRS, Invensys, GEIS, Hitachi, MHI, and Stone and Webster company. The Distributed Control and Information System (DCIS) in Lungmen are fully integrated with the state-of-the-art computer and network technology. General Electric is the leading designer for integration of DCIS. This paper presents Network Architecture and the Site Test of DCIS. The network architectures are follows. GE NUMAC System adopts the point to point architecture, DRS System adopts Ring type architecture with SCRAMNET protocol, Inevnsys system adopts IGiga Byte Backbone mesh network with Rapid Spanning Tree Protocol, GEIS adopts Ethernet network with EGD protocol, Hitachi adopts ring type network with proprietary protocol. MHI adopt Ethernet network with UDP. The data-links are used for connection between different suppliers. The DCIS architecture supports the plant automation, the alarm prioritization and alarm suppression, and uniform MMI screen for entire plant. The Test Program regarding the integration of different network architectures and Initial DCIS architecture Setup for 161KV Energization will be discussed. Test tool for improving site test schedule, and lessons learned from FAT will be discussed too. And conclusions are at the end of this paper. (authors)

  10. Disinfection Contact Time study plan (100-N Area tracer protocol). Revision 1

    International Nuclear Information System (INIS)

    Kretzschmar, S.P.; Bedi, G.S.; Martinez, P.; Ervin, K.

    1996-07-01

    Bechtel Hanford, Inc. will prepare an Engineering Tracer Study Protocol for the determination of contact time for the disinfection process at Group A Non-transient Non-community water treatment plant for the 100-N Water Plant at the Hanford Site in Richland, Washington. Included in this report are the results of a study that determine the actual detention time within the plant clearwell, and thus the disinfection contact time at several clearwell effluent flow rates

  11. Evaluation of sexual history-based screening of anatomic sites for chlamydia trachomatis and neisseria gonorrhoeae infection in men having sex with men in routine practice

    Directory of Open Access Journals (Sweden)

    Jansen Casper L

    2011-07-01

    Full Text Available Abstract Background Sexually transmitted infection (STI screening programmes are implemented in many countries to decrease burden of STI and to improve sexual health. Screening for Chlamydia trachomatis and Neisseria gonorrhoeae has a prominent role in these protocols. Most of the screening programmes concerning men having sex with men (MSM are based on opportunistic urethral testing. In The Netherlands, a history-based approach is used. The aim of this study is to evaluate the protocol of screening anatomic sites for C. trachomatis and N. gonorrhoeae infection based on sexual history in MSM in routine practice in The Netherlands. Methods All MSM visiting the clinic for STI in The Hague are routinely asked about their sexual practice during consulting. As per protocol, tests for urogenital, oropharyngeal and anorectal infection are obtained based on reported site(s of sexual contact. All consultations are entered into a database as part of the national STI monitoring system. Data of an 18 months period were retrieved from this database and analysed. Results A total of 1455 consultations in MSM were registered during the study period. The prevalence of C. trachomatis and N. gonorrhoeae per anatomic site was: urethral infection 4.0% respectively and 2.8%, oropharynx 1.5% and 4.2%, and anorectum 8.2% and 6.0%. The majority of chlamydia cases (72% involved a single anatomic site, which was especially manifest for anorectal infections (79%, while 42% of gonorrhoea cases were single site. Twenty-six percent of MSM with anorectal chlamydia and 17% with anorectal gonorrhoea reported symptoms of proctitis; none of the oropharyngeal infections were symptomatic. Most cases of anorectal infection (83% and oropharyngeal infection (100% would have remained undiagnosed with a symptom-based protocol. Conclusions The current strategy of sexual-history based screening of multiple anatomic sites for chlamydia and gonorrhoea in MSM is a useful and valid guideline

  12. Study protocol for the Cities Changing Diabetes programme: a global mixed-methods approach.

    Science.gov (United States)

    Napier, A David; Nolan, John J; Bagger, Malene; Hesseldal, Louise; Volkmann, Anna-Maria

    2017-11-08

    Urban living has been shown to affect health in various ways. As the world is becoming more urbanised and almost two-thirds of people with diabetes now live in cities, research into the relationship between urban living, health and diabetes is key to improving the lives of many. The majority of people with diabetes have type 2 diabetes, a subset linked to overweight and obesity, decreased physical activity and unhealthy diets. Diabetes has significant consequences for those living with the condition as well as their families, relationships and wider society. Although care and management are improving, complications remain common, and diabetes is among the leading causes of vision loss, amputation, neuropathy and renal and cardiovascular disease worldwide. We present a research protocol for exploring the drivers of type 2 diabetes and its complications in urban settings through the Cities Changing Diabetes (CCD) partnership programme. A global study protocol is implemented in eight collaborating CCD partner cities. In each city, academic institutions, municipal representatives and local stakeholders collaborate to set research priorities and plan implementation of findings. Local academic teams execute the study following the global study protocol presented here. A quantitative Rule of Halves analysis obtains measures of the magnitude of the diabetes burden, the diagnosis rates in each city and the outcomes of care. A qualitative Diabetes Vulnerability Assessment explores the urban context in vulnerability to type 2 diabetes and identifies social factors and cultural determinants relevant to health, well-being and diabetes. The protocol steers the collection of primary and secondary data across the study sites. Research ethics board approval has been sought and obtained in each site. Findings from each of the local studies as well as the result from combined multisite (global) analyses will be reported in a series of core scientific journal papers. © Article author

  13. Towards a protocol for the assessment of site-specific human health risks for consumption of vegetables from contaminated sites

    NARCIS (Netherlands)

    Swartjes FA; Dirven-van Breemen EM; Otte PF; Beelen P van; Rikken MGJ; Tuinstra J; Spijker J; Lijzen JPA; LER

    2007-01-01

    RIVM has developed an approach which allows human health risks of vegetable consumption from contaminated sites to be assessed. A tiered approach was used to guarantee the scientific basis and efficient use in practice. The underlying principle is: simple when possible and complex when necessary. If

  14. A Cryptographic Moving-Knife Cake-Cutting Protocol

    Directory of Open Access Journals (Sweden)

    Yoshifumi Manabe

    2012-02-01

    Full Text Available This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum.

  15. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... active and adaptive corruptions in the random oracle model. Due to its simplicity, the protocol is extremely efficient and it allows to perform m 1-out-of-n OTs using only: - Computation: (n+1)m+2 exponentiations (mn for the receiver, mn+2 for the sender) and - Communication: 32(m+1) bytes (for the group...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  16. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  17. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  18. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  19. Results of ERAS protocol in patients with colorectal cancer

    Directory of Open Access Journals (Sweden)

    A. O. Rasulov

    2016-01-01

    Full Text Available Objective: explore the use of enhanced recovery after surgery (ERAS in the treatment of patients with colorectal cancer, evaluate its efficacy and safety.Materials and methods. Prospective, single-site, randomized study for the implementation of enhanced recovery after surgery in patients with colorectal cancer has been conducted from October 2014 till the present time. All patients after laparoscopic surgeries undergo treatment according to ERAS protocol, patients after open surgeries are randomized (1:1 in groups of the standard treatment or treatment according to ERAS protocol. The study included patients with localized and locally disseminated colorectal cancer aged from 18 to 75 years, ECOG score ≤ 2. The primary evaluated parameters were the following: the number of postoperative complications (according to Clavien– Dindo classification, postoperative hospital days, incidence of complications and mortality in the 30-day period, timing of activation.Results. Up to date, the study includes 105 patients: laparoscopic group – 51 patients, open-surgery group of patients treated by ERAS protocol – 27 patients, open-surgery group of patients with the standard post-op treatment – 26 patients. Complications requiring emergency surgery for anastomotic leak (p = 0.159 developed in 3.7 % of patients with the standard post-op treatment and in 3.9 % of patients after laparoscopic surgery, while 1 patient required repeat hospitalization. The total number of complications was significantly lower in opensurgery group of patients treated by ERAS protocol compared with the standard post-op treatment (p = 0.021. However, there were no differences between laparoscopic and open-surgery group with the standard post-op treatment (p = 0.159. An average hospitalization stay in patients with the standard post-op treatment was equal to 10 days compared to 7 days in patients treated by ERAS protocol (p = 0.067 and 6 days after laparoscopic

  20. Asymptotic adaptive bipartite entanglement-distillation protocol

    International Nuclear Information System (INIS)

    Hostens, Erik; Dehaene, Jeroen; De Moor, Bart

    2006-01-01

    We present an asymptotic bipartite entanglement-distillation protocol that outperforms all existing asymptotic schemes. This protocol is based on the breeding protocol with the incorporation of two-way classical communication. Like breeding, the protocol starts with an infinite number of copies of a Bell-diagonal mixed state. Breeding can be carried out as successive stages of partial information extraction, yielding the same result: one bit of information is gained at the cost (measurement) of one pure Bell state pair (ebit). The basic principle of our protocol is at every stage to replace measurements on ebits by measurements on a finite number of copies, whenever there are two equiprobable outcomes. In that case, the entropy of the global state is reduced by more than one bit. Therefore, every such replacement results in an improvement of the protocol. We explain how our protocol is organized as to have as many replacements as possible. The yield is then calculated for Werner states

  1. Protocol for Bone Augmentation with Simultaneous Early Implant Placement: A Retrospective Multicenter Clinical Study

    Directory of Open Access Journals (Sweden)

    Peter Fairbairn

    2015-01-01

    Full Text Available Purpose. To present a novel protocol for alveolar bone regeneration in parallel to early implant placement. Methods. 497 patients in need of extraction and early implant placement with simultaneous bone augmentation were treated in a period of 10 years. In all patients the same specific method was followed and grafting was performed utilizing in situ hardening fully resorbable alloplastic grafting materials consisting of β-tricalcium phosphate and calcium sulfate. The protocol involved atraumatic extraction, implant placement after 4 weeks with simultaneous bone augmentation, and loading of the implant 12 weeks after placement and grafting. Follow-up periods ranged from 6 months to 10 years (mean of 4 years. Results. A total of 601 postextraction sites were rehabilitated in 497 patients utilizing the novel protocol. Three implants failed before loading and three implants failed one year after loading, leaving an overall survival rate of 99.0%. Conclusions. This standardized protocol allows successful long-term functional results regarding alveolar bone regeneration and implant rehabilitation. The concept of placing the implant 4 weeks after extraction, augmenting the bone around the implant utilizing fully resorbable, biomechanically stable, alloplastic materials, and loading the implant at 12 weeks seems to offer advantages when compared with traditional treatment modalities.

  2. Dose-response relationship between cigarette smoking and site-specific cancer risk: protocol for a systematic review with an original design combining umbrella and traditional reviews.

    Science.gov (United States)

    Lugo, Alessandra; Bosetti, Cristina; Peveri, Giulia; Rota, Matteo; Bagnardi, Vincenzo; Gallus, Silvano

    2017-11-01

    Only a limited number of meta-analyses providing risk curve functions of dose-response relationships between various smoking-related variables and cancer-specific risk are available. To identify all relevant original publications on the issue, we will conduct a series of comprehensive systematic reviews based on three subsequent literature searches: (1) an umbrella review, to identify meta-analyses, pooled analyses and systematic reviews published before 28 April 2017 on the association between cigarette smoking and the risk of 28 (namely all) malignant neoplasms; (2) for each cancer site, an updated review of original publications on the association between cigarette smoking and cancer risk, starting from the last available comprehensive review identified through the umbrella review; and (3) a review of all original articles on the association between cigarette smoking and site-specific cancer risk included in the publications identified through the umbrella review and the updated reviews. The primary outcomes of interest will be (1) the excess incidence/mortality of various cancers for smokers compared with never smokers; and (2) the dose-response curves describing the association between smoking intensity, duration and time since stopping and incidence/mortality for various cancers. For each cancer site, we will perform a meta-analysis by pooling study-specific estimates for smoking status. We will also estimate the dose-response curves for other smoking-related variables through random-effects meta-regression models based on a non-linear dose-response relationship framework. Ethics approval is not required for this study. Main results will be published in peer-reviewed journals and will also be included in a publicly available website. We will provide therefore the most complete and updated estimates on the association between various measures of cigarette smoking and site-specific cancer risk. This will allow us to obtain precise estimates on the cancer burden

  3. ASSESSMENT OF RIP-V1 AND OSPF-V2 PROTOCOL WITH CONSIDERATION OF CONVERGENCE CRITERIA AND SENDING PROTOCOLS TRAFFIC

    Directory of Open Access Journals (Sweden)

    Hamed Jelodar

    2014-03-01

    Full Text Available Routing Protocols are underlying principles in networks like internet, transport and mobile. Routing Protocols include a series of rules and algorithms that consider routing metric and select the best way for sending healthy data packets from origin to destination. Dynamic routing protocol compatible to topology has a changeable state. RIP and OSPF are dynamic routing protocol that we consider criteria like convergence and sending protocols traffic assessment RIP first version and OSPF second version. By the test we have done on OPNET stimulation we understood that the OSPF protocol was more efficient than RIP protocol.

  4. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols.

    Science.gov (United States)

    Campagne, Fabien

    2008-02-29

    The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79-0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86-0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these protocols can fully substitute

  5. Effects of glyphosate on the mineral content of glyphosate-resistant soybeans (Glycine max).

    Science.gov (United States)

    Duke, Stephen O; Reddy, Krishna N; Bu, Kaixuan; Cizdziel, James V

    2012-07-11

    There are conflicting claims as to whether treatment with glyphosate adversely affects mineral nutrition of glyphosate-resistant (GR) crops. Those who have made claims of adverse effects have argued links between reduced Mn and diseases in these crops. This article describes experiments designed to determine the effects of a recommended rate (0.86 kg ha(-1)) of glyphosate applied once or twice on the mineral content of young and mature leaves, as well as in seeds produced by GR soybeans (Glycine max) in both the greenhouse and field using inductively coupled plasma mass spectrometry (ICP-MS). In the greenhouse, there were no effects of either one application (at 3 weeks after planting, WAP) or two applications (at 3 and 6 WAP) of glyphosate on Ca, Mg, Mn, Zn, Fe, Cu, Sr, Ba, Al, Cd, Cr, Co, or Ni content of young or old leaves sampled at 6, 9, and 12 WAP and in harvested seed. Se concentrations were too low for accurate detection in leaves, but there was also no effect of glyphosate applications on Se in the seeds. In the field study, there were no effects of two applications (at 3 and 6 WAP) of glyphosate on Ca, Mg, Mn, Zn, Fe, Cu, Sr, Ba, Al, Cd, Cr, Co, or Ni content of young or old leaves at either 9 or 12 WAP. There was also no effect on Se in the seeds. There was no difference in yield between control and glyphosate-treated GR soybeans in the field. The results indicate that glyphosate does not influence mineral nutrition of GR soybean at recommended rates for weed management in the field. Furthermore, the field studies confirm the results of greenhouse studies.

  6. Performance Demonstration Program Plan for RCRA Constituent Analysis of Solidified Wastes

    International Nuclear Information System (INIS)

    2006-01-01

    The Performance Demonstration Program (PDP) for Resource Conservation and Recovery Act (RCRA) constituents distributes test samples for analysis of volatile organic compounds (VOCs), semivolatile organic compounds (SVOCs), and metals in solid matrices. Each distribution of test samples is termed a PDP cycle. These evaluation cycles provide an objective measure of the reliability of measurements performed for transuranic (TRU) waste characterization. The primary documents governing the conduct of the PDP are the Quality Assurance Program Document (QAPD; DOE/CBFO-94-1012) and the Waste Isolation Pilot Plant (WIPP) Waste Analysis Plan (WAP) contained in the Hazardous Waste Facility Permit (NM4890139088-TSDF) issued by the New Mexico Environment Department. The WAP requires participation in the PDP; the PDP must comply with the QAPD and the WAP. This plan implements the general requirements of the QAPD and the applicable requirements of the WAP for the RCRA PDP. Participating laboratories demonstrate acceptable performance by successfully analyzing single-blind performance evaluation samples (subsequently referred to as PDP samples) according to the criteria established in this plan. PDP samples are used as an independent means to assess laboratory performance regarding compliance with the WAP quality assurance objectives (QAOs). The concentrations of analytes in the PDP samples address levels of regulatory concern and encompass the range of concentrations anticipated in waste characterization samples. The WIPP requires analyses of homogeneous solid wastes to demonstrate compliance with regulatory requirements. These analyses must be performed by laboratories that demonstrate acceptable performance in this PDP. These analyses are referred to as WIPP analyses, and the samples on which they are performed are referred to as WIPP samples. Participating laboratories must analyze PDP samples using the same procedures used for WIPP samples.

  7. [Catheter-associated bloodstream infections: implementation of a new consensus protocol].

    Science.gov (United States)

    Urrea Ayala, M; Rozas Quesada, L

    2009-07-01

    Catheter-associated bloodstream infection is highly prevalent and often associated with fatal complications. Some studies have shown that applying preventive interventions could help to reduce and control this type of infection. To determine whether a new consensus protocol for the manipulation and maintenance of central venous catheters would decrease catheter-associated bloodstream infections (CA-BSIs) in paediatric patients. To evaluate its compliance in intensive care units. Prospective study in the paediatric (PICU) and neonatal (NICU) intensive cares units, haematology, oncology and hospital wards in a Maternal and Paediatric reference Hospital in Barcelona. The study period is divided into two periods: before (first semester) and after the start of the new protocol (second semester) in 2007. The most important changes have been the insertion of the hermetic connection in the proximal and distal site (between the line and the syringe) of the central venous catheter (CVC), the labelling of the medication line and the CVC with the date of placement. A check-list to evaluate compliance was introduced in both intensive care units (paediatrics and neonatal) during the second study period. The rates of bloodstream infection per 1000 catheter-days were assessed. The rate of bloodstream infections per 1000 catheter-days before and after the start of the new protocol was 5.7 and 4.9 in PICU; 24.6 and 18.0 in NICU; 7.6 and 4.6 in haematology-oncology, and 11.9 and 10.3 in hospital wards. As regards compliance to the protocol, we found that proximal sealed connectors were used in more than 95% of the cases and up to 85% of the central venous catheter were labelled with the insertion date in both intensive care units. A consensus protocol for the use and maintenance of central venous catheters and healthcare worker training helped to control the rate of CA-BSIs. We reaffirm the importance of epidemiological surveillance as a measure for controlling nosocomial infections.

  8. Hearing screening procedures and protocols in use at immunisation clinics in South Africa

    Directory of Open Access Journals (Sweden)

    Luisa Petrocchi-Bartal

    2014-12-01

    Full Text Available Background: There exists a need for context-relevant research aimed at facilitating the efficacious provision of early hearing detection and intervention services in South Africa. Objectives: This study aimed to determine the hearing screening procedures and protocols as well as referral protocols in use at maternal child woman’s health (MCWH immunisation clinics in South Africa. Method: Thirty primary health care immunisation clinic managers or acting managers were interviewed in two South African sample groups. An exploratory, non-experimental,qualitative research design was employed incorporating both quantitative and qualitative information. An interview using a questionnaire was administered with all participants. The questionnaire encompassed areas such as work contexts, hearing screening contexts and information management systems, as well as quality control measures in place at these clinics.Content analysis was then used to code emergent themes into specific categories. Frequency calculations of these themes were calculated and results described qualitatively. Results: No primary health care (PHC clinics placed within the identified sites provided formalised new-born/infant hearing screening and none of these facilities had equipment to do so. Most sites attributed the lack of formalised hearing screening to budgetary and human resource issues, staff training in particular. Non-formalised hearing screening protocols in place demonstrated inconsistencies in application across districts and none complied with Health Professions Council of South Africa (HPCSA clinic guidelines or any international guidelines. Conclusion: Results from the current study have assisted in identifying procedural and logistical assets and barriers to implementation of HPCSA clinic guidelines for early hearing detection and intervention (EHDI at immunisation clinics in South Africa.

  9. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  10. Indicators and measurement tools for health system integration : a knowledge synthesis protocol

    OpenAIRE

    Oelke, Nelly Donszelmann; Suter, Esther; Lima, Maria Alice Dias da Silva; Vliet-Brown, Cheryl Van

    2015-01-01

    Background: Health system integration is a key component of health system reform with the goal of improving outcomes for patients, providers, and the health system. Although health systems continue to strive for better integration, current delivery of health services continues to be fragmented. A key gap in the literature is the lack of information on what successful integration looks like and how to measure achievement towards an integrated system. This multi-site study protocol builds on a ...

  11. [Computerized clinical protocol for occlusion].

    Science.gov (United States)

    Salsench, J; Ferrer, J; Nogueras, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself. In this work we all data collected in the protocol and we give the explanations of each concept.

  12. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  13. Measurement exercise at the Fort de Vaujours on 25 February 2014. Reading of measurements performed by the ACRO according to the requirements of the IRSN PRP-CRI/SIAR 14-00093 technical protocol

    International Nuclear Information System (INIS)

    Pigree, G.; Josset, M.; Barbey, P.

    2014-01-01

    This document reports radiological measurements performed on the request of the ASN Paris department on some singular points and according to a specific technical protocol elaborated by the IRSN. After a discussion of results, the report presents instruments used for radiological measurements, reference values issued from other sites, reference values at a point of entrance of the site and at the vicinity of singular points, and then measurements on singular points. Additional measurements have been performed on a radioactive fragment at the origin of some offsets. The text of the IRSN technical protocol for this specific study (scope, areas to be controlled, expected radioactive elements, technical protocol, result presentation) is provided in appendix

  14. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  15. Group covariant protocols for quantum string commitment

    International Nuclear Information System (INIS)

    Tsurumaru, Toyohiro

    2006-01-01

    We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next using this result, we prove that for every irreducible representation of a finite group, there always exists a corresponding nontrivial QSC protocol which reaches a level of security impossible to achieve classically

  16. Families of quantum fingerprinting protocols

    Science.gov (United States)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  17. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  18. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  19. Effectiveness of oxaliplatin desensitization protocols.

    Science.gov (United States)

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  20. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  1. Surface and subsurface characterization of uranium contamination at the Fernald environmental management site

    International Nuclear Information System (INIS)

    Schilk, A.J.; Perkins, R.W.; Abel, K.H.; Brodzinski, R.L.

    1993-04-01

    The past operations of uranium production and support facilities at several Department of Energy (DOE) sites have occasionally resulted in the local contamination of some surface and subsurface soils, and the three-dimensional distribution of the uranium at these sites must be thoroughly characterized before any effective remedial protocols can be established. To this end, Pacific Northwest Laboratory (PNL) has been tasked by the DOE's Office of Technology Development with adapting, developing, and demonstrating technologies for the measurement of uranium in surface and subsurface soils at the Fernald Uranium in Soils Integrated Demonstration site. These studies are detailed in this report

  2. Phase Transition in Protocols Minimizing Work Fluctuations

    Science.gov (United States)

    Solon, Alexandre P.; Horowitz, Jordan M.

    2018-05-01

    For two canonical examples of driven mesoscopic systems—a harmonically trapped Brownian particle and a quantum dot—we numerically determine the finite-time protocols that optimize the compromise between the standard deviation and the mean of the dissipated work. In the case of the oscillator, we observe a collection of protocols that smoothly trade off between average work and its fluctuations. However, for the quantum dot, we find that as we shift the weight of our optimization objective from average work to work standard deviation, there is an analog of a first-order phase transition in protocol space: two distinct protocols exchange global optimality with mixed protocols akin to phase coexistence. As a result, the two types of protocols possess qualitatively different properties and remain distinct even in the infinite duration limit: optimal-work-fluctuation protocols never coalesce with the minimal-work protocols, which therefore never become quasistatic.

  3. Surface and subsurface cleanup protocol for radionuclides, Gunnison, Colorado, UMTRA project processing site: Final

    International Nuclear Information System (INIS)

    1994-01-01

    Thorium 230 (Th-230) at the Gunnison, Colorado processing site will require remediation, however, a seasonally fluctuating groundwater table at the site significantly complicates conventional remedial action with respect to cleanup. Therefore, to effectively remediate the site with respect to Radium 226 (Ra-226) and Th-230, the following supplemental standard is proposed: In situ Ra-26 will be remediated to the EPA soil cleanup standards independent of groundwater considerations. In situ Th-230 concentrations will be remediated in the region above the encountered water table so the 1000-year projected Ra-226 concentration complies with the EPA soil cleanup concentration limits. If elevated Th-230 persists to the water table, an additional foot of excavation will be performed and the grid will be backfilled. Excavated grids will be backfilled to the final remedial action grade with clean cobbly soil. Final grid verification that is required below the water table will be performed by extracting and analyzing a single bulk soil sample with the bucket of a backhoe. Modeled surface radon flux values will be estimated and documented. A recommendation will be made that land records should be annotated to identify the presence of residual Th-230

  4. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  5. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  6. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    Science.gov (United States)

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  7. Maximally efficient protocols for direct secure quantum communication

    Energy Technology Data Exchange (ETDEWEB)

    Banerjee, Anindita [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); Department of Physics and Center for Astroparticle Physics and Space Science, Bose Institute, Block EN, Sector V, Kolkata 700091 (India); Pathak, Anirban, E-mail: anirban.pathak@jiit.ac.in [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); RCPTM, Joint Laboratory of Optics of Palacky University and Institute of Physics of Academy of Science of the Czech Republic, Faculty of Science, Palacky University, 17. Listopadu 12, 77146 Olomouc (Czech Republic)

    2012-10-01

    Two protocols for deterministic secure quantum communication (DSQC) using GHZ-like states have been proposed. It is shown that one of these protocols is maximally efficient and that can be modified to an equivalent protocol of quantum secure direct communication (QSDC). Security and efficiency of the proposed protocols are analyzed and compared. It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. Maximally efficient QSDC protocols are shown to be more efficient than their DSQC counterparts. This additional efficiency arises at the cost of message transmission rate. -- Highlights: ► Two protocols for deterministic secure quantum communication (DSQC) are proposed. ► One of the above protocols is maximally efficient. ► It is modified to an equivalent protocol of quantum secure direct communication (QSDC). ► It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. ► Efficient QSDC protocols are always more efficient than their DSQC counterparts.

