WorldWideScience

Sample records for protocol-based programming primitives

  1. An Overview of DRAM-Based Security Primitives

    Directory of Open Access Journals (Sweden)

    Nikolaos Athanasios Anagnostopoulos

    2018-03-01

    Full Text Available Recent developments have increased the demand for adequate security solutions, based on primitives that cannot be easily manipulated or altered, such as hardware-based primitives. Security primitives based on Dynamic Random Access Memory (DRAM can provide cost-efficient and practical security solutions, especially for resource-constrained devices, such as hardware used in the Internet of Things (IoT, as DRAMs are an intrinsic part of most contemporary computer systems. In this work, we present a comprehensive overview of the literature regarding DRAM-based security primitives and an extended classification of it, based on a number of different criteria. In particular, first, we demonstrate the way in which DRAMs work and present the characteristics being exploited for the implementation of security primitives. Then, we introduce the primitives that can be implemented using DRAM, namely Physical Unclonable Functions (PUFs and True Random Number Generators (TRNGs, and present the applications of each of the two types of DRAM-based security primitives. We additionally proceed to assess the security such primitives can provide, by discussing potential attacks and defences, as well as the proposed security metrics. Subsequently, we also compare these primitives to other hardware-based security primitives, noting their advantages and shortcomings, and proceed to demonstrate their potential for commercial adoption. Finally, we analyse our classification methodology, by reviewing the criteria employed in our classification and examining their significance.

  2. Primitive Based Action Representation and recognition

    DEFF Research Database (Denmark)

    Baby, Sanmohan

    The presented work is aimed at designing a system that will model and recognize actions and its interaction with objects. Such a system is aimed at facilitating robot task learning. Activity modeling and recognition is very important for its potential applications in surveillance, human-machine i......The presented work is aimed at designing a system that will model and recognize actions and its interaction with objects. Such a system is aimed at facilitating robot task learning. Activity modeling and recognition is very important for its potential applications in surveillance, human......-machine interface, entertainment, biomechanics etc. Recent developments in neuroscience suggest that all actions are a compositions of smaller units called primitives. Current works based on primitives for action recognition uses a supervised framework for specifying the primitives. We propose a method to extract...... primitives automatically. These primitives are to be used to generate actions based on certain rules for combining. These rules are expressed as a stochastic context free grammar. A model merging approach is adopted to learn a Hidden Markov Model to t the observed data sequences. The states of the HMM...

  3. Protocol-Based Verification of Message-Passing Parallel Programs

    DEFF Research Database (Denmark)

    López-Acosta, Hugo-Andrés; Eduardo R. B. Marques, Eduardo R. B.; Martins, Francisco

    2015-01-01

    We present ParTypes, a type-based methodology for the verification of Message Passing Interface (MPI) programs written in the C programming language. The aim is to statically verify programs against protocol specifications, enforcing properties such as fidelity and absence of deadlocks. We develo...

  4. Primitive Based Action Representation and Recognition

    DEFF Research Database (Denmark)

    Baby, Sanmohan; Krüger, Volker

    2009-01-01

    a sequential and statistical     learning algorithm for   automatic detection of the action primitives and the action grammar   based on these primitives.  We model a set of actions using a   single HMM whose structure is learned incrementally as we observe   new types.   Actions are modeled with sufficient...

  5. Intervention mapping protocol for developing a theory-based diabetes self-management education program.

    Science.gov (United States)

    Song, Misoon; Choi, Suyoung; Kim, Se-An; Seo, Kyoungsan; Lee, Soo Jin

    2015-01-01

    Development of behavior theory-based health promotion programs is encouraged with the paradigm shift from contents to behavior outcomes. This article describes the development process of the diabetes self-management program for older Koreans (DSME-OK) using intervention mapping (IM) protocol. The IM protocol includes needs assessment, defining goals and objectives, identifying theory and determinants, developing a matrix to form change objectives, selecting strategies and methods, structuring the program, and planning for evaluation and pilot testing. The DSME-OK adopted seven behavior objectives developed by the American Association of Diabetes Educators as behavioral outcomes. The program applied an information-motivation-behavioral skills model, and interventions were targeted to 3 determinants to change health behaviors. Specific methods were selected to achieve each objective guided by IM protocol. As the final step, program evaluation was planned including a pilot test. The DSME-OK was structured as the 3 determinants of the IMB model were intervened to achieve behavior objectives in each session. The program has 12 weekly 90-min sessions tailored for older adults. Using the IM protocol in developing a theory-based self-management program was beneficial in terms of providing a systematic guide to developing theory-based and behavior outcome-focused health education programs.

  6. Interaction à deux joueurs en informatique quantique : primitives cryptographiques et complexité en requêtes

    OpenAIRE

    Magnin , Loïck

    2011-01-01

    This dissertation studies two different aspects of two-player interaction in the model of quantum communication and quantum computation.First, we study two cryptographic primitives, that are used as basic blocks to construct sophisticated cryptographic protocols between two players, e.g. identification protocols.The first primitive is ``quantum bit commitment''. This primitive cannot be done in an unconditionally secure way. However, security can be obtained by restraining the power of the tw...

  7. CAD-based Monte Carlo automatic modeling method based on primitive solid

    International Nuclear Information System (INIS)

    Wang, Dong; Song, Jing; Yu, Shengpeng; Long, Pengcheng; Wang, Yongliang

    2016-01-01

    Highlights: • We develop a method which bi-convert between CAD model and primitive solid. • This method was improved from convert method between CAD model and half space. • This method was test by ITER model and validated the correctness and efficiency. • This method was integrated in SuperMC which could model for SuperMC and Geant4. - Abstract: Monte Carlo method has been widely used in nuclear design and analysis, where geometries are described with primitive solids. However, it is time consuming and error prone to describe a primitive solid geometry, especially for a complicated model. To reuse the abundant existed CAD models and conveniently model with CAD modeling tools, an automatic modeling method for accurate prompt modeling between CAD model and primitive solid is needed. An automatic modeling method for Monte Carlo geometry described by primitive solid was developed which could bi-convert between CAD model and Monte Carlo geometry represented by primitive solids. While converting from CAD model to primitive solid model, the CAD model was decomposed into several convex solid sets, and then corresponding primitive solids were generated and exported. While converting from primitive solid model to the CAD model, the basic primitive solids were created and related operation was done. This method was integrated in the SuperMC and was benchmarked with ITER benchmark model. The correctness and efficiency of this method were demonstrated.

  8. Analysis of a security protocol in ?CRL

    NARCIS (Netherlands)

    J. Pang

    2002-01-01

    textabstractNeedham-Schroeder public-key protocol; With the growth and commercialization of the Internet, the security of communication between computers becomes a crucial point. A variety of security protocols based on cryptographic primitives are used to establish secure communication over

  9. Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method

    Directory of Open Access Journals (Sweden)

    Hanane Houmani

    2012-01-01

    Full Text Available Most applications in the Internet such as e-banking and e-commerce use the SET and the NSL protocols to protect the communication channel between the client and the server. Then, it is crucial to ensure that these protocols respect some security properties such as confidentiality, authentication, and integrity. In this paper, we analyze the SET and the NSL protocols with respect to the confidentiality (secrecy property. To perform this analysis, we use the interpretation functions-based method. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily-life protocols such as SET and NSL. Also, this method could be used under different assumptions such as a variety of intruder abilities including algebraic properties of cryptographic primitives. The NSL protocol, for instance, is analyzed with and without the homomorphism property. We show also, using the SET protocol, the usefulness of this approach to correct weaknesses and problems discovered during the analysis.

  10. Node Primitives: an open end-user programming platform for social robots

    OpenAIRE

    Coronado, Enrique; Mastrogiovanni, Fulvio; Venture, Gentiane

    2017-01-01

    With the expected adoption of robots able to seamlessly and intuitively interact with people in real-world scenarios, the need arises to provide non-technically-skilled users with easy-to-understand paradigms for customising robot behaviors. In this paper, we present an interaction design robot programming platform for enabling multidisciplinary social robot research and applications. This platform is referred to Node Primitives (NEP) and consists of two main parts. On the one hand, a ZeroMQ ...

  11. Motion Primitives for Action Recognition

    DEFF Research Database (Denmark)

    Fihl, Preben; Holte, Michael Boelstoft; Moeslund, Thomas B.

    2007-01-01

    the actions as a sequence of temporal isolated instances, denoted primitives. These primitives are each defined by four features extracted from motion images. The primitives are recognized in each frame based on a trained classifier resulting in a sequence of primitives. From this sequence we recognize......The number of potential applications has made automatic recognition of human actions a very active research area. Different approaches have been followed based on trajectories through some state space. In this paper we also model an action as a trajectory through a state space, but we represent...... different temporal actions using a probabilistic Edit Distance method. The method is tested on different actions with and without noise and the results show recognition rates of 88.7% and 85.5%, respectively....

  12. Action Recognition using Motion Primitives

    DEFF Research Database (Denmark)

    Moeslund, Thomas B.; Fihl, Preben; Holte, Michael Boelstoft

    the actions as a sequence of temporal isolated instances, denoted primitives. These primitives are each defined by four features extracted from motion images. The primitives are recognized in each frame based on a trained classifier resulting in a sequence of primitives. From this sequence we recognize......The number of potential applications has made automatic recognition of human actions a very active research area. Different approaches have been followed based on trajectories through some state space. In this paper we also model an action as a trajectory through a state space, but we represent...... different temporal actions using a probabilistic Edit Distance method. The method is tested on different actions with and without noise and the results show recognizing rates of 88.7% and 85.5%, respectively....

  13. Service-Oriented Synthesis of Distributed and Concurrent Protocol Specifications

    Directory of Open Access Journals (Sweden)

    Jehad Al Dallal

    2008-01-01

    Full Text Available Several methods have been proposed for synthesizing computer communication protocol specifications from service specifications. Some protocol synthesis methods based on the finite state machine (FSM model assume that primitives in the service specifications cannot be executed simultaneously. Others either handle only controlled primitive concurrency or have tight restrictions on the applicable FSM topologies. As a result, these synthesis methods are not applicable to an interesting variety of inherently concurrent applications, such as the Internet and mobile communication systems. This paper proposes a concurrent-based protocol synthesis method that eliminates the restrictions imposed by the earlier methods. The proposed method uses a synthesis method to obtain a sequential protocol specification (P-SPEC from a given service specification (S-SPEC. The resulting P-SPEC is then remodeled to consider the concurrency behavior specified in the S-SPEC, while guaranteeing that P-SPEC provides the specified service.

  14. Primitive neuroectodermal tumor of the cervix: a case report

    Directory of Open Access Journals (Sweden)

    Boroujeni Parisa

    2011-09-01

    Full Text Available Abstract Introduction Peripheral primitive neuroectodermal tumor of the cervix uteri is extremely rare. Between 1987 and 2010, there were only nine cases reported in the English literature, with considerably different management policies. Case presentation A 45-year-old Iranian woman presented to our facility with a primitive neuroectodermal tumor of the cervix uteri. Her clinical stage IB2 tumor was treated successfully with chemotherapy. Our patient underwent radical hysterectomy. There was no trace of the tumor after four years of follow-up. Conclusions According to current knowledge, primitive neuroectodermal tumors belong to the Ewing's sarcoma family, and the improvement of treatment outcome in our patient was due to dose-intensive neoadjuvant chemotherapy, surgery and consolidation chemotherapy in accordance with the protocol for bony Ewing's sarcoma.

  15. A Proof-Theoretic Account of Primitive Recursion and Primitive Iteration

    DEFF Research Database (Denmark)

    Cherabini, Luca; Danvy, Olivier

    2011-01-01

    We revisit both the usual ``going-up'' induction principle and Manna and Waldinger's ``going-down'' induction principle for primitive recursion,`a la Goedel, and primitive iteration, `a la Church. We use 'Kleene's trick' to show that primitive recursion and primitive iiteration are as expressive...

  16. BioBlocks: Programming Protocols in Biology Made Easier.

    Science.gov (United States)

    Gupta, Vishal; Irimia, Jesús; Pau, Iván; Rodríguez-Patón, Alfonso

    2017-07-21

    The methods to execute biological experiments are evolving. Affordable fluid handling robots and on-demand biology enterprises are making automating entire experiments a reality. Automation offers the benefit of high-throughput experimentation, rapid prototyping, and improved reproducibility of results. However, learning to automate and codify experiments is a difficult task as it requires programming expertise. Here, we present a web-based visual development environment called BioBlocks for describing experimental protocols in biology. It is based on Google's Blockly and Scratch, and requires little or no experience in computer programming to automate the execution of experiments. The experiments can be specified, saved, modified, and shared between multiple users in an easy manner. BioBlocks is open-source and can be customized to execute protocols on local robotic platforms or remotely, that is, in the cloud. It aims to serve as a de facto open standard for programming protocols in Biology.

  17. Abelian primitive words

    OpenAIRE

    Domaratzki, Michael; Rampersad, Narad

    2011-01-01

    We investigate Abelian primitive words, which are words that are not Abelian powers. We show that unlike classical primitive words, the set of Abelian primitive words is not context-free. We can determine whether a word is Abelian primitive in linear time. Also different from classical primitive words, we find that a word may have more than one Abelian root. We also consider enumeration problems and the relation to the theory of codes. Peer reviewed

  18. Permission-Based Separation Logic for Multithreaded Java Programs

    NARCIS (Netherlands)

    Haack, Christian; Huisman, Marieke; Hurlin, C.

    2011-01-01

    This paper motivates and presents a program logic for reasoning about multithreaded Java-like programs with concurrency primitives such as dynamic thread creation, thread joining and reentrant object monitors. The logic is based on concurrent separation logic. It is the first detailed adaptation of

  19. Permission-based separation logic for multi-threaded Java programs

    NARCIS (Netherlands)

    Amighi, A.; Haack, Christian; Huisman, Marieke; Hurlin, C.

    This paper presents a program logic for reasoning about multithreaded Java-like programs with concurrency primitives such as dynamic thread creation, thread joining and reentrant object monitors. The logic is based on concurrent separation logic. It is the first detailed adaptation of concurrent

  20. On Synchronization Primitive Systems.

    Science.gov (United States)

    The report studies the question: what synchronization primitive should be used to handle inter-process communication. A formal model is presented...between these synchronization primitives. Although only four synchronization primitives are compared, the general methods can be used to compare other... synchronization primitives. Moreover, in the definitions of these synchronization primitives, conditional branches are explicitly allowed. In addition

  1. Exploring Hardware-Based Primitives to Enhance Parallel Security Monitoring in a Novel Computing Architecture

    National Research Council Canada - National Science Library

    Mott, Stephen

    2007-01-01

    This research explores how hardware-based primitives can be implemented to perform security-related monitoring in real-time, offer better security, and increase performance compared to software-based approaches...

  2. Ins-Robust Primitive Words

    OpenAIRE

    Srivastava, Amit Kumar; Kapoor, Kalpesh

    2017-01-01

    Let Q be the set of primitive words over a finite alphabet with at least two symbols. We characterize a class of primitive words, Q_I, referred to as ins-robust primitive words, which remain primitive on insertion of any letter from the alphabet and present some properties that characterizes words in the set Q_I. It is shown that the language Q_I is dense. We prove that the language of primitive words that are not ins-robust is not context-free. We also present a linear time algorithm to reco...

  3. Action Recognition Using Motion Primitives and Probabilistic Edit Distance

    DEFF Research Database (Denmark)

    Fihl, Preben; Holte, Michael Boelstoft; Moeslund, Thomas B.

    2006-01-01

    In this paper we describe a recognition approach based on the notion of primitives. As opposed to recognizing actions based on temporal trajectories or temporal volumes, primitive-based recognition is based on representing a temporal sequence containing an action by only a few characteristic time...... into a string containing a sequence of symbols, each representing a primitives. After pruning the string a probabilistic Edit Distance classifier is applied to identify which action best describes the pruned string. The approach is evaluated on five one-arm gestures and the recognition rate is 91...

  4. Breaking Megrelishvili protocol using matrix diagonalization

    Science.gov (United States)

    Arzaki, Muhammad; Triantoro Murdiansyah, Danang; Adi Prabowo, Satrio

    2018-03-01

    In this article we conduct a theoretical security analysis of Megrelishvili protocol—a linear algebra-based key agreement between two participants. We study the computational complexity of Megrelishvili vector-matrix problem (MVMP) as a mathematical problem that strongly relates to the security of Megrelishvili protocol. In particular, we investigate the asymptotic upper bounds for the running time and memory requirement of the MVMP that involves diagonalizable public matrix. Specifically, we devise a diagonalization method for solving the MVMP that is asymptotically faster than all of the previously existing algorithms. We also found an important counterintuitive result: the utilization of primitive matrix in Megrelishvili protocol makes the protocol more vulnerable to attacks.

  5. Primitive and definitive erythropoiesis in mammals

    Directory of Open Access Journals (Sweden)

    James ePalis

    2014-01-01

    Full Text Available Red blood cells (RBCs, which constitute the most abundant cell type in the body, come in two distinct flavors- primitive and definitive. Definitive RBCs in mammals circulate as smaller, anucleate cells during fetal and postnatal life, while primitive RBCs circulate transiently in the early embryo as large, nucleated cells before ultimately enucleating. Both cell types are formed from lineage-committed progenitors that generate a series of morphologically identifiable precursors that enucleate to form mature RBCs. While definitive erythroid precursors mature extravascularly in the fetal liver and postnatal marrow in association with macrophage cells, primitive erythroid precursors mature as a semi-synchronous cohort in the embryonic bloodstream. While the cytoskeletal network is critical for the maintenance of cell shape and the deformability of definitive RBCs, little is known about the components and function of the cytoskeleton in primitive erythroblasts. Erythropoietin (EPO is a critical regulator of late-stage definitive, but not primitive, erythroid progenitor survival. However, recent studies indicate that EPO regulates multiple aspects of terminal maturation of primitive murine and human erythroid precursors, including cell survival, proliferation, and the rate of terminal maturation. Primitive and definitive erythropoiesis share central transcriptional regulators, including Gata1 and Klf1, but are also characterized by the differential expression and function of other regulators, including myb, Sox6, and Bcl11A. Flow cytometry-based methodologies, developed to purify murine and human stage-specific erythroid precursors, have enabled comparative global gene expression studies and are providing new insights into the biology of erythroid maturation.

  6. Hierarchical HMM based learning of navigation primitives for cooperative robotic endovascular catheterization.

    Science.gov (United States)

    Rafii-Tari, Hedyeh; Liu, Jindong; Payne, Christopher J; Bicknell, Colin; Yang, Guang-Zhong

    2014-01-01

    Despite increased use of remote-controlled steerable catheter navigation systems for endovascular intervention, most current designs are based on master configurations which tend to alter natural operator tool interactions. This introduces problems to both ergonomics and shared human-robot control. This paper proposes a novel cooperative robotic catheterization system based on learning-from-demonstration. By encoding the higher-level structure of a catheterization task as a sequence of primitive motions, we demonstrate how to achieve prospective learning for complex tasks whilst incorporating subject-specific variations. A hierarchical Hidden Markov Model is used to model each movement primitive as well as their sequential relationship. This model is applied to generation of motion sequences, recognition of operator input, and prediction of future movements for the robot. The framework is validated by comparing catheter tip motions against the manual approach, showing significant improvements in the quality of catheterization. The results motivate the design of collaborative robotic systems that are intuitive to use, while reducing the cognitive workload of the operator.

  7. Motion Primitives and Probabilistic Edit Distance for Action Recognition

    DEFF Research Database (Denmark)

    Fihl, Preben; Holte, Michael Boelstoft; Moeslund, Thomas B.

    2009-01-01

    the actions as a sequence of temporal isolated instances, denoted primitives. These primitives are each defined by four features extracted from motion images. The primitives are recognized in each frame based on a trained classifier resulting in a sequence of primitives. From this sequence we recognize......The number of potential applications has made automatic recognition of human actions a very active research area. Different approaches have been followed based on trajectories through some state space. In this paper we also model an action as a trajectory through a state space, but we represent...... different temporal actions using a probabilistic Edit Distance method. The method is tested on different actions with and without noise and the results show recognition rates of 88.7% and 85.5%, respectively....

  8. Invariant-based reasoning about parameterized security protocols

    NARCIS (Netherlands)

    Mooij, A.J.

    2010-01-01

    We explore the applicability of the programming method of Feijen and van Gasteren to the domain of security protocols. This method addresses the derivation of concurrent programs from a formal specification, and it is based on common notions like invariants and pre- and post-conditions. We show that

  9. Exploring facilitating factors and barriers to the nationwide dissemination of a Dutch school-based obesity prevention program "DOiT": a study protocol

    NARCIS (Netherlands)

    van Nassau, F.; Singh, A.S.; van Mechelen, W.; Paulussen, T.G.; Brug, J.; Chinapaw, M.J.

    2013-01-01

    Background: The evidence-based Dutch Obesity Intervention in Teenagers (DOiT) program is a school-based obesity prevention program for 12 to 14-year olds attending the first two years of prevocational education. This paper describes the study protocol applied to evaluate (a) the nationwide

  10. A VXI-GPIB protocol converter based on DSP

    International Nuclear Information System (INIS)

    Hu Yuanfeng; Yu Xiaoqi; Lu Jingping

    2006-01-01

    A VXI-GPIB protocol converter based on DSP is introduced. The word-serial protocol with the message-based interface is implemented by EPLD and DSP. The GPIB functions are implemented by programming to the GPIB control chip. The transfer from VXI messages to GPIB functions is implemented by DSP. As an example of application, the control functions for oscilloscopes have been implemented in a VXI-GPIB heterogeneous system using such modules. (authors)

  11. QCAPUF: QCA-based physically unclonable function as a hardware security primitive

    Science.gov (United States)

    Abutaleb, M. M.

    2018-04-01

    Physically unclonable functions (PUFs) are increasingly used as innovative security primitives to provide the hardware authentication and identification as well as the secret key generation based on unique and random variations in identically fabricated devices. Security and low power have appeared to become two crucial necessities to modern designs. As an emerging nanoelectronic technology, a quantum-dot cellular automata (QCA) can achieve ultra-low power consumption as well as an extremely small area for implementing digital designs. However, there are various classes of permanent defects that can happen during the manufacture of QCA devices. The recent extensive research has been focused on how to eliminate errors in QCA structures resulting from fabrication variances. By a completely different vision, to turn this disadvantage into an advantage, this paper presents a novel QCA-based PUF (QCAPUF) architecture to exploit the unique physical characteristics of fabricated QCA cells in order to produce different hardware fingerprint instances. This architecture is composed of proposed logic and interconnect blocks that have critical vulnerabilities and perform unexpected logical operations. The behaviour of QCAPUF is thoroughly analysed through physical relations and simulations. Results confirm that the proposed QCAPUF has state of the art PUF characteristics in the QCA technology. This paper will serve as a basis for further research into QCA-based hardware security primitives and applications.

  12. Action Recognition in Semi-synthetic Images using Motion Primitives

    DEFF Research Database (Denmark)

    Fihl, Preben; Holte, Michael Boelstoft; Moeslund, Thomas B.

    This technical report describes an action recognition approach based on motion primitives. A few characteristic time instances are found in a sequence containing an action and the action is classified from these instances. The characteristic instances are defined solely on the human motion, hence...... motion primitives. The motion primitives are extracted by double difference images and represented by four features. In each frame the primitive, if any, that best explains the observed data is identified. This leads to a discrete recognition problem since a video sequence will be converted into a string...... containing a sequence of symbols, each representing a primitive. After pruning the string a probabilistic Edit Distance classifier is applied to identify which action best describes the pruned string. The method is evaluated on five one-arm gestures. A test is performed with semi-synthetic input data...

  13. The Development of a Web-Based Program to Reduce Dietary Salt Intake in Schoolchildren: Study Protocol.

    Science.gov (United States)

    Grimes, Carley Ann; Booth, Alison; Khokhar, Durreajam; West, Madeline; Margerison, Claire; Campbell, Karen; Nowson, Caryl

    2017-05-31

    Salt intake of schoolchildren in the Australian state of Victoria is high. To protect future cardiovascular health, interventions that seek to reduce the amount of salt in children's diets are required. We sought to develop and pilot test a Web-based program (Digital Education to Limit Salt Intake in the Home [DELISH]) that aims to reduce dietary salt intake among schoolchildren and to improve child and parent knowledge, attitudes, and behaviors related to salt intake. This paper presents the DELISH study protocol, along with pilot findings used to inform the development of the program. The DELISH program is a 5-week Web-based intervention that targets schoolchildren aged 7-10 years and their parents. This is a single-arm study with a pretest and posttest design. We will assess change in salt intake through analysis of 24-hour urinary sodium excretion. Children and parents will complete online surveys assessing knowledge, attitudes, and behaviors related to salt intake. We will assess feasibility of the program via process measures, which include metrics to describe intervention uptake (eg, number of children who complete Web-based sessions and of parents who view online newsletters) and evaluation surveys and interviews conducted with children, parents, and schoolteachers. The first 2 Web sessions developed for children were pilot tested in 19 children aged 8-12 years. Findings from pilot testing indicated that most children (session 1: 18/19, 95%; and session 2: 19/19, 100%) enjoyed completing each session and liked the inclusion of comic strips and interactive games. Commonly reported areas of improvement related to sessions being text and content heavy. Based on these findings, we simplified sessions and developed 3 additional sessions for use in the DELISH program. The DELISH program was implemented during June-December 2016. We expect to have results from this study at the end of 2017. To our knowledge, this is the first Australian study to examine the

  14. Primitive polynomials selection method for pseudo-random number generator

    Science.gov (United States)

    Anikin, I. V.; Alnajjar, Kh

    2018-01-01

    In this paper we suggested the method for primitive polynomials selection of special type. This kind of polynomials can be efficiently used as a characteristic polynomials for linear feedback shift registers in pseudo-random number generators. The proposed method consists of two basic steps: finding minimum-cost irreducible polynomials of the desired degree and applying primitivity tests to get the primitive ones. Finally two primitive polynomials, which was found by the proposed method, used in pseudorandom number generator based on fuzzy logic (FRNG) which had been suggested before by the authors. The sequences generated by new version of FRNG have low correlation magnitude, high linear complexity, less power consumption, is more balanced and have better statistical properties.

  15. Study protocol for the evaluation of an Infant Simulator based program delivered in schools: a pragmatic cluster randomised controlled trial

    OpenAIRE

    Brinkman, Sally A; Johnson, Sarah E; Lawrence, David; Codde, James P; Hart, Michael B; Straton, Judith AY; Silburn, Sven

    2010-01-01

    Abstract Background This paper presents the study protocol for a pragmatic randomised controlled trial to evaluate the impact of a school based program developed to prevent teenage pregnancy. The program includes students taking care of an Infant Simulator; despite growing popularity and an increasing global presence of such programs, there is no published evidence of their long-term impact. The aim of this trial is to evaluate the Virtual Infant Parenting (VIP) program by investigating pre-c...

  16. Efficient conservative ADER schemes based on WENO reconstruction and space-time predictor in primitive variables

    Science.gov (United States)

    Zanotti, Olindo; Dumbser, Michael

    2016-01-01

    We present a new version of conservative ADER-WENO finite volume schemes, in which both the high order spatial reconstruction as well as the time evolution of the reconstruction polynomials in the local space-time predictor stage are performed in primitive variables, rather than in conserved ones. To obtain a conservative method, the underlying finite volume scheme is still written in terms of the cell averages of the conserved quantities. Therefore, our new approach performs the spatial WENO reconstruction twice: the first WENO reconstruction is carried out on the known cell averages of the conservative variables. The WENO polynomials are then used at the cell centers to compute point values of the conserved variables, which are subsequently converted into point values of the primitive variables. This is the only place where the conversion from conservative to primitive variables is needed in the new scheme. Then, a second WENO reconstruction is performed on the point values of the primitive variables to obtain piecewise high order reconstruction polynomials of the primitive variables. The reconstruction polynomials are subsequently evolved in time with a novel space-time finite element predictor that is directly applied to the governing PDE written in primitive form. The resulting space-time polynomials of the primitive variables can then be directly used as input for the numerical fluxes at the cell boundaries in the underlying conservative finite volume scheme. Hence, the number of necessary conversions from the conserved to the primitive variables is reduced to just one single conversion at each cell center. We have verified the validity of the new approach over a wide range of hyperbolic systems, including the classical Euler equations of gas dynamics, the special relativistic hydrodynamics (RHD) and ideal magnetohydrodynamics (RMHD) equations, as well as the Baer-Nunziato model for compressible two-phase flows. In all cases we have noticed that the new ADER

  17. Peripheral primitive neuroendocrine tumor of the chest wall—A case report with pathological correlation

    Directory of Open Access Journals (Sweden)

    Jidi Gao, MD

    2018-04-01

    Full Text Available Primitive neuroectodermal tumor is a high-grade malignant tumor originating from the neural crest and neuroectoderm, which can be subdivided into central and peripheral categories. Peripheral primitive neuroectodermal tumor is thought to be identical to Ewing's sarcoma, and falls under a broader category of Ewing's sarcoma family of tumors. Very rarely, it may present without osseous involvement, known as extraosseous Ewing's sarcoma. Here we present a case of a 38-year-old woman, who presented with several-month history of a slow-growing chest wall mass, initially thought to be a breast mass. The mass was diagnosed as extraosseous Ewing's sarcoma upon tissue biopsy. The patient was started on a dose-intensified neoadjuvant therapy, based on protocol from pediatric population given rarity of this tumor in the adult population. While the patient was initially planned for surgical resection, the tumor showed excellent response to chemotherapy on follow-up imaging, and radiation therapy was elected in lieu of resection. Keywords: Chest wall tumors, Peripheral PNET, Ewing's sarcoma

  18. [The intervention mapping protocol: A structured process to develop, implement and evaluate health promotion programs].

    Science.gov (United States)

    Fassier, J-B; Lamort-Bouché, M; Sarnin, P; Durif-Bruckert, C; Péron, J; Letrilliart, L; Durand, M-J

    2016-02-01

    Health promotion programs are expected to improve population health and reduce social inequalities in health. However, their theoretical foundations are frequently ill-defined, and their implementation faces many obstacles. The aim of this article is to describe the intervention mapping protocol in health promotion programs planning, used recently in several countries. The challenges of planning health promotion programs are presented, and the six steps of the intervention mapping protocol are described with an example. Based on a literature review, the use of this protocol, its requirements and potential limitations are discussed. The intervention mapping protocol has four essential characteristics: an ecological perspective (person-environment), a participative approach, the use of theoretical models in human and social sciences and the use of scientific evidence. It comprises six steps: conduct a health needs assessment, define change objectives, select theory-based change techniques and practical applications, organize techniques and applications into an intervention program (logic model), plan for program adoption, implementation, and sustainability, and generate an evaluation plan. This protocol was used in different countries and domains such as obesity, tobacco, physical activity, cancer and occupational health. Although its utilization requires resources and a critical stance, this protocol was used to develop interventions which efficacy was demonstrated. The intervention mapping protocol is an integrated process that fits the scientific and practical challenges of health promotion. It could be tested in France as it was used in other countries, in particular to reduce social inequalities in health. Copyright © 2016. Published by Elsevier Masson SAS.

  19. The Family Startup Program: study protocol for a randomized controlled trial of a universal group-based parenting support program.

    Science.gov (United States)

    Trillingsgaard, Tea; Maimburg, Rikke Damkjær; Simonsen, Marianne

    2015-04-21

    Inadequate parenting is an important public health problem with possible severe and long-term consequences related to child development. We have solid theoretical and political arguments in favor of efforts enhancing the quality of the early family environment in the population at large. However, little is known about effect of universal approaches to parenting support during the transition to parenthood. This protocol describes an experimental evaluation of group based parenting support, the Family Startup Program (FSP), currently implemented large scale in Denmark. Participants will be approximately 2500 pregnant women and partners. Inclusion criteria are parental age above 18 and the mother expecting first child. Families are recruited when attending routine pregnancy scans provided as a part of the publicly available prenatal care program at Aarhus University Hospital, Skejby. Families are randomized within four geographically defined strata to one of two conditions a) participation in FSP or b) Treatment As Usual (TAU). FSP aims to prepare new families for their roles as parents and enhance parental access to informal sources of support, i.e. social network and community resources. The program consists of twelve group sessions, with nine families in each group, continuing from pregnancy until the child is 15 months old. TAU is the publicly available pre- and postnatal care available to families in both conditions. Analyses will employ survey data, administrative data from health visitors, and administrative register based data from Statistics Denmark. All data sources will be linked via the unique Danish Civil Registration Register (CPR) identifier. Data will be obtained at four time points, during pregnancy, when the child is nine months, 18 months and seven years. The primary study outcome is measured by the Parenting Sense of Competence scale (PSOC) J Clin Child Psychol 18:167-75, 1989. Other outcomes include parenting and couple relationship quality

  20. Efficient Synchronization Primitives for GPUs

    OpenAIRE

    Stuart, Jeff A.; Owens, John D.

    2011-01-01

    In this paper, we revisit the design of synchronization primitives---specifically barriers, mutexes, and semaphores---and how they apply to the GPU. Previous implementations are insufficient due to the discrepancies in hardware and programming model of the GPU and CPU. We create new implementations in CUDA and analyze the performance of spinning on the GPU, as well as a method of sleeping on the GPU, by running a set of memory-system benchmarks on two of the most common GPUs in use, the Tesla...

  1. Globfit: Consistently fitting primitives by discovering global relations

    KAUST Repository

    Li, Yangyan; Wu, Xiaokun; Chrysathou, Yiorgos; Sharf, Andrei Sharf; Cohen-Or, Daniel; Mitra, Niloy J.

    2011-01-01

    Given a noisy and incomplete point set, we introduce a method that simultaneously recovers a set of locally fitted primitives along with their global mutual relations. We operate under the assumption that the data corresponds to a man-made engineering object consisting of basic primitives, possibly repeated and globally aligned under common relations. We introduce an algorithm to directly couple the local and global aspects of the problem. The local fit of the model is determined by how well the inferred model agrees to the observed data, while the global relations are iteratively learned and enforced through a constrained optimization. Starting with a set of initial RANSAC based locally fitted primitives, relations across the primitives such as orientation, placement, and equality are progressively learned and conformed to. In each stage, a set of feasible relations are extracted among the candidate relations, and then aligned to, while best fitting to the input data. The global coupling corrects the primitives obtained in the local RANSAC stage, and brings them to precise global alignment. We test the robustness of our algorithm on a range of synthesized and scanned data, with varying amounts of noise, outliers, and non-uniform sampling, and validate the results against ground truth, where available. © 2011 ACM.

  2. Globfit: Consistently fitting primitives by discovering global relations

    KAUST Repository

    Li, Yangyan

    2011-07-01

    Given a noisy and incomplete point set, we introduce a method that simultaneously recovers a set of locally fitted primitives along with their global mutual relations. We operate under the assumption that the data corresponds to a man-made engineering object consisting of basic primitives, possibly repeated and globally aligned under common relations. We introduce an algorithm to directly couple the local and global aspects of the problem. The local fit of the model is determined by how well the inferred model agrees to the observed data, while the global relations are iteratively learned and enforced through a constrained optimization. Starting with a set of initial RANSAC based locally fitted primitives, relations across the primitives such as orientation, placement, and equality are progressively learned and conformed to. In each stage, a set of feasible relations are extracted among the candidate relations, and then aligned to, while best fitting to the input data. The global coupling corrects the primitives obtained in the local RANSAC stage, and brings them to precise global alignment. We test the robustness of our algorithm on a range of synthesized and scanned data, with varying amounts of noise, outliers, and non-uniform sampling, and validate the results against ground truth, where available. © 2011 ACM.

  3. Evaluating structural pattern recognition for handwritten math via primitive label graphs

    Science.gov (United States)

    Zanibbi, Richard; Mouchère, Harold; Viard-Gaudin, Christian

    2013-01-01

    Currently, structural pattern recognizer evaluations compare graphs of detected structure to target structures (i.e. ground truth) using recognition rates, recall and precision for object segmentation, classification and relationships. In document recognition, these target objects (e.g. symbols) are frequently comprised of multiple primitives (e.g. connected components, or strokes for online handwritten data), but current metrics do not characterize errors at the primitive level, from which object-level structure is obtained. Primitive label graphs are directed graphs defined over primitives and primitive pairs. We define new metrics obtained by Hamming distances over label graphs, which allow classification, segmentation and parsing errors to be characterized separately, or using a single measure. Recall and precision for detected objects may also be computed directly from label graphs. We illustrate the new metrics by comparing a new primitive-level evaluation to the symbol-level evaluation performed for the CROHME 2012 handwritten math recognition competition. A Python-based set of utilities for evaluating, visualizing and translating label graphs is publicly available.

  4. Microfluidic assay of the deformability of primitive erythroblasts.

    Science.gov (United States)

    Zhou, Sitong; Huang, Yu-Shan; Kingsley, Paul D; Cyr, Kathryn H; Palis, James; Wan, Jiandi

    2017-09-01

    Primitive erythroblasts (precursors of red blood cells) enter vascular circulation during the embryonic period and mature while circulating. As a result, primitive erythroblasts constantly experience significant hemodynamic shear stress. Shear-induced deformation of primitive erythroblasts however, is poorly studied. In this work, we examined the deformability of primitive erythroblasts at physiologically relevant flow conditions in microfluidic channels and identified the regulatory roles of the maturation stage of primitive erythroblasts and cytoskeletal protein 4.1 R in shear-induced cell deformation. The results showed that the maturation stage affected the deformability of primitive erythroblasts significantly and that primitive erythroblasts at later maturational stages exhibited a better deformability due to a matured cytoskeletal structure in the cell membrane.

  5. Implementing exercise in cancer care: study protocol to evaluate a community-based exercise program for people with cancer

    OpenAIRE

    Cormie, Prue; Lamb, Stephanie; Newton, Robert U.; Valentine, Lani; McKiernan, Sandy; Spry, Nigel; Joseph, David; Taaffe, Dennis R.; Doran, Christopher M.; Galv?o, Daniel A.

    2017-01-01

    Background Clinical research has established the efficacy of exercise in reducing treatment-related side-effects and increasing wellbeing in people with cancer. Major oncology organisations have identified the importance of incorporating exercise in comprehensive cancer care but information regarding effective approaches to translating evidence into practice is lacking. This paper describes the implementation of a community-based exercise program for people with cancer and the protocol for pr...

  6. Unsupervised Learning of Action Primitives

    DEFF Research Database (Denmark)

    Baby, Sanmohan; Krüger, Volker; Kragic, Danica

    2010-01-01

    and scale, the use of the object can provide a strong invariant for the detection of motion primitives. In this paper we propose an unsupervised learning approach for action primitives that makes use of the human movements as well as the object state changes. We group actions according to the changes......Action representation is a key issue in imitation learning for humanoids. With the recent finding of mirror neurons there has been a growing interest in expressing actions as a combination meaningful subparts called primitives. Primitives could be thought of as an alphabet for the human actions....... In this paper we observe that human actions and objects can be seen as being intertwined: we can interpret actions from the way the body parts are moving, but as well from how their effect on the involved object. While human movements can look vastly different even under minor changes in location, orientation...

  7. Not so primitive: context-sensitive meta-learning about unattended sound sequences.

    Science.gov (United States)

    Todd, Juanita; Provost, Alexander; Whitson, Lisa R; Cooper, Gavin; Heathcote, Andrew

    2013-01-01

    Mismatch negativity (MMN), an evoked response potential elicited when a "deviant" sound violates a regularity in the auditory environment, is integral to auditory scene processing and has been used to demonstrate "primitive intelligence" in auditory short-term memory. Using a new multiple-context and -timescale protocol we show that MMN magnitude displays a context-sensitive modulation depending on changes in the probability of a deviant at multiple temporal scales. We demonstrate a primacy bias causing asymmetric evidence-based modulation of predictions about the environment, and we demonstrate that learning how to learn about deviant probability (meta-learning) induces context-sensitive variation in the accessibility of predictive long-term memory representations that underpin the MMN. The existence of the bias and meta-learning are consistent with automatic attributions of behavioral salience governing relevance-filtering processes operating outside of awareness.

  8. [Study protocol of a prevention of recurrent suicidal behaviour program based on case management (PSyMAC)].

    Science.gov (United States)

    Sáiz, Pilar A; Rodríguez-Revuelta, Julia; González-Blanco, Leticia; Burón, Patricia; Al-Halabí, Susana; Garrido, Marlen; García-Alvarez, Leticia; García-Portilla, Paz; Bobes, Julio

    2014-01-01

    Prevention of suicidal behaviour is a public health priority in the European Union. A previous suicide attempt is the best risk predictor for future attempts, as well as completed suicides. The primary aim of this article is to describe a controlled study protocol designed for prevention of recurrent suicidal behaviour that proposes case management, and includes a psychoeducation program, as compared with the standard intervention (PSyMAC). Patients admitted from January 2011 to June 2013 to the emergency room of the Hospital Universitario Central de Asturias were evaluated using a protocol including sociodemographic, psychiatric, and psychosocial assessment. Patients were randomly assigned to either a group receiving continuous case management including participation in a psychoeducation program (experimental group), or a control group receiving standard care. The primary objective is to examine whether or not the period of time until recurrent suicidal behaviour in the experimental group is significantly different from that of the control group. PSyMAC proposes low cost and easily adaptable interventions to the usual clinical setting that can help to compensate the shortcoming of specific action protocols and suicidal behaviour prevention programs in our country. The evaluation of PSyMAC results will determine their real effectivity as a case-magament program to reduce suicidal risk. Copyright © 2013 SEP y SEPB. Published by Elsevier España. All rights reserved.

  9. A requirement for FGF signalling in the formation of primitive streak-like intermediates from primitive ectoderm in culture.

    Directory of Open Access Journals (Sweden)

    Zhiqiang Zheng

    Full Text Available BACKGROUND: Embryonic stem (ES cells hold considerable promise as a source of cells with therapeutic potential, including cells that can be used for drug screening and in cell replacement therapies. Differentiation of ES cells into the somatic lineages is a regulated process; before the promise of these cells can be realised robust and rational methods for directing differentiation into normal, functional and safe cells need to be developed. Previous in vivo studies have implicated fibroblast growth factor (FGF signalling in lineage specification from pluripotent cells. Although FGF signalling has been suggested as essential for specification of mesoderm and endoderm in vivo and in culture, the exact role of this pathway remains unclear. METHODOLOGY/PRINCIPAL FINDINGS: Using a culture model based on early primitive ectoderm-like (EPL cells we have investigated the role of FGF signalling in the specification of mesoderm. We were unable to demonstrate any mesoderm inductive capability associated with FGF1, 4 or 8 signalling, even when the factors were present at high concentrations, nor any enhancement in mesoderm formation induced by exogenous BMP4. Furthermore, there was no evidence of alteration of mesoderm sub-type formed with addition of FGF1, 4 or 8. Inhibition of endogenous FGF signalling, however, prevented mesoderm and favoured neural differentiation, suggesting FGF signalling was required but not sufficient for the differentiation of primitive ectoderm into primitive streak-like intermediates. The maintenance of ES cell/early epiblast pluripotent marker expression was also observed in cultures when FGF signalling was inhibited. CONCLUSIONS/SIGNIFICANCE: FGF signalling has been shown to be required for the differentiation of primitive ectoderm to neurectoderm. This, coupled with our observations, suggest FGF signalling is required for differentiation of the primitive ectoderm into the germ lineages at gastrulation.

  10. Wnt signaling controls the specification of definitive and primitive hematopoiesis from human pluripotent stem cells.

    Science.gov (United States)

    Sturgeon, Christopher M; Ditadi, Andrea; Awong, Geneve; Kennedy, Marion; Keller, Gordon

    2014-06-01

    Efforts to derive hematopoietic stem cells (HSCs) from human pluripotent stem cells (hPSCs) are complicated by the fact that embryonic hematopoiesis consists of two programs, primitive and definitive, that differ in developmental potential. As only definitive hematopoiesis generates HSCs, understanding how this program develops is essential for being able to produce this cell population in vitro. Here we show that both hematopoietic programs transition through hemogenic endothelial intermediates and develop from KDR(+)CD34(-)CD144(-) progenitors that are distinguished by CD235a expression. Generation of primitive progenitors (KDR(+)CD235a(+)) depends on stage-specific activin-nodal signaling and inhibition of the Wnt-β-catenin pathway, whereas specification of definitive progenitors (KDR(+)CD235a(-)) requires Wnt-β-catenin signaling during this same time frame. Together, these findings establish simple selective differentiation strategies for the generation of primitive or definitive hematopoietic progenitors by Wnt-β-catenin manipulation, and in doing so provide access to enriched populations for future studies on hPSC-derived hematopoietic development.

  11. Context of culture: Critique of the primitive mind

    Directory of Open Access Journals (Sweden)

    Božilović Nikola

    2010-01-01

    Full Text Available The author of this paper has the intention to reach the new meaning and sense of the primitive mentality by analyzing it in early social communities. He also wants to point out the possible reflections of the spirit and consciousness of our ancestors on us, here and now. The first part of the paper is dedicated to a critical deliberation on anthropological conflicts which have arisen concerning the reasoning power of the so-called primitives. The crucial question lies in the following: Is the difference between the “primitive” and the “civilized” mentality fundamental or is it possible only to a certain degree. The author takes the notion of primitive mentality through time and points to the medieval understandings, which are occupied by teratological themes, then to the renaissance comprehension, which relies on the first experiential observations, and, finally, to the enlightenment ideas of exotic peoples out of which the myth of “the good savage” is born. The nineteenth and twentieth centuries introduce the notions of “people’s character” and “national spirit”. The opinions are polarized, on the one hand of ethnocentrism, carried by the prejudice of people and ethnic groups and, on the other hand, of cultural relativism, based on the understanding and appreciation of cultural differences. In the end, the author also recognizes the modern primitive man, one who is not ready to deal with the challenges of his age. The modern primitive recalls the spirits of the past, the surviving and anachronic models of behavior, unaware of the fact that these are the same models that he has ascribed to “savages”. However, while such thinking and acting was justified by the cultural level at which our ancestors had lived, the mental frame of the contemporary primitives is significantly in contrast with the high level of civilization development.

  12. Spectrum Analysis of Inertial and Subinertial Motions Based on Analyzed Winds and Wind-Driven Currents from a Primitive Equation General Ocean Circulation Model.

    Science.gov (United States)

    1982-12-01

    1Muter.Te Motions Based on Ana lyzed Winds and wind-driven December 1982 Currents from. a Primitive Squat ion General a.OW -love"*..* Oean Circulation...mew se"$ (comeS.... do oISN..u am ae~ 00do OWaor NUN Fourier and Rotary Spc , Analysis Modeled Inertial and Subinrtial Motion 4 Primitive Equation

  13. From primitive identity to the non-individuality of quantum objects

    Science.gov (United States)

    Arenhart, Jonas Becker; Krause, Décio

    2014-05-01

    We consider the claim by Dorato and Morganti (Grades of individuality. A pluralistic view of identity in quantum mechanics and in the sciences. Philosophical Studies, 163 (2013) 591-610) that primitive individuality should be attributed to the entities dealt with by non-relativistic quantum mechanics. There are two central ingredients in the proposal: (i) in the case of non-relativistic quantum mechanics, individuality should be taken as a primitive notion and (ii) primitive individuality is naturalistically acceptable. We argue that, strictly understood, naturalism faces difficulties in helping to provide a theory with a unique principle of individuation. We also hold that even when taken in a loose sense, naturalism does not provide any sense in which one could hold that quantum mechanics endorses primitive individuality over non-individuality. Rather, we argue that non-individuality should be preferred based on the grounds that such a view fits better the claims of the theory.

  14. Fast concurrent array-based stacks, queues and deques using fetch-and-increment-bounded, fetch-and-decrement-bounded and store-on-twin synchronization primitives

    Science.gov (United States)

    Chen, Dong; Gara, Alana; Heidelberger, Philip; Kumar, Sameer; Ohmacht, Martin; Steinmacher-Burow, Burkhard; Wisniewski, Robert

    2014-09-16

    Implementation primitives for concurrent array-based stacks, queues, double-ended queues (deques) and wrapped deques are provided. In one aspect, each element of the stack, queue, deque or wrapped deque data structure has its own ticket lock, allowing multiple threads to concurrently use multiple elements of the data structure and thus achieving high performance. In another aspect, new synchronization primitives FetchAndIncrementBounded (Counter, Bound) and FetchAndDecrementBounded (Counter, Bound) are implemented. These primitives can be implemented in hardware and thus promise a very fast throughput for queues, stacks and double-ended queues.

  15. Evaluating a community-based early childhood education and development program in Indonesia: study protocol for a pragmatic cluster randomized controlled trial with supplementary matched control group

    NARCIS (Netherlands)

    Pradhan, M.; Brinkman, S.A.; Beatty, A.; Maika, A.; Satriawan, E.; de Ree, J.; Hasan, A.

    2013-01-01

    Background This paper presents the study protocol for a pragmatic cluster randomized controlled trial (RCT) with a supplementary matched control group. The aim of the trial is to evaluate a community-based early education and development program launched by the Government of Indonesia. The program

  16. Evaluating a community-based early childhood education and development program in Indonesia: study protocol for a pragmatic cluster randomized controlled trial with supplementary matched control group

    NARCIS (Netherlands)

    Pradhan, M.P.; Brinkman, S.A.; Beatty, A.; Maika, A.; Satriawan, E.; de Ree, J.; Hasan, A.

    2013-01-01

    Background: This paper presents the study protocol for a pragmatic cluster randomized controlled trial (RCT) with a supplementary matched control group. The aim of the trial is to evaluate a community-based early education and development program launched by the Government of Indonesia. The program

  17. Versatility of `hemorheologic fitness' according to exercise intensity: emphasis on the "healthy primitive lifestyle"

    Science.gov (United States)

    Brun, Jean-Frédéric; Varlet-Marie, Emmanuelle; Chevance, Guillaume; Pollatz, Marion; Fedou, Christine; de Mauverger, Eric Raynaud

    2014-05-01

    We recently proposed a unifying hypothesis to reconcile unexpected findings in exercise hemorheology and the classical concepts of "hemorheologic fitness" and the "triphasic effects of exercise", based on the "healthy primitive lifestyle" paradigm. This paradigm assumes that evolution has selected genetic polymorphisms leading to insulin resistance as an adaptative strategy to cope with continuous low intensity physical activity and a special alimentation moderately high in protein, rich in low glycemic index carbohydrates, and poor in saturated fat. According to this protocol the true physiological picture would be that of an individual whose exercise and nutritional habits are close from this lifestyle, both sedentary subjects and trained athletes representing situations on the edge of this model. Unfortunately samples of people truly adhering to this ancestral lifestyle are hard to obtain. In order to address this picture we tried to compare databases obtained with our preceding published studies. As a model of the "healthy primitive lifestyle" we selected patients trained at low intensity (LI) and given an advice of protein intake around 1.2 g/kg/day. Results show a continuum for plasma viscosity which seems to be lower in athletes than LI-trained and even more sedentaries. When sedentary subjects become obese the most obvious characteristic is an increase in red blood cell (RBC) aggregation correlated to the size of fat stores. It is clear that 3 months of LI are not a perfect model of "healthy primitive lifestyle", but these data suggest that the most important effect of LI regular exercise is to decrease plasma viscosity and that sedentarity increases RBC aggregation mostly when it results in increased fat storage.

  18. RSA-Based Secret Handshakes

    OpenAIRE

    Vergnaud , Damien

    2006-01-01

    A secret handshake mechanism allows two entities, members of a same group, to authenticate each other secretly. This primitive was introduced recently by Balfanz, Durfee, Shankar, Smetters, Staddon and Wong and, so far, all the schemes proposed are based on discrete log systems. This paper proposes three new secret handshake protocols secure against active impersonator and detector adversaries. Inspired by two RSA-based key agreement protocols introduced by Okamoto and Tanaka in 1989 and Gira...

  19. Dynamic Primitives in the Control of Locomotion

    Directory of Open Access Journals (Sweden)

    Neville eHogan

    2013-06-01

    Full Text Available Humans achieve locomotor dexterity that far exceeds the capability of modern robots, yet this is achieved despite slower actuators, imprecise sensors and vastly slower communication. We propose that this spectacular performance arises from encoding motor commands in terms of dynamic primitives. We propose three primitives as a foundation for a comprehensive theoretical framework that can embrace a wide range of upper- and lower-limb behaviors. Building on previous work that suggested discrete and rhythmic movements as elementary dynamic behaviors, we define submovements and oscillations: As discrete movements cannot be combined with sufficient flexibility, we argue that suitably-defined submovements are primitives. As the term rhythmic may be ambiguous, we define oscillations as the corresponding class of primitives. We further propose mechanical impedances as a third class of dynamic primitives, necessary for interaction with the physical environment. Combination of these three classes of primitive requires care. One approach is through a generalized equivalent network: a virtual trajectory composed of simultaneous and/or sequential submovements and/or oscillations that interacts with mechanical impedances to produce observable forces and motions. Reliable experimental identification of these dynamic primitives presents challenges: Identification of mechanical impedances is exquisitely sensitive to assumptions about their dynamic structure; identification of submovements and oscillations is sensitive to their assumed form and to details of the algorithm used to extract them. Some methods to address these challenges are presented. Some implications of this theoretical framework for locomotor rehabilitation are considered.

  20. Dynamic primitives in the control of locomotion.

    Science.gov (United States)

    Hogan, Neville; Sternad, Dagmar

    2013-01-01

    Humans achieve locomotor dexterity that far exceeds the capability of modern robots, yet this is achieved despite slower actuators, imprecise sensors, and vastly slower communication. We propose that this spectacular performance arises from encoding motor commands in terms of dynamic primitives. We propose three primitives as a foundation for a comprehensive theoretical framework that can embrace a wide range of upper- and lower-limb behaviors. Building on previous work that suggested discrete and rhythmic movements as elementary dynamic behaviors, we define submovements and oscillations: as discrete movements cannot be combined with sufficient flexibility, we argue that suitably-defined submovements are primitives. As the term "rhythmic" may be ambiguous, we define oscillations as the corresponding class of primitives. We further propose mechanical impedances as a third class of dynamic primitives, necessary for interaction with the physical environment. Combination of these three classes of primitive requires care. One approach is through a generalized equivalent network: a virtual trajectory composed of simultaneous and/or sequential submovements and/or oscillations that interacts with mechanical impedances to produce observable forces and motions. Reliable experimental identification of these dynamic primitives presents challenges: identification of mechanical impedances is exquisitely sensitive to assumptions about their dynamic structure; identification of submovements and oscillations is sensitive to their assumed form and to details of the algorithm used to extract them. Some methods to address these challenges are presented. Some implications of this theoretical framework for locomotor rehabilitation are considered.

  1. Visibility-Based Hypothesis Testing Using Higher-Order Optical Interference

    Science.gov (United States)

    Jachura, Michał; Jarzyna, Marcin; Lipka, Michał; Wasilewski, Wojciech; Banaszek, Konrad

    2018-03-01

    Many quantum information protocols rely on optical interference to compare data sets with efficiency or security unattainable by classical means. Standard implementations exploit first-order coherence between signals whose preparation requires a shared phase reference. Here, we analyze and experimentally demonstrate the binary discrimination of visibility hypotheses based on higher-order interference for optical signals with a random relative phase. This provides a robust protocol implementation primitive when a phase lock is unavailable or impractical. With the primitive cost quantified by the total detected optical energy, optimal operation is typically reached in the few-photon regime.

  2. Study protocol for the evaluation of an Infant Simulator based program delivered in schools: a pragmatic cluster randomised controlled trial.

    Science.gov (United States)

    Brinkman, Sally A; Johnson, Sarah E; Lawrence, David; Codde, James P; Hart, Michael B; Straton, Judith A Y; Silburn, Sven

    2010-10-21

    This paper presents the study protocol for a pragmatic randomised controlled trial to evaluate the impact of a school based program developed to prevent teenage pregnancy. The program includes students taking care of an Infant Simulator; despite growing popularity and an increasing global presence of such programs, there is no published evidence of their long-term impact. The aim of this trial is to evaluate the Virtual Infant Parenting (VIP) program by investigating pre-conceptual health and risk behaviours, teen pregnancy and the resultant birth outcomes, early child health and maternal health. Fifty-seven schools (86% of 66 eligible secondary schools) in Perth, Australia were recruited to the clustered (by school) randomised trial, with even randomisation to the intervention and control arms. Between 2003 and 2006, the VIP program was administered to 1,267 participants in the intervention schools, while 1,567 participants in the non-intervention schools received standard curriculum. Participants were all female and aged between 13-15 years upon recruitment. Pre and post-intervention questionnaires measured short-term impact and participants are now being followed through their teenage years via data linkage to hospital medical records, abortion clinics and education records. Participants who have a live birth are interviewed by face-to-face interview. Kaplan-Meier survival analysis and proportional hazards regression will test for differences in pregnancy, birth and abortion rates during the teenage years between the study arms. This protocol paper provides a detailed overview of the trial design as well as initial results in the form of participant flow. The authors describe the intervention and its delivery within the natural school setting and discuss the practical issues in the conduct of the trial, including recruitment. The trial is pragmatic and will directly inform those who provide Infant Simulator based programs in school settings. ISRCTN24952438.

  3. Survival of the primitive mantle reservoir?

    Science.gov (United States)

    Huang, S.; Jacobsen, S. B.; Mukhopadhyay, S.

    2010-12-01

    The high-3He lavas are thought to originate from a deep primitive mantle source that has not been much modified since the formation of Earth’s core. Comparison of 4He/3He in MORBs and plume lavas indicate that the plume sources must be a lower mantle feature, in agreement with most geophysical inferences. However, the lithophile element isotope systems of plume lavas are not primitive. The idea that the high-3He source is significantly less processed and more primitive than MORB source is clearly supported by mixing trends in plots of 4He/3He versus Sr, Nd and Pb isotope ratios, which have been extrapolated to an inferred 4He/3He of ~17,000 (~43x the atmospheric ratio), a mantle reservoir named PHEM (Primitive HElium Mantle). Slightly lower 4He/3He, ~15,000, were reported for Baffin Island picrites. Recently, Jackson et al. (2010) claimed that some Baffin Island and Greenland picrites with single-stage Pb model ages of ~4.5 Ga have low 4He/3He, and argued that “their source is the most ancient accessible reservoir in the Earth’s mantle, and it may be parental to all mantle reservoirs”. However, the available data are insufficient to make such a claim, and we suggest an alternative interpretation. Specially: 1. Four out of ten Baffin Island and Greenland picrites used by Jackson et al. (2010) have 4He/3He higher than average MORB value and all are far removed from the lowest measured value of 15,000. 2. Five Greenland picrites which cluster around the 4.50 Gyr geochron (Jackson et al., 2010) form a curved 207Pb*/206Pb*-4He/3He trend. This trend is best explained as a mixing line, implying that the single-stage Pb ages of these lavas are meaningless. 3. In a 207Pb*/206Pb*-4He/3He plot, Koolau lavas from Hawaii overlap with Baffin Island and Greenland picrites. If Baffin Island and Greenland picrites represent melts from the primitive mantle based on their Pb and He isotopes (Jackson et al., 2010), a similar argument can be applied to Koolau lavas. However, it

  4. Caspase-9 has a nonapoptotic function in Xenopus embryonic primitive blood formation.

    Science.gov (United States)

    Tran, Hong Thi; Fransen, Mathias; Dimitrakopoulou, Dionysia; Van Imschoot, Griet; Willemarck, Nicolas; Vleminckx, Kris

    2017-07-15

    Caspases constitute a family of cysteine proteases centrally involved in programmed cell death, which is an integral part of normal embryonic and fetal development. However, it has become clear that specific caspases also have functions independent of cell death. In order to identify novel apoptotic and nonapoptotic developmental caspase functions, we designed and transgenically integrated novel fluorescent caspase reporter constructs in developing Xenopus embryos and tadpoles. This model organism has an external development, allowing direct and continuous monitoring. These studies uncovered a nonapoptotic role for the initiator caspase-9 in primitive blood formation. Functional experiments further corroborated that caspase-9, but possibly not the executioners caspase-3 and caspase-7, are required for primitive erythropoiesis in the early embryo. These data reveal a novel nonapoptotic function for the initiator caspase-9 and, for the first time, implicate nonapoptotic caspase activity in primitive blood formation. © 2017. Published by The Company of Biologists Ltd.

  5. A Practice-Based Evaluation of Distress Screening Protocol Adherence and Medical Service Utilization.

    Science.gov (United States)

    Zebrack, Brad; Kayser, Karen; Bybee, Deborah; Padgett, Lynne; Sundstrom, Laura; Jobin, Chad; Oktay, Julianne

    2017-07-01

    Background: This study examined the extent to which cancer programs demonstrated adherence to their own prescribed screening protocol, and whether adherence to that protocol was associated with medical service utilization. The hypothesis is that higher rates of service utilization are associated with lower rates of adherence to screening protocols. Methods: Oncology social workers at Commission on Cancer-accredited cancer programs reviewed electronic health records (EHRs) in their respective cancer programs during a 2-month period in 2014. Rates of overall adherence to a prescribed distress screening protocol were calculated based on documentation in the EHR that screening adherence and an appropriate clinical response had occurred. We examined documentation of emergency department (ED) use and hospitalization within 2 months after the screening visit. Results: Review of 8,409 EHRs across 55 cancer centers indicated that the overall adherence rate to screening protocols was 62.7%. The highest rates of adherence were observed in Community Cancer Programs (76.3%) and the lowest rates were in NCI-designated Cancer Centers (43.3%). Rates of medical service utilization were significantly higher than expected when overall protocol adherence was lacking. After controlling for patient and institutional characteristics, risk ratios for ED use (0.82) and hospitalization (0.81) suggest that when overall protocol adherence was documented, 18% to 19% fewer patients used these medical services. Conclusions: The observed associations between a mandated psychosocial care protocol and medical service utilization suggest opportunities for operational efficiencies and costs savings. Further investigations of protocol integrity, as well as the clinical care models by which psychosocial care is delivered, are warranted. Copyright © 2017 by the National Comprehensive Cancer Network.

  6. Driving Style Analysis Using Primitive Driving Patterns With Bayesian Nonparametric Approaches

    OpenAIRE

    Wang, Wenshuo; Xi, Junqiang; Zhao, Ding

    2017-01-01

    Analysis and recognition of driving styles are profoundly important to intelligent transportation and vehicle calibration. This paper presents a novel driving style analysis framework using the primitive driving patterns learned from naturalistic driving data. In order to achieve this, first, a Bayesian nonparametric learning method based on a hidden semi-Markov model (HSMM) is introduced to extract primitive driving patterns from time series driving data without prior knowledge of the number...

  7. Discovery of Intrinsic Primitives on Triangle Meshes

    KAUST Repository

    Solomon, Justin

    2011-04-01

    The discovery of meaningful parts of a shape is required for many geometry processing applications, such as parameterization, shape correspondence, and animation. It is natural to consider primitives such as spheres, cylinders and cones as the building blocks of shapes, and thus to discover parts by fitting such primitives to a given surface. This approach, however, will break down if primitive parts have undergone almost-isometric deformations, as is the case, for example, for articulated human models. We suggest that parts can be discovered instead by finding intrinsic primitives, which we define as parts that posses an approximate intrinsic symmetry. We employ the recently-developed method of computing discrete approximate Killing vector fields (AKVFs) to discover intrinsic primitives by investigating the relationship between the AKVFs of a composite object and the AKVFs of its parts. We show how to leverage this relationship with a standard clustering method to extract k intrinsic primitives and remaining asymmetric parts of a shape for a given k. We demonstrate the value of this approach for identifying the prominent symmetry generators of the parts of a given shape. Additionally, we show how our method can be modified slightly to segment an entire surface without marking asymmetric connecting regions and compare this approach to state-of-the-art methods using the Princeton Segmentation Benchmark. © 2011 The Author(s).

  8. An Efficient Primitive-Based Method to Recognize Online Sketched Symbols with Autocompletion

    Directory of Open Access Journals (Sweden)

    Wei Deng

    2015-01-01

    Full Text Available We present a new structural method of sketched symbol recognition, which aims to recognize a hand-drawn symbol before it is fully completed. It is invariant to scale, stroke number, and order. We also present two novel descriptors to represent the spatial distribution between two primitives. One is invariant to rotation and the other is not. Then a symbol is represented as a set of descriptors. The distance between the input symbol and the template one is calculated based on the assignment problem. Moreover, a fast nearest neighbor (NN search algorithm is proposed for recognition. The method achieves a satisfactory recognition rate in real time.

  9. Quality and Variability of Online Available Physical Therapy Protocols From Academic Orthopaedic Surgery Programs for Anterior Cruciate Ligament Reconstruction.

    Science.gov (United States)

    Makhni, Eric C; Crump, Erica K; Steinhaus, Michael E; Verma, Nikhil N; Ahmad, Christopher S; Cole, Brian J; Bach, Bernard R

    2016-08-01

    To assess the quality and variability found across anterior cruciate ligament (ACL) rehabilitation protocols published online by academic orthopaedic programs. Web-based ACL physical therapy protocols from United States academic orthopaedic programs available online were included for review. Main exclusion criteria included concomitant meniscus repair, protocols aimed at pediatric patients, and failure to provide time points for the commencement or recommended completion of any protocol components. A comprehensive, custom scoring rubric was created that was used to assess each protocol for the presence or absence of various rehabilitation components, as well as when those activities were allowed to be initiated in each protocol. Forty-two protocols were included for review from 155 U.S. academic orthopaedic programs. Only 13 protocols (31%) recommended a prehabilitation program. Five protocols (12%) recommended continuous passive motion postoperatively. Eleven protocols (26%) recommended routine partial or non-weight bearing immediately postoperatively. Ten protocols (24%) mentioned utilization of a secondary/functional brace. There was considerable variation in range of desired full-weight-bearing initiation (9 weeks), as well as in the types of strength and proprioception exercises specifically recommended. Only 8 different protocols (19%) recommended return to sport after achieving certain strength and activity criteria. Many ACL rehabilitation protocols recommend treatment modalities not supported by current reports. Moreover, high variability in the composition and time ranges of rehabilitation components may lead to confusion among patients and therapists. Level II. Copyright © 2016 Arthroscopy Association of North America. Published by Elsevier Inc. All rights reserved.

  10. Systematic Literature Review Protocol: Teaching Novices Programming Using Robots

    Science.gov (United States)

    Major, Louis

    2010-01-01

    Teaching computer programming to novices is a difficult task due to the complex nature of the subject, as negative stereotypes are associated with programming and because introductory programming courses often fail to encourage student understanding. This Protocol outlines the plan that is to be followed in order to investigate the effectiveness…

  11. spib is required for primitive myeloid development in Xenopus.

    Science.gov (United States)

    Costa, Ricardo M B; Soto, Ximena; Chen, Yaoyao; Zorn, Aaron M; Amaya, Enrique

    2008-09-15

    Vertebrate blood formation occurs in 2 spatially and temporally distinct waves, so-called primitive and definitive hematopoiesis. Although definitive hematopoiesis has been extensively studied, the development of primitive myeloid blood has received far less attention. In Xenopus, primitive myeloid cells originate in the anterior ventral blood islands, the equivalent of the mammalian yolk sac, and migrate out to colonize the embryo. Using fluorescence time-lapse video microscopy, we recorded the migratory behavior of primitive myeloid cells from their birth. We show that these cells are the first blood cells to differentiate in the embryo and that they are efficiently recruited to embryonic wounds, well before the establishment of a functional vasculature. Furthermore, we isolated spib, an ETS transcription factor, specifically expressed in primitive myeloid precursors. Using spib antisense morpholino knockdown experiments, we show that spib is required for myeloid specification, and, in its absence, primitive myeloid cells retain hemangioblast-like characteristics and fail to migrate. Thus, we conclude that spib sits at the top of the known genetic hierarchy that leads to the specification of primitive myeloid cells in amphibians.

  12. The Flemish Primitives

    NARCIS (Netherlands)

    Vos, De Dirk

    2003-01-01

    Intensely realistic, piercingly beautiful, the art of the Flemish Primitives inspires powerful emotional responses. Painted during the fifteenth century in the southern Netherlands, these influential and enduring works helped establish the foundations of modern European painting.Sumptuously

  13. Enhanced Matrix Power Function for Cryptographic Primitive Construction

    Directory of Open Access Journals (Sweden)

    Eligijus Sakalauskas

    2018-02-01

    Full Text Available A new enhanced matrix power function (MPF is presented for the construction of cryptographic primitives. According to the definition in previously published papers, an MPF is an action of two matrices powering some base matrix on the left and right. The MPF inversion equations, corresponding to the MPF problem, are derived and have some structural similarity with classical multivariate quadratic (MQ problem equations. Unlike the MQ problem, the MPF problem seems to be more complicated, since its equations are not defined over the field, but are represented as left–right action of two matrices defined over the infinite near-semiring on the matrix defined over the certain infinite, additive, noncommuting semigroup. The main results are the following: (1 the proposition of infinite, nonsymmetric, and noncommuting algebraic structures for the construction of the enhanced MPF, satisfying associativity conditions, which are necessary for cryptographic applications; (2 the proof that MPF inversion is polynomially equivalent to the solution of a certain kind of generalized multivariate quadratic (MQ problem which can be reckoned as hard; (3 the estimation of the effectiveness of direct MPF value computation; and (4 the presentation of preliminary security analysis, the determination of the security parameter, and specification of its secure value. These results allow us to make a conjecture that enhanced MPF can be a candidate one-way function (OWF, since the effective (polynomial-time inversion algorithm for it is not yet known. An example of the application of the proposed MPF for the Key Agreement Protocol (KAP is presented. Since the direct MPF value is computed effectively, the proposed MPF is suitable for the realization of cryptographic protocols in devices with restricted computation resources.

  14. Effective convergence to complete orbital bases and to the atomic Hartree--Fock limit through systematic sequences of Gaussian primitives

    International Nuclear Information System (INIS)

    Schmidt, M.W.; Ruedenberg, K.

    1979-01-01

    Optimal starting points for expanding molecular orbitals in terms of atomic orbitals are the self-consistent-field orbitals of the free atoms and accurate information about the latter is essential for the construction of effective AO bases for molecular calculations. For expansions of atomic SCF orbitals in terms of Gaussian primitives, which are of particular interest for applications in polyatomic quantum chemistry, previous information has been limited in accuracy. In the present investigation a simple procedure is given for finding expansions of atomic self-consistent-field orbitals in terms of Gaussian primitives to arbitrarily high accuracy. The method furthermore opens the first avenue so far for approaching complete basis sets through systematic sequences of atomic orbitals

  15. Primitive recursive realizability and basic propositional logic

    NARCIS (Netherlands)

    Plisko, Valery

    2007-01-01

    Two notions of primitive recursive realizability for arithmetic sentences are considered. The first one is strictly primitive recursive realizability introduced by Z. Damnjanovic in 1994. We prove that intuitionistic predicate logic is not sound with this kind of realizability. Namely there

  16. A perturbation-based balance training program for older adults: study protocol for a randomised controlled trial

    Directory of Open Access Journals (Sweden)

    Peters Amy L

    2007-05-01

    Full Text Available Abstract Background Previous research investigating exercise as a means of falls prevention in older adults has shown mixed results. Lack of specificity of the intervention may be an important factor contributing to negative results. Change-in-support (CIS balance reactions, which involve very rapid stepping or grasping movements of the limbs, play a critical role in preventing falls; hence, a training program that improves ability to execute effective CIS reactions could potentially have a profound effect in reducing risk of falling. This paper describes: 1 the development of a perturbation-based balance training program that targets specific previously-reported age-related impairments in CIS reactions, and 2 a study protocol to evaluate the efficacy of this new training program. Methods/Design The training program involves use of unpredictable, multi-directional moving-platform perturbations to evoke stepping and grasping reactions. Perturbation magnitude is gradually increased over the course of the 6-week program, and concurrent cognitive and movement tasks are included during later sessions. The program was developed in accordance with well-established principles of motor learning, such as individualisation, specificity, overload, adaptation-progression and variability. Specific goals are to reduce the frequency of multiple-step responses, reduce the frequency of collisions between the stepping foot and stance leg, and increase the speed of grasping reactions. A randomised control trial will be performed to evaluate the efficacy of the training program. A total of 30 community-dwelling older adults (age 64–80 with a recent history of instability or falling will be assigned to either the perturbation-based training or a control group (flexibility/relaxation training, using a stratified randomisation that controls for gender, age and baseline stepping/grasping performance. CIS reactions will be tested immediately before and after the six

  17. Study protocol for the evaluation of an Infant Simulator based program delivered in schools: a pragmatic cluster randomised controlled trial

    Directory of Open Access Journals (Sweden)

    Hart Michael B

    2010-10-01

    Full Text Available Abstract Background This paper presents the study protocol for a pragmatic randomised controlled trial to evaluate the impact of a school based program developed to prevent teenage pregnancy. The program includes students taking care of an Infant Simulator; despite growing popularity and an increasing global presence of such programs, there is no published evidence of their long-term impact. The aim of this trial is to evaluate the Virtual Infant Parenting (VIP program by investigating pre-conceptual health and risk behaviours, teen pregnancy and the resultant birth outcomes, early child health and maternal health. Methods and Design Fifty-seven schools (86% of 66 eligible secondary schools in Perth, Australia were recruited to the clustered (by school randomised trial, with even randomisation to the intervention and control arms. Between 2003 and 2006, the VIP program was administered to 1,267 participants in the intervention schools, while 1,567 participants in the non-intervention schools received standard curriculum. Participants were all female and aged between 13-15 years upon recruitment. Pre and post-intervention questionnaires measured short-term impact and participants are now being followed through their teenage years via data linkage to hospital medical records, abortion clinics and education records. Participants who have a live birth are interviewed by face-to-face interview. Kaplan-Meier survival analysis and proportional hazards regression will test for differences in pregnancy, birth and abortion rates during the teenage years between the study arms. Discussion This protocol paper provides a detailed overview of the trial design as well as initial results in the form of participant flow. The authors describe the intervention and its delivery within the natural school setting and discuss the practical issues in the conduct of the trial, including recruitment. The trial is pragmatic and will directly inform those who provide

  18. Cometary dust: the diversity of primitive refractory grains.

    Science.gov (United States)

    Wooden, D H; Ishii, H A; Zolensky, M E

    2017-07-13

    Comet dust is primitive and shows significant diversity. Our knowledge of the properties of primitive cometary particles has expanded significantly through microscale investigations of cosmic dust samples (anhydrous interplanetary dust particles (IDPs), chondritic porous (CP) IDPs and UltraCarbonaceous Antarctic micrometeorites, Stardust and Rosetta ), as well as through remote sensing ( Spitzer IR spectroscopy). Comet dust are aggregate particles of materials unequilibrated at submicrometre scales. We discuss the properties and processes experienced by primitive matter in comets. Primitive particles exhibit a diverse range of: structure and typology; distribution of constituents; concentration and form of carbonaceous and refractory organic matter; Mg- and Fe-contents of the silicate minerals; sulfides; existence/abundance of type II chondrule fragments; high-temperature calcium-aluminium inclusions and ameboid-olivine aggregates; and rarely occurring Mg-carbonates and magnetite, whose explanation requires aqueous alteration on parent bodies. The properties of refractory materials imply there were disc processes that resulted in different comets having particular selections of primitive materials. The diversity of primitive particles has implications for the diversity of materials in the protoplanetary disc present at the time and in the region where the comets formed.This article is part of the themed issue 'Cometary science after Rosetta'. © 2017 The Authors.