  8. Physical Therapy Protocols for Arthroscopic Bankart Repair.

    Science.gov (United States)

    DeFroda, Steven F; Mehta, Nabil; Owens, Brett D

    Outcomes after arthroscopic Bankart repair can be highly dependent on compliance and participation in physical therapy. Additionally, there are many variations in physician-recommended physical therapy protocols. The rehabilitation protocols of academic orthopaedic surgery departments vary widely despite the presence of consensus protocols. Descriptive epidemiology study. Level 3. Web-based arthroscopic Bankart rehabilitation protocols available online from Accreditation Council for Graduate Medical Education (ACGME)-accredited orthopaedic surgery programs were included for review. Individual protocols were reviewed to evaluate for the presence or absence of recommended therapies, goals for completion of ranges of motion, functional milestones, exercise start times, and recommended time to return to sport. Thirty protocols from 27 (16.4%) total institutions were identified out of 164 eligible for review. Overall, 9 (30%) protocols recommended an initial period of strict immobilization. Variability existed between the recommended time periods for sling immobilization (mean, 4.8 ± 1.8 weeks). The types of exercises and their start dates were also inconsistent. Goals to full passive range of motion (mean, 9.2 ± 2.8 weeks) and full active range of motion (mean, 12.2 ± 2.8 weeks) were consistent with other published protocols; however, wide ranges existed within the reviewed protocols as a whole. Only 10 protocols (33.3%) included a timeline for return to sport, and only 3 (10%) gave an estimate for return to game competition. Variation also existed when compared with the American Society of Shoulder and Elbow Therapists' (ASSET) consensus protocol. Rehabilitation protocols after arthroscopic Bankart repair were found to be highly variable. They also varied with regard to published consensus protocols. This discrepancy may lead to confusion among therapists and patients. This study highlights the importance of attending surgeons being very clear and specific with

  9. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  10. Protocol between the Nuclear Protection and Safety Bureau of Portugal and the Nuclear Energy Commission of Spain on Technical Information concerning Nuclear Installations in Border Areas

    International Nuclear Information System (INIS)

    1980-01-01

    This Protocol was concluded under the Agreement of the same date on the safety of nuclear installations in border areas. Its purpose is to prescribe the type of information referred to in the Agreement. It lays down in detail all the documents to be supplied concerning the siting, construction, operation and decommissioning of nuclear installations, including the geological, seismological, meteorological, hydrological and ecological aspects of the sites concerned, for purposes of environmental protection; the characteristics of the projected installations and emergency plans must also be provided. Similarly to the Agreement, this Protocol will remain in force for a period of ten years. (NEA) [fr

  11. Welfare Quality assessment protocol for laying hens = Welfare Quality assessment protocol voor leghennen

    NARCIS (Netherlands)

    Niekerk, van T.G.C.M.; Gunnink, H.; Reenen, van C.G.

    2012-01-01

    Results of a study on the Welfare Quality® assessment protocol for laying hens. It reports the development of the integration of welfare assessment as scores per criteria as well as simplification of the Welfare Quality® assessment protocol. Results are given from assessment of 122 farms.

  12. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  13. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  14. Characterization of projected DWPF glasses heat treated to simulate canister centerline cooling

    International Nuclear Information System (INIS)

    Marra, S.L.; Jantzen, C.M.

    1992-05-01

    Liquid high-level nuclear waste will be immobilized at the Savannah River Site (SRS) by vitrification in borosilicate glass. The glass will be produced and poured into stainless steel canisters in the Defense Waste Processing Facility (DWPF). Eventually these canistered waste forms will be sent to a geologic repository for final disposal. In order to assure acceptability by the repository, the Department of Energy has defined requirements which DWPF canistered waste forms must meet. These requirements are the Waste Acceptance Preliminary Specifications (WAPS). The WAPS require DWPF to identify the crystalline phases expected to be present in the final glass product. Knowledge of the thermal history of the borosilicate glass during filling and cooldown of the canister is necessary to determine the amount and type of crystalline phases present in the final glass product. Glass samples of seven projected DWPF compositions were cooled following the same temperature profile as that of glass at the centerline of the full-scale DWPF canister. The glasses were characterized by x-ray diffraction and scanning electron microscopy to identify the crystalline phases present The volume percents of each crystalline phase present were determined by quantitative x-ray diffraction. The Product Consistency Test (PCI) was used to determine the durability of the heat-treated glasses

  15. Additional protocol between France, EURATOM and IAEA. 2001-2002 ordinary session. Project of law authorizing the ratification of the additional protocol to the agreement between France, the European Atomic Energy Community and the International Atomic Energy Agency relative to the application of warranties in France

    International Nuclear Information System (INIS)

    2002-01-01

    This additional protocol to the agreement between France, EURATOM and the IAEA aims at reinforcing the nuclear weapons non-proliferation regime. This protocol widens the field of competences of the IAEA with the supply of new information relative to: the civil nuclear cooperation between France and countries having no nuclear weapons in the domain of fuel cycle; the regular inspection of French nuclear facilities; the trade (import and export) of medium- or high-level radioactive wastes containing plutonium, highly enriched uranium or 233 U, and the trade of some non-nuclear equipments or materials with countries having no nuclear weapons. The protocol defines also some practical dispositions relative to the delays and periodicity of controls, to the transmission of data, to the appointment of IAEA inspectors and their access to the facilities and sites considered. The list of the activities and equipments covered by the protocol are given in appendixes. (J.S.)

  16. Universally composable protocols with relaxed set-up assumptions

    DEFF Research Database (Denmark)

    Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus

    2004-01-01

    A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally composable (UC) protocols provide this guarantee in a strong sense: A protocol remains secure even when composed concurrently with an unbounded number of ...

  17. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  18. Integrated Assessment and Improvement of the Quality Assurance System for the Cosworth Casting Process

    Science.gov (United States)

    Yousif, Dilon

    The purpose of this study was to improve the Quality Assurance (QA) System at the Nemak Windsor Aluminum Plant (WAP). The project used Six Sigma method based on Define, Measure, Analyze, Improve, and Control (DMAIC). Analysis of in process melt at WAP was based on chemical, thermal, and mechanical testing. The control limits for the W319 Al Alloy were statistically recalculated using the composition measured under stable conditions. The "Chemistry Viewer" software was developed for statistical analysis of alloy composition. This software features the Silicon Equivalency (SiBQ) developed by the IRC. The Melt Sampling Device (MSD) was designed and evaluated at WAP to overcome traditional sampling limitations. The Thermal Analysis "Filters" software was developed for cooling curve analysis of the 3XX Al Alloy(s) using IRC techniques. The impact of low melting point impurities on the start of melting was evaluated using the Universal Metallurgical Simulator and Analyzer (UMSA).

  19. Hypoxia- and radiation-inducible, breast cell-specific targeting of retroviral vectors

    International Nuclear Information System (INIS)

    Lipnik, Karoline; Greco, Olga; Scott, Simon; Knapp, Elzbieta; Mayrhofer, Elisabeth; Rosenfellner, Doris; Guenzburg, Walter H.; Salmons, Brian; Hohenadl, Christine

    2006-01-01

    To facilitate a more efficient radiation and chemotherapy of mammary tumours, synthetic enhancer elements responsive to hypoxia and ionizing radiation were coupled to the mammary-specific minimal promoter of the murine whey acidic protein (WAP) encoding gene. The modified WAP promoter was introduced into a retroviral promoter conversion (ProCon) vector. Expression of a transduced reporter gene in response to hypoxia and radiation was analysed in stably infected mammary cancer cell lines and an up to 9-fold increase in gene expression demonstrated in comparison to the respective basic vector. Expression analyses in vitro, moreover, demonstrated a widely preserved mammary cell-specific promoter activity. For in vivo analyses, xenograft tumours consisting of infected human mammary adenocarcinoma cells were established in SCID/beige mice. Immunohistochemical analyses demonstrated a hypoxia-specific, markedly increased WAP promoter-driven expression in these tumours. Thus, this retroviral vector will facilitate a targeted gene therapeutic approach exploiting the unique environmental condition in solid tumours

  20. Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems

    Science.gov (United States)

    Une, Masashi; Otsuka, Akira; Imai, Hideki

    This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wolf attack with one wolf sample. In this paper, we give a rigorous definition of the new security measure which gives strength estimation of an individual biometric authentication system against impersonation attacks. We show that if one reestimates using our WAP measure, a typical fingerprint algorithm turns out to be much weaker than theoretically estimated by Ratha et al. Moreover, we apply the wolf attack to a finger-vein-pattern based algorithm. Surprisingly, we show that there exists an extremely strong wolf which falsely matches all templates for any threshold value.

  1. Architecture and Fault Identification of Wide-area Protection System

    Directory of Open Access Journals (Sweden)

    Yuxue Wang

    2012-09-01

    Full Text Available Wide-area protection system (WAPS is widely studied for the purpose of improvng the performance of conventional backup protection. In this paper, the system architecture of WAPS is proposed and its key technologies are discussed in view of engineering projects. So a mixed structurecentralized-distributed structure which is more suitable for WAPS in limited power grid region, is obtained based on the advantages of the centralized structure and distributed structure. Furthermore, regional distance protection algorithm was taken as an example to illustrate the functions of the constituent units. Faulted components can be detected based on multi-source imformation fuse in the algorithm. And the algorithm cannot only improve the selectivity, the rapidity, and the reliability of relaying protection but also has high fault tolerant capability. A simulation of 220 kV grid systems in Easter Hubei province shows the effectiveness of the wide-area protection system presented by this paper.

  2. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  3. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  4. Geographical variations in the prevalence of atopic sensitization in six study sites across Canada

    DEFF Research Database (Denmark)

    Chan-Yeung, M; Anthonisen, N R; Becklake, M R

    2010-01-01

    Geographical variations in atopic sensitization in Canada have not been described previously. This study used the standardized protocol of the European Community Respiratory Health Survey-1 (ECRHS-1) to investigate the distribution and predictors of atopic sensitization in six sites across Canada...

  5. Design, Implementation, and Verification of the Reliable Multicast Protocol. Thesis

    Science.gov (United States)

    Montgomery, Todd L.

    1995-01-01

    This document describes the Reliable Multicast Protocol (RMP) design, first implementation, and formal verification. RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service. RMP is fully and symmetrically distributed so that no site bears an undue portion of the communications load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These guarantees are selectable on a per message basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, a client/server model of delivery, mutually exclusive handlers for messages, and mutually exclusive locks. It has been commonly believed that total ordering of messages can only be achieved at great performance expense. RMP discounts this. The first implementation of RMP has been shown to provide high throughput performance on Local Area Networks (LAN). For two or more destinations a single LAN, RMP provides higher throughput than any other protocol that does not use multicast or broadcast technology. The design, implementation, and verification activities of RMP have occurred concurrently. This has allowed the verification to maintain a high fidelity between design model, implementation model, and the verification model. The restrictions of implementation have influenced the design earlier than in normal sequential approaches. The protocol as a whole has matured smoother by the inclusion of several different perspectives into the product development.

  6. Olkiluoto site description 2006

    International Nuclear Information System (INIS)

    Andersson, J.; Ahokas, H.; Hudson, J.A.

    2007-03-01

    subjective criteria are used for identifying faults; Regarding the rock mechanics description, presented in Chapter 5, additional data have been assessed and the overall level of rock mechanics understanding has increased compared with previous model versions; A new hydrogeological model has been developed, which is presented in Chapter 6, which places more emphasis on the hydraulic data. Pressure anomalies are now stronger drivers for including hydraulic zones in the model and the number of explicit uncertain cases is greater; The hydrogeochemical description, presented in Chapter 7, is consistent with the previous model and there is an increased level of internal consistency in the hydrogeochemical understanding. Information on gases and understanding of their origin has increased significantly. Based on these descriptions, the report also makes a second set of predictions in Chapter 9 concerning the expected geology and rock mechanics properties to be found during the excavation of the ONKALO and also predicts the hydrogeological and hydrogeochemical impacts of these excavations. Two types of predictions are made: type A predictions, that use only the latest version of the overall Site Model; and type B predictions, that also use all the data from the tunnel, which are derived from activities, such as tunnel mapping and Pilot holes. The Site Descriptive Modelling involves uncertainties and it is necessary to assess the confidence in such modelling. This has been assessed through special protocols in a technical auditing exercise, which is presented in Chapter 10. These protocols investigate whether all data have been considered and understood; where the uncertainties lie and what the potential is for alternative interpretations; whether there is sufficient consistency between disciplines and consistency with the past evolution of the site; as well as comparisons with previous model versions. Chapter 11 concludes that, overall, the uncertainty and confidence assessment

  7. [Protocols Related to Food Allergies and Intolerances in Preschools in Reykjavik, Iceland].

    Science.gov (United States)

    Thrastardottir, Adalheidur Ran; Thordardottir, Frida Run; Torfadottir, Johanna

    2018-01-01

    The aim of the study was to explore prevalence of food allergies and intolerances among children in preschools in Reykjavik, Iceland. Also, to investigate how well preschools maintain a safe environment for children with food allergies. In 2014, a questionnaire designed specifically for this study, was sent to 65 preschools. Forty-nine participated (75%) representing a total of 4225 children. Prevalence of food allergy and intolerance was determined based on medical certificates from physi-cians delivered to the preschools. Descriptive statistics were used to assess whether there were protocols related to food allergy, and if there was a difference between schools based on staff's education and number of children. The prevalence of documented food allergies/intolerances in children aged 2-6 years was 5%, 1% had severe allergy and 1% had multiple food allergies. Lactose intolerance was most frequent (2%), then milk allergy (2%) and egg allergy (1%). Only 41% preschools had a protocol that was activated if food with an allergen was accidentally given. Moreover, only 55% of preschools with children with severe -allergy reported all of their staff to have knowledge of symptoms related to anaphylaxis and only 64% were trained to respond to an anaphylactic shock. The education of preschool principals, kitchen employees and number of children in preschool were not related to having an active protocol at site. Prevalence of food allergy and intolerance was 5% in preschools in Reykjavik. Strategy for an active protocol related to food allergy was lacking in 59% of pre-schools.

  8. ZOOM or Non-ZOOM? Assessing Spinal Cord Diffusion Tensor Imaging Protocols for Multi-Centre Studies.

    Directory of Open Access Journals (Sweden)

    Rebecca S Samson

    Full Text Available The purpose of this study was to develop and evaluate two spinal cord (SC diffusion tensor imaging (DTI protocols, implemented at multiple sites (using scanners from two different manufacturers, one available on any clinical scanner, and one using more advanced options currently available in the research setting, and to use an automated processing method for unbiased quantification. DTI parameters are sensitive to changes in the diseased SC. However, imaging the cord can be technically challenging due to various factors including its small size, patient-related and physiological motion, and field inhomogeneities. Rapid acquisition sequences such as Echo Planar Imaging (EPI are desirable but may suffer from image distortions. We present a multi-centre comparison of two acquisition protocols implemented on scanners from two different vendors (Siemens and Philips, one using a reduced field-of-view (rFOV EPI sequence, and one only using options available on standard clinical scanners such as outer volume suppression (OVS. Automatic analysis was performed with the Spinal Cord Toolbox for unbiased and reproducible quantification of DTI metrics in the white matter. Images acquired using the rFOV sequence appear less distorted than those acquired using OVS alone. SC DTI parameter values obtained using both sequences at all sites were consistent with previous measurements made at 3T. For the same scanner manufacturer, DTI parameter inter-site SDs were smaller for the rFOV sequence compared to the OVS sequence. The higher inter-site reproducibility (for the same manufacturer and acquisition details, i.e. ZOOM data acquired at the two Philips sites of rFOV compared to the OVS sequence supports the idea that making research options such as rFOV more widely available would improve accuracy of measurements obtained in multi-centre clinical trials. Future multi-centre studies should also aim to match the rFOV technique and signal-to-noise ratios in all

  9. e-SCP-ECG+ Protocol: An Expansion on SCP-ECG Protocol for Health Telemonitoring—Pilot Implementation

    Directory of Open Access Journals (Sweden)

    George J. Mandellos

    2010-01-01

    Full Text Available Standard Communication Protocol for Computer-assisted Electrocardiography (SCP-ECG provides standardized communication among different ECG devices and medical information systems. This paper extends the use of this protocol in order to be included in health monitoring systems. It introduces new sections into SCP-ECG structure for transferring data for positioning, allergies, and five additional biosignals: noninvasive blood pressure (NiBP, body temperature (Temp, Carbon dioxide (CO2, blood oxygen saturation (SPO2, and pulse rate. It also introduces new tags in existing sections for transferring comprehensive demographic data. The proposed enhanced version is referred to as e-SCP-ECG+ protocol. This paper also considers the pilot implementation of the new protocol as a software component in a Health Telemonitoring System.

  10. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  11. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  12. Waste analysis plan for the 200 area effluent treatment facility and liquid effluent retention facility

    International Nuclear Information System (INIS)

    Ballantyne, N.A.

    1995-01-01

    This waste analysis plan (WAP) has been prepared for startup of the 200 Area Effluent Treatment Facility (ETF) and operation of the Liquid Effluent Retention Facility (LERF), which are located on the Hanford Facility, Richland, Washington. This WAP documents the methods used to obtain and analyze representative samples of dangerous waste managed in these units, and of the nondangerous treated effluent that is discharged to the State-Approved Land Disposal System (SALDS). Groundwater Monitoring at the SALDS will be addressed in a separate plan

  13. The scope of the Weatherization Assistance Program: The weatherized population and the resource base

    Energy Technology Data Exchange (ETDEWEB)

    Power, M.; Eisenberg, J.F.; Michels, E. (Economic Opportunity Research Inst., Washington, DC (United States)); Witherspoon, M.J. (National Association for State Community Service Programs, Washington, DC (United States)); Brown, M.A. (Oak Ridge National Lab., TN (United States))

    1992-05-01

    This study is one of five parts of the US Department of Energy's national evaluation of its Weatherization Assistance Program (WAP). It has three major goals: (1) to enumerate the size and sources of investment in low-income weatherization; (2) to provide a count of the number of low-income units weatherized by all weatherization programs and characterized the type and tenure of those homes; and (3) to document the extent to which the DOE/WAP funding has been expanded though use of external resources.

  14. The scope of the Weatherization Assistance Program: The weatherized population and the resource base

    Energy Technology Data Exchange (ETDEWEB)

    Power, M.; Eisenberg, J.F.; Michels, E. [Economic Opportunity Research Inst., Washington, DC (United States); Witherspoon, M.J. [National Association for State Community Service Programs, Washington, DC (United States); Brown, M.A. [Oak Ridge National Lab., TN (United States)

    1992-05-01

    This study is one of five parts of the US Department of Energy`s national evaluation of its Weatherization Assistance Program (WAP). It has three major goals: (1) to enumerate the size and sources of investment in low-income weatherization; (2) to provide a count of the number of low-income units weatherized by all weatherization programs and characterized the type and tenure of those homes; and (3) to document the extent to which the DOE/WAP funding has been expanded though use of external resources.

  15. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees.

    Science.gov (United States)

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-04-01

    A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  16. Large family of quantum weak coin-flipping protocols

    International Nuclear Information System (INIS)

    Mochon, Carlos

    2005-01-01

    Each classical public-coin protocol for coin flipping is naturally associated with a quantum protocol for weak coin flipping. The quantum protocol is obtained by replacing classical randomness with quantum entanglement and by adding a cheat detection test in the last round that verifies the integrity of this entanglement. The set of such protocols defines a family which contains the protocol with bias 0.192 previously found by the author, as well as protocols with bias as low as 1/6 described herein. The family is analyzed by identifying a set of optimal protocols for every number of messages. In the end, tight lower bounds for the bias are obtained which prove that 1/6 is optimal for all protocols within the family

  17. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  18. [Sampling and measurement methods of the protocol design of the China Nine-Province Survey for blindness, visual impairment and cataract surgery].

    Science.gov (United States)

    Zhao, Jia-liang; Wang, Yu; Gao, Xue-cheng; Ellwein, Leon B; Liu, Hu

    2011-09-01

    To design the protocol of the China nine-province survey for blindness, visual impairment and cataract surgery to evaluate the prevalence and main causes of blindness and visual impairment, and the prevalence and outcomes of the cataract surgery. The protocol design was began after accepting the task for the national survey for blindness, visual impairment and cataract surgery from the Department of Medicine, Ministry of Health, China, in November, 2005. The protocol in Beijing Shunyi Eye Study in 1996 and Guangdong Doumen County Eye Study in 1997, both supported by World Health Organization, was taken as the basis for the protocol design. The relative experts were invited to discuss and prove the draft protocol. An international advisor committee was established to examine and approve the draft protocol. Finally, the survey protocol was checked and approved by the Department of Medicine, Ministry of Health, China and Prevention Program of Blindness and Deafness, WHO. The survey protocol was designed according to the characteristics and the scale of the survey. The contents of the protocol included determination of target population and survey sites, calculation of the sample size, design of the random sampling, composition and organization of the survey teams, determination of the examinee, the flowchart of the field work, survey items and methods, diagnostic criteria of blindness and moderate and sever visual impairment, the measures of the quality control, the methods of the data management. The designed protocol became the standard and practical protocol for the survey to evaluate the prevalence and main causes of blindness and visual impairment, and the prevalence and outcomes of the cataract surgery.

  19. The Kyoto Protocol. An economic appraisal

    International Nuclear Information System (INIS)

    Grubb, M.

    2000-05-01

    This paper examines the overall economics of the Kyoto Protocol on climate change, in three main parts. The first part explores the structure of the Protocol and how this matches against classical economic criteria of an 'optimal' climate change agreement. This discussion also considers the nature of and reasons for shortcomings, and the prospects for its evolution. Given the various flexibilities in the agreement, the Kyoto Protocol is far more economically efficient in its structure than any previous global environmental agreement. The central conclusion is that, from an economic perspective, the Protocol's structure for industrialised country commitments is as good as could reasonably be expected. The second part of the paper explores more closely the economics of the commitments themselves and how they combine with the various flexibilities, briefly reviewing the available literature and using a simple spreadsheet model of how the commitments might combine with trading mechanisms under a range of assumptions. Flexibility is intrinsic and necessary, but it is argued that the allocations to Russia and Ukraine in particular mean that unlimited flexibility could render the Protocol's commitments weaker in their impacts than is economically desirable to address climate change. It is argued that, should this prove to be the case, access to the large surplus in the transition economies could be used as a control valve to limit the costs of the Protocol to within acceptable limits. Finally, the paper considers the issues of developing country involvement in the Kyoto Protocol, and the Protocol's longer-term impact and evolution, including its impact on technological evolution and dissemination and the evolution of future commitments. It is argued that taking account of such issues critically affects views of the Protocol

  20. Envisioning Transformation in VA Mental Health Services Through Collaborative Site Visits.

    Science.gov (United States)

    Kearney, Lisa K; Schaefer, Jeanne A; Dollar, Katherine M; Iwamasa, Gayle Y; Katz, Ira; Schmitz, Theresa; Schohn, Mary; Resnick, Sandra G

    2018-04-16

    This column reviews the unique contributions of multiple partners in establishing a standardized site visit process to promote quality improvement in mental health care at the Veterans Health Administration. Working as a team, leaders in policy and operations, staff of research centers, and regional- and facility-level mental health leaders developed a standardized protocol for evaluating mental health services at each site and using the data to help implement policy goals. The authors discuss the challenges experienced and lessons learned in this systemwide process and how this information can be part of a framework for improving mental health services on a national level.

  1. Additional protocol between France, EURATOM and IAEA. 2001-2002 ordinary session. Project of law authorizing the ratification of the additional protocol to the agreement between France, the European Atomic Energy Community and the International Atomic Energy Agency relative to the application of warranties in France; Protocole additionnel entre la France, Euratom et l'AIEA. Session ordinaire de 2001-2002. Projet de loi autorisant la ratification du protocole additionnel a l'accord entre la France, la Communaute europeenne de l'energie atomique et l'Agence internationale de l'energie atomique relatif a l'application de garanties en France

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-07-01

    This additional protocol to the agreement between France, EURATOM and the IAEA aims at reinforcing the nuclear weapons non-proliferation regime. This protocol widens the field of competences of the IAEA with the supply of new information relative to: the civil nuclear cooperation between France and countries having no nuclear weapons in the domain of fuel cycle; the regular inspection of French nuclear facilities; the trade (import and export) of medium- or high-level radioactive wastes containing plutonium, highly enriched uranium or {sup 233}U, and the trade of some non-nuclear equipments or materials with countries having no nuclear weapons. The protocol defines also some practical dispositions relative to the delays and periodicity of controls, to the transmission of data, to the appointment of IAEA inspectors and their access to the facilities and sites considered. The list of the activities and equipments covered by the protocol are given in appendixes. (J.S.)