  19. High resolution array-based comparative genomic hybridisation of medulloblastomas and supra-tentorial primitive neuroectodermal tumours

    Science.gov (United States)

    McCabe, Martin Gerard; Ichimura, Koichi; Liu, Lu; Plant, Karen; Bäcklund, L Magnus; Pearson, Danita M; Collins, Vincent Peter

    2010-01-01

    Medulloblastomas and supratentorial primitive neuroectodermal tumours are aggressive childhood tumours. We report our findings using array comparative genomic hybridisation (CGH) on a whole-genome BAC/PAC/cosmid array with a median clone separation of 0.97Mb to study 34 medulloblastomas and 7 supratentorial primitive neuroectodermal tumours. Array CGH allowed identification and mapping of numerous novel small regions of copy number change to genomic sequence, in addition to the large regions already known from previous studies. Novel amplifications were identified, some encompassing oncogenes, MYCL1, PDGFRA, KIT and MYB, not previously reported to show amplification in these tumours. In addition, one supratentorial primitive neuroectodermal tumour had lost both copies of the tumour suppressor genes CDKN2A & CDKN2B. Ten medulloblastomas had findings suggestive of isochromosome 17q. In contrast to previous reports using conventional CGH, array CGH identified three distinct breakpoints in these cases: Ch 17: 17940393-19251679 (17p11.2, n=6), Ch 17: 20111990-23308272 (17p11.2-17q11.2, n=4) and Ch 17: 38425359-39091575 (17q21.31, n=1). Significant differences were found in the patterns of copy number change between medulloblastomas and supratentorial primitive neuroectodermal tumours, providing further evidence that these tumours are genetically distinct despite their morphological and behavioural similarities. PMID:16783165

  20. Biocoder: A programming language for standardizing and automating biology protocols.

    Science.gov (United States)

    Ananthanarayanan, Vaishnavi; Thies, William

    2010-11-08

    Published descriptions of biology protocols are often ambiguous and incomplete, making them difficult to replicate in other laboratories. However, there is increasing benefit to formalizing the descriptions of protocols, as laboratory automation systems (such as microfluidic chips) are becoming increasingly capable of executing them. Our goal in this paper is to improve both the reproducibility and automation of biology experiments by using a programming language to express the precise series of steps taken. We have developed BioCoder, a C++ library that enables biologists to express the exact steps needed to execute a protocol. In addition to being suitable for automation, BioCoder converts the code into a readable, English-language description for use by biologists. We have implemented over 65 protocols in BioCoder; the most complex of these was successfully executed by a biologist in the laboratory using BioCoder as the only reference. We argue that BioCoder exposes and resolves ambiguities in existing protocols, and could provide the software foundations for future automation platforms. BioCoder is freely available for download at http://research.microsoft.com/en-us/um/india/projects/biocoder/. BioCoder represents the first practical programming system for standardizing and automating biology protocols. Our vision is to change the way that experimental methods are communicated: rather than publishing a written account of the protocols used, researchers will simply publish the code. Our experience suggests that this practice is tractable and offers many benefits. We invite other researchers to leverage BioCoder to improve the precision and completeness of their protocols, and also to adapt and extend BioCoder to new domains.

  1. Effectiveness of a Technology-Based Supportive Educational Parenting Program on Parental Outcomes in Singapore: Protocol for a Randomized Controlled Trial.

    Science.gov (United States)

    Shorey, Shefaly; Ng, Yvonne Peng Mei; Siew, An Ling; Yoong, Joanne; Mörelius, Evalotte

    2018-01-10

    Supportive educational programs during the perinatal period are scarce in Singapore. There is no continuity of care available in terms of support from community care nurses in Singapore. Parents are left on their own most of the time, which results in a stressful transition to parenthood. There is a need for easily accessible technology-based educational programs that can support parents during this crucial perinatal period. The aim of this study was to describe the study protocol of a randomized controlled trial on a technology-based supportive educational parenting program. A randomized controlled two-group pretest and repeated posttest experimental design will be used. The study will recruit 118 parents (59 couples) from the antenatal clinics of a tertiary public hospital in Singapore. Eligible parents will be randomly allocated to receive either the supportive educational parenting program or routine perinatal care from the hospital. Outcome measures include parenting self-efficacy, parental bonding, postnatal depression, social support, parenting satisfaction, and cost evaluation. Data will be collected at the antenatal period, immediate postnatal period, and at 1 month and 3 months post childbirth. Recruitment of the study participants commenced in December 2016 and is still ongoing. Data collection is projected to finish within 12 months, by December 2017. This study will identify a potentially clinically useful, effective, and cost-effective supportive educational parenting program to improve parental self-efficacy and bonding in newborn care, which will then improve parents' social support-seeking behaviors, emotional well-being, and satisfaction with parenting. It is hoped that better supported and satisfied parents will consider having more children, which may in turn influence Singapore's ailing birth rate. International Standard Randomized Controlled Trial Number (ISRCTN): 48536064; https://www.isrctn.com/ISRCTN48536064 (Archived by WebCite at http

  2. A Synoptic of Software Implementation for Shift Registers Based on 16th Degree Primitive Polynomials

    Directory of Open Access Journals (Sweden)

    Mirella Amelia Mioc

    2016-08-01

    Full Text Available Almost all of the major applications in the specific Fields of Communication used a well-known device called Linear Feedback Shift Register. Usually LFSR functions in a Galois Field GF(2n, meaning that all the operations are done with arithmetic modulo n degree Irreducible  and especially  Primitive Polynomials. Storing data in Galois Fields allows effective and manageable manipulation, mainly in computer cryptographic applications. The analysis of functioning for Primitive Polynomials of 16th degree shows that almost all the obtained results are in the same time distribution.

  3. AGUA TIBIA PRIMITIVE AREA, CALIFORNIA.

    Science.gov (United States)

    Irwin, William P.; Thurber, Horace K.

    1984-01-01

    The Agua Tibia Primitive Area in southwestern California is underlain by igneous and metamorphic rocks that are siilar to those widely exposed throughout much of the Peninsular Ranges. To detect the presence of any concealed mineral deposits, samples of stream sediments were collected along the various creeks that head in the mountain. As an additional aid in evaluating the mineral potential, an aeromagnetic survey was made and interpreted. A search for records of past or existing mining claims within the primitive area was made but none was found. Evidence of deposits of metallic or nonmetallic minerals was not seen during the study.

  4. From Realistic to Primitive Models: A Primitive Model of Methanol

    Czech Academy of Sciences Publication Activity Database

    Vlček, Lukáš; Nezbeda, Ivo

    2003-01-01

    Roč. 101, č. 19 (2003), s. 2987-2996 ISSN 0026-8976 R&D Projects: GA AV ČR IAA4072303; GA AV ČR IAA4072309 Grant - others:NATO(XX) PST.CLG 978178/6343 Institutional research plan: CEZ:AV0Z4072921 Keywords : primitive model * methanol Subject RIV: CF - Physical ; Theoretical Chemistry Impact factor: 1.591, year: 2003

  5. CHIP: Commodity based Hazard Identification Protocol for emerging diseases in plants and animals

    NARCIS (Netherlands)

    Bremmer, J.; Swanenburg, M.; Galen, van M.A.; Hoek, Maarten; Rau, M.L.; Hennen, W.H.G.J.; Benninga, J.; Ge, L.; Breukers, M.L.H.

    2012-01-01

    This project comprised the development of a commodity-based hazard identification protocol for biological hazards in plants and animals as a decision support tree programmed in Excel. The content of the decision tree is based on the results of a systematic review of pest and pathogen

  6. Semantic Primitives of Time and Space in Hong Kong Cantonese.

    Science.gov (United States)

    Tong, Malindy; And Others

    1997-01-01

    Semantic primitives for time and space, as proposed in Natural Semantic Metalanguage theory, are examined for lexical equivalents in Hong Kong Cantonese. Temporal primitives are all found to have clear Cantonese exponents that can be combined as predicted with other metalanguage elements, with two exceptions. Spatial primitives all appear to have…

  7. Demarcation of Security in Authentication Protocols

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security analysis of communication protocols is a slippery business; many “secure” protocols later turn out to be insecure. Among many, two complains are more frequent: inadequate definition of security and unstated assumptions in the security model. In our experience, one principal cause...... for such state of affairs is an apparent overlap of security and correctness, which may lead to many sloppy security definitions and security models. Although there is no inherent need to separate security and correctness requirements, practically, such separation is significant. It makes security analysis...... easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...

  8. A mutli-technique search for the most primitive CO chondrites

    Science.gov (United States)

    Alexander, C. M. O'D.; Greenwood, R. C.; Bowden, R.; Gibson, J. M.; Howard, K. T.; Franchi, I. A.

    2018-01-01

    As part of a study to identify the most primitive COs and to look for weakly altered CMs amongst the COs, we have conducted a multi-technique study of 16 Antarctic meteorites that had been classified as primitive COs. For this study, we have determined: (1) the bulk H, C and N abundances and isotopes, (2) bulk O isotopic compositions, (3) bulk modal mineralogies, and (4) for some selected samples the abundances and compositions of their insoluble organic matter (IOM). Two of the 16 meteorites do appear to be CMs - BUC 10943 seems to be a fairly typical CM, while MIL 090073 has probably been heated. Of the COs, DOM 08006 appears to be the most primitive CO identified to date and is quite distinct from the other members of its pairing group. The other COs fall into two groups that are less primitive than DOM 08006 and ALH 77307, the previously most primitive CO. The first group is composed of members of the DOM 08004 pairing group, except DOM 08006. The second group is composed of meteorites belonging to the MIL 03377 and MIL 07099 pairing groups. These two pairing groups should probably be combined. There is a dichotomy in the bulk O isotopes between the primitive (all Antarctic finds) and the more metamorphosed COs (mostly falls). This dichotomy can only partly be explained by the terrestrial weathering experienced by the primitive Antarctic samples. It seems that the more equilibrated samples interacted to a greater extent with 16O-poor material, probably water, than the more primitive meteorites.

  9. Comet Dust: The Diversity of Primitive Particles and Implications

    Science.gov (United States)

    John Bradley; Zolensky, Michael E.

    2016-01-01

    Comet dust is primitive and shows significant diversity. Our knowledge of the properties of primitive particles has expanded significantly through microscale investigations of cosmic dust samples (IDPs and AMMs) and of comet dust samples (Stardust and Rosetta's COSIMA), as well as through remote sensing (spectroscopy and imaging) via Spitzer and via spacecraft encounters with 103P/Hartley 2 and 67P/Churyumov-Gerasimenko. Microscale investigations show that comet dust and cosmic dust are particles of unequilibrated materials, including aggregates of materials unequilibrated at submicron scales. We call unequilibrated materials "primitive" and we deduce they were incorporated into ice-­-rich (H2O-, CO2-, and CO-ice) parent bodies that remained cold, i.e., into comets, because of the lack of aqueous or thermal alteration since particle aggregation; yet some Stardust olivines suggest mild thermal metamorphism. Primitive particles exhibit a diverse range of: structure and typology; size and size distribution of constituents; concentration and form of carbonaceous and organic matter; D-, N-, and O- isotopic enhancements over solar; Mg-, Fe-contentsof thesilicate minerals; the compositions and concentrations of sulfides, and of less abundant mineral species such as chondrules, CAIs and carbonates. The unifomity within a group of samples points to: aerodynamic sorting of particles and/or particle constituents; the inclusion of a limited range of oxygen fugacities; the inclusion or exclusion of chondrules; a selection of organics. The properites of primitive particles imply there were disk processes that resulted in different comets having particular selections of primitive materials. The diversity of primitive particles has implications for the diversity of materials in the protoplanetary disk present at the time and in the region where the comets formed.

  10. Analysis of the high dose rate brachytherapy protocols of quality assurance programs of some local services, based on T G 40, T G 56 and ARCAL 30

    International Nuclear Information System (INIS)

    Guzman Calcina, Carmen S.; Almeida, Adelaide de; Rocha, Jose R. Oliveira; Universidade Estadual de Campinas, SP

    2001-01-01

    High dose rate brachytherapy has been increasingly recognized in most countries, and radiotherapy services using this equipment are encouraged to have a very efficient quality assurance program to ensure protection for patients, workers and other personnel involved. The objective of this paper was to determine the types of tests for high dose rate equipment required by official protocols (TG 40, TG 56 and ARCAL XXX) and to compare them with the types of tests utilized by some radiotherapy services. We concluded that: the protocol TG 56 is more extensive and complete than the other official protocols (T G 40 and ARCAL XXX); the protocols used by the services evaluated on this study were based on the protocol TG 56, and were concordant with the other official protocols. In these protocols annual tests were frequently replaced by tests performed quarterly or twice a year. This study established the types of test used and their frequency of utilization, and permitted the design of an optimized protocol that may help in the implementation of basic and indispensable tests in order to ensure patient adequate treatment and safety to personnel involved, and consequently improve high dose rate brachytherapy quality assurance. (author)

  11. Retinoic acid signaling plays a restrictive role in zebrafish primitive myelopoiesis.

    Directory of Open Access Journals (Sweden)

    Dong Liang

    Full Text Available Retinoic acid (RA is known to regulate definitive myelopoiesis but its role in vertebrate primitive myelopoiesis remains unclear. Here we report that zebrafish primitive myelopoiesis is restricted by RA in a dose dependent manner mainly before 11 hpf (hours post fertilization when anterior hemangioblasts are initiated to form. RA treatment significantly reduces expressions of anterior hemangioblast markers scl, lmo2, gata2 and etsrp in the rostral end of ALPM (anterior lateral plate mesoderm of the embryos. The result indicates that RA restricts primitive myelopoiesis by suppressing formation of anterior hemangioblasts. Analyses of ALPM formation suggest that the defective primitive myelopoiesis resulting from RA treatment before late gastrulation may be secondary to global loss of cells for ALPM fate whereas the developmental defect resulting from RA treatment during 10-11 hpf should be due to ALPM patterning shift. Overexpressions of scl and lmo2 partially rescue the block of primitive myelopoiesis in the embryos treated with 250 nM RA during 10-11 hpf, suggesting RA acts upstream of scl to control primitive myelopoiesis. However, the RA treatment blocks the increased primitive myelopoiesis caused by overexpressing gata4/6 whereas the abolished primitive myelopoiesis in gata4/5/6 depleted embryos is well rescued by 4-diethylamino-benzaldehyde, a retinal dehydrogenase inhibitor, or partially rescued by knocking down aldh1a2, the major retinal dehydrogenase gene that is responsible for RA synthesis during early development. Consistently, overexpressing gata4/6 inhibits aldh1a2 expression whereas depleting gata4/5/6 increases aldh1a2 expression. The results reveal that RA signaling acts downstream of gata4/5/6 to control primitive myelopoiesis. But, 4-diethylamino-benzaldehyde fails to rescue the defective primitive myelopoiesis in either cloche embryos or lycat morphants. Taken together, our results demonstrate that RA signaling restricts

  12. Lightweight UDP Pervasive Protocol in Smart Home Environment Based on Labview

    Science.gov (United States)

    Kurniawan, Wijaya; Hannats Hanafi Ichsan, Mochammad; Rizqika Akbar, Sabriansyah; Arwani, Issa

    2017-04-01

    TCP (Transmission Control Protocol) technology in a reliable environment was not a problem, but not in an environment where the entire Smart Home network connected locally. Currently employing pervasive protocols using TCP technology, when data transmission is sent, it would be slower because they have to perform handshaking process in advance and could not broadcast the data. On smart home environment, it does not need large size and complex data transmission between monitoring site and monitoring center required in Smart home strain monitoring system. UDP (User Datagram Protocol) technology is quick and simple on data transmission process. UDP can broadcast messages because the UDP did not require handshaking and with more efficient memory usage. LabVIEW is a programming language software for processing and visualization of data in the field of data acquisition. This paper proposes to examine Pervasive UDP protocol implementations in smart home environment based on LabVIEW. UDP coded in LabVIEW and experiments were performed on a PC and can work properly.

  13. Calculation Scheme Based on a Weighted Primitive: Application to Image Processing Transforms

    Directory of Open Access Journals (Sweden)

    Gregorio de Miguel Casado

    2007-01-01

    Full Text Available This paper presents a method to improve the calculation of functions which specially demand a great amount of computing resources. The method is based on the choice of a weighted primitive which enables the calculation of function values under the scope of a recursive operation. When tackling the design level, the method shows suitable for developing a processor which achieves a satisfying trade-off between time delay, area costs, and stability. The method is particularly suitable for the mathematical transforms used in signal processing applications. A generic calculation scheme is developed for the discrete fast Fourier transform (DFT and then applied to other integral transforms such as the discrete Hartley transform (DHT, the discrete cosine transform (DCT, and the discrete sine transform (DST. Some comparisons with other well-known proposals are also provided.

  14. A Model of Computation for Bit-Level Concurrent Computing and Programming: APEC

    Science.gov (United States)

    Ajiro, Takashi; Tsuchida, Kensei

    A concurrent model of computation and a language based on the model for bit-level operation are useful for developing asynchronous and concurrent programs compositionally, which frequently use bit-level operations. Some examples are programs for video games, hardware emulation (including virtual machines), and signal processing. However, few models and languages are optimized and oriented to bit-level concurrent computation. We previously developed a visual programming language called A-BITS for bit-level concurrent programming. The language is based on a dataflow-like model that computes using processes that provide serial bit-level operations and FIFO buffers connected to them. It can express bit-level computation naturally and develop compositionally. We then devised a concurrent computation model called APEC (Asynchronous Program Elements Connection) for bit-level concurrent computation. This model enables precise and formal expression of the process of computation, and a notion of primitive program elements for controlling and operating can be expressed synthetically. Specifically, the model is based on a notion of uniform primitive processes, called primitives, that have three terminals and four ordered rules at most, as well as on bidirectional communication using vehicles called carriers. A new notion is that a carrier moving between two terminals can briefly express some kinds of computation such as synchronization and bidirectional communication. The model's properties make it most applicable to bit-level computation compositionally, since the uniform computation elements are enough to develop components that have practical functionality. Through future application of the model, our research may enable further research on a base model of fine-grain parallel computer architecture, since the model is suitable for expressing massive concurrency by a network of primitives.

  15. Comet Dust: The Diversity of "Primitive" Particles and Implications

    Science.gov (United States)

    Wooden, Diane H.; Ishii, Hope A.; Bradley, John P.; Zolensky, Michael E.

    2016-01-01

    Comet dust is primitive and shows significant diversity. Our knowledge of the properties of primitive particles has expanded significantly through microscale investigations of cosmic dust samples ( IDP's(Interplanetary Dust Particles) and AMM's (Antarctic Micrometeorites)) and of comet dust samples (Stardust and Rosetta's COSIMA), as well as through remote sensing (spectroscopy and imaging) via Spitzer and via spacecraft encounters with 103P/Hartley 2 and 67P/Churyumov-Gerasimenko. Microscale investigations show that comet dust and cosmic dust are particles of unequilibrated materials, including aggregates of materials unequilibrated at submicron scales. We call unequilibrated materials "primitive" and we deduce they were incorporated into ice-rich (H2O-, CO2-, and CO-ice) parent bodies that remained cold, i.e., into comets, because of the lack of aqueous or thermal alteration since particle aggregation; yet some Stardust olivines suggest mild thermal metamorphism. Primitive particles exhibit a diverse range of: structure and typology; size and size distribution of constituents; concentration and form of carbonaceous and organic matter; D-, N-, and O- isotopic enhancements over solar; Mg-, Fe-contents of the silicate minerals; the compositions and concentrations of sulfides, and of less abundant mineral species such as chondrules, CAIs and carbonates. The uniformity within a group of samples points to: aerodynamic sorting of particles and/or particle constituents; the inclusion of a limited range of oxygen fugacities; the inclusion or exclusion of chondrules; a selection of organics. The properties of primitive particles imply there were disk processes that resulted in different comets having particular selections of primitive materials. The diversity of primitive particles has implications for the diversity of materials in the protoplanetary disk present at the time and in the region where the comets formed.

  16. SPP: A data base processor data communications protocol

    Science.gov (United States)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  17. A flexible framework for secure and efficient program obfuscation.

    Energy Technology Data Exchange (ETDEWEB)

    Solis, John Hector

    2013-03-01

    In this paper, we present a modular framework for constructing a secure and efficient program obfuscation scheme. Our approach, inspired by the obfuscation with respect to oracle machines model of [4], retains an interactive online protocol with an oracle, but relaxes the original computational and storage restrictions. We argue this is reasonable given the computational resources of modern personal devices. Furthermore, we relax the information-theoretic security requirement for computational security to utilize established cryptographic primitives. With this additional flexibility we are free to explore different cryptographic buildingblocks. Our approach combines authenticated encryption with private information retrieval to construct a secure program obfuscation framework. We give a formal specification of our framework, based on desired functionality and security properties, and provide an example instantiation. In particular, we implement AES in Galois/Counter Mode for authenticated encryption and the Gentry-Ramzan [13]constant communication-rate private information retrieval scheme. We present our implementation results and show that non-trivial sized programs can be realized, but scalability is quickly limited by computational overhead. Finally, we include a discussion on security considerations when instantiating specific modules.

  18. Development of pig welfare assessment protocol integrating animal-, environment-, and management-based measures.

    Science.gov (United States)

    Renggaman, Anriansyah; Choi, Hong L; Sudiarto, Sartika Ia; Alasaarela, Laura; Nam, Ok S

    2015-01-01

    Due to increased interest in animal welfare, there is now a need for a comprehensive assessment protocol to be used in intensive pig farming systems. There are two current welfare assessment protocols for pigs: Welfare Quality® Assessment Protocols (applicable in the Europe Union), that mostly focuses on animal-based measures, and the Swine Welfare Assurance Program (applicable in the United States), that mostly focuses on management- and environment-based measures. In certain cases, however, animal-based measures might not be adequate for properly assessing pig welfare status. Similarly, welfare assessment that relies only on environment- and management-based measures might not represent the actual welfare status of pigs. Therefore, the objective of this paper was to develop a new welfare protocol by integrating animal-, environment-, and management-based measures. The background for selection of certain welfare criteria and modification of the scoring systems from existing welfare assessment protocols are described. The developed pig welfare assessment protocol consists of 17 criteria that are related to four main principles of welfare (good feeding, good housing, good health, and appropriate behavior). Good feeding, good housing, and good health were assessed using a 3-point scale: 0 (good welfare), 1 (moderate welfare), and 2 (poor welfare). In certain cases, only a 2-point scale was used: 0 (certain condition is present) or 2 (certain condition is absent). Appropriate behavior was assessed by scan sampling of positive and negative social behaviors based on qualitative behavior assessment and human-animal relationship tests. Modification of the body condition score into a 3-point scale revealed pigs with a moderate body condition (score 1). Moreover, additional criteria such as feed quality confirmed that farms had moderate (score 1) or poor feed quality (score 2), especially those farms located in a high relative humidity region. The developed protocol can be

  19. A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing

    Directory of Open Access Journals (Sweden)

    Jue-Sam Chou

    2012-01-01

    Full Text Available Oblivious transfer (OT protocols mainly contain three categories: 1-out-of-2 OT, 1-out-of-n OT, and k-out-of-n OT. In most cases, they are treated as cryptographic primitives and are usually executed without consideration of possible attacks that might frequently occur in an open network, such as an impersonation, replaying, or man-in-the-middle attack. Therefore, when used in certain applications, such as mental poker games and fair contract signings, some extra mechanisms must be combined to ensure the security of the protocol. However, after a combination, we found that very few of the resulting schemes are efficient enough in terms of communicational cost, which is a significant concern for generic commercial transactions. Therefore, we propose a novel k-out-of-n oblivious transfer protocol based on bilinear pairing, which not only satisfies the requirements of a k-out-of-n OT protocol, but also provides mutual authentication to resist malicious attacks. Meanwhile, it is efficient in terms of communication cost.

  20. Two-Step System Identification and Primitive-Based Motion Planning for Control of Small Unmanned Aerial Vehicles

    Science.gov (United States)

    Grymin, David J.

    This dissertation addresses motion planning, modeling, and feedback control for autonomous vehicle systems. A hierarchical approach for motion planning and control of nonlinear systems operating in obstacle environments is presented. To reduce computation time during the motion planning process, dynamically feasible trajectories are generated in real-time through concatenation of pre-specified motion primitives. The motion planning task is posed as a search over a directed graph, and the applicability of informed graph search techniques is investigated. Specifically, a locally greedy algorithm with effective backtracking ability is developed and compared to weighted A* search. The greedy algorithm shows an advantage with respect to solution cost and computation time when larger motion primitive libraries that do not operate on a regular state lattice are utilized. Linearization of the nonlinear system equations about the motion primitive library results in a hybrid linear time-varying model, and an optimal control algorithm using the l 2-induced norm as the performance measure is applied to ensure that the system tracks the desired trajectory. The ability of the resulting controller to closely track the trajectory obtained from the motion planner, despite various disturbances and uncertainties, is demonstrated through simulation. Additionally, an approach for obtaining dynamically feasible reference trajectories and feedback controllers for a small unmanned aerial vehicle (UAV) based on an aerodynamic model derived from flight tests is presented. The modeling approach utilizes the two step method (TSM) with stepwise multiple regression to determine relevant explanatory terms for the aerodynamic models. Dynamically feasible trajectories are then obtained through the solution of an optimal control problem using pseudospectral optimal control software. Discretetime feedback controllers are then obtained to regulate the vehicle along the desired reference trajectory

  1. Effectiveness of an Internet-based learning program on venous leg ulcer nursing care in home health care--study protocol.

    Science.gov (United States)

    Ylönen, Minna; Viljamaa, Jaakko; Isoaho, Hannu; Junttila, Kristiina; Leino-Kilpi, Helena; Suhonen, Riitta

    2015-10-01

    To describe the study protocol for a study of the effectiveness of an internet-based learning program on venous leg ulcer nursing care (eVLU) in home health care. The prevalence of venous leg ulcers is increasing as population age. The majority of these patients are treated in a municipal home healthcare setting. However, studies show nurses' lack of knowledge of ulcer nursing care. Quasi-experimental study with pre- and postmeasurements and non-equivalent intervention and comparison groups. During the study, nurses taking care of patients with a chronic leg ulcer in home health care in one Finnish municipality will use the eVLU. Nurses working in home health care in another Finnish municipality will not use it providing standard care. Nurses will complete three questionnaires during the study and they will also be observed three times at patients' homes. Nurses' perceived and theoretical knowledge is the primary outcome of the study. Funding for this study was received from the Finnish Foundation for Nursing Education in 2014. Data from this study will provide information about the effectiveness of an internet-based educational program. After completing the program nurses will be accustomed to using internet-based resources that can aid them in the nursing care of patients with a VLU. Nurses will also have better knowledge of VLU nursing care. This study is registered with the International Clinical Trials Registry, identifier NCT02224300. © 2015 John Wiley & Sons Ltd.

  2. Developing Community-Based Rehabilitation Programs for Musculoskeletal Diseases in Low-Income Areas of Mexico: The Community-Based Rehabilitation for Low-Income Communities Living With Rheumatic Diseases (CONCORD) Protocol

    Science.gov (United States)

    2014-01-01

    Background The negative impact of musculoskeletal diseases on the physical function and quality of life of people living in developing countries is considerable. This disabling effect is even more marked in low-socioeconomic communities within developing countries. In Mexico, there is a need to create community-based rehabilitation programs for people living with musculoskeletal diseases in low-socioeconomic areas. These programs should be directed to prevent and decrease disability, accommodating the specific local culture of communities. Objective The objective of this paper is to describe a research protocol designed to develop, implement, and evaluate culturally sensitive community-based rehabilitation programs aiming to decrease disability of people living with musculoskeletal diseases in two low-income Mexican communities. Methods A community-based participatory research approach is proposed, including multi and transdisciplinary efforts among the community, medical anthropology, and the health sciences. The project is structured in 4 main stages: (1) situation analysis, (2) program development, (3) program implementation, and (4) program evaluation. Each stage includes the use of quantitative and qualitative methods (mixed method program). Results So far, we obtained resources from a Mexican federal agency and completed stage one of the project at Chankom, Yucatán. We are currently receiving funding from an international agency to complete stage two at this same location. We expect that the project at Chankom will be concluded by December of 2017. On the other hand, we just started the execution of stage one at Nuevo León with funding from a Mexican federal agency. We expect to conclude the project at this site by September of 2018. Conclusions Using a community-based participatory research approach and a mixed method program could result in the creation of culturally sensitive community-based rehabilitation programs that promote community development and

  3. Biometrics based authentication scheme for session initiation protocol.

    Science.gov (United States)

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  4. Gossip-Based Broadcast

    Science.gov (United States)

    Leitão, João; Pereira, José; Rodrigues, Luís

    Gossip, or epidemic, protocols have emerged as a powerful strategy to implement highly scalable and resilient reliable broadcast primitives on large scale peer-to-peer networks. Epidemic protocols are scalable because they distribute the load among all nodes in the system and resilient because they have an intrinsic level of redundancy that masks node and network failures. This chapter provides an introduction to gossip-based broadcast on large-scale unstructured peer-to-peer overlay networks: it surveys the main results in the field, discusses techniques to build and maintain the overlays that support efficient dissemination strategies, and provides an in-depth discussion and experimental evaluation of two concrete protocols, named HyParView and Plumtree.

  5. On the Reduced Testing of a Primitive Element in ${\\\\mathbb Z}_n^\\\\times$

    OpenAIRE

    Suzuki, Hideo; スズキ, ヒデオ; Hideo, Suzuki

    2015-01-01

    The primitive roots in ${\\mathbb Z}_n^\\times$ are defined and exist iff $n = 2, 4, p^{\\alpha}, 2p^{\\alpha}$. Knuth gave the definition of the primitive roots in ${\\mathbb Z}_{p^\\alpha}^\\times$, and showed the necessary and sufficient condition for testing a primitive root in ${\\mathbb Z}_{p^\\alpha}^\\times$. In this paper we define the primitive elements in ${\\mathbb Z}_n^\\times$, which is a generalization of primitive roots, as elements that take the maximum multiplicative order.And we give t...

  6. A Simulation System Based on the Actor Paradigm

    Science.gov (United States)

    1988-02-01

    of the protocol. Shared memory communication requires the programmer to wait and signal semaphores explicitly to synchronize the communicating parties...wide range of possibilities within the same basic protocol. - The simplicity of the primitive operation set affords those creating new operations...more flexibility (Ada has a large and complicated primitive set). -3- II I I I B A I -I I I I I . 0 1 2 3 4 5 Time 0: Both processes A and B are

  7. A Novel Non-Invasive Selection Criterion for the Preservation of Primitive Dutch Konik Horses.

    Science.gov (United States)

    May-Davis, Sharon; Brown, Wendy Y; Shorter, Kathleen; Vermeulen, Zefanja; Butler, Raquel; Koekkoek, Marianne

    2018-02-01

    The Dutch Konik is valued from a genetic conservation perspective and also for its role in preservation of natural landscapes. The primary management objective for the captive breeding of this primitive horse is to maintain its genetic purity, whilst also maintaining the nature reserves on which they graze. Breeding selection has traditionally been based on phenotypic characteristics consistent with the breed description, and the selection of animals for removal from the breeding program is problematic at times due to high uniformity within the breed, particularly in height at the wither, colour (mouse to grey dun) and presence of primitive markings. With the objective of identifying an additional non-invasive selection criterion with potential uniqueness to the Dutch Konik, this study investigates the anatomic parameters of the distal equine limb, with a specific focus on the relative lengths of the individual splint bones. Post-mortem dissections performed on distal limbs of Dutch Konik ( n = 47) and modern domesticated horses ( n = 120) revealed significant differences in relation to the length and symmetry of the 2nd and 4th Metacarpals and Metatarsals. Distal limb characteristics with apparent uniqueness to the Dutch Konik are described which could be an important tool in the selection and preservation of the breed.

  8. MR imaging of persistent primitive trigeminal artery

    International Nuclear Information System (INIS)

    Ashikaga, Ryuichiro; Araki, Yutaka; Ono, Yukihiko; Ishida, Osamu; Mabuchi, Nobuhisa.

    1997-01-01

    The persistent trigeminal artery is the most common anomaly of the primitive carotid-vertebrobasilar anastomoses. We reviewed MR images and MR angiographies of 11 patients with primitive trigeminal artery. In 8 of the 11 cases, PTA were identified with conventional long TR spin-echo images. In 8 of 11 cases, a hypoplastic basilar trunk associated with PTA was seen on both MR images and MR angiographies. In 7 of 11 cases, a hypoplasia or agenesis of the ipsilateral posterior communicating artery was seen on MR angiographies. (author)

  9. Live imaging of primitive endoderm precursors in the mouse blastocyst.

    Science.gov (United States)

    Grabarek, Joanna B; Plusa, Berenika

    2012-01-01

    The separation of two populations of cells-primitive endoderm and epiblast-within the inner cell mass (ICM) of the mammalian blastocyst is a crucial event during preimplantation development. However, many aspects of this process are still not very well understood. Recently, the identification of platelet derived growth factor receptor alpha (Pdgfrα) as an early-expressed protein that is also a marker of the later primitive endoderm lineage, together with the availability of the Pdgfra(H2B-GFP) mouse strain (Hamilton et al. Mol Cell Biol 23:4013-4025, 2003), has made in vivo imaging of primitive endoderm formation possible. In this chapter we present two different approaches that can be used to follow the behavior of primitive endoderm cells within the mouse blastocyst in real time.

  10. Quantum multi-signature protocol based on teleportation

    International Nuclear Information System (INIS)

    Wen Xiao-jun; Liu Yun; Sun Yu

    2007-01-01

    In this paper, a protocol which can be used in multi-user quantum signature is proposed. The scheme of signature and verification is based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states and the controlled quantum teleportation. Different from the digital signatures, which are based on computational complexity, the proposed protocol has perfect security in the noiseless quantum channels. Compared to previous quantum signature schemes, this protocol can verify the signature independent of an arbitrator as well as realize multi-user signature together. (orig.)

  11. Indoor objects and outdoor urban scenes recognition by 3D visual primitives

    DEFF Research Database (Denmark)

    Fu, Junsheng; Kämäräinen, Joni-Kristian; Buch, Anders Glent

    2014-01-01

    , we propose an alternative appearance-driven approach which rst extracts 2D primitives justi ed by Marr's primal sketch, which are \\accumulated" over multiple views and the most stable ones are \\promoted" to 3D visual primitives. The 3D promoted primitives represent both structure and appearance...

  12. Towards deductive verification of MPI programs against session types

    Directory of Open Access Journals (Sweden)

    Eduardo R. B. Marques

    2013-12-01

    Full Text Available The Message Passing Interface (MPI is the de facto standard message-passing infrastructure for developing parallel applications. Two decades after the first version of the library specification, MPI-based applications are nowadays routinely deployed on super and cluster computers. These applications, written in C or Fortran, exhibit intricate message passing behaviours, making it hard to statically verify important properties such as the absence of deadlocks. Our work builds on session types, a theory for describing protocols that provides for correct-by-construction guarantees in this regard. We annotate MPI primitives and C code with session type contracts, written in the language of a software verifier for C. Annotated code is then checked for correctness with the software verifier. We present preliminary results and discuss the challenges that lie ahead for verifying realistic MPI program compliance against session types.

  13. New hybrid voxelized/analytical primitive in Monte Carlo simulations for medical applications

    International Nuclear Information System (INIS)

    Bert, Julien; Lemaréchal, Yannick; Visvikis, Dimitris

    2016-01-01

    Monte Carlo simulations (MCS) applied in particle physics play a key role in medical imaging and particle therapy. In such simulations, particles are transported through voxelized phantoms derived from predominantly patient CT images. However, such voxelized object representation limits the incorporation of fine elements, such as artificial implants from CAD modeling or anatomical and functional details extracted from other imaging modalities. In this work we propose a new hYbrid Voxelized/ANalytical primitive (YVAN) that combines both voxelized and analytical object descriptions within the same MCS, without the need to simultaneously run two parallel simulations, which is the current gold standard methodology. Given that YVAN is simply a new primitive object, it does not require any modifications on the underlying MC navigation code. The new proposed primitive was assessed through a first simple MCS. Results from the YVAN primitive were compared against an MCS using a pure analytical geometry and the layer mass geometry concept. A perfect agreement was found between these simulations, leading to the conclusion that the new hybrid primitive is able to accurately and efficiently handle phantoms defined by a mixture of voxelized and analytical objects. In addition, two application-based evaluation studies in coronary angiography and intra-operative radiotherapy showed that the use of YVAN was 6.5% and 12.2% faster than the layered mass geometry method, respectively, without any associated loss of accuracy. However, the simplification advantages and differences in computational time improvements obtained with YVAN depend on the relative proportion of the analytical and voxelized structures used in the simulation as well as the size and number of triangles used in the description of the analytical object meshes. (paper)

  14. New hybrid voxelized/analytical primitive in Monte Carlo simulations for medical applications.

    Science.gov (United States)

    Bert, Julien; Lemaréchal, Yannick; Visvikis, Dimitris

    2016-05-07

    Monte Carlo simulations (MCS) applied in particle physics play a key role in medical imaging and particle therapy. In such simulations, particles are transported through voxelized phantoms derived from predominantly patient CT images. However, such voxelized object representation limits the incorporation of fine elements, such as artificial implants from CAD modeling or anatomical and functional details extracted from other imaging modalities. In this work we propose a new hYbrid Voxelized/ANalytical primitive (YVAN) that combines both voxelized and analytical object descriptions within the same MCS, without the need to simultaneously run two parallel simulations, which is the current gold standard methodology. Given that YVAN is simply a new primitive object, it does not require any modifications on the underlying MC navigation code. The new proposed primitive was assessed through a first simple MCS. Results from the YVAN primitive were compared against an MCS using a pure analytical geometry and the layer mass geometry concept. A perfect agreement was found between these simulations, leading to the conclusion that the new hybrid primitive is able to accurately and efficiently handle phantoms defined by a mixture of voxelized and analytical objects. In addition, two application-based evaluation studies in coronary angiography and intra-operative radiotherapy showed that the use of YVAN was 6.5% and 12.2% faster than the layered mass geometry method, respectively, without any associated loss of accuracy. However, the simplification advantages and differences in computational time improvements obtained with YVAN depend on the relative proportion of the analytical and voxelized structures used in the simulation as well as the size and number of triangles used in the description of the analytical object meshes.

  15. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    Science.gov (United States)

    Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao

    2015-11-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).

  16. PRIMITIVE MATRICES AND GENERATORS OF PSEUDO RANDOM SEQUENCES OF GALOIS

    Directory of Open Access Journals (Sweden)

    A. Beletsky

    2014-04-01

    Full Text Available In theory and practice of information cryptographic protection one of the key problems is the forming a binary pseudo-random sequences (PRS with a maximum length with acceptable statistical characteristics. PRS generators are usually implemented by linear shift register (LSR of maximum period with linear feedback [1]. In this paper we extend the concept of LSR, assuming that each of its rank (memory cell can be in one of the following condition. Let’s call such registers “generalized linear shift register.” The research goal is to develop algorithms for constructing Galois and Fibonacci generalized matrix of n-order over the field , which uniquely determined both the structure of corresponding generalized of n-order LSR maximal period, and formed on their basis Galois PRS generators of maximum length. Thus the article presents the questions of formation the primitive generalized Fibonacci and Galois arbitrary order matrix over the prime field . The synthesis of matrices is based on the use of irreducible polynomials of degree and primitive elements of the extended field generated by polynomial. The constructing methods of Galois and Fibonacci conjugated primitive matrices are suggested. The using possibilities of such matrices in solving the problem of constructing generalized generators of Galois pseudo-random sequences are discussed.

  17. Universally composable oblivious transfer based on a variant of lPN

    DEFF Research Database (Denmark)

    David, Bernardo Machado; Dowsley, Rafael; Nascimento, Anderson C A

    2014-01-01

    Oblivious transfer (OT) is a fundamental two-party cryptographic primitive that implies secure multiparty computation. In this paper, we introduce the first OT based on the Learning Parity with Noise (LPN) problem. More specifically, we use the LPN variant that was introduced by Alekhnovich (FOCS...... 2003). We prove that our protocol is secure against active static adversaries in the Universal Composability framework in the common reference string model. Our constructions are based solely on a LPN style assumption and thus represents a clear next step from current code-based OT protocols, which...

  18. Oil spill sorbents: Testing protocol and certification listing program

    International Nuclear Information System (INIS)

    Cooper, D.; Gausemel, I.

    1993-01-01

    Environment Canada's Emergencies Engineering Division is spearheading a program in conjunction with the Canadian General Standards Board that would see the development of a certification and listing program in addition to a national standard for the testing of sorbent materials. Funding for this program is provided by Environment Canada (EC), Canadian Coast Guard (CCG), Marine Spill Response Corporation (MSRC), US Coast Guard (USCG), and US Minerals Management Service (MMS). The test methods are based upon those defined by the American Society for Testing and Materials and previous test methods developed by Environment Canada for our series of reports entitled Selection Criteria and Laboratory Evaluation of Oil Spill Sorbents. This series, which was started in 1975, encompasses a number of commercially available oil spill sorbents tested with different petroleum products and hydrocarbon solvents. The testing program will categorize the sorbents according to their operating characteristics. The main categories are oil spills on water, oil spills on land, and industrial use. The characteristics to be evaluated with the new test protocols include initial and maximum sorption capacities, water pickup, buoyancy, reuse potential, retention profile, disintegration (material integrity), and ease of application and retrieval. In the near future are plans to incorporate changes to the test that would involve increasing the list of test liquids to encompass spills in an industrial setting, in addition to testing sorbent booms and addressing the disposal problem

  19. Nucleation and condensation in the primitive solar nebula

    International Nuclear Information System (INIS)

    Cameron, A.G.W.; Fegley, M.B.

    1982-01-01

    It is pointed out that the primitive solar nebula may be modeled using the frictionally induced transport theory of Lynden-Bell and Pringle (1974) if the principal frictional mechanism within the nebula is turbulent viscosity. The present investigation is concerned with the construction of a model of a section of the primitive solar nebula as a basis for the study of nucleation and condensation processes within this section. The construction involves a relatively simple application of the Lynden-Bell and Pringle theory subject to steady mass flow conditions. The calculations which are conducted in connection with the investigation indicate that by the time the gas in the primitive solar nebula has become sufficiently supercooled to nucleate condensation centers, several different compounds, including the magnesium silicates forsterite and enstatite (MgSiO 3 ), will probably be able to condense on the growing condensation center

  20. The logical primitives of thought: Empirical foundations for compositional cognitive models.

    Science.gov (United States)

    Piantadosi, Steven T; Tenenbaum, Joshua B; Goodman, Noah D

    2016-07-01

    The notion of a compositional language of thought (LOT) has been central in computational accounts of cognition from earliest attempts (Boole, 1854; Fodor, 1975) to the present day (Feldman, 2000; Penn, Holyoak, & Povinelli, 2008; Fodor, 2008; Kemp, 2012; Goodman, Tenenbaum, & Gerstenberg, 2015). Recent modeling work shows how statistical inferences over compositionally structured hypothesis spaces might explain learning and development across a variety of domains. However, the primitive components of such representations are typically assumed a priori by modelers and theoreticians rather than determined empirically. We show how different sets of LOT primitives, embedded in a psychologically realistic approximate Bayesian inference framework, systematically predict distinct learning curves in rule-based concept learning experiments. We use this feature of LOT models to design a set of large-scale concept learning experiments that can determine the most likely primitives for psychological concepts involving Boolean connectives and quantification. Subjects' inferences are most consistent with a rich (nonminimal) set of Boolean operations, including first-order, but not second-order, quantification. Our results more generally show how specific LOT theories can be distinguished empirically. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  1. Accounting for primitive terms in mathematics

    Directory of Open Access Journals (Sweden)

    D.F.M. Strauss

    2005-07-01

    Full Text Available The philosophical problem of unity and diversity entails a challenge to the rationalist aim to define everything. Definitions of this kind surface in various academic disciplines in formulations like uniqueness, irreducibility, and what has acquired the designation “primitive terms”. Not even the most “exact” disciplines, such as mathematics, can avoid the implications entailed in giving an account of such primitive terms. A mere look at the historical development of mathematics highlights the fact that alternative perspectives prevailed – from the arithmeticism of Pythagoreanism, the eventual geometrisation of mathematics after the discovery of incommensurability up to the revival of arithmeticism in the mathematics of Cauchy, Weierstrass, Dedekind and Cantor (with the later orientation of Frege, who completed the circle by returning to the view that mathematics essentially is geometry. An assessment of logicism and axiomatic formalism is followed by looking at the primitive meaning of wholeness (and the whole-parts relation. With reference to the views of Hilbert, Weyl and Bernays the article concludes by suggesting that in opposition to arithmeticism and geometricism an alternative option ought to be pursued – one in which both the uniqueness and mutual coherence between the aspects of number and space are acknowledged.

  2. Implementation and Evaluation of a Smartphone-Based Telemonitoring Program for Patients With Heart Failure: Mixed-Methods Study Protocol.

    Science.gov (United States)

    Ware, Patrick; Ross, Heather J; Cafazzo, Joseph A; Laporte, Audrey; Seto, Emily

    2018-05-03

    August 2016 and patient enrollment is ongoing. The methods described provide an example for conducting comprehensive evaluations of telemonitoring programs. The combination of impact, implementation, and cost evaluations will inform the quality improvement of the existing program and will yield insights into the sustainability of smartphone-based telemonitoring programs for patients with heart failure within a specialty care setting. ©Patrick Ware, Heather J Ross, Joseph A Cafazzo, Audrey Laporte, Emily Seto. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 03.05.2018.

  3. Raft cultivation area extraction from high resolution remote sensing imagery by fusing multi-scale region-line primitive association features

    Science.gov (United States)

    Wang, Min; Cui, Qi; Wang, Jie; Ming, Dongping; Lv, Guonian

    2017-01-01

    In this paper, we first propose several novel concepts for object-based image analysis, which include line-based shape regularity, line density, and scale-based best feature value (SBV), based on the region-line primitive association framework (RLPAF). We then propose a raft cultivation area (RCA) extraction method for high spatial resolution (HSR) remote sensing imagery based on multi-scale feature fusion and spatial rule induction. The proposed method includes the following steps: (1) Multi-scale region primitives (segments) are obtained by image segmentation method HBC-SEG, and line primitives (straight lines) are obtained by phase-based line detection method. (2) Association relationships between regions and lines are built based on RLPAF, and then multi-scale RLPAF features are extracted and SBVs are selected. (3) Several spatial rules are designed to extract RCAs within sea waters after land and water separation. Experiments show that the proposed method can successfully extract different-shaped RCAs from HR images with good performance.

  4. A secure key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Luan Da-Peng

    2013-01-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol

  5. An evaluation of two large scale demand side financing programs for maternal health in India: the MATIND study protocol

    Directory of Open Access Journals (Sweden)

    Sidney Kristi

    2012-08-01

    Full Text Available Abstract Background High maternal mortality in India is a serious public health challenge. Demand side financing interventions have emerged as a strategy to promote access to emergency obstetric care. Two such state run programs, Janani Suraksha Yojana (JSYand Chiranjeevi Yojana (CY, were designed and implemented to reduce financial access barriers that preclude women from obtaining emergency obstetric care. JSY, a conditional cash transfer, awards money directly to a woman who delivers in a public health facility. This will be studied in Madhya Pradesh province. CY, a voucher based program, empanels private obstetricians in Gujarat province, who are reimbursed by the government to perform deliveries of socioeconomically disadvantaged women. The programs have been in operation for the last seven years. Methods/designs The study outlined in this protocol will assess and compare the influence of the two programs on various aspects of maternal health care including trends in program uptake, institutional delivery rates, maternal and neonatal outcomes, quality of care, experiences of service providers and users, and cost effectiveness. The study will collect primary data using a combination of qualitative and quantitative methods, including facility level questionnaires, observations, a population based survey, in-depth interviews, and focus group discussions. Primary data will be collected in three districts of each province. The research will take place at three levels: the state health departments, obstetric facilities in the districts and among recently delivered mothers in the community. Discussion The protocol is a comprehensive assessment of the performance and impact of the programs and an economic analysis. It will fill existing evidence gaps in the scientific literature including access and quality to services, utilization, coverage and impact. The implementation of the protocol will also generate evidence to facilitate decision making

  6. An evaluation of two large scale demand side financing programs for maternal health in India: the MATIND study protocol.

    Science.gov (United States)

    Sidney, Kristi; de Costa, Ayesha; Diwan, Vishal; Mavalankar, Dileep V; Smith, Helen

    2012-08-27

    High maternal mortality in India is a serious public health challenge. Demand side financing interventions have emerged as a strategy to promote access to emergency obstetric care. Two such state run programs, Janani Suraksha Yojana (JSY)and Chiranjeevi Yojana (CY), were designed and implemented to reduce financial access barriers that preclude women from obtaining emergency obstetric care. JSY, a conditional cash transfer, awards money directly to a woman who delivers in a public health facility. This will be studied in Madhya Pradesh province. CY, a voucher based program, empanels private obstetricians in Gujarat province, who are reimbursed by the government to perform deliveries of socioeconomically disadvantaged women. The programs have been in operation for the last seven years. The study outlined in this protocol will assess and compare the influence of the two programs on various aspects of maternal health care including trends in program uptake, institutional delivery rates, maternal and neonatal outcomes, quality of care, experiences of service providers and users, and cost effectiveness. The study will collect primary data using a combination of qualitative and quantitative methods, including facility level questionnaires, observations, a population based survey, in-depth interviews, and focus group discussions. Primary data will be collected in three districts of each province. The research will take place at three levels: the state health departments, obstetric facilities in the districts and among recently delivered mothers in the community. The protocol is a comprehensive assessment of the performance and impact of the programs and an economic analysis. It will fill existing evidence gaps in the scientific literature including access and quality to services, utilization, coverage and impact. The implementation of the protocol will also generate evidence to facilitate decision making among policy makers and program managers who currently work with or

  7. Achieving Performance Speed-up in FPGA Based Bit-Parallel Multipliers using Embedded Primitive and Macro support

    Directory of Open Access Journals (Sweden)

    Burhan Khurshid

    2015-05-01

    Full Text Available Modern Field Programmable Gate Arrays (FPGA are fast moving into the consumer market and their domain has expanded from prototype designing to low and medium volume productions. FPGAs are proving to be an attractive replacement for Application Specific Integrated Circuits (ASIC primarily because of the low Non-recurring Engineering (NRE costs associated with FPGA platforms. This has prompted FPGA vendors to improve the capacity and flexibility of the underlying primitive fabric and include specialized macro support and intellectual property (IP cores in their offerings. However, most of the work related to FPGA implementations does not take full advantage of these offerings. This is primarily because designers rely mainly on the technology-independent optimization to enhance the performance of the system and completely neglect the speed-up that is achievable using these embedded primitives and macro support. In this paper, we consider the technology-dependent optimization of fixed-point bit-parallel multipliers by carrying out their implementations using embedded primitives and macro support that are inherent in modern day FPGAs. Our implementation targets three different FPGA families viz. Spartan-6, Virtex-4 and Virtex-5. The implementation results indicate that a considerable speed up in performance is achievable using these embedded FPGA resources.

  8. Electronic Voting Protocol Using Identity-Based Cryptography

    Directory of Open Access Journals (Sweden)

    Gina Gallegos-Garcia

    2015-01-01

    Full Text Available Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC, which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE. With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI. Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  9. Electronic Voting Protocol Using Identity-Based Cryptography.

    Science.gov (United States)

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  10. Cryptographic protocol security analysis based on bounded constructing algorithm

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    An efficient approach to analyzing cryptographic protocols is to develop automatic analysis tools based on formal methods. However, the approach has encountered the high computational complexity problem due to reasons that participants of protocols are arbitrary, their message structures are complex and their executions are concurrent. We propose an efficient automatic verifying algorithm for analyzing cryptographic protocols based on the Cryptographic Protocol Algebra (CPA) model proposed recently, in which algebraic techniques are used to simplify the description of cryptographic protocols and their executions. Redundant states generated in the analysis processes are much reduced by introducing a new algebraic technique called Universal Polynomial Equation and the algorithm can be used to verify the correctness of protocols in the infinite states space. We have implemented an efficient automatic analysis tool for cryptographic protocols, called ACT-SPA, based on this algorithm, and used the tool to check more than 20 cryptographic protocols. The analysis results show that this tool is more efficient, and an attack instance not offered previously is checked by using this tool.

  11. BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications

    Directory of Open Access Journals (Sweden)

    Dina Shehada

    2017-01-01

    Full Text Available Mobile agents are smart programs that migrate from one platform to another to perform the user task. Mobile agents offer flexibility and performance enhancements to systems and service real-time applications. However, security in mobile agent systems is a great concern. In this paper, we propose a novel Broadcast based Secure Mobile Agent Protocol (BROSMAP for distributed service applications that provides mutual authentication, authorization, accountability, nonrepudiation, integrity, and confidentiality. The proposed system also provides protection from man in the middle, replay, repudiation, and modification attacks. We proved the efficiency of the proposed protocol through formal verification with Scyther verification tool.

  12. Biometrics based authentication scheme for session initiation protocol

    OpenAIRE

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when co...

  13. Transitions between discrete and rhythmic primitives in a unimanual task

    Science.gov (United States)

    Sternad, Dagmar; Marino, Hamal; Charles, Steven K.; Duarte, Marcos; Dipietro, Laura; Hogan, Neville

    2013-01-01

    Given the vast complexity of human actions and interactions with objects, we proposed that control of sensorimotor behavior may utilize dynamic primitives. However, greater computational simplicity may come at the cost of reduced versatility. Evidence for primitives may be garnered by revealing such limitations. This study tested subjects performing a sequence of progressively faster discrete movements in order to “stress” the system. We hypothesized that the increasing pace would elicit a transition to rhythmic movements, assumed to be computationally and neurally more efficient. Abrupt transitions between the two types of movements would support the hypothesis that rhythmic and discrete movements are distinct primitives. Ten subjects performed planar point-to-point arm movements paced by a metronome: starting at 2 s, the metronome intervals decreased by 36 ms per cycle to 200 ms, stayed at 200 ms for several cycles, then increased by similar increments. Instructions emphasized to insert explicit stops between each movement with a duration that equaled the movement time. The experiment was performed with eyes open and closed, and with short and long metronome sounds, the latter explicitly specifying the dwell duration. Results showed that subjects matched instructed movement times but did not preserve the dwell times. Rather, they progressively reduced dwell time to zero, transitioning to continuous rhythmic movements before movement times reached their minimum. The acceleration profiles showed an abrupt change between discrete and rhythmic profiles. The loss of dwell time occurred earlier with long auditory specification, when subjects also showed evidence of predictive control. While evidence for hysteresis was weak, taken together, the results clearly indicated a transition between discrete and rhythmic movements, supporting the proposal that representation is based on primitives rather than on veridical internal models. PMID:23888139

  14. Transitions between Discrete and Rhythmic Primitives in a Unimanual Task

    Directory of Open Access Journals (Sweden)

    Dagmar eSternad

    2013-07-01

    Full Text Available Given the vast complexity of human actions and interactions with objects, we proposed that control of sensorimotor behavior may utilize dynamic primitives. However, greater computational simplicity may come at the cost of reduced versatility. Evidence for primitives may be garnered by revealing such limitations. This study tested subjects performing a sequence of progressively faster discrete movements, in order to stress the system. We hypothesized that the increasing pace would elicit a transition to rhythmic movements, assumed to be computationally and neurally more efficient. Abrupt transitions between the two types of movements would support the hypothesis that rhythmic and discrete movements are distinct primitives. Ten subjects performed planar point-to-point arm movements paced by a metronome: Starting at 2s the metronome intervals decreased by 36ms per cycle to 200ms, stayed at 200ms for several cycles, then increased by similar increments. Instructions emphasized to insert explicit stops between each movement with a duration that equaled the movement time. The experiment was performed with eyes open and closed, and with short and long metronome sounds, the latter explicitly specifying the dwell duration. Results showed that subjects matched instructed movement times but did not preserve the dwell times. Rather, they progressively reduced dwell time to zero, transitioning to continuous rhythmic movements before movement times reached their minimum. The acceleration profiles showed an abrupt change between discrete and rhythmic profiles. The loss of dwell time occurred earlier with long auditory specification, when subjects also showed evidence of predictive control. While evidence for hysteresis was weak, taken together, the results clearly indicated a transition between discrete and rhythmic movements, supporting the proposal that representation is based on primitives rather than on veridical internal models.

  15. In search of a primitive ontology for relativistic quantum field theory

    Energy Technology Data Exchange (ETDEWEB)

    Lam, Vincent [University of Lausanne, CH-1015 Lausanne (Switzerland)

    2014-07-01

    There is a recently much discussed approach to the ontology of quantum mechanics according to which the theory is ultimately about entities in 3-dimensional space and their temporal evolution. Such an ontology postulating from the start matter localized in usual physical space or spacetime, by contrast to an abstract high-dimensional space such as the configuration space of wave function realism, is called primitive ontology in the recent literature on the topic and finds its roots in Bell's notion of local beables. The main motivation for a primitive ontology lies in its explanatory power: the primitive ontology allows for a direct account of the behaviour and properties of familiar macroscopic objects. In this context, it is natural to look for a primitive ontology for relativistic quantum field theory (RQFT). The aim of this talk is to critically discuss this interpretative move within RQFT, in particular with respect to the foundational issue of the existence of unitarily inequivalent representations. Indeed the proposed primitive ontologies for RQFT rely either on a Fock space representation or a wave functional representation, which are strictly speaking only unambiguously available for free systems in flat spacetime. As a consequence, it is argued that these primitive ontologies constitute only effective ontologies and are hardly satisfying as a fundamental ontology for RQFT.

  16. The micro-step motor controller protocol and driver

    International Nuclear Information System (INIS)

    Hong, Kwang Pyo; Lee, Chang Hee; Moon, Myung Kook; Choi, Bung Hun; Choi, Young Hyun; Cheon, Jong Gu

    2004-11-01

    We developed the communication protocol which is a main kernel of motor control firmware program that is used at HANARO neutron spectrometer now. This protocol driver divide into as a 4 group(Serial protocol, DLL, Active-X, Labview driver), so end-user can control the motor control as easily by PC RS232/422 port and have a merits as follows: Support a Low Level/High level driver, Support a Network Connectivity function by using High level Driver, One Server can services many client request. By using this protocol, The End-user can be easily makes a application motor control program and developed another application system program by using several kinds of programming tools under Widows and Linux based operation systems

  17. Protocol-based care: the standardisation of decision-making?

    Science.gov (United States)

    Rycroft-Malone, Jo; Fontenla, Marina; Seers, Kate; Bick, Debra

    2009-05-01

    To explore how protocol-based care affects clinical decision-making. In the context of evidence-based practice, protocol-based care is a mechanism for facilitating the standardisation of care and streamlining decision-making through rationalising the information with which to make judgements and ultimately decisions. However, whether protocol-based care does, in the reality of practice, standardise decision-making is unknown. This paper reports on a study that explored the impact of protocol-based care on nurses' decision-making. Theoretically informed by realistic evaluation and the promoting action on research implementation in health services framework, a case study design using ethnographic methods was used. Two sites were purposively sampled; a diabetic and endocrine unit and a cardiac medical unit. Within each site, data collection included observation, postobservation semi-structured interviews with staff and patients, field notes, feedback sessions and document review. Data were inductively and thematically analysed. Decisions made by nurses in both sites were varied according to many different and interacting factors. While several standardised care approaches were available for use, in reality, a variety of information sources informed decision-making. The primary approach to knowledge exchange and acquisition was person-to-person; decision-making was a social activity. Rarely were standardised care approaches obviously referred to; nurses described following a mental flowchart, not necessarily linked to a particular guideline or protocol. When standardised care approaches were used, it was reported that they were used flexibly and particularised. While the logic of protocol-based care is algorithmic, in the reality of clinical practice, other sources of information supported nurses' decision-making process. This has significant implications for the political goal of standardisation. The successful implementation and judicious use of tools such as

  18. Reactive Programming in Standard ML

    OpenAIRE

    Pucella, Riccardo

    2004-01-01

    Reactive systems are systems that maintain an ongoing interaction with their environment, activated by receiving input events from the environment and producing output events in response. Modern programming languages designed to program such systems use a paradigm based on the notions of instants and activations. We describe a library for Standard ML that provides basic primitives for programming reactive systems. The library is a low-level system upon which more sophisticated reactive behavi...

  19. Secure and Lightweight Cloud-Assisted Video Reporting Protocol over 5G-Enabled Vehicular Networks.

    Science.gov (United States)

    Nkenyereye, Lewis; Kwon, Joonho; Choi, Yoon-Ho

    2017-09-23

    In the vehicular networks, the real-time video reporting service is used to send the recorded videos in the vehicle to the cloud. However, when facilitating the real-time video reporting service in the vehicular networks, the usage of the fourth generation (4G) long term evolution (LTE) was proved to suffer from latency while the IEEE 802.11p standard does not offer sufficient scalability for a such congested environment. To overcome those drawbacks, the fifth-generation (5G)-enabled vehicular network is considered as a promising technology for empowering the real-time video reporting service. In this paper, we note that security and privacy related issues should also be carefully addressed to boost the early adoption of 5G-enabled vehicular networks. There exist a few research works for secure video reporting service in 5G-enabled vehicular networks. However, their usage is limited because of public key certificates and expensive pairing operations. Thus, we propose a secure and lightweight protocol for cloud-assisted video reporting service in 5G-enabled vehicular networks. Compared to the conventional public key certificates, the proposed protocol achieves entities' authorization through anonymous credential. Also, by using lightweight security primitives instead of expensive bilinear pairing operations, the proposed protocol minimizes the computational overhead. From the evaluation results, we show that the proposed protocol takes the smaller computation and communication time for the cryptographic primitives than that of the well-known Eiza-Ni-Shi protocol.

  20. The first trimester human placenta is a site for terminal maturation of primitive erythroid cells

    OpenAIRE

    Van Handel, Ben; Prashad, Sacha L.; Hassanzadeh-Kiabi, Nargess; Huang, Andy; Magnusson, Mattias; Atanassova, Boriana; Chen, Angela; Hamalainen, Eija I.; Mikkola, Hanna K. A.

    2010-01-01

    Embryonic hematopoiesis starts via the generation of primitive red blood cells (RBCs) that satisfy the embryo's immediate oxygen needs. Although primitive RBCs were thought to retain their nuclei, recent studies have shown that primitive RBCs in mice enucleate in the fetal liver. It has been unknown whether human primitive RBCs enucleate, and what hematopoietic site might support this process. Our data indicate that the terminal maturation and enucleation of human primitive RBCs occurs in fir...

  1. Hard Spheres on the Primitive Surface

    Science.gov (United States)

    Dotera, Tomonari; Takahashi, Yusuke

    2015-03-01

    Recently hierarchical structures associated with the gyroid in several soft-matter systems have been reported. One of fundamental questions is regular arrangement or tiling on minimal surfaces. We have found certain numbers of hard spheres per unit cell on the gyroid surface are entropically self-organized. Here, new results for the primitive surface are presented. 56/64/72 per unit cell on the primitive minimal surface are entropically self-organized. Numerical evidences for the fluid-solid transition as a function of hard sphere radius are obtained in terms of the acceptance ratio of Monte Carlo moves and order parameters. These arrangements, which are the extensions of the hexagonal arrangement on a flat surface, can be viewed as hyperbolic tiling on the Poincaré disk with a negative Gaussian curvature.

  2. [Development of clinical trial education program for pharmaceutical science students through small group discussion and role-playing using protocol].

    Science.gov (United States)

    Imakyure, Osamu; Shuto, Hideki; Nishikawa, Fumi; Hagiwara, Yoshifuka; Inoue, Sachiko; Koyanagi, Taeko; Hirakawa, Masaaki; Kataoka, Yasufumi

    2010-08-01

    The acquirement of basic knowledge of clinical trials and professional attitude in their practices is a general instructional objective in the Model Core Curriculum for Pharmaceutical Education. Unfortunately, the previous program of clinical trial education was not effective in the acquirement of a professional attitude in their practices. Then, we developed the new clinical trial education program using protocol through small group discussion (SGD) and roll-playing. Our program consists of 7 steps of practical training. In step 1, the students find some problems after presentation of the protocol including case and prescription. In step 2, they analyse the extracted problems and share the information obtained in SGD. In steps 3 and 5, five clinical case scenarios are presented to the students and they discuss which case is suitable for entry to the clinical trial or which case corresponds to the discontinuance criteria in the present designed protocol. In steps 4 and 6, the roll-playing is performed by teachers and students as doctors and clinical research coordinators (CRC) respectively. Further, we conducted a trial practice based on this program for the students. In the student's self-evaluation into five grades, the average score of the skill acquisition level in each step was 3.8-4.7 grade. Our clinical trial education program could be effective in educating the candidates for CRC or clinical pharmacists.

  3. CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network

    OpenAIRE

    Rashed, M. G.; Kabir, M. Hasnat; Rahim, M. Sajjadur; Ullah, Sk. Enayet

    2012-01-01

    A new two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol (CBHRP) is proposed in this paper. It is an extension of LEACH routing protocol. We introduce cluster head-set idea for cluster-based routing where several clusters are formed with the deployed sensors to collect information from target field. On rotation basis, a head-set member receives data from the neighbor nodes and transmits the aggregated results to the distance base station. This protocol ...

  4. Effects of primitive photosynthesis on Earth's early climate system

    Science.gov (United States)

    Ozaki, Kazumi; Tajika, Eiichi; Hong, Peng K.; Nakagawa, Yusuke; Reinhard, Christopher T.

    2018-01-01

    The evolution of different forms of photosynthetic life has profoundly altered the activity level of the biosphere, radically reshaping the composition of Earth's oceans and atmosphere over time. However, the mechanistic impacts of a primitive photosynthetic biosphere on Earth's early atmospheric chemistry and climate are poorly understood. Here, we use a global redox balance model to explore the biogeochemical and climatological effects of different forms of primitive photosynthesis. We find that a hybrid ecosystem of H2-based and Fe2+-based anoxygenic photoautotrophs—organisms that perform photosynthesis without producing oxygen—gives rise to a strong nonlinear amplification of Earth's methane (CH4) cycle, and would thus have represented a critical component of Earth's early climate system before the advent of oxygenic photosynthesis. Using a Monte Carlo approach, we find that a hybrid photosynthetic biosphere widens the range of geochemical conditions that allow for warm climate states well beyond either of these metabolic processes acting in isolation. Our results imply that the Earth's early climate was governed by a novel and poorly explored set of regulatory feedbacks linking the anoxic biosphere and the coupled H, C and Fe cycles. We suggest that similar processes should be considered when assessing the potential for sustained habitability on Earth-like planets with reducing atmospheres.

  5. [The cultural history of palliative care in primitive societies: an integrative review].

    Science.gov (United States)

    Siles González, José; Solano Ruiz, Maria Del Carmen

    2012-08-01

    The objective of this study is to describe the evolution of palliative care in order to reflect on the possibility of its origin in primitive cultures and their relationship with the beginnings of the cult of the dead. It describes the change in the symbolic structures and social interactions involved in palliative care during prehistory: functional unit, functional framework and functional element. The theoretical framework is based on cultural history, the dialectical structural model and symbolic interactionism. Categorization techniques, cultural history and dialectic structuralism analyses were performed. Palliative care existed in primitive societies, mostly associated with the rites of passage with a high symbolic content. The social structures - functional unit, functional framework and functional element - are the pillars that supported palliative care in prehistory societies.

  6. Home-based bimanual training based on motor learning principles in children with unilateral cerebral palsy and their parents (the COAD-study): rationale and protocols.

    Science.gov (United States)

    Schnackers, Marlous; Beckers, Laura; Janssen-Potten, Yvonne; Aarts, Pauline; Rameckers, Eugène; van der Burg, Jan; de Groot, Imelda; Smeets, Rob; Geurts, Sander; Steenbergen, Bert

    2018-04-18

    Home-based training is considered an important intervention in rehabilitation of children with unilateral cerebral palsy. Despite consensus on the value of home-based upper limb training, no evidence-based best practice exists. Promoting compliance of children to adhere to an intensive program while keeping parental stress levels low is an important challenge when designing home-based training programs. Incorporating implicit motor learning principles emerges to be a promising method to resolve this challenge. Here we describe two protocols for home-based bimanual training programs, one based on implicit motor learning principles and one based on explicit motor learning principles, for children with unilateral spastic cerebral palsy aged 2 through 7 years. Children receive goal-oriented, task-specific bimanual training in their home environment from their parents for 3.5 h/week for 12 weeks according to an individualized program. Parents will be intensively coached by a multidisciplinary team, consisting of a pediatric therapist and remedial educationalist. Both programs consist of a preparation phase (goal setting, introductory meetings with coaching professionals, design of individualized program, instruction of parents, home visit) and home-based training phase (training, video-recordings, registrations, and telecoaching and home visits by the coaching team). The programs contrast with respect to the teaching strategy, i.e. how the parents support their child during training. In both programs parents provide their child with instructions and feedback that focus on the activity (i.e. task-oriented) or the result of the activity (i.e. result-oriented). However, in the explicit program parents are in addition instructed to give exact instructions and feedback on the motor performance of the bimanual activities, whereas in the implicit program the use of both hands and the appropriate motor performance of the activity are elicited via manipulation of the

  7. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  8. Strong Authentication Protocol based on Java Crypto Chip as a Secure Element

    Directory of Open Access Journals (Sweden)

    Majid Mumtaz

    2016-10-01

    Full Text Available Smart electronic devices and gadgets and their applications are becoming more and more popular. Most of those devices and their applications handle personal, financial, medical and other sensitive data that require security and privacy protection. In this paper we describe one aspect of such protection – user authentication protocol based on the use of X.509 certificates. The system uses Public Key Infrastructure (PKI, challenge/response protocol, mobile proxy servers, and Java cards with crypto capabilities used as a Secure Element. Innovative design of the protocol, its implementation, and evaluation results are described. In addition to end-user authentication, the described solution also supports the use of X.509 certificates for additional security services – confidentiality, integrity, and non-repudiation of transactions and data in an open network environment. The system uses Application Programming Interfaces (APIs to access Java cards functions and credentials that can be used as add-ons to enhance any mobile application with security features and services.

  9. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  10. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  11. Optimized UAV Communication Protocol Based on Prior Locations

    OpenAIRE

    Sboui, Lokman; Rabah, Abdullatif

    2015-01-01

    In this paper, we adopt a new communication protocol between the UAV and fixed on-ground nodes. This protocol tends to reduce communication power consumption by stopping communication if the channel is not good to communicate (i.e. far nodes, obstacles, etc.) The communication is performed using the XBee 868M standard and Libelium wapsmotes. Our designed protocol is based on a new communication model that we propose in this paper. The protocole decides wether to communicate or not after compu...

  12. Handbook of Carbon Offset Programs. Trading Systems, Funds, Protocols and Standards

    Energy Technology Data Exchange (ETDEWEB)

    Kollmuss, Anja; Lazarus, Michael; Lee, Carrie; Polycarp, Clifford (SEI-US (United States)); LeFranc, Maurice (US EPA (United States))

    2010-03-15

    Greenhouse gas (GHG) offsets have long been promoted as an important element of a comprehensive climate policy approach. Offset programs can reduce the overall cost of achieving a given emission goal by enabling emission reductions to occur where costs are lower. Offsets have the potential to deliver sustainability co-benefits, through technology development and transfer. They can also develop human and institutional capacity for reducing emissions in sectors and locations not included in a cap and trade or a mandatory government policy. However, offsets can pose a risk to the environmental integrity of climate actions, especially if issues surrounding additionality, permanence, leakage, quantification and verification are not adequately addressed. The challenge is to design offset programs and policies that can maximize their potential benefits while minimizing their potential risks. This handbook provides a systematic and comprehensive review of existing offset programs. It looks are what offsets are, how offset mechanisms function, and the successes and pitfalls they have encountered. Coverage includes offset programs across the full swath of applications including mandatory and voluntary systems, government regulated and private markets, carbon offset funds, and accounting and reporting protocols such as the WBCSD/WRI GHG Protocol and ISO 14064. Learning from the successes and failures of these programs will be essential to crafting effective climate policy. A reference for regulators, policy makers, business leaders and NGOs concerned with the design and operation of GHG offset programs world-wide

  13. Development of IT-based Data Communication Protocol for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Jeong, K. I.; Kim, D. H.; Lee, J. C.

    2009-07-01

    The communication protocol, which provide overall communication rules and methods and give ways how to exchange information, is the most important part and it can affect the overall performance of communication network. Therefore, the first step of development of the communication network of an NPP is its own communication protocol design, which conforms to the requirements and characteristics of an NPP I and C. To manage the protocol development process, we establish development procedure and define detail substantive based on the procedure and we examine the adaptability of existing commercial communication protocols to the communication protocol of an NPP I and C. Existing commercial communication protocols based on Information Technology(IT) can be categorized into 3 groups: general commercial communication protocols, industrial communication protocols, military communication protocols. We analyze the design criteria and performance requirements of popular protocols in each group. And also, we examine the adaptability to the communication protocol of an NPP. Based on these results, we developed our own protocol for NPP I and C, which meet the required specifications through design overall protocol architecture and data frame format, definition of functional requirements and specifications

  14. Compositional studies of primitive asteroids

    International Nuclear Information System (INIS)

    Vilas, F.

    1988-01-01

    The composition of primitive asteroids and their relationship to satellites in the solar system will be studied by analyzing existing narrowband charge coupled device (CCD) reflectance spectra, acquiring additional spectra of asteroids and small satellites in the 0.5 to 1.0 micrometer spectral range, and exploring possibilities for obtaining compositional information in the blue-UV spectral region. Comparison with laboratory spectra of terrestrial chlorites and serpentines (phyllosilicates) and the clay minerals found in carbonaceous chondrite meteorites will continue. During 1987, narrowband CCD reflectance spectra of 17 additional asteroids were acquired. These spectra and spectra of 34 other asteroids have been used primarily for two studies: weak absorption features similar to those due to Fe2(+) and Fe2(+) - Fe3(+) transitions in iron oxides f ound in terrestrial chlorites and serpentines and carbonaceous chondrites have been identified in some primitive asteroid spectra. There is a first indication that asteroids grouped by heliocentric distance show similar weak absorption features. Nonparametric statistics are being applied to test the hypothesis of discrete remnants of a gradation in composition of outer-belt asteroids

  15. [Cranial trepanation in primitive cultures].