  2. The influence of different contrast medium concentrations and injection protocols on quantitative and clinical assessment of FDG–PET/CT in lung cancer

    Energy Technology Data Exchange (ETDEWEB)

    Verburg, Frederik A., E-mail: fverburg@ukaachen.de [RWTH Aachen University Hospital, Department of Nuclear Medicine, Pauwelsstraße 30, 52074 Aachen (Germany); Maastricht University Medical Center, Department of Nuclear Medicine, P. Debyelaan 25, 6229 HX Maastricht (Netherlands); Kuhl, Christiane K. [RWTH Aachen University Hospital, Department of Diagnostic and Interventional Radiology, Pauwelsstraße 30, 52074 Aachen (Germany); Pietsch, Hubertus [Bayer Pharma AG, Berlin, Müllerstrasse 178, 13353 Berlin (Germany); Palmowski, Moritz [RWTH Aachen University Hospital, Department of Nuclear Medicine, Pauwelsstraße 30, 52074 Aachen (Germany); Mottaghy, Felix M. [RWTH Aachen University Hospital, Department of Nuclear Medicine, Pauwelsstraße 30, 52074 Aachen (Germany); Maastricht University Medical Center, Department of Nuclear Medicine, P. Debyelaan 25, 6229 HX Maastricht (Netherlands); Behrendt, Florian F. [RWTH Aachen University Hospital, Department of Nuclear Medicine, Pauwelsstraße 30, 52074 Aachen (Germany)

    2013-10-01

    Objectives: To compare the effects of two different contrast medium concentrations for use in computed X-ray tomography (CT) employing two different injection protocols on positron emission tomography (PET) reconstruction in combined 2-{sup 18}F-desoxyglucose (FDG) PET/CT in patients with a suspicion of lung cancer. Methods: 120 patients with a suspicion of lung cancer were enrolled prospectively. PET images were reconstructed with the non-enhanced and venous phase contrast CT obtained after injection of iopromide 300 mg/ml or 370 mg/ml using either a fixed-dose or a body surface area adapted injection protocol. Maximum and mean standardized uptake values (SUVmax and SUVmean) and contrast enhancement (HU) were determined in the subclavian vein, ascending aorta, abdominal aorta, inferior vena cava, portal vein, liver and kidney and in the suspicious lung lesion. PET data were evaluated visually for the presence of malignancy and image quality. Results: At none of the sites a significant difference in the extent of the contrast enhancement between the four different protocols was found. However, the variability of the contrast enhancement at several anatomical sites was significantly greater in the fixed dose groups than in the BSA groups for both contrast medium concentrations. At none of the sites a significant difference was found in the extent of the SUVmax and SUVmean increase as a result of the use of the venous phase contrast enhanced CT for attenuation. Visual clinical evaluation of lesions showed no differences between contrast and non-contrast PET/CT (P = 0.32). Conclusions: Contrast enhanced CT for attenuation correction in combined PET/CT in lung cancer affects neither the clinical assessment nor image quality of the PET-images. A body surface adapted contrast medium protocol reduces the interpatient variability in contrast enhancement.

  3. Annual Site Environmental Report: 2015 (ASER) for the SLAC National Accelerator Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Sabba, Dellilah [SLAC National Accelerator Lab., Menlo Park, CA (United States)

    2016-09-01

    This report, prepared by the SLAC National Accelerator Laboratory (SLAC) for the U.S. Department of Energy (DOE), SLAC Site Office (SSO), provides a comprehensive summary of the environmental program activities at SLAC for calendar year 2015. Annual Site Environmental Reports (ASERs) are prepared for all DOE sites with significant environmental activities, and distributed to relevant external regulatory agencies and other interested organizations or individuals. To the best of my knowledge, this report accurately summarizes the results of the 2015 environmental monitoring, compliance, and restoration programs at SLAC. This assurance can be made based on SSO and SLAC review of the ASER, and quality assurance protocols applied to monitoring and data analyses at SLAC.

  4. Impact of Partial-Mouth Periodontal Examination Protocols on the Association Between Gingival Bleeding and Oral Health-Related Quality of Life in Adolescents.

    Science.gov (United States)

    Ediani Machado, Michely; Tomazoni, Fernanda; Ruffo Ortiz, Fernanda; Ardenghi, Thiago Machado; Zanatta, Fabricio Batistin

    2017-07-01

    It is not clear how using partial-mouth periodontal examination (PMPE) protocols affects estimates of the association between gingival bleeding (GB) and oral health-related quality of life (OHRQoL). The aim of the present study is to assess impact of different PMPEs on the association between GB and OHRQoL in 12-year-old adolescents. A total of 1,134 adolescents were evaluated for clinical and subjective variables. GB was determined by full-mouth examination (FME) of six sites (disto-buccal [DB], mid-buccal [B], mesio-buccal [MB], disto-lingual [DL], mid-lingual, and mesio-lingual [ML]) and different PMPEs were calculated using a 15% cut-off point: 1) full-mouth (MB-B-DB/MB-B-DL); 2) two diagonal quadrants (six sites/MB-B-DB/MB-B-DL); 3) two randomly selected half-mouth quadrants (six sites/MB-B-DB/ MB-B-DL/MB-DB-ML-DL); and 4) the community periodontal index. OHRQoL was assessed using the Child Perceptions Questionnaire (CPQ 11-14 ). Adjusted negative binomial regression models were used to calculate the rate ratio of CPQ 11-14 scores for each PMPE. Adolescents with GB showed significantly poorer OHRQoL than their counterparts when FME was used. In contrast, more than half of PMPE protocols did not detect significant associations between GB and CPQ 11-14 scores in the adjusted analysis. Using PMPE to assess GB in adolescents significantly affects associations with OHRQoL outcomes, depending on the protocol used. PMPEs that evaluated MB-B-DL sites of randomly selected half-mouth quadrants (1 or 2 and 3 or 4) achieved results closer to those obtained with FME.

  5. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  6. Principles of the new quantum cryptography protocols building

    International Nuclear Information System (INIS)

    Kurochkin, V.; Kurochkin, Yu.

    2009-01-01

    The main aim of the quantum cryptography protocols is the maximal secrecy under the conditions of the real experiment. This work presents the result of the new protocol building with the use of the secrecy maximization. While using some well-known approaches this method has allowed one to achieve completely new results in quantum cryptography. The process of the protocol elaboration develops from the standard BB84 protocol upgrading to the building of completely new protocol with arbitrary large bases number. The secrecy proofs of the elaborated protocol appear to be natural continuation of the protocol building process. This approach reveals possibility to reach extremely high parameters of the protocol. It suits both the restrictions of contemporary technologies and requirements for high bit rate while being absolutely secret

  7. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  8. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  9. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  10. MR efficiency using automated MRI-desktop eProtocol

    Science.gov (United States)

    Gao, Fei; Xu, Yanzhe; Panda, Anshuman; Zhang, Min; Hanson, James; Su, Congzhe; Wu, Teresa; Pavlicek, William; James, Judy R.

    2017-03-01

    MRI protocols are instruction sheets that radiology technologists use in routine clinical practice for guidance (e.g., slice position, acquisition parameters etc.). In Mayo Clinic Arizona (MCA), there are over 900 MR protocols (ranging across neuro, body, cardiac, breast etc.) which makes maintaining and updating the protocol instructions a labor intensive effort. The task is even more challenging given different vendors (Siemens, GE etc.). This is a universal problem faced by all the hospitals and/or medical research institutions. To increase the efficiency of the MR practice, we designed and implemented a web-based platform (eProtocol) to automate the management of MRI protocols. It is built upon a database that automatically extracts protocol information from DICOM compliant images and provides a user-friendly interface to the technologists to create, edit and update the protocols. Advanced operations such as protocol migrations from scanner to scanner and capability to upload Multimedia content were also implemented. To the best of our knowledge, eProtocol is the first MR protocol automated management tool used clinically. It is expected that this platform will significantly improve the radiology operations efficiency including better image quality and exam consistency, fewer repeat examinations and less acquisition errors. These protocols instructions will be readily available to the technologists during scans. In addition, this web-based platform can be extended to other imaging modalities such as CT, Mammography, and Interventional Radiology and different vendors for imaging protocol management.

  11. SPP: A data base processor data communications protocol

    Science.gov (United States)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  12. Variation in anticonvulsant selection and EEG monitoring following severe traumatic brain injury in children – Understanding resource availability in sites participating in a comparative effectiveness study

    Science.gov (United States)

    Kurz, Jonathan E.; Poloyac, Samuel M.; Abend, Nicholas S.; Fabio, Anthony; Bell, Michael J.; Wainwright, Mark S.

    2016-01-01

    Objective Early post-traumatic seizures (PTS) may contribute to worsened outcomes after traumatic brain injury (TBI). Evidence to guide the evaluation and management of early PTS in children is limited. We undertook a survey of current practices of continuous electroencephalographic monitoring (cEEG), seizure prophylaxis and the management of early PTS to provide essential information for trial design and the development of PTS management pathways. Design Surveys were sent to site principal investigators at all 43 sites participating in the ADAPT (Approaches and Decisions in Acute Pediatric TBI) trial at the time of the survey. Surveys consisted of 12 questions addressing strategies to (i) implement cEEG monitoring, (ii) PTS prophylaxis, (iii) treat acute PTS, (iv) treat status epilepticus (SE) and refractory status epilepticus (RSE) and (v) monitor anti-seizure drug levels. Setting Institutions comprised a mixture of free-standing children’s hospitals and university medical centers across the United States and Europe. Measurements and Main Results cEEG monitoring was available in the pediatric intensive care unit in the overwhelming majority of clinical sites (98%); however, the plans to operationalize such monitoring for children varied considerably. A similar majority of sites report that administration of prophylactic anti-seizure medications is anticipated in children (93%), yet a minority reports that a specified protocol for treatment of PTS is in place (43%). Reported medication choices varied substantially between sites, but the majority of sites reported pentobarbital for RSE (81%). Presence of an treatment protocols for seizure prophylaxis, early PTS, post-traumatic SE and RSE was associated with decreased reported medications (all p pediatric severe TBI. The substantial variation in cEEG implementation, choice of seizure prophylaxis medications, and management of early PTS across institutions was reported, signifying areas of clinical uncertainty that

  13. Deterministic secure communication protocol without using entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

  14. Tackling obesity in areas of high social deprivation: clinical effectiveness and cost-effectiveness of a task-based weight management group programme - a randomised controlled trial and economic evaluation.

    Science.gov (United States)

    McRobbie, Hayden; Hajek, Peter; Peerbux, Sarrah; Kahan, Brennan C; Eldridge, Sandra; Trépel, Dominic; Parrott, Steve; Griffiths, Chris; Snuggs, Sarah; Myers Smith, Katie

    2016-10-01

    An increasing number of people require help to manage their weight. The NHS recommends weight loss advice by general practitioners and/or a referral to a practice nurse. Although this is helpful for some, more effective approaches that can be disseminated economically on a large scale are needed. To assess whether or not a task-based weight management programme [Weight Action Programme (WAP)] has better long-term effects than a 'best practice' intervention provided in primary care by practice nurses. Randomised controlled trial with cost-effectiveness analysis. General practices in east London, UK. Three hundred and thirty adults with a body mass index (BMI) of ≥ 30 kg/m 2 or a BMI of ≥ 28 kg/m 2 plus comorbidities were recruited from local general practices and via media publicity. Those who had a BMI of > 45 kg/m 2 , had lost > 5% of their body weight in the previous 6 months, were currently pregnant or taking psychiatric medications were excluded. Participants were randomised (2 : 1) to the WAP or nurse arms. The WAP intervention was delivered in eight weekly group sessions that combined dietary and physical activity, advice and self-monitoring in a group-oriented intervention. The initial course was followed by 10 monthly group maintenance sessions open to all participants in this study arm. The practice nurse intervention (best usual care) consisted of four one-to-one sessions delivered over 8 weeks, and included standard advice on diet and physical activity based on NHS 'Change4Life' materials and motivational support. The primary outcome measure was weight change at 12 months. Secondary outcome measures included change in BMI, waist circumference and blood pressure, and proportion of participants losing at least 5% and 10% of baseline body weight. Staff collecting measurements at the 6- and 12-month follow-ups were blinded to treatment allocation. The primary outcome measure was analysed according to the intention-to-treat principle

  15. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  16. Upregulation of AMWAP: a novel mechanism for HDAC inhibitors to protect against cisplatin nephrotoxicity.

    Science.gov (United States)

    Tang, Jinhua; Zhuang, Shougang

    2016-02-01

    Histone deacetylases have been reported to protect against renal tubular damage in several animal models of acute renal injury, including cisplatin nephrotoxicity. However, the mechanism involved is not well defined. In this study, Ranganathan et al. identify activated microglia/macrophage WAP domain protein as the novel mediator of histone deacetylase inhibitor-mediated renal protection in a murine model of cisplatin nephrotoxicity. Activated microglia/macrophage WAP-mediated renal protection is associated with suppression of inflammation and renal epithelial cell apoptosis. Copyright © 2016 International Society of Nephrology. Published by Elsevier Inc. All rights reserved.

  17. The Development of Korea Additional Protocol System

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yeo, Jin Kyun

    2008-01-01

    The Agreement between the Republic of Korea (ROK) and the IAEA for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Safeguards Agreement) entered into force on 14 November 1975. The Additional Protocol to the Safeguards Agreement (the Additional Protocol) was signed on 21 June 1999 and entered into force on 19 February 2004. ROK has been submitting annual updated reports of initial declaration on every May 15th since August 2004. Additional protocol reports were submitted through Protocol Reporter provided by IAEA. Annual declarations were simply uploaded and stored in the Accounting Information Treatment System of KINAC, which did not provide data analysis and management function. There have been demands for improvement to handle ever-increasing information. KAPS (Korea Additional Protocol System) has been developed to assist and administrate the additional protocol related works effectively. The new system enables integrated management including composition of additional protocol report and version control, periodical update of related information, results of IAEA complementary access to each facility

  18. Bank robberies: A psychological protocol of intervention in financial institutions and principal effects.

    Science.gov (United States)

    Tabanelli, Maria Carla; Bonfiglioli, Roberta; Violante, Francesco S

    2013-03-26

    BACKGROUND: Robbery in workplaces represents a potentially traumatic experience for workers. OBJECTIVES: This article describes the set up and evaluation of a comprehensive psychological intervention designed to help to reduce the adverse consequences of bank robberies. PARTICIPANTS: The study population was selected among the employees of two Italian banks.METHODS: The psychological protocol was designed according to the results of a comprehensive non-systematic review of the scientific literature and it was evaluated at work site. RESULTS: The protocol consists of a "pre-event" formative intervention and "post-event" psychological support. The qualitative data collected allowed us to understand that the reactions after a robbery can differ depending on the phase during which the workers were exposed to the robbery. We noted that the main consequences can be classified in emotional/sentimental reactions, behavioral reactions, physiological reactions and experiences during the event; emotions/feelings following the robbery and psycho/physical state and emotions/feelings in the following days.CONCLUSIONS: In a working environment, the chance to take advantage of a specific protocol for the traumatic event of a bank robbery offers both the company and the workers important tools for well-being, including post-robbery psychological support and classroom instructions.

  19. Identification of Cyclin-dependent Kinase 1 Specific Phosphorylation Sites by an In Vitro Kinase Assay.

    Science.gov (United States)

    Cui, Heying; Loftus, Kyle M; Noell, Crystal R; Solmaz, Sozanne R

    2018-05-03

    Cyclin-dependent kinase 1 (Cdk1) is a master controller for the cell cycle in all eukaryotes and phosphorylates an estimated 8 - 13% of the proteome; however, the number of identified targets for Cdk1, particularly in human cells is still low. The identification of Cdk1-specific phosphorylation sites is important, as they provide mechanistic insights into how Cdk1 controls the cell cycle. Cell cycle regulation is critical for faithful chromosome segregation, and defects in this complicated process lead to chromosomal aberrations and cancer. Here, we describe an in vitro kinase assay that is used to identify Cdk1-specific phosphorylation sites. In this assay, a purified protein is phosphorylated in vitro by commercially available human Cdk1/cyclin B. Successful phosphorylation is confirmed by SDS-PAGE, and phosphorylation sites are subsequently identified by mass spectrometry. We also describe purification protocols that yield highly pure and homogeneous protein preparations suitable for the kinase assay, and a binding assay for the functional verification of the identified phosphorylation sites, which probes the interaction between a classical nuclear localization signal (cNLS) and its nuclear transport receptor karyopherin α. To aid with experimental design, we review approaches for the prediction of Cdk1-specific phosphorylation sites from protein sequences. Together these protocols present a very powerful approach that yields Cdk1-specific phosphorylation sites and enables mechanistic studies into how Cdk1 controls the cell cycle. Since this method relies on purified proteins, it can be applied to any model organism and yields reliable results, especially when combined with cell functional studies.

  20. Release protocol to address DOE moratorium on shipments of waste generated in radiologically controlled areas

    International Nuclear Information System (INIS)

    Rathbun, L.A.; Boothe, G.F.

    1992-10-01

    On May 17, 1991 the US DOE Office of Waste Operations issued a moratorium on the shipment of hazardous waste from radiologically contaminated or potentially contaminated areas on DOE sites to offsite facilities not licensed for radiological material. This document describes a release protocol generated by Westinghouse Hanford submitted for US DOE approval. Topics considered include designating Radiological Materials Management Areas (RMMAs), classification of wastes, handling of mixed wastes, detection limits

  1. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  2. Biological toxicity evaluation of Hanford Site waste grouts

    International Nuclear Information System (INIS)

    Rebagay, T.V. Dodd, D.A.; Voogd, J.A.

    1992-10-01

    Liquid wastes containing radioactive, hazardous, and regulated chemicals have been generated throughout the 50 years of operation of the Hanford Site of the US Department of Energy near Richland, Washington. These wastes are currently stored onsite in single- and double-shell carbon steel tanks. To effectively handle and treat these wastes, their degree of toxicity must be determined. The disposal of the low-level radioactive liquid portion of the wastes involves mixing the wastes with pozzolanic blends to form grout. Potential environmental hazards posed by grouts are largely unknown. Biological evaluation of grout toxicity is needed to provide information on the potential risks of animal and plant exposure to the grouts. The fish, rat, and Microtox toxicity tests described herein indicate that the grouts formed from Formulations I and 2 are nonhazardous and nondangerous. Using the Microtox solid-phase protocol, both soluble and insoluble organic and inorganic toxicants in the grouts can be detected. This protocol may be used for rapid screening of environmental pollutants and toxicants

  3. Quantum-key-distribution protocol with pseudorandom bases

    Science.gov (United States)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  4. Interoperability and Reliability of Multiplatform MPLS VPN: Comparison of Traffic Engineering with RSVP-TE Protocol and LDP Protocol

    Directory of Open Access Journals (Sweden)

    Nanang Ismail

    2017-10-01

    48% of packet loss per 100 sent packets while on RSVP packet loss percentage is 35.5% per 100 sent packets. Both protocols have interoperability on the third layer of multiplatform MPLS VPN, but on heavy loaded traffic condition, RSVP protocol has better reliability than the LDP protocol.

  5. A Web Resource for Standardized Benchmark Datasets, Metrics, and Rosetta Protocols for Macromolecular Modeling and Design.

    Directory of Open Access Journals (Sweden)

    Shane Ó Conchúir

    Full Text Available The development and validation of computational macromolecular modeling and design methods depend on suitable benchmark datasets and informative metrics for comparing protocols. In addition, if a method is intended to be adopted broadly in diverse biological applications, there needs to be information on appropriate parameters for each protocol, as well as metrics describing the expected accuracy compared to experimental data. In certain disciplines, there exist established benchmarks and public resources where experts in a particular methodology are encouraged to supply their most efficient implementation of each particular benchmark. We aim to provide such a resource for protocols in macromolecular modeling and design. We present a freely accessible web resource (https://kortemmelab.ucsf.edu/benchmarks to guide the development of protocols for protein modeling and design. The site provides benchmark datasets and metrics to compare the performance of a variety of modeling protocols using different computational sampling methods and energy functions, providing a "best practice" set of parameters for each method. Each benchmark has an associated downloadable benchmark capture archive containing the input files, analysis scripts, and tutorials for running the benchmark. The captures may be run with any suitable modeling method; we supply command lines for running the benchmarks using the Rosetta software suite. We have compiled initial benchmarks for the resource spanning three key areas: prediction of energetic effects of mutations, protein design, and protein structure prediction, each with associated state-of-the-art modeling protocols. With the help of the wider macromolecular modeling community, we hope to expand the variety of benchmarks included on the website and continue to evaluate new iterations of current methods as they become available.

  6. Performance Demonstration Program Plan for Analysis of Simulated Headspace Gases

    International Nuclear Information System (INIS)

    2006-01-01

    The Performance Demonstration Program (PDP) for headspace gases distributes sample gases of volatile organic compounds (VOCs) for analysis. Participating measurement facilities (i.e., fixed laboratories, mobile analysis systems, and on-line analytical systems) are located across the United States. Each sample distribution is termed a PDP cycle. These evaluation cycles provide an objective measure of the reliability of measurements performed for transuranic (TRU) waste characterization. The primary documents governing the conduct of the PDP are the Quality Assurance Program Document (QAPD) (DOE/CBFO-94-1012) and the Waste Isolation Pilot Plant (WIPP) Waste Analysis Plan (WAP) contained in the Hazardous Waste Facility Permit (NM4890139088-TSDF) issued by the New Mexico Environment Department (NMED). The WAP requires participation in the PDP; the PDP must comply with the QAPD and the WAP. This plan implements the general requirements of the QAPD and the applicable requirements of the WAP for the Headspace Gas (HSG) PDP. Participating measurement facilities analyze blind audit samples of simulated TRU waste package headspace gases according to the criteria set by this PDP Plan. Blind audit samples (hereafter referred to as PDP samples) are used as an independent means to assess each measurement facility's compliance with the WAP quality assurance objectives (QAOs). To the extent possible, the concentrations of VOC analytes in the PDP samples encompass the range of concentrations anticipated in actual TRU waste package headspace gas samples. Analyses of headspace gases are required by the WIPP to demonstrate compliance with regulatory requirements. These analyses must be performed by measurement facilities that have demonstrated acceptable performance in this PDP. These analyses are referred to as WIPP analyses and the TRU waste package headspace gas samples on which they are performed are referred to as WIPP samples in this document. Participating measurement

  7. Performance Demonstration Program Plan for Analysis of Simulated Headspace Gases

    International Nuclear Information System (INIS)

    2007-01-01

    The Performance Demonstration Program (PDP) for headspace gases distributes blind audit samples in a gas matrix for analysis of volatile organic compounds (VOCs). Participating measurement facilities (i.e., fixed laboratories, mobile analysis systems, and on-line analytical systems) are located across the United States. Each sample distribution is termed a PDP cycle. These evaluation cycles provide an objective measure of the reliability of measurements performed for transuranic (TRU) waste characterization. The primary documents governing the conduct of the PDP are the Quality Assurance Program Document (QAPD) (DOE/CBFO-94-1012) and the Waste Isolation Pilot Plant (WIPP) Waste Analysis Plan (WAP) contained in the Hazardous Waste Facility Permit (NM4890139088-TSDF) issued by the New Mexico Environment Department (NMED). The WAP requires participation in the PDP; the PDP must comply with the QAPD and the WAP. This plan implements the general requirements of the QAPD and the applicable requirements of the WAP for the Headspace Gas (HSG) PDP. Participating measurement facilities analyze blind audit samples of simulated TRU waste package headspace gases according to the criteria set by this PDP Plan. Blind audit samples (hereafter referred to as PDP samples) are used as an independent means to assess each measurement facility's compliance with the WAP quality assurance objectives (QAOs). To the extent possible, the concentrations of VOC analytes in the PDP samples encompass the range of concentrations anticipated in actual TRU waste package headspace gas samples. Analyses of headspace gases are required by the WIPP to demonstrate compliance with regulatory requirements. These analyses must be performed by measurement facilities that have demonstrated acceptable performance in this PDP. These analyses are referred to as WIPP analyses and the TRU waste package headspace gas samples on which they are performed are referred to as WIPP samples in this document

  8. Development of the Diabetes Technology Society Blood Glucose Monitor System Surveillance Protocol.

    Science.gov (United States)

    Klonoff, David C; Lias, Courtney; Beck, Stayce; Parkes, Joan Lee; Kovatchev, Boris; Vigersky, Robert A; Arreaza-Rubin, Guillermo; Burk, Robert D; Kowalski, Aaron; Little, Randie; Nichols, James; Petersen, Matt; Rawlings, Kelly; Sacks, David B; Sampson, Eric; Scott, Steve; Seley, Jane Jeffrie; Slingerland, Robbert; Vesper, Hubert W

    2016-05-01

    Inaccurate blood glucsoe monitoring systems (BGMSs) can lead to adverse health effects. The Diabetes Technology Society (DTS) Surveillance Program for cleared BGMSs is intended to protect people with diabetes from inaccurate, unreliable BGMS products that are currently on the market in the United States. The Surveillance Program will provide an independent assessment of the analytical performance of cleared BGMSs. The DTS BGMS Surveillance Program Steering Committee included experts in glucose monitoring, surveillance testing, and regulatory science. Over one year, the committee engaged in meetings and teleconferences aiming to describe how to conduct BGMS surveillance studies in a scientifically sound manner that is in compliance with good clinical practice and all relevant regulations. A clinical surveillance protocol was created that contains performance targets and analytical accuracy-testing studies with marketed BGMS products conducted by qualified clinical and laboratory sites. This protocol entitled "Protocol for the Diabetes Technology Society Blood Glucose Monitor System Surveillance Program" is attached as supplementary material. This program is needed because currently once a BGMS product has been cleared for use by the FDA, no systematic postmarket Surveillance Program exists that can monitor analytical performance and detect potential problems. This protocol will allow identification of inaccurate and unreliable BGMSs currently available on the US market. The DTS Surveillance Program will provide BGMS manufacturers a benchmark to understand the postmarket analytical performance of their products. Furthermore, patients, health care professionals, payers, and regulatory agencies will be able to use the results of the study to make informed decisions to, respectively, select, prescribe, finance, and regulate BGMSs on the market. © 2015 Diabetes Technology Society.

  9. Development of the Diabetes Technology Society Blood Glucose Monitor System Surveillance Protocol

    Science.gov (United States)

    Klonoff, David C.; Lias, Courtney; Beck, Stayce; Parkes, Joan Lee; Kovatchev, Boris; Vigersky, Robert A.; Arreaza-Rubin, Guillermo; Burk, Robert D.; Kowalski, Aaron; Little, Randie; Nichols, James; Petersen, Matt; Rawlings, Kelly; Sacks, David B.; Sampson, Eric; Scott, Steve; Seley, Jane Jeffrie; Slingerland, Robbert; Vesper, Hubert W.

    2015-01-01

    Background: Inaccurate blood glucsoe monitoring systems (BGMSs) can lead to adverse health effects. The Diabetes Technology Society (DTS) Surveillance Program for cleared BGMSs is intended to protect people with diabetes from inaccurate, unreliable BGMS products that are currently on the market in the United States. The Surveillance Program will provide an independent assessment of the analytical performance of cleared BGMSs. Methods: The DTS BGMS Surveillance Program Steering Committee included experts in glucose monitoring, surveillance testing, and regulatory science. Over one year, the committee engaged in meetings and teleconferences aiming to describe how to conduct BGMS surveillance studies in a scientifically sound manner that is in compliance with good clinical practice and all relevant regulations. Results: A clinical surveillance protocol was created that contains performance targets and analytical accuracy-testing studies with marketed BGMS products conducted by qualified clinical and laboratory sites. This protocol entitled “Protocol for the Diabetes Technology Society Blood Glucose Monitor System Surveillance Program” is attached as supplementary material. Conclusion: This program is needed because currently once a BGMS product has been cleared for use by the FDA, no systematic postmarket Surveillance Program exists that can monitor analytical performance and detect potential problems. This protocol will allow identification of inaccurate and unreliable BGMSs currently available on the US market. The DTS Surveillance Program will provide BGMS manufacturers a benchmark to understand the postmarket analytical performance of their products. Furthermore, patients, health care professionals, payers, and regulatory agencies will be able to use the results of the study to make informed decisions to, respectively, select, prescribe, finance, and regulate BGMSs on the market. PMID:26481642

  10. Transfer learning improves supervised image segmentation across imaging protocols.

    Science.gov (United States)

    van Opbroek, Annegreet; Ikram, M Arfan; Vernooij, Meike W; de Bruijne, Marleen

    2015-05-01

    The variation between images obtained with different scanners or different imaging protocols presents a major challenge in automatic segmentation of biomedical images. This variation especially hampers the application of otherwise successful supervised-learning techniques which, in order to perform well, often require a large amount of labeled training data that is exactly representative of the target data. We therefore propose to use transfer learning for image segmentation. Transfer-learning techniques can cope with differences in distributions between training and target data, and therefore may improve performance over supervised learning for segmentation across scanners and scan protocols. We present four transfer classifiers that can train a classification scheme with only a small amount of representative training data, in addition to a larger amount of other training data with slightly different characteristics. The performance of the four transfer classifiers was compared to that of standard supervised classification on two magnetic resonance imaging brain-segmentation tasks with multi-site data: white matter, gray matter, and cerebrospinal fluid segmentation; and white-matter-/MS-lesion segmentation. The experiments showed that when there is only a small amount of representative training data available, transfer learning can greatly outperform common supervised-learning approaches, minimizing classification errors by up to 60%.

  11. An Optimal Non-Interactive Message Authentication Protocol

    OpenAIRE

    Pasini, Sylvain; Vaudenay, Serge

    2006-01-01

    Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SAS-based non-interactive message authentication protocols (NIMAP). We start by the analysis of two popular non-interactive message authentication protocols. The first one is based on a collision-resistant hash function and was presented by Balfanz et al. The second protocol is based on a universal hash function family and was proposed by Gehrmann, Mi...

  12. Nucleic acid protocols: Extraction and optimization

    Directory of Open Access Journals (Sweden)

    Saeed El-Ashram

    2016-12-01

    Full Text Available Yield and quality are fundamental features for any researchers during nucleic acid extraction. Here, we describe a simplified, semi-unified, effective, and toxic material free protocol for extracting DNA and RNA from different prokaryotic and eukaryotic sources exploiting the physical and chemical properties of nucleic acids. Furthermore, this protocol showed that DNA and RNA are under triple protection (i.e. EDTA, SDS and NaCl during lysis step, and this environment is improper for RNase to have DNA liberated of RNA and even for DNase to degrade the DNA. Therefore, the complete removal of RNA under RNase influence is achieved when RNase is added after DNA extraction, which gives optimal quality with any protocols. Similarly, DNA contamination in an isolated RNA is degraded by DNase to obtain high-quality RNA. Our protocol is the protocol of choice in terms of simplicity, recovery time, environmental safety, amount, purity, PCR and RT-PCR applicability.

  13. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  14. Bitcoin-NG: A Scalable Blockchain Protocol

    OpenAIRE

    Eyal, Ittay; Gencer, Adem Efe; Sirer, Emin Gun; van Renesse, Robbert

    2015-01-01

    Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is By...

  15. Waterless Hand Rub Versus Traditional Hand Scrub Methods for Preventing the Surgical Site Infection in Orthopedic Surgery.

    Science.gov (United States)

    Iwakiri, Kentaro; Kobayashi, Akio; Seki, Masahiko; Ando, Yoshiyuki; Tsujio, Tadao; Hoshino, Masatoshi; Nakamura, Hiroaki

    2017-11-15

    MINI: Fourteen hundred consecutive patients were investigated for evaluating the utility of waterless hand rub before orthopaedic surgery. The risk in the surgical site infection incidence was the same, but costs of liquids used for hand hygiene were cheaper and the hand hygiene time was shorter for waterless protocol, compared with traditional hand scrub. A retrospective cohort study with prospectively collected data. The aim of this study was to compare SSI incidences, the cost of hand hygiene agents, and hand hygiene time between the traditional hand scrub and the waterless hand rub protocols before orthopedic surgery. Surgical site infections (SSI) prolong hospitalization and are a leading nosocomial cause of morbidity and a source of excess cost. Recently, a waterless hand rub protocol comprising alcohol based chlorhexidine gluconate for use before surgery was developed, but no studies have yet examined its utility in orthopedic surgery. Fourteen hundred consecutive patients who underwent orthopedic surgery (spine, joint replacement, hand, and trauma surgeries) in our hospital since April 1, 2012 were included. A total of 712 cases underwent following traditional hand scrub between April 1, 2012 and April 30, 2013 and 688 cases underwent following waterless hand rub between June 1, 2013 and April 30, 2014. We compared SSI incidences within all and each subcategory between two hand hygiene protocols. All patients were screened for SSI within 1 year after surgery. We compared the cost of hand hygiene agents and hand hygiene time between two groups. The SSI incidences were 1.3% (9 of 712) following the traditional protocol (2 deep and 7 superficial infections) and 1.1% (8 of 688) following the waterless protocol (all superficial infections). There were no significant differences between the two groups. The costs of liquids used for one hand hygiene were about $2 for traditional hand scrub and less than $1 for waterless hand rub. The mean hand hygiene time was 264

  16. A case for evaluating sensor network protocols concurrently

    KAUST Repository

    Gnawali, Omprakash; Guibas, Leonidas; Levis, Philip

    2010-01-01

    Researchers typically evaluate and compare protocols on the testbeds by running them one at a time. This methodology ignores the variation in link qualities and wireless environment across these experiments. These variations can introduce significant noise in the results. Evaluating two protocols concurrently, however, suffers from inter-protocol interactions. These interactions can perturb performance even under very light load, especially timing and timing sensitive protocols. We argue that the benefits of running protocols concurrently greatly outweigh the disadvantages. Protocols rarely run in isolation in real networks, and so considering such interactions is valuable. Although the wireless environment is still uncontrolled, concurrent evaluations make comparisons fair and more statistically sound. Through experiments on two testbeds, we make the case for evaluating and comparing low data-rate sensor network protocols by running them concurrently. Copyright 2010 ACM.

  17. MODELLING AND VERIFICATION OF KITSAT PACKET COMMUNICATION PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Young-Ro Lee

    1996-06-01

    Full Text Available In this paper, in order to verify KITSAT 1/2 packet communication protocols, we model the AX.25 protocol and PACSAT protocol by using an extended Petri net and then verify the correctness, boundedness, liveness and deadlock freeness of packet protocols by utilizing reachability trees.

  18. Game-theoretic perspective of Ping-Pong protocol

    Science.gov (United States)

    Kaur, Hargeet; Kumar, Atul

    2018-01-01

    We analyse Ping-Pong protocol from the point of view of a game. The analysis helps us in understanding the different strategies of a sender and an eavesdropper to gain the maximum payoff in the game. The study presented here characterizes strategies that lead to different Nash equilibriums. We further demonstrate the condition for Pareto optimality depending on the parameters used in the game. Moreover, we also analysed LM05 protocol and compared it with PP protocol from the point of view of a generic two-way QKD game with or without entanglement. Our results provide a deeper understanding of general two-way QKD protocols in terms of the security and payoffs of different stakeholders in the protocol.

  19. Technical Analysis of SSP-21 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-09

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.

  20. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol\\'s perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain\\'s fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  1. Formal analysis of a fair payment protocol

    NARCIS (Netherlands)

    J.G. Cederquist; M.T. Dashti (Mohammad)

    2004-01-01

    textabstractWe formally specify a payment protocol. This protocol is intended for fair exchange of time-sensitive data. Here the ?-CRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free ?-calculus. These properties are then verified

  2. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, M.T.

    2004-01-01

    We formally specify a payment protocol. This protocol is intended for fair exchange of timesensitive data. Here the μCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free μ-calculus. These properties are then verified using the finite

  3. The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol

    OpenAIRE

    Seema Mehla; Bhawna Gupta

    2010-01-01

    the Extensible Authentication Protocol (EAP) is a generic framework supporting multiple types of authentication methods. In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP exchange with another authenticator. The EAP reauthentication Protocol provides a consistent, methodindependentand low-latency re-authentication. It is extension to current EAP mechanism to support intradomain handoff authentication. This paper analyzed the performance of the EAP r...

  4. Blockchain Consensus Protocols in the Wild

    OpenAIRE

    Cachin, Christian; Vukolić, Marko

    2017-01-01

    A blockchain is a distributed ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received renewed attention because they also address blockchain systems. This work discusses the process o...

  5. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  6. Wrong-Site Surgery, Retained Surgical Items, and Surgical Fires : A Systematic Review of Surgical Never Events.

    Science.gov (United States)

    Hempel, Susanne; Maggard-Gibbons, Melinda; Nguyen, David K; Dawes, Aaron J; Miake-Lye, Isomi; Beroes, Jessica M; Booth, Marika J; Miles, Jeremy N V; Shanman, Roberta; Shekelle, Paul G

    2015-08-01

    Serious, preventable surgical events, termed never events, continue to occur despite considerable patient safety efforts. To examine the incidence and root causes of and interventions to prevent wrong-site surgery, retained surgical items, and surgical fires in the era after the implementation of the Universal Protocol in 2004. We searched 9 electronic databases for entries from 2004 through June 30, 2014, screened references, and consulted experts. Two independent reviewers identified relevant publications in June 2014. One reviewer used a standardized form to extract data and a second reviewer checked the data. Strength of evidence was established by the review team. Data extraction was completed in January 2015. Incidence of wrong-site surgery, retained surgical items, and surgical fires. We found 138 empirical studies that met our inclusion criteria. Incidence estimates for wrong-site surgery in US settings varied by data source and procedure (median estimate, 0.09 events per 10,000 surgical procedures). The median estimate for retained surgical items was 1.32 events per 10,000 procedures, but estimates varied by item and procedure. The per-procedure surgical fire incidence is unknown. A frequently reported root cause was inadequate communication. Methodologic challenges associated with investigating changes in rare events limit the conclusions of 78 intervention evaluations. Limited evidence supported the Universal Protocol (5 studies), education (4 studies), and team training (4 studies) interventions to prevent wrong-site surgery. Limited evidence exists to prevent retained surgical items by using data-matrix-coded sponge-counting systems (5 pertinent studies). Evidence for preventing surgical fires was insufficient, and intervention effects were not estimable. Current estimates for wrong-site surgery and retained surgical items are 1 event per 100,000 and 1 event per 10,000 procedures, respectively, but the precision is uncertain, and the per

  7. Les hydrocarbures aromatiques polycycliques dans l'environnement : la réhabilitation des anciens sites industriels The Polycyclic Aromatic Hydrocarbons in the Environment : the Former Industrial Sites Remediation

    Directory of Open Access Journals (Sweden)

    Costes J. M.

    2006-12-01

    Full Text Available Les hydrocarbures aromatiques polycycliques ou HAP peuvent être d'origine naturelle mais ils proviennent principalement des processus de pyrolyse. On peut les retrouver dans les sols de certains anciens sites industriels. Cela peut être le cas des sites d'anciennes usines à gaz. Même si aucune conséquence sur la santé humaine n'a été signalée et même si les risques paraissent virtuels, le principe de précaution rend nécessaire de s'occuper des risques liés à ces anciens sites industriels. Gaz de France, propriétaire de 467 sites d'anciennes usines à gaz assume l'héritage industriel dans le cadre d'un protocole signé avec le ministère de l'Environnement. Après une étude des sols, une évaluation des risques est réalisée. En fonction des résultats de cette évaluation des risques et de l'usage du site (actuel et prévu, des solutions de traitement peuvent être mises en Suvre. Parmi les techniques applicables aux sols pollués par des HAP, un intérêt particulier s'est porté sur les traitements biologiques, en pleine évolution, qui offrent une solution économique bien adaptée au traitement de grands volumes de sols souillés par une pollution organique moyennement concentrée. Polycyclic aromatic hydrocarbons (PAHs can be found under natural conditions but they can be produced by pyrolysis processes. They can be found in former industrial sites subsoil, especially on Manufactured Gas Plant sites (MGP sites. Gaz de France has inherited the patrimony of former French gas companies on nationalisation in 1946; consequently, Gaz De France is still the owner of 467 of manufactured gas plants. Even if no impact on human health has been detected and even if the risks seem to be virtual, Gaz de France has to prevent any environmental consequence due to the possible presence of residues in the subsoil of the sites: a protocol has been signed with the French Ministry of Environment. Following the investigations on the site, a

  8. Differential phase-time shifting protocol for QKD (DPTS)

    DEFF Research Database (Denmark)

    Usuga Castaneda, Mario A.; Bacco, Davide; Christensen, Jesper Bjerge

    2016-01-01

    We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols.......We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols....

  9. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi; Dimitrakos, Theo; Martinelli, Fabio

    We formally specify a payment protocol described by Vogt et al. This protocol is intended for fair exchange of time-sensitive data. Here the mCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free mu-calculus. These properties are then

  10. The UMTS-AKA Protocols for Intelligent Transportation Systems

    Directory of Open Access Journals (Sweden)

    Hwang Min-Shiang

    2009-01-01

    Full Text Available The integration of communication protocols into transport systems is a much adored research area today. Much of seminal work has been reported on the topic of intelligent transportation systems (ITS in the recent years. Many advanced techniques have been garnered to improve online communication and to promote the security, comfort, and efficiency of ITS. Of primary importance to the effective application of ITS is the communication protocol used. A fascinating development is that the yesterday's Global System for Mobile Communication protocol is being replaced by the Universal Mobile Telecommunication System protocol, which is the third-generation mobile technology. This article attempts to identify a suitable communication system for ITS applications. It is impracticable to substantially modify the original UMTS-IMS-AKA protocol which is in practice because it can disturb the operation of the current system, and thus we explore other possibilities through this research. We investigate a novel protocol to make the original UMTS-IMS-AKA protocol compliant with ITS as well as adaptable into the current UMTS protocol.

  11. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  12. Effect of injection of antisense oligodeoxynucleotides of GAD isozymes into rat ventromedial hypothalamus on food intake and locomotor activity.

    Science.gov (United States)

    Bannai, M; Ichikawa, M; Nishihara, M; Takahashi, M

    1998-02-16

    In the ventromedial hypothalamus (VMH), gamma-aminobutyric acid (GABA) plays a role in regulating feeding and running behaviors. The GABA synthetic enzyme, glutamic acid decarboxylase (GAD), consists of two isozymes, GAD65 and GAD67. In the present study, the phosphorothioated antisense oligodeoxynucleotides (ODNs) of each GAD isozyme were injected bilaterally into the VMH of male rats, and food intake, body weight and locomotor activity were monitored. ODNs were incorporated in the water-absorbent polymer (WAP, 0.2 nmol/microliter) so that ODNs were retained at the injection site. Each antisense ODN of GAD65 or GAD67 tended to reduce food intake on day 1 (day of injection=day 0) though not significantly. An injection combining both antisense ODNs significantly decreased food intake only on day 1, but body weight remained significantly lower than the control for 5 days. This suppression of body weight gain could be attributed to a significant increase in locomotor activity between days 3 and 5. Individual treatment with either ODNs did not change locomotor activity. The increase in daily locomotor activity in the group receiving the combined antisense ODNs occurred mainly during the light phase. Neither vehicle (WAP) nor control ODN affected food intake, body weight and locomotor activity. Histological studies indicated that antisense ODN distributed within 800 micron from the edge of the area where WAP was located 24 h after the injection gradually disappeared within days, but still remained within 300 micron m distance even 7 days after the injection. Antisense ODN was effectively incorporated by all the cell types examined, i.e., neurons, astrocytes and microglias. Further, HPLC analysis revealed that antisense ODNs of GAD isozymes, either alone or combined, decreased the content of GABA by 50% in VMH 24 h after the injection. These results indicate that suppression of GABA synthesis by either of the GAD isozymes is synergistically involved in suppressing food

  13. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  14. [Extravasation of contrast media at the puncture site: Strategies for managment].

    Science.gov (United States)

    Pacheco Compaña, F J; Gago Vidal, B; Méndez Díaz, C

    2014-01-01

    The incidence of contrast medium extravasation at the venipuncture site has increased with the generalized use of automatic injectors. Most extravasations only cause slight edema and erythema. Nevertheless, in some cases extravasation can result in severe skin lesions or even in compartment syndrome. Lesions caused by extravasation usually resolve spontaneously with conservative treatment. Although the complications of extravasation are well known, institutional protocols are normally lacking and the criteria for taking action and the type of treatment, whether based on the literature or personal preferences, tend to vary. In this article, we review the incidence, risk factors, clinical manifestations, and options for preventing and treating contrast medium extravasation in soft tissues. Finally, we present the protocol we use to manage extravasation at our hospital. Copyright © 2013 SERAM. Published by Elsevier Espana. All rights reserved.

  15. Protocols for second-generation business satellites systems

    Science.gov (United States)

    Evans, B. G.; Coakley, F. P.; El Amin, M. H. M.

    The paper discusses the nature and mix of traffic in business satellite systems and describes the limitations on the protocol imposed by the differing impairments of speech, video, and data. A simple TDMA system protocol is presented which meets the requirements of mixed-service operation. The efficiency of the protocol together with implications for allocation, scheduling and synchronisation are discussed. Future-generation satellites will probably use on-board processing. Some initial work on protocols that make use of on-board processing and the implications for satellite and earth-station equipment are presented.

  16. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  17. Radio protocols for LTE and LTE-advanced

    CERN Document Server

    Yi, SeungJune; Lee, YoungDae; Park, SungJun; Jung, SungHoon

    2012-01-01

    Provides a unique focus on radio protocols for LTE and LTE-Advanced (LTE-A) Giving readers a valuable understanding of LTE radio protocols, this book covers LTE (Long-Term Evolution) Layer 2/3 radio protocols as well as new features including LTE-Advanced. It is divided into two sections to differentiate between the two technologies' characteristics. The authors systematically explain the design principles and functions of LTE radio protocols during the development of mobile handsets. The book also provides essential knowledge on the interaction between mobile networks a

  18. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Aquino de Muro, Marilena; Rapley, Ralph

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  19. New logistics protocols for distributed interactive simulation

    Science.gov (United States)

    Taylor, Darrin; Morrison, John; Katz, Warren; Felton, Erik; Herman, Deborah A.

    1995-06-01

    In today's environment, the transportation and maintenance of military forces is nearly as important as combat operations. Rapid deployment to regions of low-intensity conflict will become a very common training scenario for the U.S. military. Thus it is desirable to apply distributed simulation technology to train logistics personnel in their combat support roles. Currently, distributed interactive simulation (DIS) only contains rudimentary logistics protocols. This paper introduces new protocols designed to handle the logistics problem. The Newtonian protocol takes a physics-based approach to modeling interactions on the simulation network. This protocol consists of a family of protocol data units (PDUs) which are used to communicate forces in different circumstances. The protocol implements a small set of physical relations. This represents a flexible and general mechanism to describe battlefield interactions between network entities. The migratory object protocol (MOP) family addresses the transfer of control. General mechanisms provide the means to simulate resupply, repair, and maintenance of entities at any level of abstraction (individual soldier to division). It can also increase the fidelity of mine laying, enable handover of weapons for terminal guidance, allow for the distribution of aggregate-level simulation entities, provide capabilities for the simulation of personnel, etc.

  20. To what extent do site-based training, mentoring, and operational research improve district health system management and leadership in low- and middle-income countries: a systematic review protocol.

    Science.gov (United States)

    Belrhiti, Zakaria; Booth, Andrew; Marchal, Bruno; Verstraeten, Roosmarijn

    2016-04-27

    controlled trials (RCT) and non RCT studies and Critical Appraisal Skills Programme checklists for qualitative studies. We will assess strength of recommendations with the GRADE tool for quantitative studies, and the CERQual approach for qualitative studies. Synthesis of quantitative studies will be performed through meta-analysis when appropriate. Best fit framework synthesis will be used to synthesize qualitative studies. This protocol paper describes a systematic review assessing the effectiveness of site-based training (with or without mentoring programmes or operational research) on the improvement of district health system management and leadership. PROSPERO CRD42015032351.

  1. Fault recovery in the reliable multicast protocol

    Science.gov (United States)

    Callahan, John R.; Montgomery, Todd L.; Whetten, Brian

    1995-01-01

    The Reliable Multicast Protocol (RMP) provides a unique, group-based model for distributed programs that need to handle reconfiguration events at the application layer. This model, called membership views, provides an abstraction in which events such as site failures, network partitions, and normal join-leave events are viewed as group reformations. RMP provides access to this model through an application programming interface (API) that notifies an application when a group is reformed as the result of a some event. RMP provides applications with reliable delivery of messages using an underlying IP Multicast (12, 5) media to other group members in a distributed environment even in the case of reformations. A distributed application can use various Quality of Service (QoS) levels provided by RMP to tolerate group reformations. This paper explores the implementation details of the mechanisms in RMP that provide distributed applications with membership view information and fault recovery capabilities.

  2. Investigation of the Study Characteristics Affecting Clinical Trial Quality Using the Protocol Deviations Leading to Exclusion of Subjects From the Per Protocol Set Data in Studies for New Drug Application: A Retrospective Analysis.

    Science.gov (United States)

    Kohara, Norihito; Kaneko, Masayuki; Narukawa, Mamoru

    2018-01-01

    The concept of the risk-based approach has been introduced as an effort to secure the quality of clinical trials. In the risk-based approach, identification and evaluation of risk in advance are considered important. For recently completed clinical trials, we investigated the relationship between study characteristics and protocol deviations leading to the exclusion of subjects from Per Protocol Set (PPS) efficacy analysis. New drugs approved in Japan in the fiscal year 2014-2015 were targeted in the research. The reasons for excluding subjects from the PPS efficacy analysis were described in 102 trials out of 492 in the summary of new drug application documents, which was publicly disclosed after the drug's regulatory approval. The author extracted these reasons along with the numbers of the cases and the study characteristics of each clinical trial. Then, the direct comparison, univariate regression analysis, and multivariate regression analysis was carried out based on the exclusion rate. The study characteristics for which exclusion of subjects from the PPS efficacy analysis were frequently observed was multiregional clinical trials in study region; inhalant and external use in administration route; Anti-infective for systemic use; Respiratory system, Dermatologicals, and Nervous system in therapeutic drug under the Anatomical Therapeutic Chemical Classification. In the multivariate regression analysis, the clinical trial variables of inhalant, Respiratory system, or Dermatologicals were selected as study characteristics leading to a higher exclusion rate. The characteristics of the clinical trial that is likely to cause protocol deviations that will affect efficacy analysis were suggested. These studies should be considered for specific attention and priority observation in the trial protocol or its monitoring plan and execution, such as a clear description of inclusion/exclusion criteria in the protocol, development of training materials to site staff, and

  3. Transfer learning improves supervised image segmentation across imaging protocols

    DEFF Research Database (Denmark)

    van Opbroek, Annegreet; Ikram, M. Arfan; Vernooij, Meike W.

    2015-01-01

    with slightly different characteristics. The performance of the four transfer classifiers was compared to that of standard supervised classification on two MRI brain-segmentation tasks with multi-site data: white matter, gray matter, and CSF segmentation; and white-matter- /MS-lesion segmentation......The variation between images obtained with different scanners or different imaging protocols presents a major challenge in automatic segmentation of biomedical images. This variation especially hampers the application of otherwise successful supervised-learning techniques which, in order to perform...... well, often require a large amount of labeled training data that is exactly representative of the target data. We therefore propose to use transfer learning for image segmentation. Transfer-learning techniques can cope with differences in distributions between training and target data, and therefore...

  4. Have historical climate changes affected Gentoo penguin (Pygoscelis papua populations in Antarctica?

    Directory of Open Access Journals (Sweden)

    Fabiola Peña M

    Full Text Available The West Antarctic Peninsula (WAP has been suffering an increase in its atmospheric temperature during the last 50 years, mainly associated with global warming. This increment of temperature trend associated with changes in sea-ice dynamics has an impact on organisms, affecting their phenology, physiology and distribution range. For instance, rapid demographic changes in Pygoscelis penguins have been reported over the last 50 years in WAP, resulting in population expansion of sub-Antarctic Gentoo penguin (P. papua and retreat of Antarctic Adelie penguin (P. adeliae. Current global warming has been mainly associated with human activities; however these climate trends are framed in a historical context of climate changes, particularly during the Pleistocene, characterized by an alternation between glacial and interglacial periods. During the last maximal glacial (LGM∼21,000 BP the ice sheet cover reached its maximum extension on the West Antarctic Peninsula (WAP, causing local extinction of Antarctic taxa, migration to lower latitudes and/or survival in glacial refugia. We studied the HRVI of mtDNA and the nuclear intron βfibint7 of 150 individuals of the WAP to understand the demographic history and population structure of P. papua. We found high genetic diversity, reduced population genetic structure and a signature of population expansion estimated around 13,000 BP, much before the first paleocolony fossil records (∼1,100 BP. Our results suggest that the species may have survived in peri-Antarctic refugia such as South Georgia and North Sandwich islands and recolonized the Antarctic Peninsula and South Shetland Islands after the ice sheet retreat.