    Science.gov (United States)

    González-Darder, José Manuel

    A review is presented on cranial trepanations performed by primitive cultures. The scientific interest in this topic began after the discovery in 1965 by Ephraim G. Squier of a pre-Columbian trepanated skull, and studied by Paul Broca in Paris. Pseudotrepanation and other types of cranial manipulation are reviewed. The techniques, technology, and instruments for every type of trepanation are well known. There are a surprisingly high percentage of cases showing signs of post-trepanation survival. Indications for trepanation are speculative, perhaps magic. Although trepanation in primitive cultures is widespread around the world, and throughout time, the main fields of interest are the Neolithic Period in Europe, the pre-Columbian Period in Andean South America, and some contemporaneous Pacific and African tribes. This particular trepanation procedure has no relationship with modern Neurosurgery, or with trepanations with therapeutic purposes performed since the Greco-Roman period in Europe, and afterwards around the world. Copyright © 2016 Sociedad Española de Neurocirugía. Publicado por Elsevier España, S.L.U. All rights reserved.

  16. Breast metastases primitive extra mammary

    International Nuclear Information System (INIS)

    Terzieff, V.; Vázquez, A.; Alonso, I.; Sabini, G.

    2004-01-01

    Less than 3% of all breast cancers originate from a primitive extra mammary. In 40% of cases it is the first manifestation of the primitive properly studied but 80% are associated with widely disseminated disease. It typically presents as a nodule on external quadrant s painful in half the cases. The majority (60%) of metastases derived from breast contralateral breast tumors are believed to via the lymphatic system. of the ; extra mammary the most common tumors are melanoma; hematologic and neuroendocrine. Although some imaging characteristics can guide diagnosis is histological. Cytology has good performance in experienced hands; but up to 25% of cases there may be difficulty in establishing diagnosis. Treatment depends on the type of tumor. Mastectomy should not be practiced or axillary clearance routine as is generally the context of disease disseminated. Radiation therapy may be useful for local control. It has been proposed laser ablation but no experience with it. The overall prognosis is bad. For a man of 45 with a breast metastasis occurs only a clear cell carcinoma of the kidney

  17. Evolution of Computational Toxicology-from Primitive ...

    Science.gov (United States)

    Presentation at the Health Canada seminar in Ottawa, ON, Canada on Nov. 15. 2016 Presentation at the Health Canada seminar in Ottawa, ON, Canada on Nov. 15. 2016 on the Evolution of Computational Toxicology-from Primitive Beginnings to Sophisticated Application

  18. Chemistry of primitive solar material

    International Nuclear Information System (INIS)

    Barshay, S.S.; Lewis, J.S.

    1976-01-01

    The chemical processes that occurred in the cooler, outer regions of the primitive solar nebula at the time of intimate chemical contact between preplanetary condensate and nebular gas constitute the subject matter of this review. Condensation models are described and tested against the observed properties of the planets, their satellites, and the asteroids. 6 figs., 2 tables, 48 refs

  19. Advanced flooding-based routing protocols for underwater sensor networks

    OpenAIRE

    Isufi, E.; Dol, H.; Leus, G.J.T.

    2016-01-01

    Flooding-based protocols are a reliable solution to deliver packets in underwater sensor networks. However, these protocols potentially involve all the nodes in the forwarding process. Thus, the performance and energy efficiency are not optimal. In this work, we propose some advances of a flooding-based protocol with the goal to improve the performance and the energy efficiency. The first idea considers the node position information in order to reduce the number of relays that may apply flood...

  20. The first trimester human placenta is a site for terminal maturation of primitive erythroid cells.

    Science.gov (United States)

    Van Handel, Ben; Prashad, Sacha L; Hassanzadeh-Kiabi, Nargess; Huang, Andy; Magnusson, Mattias; Atanassova, Boriana; Chen, Angela; Hamalainen, Eija I; Mikkola, Hanna K A

    2010-10-28

    Embryonic hematopoiesis starts via the generation of primitive red blood cells (RBCs) that satisfy the embryo's immediate oxygen needs. Although primitive RBCs were thought to retain their nuclei, recent studies have shown that primitive RBCs in mice enucleate in the fetal liver. It has been unknown whether human primitive RBCs enucleate, and what hematopoietic site might support this process. Our data indicate that the terminal maturation and enucleation of human primitive RBCs occurs in first trimester placental villi. Extravascular ζ-globin(+) primitive erythroid cells were found in placental villi between 5-7 weeks of development, at which time the frequency of enucleated RBCs was higher in the villous stroma than in circulation. RBC enucleation was further evidenced by the presence of primitive reticulocytes and pyrenocytes (ejected RBC nuclei) in the placenta. Extravascular RBCs were found to associate with placental macrophages, which contained ingested nuclei. Clonogenic macrophage progenitors of fetal origin were present in the chorionic plate of the placenta before the onset of fetoplacental circulation, after which macrophages had migrated to the villi. These findings indicate that placental macrophages may assist the enucleation process of primitive RBCs in placental villi, implying an unexpectedly broad role for the placenta in embryonic hematopoiesis.

  1. CaPiTo: protocol stacks for services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    CaPiTo allows the modelling of service-oriented applications using process algebras at three levels of abstraction. The abstract level focuses on the key functionality of the services; the plug-in level shows how to obtain security using standardised protocol stacks; finally, the concrete level...... allows to consider how security is obtained using asymmetric and symmetric cryptographic primitives. The CaPiTo approach therefore caters for a variety of developers that need to cooperate on designing and implementing service-oriented applications. We show how to formally analyse CaPiTo specifications...

  2. Evaluation of American Board of Orthodontics certification protocols in postgraduate orthodontic programs in the United States and Canada.

    Science.gov (United States)

    Park, Jae Hyun; Putrus, Raphael R; Pruzansky, Dawn P; Grubb, John

    2017-03-01

    The objective of this study was to identify the board certification protocols that hospital and university-based postgraduate orthodontic programs have in place to prepare residents for the American Board of Orthodontics (ABO) certification examination. An electronic survey was sent to the program directors of each of the 72 postgraduate orthodontic programs in the United States and Canada. The survey consisted of 49 questions about demographics, resident case assignment protocols, and ABO examination preparation methods. The response rate was 81%. Most programs were 30 to 36 months in length (72.7%). Many residents had a case load of 51 to 75 during their first year (50.9%), with an average maximum case load of 70 to 109. There was a positive correlation with both the number of cases that first-year residents start and the length of the program (Spearman correlation coefficient = 0.379; P <0.01) when compared with maximum case load. Approximately 72% of the programs do not offer a written mock board examination; however, 72% reported offering a clinical mock board examination. ABO cases are identified within the first 6 months of most programs. About 88% of respondents believe that residents take advantage of the banking system, and that over the past 5 years ABO Initial Certification Examination applications have increased. Most program directors (89.1%) believe that their program length is sufficient for board preparation. Subjects tested in the written examination are integrated into the didactic curriculum and strengthened with ongoing literature reviews, with a passing rate over 90%. Clinical examination preparation varies, with most programs requiring a mock board examination for graduation. Total participation in both the Initial Certification Examination and banking has increased since 2010; better follow-up protocols are needed to track residents after graduation. Copyright © 2017 American Association of Orthodontists. Published by Elsevier Inc

  3. Spatiotemporal mechanical variation reveals critical role for rho kinase during primitive streak morphogenesis.

    Science.gov (United States)

    Henkels, Julia; Oh, Jaeho; Xu, Wenwei; Owen, Drew; Sulchek, Todd; Zamir, Evan

    2013-02-01

    Large-scale morphogenetic movements during early embryo development are driven by complex changes in biochemical and biophysical factors. Current models for amniote primitive streak morphogenesis and gastrulation take into account numerous genetic pathways but largely ignore the role of mechanical forces. Here, we used atomic force microscopy (AFM) to obtain for the first time precise biomechanical properties of the early avian embryo. Our data reveal that the primitive streak is significantly stiffer than neighboring regions of the epiblast, and that it is stiffer than the pre-primitive streak epiblast. To test our hypothesis that these changes in mechanical properties are due to a localized increase of actomyosin contractility, we inhibited actomyosin contractility via the Rho kinase (ROCK) pathway using the small-molecule inhibitor Y-27632. Our results using several different assays show the following: (1) primitive streak formation was blocked; (2) the time-dependent increase in primitive streak stiffness was abolished; and (3) convergence of epiblast cells to the midline was inhibited. Taken together, our data suggest that actomyosin contractility is necessary for primitive streak morphogenesis, and specifically, ROCK plays a critical role. To better understand the underlying mechanisms of this fundamental process, future models should account for the findings presented in this study.

  4. A standard protocol for describing individual-based and agent-based models

    Science.gov (United States)

    Grimm, Volker; Berger, Uta; Bastiansen, Finn; Eliassen, Sigrunn; Ginot, Vincent; Giske, Jarl; Goss-Custard, John; Grand, Tamara; Heinz, Simone K.; Huse, Geir; Huth, Andreas; Jepsen, Jane U.; Jorgensen, Christian; Mooij, Wolf M.; Muller, Birgit; Pe'er, Guy; Piou, Cyril; Railsback, Steven F.; Robbins, Andrew M.; Robbins, Martha M.; Rossmanith, Eva; Ruger, Nadja; Strand, Espen; Souissi, Sami; Stillman, Richard A.; Vabo, Rune; Visser, Ute; DeAngelis, Donald L.

    2006-01-01

    Simulation models that describe autonomous individual organisms (individual based models, IBM) or agents (agent-based models, ABM) have become a widely used tool, not only in ecology, but also in many other disciplines dealing with complex systems made up of autonomous entities. However, there is no standard protocol for describing such simulation models, which can make them difficult to understand and to duplicate. This paper presents a proposed standard protocol, ODD, for describing IBMs and ABMs, developed and tested by 28 modellers who cover a wide range of fields within ecology. This protocol consists of three blocks (Overview, Design concepts, and Details), which are subdivided into seven elements: Purpose, State variables and scales, Process overview and scheduling, Design concepts, Initialization, Input, and Submodels. We explain which aspects of a model should be described in each element, and we present an example to illustrate the protocol in use. In addition, 19 examples are available in an Online Appendix. We consider ODD as a first step for establishing a more detailed common format of the description of IBMs and ABMs. Once initiated, the protocol will hopefully evolve as it becomes used by a sufficiently large proportion of modellers.

  5. Effectiveness of the home-based alcohol prevention program "In control: No alcohol!": study protocol of a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Verdurmen Jacqueline EE

    2011-08-01

    Full Text Available Abstract Background In the Netherlands, children start to drink at an early age; of the Dutch 12-year olds, 40% reports lifetime alcohol use, while 9.7% reports last-month drinking. Starting to drink at an early age puts youth at risk of developing several alcohol-related problems later in life. Recently, a home-based prevention program called "In control: No alcohol!" was developed to delay the age of alcohol onset in children. The main aim of this project is to conduct a Randomized Controlled Trial (RCT to evaluate the effectiveness of the program. Methods/Design The prevention program will be tested with an RCT among mothers and their 6 grade primary school children (11-12 years old, randomly assigned to the prevention or control condition. The program consists of five printed magazines and an activity book designed to improve parental alcohol-specific socialization. Parent-child dyads in the control group receive a factsheet information brochure, which is the standard alcohol brochure of the Trimbos Institute (the Netherlands Institute for Mental Health and Addiction. Outcome measures are initiation of alcohol use (have been drinking at least one glass of alcohol, alcohol-specific parenting, susceptibility to drinking alcohol, alcohol expectancies, self-efficacy, and frequency and intensity of child alcohol use. Questionnaires will be administered online on secured Internet webpages, with personal login codes for both mothers and children. Mothers and children in both the experimental and control condition will be surveyed at baseline and after 6, 12, and 18 months (follow-ups. Discussion The present study protocol presents the design of an RCT evaluating the effectiveness of the home-based "In control: No alcohol!" program for 6 grade primary school children (11-12 years old. It is hypothesized that children in the prevention condition will be less likely to have their first glass of alcohol, compared to the control condition. When the

  6. Modelling 3D spatial objects in a geo-DBMS using a 3D primitive

    Science.gov (United States)

    Arens, Călin; Stoter, Jantien; van Oosterom, Peter

    2005-03-01

    There is a growing interest in modelling the world in three dimensions, both in applications and in science. At the same time, geographical information systems are changing into integrated architecture in which administrative and spatial data are maintained in one environment. It is for this reason that mainstream Data Base Management Systems (DBMSs) have implemented spatial data types according to the 'Simple Feature Specifications for SQL', described by the OpenGeospatial Consortium. However, these specifications are 2D, as indeed are the implementations in DBMSs. At the Section GIS Technology of TU Delft, research has been carried out in which a 3D primitive was implemented in a DBMS (Oracle Spatial). To explore the possibilities and complications, a fairly simple 3D primitive was chosen to start with: a polyhedron. In the future the study will be extended with more complex primitives, the ultimate aim being to build 3D models with features closer to the real world. Besides the data structure, a validation function was developed to check the geometric accuracy of the data. Rules for validation were established and translated into prototype implementations with the aid of literature. In order to manipulate the data, a list of useful 3D functions was specified. Most of these were translated into algorithms, which were implemented in the DBMS. The algorithms for these functions were obtained from the relevant literature. The research also comprised a comparative performance test on spatial indexing in 2D and 3D, using an R-tree. Finally, existing software was used to visualize 3D objects structured with the implemented 3D primitive. This research is a first attempt to implement a true 3D primitive in a DBMS. Future research will focus on extending and improving the implementations and on optimizing maintenance and query of 3D objects in DBMSs.

  7. Peripheral Primitive Neuroectodermal Tumor of the Stomach: A Case Report

    International Nuclear Information System (INIS)

    Park, Woon Ju; Cho, June Sik; Shin, Kyung Sook; Jeong, Hyung Yong; Noh; Seung Moo; Song, Kyu Sang

    2010-01-01

    Peripheral primitive neuroectodermal tumors (peripheral PNETs) are very rare and highly aggressive soft tissue malignancies originating from the neural crest. To the best of our knowledge, only a few cases of peripheral PNETs of the stomach have been reported in the literature. We report a case of large peripheral primitive neuroectodermal tumor of the stomach with MDCT findings in a 22-year-old man presenting epigastric pain and vomiting

  8. An improved AODV routing protocol based on tower structure

    Directory of Open Access Journals (Sweden)

    Li Yong Qiang

    2016-01-01

    Full Text Available The paper proposed a new routing protocol(IAODV based on tower structure in the Ad Hoc network for the problem which Location Routing Protocol need hardware and Complex algorithm. By the simulation, The complexity of the new routing protocol is reduced without reducing the performance of the network.

  9. Study on Cloud Security Based on Trust Spanning Tree Protocol

    Science.gov (United States)

    Lai, Yingxu; Liu, Zenghui; Pan, Qiuyue; Liu, Jing

    2015-09-01

    Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.

  10. A hospital-based child and adolescent overweight and obesity treatment protocol transferred into a community healthcare setting

    DEFF Research Database (Denmark)

    Mollerup, Pernille Maria; Gamborg, Michael Orland; Trier, Cæcilie

    2017-01-01

    BACKGROUND: Due to the pandemic of child and adolescent overweight and obesity, improvements in overweight and obesity treatment availability and accessibility are needed. METHODS: In this prospective study, we investigated if reductions in body mass index (BMI) standard deviation scores (SDS......) and waist circumference (WC) would occur during 1.5 years of community-based overweight and obesity treatment based upon an effective hospital-based overweight and obesity treatment protocol, The Children's Obesity Clinics' Treatment protocol. Height, weight, and WC were measured at all consultations...... was invested per child per year. CONCLUSION: BMI SDS and WC were reduced after 1.5 years of treatment. Hence, this community-based overweight and obesity treatment program may help accommodate the need for improvements in treatment availability and accessibility....

  11. Discovery of Intrinsic Primitives on Triangle Meshes

    KAUST Repository

    Solomon, Justin; Ben-Chen, Mirela; Butscher, Adrian; Guibas, Leonidas

    2011-01-01

    The discovery of meaningful parts of a shape is required for many geometry processing applications, such as parameterization, shape correspondence, and animation. It is natural to consider primitives such as spheres, cylinders and cones

  12. A Software Tool to Visualize Verbal Protocols to Enhance Strategic and Metacognitive Abilities in Basic Programming

    Directory of Open Access Journals (Sweden)

    Carlos A. Arévalo

    2011-07-01

    Full Text Available Learning to program is difficult for many first year undergraduate students. Instructional strategies of traditional programming courses tend to focus on syntactic issues and assigning practice exercises using the presentation-examples-practice formula and by showing the verbal and visual explanation of a teacher during the “step by step” process of writing a computer program. Cognitive literature regarding the mental processes involved in programming suggests that the explicit teaching of certain aspects such as mental models, strategic knowledge and metacognitive abilities, are critical issues of how to write and assemble the pieces of a computer program. Verbal protocols are often used in software engineering as a technique to record the short term cognitive process of a user or expert in evaluation or problem solving scenarios. We argue that verbal protocols can be used as a mechanism to explicitly show the strategic and metacognitive process of an instructor when writing a program. In this paper we present an Information System Prototype developed to store and visualize worked examples derived from transcribed verbal protocols during the process of writing introductory level programs. Empirical data comparing the grades obtained by two groups of novice programming students, using ANOVA, indicates a statistically positive difference in performance in the group using the tool, even though these results still cannot be extrapolated to general population, given the reported limitations of this study.

  13. COMPARATIVE STUDY OF RTOS AND PRIMITIVE INTERRUPT IN EMBEDDED SYSTEM

    Directory of Open Access Journals (Sweden)

    Dwi Purnomo

    2015-03-01

    Full Text Available Multitasking is one of the most challenging issues in the automation industry which is highly depended on the embedded system. There are two methods to perform multitasking in embedded system: RTOS and primitive interrupt. The main purpose of this research is to compare the performance of R¬TOS with primitive method while concurrently undertaking multiple tasks. The system, which is able to perform various tasks, has been built to evaluate the performance of both methods. There are four tasks introduced in the system: servo task, sensor task, LED task, and LCD task. The performance of each method is indicated by the success rate of the sensor task detection. Sensor task detection will be compared with the true value which is calculated and measured manually during observation time. Observation time was varied after several iterations and the data of the iteration are recorded for both RTOS and primitive interrupt methods. The results of the conducted experiments have shown that, RTOS is more accurate than interrupt method. However, the data variance of the primitive interrupt method is narrower than RTOS. Therefore, to choose a better method, an optimization is needed to be done and each product has its own standard.

  14. Une tumeur neuroectodermique primitive périphérique à localisation ...

    African Journals Online (AJOL)

    Les tumeurs neuro-ectodermiques primitives ou sarcome d'Ewing sont classiquement des néoplasmes se développant aux dépends des tissus mous et des os. Les tumeurs neuro-ectodermiques primitives gastriques (pPNETs) sont extrêmement rares. Nous nous proposons, à travers le cas d'un patient, opéré pour une ...

  15. An online gait generator for quadruped walking using motor primitives

    Directory of Open Access Journals (Sweden)

    Chunlin Zhou

    2016-11-01

    Full Text Available This article presents implementation of an online gait generator on a quadruped robot. Firstly, the design of a quadruped robot is presented. The robot contains four leg modules each of which is constructed by a 2 degrees of freedom (2-DOF five-bar parallel linkage mechanism. Together with other two rotational DOF, the leg module is able to perform 4-DOF movement. The parallel mechanism of the robot allows all the servos attached on the body frame, so that the leg mass is decreased and motor load can be balanced. Secondly, an online gait generator based on dynamic movement primitives for the walking control is presented. Dynamic movement primitives provide an approach to generate periodic trajectories and they can be modulated in real time, which makes the online adjustment of walking gaits possible. This gait controller is tested by the quadruped robot in regulating walking speed, switching between forward\\backward movements and steering. The controller is easy to apply, expand and is quite effective on phase coordination and online trajectory modulation. Results of simulated experiments are presented.

  16. Portable abdomen radiography. Moving to thickness-based protocols

    International Nuclear Information System (INIS)

    Sanchez, Adrian A.; Reiser, Ingrid; Baxter, Tina; Zhang, Yue; Finkle, Joshua H.; Lu, Zheng Feng; Feinstein, Kate A.

    2018-01-01

    Default pediatric protocols on many digital radiography systems are configured based on patient age. However, age does not adequately characterize patient size, which is the principal determinant of proper imaging technique. Use of default pediatric protocols by inexperienced technologists can result in patient overexposure, inadequate image quality, or repeated examinations. To ensure diagnostic image quality at a well-managed patient radiation exposure by transitioning to thickness-based protocols for pediatric portable abdomen radiography. We aggregated patient thickness data, milliamperes (mAs), kilovoltage peak (kVp), exposure index (EI), source-to-detector distance, and grid use for all portable abdomen radiographs performed in our pediatric hospital in a database with a combination of automated and manual data collection techniques. We then analyzed the database and used it as the basis to construct thickness-based protocols with consistent image quality across varying patient thicknesses, as determined by the EI. Retrospective analysis of pediatric portable exams performed at our adult-focused hospitals demonstrated substantial variability in EI relative to our pediatric hospital. Data collection at our pediatric hospital over 4 months accumulated roughly 800 portable abdomen exams, which we used to develop a thickness-based technique chart. Through automated retrieval of data in our systems' digital radiography exposure logs and recording of patient abdomen thickness, we successfully developed thickness-based techniques for portable abdomen radiography. (orig.)

  17. Portable abdomen radiography. Moving to thickness-based protocols

    Energy Technology Data Exchange (ETDEWEB)

    Sanchez, Adrian A.; Reiser, Ingrid; Baxter, Tina; Zhang, Yue; Finkle, Joshua H.; Lu, Zheng Feng; Feinstein, Kate A. [University of Chicago Medical Center, Department of Radiology, Chicago, IL (United States)

    2018-02-15

    Default pediatric protocols on many digital radiography systems are configured based on patient age. However, age does not adequately characterize patient size, which is the principal determinant of proper imaging technique. Use of default pediatric protocols by inexperienced technologists can result in patient overexposure, inadequate image quality, or repeated examinations. To ensure diagnostic image quality at a well-managed patient radiation exposure by transitioning to thickness-based protocols for pediatric portable abdomen radiography. We aggregated patient thickness data, milliamperes (mAs), kilovoltage peak (kVp), exposure index (EI), source-to-detector distance, and grid use for all portable abdomen radiographs performed in our pediatric hospital in a database with a combination of automated and manual data collection techniques. We then analyzed the database and used it as the basis to construct thickness-based protocols with consistent image quality across varying patient thicknesses, as determined by the EI. Retrospective analysis of pediatric portable exams performed at our adult-focused hospitals demonstrated substantial variability in EI relative to our pediatric hospital. Data collection at our pediatric hospital over 4 months accumulated roughly 800 portable abdomen exams, which we used to develop a thickness-based technique chart. Through automated retrieval of data in our systems' digital radiography exposure logs and recording of patient abdomen thickness, we successfully developed thickness-based techniques for portable abdomen radiography. (orig.)

  18. Cryptographic Primitives with Quasigroup Transformations

    OpenAIRE

    Mileva, Aleksandra

    2010-01-01

    Cryptology is the science of secret communication, which consists of two complementary disciplines: cryptography and cryptanalysis. Cryptography is dealing with design and development of new primitives, algorithms and schemas for data enciphering and deciphering. For many centuries cryptographic technics have been applied in protection of secrecy and authentication in diplomatic, political and military correspondences and communications. Cryptanalysis is dealing with different attacks on c...

  19. Intrapartum synthetic oxytocin reduce the expression of primitive reflexes associated with breastfeeding.

    Science.gov (United States)

    Marín Gabriel, Miguel A; Olza Fernández, Ibone; Malalana Martínez, Ana M; González Armengod, Carmen; Costarelli, Valeria; Millán Santos, Isabel; Fernández-Cañadas Morillo, Aurora; Pérez Riveiro, Pilar; López Sánchez, Francisco; García Murillo, Lourdes

    2015-05-01

    Several synthetic peptide manipulations during the time surrounding birth can alter the specific neurohormonal status in the newborn brain. This study is aimed at assessing whether intrapartum oxytocin administration has any effect on primitive neonatal reflexes and determining whether such an effect is dose-dependent. A cohort prospective study was conducted at a tertiary hospital. Mother-infant dyads who received intrapartum oxytocin (n=53) were compared with mother-infant dyads who did not receive intrapartum oxytocin (n=45). Primitive neonatal reflexes (endogenous, antigravity, motor, and rhythmic reflexes) were quantified by analyzing videotaped breastfeeding sessions in a biological nurturing position. Two observers blind to the group assignment and the oxytocin dose analyzed the videotapes and assesed the newborn's state of consciousness according to the Brazelton scale. The release of all rhythmic reflexes (p=0.01), the antigravity reflex (p=0.04), and total primitive neonatal reflexes (p=0.02) in the group exposed to oxytocin was lower than in the group not exposed to oxytocin. No correlations were observed between the dose of oxytocin administered and the percentage of primitive neonatal reflexes released (r=0.03; p=0.82). Intrapartum oxytocin administration might inhibit the expression of several primitive neonatal reflexes associated with breastfeeding. This correlation does not seem to be dose-dependent.

  20. A model based security testing method for protocol implementation.

    Science.gov (United States)

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  1. Deducing trapdoor primitives in public key encryption schemes

    Science.gov (United States)

    Pandey, Chandra

    2005-03-01

    Semantic security of public key encryption schemes is often interchangeable with the art of building trapdoors. In the frame of reference of Random Oracle methodology, the "Key Privacy" and "Anonymity" has often been discussed. However to a certain degree the security of most public key encryption schemes is required to be analyzed with formal proofs using one-way functions. This paper evaluates the design of El Gamal and RSA based schemes and attempts to parallelize the trapdoor primitives used in the computation of the cipher text, thereby magnifying the decryption error δp in the above schemes.

  2. Protocols for pressure ulcer prevention: are they evidence-based?

    Science.gov (United States)

    Chaves, Lidice M; Grypdonck, Mieke H F; Defloor, Tom

    2010-03-01

    This study is a report of a study to determine the quality of protocols for pressure ulcer prevention in home care in the Netherlands. If pressure ulcer prevention protocols are evidence-based and practitioners use them correctly in practice, this will result a reduction in pressure ulcers. Very little is known about the evidence-based content and quality of the pressure ulcer prevention protocols. In 2008, current pressure ulcer prevention protocols from 24 home-care agencies in the Netherlands were evaluated. A checklist developed and validated by two pressure ulcer prevention experts was used to assess the quality of the protocols, and weighted and unweighted quality scores were computed and analysed using descriptive statistics. The 24 pressure ulcer prevention protocols had a mean weighted quality score of 63.38 points out of a maximum of 100 (sd 5). The importance of observing the skin at the pressure points at least once a day was emphasized in 75% of the protocols. Only 42% correctly warned against the use of materials that were 'less effective or that could potentially cause harm'. Pressure ulcer prevention commands a reasonable amount of attention in home care, but the incidence of pressure ulcers and lack of a consistent, standardized document for use in actual practice indicate a need for systematic implementation of national pressure ulcer prevention standards in the Netherlands to ensure adherence to the established protocols.

  3. A Fully Automated Diabetes Prevention Program, Alive-PD: Program Design and Randomized Controlled Trial Protocol.

    Science.gov (United States)

    Block, Gladys; Azar, Kristen Mj; Block, Torin J; Romanelli, Robert J; Carpenter, Heather; Hopkins, Donald; Palaniappan, Latha; Block, Clifford H

    2015-01-21

    In the United States, 86 million adults have pre-diabetes. Evidence-based interventions that are both cost effective and widely scalable are needed to prevent diabetes. Our goal was to develop a fully automated diabetes prevention program and determine its effectiveness in a randomized controlled trial. Subjects with verified pre-diabetes were recruited to participate in a trial of the effectiveness of Alive-PD, a newly developed, 1-year, fully automated behavior change program delivered by email and Web. The program involves weekly tailored goal-setting, team-based and individual challenges, gamification, and other opportunities for interaction. An accompanying mobile phone app supports goal-setting and activity planning. For the trial, participants were randomized by computer algorithm to start the program immediately or after a 6-month delay. The primary outcome measures are change in HbA1c and fasting glucose from baseline to 6 months. The secondary outcome measures are change in HbA1c, glucose, lipids, body mass index (BMI), weight, waist circumference, and blood pressure at 3, 6, 9, and 12 months. Randomization and delivery of the intervention are independent of clinic staff, who are blinded to treatment assignment. Outcomes will be evaluated for the intention-to-treat and per-protocol populations. A total of 340 subjects with pre-diabetes were randomized to the intervention (n=164) or delayed-entry control group (n=176). Baseline characteristics were as follows: mean age 55 (SD 8.9); mean BMI 31.1 (SD 4.3); male 68.5%; mean fasting glucose 109.9 (SD 8.4) mg/dL; and mean HbA1c 5.6 (SD 0.3)%. Data collection and analysis are in progress. We hypothesize that participants in the intervention group will achieve statistically significant reductions in fasting glucose and HbA1c as compared to the control group at 6 months post baseline. The randomized trial will provide rigorous evidence regarding the efficacy of this Web- and Internet-based program in reducing or

  4. High water content in primitive continental flood basalts.

    Science.gov (United States)

    Xia, Qun-Ke; Bi, Yao; Li, Pei; Tian, Wei; Wei, Xun; Chen, Han-Lin

    2016-05-04

    As the main constituent of large igneous provinces, the generation of continental flood basalts (CFB) that are characterized by huge eruption volume (>10(5) km(3)) within short time span (primitive CFB in the early Permian Tarim large igneous province (NW China), using the H2O content of ten early-formed clinopyroxene (cpx) crystals that recorded the composition of the primitive Tarim basaltic melts and the partition coefficient of H2O between cpx and basaltic melt. The arc-like H2O content (4.82 ± 1.00 wt.%) provides the first clear evidence that H2O plays an important role in the generation of CFB.

  5. Primitive myxoid mesenchymal tumor of infancy in a preterm infant.

    Science.gov (United States)

    Lam, Joseph; Lara-Corrales, Irene; Cammisuli, Salvatore; Somers, Gino R; Pope, Elena

    2010-01-01

    Primitive myxoid mesenchymal tumor of infancy is a recently recognized entity that has been added to the differential diagnosis of myxoid tumors of the soft tissue. Few cases have been reported of this entity in the literature, but none presenting in a preterm infant. We present the case and clinical course of a preterm boy with a primitive myxoid mesenchymal tumor of infancy that occurred following excision of a congenital juvenile xanthogranuloma. © 2010 Wiley Periodicals, Inc.

  6. High profile students’ growth of mathematical understanding in solving linier programing problems

    Science.gov (United States)

    Utomo; Kusmayadi, TA; Pramudya, I.

    2018-04-01

    Linear program has an important role in human’s life. This linear program is learned in senior high school and college levels. This material is applied in economy, transportation, military and others. Therefore, mastering linear program is useful for provision of life. This research describes a growth of mathematical understanding in solving linear programming problems based on the growth of understanding by the Piere-Kieren model. Thus, this research used qualitative approach. The subjects were students of grade XI in Salatiga city. The subjects of this study were two students who had high profiles. The researcher generally chose the subjects based on the growth of understanding from a test result in the classroom; the mark from the prerequisite material was ≥ 75. Both of the subjects were interviewed by the researcher to know the students’ growth of mathematical understanding in solving linear programming problems. The finding of this research showed that the subjects often folding back to the primitive knowing level to go forward to the next level. It happened because the subjects’ primitive understanding was not comprehensive.

  7. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  8. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Science.gov (United States)

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  9. From design to implementation--the Joint Asia Diabetes Evaluation (JADE) program: a descriptive report of an electronic web-based diabetes management program.

    Science.gov (United States)

    Ko, Gary T; So, Wing-Yee; Tong, Peter C; Le Coguiec, Francois; Kerr, Debborah; Lyubomirsky, Greg; Tamesis, Beaver; Wolthers, Troels; Nan, Jennifer; Chan, Juliana

    2010-05-13

    The Joint Asia Diabetes Evaluation (JADE) Program is a web-based program incorporating a comprehensive risk engine, care protocols, and clinical decision support to improve ambulatory diabetes care. The JADE Program uses information technology to facilitate healthcare professionals to create a diabetes registry and to deliver an evidence-based care and education protocol tailored to patients' risk profiles. With written informed consent from participating patients and care providers, all data are anonymized and stored in a databank to establish an Asian Diabetes Database for research and publication purpose. The JADE electronic portal (e-portal: http://www.jade-adf.org) is implemented as a Java application using the Apache web server, the mySQL database and the Cocoon framework. The JADE e-portal comprises a risk engine which predicts 5-year probability of major clinical events based on parameters collected during an annual comprehensive assessment. Based on this risk stratification, the JADE e-portal recommends a care protocol tailored to these risk levels with decision support triggered by various risk factors. Apart from establishing a registry for quality assurance and data tracking, the JADE e-portal also displays trends of risk factor control at each visit to promote doctor-patient dialogues and to empower both parties to make informed decisions. The JADE Program is a prototype using information technology to facilitate implementation of a comprehensive care model, as recommended by the International Diabetes Federation. It also enables health care teams to record, manage, track and analyze the clinical course and outcomes of people with diabetes.

  10. From design to implementation - The Joint Asia Diabetes Evaluation (JADE program: A descriptive report of an electronic web-based diabetes management program

    Directory of Open Access Journals (Sweden)

    Lyubomirsky Greg

    2010-05-01

    Full Text Available Abstract Background The Joint Asia Diabetes Evaluation (JADE Program is a web-based program incorporating a comprehensive risk engine, care protocols, and clinical decision support to improve ambulatory diabetes care. Methods The JADE Program uses information technology to facilitate healthcare professionals to create a diabetes registry and to deliver an evidence-based care and education protocol tailored to patients' risk profiles. With written informed consent from participating patients and care providers, all data are anonymized and stored in a databank to establish an Asian Diabetes Database for research and publication purpose. Results The JADE electronic portal (e-portal: http://www.jade-adf.org is implemented as a Java application using the Apache web server, the mySQL database and the Cocoon framework. The JADE e-portal comprises a risk engine which predicts 5-year probability of major clinical events based on parameters collected during an annual comprehensive assessment. Based on this risk stratification, the JADE e-portal recommends a care protocol tailored to these risk levels with decision support triggered by various risk factors. Apart from establishing a registry for quality assurance and data tracking, the JADE e-portal also displays trends of risk factor control at each visit to promote doctor-patient dialogues and to empower both parties to make informed decisions. Conclusions The JADE Program is a prototype using information technology to facilitate implementation of a comprehensive care model, as recommended by the International Diabetes Federation. It also enables health care teams to record, manage, track and analyze the clinical course and outcomes of people with diabetes.

  11. From design to implementation - The Joint Asia Diabetes Evaluation (JADE) program: A descriptive report of an electronic web-based diabetes management program

    Science.gov (United States)

    2010-01-01

    Background The Joint Asia Diabetes Evaluation (JADE) Program is a web-based program incorporating a comprehensive risk engine, care protocols, and clinical decision support to improve ambulatory diabetes care. Methods The JADE Program uses information technology to facilitate healthcare professionals to create a diabetes registry and to deliver an evidence-based care and education protocol tailored to patients' risk profiles. With written informed consent from participating patients and care providers, all data are anonymized and stored in a databank to establish an Asian Diabetes Database for research and publication purpose. Results The JADE electronic portal (e-portal: http://www.jade-adf.org) is implemented as a Java application using the Apache web server, the mySQL database and the Cocoon framework. The JADE e-portal comprises a risk engine which predicts 5-year probability of major clinical events based on parameters collected during an annual comprehensive assessment. Based on this risk stratification, the JADE e-portal recommends a care protocol tailored to these risk levels with decision support triggered by various risk factors. Apart from establishing a registry for quality assurance and data tracking, the JADE e-portal also displays trends of risk factor control at each visit to promote doctor-patient dialogues and to empower both parties to make informed decisions. Conclusions The JADE Program is a prototype using information technology to facilitate implementation of a comprehensive care model, as recommended by the International Diabetes Federation. It also enables health care teams to record, manage, track and analyze the clinical course and outcomes of people with diabetes. PMID:20465815

  12. Primitive neuroectodermal tumor of the orbit in a 5-year-old girl with microphthalmia

    DEFF Research Database (Denmark)

    Alyahya, Ghassan Ayish Jabur; Heegaard, Steffen; Fledelius, Hans C.

    2000-01-01

    ophthalmology, primitive neuroectodermal tumor (PNET), Ewing's sarcoma, small round-cell tumors, retinoblastoma, medulloepithelioma, microphthalmia, orbitotomy......ophthalmology, primitive neuroectodermal tumor (PNET), Ewing's sarcoma, small round-cell tumors, retinoblastoma, medulloepithelioma, microphthalmia, orbitotomy...

  13. Identifying the primitive path mesh in entangled polymer liquids

    International Nuclear Information System (INIS)

    Sukumaran, Sathish K.; Kremer, Kurt; Grest, Gary Stephen; Everaers, Ralf

    2004-01-01

    Similar to entangled ropes, polymer chains cannot slide through each other. These topological constraints, the so-called entanglements, dominate the viscoelastic behavior of high-molecular-weight polymeric liquids. Tube models of polymer dynamics and rheology are based on the idea that entanglements confine a chain to small fluctuations around a primitive path which follows the coarse-grained chain contour. To establish the microscopic foundation for these highly successful phenomenological models, we have recently introduced a method for identifying the primitive path mesh that characterizes the microscopic topological state of computer-generated conformations of long-chain polymer melts and solutions. Here we give a more detailed account of the algorithm and discuss several key aspects of the analysis that are pertinent for its successful use in analyzing the topology of the polymer configurations. We also present a slight modification of the algorithm that preserves the previously neglected self-entanglements and allows us to distinguish between local self-knots and entanglements between distant sections of the same chain. Our results indicate that the latter make a negligible contribution to the tube and that the contour length between local self-knots, N 1k is significantly larger than the entanglement length N e

  14. Evaluating a community-based early childhood education and development program in Indonesia: study protocol for a pragmatic cluster randomized controlled trial with supplementary matched control group.