  5. Have historical climate changes affected Gentoo penguin (Pygoscelis papua) populations in Antarctica?

    Science.gov (United States)

    Peña M, Fabiola; Poulin, Elie; Dantas, Gisele P M; González-Acuña, Daniel; Petry, Maria Virginia; Vianna, Juliana A

    2014-01-01

    The West Antarctic Peninsula (WAP) has been suffering an increase in its atmospheric temperature during the last 50 years, mainly associated with global warming. This increment of temperature trend associated with changes in sea-ice dynamics has an impact on organisms, affecting their phenology, physiology and distribution range. For instance, rapid demographic changes in Pygoscelis penguins have been reported over the last 50 years in WAP, resulting in population expansion of sub-Antarctic Gentoo penguin (P. papua) and retreat of Antarctic Adelie penguin (P. adeliae). Current global warming has been mainly associated with human activities; however these climate trends are framed in a historical context of climate changes, particularly during the Pleistocene, characterized by an alternation between glacial and interglacial periods. During the last maximal glacial (LGM∼21,000 BP) the ice sheet cover reached its maximum extension on the West Antarctic Peninsula (WAP), causing local extinction of Antarctic taxa, migration to lower latitudes and/or survival in glacial refugia. We studied the HRVI of mtDNA and the nuclear intron βfibint7 of 150 individuals of the WAP to understand the demographic history and population structure of P. papua. We found high genetic diversity, reduced population genetic structure and a signature of population expansion estimated around 13,000 BP, much before the first paleocolony fossil records (∼1,100 BP). Our results suggest that the species may have survived in peri-Antarctic refugia such as South Georgia and North Sandwich islands and recolonized the Antarctic Peninsula and South Shetland Islands after the ice sheet retreat.

  6. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol h...

  7. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  8. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  9. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung; Kazandjieva, Maria A.; Jain, Mayank; Levis, Philip

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol's perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain's fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  10. Anthropometric standardisation and quality control protocols for the construction of new, international, fetal and newborn growth standards: the INTERGROWTH-21st Project.

    Science.gov (United States)

    Cheikh Ismail, L; Knight, H E; Ohuma, E O; Hoch, L; Chumlea, W C

    2013-09-01

    The primary aim of the INTERGROWTH-21(st) Project is to construct new, prescriptive standards describing optimal fetal and preterm postnatal growth. The anthropometric measurements include the head circumference, recumbent length and weight of the infants, and the stature and weight of the parents. In such a large, international, multicentre project, it is critical that all study sites follow standardised protocols to ensure maximal validity of the growth and nutrition indicators used. This paper describes in detail the anthropometric training, standardisation and quality control procedures used to collect data for these new standards. The initial standardisation session was in Nairobi, Kenya, using newborns, which was followed by similar sessions in the eight participating study sites in Brazil, China, India, Italy, Kenya, Oman, UK and USA. The intraobserver and inter-observer technical error of measurement values for head circumference range from 0.3 to 0.4 cm, and for recumbent length from 0.3 to 0.5 cm. These standardisation protocols implemented at each study site worldwide ensure that the anthropometric data collected are of the highest quality to construct international growth standards. © 2013 Royal College of Obstetricians and Gynaecologists.

  11. Characterization of the Defense Waste Processing Facility (DWPF) Environmental Assessment (EA) glass Standard Reference Material. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Jantzen, C.M.; Bibler, N.E.; Beam, D.C.; Crawford, C.L.; Pickett, M.A.

    1993-06-01

    Liquid high-level nuclear waste at the Savannah River Site (SRS) will be immobilized by vitrification in borosilicate glass. The glass will be produced and poured into stainless steel canisters in the Defense Waste Processing Facility (DWPF). Other waste form producers, such as West Valley Nuclear Services (WVNS) and the Hanford Waste Vitrification Project (HWVP), will also immobilize high-level radioactive waste in borosilicate glass. The canistered waste will be stored temporarily at each facility for eventual permanent disposal in a geologic repository. The Department of Energy has defined a set of requirements for the canistered waste forms, the Waste Acceptance Product Specifications (WAPS). The current Waste Acceptance Primary Specification (WAPS) 1.3, the product consistency specification, requires the waste form producers to demonstrate control of the consistency of the final waste form using a crushed glass durability test, the Product Consistency Test (PCI). In order to be acceptable, a waste glass must be more durable during PCT analysis than the waste glass identified in the DWPF Environmental Assessment (EA). In order to supply all the waste form producers with the same standard benchmark glass, 1000 pounds of the EA glass was fabricated. The chemical analyses and characterization of the benchmark EA glass are reported. This material is now available to act as a durability and/or redox Standard Reference Material (SRM) for all waste form producers.

  12. A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs

    Science.gov (United States)

    Malekpour, Mahyar R.

    2011-01-01

    This paper presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. We present an outline of a deductive proof of the correctness of the protocol. A bounded model of the protocol was mechanically verified for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.

  13. Extraction protocols for orthodontic treatment: A retrospective study

    Directory of Open Access Journals (Sweden)

    Vaishnevi N Thirunavukkarasu

    2016-01-01

    Full Text Available Background and Objectives: Various extraction protocols have been followed for successful orthodontic treatment. The purpose of this study was to evaluate the extraction protocols in patients who had previously undergone orthodontic treatment and also who had reported for continuing orthodontic treatment from other clinics. Materials and Methods: One hundred thirty eight patients who registered for orthodontic treatment at the Faculty of Dentistry were divided into 10 extraction protocols based on the Orthodontic treatment protocol given by Janson et al. and were evaluated for statistical significance. Results: The descriptive statistics of the study revealed a total of 40 (29% patients in protocol 1, 43 (31.2% in protocol 2, 18 (13% in protocol 3, 16 (11.6% in protocol 5, and 12 (8.7% in Type 3 category of protocol 9. The Type 3 category in protocol 9 was statistically significant compared to other studies. Midline shift and collapse of the arch form were noticed in these individuals. Conclusion: Extraction of permanent teeth such as canine and lateral incisors without rational reasons could have devastating consequences on the entire occlusion. The percentage of cases wherein extraction of permanent teeth in the crowded region was adopted as a treatment option instead of orthodontic treatment is still prevalent in dental practice. The shortage of orthodontists in Malaysia, the long waiting period, and lack of subjective need for orthodontic treatment at an earlier age group were the reasons for the patient's to choose extraction of the mal-aligned teeth such as the maxillary canine or maxillary lateral incisors.

  14. Outcomes of a rapid refeeding protocol in Adolescent Anorexia Nervosa.

    Science.gov (United States)

    Madden, Sloane; Miskovic-Wheatley, Jane; Clarke, Simon; Touyz, Stephen; Hay, Phillipa; Kohn, Michael R

    2015-01-01

    The impact of severe malnutrition and medical instability in adolescent Anorexia Nervosa (AN) on immediate health and long-term development underscores the need for safe and efficient methods of refeeding. Current refeeding guidelines in AN advocate low initial caloric intake with slow increases in energy intake to avoid refeeding syndrome. This study demonstrates the potential for more rapid refeeding to promote initial weight recovery and correct medical instability in adolescent AN. Seventy-eight adolescents with AN (12-18 years), hospitalised in two specialist paediatric eating disorder units, for medical instability (bradycardia, hypotension, hypothermia, orthostatic instability and/or cardiac arrhythmia) were followed during a 2.5 week admission. Patients were refed using a standardised protocol commencing with 24-72 hours of continuous nasogastric feeds (ceased with daytime medical stability) and routine oral phosphate supplementation, followed by nocturnal feeds and a meal plan of 1200-2400 kcal/day aiming for a total caloric intake of 2400-3000 kcal/day. Along with indicators of medical stability, weight, phosphate and glucose levels were recorded. All patients gained weight in week one (M = 2.79 kg, SD = 1.27 kg) and at subsequent measurement points with an average gain of 5.12 kg (SD = 2.96) at 2.5 weeks. No patient developed hypophosphatemia, hypoglycaemia, or stigmata of the refeeding syndrome. The refeeding protocol resulted in immediate weight gain and was well tolerated with no indicators of refeeding syndrome. There were no significant differences in outcomes between the treatment sites, suggesting the protocol is replicable. Australian Clinical Trials Register number: ACTRN012607000009415.

  15. Survey of protocols for the manual segmentation of the hippocampus: preparatory steps towards a joint EADC-ADNI harmonized protocol.

    Science.gov (United States)

    Boccardi, Marina; Ganzola, Rossana; Bocchetta, Martina; Pievani, Michela; Redolfi, Alberto; Bartzokis, George; Camicioli, Richard; Csernansky, John G; de Leon, Mony J; deToledo-Morrell, Leyla; Killiany, Ronald J; Lehéricy, Stéphane; Pantel, Johannes; Pruessner, Jens C; Soininen, H; Watson, Craig; Duchesne, Simon; Jack, Clifford R; Frisoni, Giovanni B

    2011-01-01

    Manual segmentation from magnetic resonance imaging (MR) is the gold standard for evaluating hippocampal atrophy in Alzheimer's disease (AD). Nonetheless, different segmentation protocols provide up to 2.5-fold volume differences. Here we surveyed the most frequently used segmentation protocols in the AD literature as a preliminary step for international harmonization. The anatomical landmarks (anteriormost and posteriormost slices, superior, inferior, medial, and lateral borders) were identified from 12 published protocols for hippocampal manual segmentation ([Abbreviation] first author, publication year: [B] Bartzokis, 1998; [C] Convit, 1997; [dTM] deToledo-Morrell, 2004; [H] Haller, 1997; [J] Jack, 1994; [K] Killiany, 1993; [L] Lehericy, 1994; [M] Malykhin, 2007; [Pa] Pantel, 2000; [Pr] Pruessner, 2000; [S] Soininen, 1994; [W] Watson, 1992). The hippocampi of one healthy control and one AD patient taken from the 1.5T MR ADNI database were segmented by a single rater according to each protocol. The accuracy of the protocols' interpretation and translation into practice was checked with lead authors of protocols through individual interactive web conferences. Semantically harmonized landmarks and differences were then extracted, regarding: (a) the posteriormost slice, protocol [B] being the most restrictive, and [H, M, Pa, Pr, S] the most inclusive; (b) inclusion [C, dTM, J, L, M, Pr, W] or exclusion [B, H, K, Pa, S] of alveus/fimbria; (c) separation from the parahippocampal gyrus, [C] being the most restrictive, [B, dTM, H, J, Pa, S] the most inclusive. There were no substantial differences in the definition of the anteriormost slice. This survey will allow us to operationalize differences among protocols into tracing units, measure their impact on the repeatability and diagnostic accuracy of manual hippocampal segmentation, and finally develop a harmonized protocol.

  16. A secure key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Luan Da-Peng

    2013-01-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol

  17. The protocol amending the 1963 Vienna Convention

    International Nuclear Information System (INIS)

    Lamm, V.

    2006-01-01

    Technically the Vienna Convention was revised by the adoption of the protocol to amend the instrument. and according to Article 19 of the protocol 'A State which is Party to this Protocol but not to the 1963 Vienna Convention shall be bound by the provisions of that Convention as amended by this Protocol in relation to other States Parties hereto, and failing an expression of a different intention by that State at the time of deposit of an instrument referred to in Article 20 shall be bound by the provisions of the 1963 Vienna Convention in relation to States which are only Parties thereto'. This solution has created a special situation, because after the entry into force of the protocol there will be living together or operating in practice 'two' Vienna Conventions, notably the convention's original text of 1963 and its new version as amended by the protocol. After the protocol has come into force, a state may only accede to the amended version, but in the inter se relations of the States Party to the 'old' Vienna Convention the provisions of that convention will remain in force until such time as they have acceded to the new protocol. This rather complicated situation is nevertheless understandable and is fully in accord with Article 40 of the 1969 Vienna Convention on the Law of Treaties, which provides for the amendment of multilateral treaties. In 1989 the negotiations on the revision of the Vienna Convention had begun with the aim of strengthening the existing nuclear liability regime and of improving the situation of potential victims of nuclear accidents. The Protocol to Amend the Vienna Convention serves those purposes; it also reflects a good compromise, since it is the outcome of a negotiation process in which experts from both nuclear and non-nuclear states, from Contacting Parties and non-Contracting Parties were very active. That affords some assurance that the compromise solution reached is acceptable to all States participating in the adoption of

  18. Security Protocol Review Method Analyzer(SPRMAN)

    OpenAIRE

    Navaz, A. S. Syed; Narayanan, H. Iyyappa; Vinoth, R.

    2013-01-01

    This Paper is designed using J2EE (JSP, SERVLET), HTML as front end and a Oracle 9i is back end. SPRMAN is been developed for the client British Telecom (BT) UK., Telecom company. Actually the requirement of BT is, they are providing Network Security Related Products to their IT customers like Virtusa,Wipro,HCL etc., This product is framed out by set of protocols and these protocols are been associated with set of components. By grouping all these protocols and components together, product is...

  19. Glass temperatures in free-standing canisters

    International Nuclear Information System (INIS)

    Hardy, B.J.; Hensel, S.J.

    1993-01-01

    The waste-forms produced by the Defense Waste Processing Facility (DWPF) are subject to the requirements of the Waste Acceptance Product Specifications (WAPS). The WAPS sets the maximum post cooldown temperature of the waste-form glass at 400 degrees C. This criterion must be satisfied for the ambient conditions and heat generation rates expected for the waste-forms. As part of the work described in task plan, WSRC-RP-93-1177, Rev. 0, a computer model was used to calculate the maximum glass temperatures in free standing wasteforms for a variety of ambient temperatures and heat generation rates

  20. Connecting Smartphone and Wearable Fitness Tracker Data with a Nationally Used Electronic Health Record System for Diabetes Education to Facilitate Behavioral Goal Monitoring in Diabetes Care: Protocol for a Pragmatic Multi-Site Randomized Trial.

    Science.gov (United States)

    Wang, Jing; Coleman, Deidra Carroll; Kanter, Justin; Ummer, Brad; Siminerio, Linda

    2018-04-02

    Mobile and wearable technology have been shown to be effective in improving diabetes self-management; however, integrating data from these technologies into clinical diabetes care to facilitate behavioral goal monitoring has not been explored. The objective of this paper is to report on a study protocol for a pragmatic multi-site trial along with the intervention components, including the detailed connected health interface. This interface was developed to integrate patient self-monitoring data collected from a wearable fitness tracker and its companion smartphone app to an electronic health record system for diabetes self-management education and support (DSMES) to facilitate behavioral goal monitoring. A 3-month multi-site pragmatic clinical trial was conducted with eligible patients with diabetes mellitus from DSMES programs. The Chronicle Diabetes system is currently freely available to diabetes educators through American Diabetes Association-recognized DSMES programs to set patient nutrition and physical activity goals. To integrate the goal-setting and self-monitoring intervention into the DSMES process, a connected interface in the Chronicle Diabetes system was developed. With the connected interface, patient self-monitoring information collected from smartphones and wearable fitness trackers can facilitate educators' monitoring of patients' adherence to their goals. Feasibility outcomes of the 3-month trial included hemoglobin A 1c levels, weight, and the usability of the connected system. An interface designed to connect data from a wearable fitness tracker with a companion smartphone app for nutrition and physical activity self-monitoring into a diabetes education electronic health record system was successfully developed to enable diabetes educators to facilitate goal setting and monitoring. A total of 60 eligible patients with type 2 diabetes mellitus were randomized into either group 1) standard diabetes education or 2) standard education enhanced with

  1. Development of DOE complexwide authorized release protocols for radioactive scrap metals

    International Nuclear Information System (INIS)

    Chen, S. Y.

    1998-01-01

    Within the next few decades, several hundred thousand tons of metal are expected to be removed from nuclear facilities across the U.S. Department of Energy (DOE) complex as a result of decontamination and decommissioning (D and D) activities. These materials, together with large quantities of tools, equipment, and other items that are commonly recovered from site cleanup or D and D activities, constitute non-real properties that warrant consideration for reuse or recycle, as permitted and practiced under the current DOE policy. The provisions for supporting this policy are contained in the Draft Handbook for Controlling Release for Reuse or Recycle of Property Containing Residual Radioactive Material published by DOE in 1997 and distributed to DOE field offices for interim use and implementation. The authorized release of such property is intended to permit its beneficial use across the entire DOE complex. The objective of this study is to develop readily usable computer-based release protocols to facilitate implementation of the Handbook in evaluating the scrap metals for reuse and recycle. The protocols provide DOE with an effective oversight tool for managing release activities

  2. Physical aspects of quality assurance in radiotherapy: A protocol for quality control

    International Nuclear Information System (INIS)

    Aguirre, J.F.; Alfonso-Laguardia, R.; Andreo, P.; Brunetto, M.; Marenco-Zuniga, H.; Gutt, F.; Torres-Calderon, A.

    2000-06-01

    In consistency with the increasing requests from Member States for establishing radiotherapy programmes, an IAEA Technical Co-operation project was initiated in Latin America aimed at improving the physical aspects (as a complement to the clinical issues) of quality assurance in radiotherapy; this ARCAL XXX project (RLA/6/032) was classified as a Model Project of the IAEA. Among the important outcomes of the project were (i) the training of a considerable number of medical physicists in hospitals of the region, (ii) the development of a protocol for quality control procedures, and (iii) the organization of quality audit site visits (to the participant countries) where the implementation in hospitals of the developed quality control procedures is verified. The present publication is the protocol for quality control of the physical aspects of radiotherapy. It contains detailed procedures on what should be measured by a medical physicist in a radiotherapy treatment unit and related equipment, and how this should be made. The latter is made through several appendices, which make the document rather unique. The protocol was developed by medical physicists of the region for the professionals of the region, and it is the first document of this kind ever written in Spanish. A training course was organized in November 1998 (Havana, Cuba) where its practical implementation was taught. There are plans to have this document translated into different languages for the various regions having similar TC projects. (author)

  3. U.S. Department of Energy's site screening, site selection, and initial characterization for storage of CO2 in deep geological formations

    Science.gov (United States)

    Rodosta, T.D.; Litynski, J.T.; Plasynski, S.I.; Hickman, S.; Frailey, S.; Myer, L.

    2011-01-01

    The U.S. Department of Energy (DOE) is the lead Federal agency for the development and deployment of carbon sequestration technologies. As part of its mission to facilitate technology transfer and develop guidelines from lessons learned, DOE is developing a series of best practice manuals (BPMs) for carbon capture and storage (CCS). The "Site Screening, Site Selection, and Initial Characterization for Storage of CO2 in Deep Geological Formations" BPM is a compilation of best practices and includes flowchart diagrams illustrating the general decision making process for Site Screening, Site Selection, and Initial Characterization. The BPM integrates the knowledge gained from various programmatic efforts, with particular emphasis on the Characterization Phase through pilot-scale CO2 injection testing of the Validation Phase of the Regional Carbon Sequestration Partnership (RCSP) Initiative. Key geologic and surface elements that suitable candidate storage sites should possess are identified, along with example Site Screening, Site Selection, and Initial Characterization protocols for large-scale geologic storage projects located across diverse geologic and regional settings. This manual has been written as a working document, establishing a framework and methodology for proper site selection for CO2 geologic storage. This will be useful for future CO2 emitters, transporters, and storage providers. It will also be of use in informing local, regional, state, and national governmental agencies of best practices in proper sequestration site selection. Furthermore, it will educate the inquisitive general public on options and processes for geologic CO2 storage. In addition to providing best practices, the manual presents a geologic storage resource and capacity classification system. The system provides a "standard" to communicate storage and capacity estimates, uncertainty and project development risk, data guidelines and analyses for adequate site characterization, and

  4. Energy-Aware RFID Anti-Collision Protocol.

    Science.gov (United States)

    Arjona, Laura; Simon, Hugo Landaluce; Ruiz, Asier Perallos

    2018-06-11

    The growing interest in mobile devices is transforming wireless identification technologies. Mobile and battery-powered Radio Frequency Identification (RFID) readers, such as hand readers and smart phones, are are becoming increasingly attractive. These RFID readers require energy-efficient anti-collision protocols to minimize the tag collisions and to expand the reader's battery life. Furthermore, there is an increasing interest in RFID sensor networks with a growing number of RFID sensor tags. Thus, RFID application developers must be mindful of tag anti-collision protocols. Energy-efficient protocols involve a low reader energy consumption per tag. This work presents a thorough study of the reader energy consumption per tag and analyzes the main factor that affects this metric: the frame size update strategy. Using the conclusion of this analysis, the anti-collision protocol Energy-Aware Slotted Aloha (EASA) is presented to decrease the energy consumption per tag. The frame size update strategy of EASA is configured to minimize the energy consumption per tag. As a result, EASA presents an energy-aware frame. The performance of the proposed protocol is evaluated and compared with several state of the art Aloha-based anti-collision protocols based on the current RFID standard. Simulation results show that EASA, with an average of 15 mJ consumed per tag identified, achieves a 6% average improvement in the energy consumption per tag in relation to the strategies of the comparison.

  5. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  6. API de Servicios para Dispositivos Móviles

    Directory of Open Access Journals (Sweden)

    Denys Buedo Hidalgo

    2010-07-01

    Full Text Available Durante el transcurso de los últimos años los servicios de mensajería inalámbrica (SMS, MMS y WAP Push han tenido un gran impacto en el mercado internacional. Haciendo uso de estos, se pueden generar una amplia variedad de servicios, permitiendo a las diferentes empresas de este sector obtener ganancias millonarias. En la actualidad existen varios protocolos de comunicación que permiten la transferencia de estos mensajes a los SMS Centers (SMSC y MMS Centers (MMSC, en lo adelante Centros de Mensajería Inalámbrica. Debido a la gran variedad de protocolos, así como las soluciones existentes en el mercado, han surgido ideas de cómo estandarizar dicha comunicación independientemente de cual sea el protocolo que se utilice para la transferencia de la información. En tal sentido surge en el año 2004 una especificación liderada principalmente por Nokia y Sun Microsystems conocida como SAMS. El presente trabajo trata sobre una implementación de dicha especificación, así como el desarrollo de los drivers para los protocolos PDU (Protocol Data Unit y SMPP (Short Message Peer to Peer v3.3 que permitan la transferencia de mensajes SMS, MMS y WAP Push entre las aplicaciones desarrolladas por las Empresas Proveedoras de Servicios y los Centros de Mensajería Inalámbrica. Se presenta además el desarrollo de elementos que no forman parte de la especificación pero que a su vez enriquecen la solución, dándole a la misma un mayor nivel de usabilidad.

  7. A tiered analytical protocol for the characterization of heavy oil residues at petroleum-contaminated hazardous waste sites

    International Nuclear Information System (INIS)

    Pollard, S.J.T.; Kenefick, S.L.; Hrudey, S.E.; Fuhr, B.J.; Holloway, L.R.; Rawluk, M.

    1994-01-01

    The analysis of hydrocarbon-contaminated soils from abandoned refinery sites in Alberta, Canada is used to illustrate a tiered analytical approach to the characterization of complex hydrocarbon wastes. Soil extracts isolated from heavy oil- and creosote-contaminated sites were characterized by thin layer chromatography with flame ionization detection (TLC-FID), ultraviolet fluorescence, simulated distillation (GC-SIMDIS) and chemical ionization GC-MS analysis. The combined screening and detailed analytical methods provided information essential to remedial technology selection including the extent of contamination, the class composition of soil extracts, the distillation profile of component classes and the distribution of individual class components within various waste fractions. Residual contamination was characteristic of heavy, degraded oils, consistent with documented site operations and length of hydrocarbon exposure at the soil surface

  8. Event-by-event simulation of quantum cryptography protocols

    NARCIS (Netherlands)

    Zhao, S.; Raedt, H. De

    We present a new approach to simulate quantum cryptography protocols using event-based processes. The method is validated by simulating the BB84 protocol and the Ekert protocol, both without and with the presence of an eavesdropper.

  9. WDM Network and Multicasting Protocol Strategies

    Directory of Open Access Journals (Sweden)

    Pinar Kirci

    2014-01-01

    Full Text Available Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM, it is easier to take the advantage of optical networks and optical burst switching (OBS and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET and Just In Time (JIT reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes.

  10. A More Efficient Contextuality Distillation Protocol

    Science.gov (United States)

    Meng, Hui-xian; Cao, Huai-xin; Wang, Wen-hua; Fan, Ya-jing; Chen, Liang

    2018-03-01

    Based on the fact that both nonlocality and contextuality are resource theories, it is natural to ask how to amplify them more efficiently. In this paper, we present a contextuality distillation protocol which produces an n-cycle box B ∗ B ' from two given n-cycle boxes B and B '. It works efficiently for a class of contextual n-cycle ( n ≥ 4) boxes which we termed as "the generalized correlated contextual n-cycle boxes". For any two generalized correlated contextual n-cycle boxes B and B ', B ∗ B ' is more contextual than both B and B '. Moreover, they can be distilled toward to the maximally contextual box C H n as the times of iteration goes to infinity. Among the known protocols, our protocol has the strongest approximate ability and is optimal in terms of its distillation rate. What is worth noting is that our protocol can witness a larger set of nonlocal boxes that make communication complexity trivial than the protocol in Brunner and Skrzypczyk (Phys. Rev. Lett. 102, 160403 2009), this might be helpful for exploring the problem that why quantum nonlocality is limited.

  11. An one-time-pad key communication protocol with entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We present an one-time-pad key communication protocol that allows secure direct communication with entanglement. Alice can send message to Bob in a deterministic manner by using local measurements and public communication. The theoretical efficiency of this protocol is double compared with BB84 protocol. We show this protocol is unconditional secure under arbitrary quantum attack. And we discuss that this protocol can be perfectly implemented with current technologies.

  12. Prosthesis Prescription Protocol of the Arm (PPP-Arm) : The implementation of a national prosthesis prescription protocol

    NARCIS (Netherlands)

    Wijdenes, Paula; Brouwers, Michael; van der Sluis, Corry K

    BACKGROUND AND AIM: In order to create more uniformity in the prescription of upper limb prostheses by Dutch rehabilitation teams, the development and implementation of a Prosthesis Prescription Protocol of the upper limb (PPP-Arm) was initiated. The aim was to create a national digital protocol to

  13. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  14. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...