    Science.gov (United States)

    Pradhan, Menno; Brinkman, Sally A; Beatty, Amanda; Maika, Amelia; Satriawan, Elan; de Ree, Joppe; Hasan, Amer

    2013-08-16

    This paper presents the study protocol for a pragmatic cluster randomized controlled trial (RCT) with a supplementary matched control group. The aim of the trial is to evaluate a community-based early education and development program launched by the Government of Indonesia. The program was developed in collaboration with the World Bank with a total budget of US$127.7 million, and targets an estimated 738,000 children aged 0 to 6 years living in approximately 6,000 poor communities. The aim of the program is to increase access to early childhood services with the secondary aim of improving school readiness. The study is being conducted across nine districts. The baseline survey contained 310 villages, of which 100 were originally allocated to the intervention arm, 20 originally allocated to a 9-month delay staggered start, 100 originally allocated to an 18-month delay staggered start and 90 allocated to a matched control group (no intervention). The study consists of two cohorts, one comprising children aged 12 to 23 months and the other comprising children aged 48 to 59 months at baseline. The data collection instruments include child observations and task/game-based assessments as well as a questionnaire suite, village head questionnaire, service level questionnaires, household questionnaire, and child caretaker questionnaire. The baseline survey was conducted from March to April 2009, midline was conducted from April to August 2010 and endline conducted early 2013. The resultant participation rates at both the district and village levels were 90%. At the child level, the participation rate was 99.92%. The retention rate at the child level at midline was 99.67%. This protocol paper provides a detailed record of the trial design including a discussion regarding difficulties faced with compliance to the randomization, compliance to the dispersion schedule of community block grants, and procurement delays for baseline and midline data collections. Considering the

  15. A mutli-technique search for the most primitive CO chondrites

    OpenAIRE

    Alexander, C.M.O'D.; Greenwood, R.C.; Bowden, R.; Gibson, J.M.; Howard, K.T.; Franchi, I.A.

    2018-01-01

    As part of a study to identify the most primitive COs and to look for weakly altered CMs amongst the COs, we have conducted a multi-technique study of 16 Antarctic meteorites that had been classified as primitive COs. For this study, we have determined: (1) the bulk H, C and N abundances and isotopes, (2) bulk O isotopic compositions, (3) bulk modal mineralogies, and (4) for some selected samples the abundances and compositions of their insoluble organic matter (IOM). Two of the 16 meteorites...

  16. Authentication Test-Based the RFID Authentication Protocol with Security Analysis

    Directory of Open Access Journals (Sweden)

    Minghui Wang

    2014-08-01

    Full Text Available To the problem of many recently proposed RFID authentication protocol was soon find security holes, we analyzed the main reason, which is that protocol design is not rigorous, and the correctness of the protocol cannot be guaranteed. To this end, authentication test method was adopted in the process of the formal analysis and strict proof to the proposed RFID protocol in this paper. Authentication Test is a new type of analysis and design method of security protocols based on Strand space model, and it can be used for most types of the security protocols. After analysis the security, the proposed protocol can meet the RFID security demand: information confidentiality, data integrity and identity authentication.

  17. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography

    Science.gov (United States)

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786

  18. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Directory of Open Access Journals (Sweden)

    Alavalapati Goutham Reddy

    Full Text Available Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  19. Influence of sediment recycling on the trace element composition of primitive arc lavas

    Science.gov (United States)

    Collinet, M.; Jagoutz, O. E.

    2017-12-01

    Primitive calc-alkaline lavas from continental arcs are, on average, enriched in incompatible elements compared to those from intra-oceanic arcs. This relative enrichment is observed in different groups of trace elements: LILE (e.g. K, Rb), LREE to MREE (La-Dy) and HFSE (e.g.Zr, Nb) and is thought to result from (1) a transfer of material from the subducting slab to the mantle wedge at higher temperature than in intra-oceanic margins and/or (2) lower average degrees of melting in the mantle wedge, as a consequence of thicker overlying crusts and higher average pressures of melting. In addition to thicker overlying crusts and generally higher slab temperatures, continental margins are characterized by larger volumes of rock exposed above sea level and enhanced erosion rates compared to intra-oceanic arcs. As several geochemical signatures of arc lavas attest to the importance of sediment recycling in subduction zones, we explore the possibility that the high concentrations of incompatible elements in primitive lavas from continental arcs directly reflect a larger input of sediment to the subduction system. Previous efforts to quantify the sediment flux to oceanic trenches focused on the thickness of pelagic and hemipelagic sediments on top of the plate entering the subduction zone (Plank and Langmuir, 1993, Nature). These estimates primarily relied on the sediment layer drilled outboard from the subduction system and likely underestimate the volume of sediment derived from the arc itself. Accordingly, we find that such estimates of sediment flux do not correlate with the concentration of incompatible elements in primitive arc lavas. To account for regional contributions of coarser detrital sediments, usually delivered to oceanic trenches by turbidity currents, we apply to arc segments a model that quantifies the sediment load of rivers based on the average relief, area, temperature and runoff of their respective drainage areas (Syvitski et al., 2003, Sediment. Geol

  20. Growth and sedimentation of dust grains in the primitive solar nebular

    International Nuclear Information System (INIS)

    Battaglia, A.

    1987-01-01

    Formation of the planets in the solar system is envisioned to occur via a gravitational instability in a thin layer of dust located at the midplane of the primitive solar nebula. The break-up of the dust layer gives rise to seed plants (planetesimals) that, through successive collisions, eventually form the present-day planets. This thesis addresses the problem of the formation of the dust layer, beginning with a configuration in which the dust particles are uniformly mixed with the nebula's turbulent gas. To describe the properties of turbulence in the primitive solar nebula, models by Canuto et al. (1987) and by Cabot et al. (1987) are used. The available results concerning calculation of the velocity of particles embedded in a turbulent fluid were found to be unsatisfactory; therefore, a new formalism was developed to express the latter quantity in terms of the properties of the turbulence in the fluid. Following the space-time evolution of the grains, formalism was developed that simulates the simultaneous processes of collisions and sedimentation of the dust grains in the primitive solar nebula. It is concluded that, for the model of the primitive solar nebula considered, the formation of a dust layer at midplane is very unlikely

  1. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.

    Science.gov (United States)

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-06-17

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV's research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.

  2. ERK inhibition promotes neuroectodermal precursor commitment by blocking self-renewal and primitive streak formation of the epiblast.

    Science.gov (United States)

    Yu, Yang; Wang, Xiaoxiao; Zhang, Xiaoxin; Zhai, Yanhua; Lu, Xukun; Ma, Haixia; Zhu, Kai; Zhao, Tongbiao; Jiao, Jianwei; Zhao, Zhen-Ao; Li, Lei

    2018-01-05

    Pluripotent stem cells hold great promise for regenerative medicine. However, before clinical application, reproducible protocols for pluripotent stem cell differentiation should be established. Extracellular signal-regulated protein kinase (ERK) signaling plays a central role for the self-renewal of epiblast stem cells (EpiSCs), but its role for subsequent germ layer differentiation is still ambiguous. We proposed that ERK could modulate differentiation of the epiblast. PD0325901 was used to inhibit ERK activation during the differentiation of embryonic stem cells and EpiSCs. Immunofluorescence, western blot analysis, real-time PCR and flow cytometry were used to detect germ layer markers and pathway activation. We demonstrate that the ERK phosphorylation level is lower in neuroectoderm of mouse E7.5 embryos than that in the primitive streak. ERK inhibition results in neural lineage commitment of epiblast. Mechanistically, PD0325901 abrogates the expression of primitive streak markers by β-catenin retention in the cytoplasm, and inhibits the expression of OCT4 and NANOG during EpiSC differentiation. Thus, EpiSCs differentiate into neuroectodermal lineage efficiently under PD0325901 treatment. These results suggest that neuroectoderm differentiation does not require extrinsic signals, supporting the default differentiation of neural lineage. We report that a single ERK inhibitor, PD0325901, can specify epiblasts and EpiSCs into neural-like cells, providing an efficient strategy for neural differentiation.

  3. SPANISH PEAKS PRIMITIVE AREA, MONTANA.

    Science.gov (United States)

    Calkins, James A.; Pattee, Eldon C.

    1984-01-01

    A mineral survey of the Spanish Peaks Primitive Area, Montana, disclosed a small low-grade deposit of demonstrated chromite and asbestos resources. The chances for discovery of additional chrome resources are uncertain and the area has little promise for the occurrence of other mineral or energy resources. A reevaluation, sampling at depth, and testing for possible extensions of the Table Mountain asbestos and chromium deposit should be undertaken in the light of recent interpretations regarding its geologic setting.

  4. Implementing an ultrasound-based protocol for diagnosingappendicitis while maintaining diagnostic accuracy

    International Nuclear Information System (INIS)

    Van Atta, Angela J.; Baskin, Henry J.; Maves, Connie K.; Dansie, David M.; Rollins, Michael D.; Bolte, Robert G.; Mundorff, Michael B.; Andrews, Seth P.

    2015-01-01

    The use of ultrasound to diagnose appendicitis in children is well-documented but not universally employed outside of pediatric academic centers, especially in the United States. Various obstacles make it difficult for institutions and radiologists to abandon a successful and accurate CT-based imaging protocol in favor of a US-based protocol. To describe how we overcame barriers to implementing a US-based appendicitis protocol among a large group of nonacademic private-practice pediatric radiologists while maintaining diagnostic accuracy and decreasing medical costs. A multidisciplinary team of physicians (pediatric surgery, pediatric emergency medicine and pediatric radiology) approved an imaging protocol using US as the primary modality to evaluate suspected appendicitis with CT for equivocal cases. The protocol addressed potential bias against US and accommodated for institutional limitations of radiologist and sonographer experience and availability. Radiologists coded US reports according to the probability of appendicitis. Radiology reports were compared with clinical outcomes to assess diagnostic accuracy. During the study period, physicians from each group were apprised of the interim US protocol accuracy results. Problematic cases were discussed openly. A total of 512 children were enrolled and underwent US for evaluation of appendicitis over a 30-month period. Diagnostic accuracy was comparable to published results for combined US/CT protocols. Comparing the first 12 months to the last 12 months of the study period, the proportion of children achieving an unequivocal US result increased from 30% (51/169) to 53% (149/282) and the proportion of children undergoing surgery based solely on US findings increased from 55% (23/42) to 84% (92/109). Overall, 63% (325/512) of patients in the protocol did not require a CT. Total patient costs were reduced by $30,182 annually. We overcame several barriers to implementing a US protocol. During the study period our

  5. Implementing an ultrasound-based protocol for diagnosingappendicitis while maintaining diagnostic accuracy

    Energy Technology Data Exchange (ETDEWEB)

    Van Atta, Angela J. [University of Utah School of Medicine, Salt Lake City, UT (United States); Baskin, Henry J.; Maves, Connie K.; Dansie, David M. [Primary Children' s Hospital, Department of Radiology, Salt Lake City, UT (United States); Rollins, Michael D. [University of Utah School of Medicine, Department of Surgery, Division of Pediatric Surgery, Salt Lake City, UT (United States); Bolte, Robert G. [University of Utah School of Medicine, Department of Pediatrics, Division of Pediatric Emergency Medicine, Salt Lake City, UT (United States); Mundorff, Michael B.; Andrews, Seth P. [Primary Children' s Hospital, Systems Improvement, Salt Lake City, UT (United States)

    2015-05-01

    The use of ultrasound to diagnose appendicitis in children is well-documented but not universally employed outside of pediatric academic centers, especially in the United States. Various obstacles make it difficult for institutions and radiologists to abandon a successful and accurate CT-based imaging protocol in favor of a US-based protocol. To describe how we overcame barriers to implementing a US-based appendicitis protocol among a large group of nonacademic private-practice pediatric radiologists while maintaining diagnostic accuracy and decreasing medical costs. A multidisciplinary team of physicians (pediatric surgery, pediatric emergency medicine and pediatric radiology) approved an imaging protocol using US as the primary modality to evaluate suspected appendicitis with CT for equivocal cases. The protocol addressed potential bias against US and accommodated for institutional limitations of radiologist and sonographer experience and availability. Radiologists coded US reports according to the probability of appendicitis. Radiology reports were compared with clinical outcomes to assess diagnostic accuracy. During the study period, physicians from each group were apprised of the interim US protocol accuracy results. Problematic cases were discussed openly. A total of 512 children were enrolled and underwent US for evaluation of appendicitis over a 30-month period. Diagnostic accuracy was comparable to published results for combined US/CT protocols. Comparing the first 12 months to the last 12 months of the study period, the proportion of children achieving an unequivocal US result increased from 30% (51/169) to 53% (149/282) and the proportion of children undergoing surgery based solely on US findings increased from 55% (23/42) to 84% (92/109). Overall, 63% (325/512) of patients in the protocol did not require a CT. Total patient costs were reduced by $30,182 annually. We overcame several barriers to implementing a US protocol. During the study period our

  6. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  7. Validation of IT-based Data Communication Protocol for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Jeong, K. I.; Kim, D. H.; Lee, J. C.

    2009-12-01

    The communication network designed to transmit control and processing signals in digital Instrument and Control (I and C) systems in Nuclear Power Plant (NPP), should provide a high level of safety and reliability. There are different features between the communication networks of NPPs and other commercial communication networks. Safety and reliability are the most important factors in the communication networks of an NPP rather than efficiency which are important factors of a commercial communication network design. To develop Data Communication Protocol for Nuclear Power Plant, We analyze the design criteria and performance requirements of existing commercial communication protocols based on Information Technology(IT). And also, we examine the adaptability to the communication protocol of an NPP. Based on these results, we developed our own protocol(Nuclear power plant Safety Communication Protocol : NSCP) for NPP I and C, which meet the required specifications through design overall protocol architecture and data frame format, definition of functional requirements and specifications. NSCP is the communication protocol designed for a safety-grade control network in the nuclear power plant. In this report, we had specified NSCP protocol by FDT(Formal Description Technique) and established validation procedures based on the validation methodology. It was confirmed specification error, major function's validity and reachability of NSCP by performing simulation and the validation process using Telelogic Tau tool

  8. Developing a yeast-based assay protocol to monitor total ...

    African Journals Online (AJOL)

    A yeast-based assay protocol developed for detecting oestrogenic activity in activated sludge (AS) supernatant is described. The protocol used Saccharomyces cerevisiae construct RMY/ER-ERE with human oestrogen receptor (ERα) and lacZ reporter genes, and was developed by modifying existing assays for use with AS ...

  9. A theory-based implementation program for alcohol screening and brief intervention (ASBI) in general practices: Planned development and study protocol of a cluster randomised controlled trial.

    Science.gov (United States)

    Abidi, L; Oenema, A; Candel, M J J M; van de Mheen, D

    2016-11-01

    Previous studies have shown that alcohol screening and brief intervention (ASBI) in general practices can lead to significant reductions in alcohol consumption among patients, yet ASBI is rarely implemented into routine clinical practice. The aim of this paper is to describe the development and evaluation of an ASBI implementation program aimed at increasing ASBI delivery rates of general practitioners (GPs) and decreasing patients' alcohol consumption. This study protocol describes the step-wise development and evaluation of an ASBI implementation program. A four-step method is used to identify relevant determinants of change and intervention components based on the Behaviour Change Wheel and the Theoretical Domains Framework. The program will be evaluated in general practices in The Netherlands in a two-arm cluster randomised controlled trial which investigates the effect of the program on GPs' ASBI delivery behaviour as well as on patients' alcohol consumption. Effective theory- and practice-based strategies to implement ASBI in general practices are highly needed. Using a stepwise method we described the development of a program consisting of an e-learning module, a tailored feedback module and environmental support and materials. We hypothesize that this program will result in an increase of GPs' ASBI delivery behaviour. Secondly, we expect an overall decrease in percentage of patients with excessive or problematic alcohol use and a higher proportion of patients from GPs receiving the ASBI implementation program decreasing their alcohol consumption, compared to patients from GPs in the control group. NTR5539. Copyright © 2016 Elsevier Inc. All rights reserved.

  10. An efficient three-party password-based key agreement protocol using extended chaotic maps

    International Nuclear Information System (INIS)

    Shu Jian

    2015-01-01

    Three-party password-based key agreement protocols allow two users to authenticate each other via a public channel and establish a session key with the aid of a trusted server. Recently, Farash et al. [Farash M S, Attari M A 2014 “An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps”, Nonlinear Dynamics 77(7): 399–411] proposed a three-party key agreement protocol by using the extended chaotic maps. They claimed that their protocol could achieve strong security. In the present paper, we analyze Farash et al.’s protocol and point out that this protocol is vulnerable to off-line password guessing attack and suffers communication burden. To handle the issue, we propose an efficient three-party password-based key agreement protocol using extended chaotic maps, which uses neither symmetric cryptosystems nor the server’s public key. Compared with the relevant schemes, our protocol provides better performance in terms of computation and communication. Therefore, it is suitable for practical applications. (paper)

  11. Efficacy of Seren@ctif, a Computer-Based Stress Management Program for Patients With Adjustment Disorder With Anxiety: Protocol for a Controlled Trial.

    Science.gov (United States)

    Servant, Dominique; Leterme, Anne-Claire; Barasino, Olivia; Rougegrez, Laure; Duhamel, Alain; Vaiva, Guillaume

    2017-10-02

    : stress and stress reaction and assessment; deep respiration and relaxation techniques; cognitive restructuring, mindfulness, and acceptance; behavioral skills as problem solving; and time management, healthy behaviors, and emotion regulation. In the Internet-based group, patients have minimal contact with a medical professional before and after every session. In the first session, a flash memory drive is supplied containing videos, audio files, a self-help book portfolio in the form of an eGuide, and log books providing the exercises to be completed between 2 sessions. The patient is encouraged to practice a 20-minute daily exercise 5 or 6 times per week. In the face-to-face group, patients receive the same program from a therapist with 5 weekly sessions without digital support. Interviews and self-assessments were collected face-to-face with the investigator. The feasibility of this program is being tested, and results show good accessibility in terms of acceptance, understanding, and treatment credibility. Results are expected in 2018. To our knowledge, this is the first French study to examine the effectiveness of a computer-based stress management program for patients with ADA. The Seren@ctif program may be useful within the framework of a psychoeducative approach. It could also be advised for people suffering from other diseases related to stress and for people with a clinical level of perceived stress. Clinicaltrials.gov NCT02621775; https://clinicaltrials.gov/ct2/show/NCT02621775 (Archived by WebCite at http://www.webcitation.org/6tQrkPs1u). ©Dominique Servant, Anne-Claire Leterme, Olivia Barasino, Laure Rougegrez, Alain Duhamel, Guillaume Vaiva. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 02.10.2017.

  12. Search for Primitive Matter in the Solar System

    Science.gov (United States)

    Libourel, G.; Michel, P.; Delbo, M.; Ganino, C.; Recio-Blanco, A.; de Laverny, P.; Zolensky, M. E.; Krot, A. N.

    2017-01-01

    Recent astronomical observations and theoretical modeling led to a consensus regarding the global scenario of the formation of young stellar objects (YSO) from a cold molecular cloud of interstellar dust (organics and minerals) and gas that, in some cases, leads to the formation of a planetary system. In the case of our Solar System, which has already evolved for approximately 4567 Ma, the quest is to access, through the investigation of planets, moons, cometary and asteroidal bodies, meteorites, micrometeorites, and interplanetary dust particles, the primitive material that contains the key information about the early Solar System processes and its evolution. However, laboratory analyses of extraterrestrial samples, astronomical observations and dynamical models of the Solar System evolution have not brought yet any conclusive evidence on the nature and location of primitive matter in the Solar System, preventing a clear understanding of its early stages.

  13. A water-based training program that include perturbation exercises to improve stepping responses in older adults: study protocol for a randomized controlled cross-over trial

    Directory of Open Access Journals (Sweden)

    Tsedek Irit

    2008-08-01

    Full Text Available Abstract Background Gait and balance impairments may increase the risk of falls, the leading cause of accidental death in the elderly population. Fall-related injuries constitute a serious public health problem associated with high costs for society as well as human suffering. A rapid step is the most important protective postural strategy, acting to recover equilibrium and prevent a fall from initiating. It can arise from large perturbations, but also frequently as a consequence of volitional movements. We propose to use a novel water-based training program which includes specific perturbation exercises that will target the stepping responses that could potentially have a profound effect in reducing risk of falling. We describe the water-based balance training program and a study protocol to evaluate its efficacy (Trial registration number #NCT00708136. Methods/Design The proposed water-based training program involves use of unpredictable, multi-directional perturbations in a group setting to evoke compensatory and volitional stepping responses. Perturbations are made by pushing slightly the subjects and by water turbulence, in 24 training sessions conducted over 12 weeks. Concurrent cognitive tasks during movement tasks are included. Principles of physical training and exercise including awareness, continuity, motivation, overload, periodicity, progression and specificity were used in the development of this novel program. Specific goals are to increase the speed of stepping responses and improve the postural control mechanism and physical functioning. A prospective, randomized, cross-over trial with concealed allocation, assessor blinding and intention-to-treat analysis will be performed to evaluate the efficacy of the water-based training program. A total of 36 community-dwelling adults (age 65–88 with no recent history of instability or falling will be assigned to either the perturbation-based training or a control group (no training

  14. Melville and the Tradition of Primitive Utopia.

    Science.gov (United States)

    Beauchamp, Gorman

    1981-01-01

    Discusses the relationships among the myth of the Golden Age, the concept of the Noble Savage, and the dream of Utopia. Uses Lewis Mumford's division of utopias into two basic types, i.e., reconstruction and escape utopias, to examine Herman Melville's "Typee" as an example of the primitive escapist utopia. (Editor/DMM)

  15. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  16. Efficient one-out-of-two quantum oblivious transfer based on four-coherent-state postselection protocol

    International Nuclear Information System (INIS)

    Chen, I-C; Hwang Tzonelih; Li C-M

    2008-01-01

    On the basis of the modified four-coherent-state post-selection quantum key distribution protocol (Namiki and Hirano 2006 Preprint quant-ph/0608144v1), two 1-out-of-2 quantum oblivious transfer (QOT 2 1 ) protocols are proposed. The first proposed protocol (called the receiver-based QOT 2 1 protocol) requires the coherent states to be prepared by the receiver, whereas the second protocol (called the sender-based QOT 2 1 protocol) allows the coherent states to be generated by the sender. The main advantages of the proposed protocols are that (i) no quantum bit commitment schemes and the assumption of quantum memory are needed; (ii) less communication cost between participants is required, i.e. the receiver-based QOT 2 1 protocol requires only one quantum communication and one classical communication and the sender-based QOT 2 1 protocol requires only one quantum communication between participants during protocol execution; and (iii) the utilization of quantum states is very efficient, wherein the receiver-based and the sender-based QOT 2 1 protocols use only two coherent pulses and one coherent pulse respectively for sending the sender's two messages

  17. ADAPTIVE GOSSIP BASED PROTOCOL FOR ENERGY EFFICIENT MOBILE ADHOC NETWORK

    Directory of Open Access Journals (Sweden)

    S. Rajeswari

    2012-03-01

    Full Text Available In Gossip Sleep Protocol, network performance is enhanced based on energy resource. But energy conservation is achieved with the reduced throughput. In this paper, it has been proposed a new Protocol for Mobile Ad hoc Network to achieve reliability with energy conservation. Based on the probability (p values, the value of sleep nodes is fixed initially. The probability value can be adaptively adjusted by Remote Activated Switch during the transmission process. The adaptiveness of gossiping probability is determined by the Packet Delivery Ratio. For performance comparison, we have taken Routing overhead, Packet Delivery Ratio, Number of dropped packets and Energy consumption with the increasing number of forwarding nodes. We used UDP based traffic models to analyze the performance of this protocol. We analyzed TCP based traffic models for average end to end delay. We have used the NS-2 simulator.

  18. Multi-Gateway-Based Energy Holes Avoidance Routing Protocol for WSN

    Directory of Open Access Journals (Sweden)

    Rohini Sharma

    2016-04-01

    Full Text Available In wireless sensor networks (WSNs, efficient energy conservation is required to prolong the lifetime of the network. In this work, we have given emphasis on balanced energy consumption and energy holes avoidance. This paper proposes a multi-gateway-based approach to reduce the transmission distance between the sender and the sink node. The area to be monitored is divided into regions and gateway nodes are deployed at optimal positions. We have designed a transmission scheme, in which sensors in the sink region communicate directly to the sink, sensors in the gateway region communicate directly to the gateway, and sensors in the cluster region transmit their data directly to their respective cluster head which transmits data to the gateway in its region. If the distance between a cluster head and the sink is less than the distance between the cluster head and the gateway node, the cluster head transmits data to the sink instead of the gateway node. We have compared the proposed protocol with Low-Energy Adaptive Clustering Hierarchy (LEACH, Gateway Based Energy Aware Multi-Hop Routing (M-GEAR, and Gateway Based Stable Election Protocol (GSEP protocols. The protocol performs better than other protocols in terms of throughput, stability period, lifetime, residual energy, and the packet transmitted to the sink.

  19. "Together at school"--a school-based intervention program to promote socio-emotional skills and mental health in children: study protocol for a cluster randomized controlled trial.

    Science.gov (United States)

    Björklund, Katja; Liski, Antti; Samposalo, Hanna; Lindblom, Jallu; Hella, Juho; Huhtinen, Heini; Ojala, Tiina; Alasuvanto, Paula; Koskinen, Hanna-Leena; Kiviruusu, Olli; Hemminki, Elina; Punamäki, Raija-Leena; Sund, Reijo; Solantaus, Tytti; Santalahti, Päivi

    2014-10-07

    Schools provide a natural context to promote children's mental health. However, there is a need for more evidence-based, high quality school intervention programs combined with an accurate evaluation of their general effectiveness and effectiveness of specific intervention methods. The aim of this paper is to present a study protocol of a cluster randomized controlled trial evaluating the "Together at School" intervention program. The intervention program is designed to promote social-emotional skills and mental health by utilizing whole-school approach and focuses on classroom curriculum, work environment of school staff, and parent-teacher collaboration methods. The evaluation study examines the effects of the intervention on children's socio-emotional skills and mental health in a cluster randomized controlled trial design with 1) an intervention group and 2) an active control group. Altogether 79 primary school participated at baseline. A multi-informant setting involves the children themselves, their parents, and teachers. The primary outcomes are measured using parent and teacher ratings of children's socio-emotional skills and psychological problems measured by the Strengths and Difficulties Questionnaire and the Multisource Assessment of Social Competence Scale. Secondary outcomes for the children include emotional understanding, altruistic behavior, and executive functions (e.g. working memory, planning, and inhibition). Secondary outcomes for the teachers include ratings of e.g. school environment, teaching style and well-being. Secondary outcomes for both teachers and parents include e.g. emotional self-efficacy, child rearing practices, and teacher-parent collaboration. The data was collected at baseline (autumn 2013), 6 months after baseline, and will be collected also 18 months after baseline from the same participants. This study protocol outlines a trial which aims to add to the current state of intervention programs by presenting and studying a

  20. Physically Unclonable Cryptographic Primitives by Chemical Vapor Deposition of Layered MoS2.

    Science.gov (United States)

    Alharbi, Abdullah; Armstrong, Darren; Alharbi, Somayah; Shahrjerdi, Davood

    2017-12-26

    Physically unclonable cryptographic primitives are promising for securing the rapidly growing number of electronic devices. Here, we introduce physically unclonable primitives from layered molybdenum disulfide (MoS 2 ) by leveraging the natural randomness of their island growth during chemical vapor deposition (CVD). We synthesize a MoS 2 monolayer film covered with speckles of multilayer islands, where the growth process is engineered for an optimal speckle density. Using the Clark-Evans test, we confirm that the distribution of islands on the film exhibits complete spatial randomness, hence indicating the growth of multilayer speckles is a spatial Poisson process. Such a property is highly desirable for constructing unpredictable cryptographic primitives. The security primitive is an array of 2048 pixels fabricated from this film. The complex structure of the pixels makes the physical duplication of the array impossible (i.e., physically unclonable). A unique optical response is generated by applying an optical stimulus to the structure. The basis for this unique response is the dependence of the photoemission on the number of MoS 2 layers, which by design is random throughout the film. Using a threshold value for the photoemission, we convert the optical response into binary cryptographic keys. We show that the proper selection of this threshold is crucial for maximizing combination randomness and that the optimal value of the threshold is linked directly to the growth process. This study reveals an opportunity for generating robust and versatile security primitives from layered transition metal dichalcogenides.

  1. Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol

    Directory of Open Access Journals (Sweden)

    Seonho Choi

    2012-12-01

    Full Text Available A predictive-hashing based Denial-of-Service (DoS resistant multicast authentication protocol was proposed based upon predictive-hashing, one-way key chain, erasure codes, and distillation codes techniques [4, 5]. It was claimed that this new scheme should be more resistant to various types of DoS attacks, and its worst-case resource requirements were derived in terms of coarse-level system parameters including CPU times for signature verification and erasure/distillation decoding operations, attack levels, etc. To show the effectiveness of our approach and to analyze exact resource requirements in various attack scenarios with different parameter settings, we designed and implemented an attack simulator which is platformindependent. Various attack scenarios may be created with different attack types and parameters against a receiver equipped with the predictive-hashing based protocol. The design of the simulator is explained, and the simulation results are presented with detailed resource usage statistics. In addition, resistance level to various types of DoS attacks is formulated with a newly defined resistance metric. By comparing these results to those from another approach, PRABS [8], we show that the resistance level of our protocol is greatly enhanced even in the presence of many attack streams.

  2. Type-Based Automated Verification of Authenticity in Asymmetric Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten; Kobayashi, Naoki; Sun, Yunde

    2011-01-01

    Gordon and Jeffrey developed a type system for verification of asymmetric and symmetric cryptographic protocols. We propose a modified version of Gordon and Jeffrey's type system and develop a type inference algorithm for it, so that protocols can be verified automatically as they are, without any...... type annotations or explicit type casts. We have implemented a protocol verifier SpiCa based on the algorithm, and confirmed its effectiveness....

  3. Evaluation of an app-based stress protocol

    Directory of Open Access Journals (Sweden)

    Noeh Claudius

    2016-09-01

    Full Text Available Stress is a major influence on the quality of life in our fast-moving society. This paper describes a standardized and contemporary protocol that is capable of inducing moderate psychological stress in a laboratory setting. Furthermore, it evaluates its effects on physiological biomarkers. The protocol called “THM-Stresstest” mainly consists of a rest period (30 min, an app-based stress test under the surveillance of an audience (4 min and a regeneration period (32 min. We investigated 12 subjects to evaluate the developed protocol. We could show significant changes in heart rate variability, electromyography, electro dermal activity and salivary cortisol and α-amylase. From this data we conclude that the THM-Stresstest can serve as a psychobiological tool for provoking responses in the cardiovascular-, the endocrine and exocrine system as well as the sympathetic part of the central nervous system.

  4. Quantum deterministic key distribution protocols based on the authenticated entanglement channel

    International Nuclear Information System (INIS)

    Zhou Nanrun; Wang Lijun; Ding Jie; Gong Lihua

    2010-01-01

    Based on the quantum entanglement channel, two secure quantum deterministic key distribution (QDKD) protocols are proposed. Unlike quantum random key distribution (QRKD) protocols, the proposed QDKD protocols can distribute the deterministic key securely, which is of significant importance in the field of key management. The security of the proposed QDKD protocols is analyzed in detail using information theory. It is shown that the proposed QDKD protocols can safely and effectively hand over the deterministic key to the specific receiver and their physical implementation is feasible with current technology.

  5. Quantum deterministic key distribution protocols based on the authenticated entanglement channel

    Energy Technology Data Exchange (ETDEWEB)

    Zhou Nanrun; Wang Lijun; Ding Jie; Gong Lihua [Department of Electronic Information Engineering, Nanchang University, Nanchang 330031 (China)], E-mail: znr21@163.com, E-mail: znr21@hotmail.com

    2010-04-15

    Based on the quantum entanglement channel, two secure quantum deterministic key distribution (QDKD) protocols are proposed. Unlike quantum random key distribution (QRKD) protocols, the proposed QDKD protocols can distribute the deterministic key securely, which is of significant importance in the field of key management. The security of the proposed QDKD protocols is analyzed in detail using information theory. It is shown that the proposed QDKD protocols can safely and effectively hand over the deterministic key to the specific receiver and their physical implementation is feasible with current technology.

  6. Primitive Accumulation and Temporalities of Capitalism

    Directory of Open Access Journals (Sweden)

    Joanna Bednarek

    2015-04-01

    Full Text Available The main thesis of the article is the statement that capitalism is composed of many different, incoherent temporalities, as well as that apprehension of capitalism from the angle of primitive accumulation enables the more accurate grasp of the modes of its functioning, including the complexity created by the interactions of the temporalities mentionned. The problem of primitive accumulation is, as Sandro Mezzadra proves, a good starting point for analysing this issue. It allows us to pose two questions: first, the question of the relation between the historical dimension and the structural logic of capitalism; second, the question of hierarchical relation between the center and the periphery of the capitalist system.Dipesh Chakrabarty’s project of ‘provincializing Europe’ proves helpful here, as it’s goal is deconstruction of the categories of progress, modernization and the capital with its abstract structure. The aim is not to negate the fact that capitalist abstraction is a real force, but to show that this force develops by means of constant assimiliation of the other – redefined as ‘backward’ or archaic. The linear scheme is in force, because it is the main mechanism of imposing the power of capital; as such, it is not politically neutral.

  7. Cave men: stone tools, Victorian science, and the 'primitive mind' of deep time.

    Science.gov (United States)

    Pettitt, Paul B; White, Mark J

    2011-03-20

    Palaeoanthropology, the study of the evolution of humanity, arose in the nineteenth century. Excavations in Europe uncovered a series of archaeological sediments which provided proof that the antiquity of human life on Earth was far longer than the biblical six thousand years, and by the 1880s authors had constructed a basic paradigm of what 'primitive' human life was like. Here we examine the development of Victorian palaeoanthropology for what it reveals of the development of notions of cognitive evolution. It seems that Victorian specialists rarely addressed cognitive evolution explicitly, although several assumptions were generally made that arose from preconceptions derived from contemporary 'primitive' peoples. We identify three main phases of development of notions of the primitive mind in the period.

  8. Web-based cognitive behavioral relapse prevention program with tailored feedback for people with methamphetamine and other drug use problems: protocol for a multicenter randomized controlled trial in Japan.

    Science.gov (United States)

    Takano, Ayumi; Miyamoto, Yuki; Kawakami, Norito; Matsumoto, Toshihiko; Shinozaki, Tomohiro; Sugimoto, Takashi

    2016-04-04

    Despite the effectiveness of psychosocial programs for recovery from drug use problems, there have been challenges in implementation of treatment. Internet-based and computerized approaches have been known to be effective in treatment dissemination. The study purpose is to assess the effects of a web-based psychosocial relapse prevention program with a multicenter randomized controlled trial. Recruitment began in January 2015 for outpatient participants diagnosed with drug abuse or dependence who have used a primary abused drug in the past year at psychiatric hospitals and a clinic. Participants are randomized either to a web-based relapse prevention program or a self-monitoring group. The intervention is a web-based relapse prevention program named "e-SMARPP" that consists of six relapse prevention program modules with tailored feedback from health care professionals and 8 weeks of self-monitoring. The content is adapted from a face-to-face relapse prevention program which is based on cognitive behavioral therapy and motivational enhancement. The primary outcomes are relapse risk assessed by the Stimulant Relapse Risk Scale (baseline, 2-, 5- and 8-month) and the longest duration of consecutive abstinent days from primary abused drug during the intervention. Secondary outcomes will include motivation to change, self-efficacy for drug use and craving, abstinent days in the past 28 or 56 days, quality of life, sense of coherence, cost of substance use, medical cost, retention of treatment and use of self-help group. Completion, usability and satisfaction of the program will be also assessed to explore feasibility. This study protocol was approved by the Ethics Committee of The University of Tokyo and each recruiting hospital and clinic. To our knowledge, this study is the first clinical trial to assess the effects of a web-based therapeutic program for drug users in Japan. If successful, this program is a promising approach for drug user treatment in Japan, where the

  9. Global and exponential attractors of the three dimensional viscous primitive equations of large-scale moist atmosphere

    OpenAIRE

    You, Bo; Li, Fang

    2016-01-01

    This paper is concerned with the long-time behavior of solutions for the three dimensional viscous primitive equations of large-scale moist atmosphere. We prove the existence of a global attractor for the three dimensional viscous primitive equations of large-scale moist atmosphere by asymptotic a priori estimate and construct an exponential attractor by using the smoothing property of the semigroup generated by the three dimensional viscous primitive equations of large-scale moist atmosphere...