  15. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  16. Comparison of a new whole-body continuous-table-movement protocol versus a standard whole-body MR protocol for the assessment of multiple myeloma

    International Nuclear Information System (INIS)

    Weckbach, S.; Michaely, H.J.; Schoenberg, S.O.; Dinter, D.J.; Stemmer, A.

    2010-01-01

    To evaluate a whole body (WB) continuous-table-movement (CTM) MR protocol for the assessment of multiple myeloma (MM) in comparison to a step-by-step WB protocol. Eighteen patients with MM were examined at 1.5T using a WB CTM protocol (axial T2-w fs BLADE, T1-w GRE sequence) and a step-by-step WB protocol including coronal/sagittal T1-w SE and STIR sequences as reference. Protocol time was assessed. Image quality, artefacts, liver/spleen assessability, and the ability to depict bone marrow lesions less than or greater than 1 cm as well as diffuse infiltration and soft tissue lesions were rated. Potential changes in the Durie and Salmon Plus stage and the detectability of complications were assessed. Mean protocol time was 6:38 min (CTM) compared to 24:32 min (standard). Image quality was comparable. Artefacts were more prominent using the CTM protocol (P = 0.0039). Organ assessability was better using the CTM protocol (P < 0.001). Depiction of bone marrow and soft tissue lesions was identical without a staging shift. Vertebral fractures were not detected using the CTM protocol. The new protocol allows a higher patient throughput and facilitates the depiction of extramedullary lesions. However, as long as vertebral fractures are not detectable, the protocol cannot be safely used for clinical routine without the acquisition of an additional sagittal sequence. (orig.)

  17. A genome-wide screen in human embryonic stem cells reveals novel sites of allele-specific histone modification associated with known disease loci

    LENUS (Irish Health Repository)

    Prendergast, James G D

    2012-05-19

    AbstractBackgroundChromatin structure at a given site can differ between chromosome copies in a cell, and such imbalances in chromatin structure have been shown to be important in understanding the molecular mechanisms controlling several disease loci. Human genetic variation, DNA methylation, and disease have been intensely studied, uncovering many sites of allele-specific DNA methylation (ASM). However, little is known about the genome-wide occurrence of sites of allele-specific histone modification (ASHM) and their relationship to human disease. The aim of this study was to investigate the extent and characteristics of sites of ASHM in human embryonic stem cells (hESCs).ResultsUsing a statistically rigorous protocol, we investigated the genomic distribution of ASHM in hESCs, and their relationship to sites of allele-specific expression (ASE) and DNA methylation. We found that, although they were rare, sites of ASHM were substantially enriched at loci displaying ASE. Many were also found at known imprinted regions, hence sites of ASHM are likely to be better markers of imprinted regions than sites of ASM. We also found that sites of ASHM and ASE in hESCs colocalize at risk loci for developmental syndromes mediated by deletions, providing insights into the etiology of these disorders.ConclusionThese results demonstrate the potential importance of ASHM patterns in the interpretation of disease loci, and the protocol described provides a basis for similar studies of ASHM in other cell types to further our understanding of human disease susceptibility.

  18. Food surveys for assessing chemical and dosimetric impacts near industrial sites

    International Nuclear Information System (INIS)

    Parache, V.; Maurau, S.; Mercat, C.

    2011-01-01

    Estimating the ingestion of potentially contaminated foodstuffs around conventional and nuclear industrial sites requires data about the food practices and eating habits of the local residents, especially the consumption of locally- and home-produced food. The IRSN thus chose to conduct surveys about these practices in the vicinity of nuclear sites. Their methodology was based on previous surveys near nuclear sites. In 2004, in partnership with AREVA and BEGEAT, the French Institute for Radioprotection and Nuclear Safety studied the eating habits of the residents of Bollene, near the Tricastin plant (Rhone Valley), with the aim of improving the quantification of the plant's potential health impacts. Based on these studies and as part of the SENSIB project to characterize vulnerability to nuclear risks, we developed and tested a survey protocol during the summer 2008, around the Chinon nuclear plant, in collaboration with EDF. The protocol is currently being tested around the Marcoule nuclear plant, in collaboration with the CEA. The aim was to optimize the feasibility and the reproducibility of the approach, while losing none of the robustness of the results. The data obtained made it possible to evaluate daily food intake values for individuals and to assess the rates of consumption of locally-grown products for many food categories. The data showed the existence of local population groups with very high rates of locally-grown food consumption - over 90 % of certain food products. This comparative study thus shows the significant variability of eating habits in the French population and proposes a reproducible approach to evaluating realistic indicators of potentially risky dietary habits. (authors)

  19. Effectiveness and Limitations of E-Mail Security Protocols

    OpenAIRE

    M. Tariq Banday

    2011-01-01

    Simple Mail Transport Protocol is the most widely adopted protocol for e-mail delivery. However, it lackssecurity features for privacy, authentication of sending party, integrity of e-mail message, nonrepudiationand consistency of e-mail envelope. To make e-mail communication secure and private,e-mail servers incorporate one or more security features using add-on security protocols. The add-onsecurity protocols provide a reasonable security but have several limitations. This paper discussesli...

  20. Effect of ultra-low doses, ASIR and MBIR on density and noise levels of MDCT images of dental implant sites.

    Science.gov (United States)

    Widmann, Gerlig; Al-Shawaf, Reema; Schullian, Peter; Al-Sadhan, Ra'ed; Hörmann, Romed; Al-Ekrish, Asma'a A

    2017-05-01

    Differences in noise and density values in MDCT images obtained using ultra-low doses with FBP, ASIR, and MBIR may possibly affect implant site density analysis. The aim of this study was to compare density and noise measurements recorded from dental implant sites using ultra-low doses combined with FBP, ASIR, and MBIR. Cadavers were scanned using a standard protocol and four low-dose protocols. Scans were reconstructed using FBP, ASIR-50, ASIR-100, and MBIR, and either a bone or standard reconstruction kernel. Density (mean Hounsfield units [HUs]) of alveolar bone and noise levels (mean standard deviation of HUs) was recorded from all datasets and measurements were compared by paired t tests and two-way ANOVA with repeated measures. Significant differences in density and noise were found between the reference dose/FBP protocol and almost all test combinations. Maximum mean differences in HU were 178.35 (bone kernel) and 273.74 (standard kernel), and in noise, were 243.73 (bone kernel) and 153.88 (standard kernel). Decreasing radiation dose increased density and noise regardless of reconstruction technique and kernel. The effect of reconstruction technique on density and noise depends on the reconstruction kernel used. • Ultra-low-dose MDCT protocols allowed more than 90 % reductions in dose. • Decreasing the dose generally increased density and noise. • Effect of IRT on density and noise varies with reconstruction kernel. • Accuracy of low-dose protocols for interpretation of bony anatomy not known. • Effect of low doses on accuracy of computer-aided design models unknown.

  1. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  2. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  3. Search and nonsearch protocols for radiographic consultation

    International Nuclear Information System (INIS)

    Swensson, R.G.; Theodore, G.H.

    1989-01-01

    Six radiologists, acting as film reviewers, used two different consultation protocols to differentiate among 292 ambiguous findings on chest films: 120 simulated nodules and 172 normal findings (previous readers' false-positive reports of nodules). The non-search protocol identified each finding (by location), and reviewers rated its likelihood as a nodule. The search protocol, which asked reviewers to report and rate all locations regarded as possible nodules on each film, assigned a default negative rating to any unreported finding (nodule or normal). Receiver operator characteristic analyses demonstrated a significantly higher accuracy for each reviewer's search- protocol discriminations between these nodules and confusing normal findings

  4. Damage estimates for European and U.S.sites using the U.S. high-cycle fatigue data base

    Energy Technology Data Exchange (ETDEWEB)

    Sutherland, H J [Wind Energy Technology, Sandia National Lab., Albuquerque, NM (United States)

    1996-09-01

    This paper uses two high-cycle fatigue data bases, one for typical U.S. blade materials and one for European materials, to analyze the service lifetime of a wind turbine blade subjected to the WISPER load spectrum for northern European sites and the WISPER protocol load spectrum for U.S. wind farm sites. The U.S. data base contains over 2200 data points that were obtained using coupon testing procedures. These data are used to construct a Goodman diagram that is suitable for analyzing wind turbine blades. This result is compared to the Goodman diagram derived from the European fatigue data base FACT. The LIFE2 fatigue analysis code for wind turbines is then used to predict the service lifetime of a turbine blade subjected to the two loading histories. The results of this study indicate that the WISPER load spectrum from northern European sites significantly underestimates the WISPER protocol load spectrum from a U.S. wind farm site, i.e., the WISPER load spectrum significantly underestimates the number and magnitude of the loads observed at a U.S. wind farm site. Further, the analysis demonstrate that the European and the U.S. fatigue material data bases are in general agreement for the prediction of tensile failures. However, for compressive failures, the two data bases are significantly different, with the U.S. data base predicting significantly shorter service lifetimes than the European data base. (au) 14 refs.

  5. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  6. FLIP: An Internetwork Protocol for Supporting Distributed Systems

    NARCIS (Netherlands)

    Kaashoek, M.F.; van Renesse, R.; van Staveren, H.; Tanenbaum, A.S.

    1993-01-01

    Most modern network protocols give adequate support for traditional applications such as file transfer and remote login. Distributed applications, however, have different requirements 1993. Instead of using ad hoc protocols to meet each of the new requirements, we have designed a new protocol,

  7. Biometrics based authentication scheme for session initiation protocol.

    Science.gov (United States)

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  8. The Kyoto Protocol Emissions Trading Mechanisms - A Model for financing future nuclear development in Romania

    International Nuclear Information System (INIS)

    Purica, Ionut; John Saroudis

    2001-01-01

    At the beginning of 2001 Romania ratified the Kyoto Protocol (Law 3/2001) thus becoming the first European country to do so. The mechanisms of the Kyoto Protocol are now opening new ways to sponsor the financing of nuclear projects. In May 2001 Societatea Nationala Nuclearoelectrica S.S. (SNN) and Atomic Energy of Canada Limited and ANSALDO of Italy signed a contract to complete the second CANDU unit at Cernavoda thus giving a new momentum to the nuclear program in Romania. The Government of Romania has indicated its desire to proceed with the completion of the other units on the Cernavoda site and is open to explore every potential financing mechanism to make this a reality. Although the Kyoto Protocol was not ratified by those countries that have the greatest need to reduce emissions, a market for emissions trading has developed, Canada being one of the important players in this market. Since the emission reduction per dollar invested in the Romanian nuclear program would bring much more reduction than the marginal reduction per dollar invested in environmental protection programs in Canada, where the saturation effect is already taking place, we consider that the application of the Kyoto Protocol mechanisms represents a realistic source for a sustainable cooperation of the two countries. This trend is in line with the latest activities of the International Atomic Energy Agency (IAEA). This paper analyzes the impact that the use of emissions credits would have on a typical financing scheme for a future CANDU project in Romania given the present situation and also proposes a model for the structure of the emissions trade that would generate a source of funding for the project. The conclusion is that there is real potential in using Kyoto Protocol mechanisms for financing nuclear development with benefits for both Romania and Canada. (authors)

  9. Security of the arbitrated quantum signature protocols revisited

    International Nuclear Information System (INIS)

    Kejia, Zhang; Dan, Li; Qi, Su

    2014-01-01

    Recently, much attention has been paid to the study of arbitrated quantum signature (AQS). Among these studies, the cryptanalysis of some AQS protocols and a series of improved ideas have been proposed. Compared with the previous analysis, we present a security criterion, which can judge whether an AQS protocol is able to prevent the receiver (i.e. one participant in the signature protocol) from forging a legal signature. According to our results, it can be seen that most AQS protocols which are based on the Zeng and Keitel (ZK) model are susceptible to a forgery attack. Furthermore, we present an improved idea of the ZK protocol. Finally, some supplement discussions and several interesting topics are provided. (paper)

  10. Use of the Multi-Agency Radiological Laboratory Analytical Protocols Manual (MARLAP) for site cleanup activities

    International Nuclear Information System (INIS)

    Griggs, J.

    1999-01-01

    MARLAP is being developed as a multi-agency guidance manual for project managers and radioanalytical laboratories. The document uses a performance based approach and will provide guidance and a framework to assure that laboratory radioanalytical data meets the specific project or program needs and requirements. MARLAP supports a wide range of data collection activities including site characterization and compliance demonstration activities. Current participants include: US Environmental Protection Agency (EPA), US Department of Energy (DOE), US Nuclear Regulatory Commission (NRC), US Department of Defense (DoD), US National Institutes of Standards and Technology (NIST), US Geologic Survey (USGS), US Food and Drug Administration (FDA), Commonwealth of Kentucky, and the State of California. MARLAP is the radioanalytical laboratory counterpart to the Multi-Agency Radiological Survey and Site Investigation Manual (MARSSIM). MARLAP is currently in a preliminary draft stage. (author)

  11. An electronic specimen collection protocol schema (eSCPS). Document architecture for specimen management and the exchange of specimen collection protocols between biobanking information systems.

    Science.gov (United States)

    Eminaga, O; Semjonow, A; Oezguer, E; Herden, J; Akbarov, I; Tok, A; Engelmann, U; Wille, S

    2014-01-01

    The integrity of collection protocols in biobanking is essential for a high-quality sample preparation process. However, there is not currently a well-defined universal method for integrating collection protocols in the biobanking information system (BIMS). Therefore, an electronic schema of the collection protocol that is based on Extensible Markup Language (XML) is required to maintain the integrity and enable the exchange of collection protocols. The development and implementation of an electronic specimen collection protocol schema (eSCPS) was performed at two institutions (Muenster and Cologne) in three stages. First, we analyzed the infrastructure that was already established at both the biorepository and the hospital information systems of these institutions and determined the requirements for the sufficient preparation of specimens and documentation. Second, we designed an eSCPS according to these requirements. Finally, a prospective study was conducted to implement and evaluate the novel schema in the current BIMS. We designed an eSCPS that provides all of the relevant information about collection protocols. Ten electronic collection protocols were generated using the supplementary Protocol Editor tool, and these protocols were successfully implemented in the existing BIMS. Moreover, an electronic list of collection protocols for the current studies being performed at each institution was included, new collection protocols were added, and the existing protocols were redesigned to be modifiable. The documentation time was significantly reduced after implementing the eSCPS (5 ± 2 min vs. 7 ± 3 min; p = 0.0002). The eSCPS improves the integrity and facilitates the exchange of specimen collection protocols in the existing open-source BIMS.

  12. Genetic Characterization of a Panel of Diverse HIV-1 Isolates at Seven International Sites.

    Directory of Open Access Journals (Sweden)

    Bhavna Hora

    Full Text Available HIV-1 subtypes and drug resistance are routinely tested by many international surveillance groups. However, results from different sites often vary. A systematic comparison of results from multiple sites is needed to determine whether a standardized protocol is required for consistent and accurate data analysis. A panel of well-characterized HIV-1 isolates (N = 50 from the External Quality Assurance Program Oversight Laboratory (EQAPOL was assembled for evaluation at seven international sites. This virus panel included seven subtypes, six circulating recombinant forms (CRFs, nine unique recombinant forms (URFs and three group O viruses. Seven viruses contained 10 major drug resistance mutations (DRMs. HIV-1 isolates were prepared at a concentration of 107 copies/ml and compiled into blinded panels. Subtypes and DRMs were determined with partial or full pol gene sequences by conventional Sanger sequencing and/or Next Generation Sequencing (NGS. Subtype and DRM results were reported and decoded for comparison with full-length genome sequences generated by EQAPOL. The partial pol gene was amplified by RT-PCR and sequenced for 89.4%-100% of group M viruses at six sites. Subtyping results of majority of the viruses (83%-97.9% were correctly determined for the partial pol sequences. All 10 major DRMs in seven isolates were detected at these six sites. The complete pol gene sequence was also obtained by NGS at one site. However, this method missed six group M viruses and sequences contained host chromosome fragments. Three group O viruses were only characterized with additional group O-specific RT-PCR primers employed by one site. These results indicate that PCR protocols and subtyping tools should be standardized to efficiently amplify diverse viruses and more consistently assign virus genotypes, which is critical for accurate global subtype and drug resistance surveillance. Targeted NGS analysis of partial pol sequences can serve as an alternative

  13. A high-throughput splinkerette-PCR method for the isolation and sequencing of retroviral insertion sites

    DEFF Research Database (Denmark)

    Uren, Anthony G; Mikkers, Harald; Kool, Jaap

    2009-01-01

    sites has been a major limitation to performing screens on this scale. Here we present a method for the high-throughput isolation of insertion sites using a highly efficient splinkerette-PCR method coupled with capillary or 454 sequencing. This protocol includes a description of the procedure for DNA......Insertional mutagens such as viruses and transposons are a useful tool for performing forward genetic screens in mice to discover cancer genes. These screens are most effective when performed using hundreds of mice; however, until recently, the cost-effective isolation and sequencing of insertion...

  14. Establishing treatment protocols for clinical mastitis.

    Science.gov (United States)

    Roberson, Jerry R

    2003-03-01

    Each farm has a unique mix of mastitis pathogens and management procedures that have evolved over time. The herd veterinarian should work with the manager/owner to systematically develop treatment protocols that meet the needs and management of the farm. To establish a mastitis treatment protocol, it is necessary to develop a system to routinely identify clinical mastitis cases, develop a herd-specific severity level assessment system, manage the clinical mastitis cases based on severity level and culture result (when available), avoid antibiotic residues, and monitor the success of the system and alter the protocol as necessary.

  15. The Singapore protocol [for quantum cryptography

    International Nuclear Information System (INIS)

    Englert, B.

    2005-01-01

    The qubit protocol for quantum key distribution presented in this talk is fully tomographic and more efficient than other tomographic protocols. Under ideal circumstances the efficiency is log 2 (4/3) = 0.415 key bits per qubit sent, which is 25% more than the efficiency of 1/3 = 0.333 for the standard 6-state protocol. One can extract 0.4 key bits per qubit by a simple two-way communication scheme, and can so get close to the information-theoretical limit. The noise thresholds for secure key bit generation in the presence of unbiased noise will be reported and discussed. (author)

  16. Securing statically-verified communications protocols against timing attacks

    DEFF Research Database (Denmark)

    Buchholtz, Mikael; Gilmore, Stephen; Hillston, Jane

    2004-01-01

    We present a federated analysis of communication protocols which considers both security properties and timing. These are not entirely independent observations of a protocol; by using timing observations of an executing protocol it is possible to deduce derived information about the nature...... of the communication even in the presence of unbreakable encryption. Our analysis is based on expressing the protocol as a process algebra model and deriving from this process models analysable by the Imperial PEPA Compiler and the LySatool....

  17. Optimized UAV Communication Protocol Based on Prior Locations

    OpenAIRE

    Sboui, Lokman; Rabah, Abdullatif

    2015-01-01

    In this paper, we adopt a new communication protocol between the UAV and fixed on-ground nodes. This protocol tends to reduce communication power consumption by stopping communication if the channel is not good to communicate (i.e. far nodes, obstacles, etc.) The communication is performed using the XBee 868M standard and Libelium wapsmotes. Our designed protocol is based on a new communication model that we propose in this paper. The protocole decides wether to communicate or not after compu...

  18. Decellularization of placentas: establishing a protocol

    Directory of Open Access Journals (Sweden)

    L.C.P.C. Leonel

    2017-11-01

    Full Text Available Biological biomaterials for tissue engineering purposes can be produced through tissue and/or organ decellularization. The remaining extracellular matrix (ECM must be acellular and preserve its proteins and physical features. Placentas are organs of great interest because they are discarded after birth and present large amounts of ECM. Protocols for decellularization are tissue-specific and have not been established for canine placentas yet. This study aimed at analyzing a favorable method for decellularization of maternal and fetal portions of canine placentas. Canine placentas were subjected to ten preliminary tests to analyze the efficacy of parameters such as the type of detergents, freezing temperatures and perfusion. Two protocols were chosen for further analyses using histology, scanning electron microscopy, immunofluorescence and DNA quantification. Sodium dodecyl sulfate (SDS was the most effective detergent for cell removal. Freezing placentas before decellularization required longer periods of incubation in different detergents. Both perfusion and immersion methods were capable of removing cells. Placentas decellularized using Protocol I (1% SDS, 5 mM EDTA, 50 mM TRIS, and 0.5% antibiotic preserved the ECM structure better, but Protocol I was less efficient to remove cells and DNA content from the ECM than Protocol II (1% SDS, 5 mM EDTA, 0.05% trypsin, and 0.5% antibiotic.

  19. Mac protocols for wireless sensor network (wsn): a comparative study

    International Nuclear Information System (INIS)

    Arshad, J.; Akram, Q.; Saleem, Y.

    2014-01-01

    Data communication between nodes is carried out under Medium Access Control (MAC) protocol which is defined at data link layer. The MAC protocols are responsible to communicate and coordinate between nodes according to the defined standards in WSN (Wireless Sensor Networks). The design of a MAC protocol should also address the issues of energy efficiency and transmission efficiency. There are number of MAC protocols that exist in the literature proposed for WSN. In this paper, nine MAC protocols which includes S-MAC, T-MAC, Wise-MAC, Mu-MAC, Z-MAC, A-MAC, D-MAC, B-MAC and B-MAC+ for WSN have been explored, studied and analyzed. These nine protocols are classified in contention based and hybrid (combination of contention and schedule based) MAC protocols. The goal of this comparative study is to provide a basis for MAC protocols and to highlight different mechanisms used with respect to parameters for the evaluation of energy and transmission efficiency in WSN. This study also aims to give reader a better understanding of the concepts, processes and flow of information used in these MAC protocols for WSN. A comparison with respect to energy reservation scheme, idle listening avoidance, latency, fairness, data synchronization, and throughput maximization has been presented. It was analyzed that contention based MAC protocols are less energy efficient as compared to hybrid MAC protocols. From the analysis of contention based MAC protocols in term of energy consumption, it was being observed that protocols based on preamble sampling consume lesser energy than protocols based on static or dynamic sleep schedule. (author)

  20. Development of a 3D remote dosimetry protocol compatible with MRgIMRT.

    Science.gov (United States)

    Mein, Stewart; Rankine, Leith; Adamovics, John; Li, Harold; Oldham, Mark

    2017-11-01

    system to evaluate the accuracy of MRgRT in these conditions. In the small volume study, in the presence of a 0.35 T magnetic field, PRESAGE ® was observed to respond linearly (R 2  = 0.9996) to Co-60 irradiation at t = 48 hrs postirradiation, within the dose ranges of 0 to 15 Gy, with a sensitivity of 0.0305(±0.003) ΔOD cm -1  Gy -1 . In the large volume studies, at t = 1 hr postirradiation, consistent linear response was observed, with average sensitivity of 0.0930 ± 0.002 ΔOD cm -1  Gy -1 . However, dosimeters gradually darkened with time (OD< 5% per day). A small radial dependence to the dosimeter sensitivity was measured (< 3% of maximum dose), which is attributed to a spherically symmetric dosimeter artifact arising from exothermic heating legacy in the PRESAGE ® polyurethane substrate during curing. When applied to the TG-119 IMRT irradiations, the remote dosimetry protocol (including correction terms) yielded excellent line-profile and 3D gamma agreement for 3%/3 mm, 10% threshold (mean passing rate = 96.6% ± 4.0%). A novel 3D remote dosimetry protocol is introduced for validating off-site dosimetrically complex radiotherapy systems, including MRgRT. The protocol involves correcting for temporal and spatially dependent changes in PRESAGE ® radiochromic dosimeters readout by optical-CT. Application of the protocol to TG-119 irradiations enabled verification of MRgRT dose distributions with high resolution. © 2017 American Association of Physicists in Medicine.

  1. Verbal protocols as methodological resources: research evidence

    Directory of Open Access Journals (Sweden)

    Alessandra Baldo

    2012-01-01

    Full Text Available This article aims at reflecting on the use of verbal protocols as a methodological resource in qualitative research, more specifically on the aspect regarded as the main limitation of a study about lexical inferencing in L2 (BALDO; VELASQUES, 2010: its subjective trait. The article begins with a brief literature review on protocols, followed by a description of the study in which they were employed as methodological resources. Based on that, protocol subjectivity is illustrated through samples of unparalleled data classification, carried out independently by two researchers. In the final section, the path followed to minimize the problem is presented, intending to contribute to improve efficiency in the use of verbal protocols in future research.

  2. Body Composition Changes after Weight-Loss Interventions among Obese Females: A Comparison of Three Protocols

    Directory of Open Access Journals (Sweden)

    Nayera E. Hassan

    2014-12-01

    Full Text Available AIM: To evaluate body composition changes after use of three different types of obesity management protocols: dietary measures and physical activity; acupuncture or laser acupuncture with healthy diet; aiming at achieving stable weight loss among obese Egyptian females. METHODS:  A randomized longitudinal prospective study included 76 obese adult females; aged 26 up to 55 years. Anthropometric, body composition, ultrasonographic and biochemical assessments were done. RESULTS: The three types of obesity management protocols showed significant improvement in body composition (decrease in fat% and increases in FFM and TBW and visceral fat by US. However, nutritional intervention showed highly significant improvement in the skin fold thickness at triceps and biceps sites and peripheral adiposity index.  Acupuncture intervention showed highly significant improvement in fasting blood glucose (decreased and lipid profile (decreased triglycerides, total cholesterol and LDL, and increased HDL. Laser intervention showed highly significant improvement in all the skin fold thickness and some parameters of lipid profile (decreased total cholesterol and LDL. CONCLUSIONS: The three obesity management protocols have significant effect on body composition, but acupuncture has the best effect in improving the lipid profile and fasting blood sugar. In addition, Laser intervention was recommended to improve skin fold thickness and subcutaneous fat.

  3. A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS

    Directory of Open Access Journals (Sweden)

    U. Latha

    2013-08-01

    Full Text Available The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints information. The proposed system comprised of three phases namely, fingerprint reconstruction, feature extraction and development of trigon based security protocol. In fingerprint reconstruction, the different crack variance level finger prints images are reconstructed by the M-band Dual Tree Complex Wavelet Transform (DTCWT. After that features are extracted by binarization. A set of finger print images are utilized to evaluate the performance of security protocol and the result from this process guarantees the healthiness of the proposed trigon based security protocol. The implementation results show the effectiveness of proposed trigon based security protocol in protecting the finger print information and the achieved improvement in image reconstruction and the security process.

  4. Cryptographic protocol security analysis based on bounded constructing algorithm

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    An efficient approach to analyzing cryptographic protocols is to develop automatic analysis tools based on formal methods. However, the approach has encountered the high computational complexity problem due to reasons that participants of protocols are arbitrary, their message structures are complex and their executions are concurrent. We propose an efficient automatic verifying algorithm for analyzing cryptographic protocols based on the Cryptographic Protocol Algebra (CPA) model proposed recently, in which algebraic techniques are used to simplify the description of cryptographic protocols and their executions. Redundant states generated in the analysis processes are much reduced by introducing a new algebraic technique called Universal Polynomial Equation and the algorithm can be used to verify the correctness of protocols in the infinite states space. We have implemented an efficient automatic analysis tool for cryptographic protocols, called ACT-SPA, based on this algorithm, and used the tool to check more than 20 cryptographic protocols. The analysis results show that this tool is more efficient, and an attack instance not offered previously is checked by using this tool.

  5. Authentication Protocol using Quantum Superposition States

    Energy Technology Data Exchange (ETDEWEB)

    Kanamori, Yoshito [University of Alaska; Yoo, Seong-Moo [University of Alabama, Huntsville; Gregory, Don A. [University of Alabama, Huntsville; Sheldon, Frederick T [ORNL

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  6. Entanglement distillation protocols and number theory

    International Nuclear Information System (INIS)

    Bombin, H.; Martin-Delgado, M.A.

    2005-01-01

    We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set Z D n associated with Bell diagonal states is a module rather than a vector space. We find that a partition of Z D n into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D. When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively

  7. Saudi Arabia and CERN sign protocol

    CERN Multimedia

    2008-01-01

    On 9 May 2008, Mohammed I. Al Suwaiyel, President of the King Abdulaziz City of Science and Technology, representing the Government of Saudi Arabia, and CERN Director-General, Robert Aymar, signed a protocol to the 2006 cooperation agreement between CERN and Saudi Arabia. Members of the Saudi Arabian Government visit ATLAS.The purpose of the protocol is to define the operational framework needed to carry out various specific tasks provided for in the cooperation agreement in order to promote the development of a high energy particle physics community in Saudi Arabia and its ultimate visible participation as a member of the global CERN community. Signing the protocol, Mohammed I. Al-Suwaiyel said: "The Saudi Arabian Government has taken a number of initiatives to promote R&D in the interests of our country’s development and the advancement of science. Thanks to this protocol, Saudi scientists will be able to work towards this go...

  8. Novel protocol for persister cells isolation.

    Directory of Open Access Journals (Sweden)

    Silvia J Cañas-Duarte

    Full Text Available Bacterial persistence, where a fraction of a population presents a transient resistance to bactericidal substances, has great medical importance due to its relation with the appearance of antibiotic resistances and untreatable bacterial chronic infections. The mechanisms behind this phenomenon remain largely unknown in spite of recent advances, in great part because of the difficulty in isolating the very small fraction of the population that is in this state at any given time. Current protocols for persister isolation have resulted in possible biases because of the induction of this state by the protocol itself. Here we present a novel protocol that allows rapid isolation of persister cells both from exponential and stationary phase. Moreover, it is capable of differentiating between type I and type II persister cells, which should allow the field to move beyond its current state of studying only one type. While this protocol prompts a revision of many of the current results, it should greatly facilitate further advances in the field.

  9. Feeling Is Believing: A Secure Template Exchange Protocol

    NARCIS (Netherlands)

    Buhan, I.R.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.; Lee, Seong-Whan; Li, Stan Z.

    We use grip pattern based biometrics as a secure side channel to achieve pre-authentication in a protocol that sets up a secure channel between two hand held devices. The protocol efficiently calculates a shared secret key from biometric data. The protocol is used in an application where grip

  10. Report made on behalf of the commission of foreign affairs, defence and military forces about the bill authorizing the approval of the additional protocol to the construction agreement between the French government and the International organization of fusion energy for the joint implementation of the ITER project, and relative to the role of the labour inspection on the ITER international organization site and dealing with occupational health and safety

    International Nuclear Information System (INIS)

    2009-12-01

    This additional protocol to the construction agreement between the French Government and the ITER Organization aims at allowing the French labour inspection services to control the good respect of the French occupational health and safety regulation at the project site (Cadarache, Bouches du Rhone) and to play its role of adviser to the persons responsible for the organization. The report briefly recalls the ITER project and its organization, and then presents the actual situation and the objective of the additional protocol. (J.S.)

  11. Optimizing the high-resolution manometry (HRM) study protocol.

    Science.gov (United States)

    Patel, A; Ding, A; Mirza, F; Gyawali, C P

    2015-02-01

    Intolerance of the esophageal manometry catheter may prolong high-resolution manometry (HRM) studies and increase patient distress. We assessed the impact of obtaining the landmark phase at the end of the study when the patient has acclimatized to the HRM catheter. 366 patients (mean age 55.4 ± 0.8 years, 62.0% female) undergoing esophageal HRM over a 1-year period were studied. The standard protocol consisted of the landmark phase, 10 5 mL water swallows 20-30 s apart, and multiple rapid swallows where 4-6 2 mL swallows were administered in rapid succession. The modified protocol consisted of the landmark phase at the end of the study after test swallows. Study duration, technical characteristics, indications, and motor findings were compared between standard and modified protocols. Of the 366 patients, 89.6% underwent the standard protocol (study duration 12.9 ± 0.3 min). In 10.4% with poor catheter tolerance undergoing the modified protocol, study duration was significantly longer (15.6 ± 1.0 min, p = 0.004) despite similar duration of study maneuvers. Only elevated upper esophageal sphincter basal pressures at the beginning of the study segregated modified protocol patients. The 95th percentile time to landmark phase in the standard protocol patients was 6.1 min; as many as 31.4% of modified protocol patients could not obtain their first study maneuver within this period (p = 0.0003). Interpretation was not impacted by shifting the landmark phase to the end of the study. Modification of the HRM study protocol with the landmark phase obtained at the end of the study optimizes study duration without compromising quality. © 2014 John Wiley & Sons Ltd.

  12. Multiprofissional electronic protocol in ophtalmology with enfasis in strabismus

    Directory of Open Access Journals (Sweden)

    CHRISTIE GRAF RIBEIRO

    Full Text Available ABSTRACT Objective: to create and validate an electronic database in ophthalmology focused on strabismus, to computerize this database in the form of a systematic data collection software named Electronic Protocol, and to incorporate this protocol into the Integrated System of Electronic Protocols (SINPE(c. Methods: this is a descriptive study, with the methodology divided into three phases: (1 development of a theoretical ophthalmologic database with emphasis on strabismus; (2 computerization of this theoretical ophthalmologic database using SINPE(c and (3 interpretation of the information with demonstration of results to validate the protocol. We inputed data from the charts of fifty patients with known strabismus through the Electronic Protocol for testing and validation. Results: the new electronic protocol was able to store information regarding patient history, physical examination, laboratory exams, imaging results, diagnosis and treatment of patients with ophthalmologic diseases, with emphasis on strabismus. We included 2,141 items in this master protocol and created 20 new specific electronic protocols for strabismus, each with its own specifics. Validation was achieved through correlation and corroboration of the symptoms and confirmed diagnoses of the fifty included patients with the diagnostic criteria for the twenty new strabismus protocols. Conclusion: a new, validated electronic database focusing on ophthalmology, with emphasis on strabismus, was successfully created through the standardized collection of information, and computerization of the database using proprietary software. This protocol is ready for deployment to facilitate data collection, sorting and application for practitioners and researchers in numerous specialties.

  13. Robowell: An automated process for monitoring ground water quality using established sampling protocols

    Science.gov (United States)

    Granato, G.E.; Smith, K.P.

    1999-01-01

    Robowell is an automated process for monitoring selected ground water quality properties and constituents by pumping a well or multilevel sampler. Robowell was developed and tested to provide a cost-effective monitoring system that meets protocols expected for manual sampling. The process uses commercially available electronics, instrumentation, and hardware, so it can be configured to monitor ground water quality using the equipment, purge protocol, and monitoring well design most appropriate for the monitoring site and the contaminants of interest. A Robowell prototype was installed on a sewage treatment plant infiltration bed that overlies a well-studied unconfined sand and gravel aquifer at the Massachusetts Military Reservation, Cape Cod, Massachusetts, during a time when two distinct plumes of constituents were released. The prototype was operated from May 10 to November 13, 1996, and quality-assurance/quality-control measurements demonstrated that the data obtained by the automated method was equivalent to data obtained by manual sampling methods using the same sampling protocols. Water level, specific conductance, pH, water temperature, dissolved oxygen, and dissolved ammonium were monitored by the prototype as the wells were purged according to U.S Geological Survey (USGS) ground water sampling protocols. Remote access to the data record, via phone modem communications, indicated the arrival of each plume over a few days and the subsequent geochemical reactions over the following weeks. Real-time availability of the monitoring record provided the information needed to initiate manual sampling efforts in response to changes in measured ground water quality, which proved the method and characterized the screened portion of the plume in detail through time. The methods and the case study described are presented to document the process for future use.

  14. Optical code-division multiple-access protocol with selective retransmission

    Science.gov (United States)

    Mohamed, Mohamed A. A.; Shalaby, Hossam M. H.; El-Badawy, El-Sayed A.

    2006-05-01

    An optical code-division multiple-access (OCDMA) protocol based on selective retransmission technique is proposed. The protocol is modeled using a detailed state diagram and is analyzed using equilibrium point analysis (EPA). Both traditional throughput and average delay are used to examine its performance for several network parameters. In addition, the performance of the proposed protocol is compared to that of the R3T protocol, which is based on a go-back-n technique. Our results show that a higher performance is achieved by the proposed protocol at the expense of system complexity.

  15. Protocol Monitoring Energy Conservation; Protocol Monitoring Energiebesparing

    Energy Technology Data Exchange (ETDEWEB)

    Boonekamp, P.G.M. [ECN Beleidsstudies, Petten (Netherlands); Mannaerts, H. [Centraal Planburea CPB, Den Haag (Netherlands); Tinbergen, W. [Centraal Bureau voor de Statistiek CBS, Den Haag (Netherlands); Vreuls, H.H.J. [Nederlandse onderneming voor energie en milieu Novem, Utrecht (Netherlands); Wesselink, B. [Rijksinstituut voor Volksgezondheid en Milieuhygiene RIVM, Bilthoven (Netherlands)

    2001-12-01

    On request of the Dutch ministry of Economic Affairs five institutes have collaborated to create a 'Protocol Monitoring Energy Conservation', a common method and database to calculate the amount of energy savings realised in past years. The institutes concerned are the Central Bureau of Statistics (CBS), the Netherlands Bureau for Economic Policy Analysis (CPB), the Energy research Centre of the Netherlands (ECN), the National Agency for Energy and Environment (Novem) and the Netherlands Institute of Public Health and the Environment (RIVM). The institutes have agreed upon a clear definition of energy use and energy savings. The demarcation with renewable energy, the saving effects of substitution between energy carriers and the role of import and export of energy have been elaborated. A decomposition method is used to split up the observed change in energy use in a number of effects, on a national and sectoral level. This method includes an analysis of growth effects, effects of structural changes in production and consumption activities and savings on end use or with more efficient conversion processes. To calculate these effects the total energy use is desegregated as much as possible. For each segment a reference energy use is calculated according to the trend in a variable which is supposed to be representative for the use without savings. The difference with the actual energy use is taken as the savings realised. Results are given for the sectors households, industry, agriculture, services and government, transportation and the energy sector; as well as a national figure. A special feature of the protocol method is the application of primary energy use figures in the determination of savings for end users. This means that the use of each energy carrier is increased with a certain amount, according to the conversion losses caused elsewhere in the energy system. The losses concern the base year energy sector and losses abroad for imports of secondary

  16. Sufficient Conditions for Vertical Composition of Security Protocols (Extended Version)

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Viganò, Luca

    a certain kind of channel as a goal and another secure protocol P2 that assumes this kind of channel, can we then derive that their vertical composition P2[P1] is secure? It is well known that protocol composition can lead to attacks even when the individual protocols are all secure in isolation......Vertical composition of security protocols means that an application protocol (e.g., a banking service) runs over a channel established by another protocol (e.g., a secure channel provided by TLS). This naturally gives rise to a compositionality question: given a secure protocol P1 that provides....... In this paper, we formalize seven easy-to-check static conditions that support a large class of channels and applications and that we prove to be su_cient for vertical security protocol composition....

  17. Effect of ultra-low doses, ASIR and MBIR on density and noise levels of MDCT images of dental implant sites

    Energy Technology Data Exchange (ETDEWEB)

    Widmann, Gerlig; Schullian, Peter [Medical University of Innsbruck, Department of Radiology, Innsbruck (Austria); Al-Shawaf, Reema; Al-Sadhan, Ra' ed; Al-Ekrish, Asma' a A. [King Saud University, Department of Oral Medicine and Diagnostic Sciences, College of Dentistry, Riyadh (Saudi Arabia); Hoermann, Romed [Medical University of Innsbruck, Division of Clinical and Functional Anatomy, Innsbruck (Austria)

    2017-05-15

    Differences in noise and density values in MDCT images obtained using ultra-low doses with FBP, ASIR, and MBIR may possibly affect implant site density analysis. The aim of this study was to compare density and noise measurements recorded from dental implant sites using ultra-low doses combined with FBP, ASIR, and MBIR. Cadavers were scanned using a standard protocol and four low-dose protocols. Scans were reconstructed using FBP, ASIR-50, ASIR-100, and MBIR, and either a bone or standard reconstruction kernel. Density (mean Hounsfield units [HUs]) of alveolar bone and noise levels (mean standard deviation of HUs) was recorded from all datasets and measurements were compared by paired t tests and two-way ANOVA with repeated measures. Significant differences in density and noise were found between the reference dose/FBP protocol and almost all test combinations. Maximum mean differences in HU were 178.35 (bone kernel) and 273.74 (standard kernel), and in noise, were 243.73 (bone kernel) and 153.88 (standard kernel). Decreasing radiation dose increased density and noise regardless of reconstruction technique and kernel. The effect of reconstruction technique on density and noise depends on the reconstruction kernel used. (orig.)

  18. Effect of ultra-low doses, ASIR and MBIR on density and noise levels of MDCT images of dental implant sites

    International Nuclear Information System (INIS)

    Widmann, Gerlig; Schullian, Peter; Al-Shawaf, Reema; Al-Sadhan, Ra'ed; Al-Ekrish, Asma'a A.; Hoermann, Romed

    2017-01-01

    Differences in noise and density values in MDCT images obtained using ultra-low doses with FBP, ASIR, and MBIR may possibly affect implant site density analysis. The aim of this study was to compare density and noise measurements recorded from dental implant sites using ultra-low doses combined with FBP, ASIR, and MBIR. Cadavers were scanned using a standard protocol and four low-dose protocols. Scans were reconstructed using FBP, ASIR-50, ASIR-100, and MBIR, and either a bone or standard reconstruction kernel. Density (mean Hounsfield units [HUs]) of alveolar bone and noise levels (mean standard deviation of HUs) was recorded from all datasets and measurements were compared by paired t tests and two-way ANOVA with repeated measures. Significant differences in density and noise were found between the reference dose/FBP protocol and almost all test combinations. Maximum mean differences in HU were 178.35 (bone kernel) and 273.74 (standard kernel), and in noise, were 243.73 (bone kernel) and 153.88 (standard kernel). Decreasing radiation dose increased density and noise regardless of reconstruction technique and kernel. The effect of reconstruction technique on density and noise depends on the reconstruction kernel used. (orig.)

  19. A customised cold-water immersion protocol favours one-size-fits-all protocols in improving acute performance recovery

    NARCIS (Netherlands)

    Zandvoort, Coen S.; de Zwart, Jelmer R.; van Keeken, Brenda L.; Viroux, Patrick J.F.; Tiemessen, Ivo J.H.

    The purpose of the present study was to investigate whether a customised cold-water immersion (CWIc) protocol was more effective in enhancing acute performance recovery than a one-size-fits-all CWI (CWIs) or active recovery (AR) protocol. On three separate testing days, 10 healthy, physically

  20. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... results. The most important generalization is the support for all security properties of the geometric fragment proposed by [Gut14]....... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...

  1. The Swedish Research Infrastructure for Ecosystem Science - SITES

    Science.gov (United States)

    Lindroth, A.; Ahlström, M.; Augner, M.; Erefur, C.; Jansson, G.; Steen Jensen, E.; Klemedtsson, L.; Langenheder, S.; Rosqvist, G. N.; Viklund, J.

    2017-12-01

    The vision of SITES is to promote long-term field-based ecosystem research at a world class level by offering an infrastructure with excellent technical and scientific support and services attracting both national and international researchers. In addition, SITES will make data freely and easily available through an advanced data portal which will add value to the research. During the first funding period, three innovative joint integrating facilities were established through a researcher-driven procedure: SITES Water, SITES Spectral, and SITES AquaNet. These new facilities make it possible to study terrestrial and limnic ecosystem processes across a range of ecosystem types and climatic gradients, with common protocols and similar equipment. In addition, user-driven development at the nine individual stations has resulted in e.g. design of a long-term agricultural systems experiment, and installation of weather stations, flux systems, etc. at various stations. SITES, with its integrative approach and broad coverage of climate and ecosystem types across Sweden, constitutes an excellent platform for state-of-the-art research projects. SITES' support the development of: A better understanding of the way in which key ecosystems function and interact with each other at the landscape level and with the climate system in terms of mass and energy exchanges. A better understanding of the role of different organisms in controlling different processes and ultimately the functioning of ecosystems. New strategies for forest management to better meet the many and varied requirements from nature conservation, climate and wood, fibre, and energy supply points of view. Agricultural systems that better utilize resources and minimize adverse impacts on the environment. Collaboration with other similar infrastructures and networks is a high priority for SITES. This will enable us to make use of each others' experiences, harmonize metadata for easier exchange of data, and support each

  2. Protocol recommendations for CT of the lungs. Konsensus der Arbeitsgemeinschaft Thoraxdiagnostik der DRG; Protokollempfehlungen fuer die Computertomografie der Lunge. Konsensus der Arbeitsgemeinschaft Thoraxdiagnostik der DRG

    Energy Technology Data Exchange (ETDEWEB)

    Biederer, J.; Bolte, H. [Universitaetsklinikum Schleswig-Holstein, Campus Kiel (Germany). Klinik fuer Diagnostische Radiologie; Wildberger, J.E.; Hieckel, H.G. [Helios Klinikum Berlin-Buch (Germany). Inst. fuer Roentgendiagnostik; Reuter, M. [Vivantes Klinikum Neukoelln, Berlin (Germany). Inst. fuer Radiologie und Interventionelle Therapie; Fink, C. [Universitaetsklinikum Mannheim (Germany). Inst. fuer Klinische Radiologie und Nuklearmedizin; Tuengerthal, S.; Heussel, C.P. [Thoraxklinik Heidelberg (Germany). Radiologie; Rehbock, B. [St. Hedwig Krankenhaus, Berlin-Mitte (Germany). Praxis fuer Diagnostische Radiologie; Wormanns, D. [Evangelische Lungenklinik Berlin (Germany); Diederich, S. [Marien-Hospital, Duesseldorf (Germany). Inst. fuer Diagnostische und Interventionelle Radiologie und Nuklearmedizin; Hofmann-Preiss, K. [Radiologische Gemeinschaftspraxis Erlangen (Germany); Loercher, U. [Deutsche Klinik fuer Diagnostik, Wiesbaden (Germany). Fachbereich Bildgebende Verfahren

    2008-05-15

    An increasing variety of computed tomography scanners with different imaging geometry and diverse protocol recommendations of the vendors for chest imaging have raised the need for a consensus on basic imaging protocols. In addition to this, radiation exposure has become a relevant issue in computed tomography. With the recommendations of this article it was intended to provide a schematic set of protocols and recommendations for computed tomography of the lung, i.e. to facilitate follow-up reads of studies that were acquired with different scanners and at different sites. Four different types of protocols are suggested for different groups of indications. The basic protocol is a contrast-enhanced helical study with sufficient spatial resolution for tumour staging and workup of unclear situations. The second protocol is a refinement of this protocol with increased spatial resolution dedicated to vessel imaging and computeraided (CAD) applications. Depending on the z-coverage, this infers a higher radiation exposure and more data for post-processing and storage. A low dose protocol is recommended for short term follow up of known disease and imaging focused on the lung parenchyma only. For diffuse lung disease, an additional HRCT-mode inincremental technique can be applied. Adapted protocol recommendations are given for three scanner groups (single row detector and twin, 4-16 row detector and 32 and more row detectors). Nevertheless, individual adjustments for all patients are essential and some of the parameters will need to be adjusted for specific scanners and may thus differ from these general recommendations. Finally, we make suggestions for documentation, reporting and archiving (preferably digital). (orig.)

  3. The Geneva Protocol of 1925

    International Nuclear Information System (INIS)

    Mc Elroy, R.J.

    1991-01-01

    This paper reports that when President Gerald Ford signed the instruments of ratification for the Geneva Protocol of 1925 on January 22, 1975, a tortured, half-century-long chapter in U.S. arms control policy was brought to a close. Fifty years earlier, at the Geneva Conference for the Control of the International Trade in Arms, Munitions and Implements of War, the United States had played a key role in drafting and reaching agreement on the Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases and of Bacteriological Methods of Warfare. The protocol, signed by thirty nations, including the United States, on June 17, 1925, prohibits the use in war of asphyxiating, poisonous or other gases, and of all analogous liquids, materials or devices as well as the use of bacteriological methods of warfare

  4. An entanglement concentration protocol for cluster states using ...

    Indian Academy of Sciences (India)

    Permanent link: http://www.ias.ac.in/article/fulltext/pram/086/05/0973-0983 ... The purpose of this paper is a proposal on entanglement concentration protocol forcluster states. The protocol ... We also make a comparative numerical study of the residual entanglement left out after the execution of each step of the protocol.

  5. Breaking Megrelishvili protocol using matrix diagonalization

    Science.gov (United States)

    Arzaki, Muhammad; Triantoro Murdiansyah, Danang; Adi Prabowo, Satrio

    2018-03-01

    In this article we conduct a theoretical security analysis of Megrelishvili protocol—a linear algebra-based key agreement between two participants. We study the computational complexity of Megrelishvili vector-matrix problem (MVMP) as a mathematical problem that strongly relates to the security of Megrelishvili protocol. In particular, we investigate the asymptotic upper bounds for the running time and memory requirement of the MVMP that involves diagonalizable public matrix. Specifically, we devise a diagonalization method for solving the MVMP that is asymptotically faster than all of the previously existing algorithms. We also found an important counterintuitive result: the utilization of primitive matrix in Megrelishvili protocol makes the protocol more vulnerable to attacks.

  6. Overview of the InterGroup protocols

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah A. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Melliar-Smith, P. Michael [Univ. of California, Santa Barbara, CA (United States); Moser, Louise E. [Univ. of California, Santa Barbara, CA (United States)

    2001-03-01

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

  7. Assessing health systems for type 1 diabetes in sub-Saharan Africa: developing a 'Rapid Assessment Protocol for Insulin Access'

    Directory of Open Access Journals (Sweden)

    de Courten Maximilian

    2006-02-01

    Full Text Available Abstract Background In order to improve the health of people with Type 1 diabetes in developing countries, a clear analysis of the constraints to insulin access and diabetes care is needed. We developed a Rapid Assessment Protocol for Insulin Access, comprising a series of questionnaires as well as a protocol for the gathering of other data through site visits, discussions, and document reviews. Methods The Rapid Assessment Protocol for Insulin Access draws on the principles of Rapid Assessment Protocols which have been developed and implemented in several different areas. This protocol was adapted through a thorough literature review on diabetes, chronic condition management and medicine supply in developing countries. A visit to three countries in sub-Saharan Africa and meetings with different experts in the field of diabetes helped refine the questionnaires. Following the development of the questionnaires these were tested with various people familiar with diabetes and/or healthcare in developing countries. The Protocol was piloted in Mozambique then refined and had two further iterations in Zambia and Mali. Translations of questionnaires were made into local languages when necessary, with back translation to ensure precision. Results In each country the protocol was implemented in 3 areas – the capital city, a large urban centre and a predominantly rural area and their respective surroundings. Interviews were carried out by local teams trained on how to use the tool. Data was then collected and entered into a database for analysis. Conclusion The Rapid Assessment Protocol for Insulin Access was developed to provide a situational analysis of Type 1 diabetes, in order to make recommendations to the national Ministries of Health and Diabetes Associations. It provided valuable information on patients' access to insulin, syringes, monitoring and care. It was thus able to sketch a picture of the health care system with regards to its ability to

  8. Efficient Communication Protocols for Deciding Edit Distance

    DEFF Research Database (Denmark)

    Jowhari, Hossein

    2012-01-01

    In this paper we present two communication protocols on computing edit distance. In our first result, we give a one-way protocol for the following Document Exchange problem. Namely given x ∈ Σn to Alice and y ∈ Σn to Bob and integer k to both, Alice sends a message to Bob so that he learns x...... or truthfully reports that the edit distance between x and y is greater than k. For this problem, we give a randomized protocol in which Alice transmits at most O ˜ (klog 2 n) bits and each party’s time complexity is O ˜ (nlogn+k 2 log 2 n) . Our second result is a simultaneous protocol for edit distance over...... permutations. Here Alice and Bob both send a message to a third party (the referee) who does not have access to the input strings. Given the messages, the referee decides if the edit distance between x and y is at most k or not. For this problem we give a protocol in which Alice and Bob run a O...