  10. A case of the persistence of the primitive hypoglossal artery with an enlarged hypoglossal canal

    International Nuclear Information System (INIS)

    Tomura, Noriaki; Inugami, Atsushi; Uemura, Kazuo; Asakura, Ken

    1987-01-01

    A case of the persistence of the primitive hypoglossal artery is reported, with a roentgenographic demonstration of the enlarged hypoglossal canal. A 63-year-old man was admitted to this hospital as a result of a malfunction of the ventriculo-peritoneal shunt. At the age of 51, the patient had been operated on in this hospital for an aneurysm of the right middle cerebral artery; at that time, the right primitive hypoglossal artery was observed on right carotid angiograms. On the day following admission, bilateral retrograde vertebral angiography was performed and the right persistent primitive hypoglossal artery was recognized again. Stenvers views of the skull demonstrated an enlargement of the hypoglossal canal, with a smooth sclerotic rim. High-resolution computed tomography with a contrast infusion delineated the right primitive hypoglossal artery through the enlarged hypoglossal canal. The diameter of the enlarged right hypoglossal canal and that of the left one were found to be 8 mm and 4 mm respectively on the CT. When an enlargement of the hypoglossal canal with a sclerotic rim is observed, the persistence of the primitive hypoglossal artery should be considered in the differential diagnosis. (author)

  11. Cohesion between two clay lamellae: From Primitive Model to Full Molecular Simulation

    International Nuclear Information System (INIS)

    Carrier, Benoit; Vandamme, Matthieu; Pellenq, Roland; Van Damme, Henri

    2012-01-01

    Document available in extended abstract form only. The objective of this work is to investigate the range of validity of various models to describe accurately the cohesion between two charged clay lamellae. These models, in order of increasing complexity, are the Derjaguin-Landau-Verwey-Overbeek (DLVO) theory, the primitive model, the explicit solvent primitive model and the full molecular model. We aim at providing a clear picture of which physical mechanisms play a significant role for various interlayer spacings, surface charges and cationic charges. The up-scaling of the mechanical properties starting from the lamellar microstructure of a smectite is usually performed within the framework of the DLVO theory. In this case, the interaction between two charged lamellae with cations between them is the sum of the repulsive double layer electrostatic interaction and of the attractive Van der Waals interaction. However, the Primitive Model shows that concentration fluctuations of counter-ions can generate a strongly attractive ionic correlation force. The Primitive Model is a Monte-Carlo simulation of hydrated counter-ions between two infinite charges surfaces and the water is implicitly modeled by scaling all electrostatic interactions by the dielectric permittivity of bulk water. Nevertheless, for very small inter-layer spacings (1 nm), molecular simulations and experiments show that water is organized in a layered structure and does not behave like bulk water. Therefore, we investigate the role of the solvent in the cohesion of clay lamellae. For this purpose, we use a modified version of the original Primitive Model in which the solvent is modeled by point-dipoles: This model is called the Explicit Solvent Primitive Model. We consider four different systems: A Na + -montmorillonite, a Ca 2+ -montmorillonite, a Na + -vermiculite, a Ca 2+ -vermiculite. The vermiculite layers are twice as charged as the montmorillonite layers. We use a full molecular model as a

  12. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    Science.gov (United States)

    Ray, Surjya Sarathi

    . Simulations show that the optimized ADV-MAC provides substantial energy gains (50% to 70% less than other MAC protocols for WSNs such as T-MAC and S-MAC for the scenarios investigated) while faring as well as T-MAC in terms of packet delivery ratio and latency. Although ADV-MAC provides substantial energy gains over S-MAC and T-MAC, it is not optimal in terms of energy savings because contention is done twice -- once in the Advertisement Period and once in the Data Period. In the next part of my research, the second contention in the Data Period is eliminated and the advantages of contention-based and TDMA-based protocols are combined to form Advertisement based Time-division Multiple Access (ATMA), a distributed TDMA-based MAC protocol for WSNs. ATMA utilizes the bursty nature of the traffic to prevent energy waste through advertisements and reservations for data slots. Extensive simulations and qualitative analysis show that with bursty traffic, ATMA outperforms contention-based protocols (S-MAC, T-MAC and ADV-MAC), a TDMA based protocol (TRAMA) and hybrid protocols (Z-MAC and IEEE 802.15.4). ATMA provides energy reductions of up to 80%, while providing the best packet delivery ratio (close to 100%) and latency among all the investigated protocols. Simulations alone cannot reflect many of the challenges faced by real implementations of MAC protocols, such as clock-drift, synchronization, imperfect physical layers, and irregular interference from other transmissions. Such issues may cripple a protocol that otherwise performs very well in software simulations. Hence, to validate my research, I conclude with a hardware implementation of the ATMA protocol on SORA (Software Radio), developed by Microsoft Research Asia. SORA is a reprogrammable Software Defined Radio (SDR) platform that satisfies the throughput and timing requirements of modern wireless protocols while utilizing the rich general purpose PC development environment. Experimental results obtained from the hardware

  13. A close look at the mammalian blastocyst: epiblast and primitive endoderm formation.

    Science.gov (United States)

    Artus, Jérôme; Chazaud, Claire

    2014-09-01

    During early development, the mammalian embryo undergoes a series of profound changes that lead to the formation of two extraembryonic tissues--the trophectoderm and the primitive endoderm. These tissues encapsulate the pluripotent epiblast at the time of implantation. The current model proposes that the formation of these lineages results from two consecutive binary cell fate decisions. The first controls the formation of the trophectoderm and the inner cell mass, and the second controls the formation of the primitive endoderm and the epiblast within the inner cell mass. While early mammalian embryos develop with extensive plasticity, the embryonic pattern prior to implantation is remarkably reproducible. Here, we review the molecular mechanisms driving the cell fate decision between primitive endoderm and epiblast in the mouse embryo and integrate data from recent studies into the current model of the molecular network regulating the segregation between these lineages and their subsequent differentiation.

  14. Morphological Study of Insoluble Organic Matter Residues from Primitive

    Science.gov (United States)

    Changela, H. G.; Stroud, R. M.; Peeters, Z.; Nittler, L. R.; Alexander, C. M. O'D.; DeGregorio, B. T.; Cody, G. D.

    2012-01-01

    Insoluble organic matter (IOM) constitutes a major proportion, 70-99%, of the total organic carbon found in primitive chondrites [1, 2]. One characteristic morphological component of IOM is nanoglobules [3, 4]. Some nanoglobules exhibit large N-15 and D enrichments relative to solar values, indicating that they likely originated in the ISM or the outskirts of the protoplanetary disk [3]. A recent study of samples from the Tagish Lake meteorite with varying levels of hydrothermal alteration suggest that nanoglobule abundance decreases with increasing hydrothermal alteration [5]. The aim of this study is to further document the morphologies of IOM from a range of primitive chondrites in order to determine any correlation of morphology with petrographic grade and chondrite class that could constrain the formation and/or alteration mechanisms.

  15. CT and MR findings of primitive neuroectodermal tumor

    International Nuclear Information System (INIS)

    Kook, Shin Ho; Kim, In One; Chang, Kee Hyun; Han, Moon Hee; Cho, Byung Kyu

    1991-01-01

    Cerebral primitive neuroectodermal tumor (PNET), consisting of undifferentiated primitive cells, is a neoplasm of children and young adults that occurs predominantly in the supratentorial compartment. In this report, we retrospectively reviewed and analyzed 18 CT and 6 MR findings in 18 patients with pathologically-proven PNET to discover the characteristic findings, if may. The most characteristic feature of the PNETs was a well-defined multilobular oval or round large mass with components of peripheral cystic change or calcification in the cerebral hemisphere, especially in the parietal lobe. Usually there was only minimal surrounding edema. The CT density of the tumor was iso - or slightly high density with homogeneous contrast enhancement in the solid portion and low density in the cystic area. MR findings demonstrated iso - signal intensity on both T1 - weighted (T1WI) and T2-weighted (T2WI) images and dense enhancement in the solid element. The cystic portion revealed low intensity on T1WI and high intensity on T2WI

  16. A lightweight neighbor-info-based routing protocol for no-base-station taxi-call system.

    Science.gov (United States)

    Zhu, Xudong; Wang, Jinhang; Chen, Yunchao

    2014-01-01

    Since the quick topology change and short connection duration, the VANET has had unstable routing and wireless signal quality. This paper proposes a kind of lightweight routing protocol-LNIB for call system without base station, which is applicable to the urban taxis. LNIB maintains and predicts neighbor information dynamically, thus finding the reliable path between the source and the target. This paper describes the protocol in detail and evaluates the performance of this protocol by simulating under different nodes density and speed. The result of evaluation shows that the performance of LNIB is better than AODV which is a classic protocol in taxi-call scene.

  17. An efficient multi-carrier position-based packet forwarding protocol for wireless sensor networks

    KAUST Repository

    Bader, Ahmed

    2012-01-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. However, as the node density grows, the overhead incurred in the process of relay selection grows significantly. As such, end-to-end performance in terms of energy and latency is adversely impacted. With the motivation of developing a packet forwarding mechanism that is tolerant to variation in node density, an alternative position-based protocol is proposed in this paper. In contrast to existing beaconless protocols, the proposed protocol is designed such that it eliminates the need for potential relays to undergo a relay selection process. Rather, any eligible relay may decide to forward the packet ahead, thus significantly reducing the underlying overhead. The operation of the proposed protocol is empowered by exploiting favorable features of orthogonal frequency division multiplexing (OFDM) at the physical layer. The end-to-end performance of the proposed protocol is evaluated against existing beaconless position-based protocols analytically and as well by means of simulations. The proposed protocol is demonstrated in this paper to be more efficient. In particular, it is shown that for the same amount of energy the proposed protocol transports one bit from source to destination much quicker. © 2012 IEEE.

  18. Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    Woo-Yong Choi

    2009-01-01

    Full Text Available We propose the efficient reliable multicast MAC protocol based on the connectivity information among the recipients. Enhancing the BMMM (Batch Mode Multicast MAC protocol, the reliable multicast MAC protocol significantly reduces the RAK (Request for ACK frame transmissions in a reasonable computational time and enhances the MAC performance. By the analytical performance analysis, the throughputs of the BMMM protocol and our proposed MAC protocol are derived. Numerical examples show that our proposed MAC protocol increases the reliable multicast MAC performance for IEEE 802.11 wireless LANs.

  19. Conducting Clinically Based Intimate Partner Violence Research: Safety Protocol Recommendations.

    Science.gov (United States)

    Anderson, Jocelyn C; Glass, Nancy E; Campbell, Jacquelyn C

    Maintaining safety is of utmost importance during research involving participants who have experienced intimate partner violence (IPV). Limited guidance on safety protocols to protect participants is available, particularly information related to technology-based approaches to informed consent, data collection, and contacting participants during the course of a study. The purpose of the article is to provide details on the safety protocol developed and utilized with women receiving care at an urban HIV clinic and who were taking part in an observational study of IPV, mental health symptoms, and substance abuse and their relationship to HIV treatment adherence. The protocol presents the technological strategies to promote safety and allow autonomy in participant decision-making throughout the research process, including Voice over Internet Protocol telephone numbers, and tablet-based eligibility screening and data collection. Protocols for management of participants at risk for suicide and/or intimate partner homicide that included automated high-risk messaging to participants and research staff and facilitated disclosure of risk to clinical staff based on participant preferences are discussed. Use of technology and partnership with clinic staff helped to provide an environment where research regarding IPV could be conducted without undue burden or risk to participants. Utilizing tablet-based survey administration provided multiple practical and safety benefits for participants. Most women who screened into high-risk categories for suicide or intimate partner homicide did not choose to have their results shared with their healthcare providers, indicating the importance of allowing participants control over information sharing whenever possible.

  20. Weaknesses of a dynamic identity based authentication protocol for multi-server architecture

    OpenAIRE

    Han, Weiwei

    2012-01-01

    Recently, Li et al. proposed a dynamic identity based authentication protocol for multi-server architecture. They claimed their protocol is secure and can withstand various attacks. But we found some security loopholes in the protocol. Accordingly, the current paper demonstrates that Li et al.'s protocol is vulnerable to the replay attack, the password guessing attack and the masquerade attack.

  1. Effectiveness of the universal prevention program 'Healthy School and Drugs': Study protocol of a randomized clustered trial

    Directory of Open Access Journals (Sweden)

    Malmberg Monique

    2010-09-01

    Full Text Available Abstract Background Substance use is highly prevalent among Dutch adolescents. The Healthy School and Drugs program is a nationally implemented school-based prevention program aimed at reducing early and excessive substance use among adolescents. Although the program's effectiveness was tested in a quasi-experimental design before, many program changes were made afterwards. The present study, therefore, aims to test the effects of this widely used, renewed universal prevention program. Methods/Design A randomized clustered trial will be conducted among 3,784 adolescents of 23 secondary schools in The Netherlands. The trial has three conditions; two intervention conditions (i.e., e-learning and integral and a control condition. The e-learning condition consists of three digital learning modules (i.e., about alcohol, tobacco, and marijuana that are sequentially offered over the course of three school years (i.e., grade 1, grade 2, and grade 3. The integral condition consists of parental participation in a parental meeting on substance use, regulation of substance use, and monitoring and counseling of students' substance use at school, over and above the three digital modules. The control condition is characterized as business as usual. Participating schools were randomly assigned to either an intervention or control condition. Participants filled out a digital questionnaire at baseline and will fill out the same questionnaire three more times at follow-up measurements (8, 20, and 32 months after baseline. Outcome variables included in the questionnaire are the percentage of binge drinking (more than five drinks per occasion, the average weekly number of drinks, and the percentage of adolescents who ever drunk a glass of alcohol and the percentage of adolescents who ever smoked a cigarette or a joint respectively for tobacco and marijuana. Discussion This study protocol describes the design of a randomized clustered trial that evaluates the

  2. A Weak Value Based QKD Protocol Robust Against Detector Attacks

    Science.gov (United States)

    Troupe, James

    2015-03-01

    We propose a variation of the BB84 quantum key distribution protocol that utilizes the properties of weak values to insure the validity of the quantum bit error rate estimates used to detect an eavesdropper. The protocol is shown theoretically to be secure against recently demonstrated attacks utilizing detector blinding and control and should also be robust against all detector based hacking. Importantly, the new protocol promises to achieve this additional security without negatively impacting the secure key generation rate as compared to that originally promised by the standard BB84 scheme. Implementation of the weak measurements needed by the protocol should be very feasible using standard quantum optical techniques.

  3. Missing relationship of moyamoya and persistent primitive artery in Europeans. Another distinctive feature or artifact?

    Science.gov (United States)

    Wenz, Holger; Wenz, Ralf; Förster, Alex; Fontana, Johann; Kerl, Hans Ulrich; Groden, Christoph; Scharf, Johann

    2015-11-01

    Previous studies found higher incidence of persistent primitive arteries in Asian moyamoya (MM) patients than in the general population, which was thought to be a characteristic trait of the MM entity in general. We analyzed incidence of persistent primitive arteries and demographics of patients with European MM treated in one single center. First, we compared our large dataset to existing literature and second, we raised the question whether European MM demonstrates similar high prevalence of persistent primitive arteries as it was previously presented within Asian MM. All European MM on whom revascularization surgery was performed from 1999 to 2013 were included. Demographics and associated diseases were obtained by retrospective chart review. Two independent readers evaluated 122 MM angiograms to determine the occurrence of persistent primitive arteries as well as the Suzuki score. We identified 112 cases with MM disease, 10 with MM syndrome. Mean age at time of diagnosis was 38.2 (range 6-64 years); a peak incidence in early childhood was not observed. Ninety (73.8%) were women, associated systemic diseases were found in four patients. Seven cases (5.7%) presented with unilaterally affected vessels. The majority of patients (71; 58.2%) were graded Suzuki Score 3. One 14-year-old boy with moyamoya presented with a primitive trigeminal artery (0.89%). We did not find a bimodal age distribution, but only a second peak during adulthood. Unlike previous studies on Asian moyamoya patients, our collective does not exhibit a higher prevalence of persistent primitive arteries than the normal population.

  4. Transgression, Nostalgia, Order: Representation of the Primitive in Émile Zola's La Terre and Knut Hamsun's Markens grøde

    Directory of Open Access Journals (Sweden)

    Riikka Rossi

    2012-03-01

    Full Text Available This article examines the representation of the primitive in two peasant novels, Émile Zola's La Terre (1887, trans. as The Earth and Knut Hamsun's Markens grøde (1917, trans. as Growth of the Soil. The concept of the primitive crosses a wide range of issues that were central to naturalist and decadent literature at the turn of the twentieth century, from unconscious instincts to the fascination with exotic cultures. It thus offers a fruitful medium for the comparative reading of French and Nordic fiction of the era. I especially focus on analysing the diverse, representative practices of Zola's and Hamsun's works, which betray stylistic differences in their portrayal of the primitive. I suggest that by describing the primitive as a vital, transgressive force that even turns against itself - against nature - Zola's La Terre creates a decadent version of the primitive, which, instead of a "serious", naturalistic portrayal of everyday life, is drawn to the brutal, instinctive primitive and uses the primitive to create vital forces of transgression. Hamsun's neo-naturalist novel, in turn, reconfigures the naturalist themes in a new form and envisions a fusion of the Darwinian, naturalistic primitive and the Romantic cult of innocent primordiality, suggesting the primitive lifestyle as a nostalgic return to a pre-modern lifestyle and a turn away from the degeneration of modernity.

  5. Studying protocol-based pain management in the emergency department

    Directory of Open Access Journals (Sweden)

    Akkamahadevi Patil

    2017-01-01

    Full Text Available Background: Majority of the patients presenting to emergency department (ED have pain. ED oligoanalgesia remains a challenge. Aims: This study aims to study the effect of implementing a protocol-based pain management in the ED on (1 time to analgesia and (2 adequacy of analgesia obtained. Settings and Design: Cross-sectional study in the ED. Methods: Patients aged 18–65 years of age with pain of numeric rating scale (NRS ≥4 were included. A series of 100 patients presenting before introduction of the protocol-based pain management were grouped “pre-protocol,” and managed as per existing practice. Following this, a protocol for management of all patients presenting to ED with pain was implemented. Another series of 100 were grouped as “post-protocol” and managed as per the new pain management protocol. The data of patients from both the groups were collected and analyzed. Statistical Analysis Used: Descriptive statistical tests such as percentage, mean and standard deviation and inferential statistical tests such as Pearson coefficient, Student's t-test were applied. Differences were interpreted as significant when P < 0.05. Results: Mean time to administer analgesic was significantly lesser in the postprotocol group (preprotocol 20.30 min vs. postprotocol 13.05 min; P < 0.001. There was significant difference in the pain relief achieved (change in NRS between the two groups, with greater pain relief achieved in the postprotocol group (preprotocol group 4.6800 vs. postprotocol group 5.3600; P < 0.001. Patients' rating of pain relief (assessed on E5 scale was significantly higher in the postprotocol group (preprotocol 3.91 vs. postprotocol 4.27; P = 0.001. Patients' satisfaction (North American Spine Society scale with the overall treatment was also compared and found to be significantly higher in postprotocol group (mean: preprotocol 1.59 vs. postprotocol 1.39; P = 0.008. Conclusion: Protocol-based pain management provided timely and

  6. Interaction learning for dynamic movement primitives used in cooperative robotic tasks

    DEFF Research Database (Denmark)

    Kulvicius, Tomas; Biehl, Martin; Aein, Mohamad Javad

    2013-01-01

    Abstract Since several years dynamic movement primitives (DMPs) are more and more getting into the center of interest for flexible movement control in robotics. In this study we introduce sensory feedback together with a predictive learning mechanism which allows tightly coupled dual-agent systems...... to learn an adaptive, sensor-driven interaction based on DMPs. The coupled conventional (no-sensors, no learning) DMP-system automatically equilibrates and can still be solved analytically allowing us to derive conditions for stability. When adding adaptive sensor control we can show that both agents learn...

  7. Feasibility of a Research Protocol to Investigate the Effect of the TherapressureTM Program Using Salivary Cortisol

    Directory of Open Access Journals (Sweden)

    Scott Weeks

    2016-04-01

    Full Text Available Background: There is an absence of high quality research to support the use of the Therapressure ProgramTM. This pilot study aimed at developing appropriate research protocols to investigate the effectiveness of the Therapressure ProgramTM on the stress response in children with sensory overresponsivity. Method: A one-group pre-test/post-test repeated measures design was conducted using a convenience sample. Six children (6-8 years of age with sensory overresponsivity received 14 consecutive days of the Therapressure ProgramTM by their parents at home. Parents concurrently collected salivary cortisol samples from their children. Results: Children with sensory overresponsivity displayed both hyper- and hypo-cortisolism at baseline. All of the children’s cortisol levels shifted toward a normative range after intervention. Aspects have been identified related to the data collection protocol. Conclusion: When testing children with sensory overresponsivity who are constantly activating their stress response system, we raise awareness of the need to check for both hyper- and hypo-cortisolism during statistical analysis. Preliminary pilot data may also show modulation of sympathetic arousal following the intervention. Further research is warranted and recommendations are made related to data collection protocols.

  8. A Scenario-Based Protocol Checker for Public-Key Authentication Scheme

    Science.gov (United States)

    Saito, Takamichi

    Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).

  9. Language Issues in Mobile Program Security

    Science.gov (United States)

    1998-01-01

    primitives for instance synchronous operations Nondeterminism and Privacy Now suppose we introduce nondeterminism via a simple concurrent language...code setting is that the only observable events are those that can be observed from within a mobile program using language primitives and any host...Possibilistic NI is given in It uses a main thread and two triggered threads each with a busy wait loop implementing a semaphore to copy every bit of

  10. Language pathway tracking: comparing nTMS-based DTI fiber tracking with a cubic ROIs-based protocol.

    Science.gov (United States)

    Negwer, Chiara; Sollmann, Nico; Ille, Sebastian; Hauck, Theresa; Maurer, Stefanie; Kirschke, Jan S; Ringel, Florian; Meyer, Bernhard; Krieg, Sandro M

    2017-03-01

    OBJECTIVE Diffusion tensor imaging (DTI) fiber tracking (FT) has been widely used in glioma surgery in recent years. It can provide helpful information about subcortical structures, especially in patients with eloquent space-occupying lesions. This study compared the newly developed navigated transcranial magnetic stimulation (nTMS)-based DTI FT of language pathways with the most reproducible protocol for language pathway tractography, using cubic regions of interest (ROIs) for the arcuate fascicle. METHODS Thirty-seven patients with left-sided perisylvian lesions underwent language mapping by repetitive nTMS. DTI FT was performed using the cubic ROIs-based protocol and the authors' nTMS-based DTI FT approach. The same minimal fiber length and fractional anisotropy were chosen (50 mm and 0.2, respectively). Both protocols were performed with standard clinical tractography software. RESULTS Both methods visualized language-related fiber tracts (i.e., corticonuclear tract, arcuate fascicle, uncinate fascicle, superior longitudinal fascicle, inferior longitudinal fascicle, arcuate fibers, commissural fibers, corticothalamic fibers, and frontooccipital fascicle) in all 37 patients. Using the cubic ROIs-based protocol, 39.9% of these language-related fiber tracts were detected in the examined patients, as opposed to 76.0% when performing nTMS-based DTI FT. For specifically tracking the arcuate fascicle, however, the cubic ROIs-based approach showed better results (97.3% vs 75.7% with nTMS-based DTI FT). CONCLUSIONS The cubic ROIs-based protocol was designed for arcuate fascicle tractography, and this study shows that it is still useful for this intention. However, superior results were obtained using the nTMS-based DTI FT for visualization of other language-related fiber tracts.

  11. Management of Energy Consumption on Cluster Based Routing Protocol for MANET

    Science.gov (United States)

    Hosseini-Seno, Seyed-Amin; Wan, Tat-Chee; Budiarto, Rahmat; Yamada, Masashi

    The usage of light-weight mobile devices is increasing rapidly, leading to demand for more telecommunication services. Consequently, mobile ad hoc networks and their applications have become feasible with the proliferation of light-weight mobile devices. Many protocols have been developed to handle service discovery and routing in ad hoc networks. However, the majority of them did not consider one critical aspect of this type of network, which is the limited of available energy in each node. Cluster Based Routing Protocol (CBRP) is a robust/scalable routing protocol for Mobile Ad hoc Networks (MANETs) and superior to existing protocols such as Ad hoc On-demand Distance Vector (AODV) in terms of throughput and overhead. Therefore, based on this strength, methods to increase the efficiency of energy usage are incorporated into CBRP in this work. In order to increase the stability (in term of life-time) of the network and to decrease the energy consumption of inter-cluster gateway nodes, an Enhanced Gateway Cluster Based Routing Protocol (EGCBRP) is proposed. Three methods have been introduced by EGCBRP as enhancements to the CBRP: improving the election of cluster Heads (CHs) in CBRP which is based on the maximum available energy level, implementing load balancing for inter-cluster traffic using multiple gateways, and implementing sleep state for gateway nodes to further save the energy. Furthermore, we propose an Energy Efficient Cluster Based Routing Protocol (EECBRP) which extends the EGCBRP sleep state concept into all idle member nodes, excluding the active nodes in all clusters. The experiment results show that the EGCBRP decreases the overall energy consumption of the gateway nodes up to 10% and the EECBRP reduces the energy consumption of the member nodes up to 60%, both of which in turn contribute to stabilizing the network.

  12. Application of a primitive variable Newton's method for the calculation of an axisymmetric laminar diffusion flame

    International Nuclear Information System (INIS)

    Xu, Yuenong; Smooke, M.D.

    1993-01-01

    In this paper we present a primitive variable Newton-based solution method with a block-line linear equation solver for the calculation of reacting flows. The present approach is compared with the stream function-vorticity Newton's method and the SIMPLER algorithm on the calculation of a system of fully elliptic equations governing an axisymmetric methane-air laminar diffusion flame. The chemical reaction is modeled by the flame sheet approximation. The numerical solution agrees well with experimental data in the major chemical species. The comparison of three sets of numerical results indicates that the stream function-vorticity solution using the approximate boundary conditions reported in the previous calculations predicts a longer flame length and a broader flame shape. With a new set of modified vorticity boundary conditions, we obtain agreement between the primitive variable and stream function-vorticity solutions. The primitive variable Newton's method converges much faster than the other two methods. Because of much less computer memory required for the block-line tridiagonal solver compared to a direct solver, the present approach makes it possible to calculate multidimensional flames with detailed reaction mechanisms. The SIMPLER algorithm shows a slow convergence rate compared to the other two methods in the present calculation

  13. What does it cost to deliver information using position-based beaconless forwarding protocols?

    KAUST Repository

    Bader, Ahmed

    2012-04-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. Quite a few variants of this class of forwarding protocols have been proposed over the years. One common observation is that they have all been evaluated from the perspective of a single node. Although useful, but a solid understanding of the end-to-end performance is still necessary. In this paper, we shed light on the end-to-end performance of beaconless position-based protocols along three distinct dimensions: energy, latency, and back-off probability. The latter is used as a direct indicator of the network\\'s transport capacity. Consequently, we are able to provide an elaborate response to the question: what does it really cost to deliver a packet in a wireless sensor network using position-based beaconless forwarding protocols? In responding to this question, we highlighted the different performance tradeoffs inherent to beaconless position-based protocols. Furthermore, some operational recommendations are also provided. © 2012 IEEE.

  14. What does it cost to deliver information using position-based beaconless forwarding protocols?

    KAUST Repository

    Bader, Ahmed; Abed-Meraim, Karim; Alouini, Mohamed-Slim

    2012-01-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. Quite a few variants of this class of forwarding protocols have been proposed over the years. One common observation is that they have all been evaluated from the perspective of a single node. Although useful, but a solid understanding of the end-to-end performance is still necessary. In this paper, we shed light on the end-to-end performance of beaconless position-based protocols along three distinct dimensions: energy, latency, and back-off probability. The latter is used as a direct indicator of the network's transport capacity. Consequently, we are able to provide an elaborate response to the question: what does it really cost to deliver a packet in a wireless sensor network using position-based beaconless forwarding protocols? In responding to this question, we highlighted the different performance tradeoffs inherent to beaconless position-based protocols. Furthermore, some operational recommendations are also provided. © 2012 IEEE.

  15. Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus

    OpenAIRE

    Abraham, Ittai; Malkhi, Dahlia; Nayak, Kartik; Ren, Ling; Spiegelman, Alexander

    2018-01-01

    The decentralized cryptocurrency Bitcoin has experienced great success but also encountered many challenges. One of the challenges has been the long confirmation time. Another chal- lenge is the lack of incentives at certain steps of the protocol, raising concerns for transaction withholding, selfish mining, etc. To address these challenges, we propose Solida, a decentralized blockchain protocol based on reconfigurable Byzantine consensus augmented by proof-of-work. Solida improves on Bitcoin...

  16. Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus

    OpenAIRE

    Abraham, Ittai; Malkhi, Dahlia; Nayak, Kartik; Ren, Ling; Spiegelman, Alexander

    2016-01-01

    The decentralized cryptocurrency Bitcoin has experienced great success but also encountered many challenges. One of the challenges has been the long confirmation time. Another challenge is the lack of incentives at certain steps of the protocol, raising concerns for transaction withholding, selfish mining, etc. To address these challenges, we propose Solida, a decentralized blockchain protocol based on reconfigurable Byzantine consensus augmented by proof-of-work. Solida improves on Bitcoin i...

  17. The European Innovation Partnership on Active and Healthy Ageing synergies: protocol for a prospective observational study to measure the Impact of a community-based program on prevention and mitigation of frailty (ICP – PMF) in community-dwelling older adults

    NARCIS (Netherlands)

    Liotta, G.; Orfila, F.; Vollenbroek-Hutten, Miriam Marie Rosé; Roller-Winsberger, R.; Illaria, M.; Musian, D.; Alvino, S.; O'Caoimh, R.; Cano, A.; Molloy, W.; Iaccarino, G.; Marazzi, M.C.; Inzerilli, M.C.; Madaro, O.; Paul, C.; Csonka, P.; Vince, A.C.; Menditto, E.; Maggio, M.; Scarcella, P.; Gilardi, F.; Lucaroni, F.; Abete, P.; Girardi, V.; Barra, R.; Palombi, L.

    2016-01-01

    Aim of this paper is to describe the protocol of the study “Impact of a Community-based Program on Prevention and Mitigation of Frailty in community-dwelling older adults‿ developed in the framework of the European Innovation Partnership on Active and Healthy Ageing. This proposal has been developed

  18. Effectiveness of a web-based treatment program using intensive therapeutic support for female patients with bulimia nervosa, binge eating disorder and eating disorders not otherwise specified: study protocol of a randomized controlled trial.

    Science.gov (United States)

    ter Huurne, Elke D; Postel, Marloes G; de Haan, Hein A; DeJong, Cor A J

    2013-11-16

    RCTs. This study protocol presents the design of a RCT for evaluating the effectiveness of a web-based treatment program using intensive therapeutic support for female patients with bulimia nervosa, binge eating disorder and eating disorders not otherwise specified. The protocol for this study is registered with the Netherlands Trial Registry NTR2415.

  19. Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols

    DEFF Research Database (Denmark)

    Mikkelsen, Gert Læssøe; Keller, Marcel; Rupp, Andy

    2012-01-01

    , such as identification schemes, electronic cash (e-cash), and anonymous credentials. We present a security model for threshold proofs of knowledge and develop threshold versions of well-known primitives such as range proofs, zero-knowledge proofs for preimages of homomorphisms (which generalizes PoKs of discrete...... efficient (when compared to a general MPC approach). In comparison to the original protocols only the prover’s (or user’s) side is modified while the other side stays untouched. In particular, it is oblivious to the other party whether it interacts with a distributed prover (or user) or one as defined...

  20. Addressing Nature Deficit Disorder through Primitive Camping Experiences

    Science.gov (United States)

    Allen, Kevin; Varner, Keegan; Sallee, Jeff

    2011-01-01

    Today's youth suffer from Nature Deficit Disorder, a condition that has been connected to ADHD, shortage of creativity, and general lack of knowledge about the outdoors. A team of educators and specialists are addressing this issue with primitive camping. County educators were trained using experiential learning and train-the-trainer techniques.…

  1. Experimental eavesdropping attack against Ekert's protocol based on Wigner's inequality

    International Nuclear Information System (INIS)

    Bovino, F. A.; Colla, A. M.; Castagnoli, G.; Castelletto, S.; Degiovanni, I. P.; Rastello, M. L.

    2003-01-01

    We experimentally implemented an eavesdropping attack against the Ekert protocol for quantum key distribution based on the Wigner inequality. We demonstrate a serious lack of security of this protocol when the eavesdropper gains total control of the source. In addition we tested a modified Wigner inequality which should guarantee a secure quantum key distribution

  2. Future-based Static Analysis of Message Passing Programs

    Directory of Open Access Journals (Sweden)

    Wytse Oortwijn

    2016-06-01

    Full Text Available Message passing is widely used in industry to develop programs consisting of several distributed communicating components. Developing functionally correct message passing software is very challenging due to the concurrent nature of message exchanges. Nonetheless, many safety-critical applications rely on the message passing paradigm, including air traffic control systems and emergency services, which makes proving their correctness crucial. We focus on the modular verification of MPI programs by statically verifying concrete Java code. We use separation logic to reason about local correctness and define abstractions of the communication protocol in the process algebra used by mCRL2. We call these abstractions futures as they predict how components will interact during program execution. We establish a provable link between futures and program code and analyse the abstract futures via model checking to prove global correctness. Finally, we verify a leader election protocol to demonstrate our approach.

  3. A randomised controlled trial of a community-based healthy lifestyle program for overweight and obese adolescents: the Loozit® study protocol

    Directory of Open Access Journals (Sweden)

    Shah Smita

    2009-04-01

    Full Text Available Abstract Background There is a need to develop sustainable and clinically effective weight management interventions that are suitable for delivery in community settings where the vast majority of overweight and obese adolescents should be treated. This study aims to evaluate the effect of additional therapeutic contact as an adjunct to the Loozit® group program – a community-based, lifestyle intervention for overweight and lower grade obesity in adolescents. The additional therapeutic contact is provided via telephone coaching and either mobile phone Short Message Service or electronic mail, or both. Methods and design The study design is a two-arm randomised controlled trial that aims to recruit 168 overweight and obese 13–16 year olds (Body Mass Index z-score 1.0 to 2.5 in Sydney, Australia. Adolescents with secondary causes of obesity or significant medical illness are excluded. Participants are recruited via schools, media coverage, health professionals and several community organisations. Study arm one receives the Loozit® group weight management program (G. Study arm two receives the same Loozit® group weight management program plus additional therapeutic contact (G+ATC. The 'G' intervention consists of two phases. Phase 1 involves seven weekly group sessions held separately for adolescents and their parents. This is followed by phase 2 that involves a further seven group sessions held regularly, for adolescents only, until two years follow-up. Additional therapeutic contact is provided to adolescents in the 'G+ATC' study arm approximately once per fortnight during phase 2 only. Outcome measurements are assessed at 2, 12 and 24 months post-baseline and include: BMI z-score, waist z-score, metabolic profile indicators, physical activity, sedentary behaviour, eating patterns, and psychosocial well-being. Discussion The Loozit® study is the first randomised controlled trial of a community-based adolescent weight management

  4. The Syntax of Time and Space Primitives in French.

    Science.gov (United States)

    Peeters, Bert

    1997-01-01

    Explores the combinatorial possibilities of semantic primitives of time and space in French, as defined in the theory of Natural Semantic Metalanguage. Highlights the need for new ways to express the allolexical relationship in some combinations, particularly those expressing "when/time." (Author/MSE)

  5. Individualized music for dementia: Evolution and application of evidence-based protocol.

    Science.gov (United States)

    Gerdner, Linda A

    2012-04-22

    The theory-based intervention of individualized music has been evaluated clinically and empirically leading to advancement and refinement of an evidence-based protocol, currently in its 5th edition. An expanded version of the protocol was written for professional health care providers with a consumer version tailored for family caregivers. The underlying mid-range theory is presented along with a seminal study that was followed by further research in the United States, Canada, Great Britain, France, Sweden, Norway, Japan and Taiwan. Key studies are summarized. Given its efficacy when implemented by research staff, studies have advanced to testing the intervention under real-life conditions when implemented and evaluated by trained nursing assistants in long-term care facilities and visiting family members. In addition, one study evaluated the implementation of music by family members in the home setting. Initial research focused on agitation as the dependent variable with subsequent research indicating a more holistic response such as positive affect, expressed satisfaction, and meaningful interaction with others. The article advances by describing on-line programs designed to train health care professionals in the assessment, implementation and evaluation of individualized music. In addition, Gerdner has written a story for a picture book intended for children and their families (in press). The story models principles of individualized music to elicit positive memories, reduce anxiety and agitation, and promote communication. The article concludes with implications for future research.

  6. Telemetry Standards, IRIG Standard 106-17, Chapter 22, Network Based Protocol Suite

    Science.gov (United States)

    2017-07-01

    requirements. 22.2 Network Access Layer 22.2.1 Physical Layer Connectors and cable media should meet the electrical or optical properties required by the...Telemetry Standards, IRIG Standard 106-17 Chapter 22, July 2017 i CHAPTER 22 Network -Based Protocol Suite Acronyms...iii Chapter 22. Network -Based Protocol Suite

  7. Knowledge-Based Multiple Access Protocol in Broadband Wireless ATM Networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    1999-01-01

    In this paper, we propose a knowledge-based multiple access protocol for the extension of wireline ATM to wireless networks. The objective is to enable effecient transmission of all kinds of ATM traffic in the wireless channel with guaranteed QoS.The proposed protocol utilixes knowledge of the main...... guaranteed QoS requirements to a variety of ATM applications....

  8. A Multi-Center Randomized Controlled Trial of Adding Brief Skill-Based Psychoeducation to Primary Needle and Syringe Programs to prevent Human Immunodeficiency Virus: Study Protocol.

    Directory of Open Access Journals (Sweden)

    Morteza Naserbakht

    2014-09-01

    Full Text Available Our objective was to design an RCT in order to assess the effects of adding a brief skill-based psychoeducation (PE to routine Needle and Syringe Programs to reduce injection and high risk sexual behaviors associated with Human Immunodeficiency Virus (HIV infection among referrals of Drop-in Centers (DICs.This was a randomized control trial with the primary hypothesis that adding skill-based PE to the routine needle syringe program (NSP provided in the DICs would be more effective in reducing injection and high risk sexual behaviors associated with HIV infection compared to the routine programs. We intended to randomly allocate 60 patients per group after obtaining informed written consent,. The intervention group receive a combination of brief psychoeducation consisting two individual sessions of skill-based education concerning blood borne viral infection, specifically HIV. The control group received the routine primary NSP services provided in DIC. Study assessments were undertaken by a psychologist at baseline, 1 and 3 months after recruitment. The primary outcome measure was the comparison of the trend of alterations in high risk sexual and injection behaviors associated with HIV infection during 3 months after the initiation of the intervention between the two groups. Secondary outcome measures included the comparison of HIV/AIDS related knowledge and client satisfaction in the participants.This paper presents a protocol for an RCT of brief skill-based PE by a trained psychologist to reduce the sexual and injection related high risk behaviors among drug users who received primary NSP services in DIC. This trial tried to investigate the efficacy of the intervention on increasing HIV/AIDS related knowledge and client satisfaction. The results of different indicators of high risk behaviors will be discussed.