  9. Recommendations for Enhancing Implementation of Additional Protocol Declarations

    International Nuclear Information System (INIS)

    Niina, Toshiaki; Nidaira, Kazuo; Aono, Yosuke

    2010-01-01

    Japan signed the Additional Protocol (hereafter, AP) in December 1998. The domestic law and regulation had been revised to implement the initial and annual declarations for the Agency and the Additional Protocol came into force in December 1999. Since initial declaration in 2000, Japan has submitted the annual declaration in every May. Until 2010, Japan has made 10 annual declarations. This paper gives recommendations to enhance implementation of Additional Protocol declarations based on 10-year experience in Japan and addresses the following: Current status of additional protocol declaration in Japan; Outline of processing method; AP Information Management System; Recommendations for improving quality of declaration. Preparation of additional protocol declaration in NMCC has been conducted in the course of contract with Japan Safeguards Office (hereafter, JSGO) for safeguards information treatment. (author)

  10. Development of IT-based Data Communication Protocol for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Jeong, K. I.; Kim, D. H.; Lee, J. C.

    2009-07-01

    The communication protocol, which provide overall communication rules and methods and give ways how to exchange information, is the most important part and it can affect the overall performance of communication network. Therefore, the first step of development of the communication network of an NPP is its own communication protocol design, which conforms to the requirements and characteristics of an NPP I and C. To manage the protocol development process, we establish development procedure and define detail substantive based on the procedure and we examine the adaptability of existing commercial communication protocols to the communication protocol of an NPP I and C. Existing commercial communication protocols based on Information Technology(IT) can be categorized into 3 groups: general commercial communication protocols, industrial communication protocols, military communication protocols. We analyze the design criteria and performance requirements of popular protocols in each group. And also, we examine the adaptability to the communication protocol of an NPP. Based on these results, we developed our own protocol for NPP I and C, which meet the required specifications through design overall protocol architecture and data frame format, definition of functional requirements and specifications

  11. The Protocol of Choice for Treatment of Snake Bite

    Directory of Open Access Journals (Sweden)

    Afshin Mohammad Alizadeh

    2016-01-01

    Full Text Available The aim of the current study is to compare three different methods of treatment of snake bite to determine the most efficient one. To unify the protocol of snake bite treatment in our center, we retrospectively reviewed files of the snake-bitten patients who had been referred to us between 2010 and 2014. They were contacted for follow-up using phone calls. Demographic and on-arrival characteristics, protocol used for treatment (WHO/Haddad/GF, and outcome/complications were evaluated. Patients were entered into one of the protocol groups and compared. Of a total of 63 patients, 56 (89% were males. Five, 19, and 28 patients were managed by Haddad, WHO, or GF protocols, respectively. Eleven patients had fallen into both GF and WHO protocols and were excluded. Serum sickness was significantly more common when WHO protocol was used while 100% of the compartment syndromes and 71% of deformities had been reported after GF protocol. The most important complications were considered to be deformity, compartment syndrome, and amputation and were more frequent after the use of WHO and GF protocols (23.1% versus 76.9%; none in Haddad; P = NS. Haddad protocol seems to be the best for treatment of snake-bitten patients in our region. However, this cannot be strictly concluded because of the limited sample size and nonsignificant P values.

  12. Supporting Adaptation of Wireless Communication Protocols

    International Nuclear Information System (INIS)

    Dhomeja, L.D.; Soomro, I.A.; Malkani, Y.A.

    2016-01-01

    Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants) come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity), Bluetooth, IrDA (Infrared), etc. In order for pervasive devices to interact with each other, they need to have matching (alike) communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth) from what the server has (e.g. WiFi), connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange), L2CAP (Logical Link Control and Adaptation Protocol), RFCOM (Radio Frequency Communication) and WiFi protocol and can run on (J2MW (Java 2 Micro Edition) enabled mobile phones which support both Bluetooth and WiFi capabilities. (author)

  13. Two Cheers for the Trafficking Protocol

    Directory of Open Access Journals (Sweden)

    Anne T Gallagher

    2015-04-01

    Full Text Available The Trafficking Protocol makes an easy target for attack. Its origins lie in an attempt to control a particularly exploitative form of migration that was challenging the ability of States to control their own borders. Its parent instrument is a framework agreement to address transnational organised crime. While paying fleeting attention to the rights of victims, the Protocol, with its emphasis on criminalisation and border protection is nowhere near being a human rights treaty. On top of all that it does not even have a credible enforcement mechanism, allowing states parties wide latitude in interpreting and applying their obligations. Strangely, these seemingly insurmountable flaws have not stopped the Protocol’s emergence as perhaps the single most important development in the fight against human trafficking. Without the Protocol, arguments around definitions would have continued to block the evolution of principles and rules. Without the Protocol it is likely that the human rights system would have continued its shameful tradition of sidelining issues such as forced labour, forced sex, forced marriage and the ritual exploitation of migrant workers through debt. Most critically, the Protocol provided the impetus and template for a series of legal and political developments that, over time, have served to ameliorate some of its greatest weaknesses, including the lack of human rights protections and of a credible oversight mechanism.

  14. Immunochemical protocols

    National Research Council Canada - National Science Library

    Pound, John D

    1998-01-01

    ... easy and important refinements often are not published. This much anticipated 2nd edition of Immunochemzcal Protocols therefore aims to provide a user-friendly up-to-date handbook of reliable techniques selected to suit the needs of molecular biologists. It covers the full breadth of the relevant established immunochemical methods, from protein blotting and immunoa...

  15. Authentication Test-Based the RFID Authentication Protocol with Security Analysis

    Directory of Open Access Journals (Sweden)

    Minghui Wang

    2014-08-01

    Full Text Available To the problem of many recently proposed RFID authentication protocol was soon find security holes, we analyzed the main reason, which is that protocol design is not rigorous, and the correctness of the protocol cannot be guaranteed. To this end, authentication test method was adopted in the process of the formal analysis and strict proof to the proposed RFID protocol in this paper. Authentication Test is a new type of analysis and design method of security protocols based on Strand space model, and it can be used for most types of the security protocols. After analysis the security, the proposed protocol can meet the RFID security demand: information confidentiality, data integrity and identity authentication.

  16. Treatability and scale-up protocols for polynuclear aromatic hydrocarbon bioremediation of manufactured-gas-plant soils. Final report, September 1987-July 1991

    International Nuclear Information System (INIS)

    Blackburn, J.W.; DiGrazia, P.M.; Sanseverino, J.

    1991-07-01

    The report describes activities to develop a framework to reliably scale-up and apply challenging bioremediation processes to polynuclear aromatic hydrocarbons in Manufactured Gas Plant (MGP) soils. It includes: a discussion of the accuracy needed for competitive application of bioremediation; a framework and examples for treatability and scale-up protocols for selection, design and application of these processes; both batch and continuous testing protocols for developing predictive rate data; and special predictive relationships that may be used in process selection/scale-up. The work, coupled with subsequent work (as recommended) to develop an MGP soil desorption/diffusion protocol and new scale-up methods, and with subsequent scale-up testing should lead to the capability for improved selection of MGP sites for bioremediation and improved performance, success, and reliability of field applications. With this greater predictive reliability, bioremediation will be used more often in the field on the most favorable applications and its cost advantages over other remediation options will be realized

  17. Routing protocol extension for resilient GMPLS multi-domain networks

    DEFF Research Database (Denmark)

    Manolova, Anna Vasileva; Ruepp, Sarah Renée; Romeral, Ricardo

    2010-01-01

    This paper evaluates the performance of multi-domain networks under the Generalized Multi-Protocol Label Switching control framework in case of a single inter-domain link failure. We propose and evaluate a routing protocol extension for the Border Gateway Protocol, which allows domains to obtain...... two Autonomous System disjoint paths and use them efficiently under failure conditions. Three main applications for the protocol extension are illustrated: reducing traffic loss on existing connections by xploiting pre-selected backup paths derived with our proposal, applying multi-domain restoration...... as survivability mechanism in case of single link failure, and employing proper failure notification mechanisms for routing of future connection requests under routing protocol re-convergence. Via simulations we illustrate the benefits of utilizing the proposed routing protocol extension for networks employing...

  18. Electronic Voting Protocol Using Identity-Based Cryptography

    Directory of Open Access Journals (Sweden)

    Gina Gallegos-Garcia

    2015-01-01

    Full Text Available Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC, which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE. With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI. Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  19. Electronic Voting Protocol Using Identity-Based Cryptography.

    Science.gov (United States)

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  20. Implementation of the Additional Protocol in Japan

    International Nuclear Information System (INIS)

    Ogawa, T.

    2001-01-01

    The Additional Protocol between Japan and the IAEA entered into force in December 1999. To come into force a series of implementation trials of Additional Protocol was carried out at two Japanese representative nuclear research centers, i.e. Tokai Research Establishment of Japan Atomic Energy Research Institute (JAERI) and Oarai Engineering Center of Japan Nuclear Fuel Cycle Development Institute (JNC). These trials were proposed by Japan and were conducted in cooperation with the IAEA Secretariat. In addition, Japan amended 'the Law for the Regulation of Reactors etc.', to collect adequate information to submit to the IAEA, to arrange the surrounding for the complementary access, etc. In addition, Japan Submitted the Initial Declaration of the Additional Protocol within 180 days of the entry into force of the Protocol, in the middle of June, 2000

  1. Food surveys for assessing chemical and dosimetric impacts near industrial sites; Enquetes alimentaires pour l'evaluation des impacts chimiques et dosimetriques a proximite de sites nucleaires

    Energy Technology Data Exchange (ETDEWEB)

    Parache, V.; Maurau, S.; Mercat, C.

    2011-03-15

    Estimating the ingestion of potentially contaminated foodstuffs around conventional and nuclear industrial sites requires data about the food practices and eating habits of the local residents, especially the consumption of locally- and home-produced food. The IRSN thus chose to conduct surveys about these practices in the vicinity of nuclear sites. Their methodology was based on previous surveys near nuclear sites. In 2004, in partnership with AREVA and BEGEAT, the French Institute for Radioprotection and Nuclear Safety studied the eating habits of the residents of Bollene, near the Tricastin plant (Rhone Valley), with the aim of improving the quantification of the plant's potential health impacts. Based on these studies and as part of the SENSIB project to characterize vulnerability to nuclear risks, we developed and tested a survey protocol during the summer 2008, around the Chinon nuclear plant, in collaboration with EDF. The protocol is currently being tested around the Marcoule nuclear plant, in collaboration with the CEA. The aim was to optimize the feasibility and the reproducibility of the approach, while losing none of the robustness of the results. The data obtained made it possible to evaluate daily food intake values for individuals and to assess the rates of consumption of locally-grown products for many food categories. The data showed the existence of local population groups with very high rates of locally-grown food consumption - over 90 % of certain food products. This comparative study thus shows the significant variability of eating habits in the French population and proposes a reproducible approach to evaluating realistic indicators of potentially risky dietary habits. (authors)

  2. Energy Efficient Network Protocols for Wireless and Mobile Networks

    National Research Council Canada - National Science Library

    Sivalingam, Krishna

    2001-01-01

    ... (also called power aware) network protocols for wireless and mobile networks. Battery power limitations are a very serious concern, and it is essential to study energy efficient protocol design at different layers of the network protocol stack...

  3. Performance analysis of routing protocols for IoT

    Science.gov (United States)

    Manda, Sridhar; Nalini, N.

    2018-04-01

    Internet of Things (IoT) is an arrangement of advancements that are between disciplinary. It is utilized to have compelling combination of both physical and computerized things. With IoT physical things can have personal virtual identities and participate in distributed computing. Realization of IoT needs the usage of sensors based on the sector for which IoT is integrated. For instance, in healthcare domain, IoT needs to have integration with wearable sensors used by patients. As sensor devices produce huge amount of data, often called big data, there should be efficient routing protocols in place. To the extent remote systems is worried there are some current protocols, for example, OLSR, DSR and AODV. It additionally tosses light into Trust based routing protocol for low-power and lossy systems (TRPL) for IoT. These are broadly utilized remote directing protocols. As IoT is developing round the corner, it is basic to investigate routing protocols that and evaluate their execution regarding throughput, end to end delay, and directing overhead. The execution experiences can help in settling on very much educated choices while incorporating remote systems with IoT. In this paper, we analyzed different routing protocols and their performance is compared. It is found that AODV showed better performance than other routing protocols aforementioned.

  4. Database communication protocol analyses and security detection

    International Nuclear Information System (INIS)

    Luo Qun; Liu Qiushi

    2003-01-01

    In this paper we introduced the analysis of TDS protocol in the communication application between Client and Server about SYBASE and MICROSOFT SQL SERVER and do some test for some bugs existed in the protocol. (authors)

  5. Quantum multi-signature protocol based on teleportation

    International Nuclear Information System (INIS)

    Wen Xiao-jun; Liu Yun; Sun Yu

    2007-01-01

    In this paper, a protocol which can be used in multi-user quantum signature is proposed. The scheme of signature and verification is based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states and the controlled quantum teleportation. Different from the digital signatures, which are based on computational complexity, the proposed protocol has perfect security in the noiseless quantum channels. Compared to previous quantum signature schemes, this protocol can verify the signature independent of an arbitrator as well as realize multi-user signature together. (orig.)

  6. Robust Multi-unit Auction Protocol against False-name Bids

    Science.gov (United States)

    Yokoo, Makoto; Sakurai, Yuko; Matsubara, Shigeo

    This paper presents a new multi-unit auction protocol (IR protocol) that is robust against false-name bids. Internet auctions have become an integral part of Electronic Commerce and a promising field for applying agent and Artificial Intelligence technologies. Although the Internet provides an excellent infrastructure for executing auctions, the possibility of a new type of cheating called false-name bids has been pointed out. A false-name bid is a bid submitted under a fictitious name. A protocol called LDS has been developed for combinatorial auctions of multiple different items and has proven to be robust against false-name bids. Although we can modify the LDS protocol to handle multi-unit auctions, in which multiple units of an identical item are auctioned, the protocol is complicated and requires the auctioneer to carefully pre-determine the combination of bundles to obtain a high social surplus or revenue. For the auctioneer, our newly developed IR protocol is easier to use than the LDS, since the combination of bundles is automatically determined in a flexible manner according to the declared evaluation values of agents. The evaluation results show that the IR protocol can obtain a better social surplus than that obtained by the LDS protocol.

  7. Removing Ambiguities of IP Telephony Traffic Using Protocol Scrubbers

    Directory of Open Access Journals (Sweden)

    Bazara I. A. Barry

    2012-10-01

    Full Text Available Network intrusion detection systems (NIDSs face the serious challenge of attacks such as insertion and evasion attacks that are caused by ambiguous network traffic. Such ambiguity comes as a result of the nature of network traffic which includes protocol implementation variations and errors alongside legitimate network traffic. Moreover, attackers can intentionally introduce further ambiguities in the traffic. Consequently, NIDSs need to be aware of these ambiguities when detection is performed and make sure to differentiate between true attacks and protocol implementation variations or errors; otherwise, detection accuracy can be affected negatively. In this paper we present the design and implementation of tools that are called protocol scrubbers whose main functionality is to remove ambiguities from network traffic before it is presented to the NIDS. The proposed protocol scrubbers are designed for session initiation and data transfer protocols in IP telephony systems. They guarantee that the traffic presented to NIDSs is unambiguous by eliminating ambiguous behaviors of protocols using well-designed protocol state machines, and walking through packet headers of protocols to make sure packets will be interpreted in the desired way by the NIDS. The experimental results shown in this paper demonstrate the good quality and applicability of the introduced scrubbers.

  8. Kyoto Protocol: trade versus the environment

    International Nuclear Information System (INIS)

    Loose, H.

    2001-01-01

    Could the signatories to the Kyoto Protocol find themselves up against the WTO? This paper examines how the climate change agreement could conflict with trade rules, and shows that there are potentially serious conflicts in the interface between the WTO and the Kyoto Protocol. It argues for dialogue and debate before it is too late. (author)

  9. SPIRIT 2013 Statement: defining standard protocol items for clinical trials.

    Science.gov (United States)

    Chan, An-Wen; Tetzlaff, Jennifer M; Altman, Douglas G; Laupacis, Andreas; Gøtzsche, Peter C; Krle A-Jerić, Karmela; Hrobjartsson, Asbjørn; Mann, Howard; Dickersin, Kay; Berlin, Jesse A; Dore, Caroline J; Parulekar, Wendy R; Summerskill, William S M; Groves, Trish; Schulz, Kenneth F; Sox, Harold C; Rockhold, Frank W; Rennie, Drummond; Moher, David

    2015-12-01

    The protocol of a clinical trial serves as the foundation for study planning, conduct, reporting, and appraisal. However, trial protocols and existing protocol guidelines vary greatly in content and quality. This article describes the systematic development and scope of SPIRIT (Standard Protocol Items: Recommendations for Interventional Trials) 2013, a guideline for the minimum content of a clinical trial protocol. The 33-item SPIRIT checklist applies to protocols for all clinical trials and focuses on content rather than format. The checklist recommends a full description of what is planned; it does not prescribe how to design or conduct a trial. By providing guidance for key content, the SPIRIT recommendations aim to facilitate the drafting of high-quality protocols. Adherence to SPIRIT would also enhance the transparency and completeness of trial protocols for the benefit of investigators, trial participants, patients, sponsors, funders, research ethics committees or institutional review boards, peer reviewers, journals, trial registries, policymakers, regulators, and other key stakeholders.

  10. Optimistic protocol for partitioned distributed database systems

    International Nuclear Information System (INIS)

    Davidson, S.B.

    1982-01-01

    A protocol for transaction processing during partition failures is presented which guarantees mutual consistency between copies of data-items after repair is completed. The protocol is optimistic in that transactions are processed without restrictions during the failure; conflicts are detected at repair time using a precedence graph and are resolved by backing out transactions according to some backout strategy. The protocol is then evaluated using simulation and probabilistic modeling. In the simulation, several parameters are varied such as the number of transactions processed in a group, the type of transactions processed, the number of data-items present in the database, and the distribution of references to data-items. The simulation also uses different backout strategies. From these results we note conditions under which the protocol performs well, i.e., conditions under which the protocol backs out a small percentage of the transaction run. A probabilistic model is developed to estimate the expected number of transactions backed out using most of the above database and transaction parameters, and is shown to agree with simulation results. Suggestions are then made on how to improve the performance of the protocol. Insights gained from the simulation and probabilistic modeling are used to develop a backout strategy which takes into account individual transaction costs and attempts to minimize total backout cost. Although the problem of choosing transactions to minimize total backout cost is, in general, NP-complete, the backout strategy is efficient and produces very good results

  11. Comparison of the ultrashort gonadotropin-releasing hormone agonist-antagonist protocol with microdose flare -up protocol in poor responders: a preliminary study.

    Science.gov (United States)

    Berker, Bülent; Duvan, Candan İltemir; Kaya, Cemil; Aytaç, Ruşen; Satıroğlu, Hakan

    2010-01-01

    To determine the potential effect of the ultrashort gonadotropin-releasing hormone (GnRH) agonist/GnRH antagonist protocol versus the microdose GnRH agonist protocol in poor responders undergoing intracytoplasmic sperm injection (ICSI). The patients in the Agonist-Antagonist Group (n=41) were administered the ultrashort GnRH-agonist/ antagonist protocol, while the patients in the Microdose Group (n=41) were stimulated according to the microdose flare-up protocol. The mean number of mature oocytes retrieved was the primary outcome measure. Fertilization rate, implantation rate per embryo and clinical pregnancy rates were secondary outcome measures. There was no differenc between the mean number of mature oocytes retrieved in the two groups. There were also no statistical differences between the two groups in terms of peak serum E2 level, canceled cycles, endometrial thickness on hCG day, number of 2 pronucleus and number of embryos transferred. However, the total gonadotropin consumption and duration of stimulation were significantly higher with the Agonist-Antagonist Group compared with the Microdose Group. The implantation and clinical pregnancy rates were similar between the two groups. Despite the high dose of gonadotropin consumption and longer duration of stimulation with the ultrashort GnRH agonist/ antagonist protocol, it seems that the Agonist-Antagonist Protocol is not inferior to the microdose protocol in poor responders undergoing ICSI.

  12. Testing the efficiency of rover science protocols for robotic sample selection: A GeoHeuristic Operational Strategies Test

    Science.gov (United States)

    Yingst, R. A.; Bartley, J. K.; Chidsey, T. C.; Cohen, B. A.; Gilleaudeau, G. J.; Hynek, B. M.; Kah, L. C.; Minitti, M. E.; Williams, R. M. E.; Black, S.; Gemperline, J.; Schaufler, R.; Thomas, R. J.

    2018-05-01

    The GHOST field tests are designed to isolate and test science-driven rover operations protocols, to determine best practices. During a recent field test at a potential Mars 2020 landing site analog, we tested two Mars Science Laboratory data-acquisition and decision-making methods to assess resulting science return and sample quality: a linear method, where sites of interest are studied in the order encountered, and a "walkabout-first" method, where sites of interest are examined remotely before down-selecting to a subset of sites that are interrogated with more resource-intensive instruments. The walkabout method cost less time and fewer resources, while increasing confidence in interpretations. Contextual data critical to evaluating site geology was acquired earlier than for the linear method, and given a higher priority, which resulted in development of more mature hypotheses earlier in the analysis process. Combined, this saved time and energy in the collection of data with more limited spatial coverage. Based on these results, we suggest that the walkabout method be used where doing so would provide early context and time for the science team to develop hypotheses-critical tests; and that in gathering context, coverage may be more important than higher resolution.

  13. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  14. Nursing Music Protocol and Postoperative Pain.

    Science.gov (United States)

    Poulsen, Michael J; Coto, Jeffrey

    2018-04-01

    Pain has always been a major concern for patients and nurses during the postoperative period. Therapies, medicines, and protocols have been developed to improve pain and anxiety but have undesirable risks to the patient. Complementary and alternative medicine therapies have been studied but have not been applied as regular protocols in the hospital setting. Music is one type of complementary and alternative medicine therapy that has been reported to have favorable results on reducing postoperative pain, anxiety, and opioid usage. However, music lacks a protocol that nurses can implement during the perioperative process. This paper is an in-depth literature review assessing a best practice recommendation and protocol that establishes a consensus in the use of music therapy. The results suggest that music therapy may consist of calming, soft tones of 60-80 beats per minute for at least 15-30 minutes at least twice daily during the pre- and postoperative periods. It is suggested that music only be used in conjunction with standards of care and not as the primary intervention of pain or anxiety. This evidence suggests that proper use of music therapy can significantly reduce surgical pain. Implementing these protocols and allowing the freedom of nursing staff to use them may lead to greater reductions in surgical pain and anxiety and a reduction in opioid use. Copyright © 2017 American Society for Pain Management Nursing. Published by Elsevier Inc. All rights reserved.

  15. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  16. Data Exchange Protocol in Repsail

    Directory of Open Access Journals (Sweden)

    Gucma Maciej

    2017-12-01

    Full Text Available Article presents implantation and theoretical considerations of data exchange protocol developed for the RepSail project, where main objective was design and building innovative hybrid yacht. One of problems during the design process was improper functioning of data exchange protocols that were available in the commercially available devices to mention navigation purpose NMEA183 or 2000 as well as automation dedicated ones (CAN and similar. Author shows the basis of the dedicated format of exchange for in board devices.

  17. The Groningen protocol: another perspective

    OpenAIRE

    Jotkowitz, A B; Glick, S

    2006-01-01

    The Groningen protocol allows for the euthanasia of severely ill newborns with a hopeless prognosis and unbearable suffering. We understand the impetus for such a protocol but have moral and ethical concerns with it. Advocates for euthanasia in adults have relied on the concept of human autonomy, which is lacking in the case of infants. In addition, biases can potentially influence the decision making of both parents and physicians. It is also very difficult to weigh the element of quality of...

  18. Commercial satellite data as support to the additional protocol declarations

    International Nuclear Information System (INIS)

    Joensson, Camilla; Andersson, Christer

    2001-01-01

    Full text: Objectives - The overall objective of the project is to show how commercial satellite data can be used for safeguard purposes both at SKI and the International Atomic Energy Agency. Furthermore this project will support IAEA in its process to develop methods to make the best use of provided information such as digitised maps and satellite images. Finally it will give IAEA a case study of the usefulness of satellite data for change detection purposes. Background - The protocol calls among others for an extended/complete declaration of all nuclear fuel cycle-related research and development activities as well as sites where nuclear material is or was customarily used. The declaration shall include descriptions of all buildings at the sites as well as maps. In parallel to the development of the additional protocol IAEA has started to use a variety of measures/techniques both to verify that declarations are complete and correct but also to be able to come to the conclusion that a state has no undeclared nuclear material or undeclared nuclear activities. One such technique is the use of commercial satellite data. The IAEA is now in the process of evaluating the usefulness and effectiveness of such data for safeguard purposes. In order to come to a decision on how to use satellite data IAEA is highly dependant on support from member states which can provide results from case studies etc. Analysis - This project shall provide SKI with digitised maps and commercial satellite data by the means of GIS to verify the descriptions provided by two of the nuclear operators. Furthermore those digital data can be included in the declaration given to IAEA. The overall aim is to enhance the quality of the Swedish declaration including support to IAEA to develop methods to use commercial satellite data. Results - The paper will present experiences and mapping results made during the work. (author)

  19. A Logical Analysis of Quantum Voting Protocols

    Science.gov (United States)

    Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja

    2017-12-01

    In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.

  20. Two-party quantum key agreement protocols under collective noise channel

    Science.gov (United States)

    Gao, Hao; Chen, Xiao-Guang; Qian, Song-Rong

    2018-06-01

    Recently, quantum communication has become a very popular research field. The quantum key agreement (QKA) plays an important role in the field of quantum communication, based on its unconditional security in terms of theory. Among all kinds of QKA protocols, QKA protocols resisting collective noise are widely being studied. In this paper, we propose improved two-party QKA protocols resisting collective noise and present a feasible plan for information reconciliation. Our protocols' qubit efficiency has achieved 26.67%, which is the best among all the two-party QKA protocols against collective noise, thus showing that our protocol can improve the transmission efficiency of quantum key agreement.