  9. Primary primitive neuroectodermal tumor of the orbit

    Directory of Open Access Journals (Sweden)

    Das Dipankar

    2009-01-01

    Full Text Available Primitive neuroectodermal tumor (PNET is a small round cell malignant tumor of neuroectodermal origin. Most of the PNETs occur in the central nervous system (CNS. PNETs recognized outside of CNS are diagnosed as peripheral PNET (pPNET. This tumor which expresses MIC-2 gene (CD99 seems to be least aggressive after complete tumor resection. We describe a rare case of PNET in a young girl.

  10. Data acquisition and meter unit based in wifi communication protocol

    Directory of Open Access Journals (Sweden)

    Gerardo Cázarez Ayala

    2012-05-01

    Full Text Available Without doubt, the competitive fast rhythm of the industries is one of the main causes helped bring to the accelerated growth of the electronic technology and the communication. The need to develop new products with a best quality, cheaper and faster as assure and increase the quality of the products in the international markets, requires of new technologies to the metering, monitoring and control of their production processes, of which finality is to improve the processes to guaranteed their products in the market in the less time possible, the best quality and low cost for the final consumer. This work is based in the design and implementation of a Wireless Data Acquisition Unit based in WiFi protocol, which is oriented to meter, monitoring and the control of processes in the industry, commercial and the home automation applications, using one of the wirelessprotocols with the biggest acceptance in the market, with the main objective of to take advantage of the installed physical infrastructure in the place of the application, like industry, company or house. The Unit is based in the RN-131G, a Roving Network company module, which is able to work in stand-alone mode with ultralow power consummation and supporting the IEEE 802.11b/g protocols, in which is possible to achieve transfer rates of up to 11 Mbps and 54 Mbps in /b & /g specifications respectively. Whit this unit is possible to meter up to 5 analogs signals with 14 bits precision and has include a temperature and relative humidity sensors. This unit can meter two digital signals and act mean two digitals outputs, and gas include an USB port for communication and programming tasks.

  11. The Project Based Mechanisms of the Kyoto Protocol. Credible Instruments or Challenges to the Integrity of the Kyoto Protocol?

    Energy Technology Data Exchange (ETDEWEB)

    Takeuchi Waldegren, Linn

    2006-03-15

    The project based mechanisms of the Kyoto Protocol are innovative instruments which allow projects to earn credits for reducing greenhouse gas (GHG) emissions. The credits can in turn be used by countries to reach their emissions targets according to the Kyoto Protocol. The Project based mechanisms are known as the Clean Development Mechanism (CDM) and the Joint Implementation (JI). If the project based mechanisms are to be effective policy instruments they must ensure the integrity of the Kyoto Protocol, and their ability to promote and prove real emission reductions is critical. The environmental credibility of the project based mechanisms will also ensure their ability to promote cost effectiveness. Key concepts in this context are environmental and project additionality, and their role and value for the project based mechanisms are analyzed. Environmental additionality is established by comparing a project's emissions to a baseline. The baseline's credibility is thus vital. The concept of project additionality is somewhat controversial, but is nonetheless of equal importance. The case studies of CDM approved methodologies (AMs) and proposed projects suggest that there are credibility issues that need to be addressed if the project based mechanisms are to promote real emissions reductions.

  12. HEALS: A Faith-Based Hypertension Control and Prevention Program for African American Churches: Training of Church Leaders as Program Interventionists.

    Science.gov (United States)

    Dodani, Sunita; Sullivan, Debra; Pankey, Sydney; Champagne, Catherine

    2011-01-01

    Background. A 12-session church-based HEALS program (healthy eating and living spiritually) was developed for hypertension control and prevention program in African Americans (AAs). This study presents specifics of training lay health educators to effectively deliver HEALS to high-risk AAs. Methods. A one-day workshop was conducted by the research experts in an AA church. Five church members were recruited to be program interventionists called church health counselors (CHCs). Results. Using principles of adult education, a training protocol was developed with the intention of recognizing and supporting CHCs skills. CHCs received training on delivering HEALS program. The process of training emphasized action methods including role playing and hands-on experience with diet portion measurements. Conclusion. With adequate training, the community lay health educator can be an essential partner in a community-based hypertension control programs. This may motivate program participants more and encourages the individual to make the behavior modifications on a permanent basis.

  13. Cancer of unknown primitive metastatic. About two clinical cases

    International Nuclear Information System (INIS)

    Cawen, L; Cordoba, A.

    2010-01-01

    This work is about the two clinical cases about the unknown primitive metastatic cancer. The main techniques used for the diagnosis, treatment and monitoring of different s carcinomas are: Electronic microscope, molecular biology and genetics, especially histopathological study, topographic survey, ultrasound, radiography, chemotherapy, radiotherapy

  14. A proportional integral estimator-based clock synchronization protocol for wireless sensor networks.

    Science.gov (United States)

    Yang, Wenlun; Fu, Minyue

    2017-11-01

    Clock synchronization is an issue of vital importance in applications of WSNs. This paper proposes a proportional integral estimator-based protocol (EBP) to achieve clock synchronization for wireless sensor networks. As each local clock skew gradually drifts, synchronization accuracy will decline over time. Compared with existing consensus-based approaches, the proposed synchronization protocol improves synchronization accuracy under time-varying clock skews. Moreover, by restricting synchronization error of clock skew into a relative small quantity, it could reduce periodic re-synchronization frequencies. At last, a pseudo-synchronous implementation for skew compensation is introduced as synchronous protocol is unrealistic in practice. Numerical simulations are shown to illustrate the performance of the proposed protocol. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  15. De novo appearance of primitive neuroectodermal tumor in a patient with systemic lupus erythematosus and moyamoya disease.

    Science.gov (United States)

    Park, D J; Kim, T J; Lee, H J; Lee, K E; Lee, S J; Seo, S R; Yoon, W; Moon, K S; Lee, K W; Lee, S S; Park, Y W

    2010-07-01

    Primitive neuroectodermal tumor is a rare brain tumor composed of undifferentiated or poorly differentiated neuroepithelial cells with a high malignant potential that usually occurs in children, and which is only occasionally encountered in adults. A 19-year-old female with systemic lupus erythematosus presented with right hemiparesis and a headache of 10 days duration. Brain magnetic resonance imaging showed a large solid mass with necrotic portions in the left frontoparietal lobe. Primitive neuroectodermal tumor was confirmed by a neuronavigator-guided brain biopsy. This is the first case report of primitive neuroectodermal tumor associated with systemic lupus erythematosus and moyamoya disease. This case demonstrates that brain tumors, such as primitive neuroectodermal tumor, should be included in the differential diagnosis of neurological manifestations in children and adolescent patients with systemic lupus erythematosus.

  16. Insecurity of position-based quantum-cryptography protocols against entanglement attacks

    International Nuclear Information System (INIS)

    Lau, Hoi-Kwan; Lo, Hoi-Kwong

    2011-01-01

    Recently, position-based quantum cryptography has been claimed to be unconditionally secure. On the contrary, here we show that the existing proposals for position-based quantum cryptography are, in fact, insecure if entanglement is shared among two adversaries. Specifically, we demonstrate how the adversaries can incorporate ideas of quantum teleportation and quantum secret sharing to compromise the security with certainty. The common flaw to all current protocols is that the Pauli operators always map a codeword to a codeword (up to an irrelevant overall phase). We propose a modified scheme lacking this property in which the same cheating strategy used to undermine the previous protocols can succeed with a rate of at most 85%. We prove the modified protocol is secure when the shared quantum resource between the adversaries is a two- or three-level system.

  17. Primitive magmas at five Cascade volcanic fields: Melts from hot, heterogeneous sub-arc mantle

    Science.gov (United States)

    Bacon, C.R.; Bruggman, P.E.; Christiansen, R.L.; Clynne, M.A.; Donnelly-Nolan, J. M.; Hildreth, W.

    1997-01-01

    ; and OIB-source-like domains. Lavas with arc and intraplate (OIB) geochemical signatures were erupted close to HAOT, and many lavas are blends of two or more magma types. Pre-eruptive H2O contents of HAOT, coupled with phase-equilibrium studies, suggest that these magmas were relatively dry and last equilibrated in the mantle wedge at temperatures of ???1300??C and depths of ???40 km, virtually at the base of the crust. Arc basalt and basaltic andesite represent greater extents of melting than HAOT, presumably in the same general thermal regime but at somewhat lower mantle separation temperatures, of domains of sub-arc mantle that have been enriched by a hydrous subduction component derived from the young, relatively hot Juan de Fuca plate. The primitive magmas originated by partial melting in response to adiabatic upwelling within the mantle wedge. Tectonic extension in this part of the Cascade arc, one characterized by slow oblique convergence, contributes to mantle upwelling and facilitates eruption of primitive magmas.

  18. Design of a mutual authentication based on NTRUsign with a perturbation and inherent multipoint control protocol frames in an Ethernet-based passive optical network

    Science.gov (United States)

    Yin, Aihan; Ding, Yisheng

    2014-11-01

    Identity-related security issues inherently present in passive optical networks (PON) still exist in the current (1G) and next-generation (10G) Ethernet-based passive optical network (EPON) systems. We propose a mutual authentication scheme that integrates an NTRUsign digital signature algorithm with inherent multipoint control protocol (MPCP) frames over an EPON system between the optical line terminal (OLT) and optical network unit (ONU). Here, a primitive NTRUsign algorithm is significantly modified through the use of a new perturbation so that it can be effectively used for simultaneously completing signature and authentication functions on the OLT and the ONU sides. Also, in order to transmit their individual sensitive messages, which include public key, signature, and random value and so forth, to each other, we redefine three unique frames according to MPCP format frame. These generated messages can be added into the frames and delivered to each other, allowing the OLT and the ONU to go ahead with a mutual identity authentication process to verify their legal identities. Our simulation results show that this proposed scheme performs very well in resisting security attacks and has low influence on the registration efficiency to to-be-registered ONUs. A performance comparison with traditional authentication algorithms is also presented. To the best of our knowledge, no detailed design of mutual authentication in EPON can be found in the literature up to now.

  19. A Comprehensive Survey on Hierarchical-Based Routing Protocols for Mobile Wireless Sensor Networks: Review, Taxonomy, and Future Directions

    Directory of Open Access Journals (Sweden)

    Nabil Sabor

    2017-01-01

    Full Text Available Introducing mobility to Wireless Sensor Networks (WSNs puts new challenges particularly in designing of routing protocols. Mobility can be applied to the sensor nodes and/or the sink node in the network. Many routing protocols have been developed to support the mobility of WSNs. These protocols are divided depending on the routing structure into hierarchical-based, flat-based, and location-based routing protocols. However, the hierarchical-based routing protocols outperform the other routing types in saving energy, scalability, and extending lifetime of Mobile WSNs (MWSNs. Selecting an appropriate hierarchical routing protocol for specific applications is an important and difficult task. Therefore, this paper focuses on reviewing some of the recently hierarchical-based routing protocols that are developed in the last five years for MWSNs. This survey divides the hierarchical-based routing protocols into two broad groups, namely, classical-based and optimized-based routing protocols. Also, we present a detailed classification of the reviewed protocols according to the routing approach, control manner, mobile element, mobility pattern, network architecture, clustering attributes, protocol operation, path establishment, communication paradigm, energy model, protocol objectives, and applications. Moreover, a comparison between the reviewed protocols is investigated in this survey depending on delay, network size, energy-efficiency, and scalability while mentioning the advantages and drawbacks of each protocol. Finally, we summarize and conclude the paper with future directions.

  20. An Enhanced Reservation-Based MAC Protocol for IEEE 802.15.4 Networks

    Science.gov (United States)

    Afonso, José A.; Silva, Helder D.; Macedo, Pedro; Rocha, Luis A.

    2011-01-01

    The IEEE 802.15.4 Medium Access Control (MAC) protocol is an enabling standard for wireless sensor networks. In order to support applications requiring dedicated bandwidth or bounded delay, it provides a reservation-based scheme named Guaranteed Time Slot (GTS). However, the GTS scheme presents some drawbacks, such as inefficient bandwidth utilization and support to a maximum of only seven devices. This paper presents eLPRT (enhanced Low Power Real Time), a new reservation-based MAC protocol that introduces several performance enhancing features in comparison to the GTS scheme. This MAC protocol builds on top of LPRT (Low Power Real Time) and includes various mechanisms designed to increase data transmission reliability against channel errors, improve bandwidth utilization and increase the number of supported devices. A motion capture system based on inertial and magnetic sensors has been used to validate the protocol. The effectiveness of the performance enhancements introduced by each of the new features is demonstrated through the provision of both simulation and experimental results. PMID:22163826

  1. Model-Checking Driven Design of QoS-Based Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhi Chen

    2015-01-01

    Full Text Available Accurate and reliable routing protocols with Quality of Service (QoS support determine the mission-critical application efficiency in WSNs. This paper proposes a model-checking design driven framework for designing the QoS-based routing protocols of WSNs, which involves the light-weight design process, the timed automata model, and the alternative QoS verification properties. The accurate feedback of continually model checking in the iterative design process effectively stimulates the parameter tuning of the protocols. We demonstrate the straightforward and modular characteristics of the proposed framework in designing a prototype QoS-based routing protocol. The prototype study shows that the model-checking design framework may complement other design methods and ensure the QoS implementation of the QoS-based routing protocol design for WSNs.

  2. Formalizing the Relationship Between Commitment and Basic Cryptographic Primitives

    Directory of Open Access Journals (Sweden)

    S. Sree Vivek

    2016-11-01

    Full Text Available Signcryption is a cryptographic primitive which offers the functionality of both digital signature and encryption with lower combined computational cost. On the other hand, commitment scheme allows an entity to commit to a value, where the entity reveals the committed value later during a decommit phase. In this paper, we explore the connection between commitment schemes, public key encryption, digital signatures and signcryption. We establish formal relationship between commitment and the other primitives. Our main result is that we show signcryption can be used as a commitment scheme with appropriate security notions. We show that if the underlying signcryption scheme is IND-CCA2 secure, then the hiding property of the commitment scheme is satisfied. Similarly, we show that if the underlying signcryption scheme is unforgeable, then the relaxed biding property of the commitment scheme is satisfied. Moreover, we prove that if the underlying signcryption scheme is NM-CCA2, then the commitment scheme is non-malleable.

  3. Taking the Politics Out of Satellite and Space-Based Communications Protocols

    Science.gov (United States)

    Ivancic, William D.

    2006-01-01

    After many years of studies, experimentation, and deployment, large amounts of misinformation and misconceptions remain regarding applicability of various communications protocols for use in satellite and space-based networks. This paper attempts to remove much of the politics, misconceptions, and misinformation that have plagued spacebased communications protocol development and deployment. This paper provides a common vocabulary for communications; a general discussion of the requirements for various communication environments; an evaluation of tradeoffs between circuit and packet-switching technologies, and the pros and cons of various link, network, transport, application, and security protocols. Included is the applicability of protocol enhancing proxies to NASA, Department of Defense (DOD), and commercial space communication systems.

  4. Cluster Based Hierarchical Routing Protocol for Wireless Sensor Network

    OpenAIRE

    Rashed, Md. Golam; Kabir, M. Hasnat; Rahim, Muhammad Sajjadur; Ullah, Shaikh Enayet

    2012-01-01

    The efficient use of energy source in a sensor node is most desirable criteria for prolong the life time of wireless sensor network. In this paper, we propose a two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol (CBHRP). We introduce a new concept called head-set, consists of one active cluster head and some other associate cluster heads within a cluster. The head-set members are responsible for control and management of the network. Results show that t...

  5. Behavior Protocols for Software Components

    Czech Academy of Sciences Publication Activity Database

    Plášil, František; Višňovský, Stanislav

    2002-01-01

    Roč. 28, č. 11 (2002), s. 1056-1076 ISSN 0098-5589 R&D Projects: GA AV ČR IAA2030902; GA ČR GA201/99/0244 Grant - others:Eureka(XE) Pepita project no.2033 Institutional research plan: AV0Z1030915 Keywords : behavior protocols * component-based programming * software architecture Subject RIV: JC - Computer Hardware ; Software Impact factor: 1.170, year: 2002

  6. Post-Quantum Cryptography: Riemann Primitives and Chrysalis

    OpenAIRE

    Malloy, Ian; Hollenbeck, Dennis

    2018-01-01

    The Chrysalis project is a proposed method for post-quantum cryptography using the Riemann sphere. To this end, Riemann primitives are introduced in addition to a novel implementation of this new method. Chrysalis itself is the first cryptographic scheme to rely on Holomorphic Learning with Errors, which is a complex form of Learning with Errors relying on the Gauss Circle Problem within the Riemann sphere. The principle security reduction proposed by this novel cryptographic scheme applies c...

  7. Cheating and Anti-Cheating in Gossip-Based Protocol: An Experimental Investigation

    Science.gov (United States)

    Xiao, Xin; Shi, Yuanchun; Tang, Yun; Zhang, Nan

    During recent years, there has been a rapid growth in deployment of gossip-based protocol in many multicast applications. In a typical gossip-based protocol, each node acts as dual roles of receiver and sender, independently exchanging data with its neighbors to facilitate scalability and resilience. However, most of previous work in this literature seldom considered cheating issue of end users, which is also very important in face of the fact that the mutual cooperation inherently determines overall system performance. In this paper, we investigate the dishonest behaviors in decentralized gossip-based protocol through extensive experimental study. Our original contributions come in two-fold: In the first part of cheating study, we analytically discuss two typical cheating strategies, that is, intentionally increasing subscription requests and untruthfully calculating forwarding probability, and further evaluate their negative impacts. The results indicate that more attention should be paid to defending cheating behaviors in gossip-based protocol. In the second part of anti-cheating study, we propose a receiver-driven measurement mechanism, which evaluates individual forwarding traffic from the perspective of receivers and thus identifies cheating nodes with high incoming/outgoing ratio. Furthermore, we extend our mechanism by introducing reliable factor to further improve its accuracy. The experiments under various conditions show that it performs quite well in case of serious cheating and achieves considerable performance in other cases.

  8. Capture, learning, and classification of upper extremity movement primitives in healthy controls and stroke patients.

    Science.gov (United States)

    Guerra, Jorge; Uddin, Jasim; Nilsen, Dawn; Mclnerney, James; Fadoo, Ammarah; Omofuma, Isirame B; Hughes, Shatif; Agrawal, Sunil; Allen, Peter; Schambra, Heidi M

    2017-07-01

    There currently exist no practical tools to identify functional movements in the upper extremities (UEs). This absence has limited the precise therapeutic dosing of patients recovering from stroke. In this proof-of-principle study, we aimed to develop an accurate approach for classifying UE functional movement primitives, which comprise functional movements. Data were generated from inertial measurement units (IMUs) placed on upper body segments of older healthy individuals and chronic stroke patients. Subjects performed activities commonly trained during rehabilitation after stroke. Data processing involved the use of a sliding window to obtain statistical descriptors, and resulting features were processed by a Hidden Markov Model (HMM). The likelihoods of the states, resulting from the HMM, were segmented by a second sliding window and their averages were calculated. The final predictions were mapped to human functional movement primitives using a Logistic Regression algorithm. Algorithm performance was assessed with a leave-one-out analysis, which determined its sensitivity, specificity, and positive and negative predictive values for all classified primitives. In healthy control and stroke participants, our approach identified functional movement primitives embedded in training activities with, on average, 80% precision. This approach may support functional movement dosing in stroke rehabilitation.

  9. Letters of Gold: Enabling Primitive Accumulation through Neoliberal Conservation

    NARCIS (Netherlands)

    B.E. Büscher (Bram)

    2009-01-01

    textabstractAbstract: In Capital I, Marx wrote that the history of the separation of the producers from the means of production “is written in the annals of mankind in letters of blood and fire” (Marx, 1976: 875). This ‘so-called primitive accumulation’, or ‘accumulation by dispossession’ in David

  10. An Adaptive Information Quantity-Based Broadcast Protocol for Safety Services in VANET

    Directory of Open Access Journals (Sweden)

    Wenjie Wang

    2016-01-01

    Full Text Available Vehicle-to-vehicle communication plays a significantly important role in implementing safe and efficient road traffic. When disseminating safety messages in the network, the information quantity on safety packets changes over time and space. However, most of existing protocols view each packet the same to disseminate, preventing vehicles from collecting more recent and precise safety information. Hence, an information quantity-based broadcast protocol is proposed in this paper to ensure the efficiency of safety messages dissemination. In particular, we propose the concept of emergency-degree to evaluate packets’ information quantity. Then we present EDCast, an emergency-degree-based broadcast protocol. EDCast differentiates each packet’s priority for accessing the channel based on its emergency-degree so as to provide vehicles with more safety information timely and accurately. In addition, an adaptive scheme is presented to ensure fast dissemination of messages in different network condition. We compare the performance of EDCast with those of three other representative protocols in a typical highway scenario. Simulation results indicate that EDCast achieves higher broadcast efficiency and less redundancy with less delivery delay. What we found demonstrates that it is feasible and necessary for incorporating information quantity of messages in designing an efficient safety message broadcast protocol.

  11. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Science.gov (United States)

    Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing

    2017-01-01

    Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  12. Effectiveness of a transdiagnostic internet-based protocol for the treatment of emotional disorders versus treatment as usual in specialized care: study protocol for a randomized controlled trial.

    Science.gov (United States)

    González-Robles, Alberto; García-Palacios, Azucena; Baños, Rosa; Riera, Antonio; Llorca, Ginés; Traver, Francisco; Haro, Gonzalo; Palop, Vicente; Lera, Guillem; Romeu, José Enrique; Botella, Cristina

    2015-10-31

    Emotional disorders (depression and anxiety disorders) are highly prevalent mental health problems. Although evidence showing the effectiveness of disorder-specific treatments exists, high comorbidity rates among emotional disorders limit the utility of these protocols. This has led some researchers to focus their interest on transdiagnostic interventions, a treatment perspective that might be more widely effective across these disorders. Also, the current way of delivering treatments makes it difficult provide assistance to all of the population in need. The use of the Internet in the delivery of evidence-based treatments may help to disseminate treatments among the population. In this study, we aim to test the effectiveness of EmotionRegulation, a new transdiagnostic Internet-based protocol for unipolar mood disorders, five anxiety disorders (panic disorder, agoraphobia, social anxiety disorder, generalized anxiety disorder and anxiety disorder not otherwise specified), and obsessive-compulsive disorder in comparison to treatment as usual as provided in Spanish public specialized mental health care. We will also study its potential impact on basic temperament dimensions (neuroticism/behavioral inhibition and extraversion/behavioral activation). Expectations and opinions of patients about this protocol will also be studied. The study is a randomized controlled trial. 200 participants recruited in specialized care will be allocated to one of two treatment conditions: a) EmotionRegulation or b) treatment as usual. Primary outcome measures will be the BAI and the BDI-II. Secondary outcomes will include a specific measure of the principal disorder, and measures of neuroticism/behavioral inhibition and extraversion/behavioral activation. Patients will be assessed at baseline, post-treatment, and 3- and 12-month follow-ups. Intention to treat and per protocol analyses will be performed. Although the effectiveness of face-to-face transdiagnostic protocols has been

  13. On the security of semi-device-independent QKD protocols

    Science.gov (United States)

    Chaturvedi, Anubhav; Ray, Maharshi; Veynar, Ryszard; Pawłowski, Marcin

    2018-06-01

    While fully device-independent security in (BB84-like) prepare-and-measure quantum key distribution (QKD) is impossible, it can be guaranteed against individual attacks in a semi-device-independent (SDI) scenario, wherein no assumptions are made on the characteristics of the hardware used except for an upper bound on the dimension of the communicated system. Studying security under such minimal assumptions is especially relevant in the context of the recent quantum hacking attacks wherein the eavesdroppers can not only construct the devices used by the communicating parties but are also able to remotely alter their behavior. In this work, we study the security of a SDIQKD protocol based on the prepare-and-measure quantum implementation of a well-known cryptographic primitive, the random access code (RAC). We consider imperfect detectors and establish the critical values of the security parameters (the observed success probability of the RAC and the detection efficiency) required for guaranteeing security against eavesdroppers with and without quantum memory. Furthermore, we suggest a minimal characterization of the preparation device in order to lower the requirements for establishing a secure key.

  14. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jian Wang

    2017-05-01

    Full Text Available This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.

  15. A Survey on the Taxonomy of Cluster-Based Routing Protocols for Homogeneous Wireless Sensor Networks

    Science.gov (United States)

    Naeimi, Soroush; Ghafghazi, Hamidreza; Chow, Chee-Onn; Ishii, Hiroshi

    2012-01-01

    The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided. PMID:22969350

  16. A Concurrent Multiple Negotiation Protocol Based on Colored Petri Nets.

    Science.gov (United States)

    Niu, Lei; Ren, Fenghui; Zhang, Minjie; Bai, Quan

    2017-11-01

    Concurrent multiple negotiation (CMN) provides a mechanism for an agent to simultaneously conduct more than one negotiation. There may exist different interdependency relationships among these negotiations and these interdependency relationships can impact the outcomes of these negotiations. The outcomes of these concurrent negotiations contribute together for the agent to achieve an overall negotiation goal. Handling a CMN while considering interdependency relationships among multiple negotiations is a challenging research problem. This paper: 1) comprehensively highlights research problems of negotiations at concurrent negotiation level; 2) provides a graph-based CMN model with consideration of the interdependency relationships; and 3) proposes a colored Petri net-based negotiation protocol for conducting CMNs. With the proposed protocol, a CMN can be efficiently and concurrently processed and negotiation agreements can be efficiently achieved. Experimental results indicate the effectiveness and efficiency of the proposed protocol in terms of the negotiation success rate, the negotiation time and the negotiation outcome.

  17. Learned parametrized dynamic movement primitives with shared synergies for controlling robotic and musculoskeletal systems

    Directory of Open Access Journals (Sweden)

    Elmar eRückert

    2013-10-01

    Full Text Available A salient feature of human motor skill learning is the ability to exploitsimilarities across related tasks.In biological motor control, it has been hypothesized that muscle synergies,coherent activations of groups of muscles, allow for exploiting shared knowledge.Recent studies have shown that a rich set of complex motor skills can be generated bya combination of a small number of muscle synergies.In robotics, dynamic movement primitives are commonlyused for motor skill learning. This machine learning approach implements a stable attractor systemthat facilitates learning and it can be used in high-dimensional continuous spaces. However, it does not allow for reusing shared knowledge, i.e. for each task an individual set of parameters has to be learned.We propose a novel movement primitive representationthat employs parametrized basis functions, which combines the benefits of muscle synergiesand dynamic movement primitives. For each task asuperposition of synergies modulates a stable attractor system.This approach leads to a compact representation of multiple motor skills andat the same time enables efficient learning in high-dimensional continuous systems.The movement representation supports discrete and rhythmic movements andin particular includes the dynamic movement primitive approach as a special case.We demonstrate the feasibility of the movement representation in three multi-task learning simulated scenarios.First, the characteristics of the proposed representation are illustrated in a point-mass task.Second, in complex humanoid walking experiments,multiple walking patterns with different step heights are learned robustly and efficiently.Finally, in a multi-directional reaching task simulated with a musculoskeletal modelof the human arm, we show how the proposed movement primitives can be used tolearn appropriate muscle excitation patterns and to generalize effectively to new reaching skills.

  18. Quorum system and random based asynchronous rendezvous protocol for cognitive radio ad hoc networks

    Directory of Open Access Journals (Sweden)

    Sylwia Romaszko

    2013-12-01

    Full Text Available This paper proposes a rendezvous protocol for cognitive radio ad hoc networks, RAC2E-gQS, which utilizes (1 the asynchronous and randomness properties of the RAC2E protocol, and (2 channel mapping protocol, based on a grid Quorum System (gQS, and taking into account channel heterogeneity and asymmetric channel views. We show that the combination of the RAC2E protocol with the grid-quorum based channel mapping can yield a powerful RAC2E-gQS rendezvous protocol for asynchronous operation in a distributed environment assuring a rapid rendezvous between the cognitive radio nodes having available both symmetric and asymmetric channel views. We also propose an enhancement of the protocol, which uses a torus QS for a slot allocation, dealing with the worst case scenario, a large number of channels with opposite ranking lists.

  19. A Novel UDT-Based Transfer Speed-Up Protocol for Fog Computing

    Directory of Open Access Journals (Sweden)

    Zhijie Han

    2018-01-01

    Full Text Available Fog computing is a distributed computing model as the middle layer between the cloud data center and the IoT device/sensor. It provides computing, network, and storage devices so that cloud based services can be closer to IOT devices and sensors. Cloud computing requires a lot of bandwidth, and the bandwidth of the wireless network is limited. In contrast, the amount of bandwidth required for “fog computing” is much less. In this paper, we improved a new protocol Peer Assistant UDT-Based Data Transfer Protocol (PaUDT, applied to Iot-Cloud computing. Furthermore, we compared the efficiency of the congestion control algorithm of UDT with the Adobe’s Secure Real-Time Media Flow Protocol (RTMFP, based on UDP completely at the transport layer. At last, we built an evaluation model of UDT in RTT and bit error ratio which describes the performance. The theoretical analysis and experiment result have shown that UDT has good performance in IoT-Cloud computing.

  20. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Sabin Bhandari

    2016-03-01

    Full Text Available In wireless body area networks (WBANs, various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  1. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Bhandari, Sabin; Moh, Sangman

    2016-03-18

    In wireless body area networks (WBANs), various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC) protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS) for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM) bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC) protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  2. Criteria for Evaluating Alternative Network and Link Layer Protocols for the NASA Constellation Program Communication Architecture

    Science.gov (United States)

    Benbenek, Daniel; Soloff, Jason; Lieb, Erica

    2010-01-01

    Selecting a communications and network architecture for future manned space flight requires an evaluation of the varying goals and objectives of the program, development of communications and network architecture evaluation criteria, and assessment of critical architecture trades. This paper uses Cx Program proposed exploration activities as a guideline; lunar sortie, outpost, Mars, and flexible path options are described. A set of proposed communications network architecture criteria are proposed and described. They include: interoperability, security, reliability, and ease of automating topology changes. Finally a key set of architecture options are traded including (1) multiplexing data at a common network layer vs. at the data link layer, (2) implementing multiple network layers vs. a single network layer, and (3) the use of a particular network layer protocol, primarily IPv6 vs. Delay Tolerant Networking (DTN). In summary, the protocol options are evaluated against the proposed exploration activities and their relative performance with respect to the criteria are assessed. An architectural approach which includes (a) the capability of multiplexing at both the network layer and the data link layer and (b) a single network layer for operations at each program phase, as these solutions are best suited to respond to the widest array of program needs and meet each of the evaluation criteria.

  3. A two-hop based adaptive routing protocol for real-time wireless sensor networks.

    Science.gov (United States)

    Rachamalla, Sandhya; Kancherla, Anitha Sheela

    2016-01-01

    One of the most important and challenging issues in wireless sensor networks (WSNs) is to optimally manage the limited energy of nodes without degrading the routing efficiency. In this paper, we propose an energy-efficient adaptive routing mechanism for WSNs, which saves energy of nodes by removing the much delayed packets without degrading the real-time performance of the used routing protocol. It uses the adaptive transmission power algorithm which is based on the attenuation of the wireless link to improve the energy efficiency. The proposed routing mechanism can be associated with any geographic routing protocol and its performance is evaluated by integrating with the well known two-hop based real-time routing protocol, PATH and the resulting protocol is energy-efficient adaptive routing protocol (EE-ARP). The EE-ARP performs well in terms of energy consumption, deadline miss ratio, packet drop and end-to-end delay.

  4. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Directory of Open Access Journals (Sweden)

    Shameng Wen

    Full Text Available Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  5. Understanding and determining the variability of the primitive stress environment.

    CSIR Research Space (South Africa)

    Sellers, EJ

    2002-10-01

    Full Text Available The primitive stress state is an important input into the design of underground excavations. However, it is well known that the stress state varies considerably from place to place. The aim of this project was to determine the main causes...

  6. Backpressure-based control protocols: design and computational aspects

    NARCIS (Netherlands)

    Miretskiy, D.I.; Scheinhardt, Willem R.W.; Mandjes, M.R.H.

    2009-01-01

    Congestion control in packet-based networks is often realized by feedback protocols. In this paper we assess their performance under a back-pressure mechanism that has been proposed and standardized for Ethernet metropolitan networks. In such a mechanism the service rate of an upstream queue is

  7. Backpressure-based control protocols: Design and computational aspects

    NARCIS (Netherlands)

    Miretskiy, D.I.; Scheinhardt, W.R.W.; Mandjes, M.R.H.

    2009-01-01

    Congestion control in packet-based networks is often realized by feedback protocols. In this paper we assess their performance under a back-pressure mechanism that has been proposed and standardized for Ethernet metropolitan networks. In such a mechanism the service rate of an upstream queue is

  8. ATHENA: A Personalized Platform to Promote an Active Lifestyle and Wellbeing Based on Physical, Mental and Social Health Primitives

    Directory of Open Access Journals (Sweden)

    Muhammad Fahim

    2014-05-01

    Full Text Available Technology provides ample opportunities for the acquisition and processing of physical, mental and social health primitives. However, several challenges remain for researchers as how to define the relationship between reported physical activities, mood and social interaction to define an active lifestyle. We are conducting a project, ATHENA(activity-awareness for human-engaged wellness applications to design and integrate the relationship between these basic health primitives to approximate the human lifestyle and real-time recommendations for wellbeing services. Our goal is to develop a system to promote an active lifestyle for individuals and to recommend to them valuable interventions by making comparisons to their past habits. The proposed system processes sensory data through our developed machine learning algorithms inside smart devices and utilizes cloud infrastructure to reduce the cost. We exploit big data infrastructure for massive sensory data storage and fast retrieval for recommendations. Our contributions include the development of a prototype system to promote an active lifestyle and a visual design capable of engaging users in the goal of increasing self-motivation. We believe that our study will impact the design of future ubiquitous wellness applications.

  9. ATHENA: A Personalized Platform to Promote an Active Lifestyle and Wellbeing Based on Physical, Mental and Social Health Primitives

    Science.gov (United States)

    Fahim, Muhammad; Idris, Muhammad; Ali, Rahman; Nugent, Christopher; Kang, Byeong; Huh, Eui-Nam; Lee, Sungyoung

    2014-01-01

    Technology provides ample opportunities for the acquisition and processing of physical, mental and social health primitives. However, several challenges remain for researchers as how to define the relationship between reported physical activities, mood and social interaction to define an active lifestyle. We are conducting a project, ATHENA(activity-awareness for human-engaged wellness applications) to design and integrate the relationship between these basic health primitives to approximate the human lifestyle and real-time recommendations for wellbeing services. Our goal is to develop a system to promote an active lifestyle for individuals and to recommend to them valuable interventions by making comparisons to their past habits. The proposed system processes sensory data through our developed machine learning algorithms inside smart devices and utilizes cloud infrastructure to reduce the cost. We exploit big data infrastructure for massive sensory data storage and fast retrieval for recommendations. Our contributions include the development of a prototype system to promote an active lifestyle and a visual design capable of engaging users in the goal of increasing self-motivation. We believe that our study will impact the design of future ubiquitous wellness applications. PMID:24859031

  10. A primitive Late Pliocene cheetah, and evolution of the cheetah lineage

    Science.gov (United States)

    Christiansen, Per; Mazák, Ji H.

    2009-01-01

    The cheetah lineage is a group of large, slender, and long-limbed cats with a distinctive skull and dental morphology, of which only the extant cheetah (Acinonyx jubatus) is present today. The lineage is characterized by having abbreviated, tall, and domed crania, and a trenchant dentition with a much reduced, posteriorly placed protocone on the upper carnassial. In this article, we report on a new discovery of a Late Pliocene specimen from China with an estimated age of ≈2.2–2.5 million years, making it one of the oldest specimens known to date. A cladistic analysis confirmed that it is the most primitive cheetah known, and it shares a number of unambiguous derived cranial traits with the Acinonyx lineage, but has more primitive dentition than previously known cheetahs, demonstrating that the many unusual skull and dental characters hitherto considered characteristic of cheetahs evolved in a gradual fashion. Isolated teeth of primitive cheetahs may not be recognizable as such, but can be confused with, for instance, those of leopards or other similar-sized pantherine cats or pumas. The age and morphology of the new specimen supports an Old World origin of the cheetah lineage, not a New World one, as has been suggested. We name the new species Acinonyx kurteni in honor of the late Björn Kurtén. PMID:19114651

  11. A primitive Late Pliocene cheetah, and evolution of the cheetah lineage.

    Science.gov (United States)

    Christiansen, Per; Mazák, Ji H

    2009-01-13

    The cheetah lineage is a group of large, slender, and long-limbed cats with a distinctive skull and dental morphology, of which only the extant cheetah (Acinonyx jubatus) is present today. The lineage is characterized by having abbreviated, tall, and domed crania, and a trenchant dentition with a much reduced, posteriorly placed protocone on the upper carnassial. In this article, we report on a new discovery of a Late Pliocene specimen from China with an estimated age of approximately 2.2-2.5 million years, making it one of the oldest specimens known to date. A cladistic analysis confirmed that it is the most primitive cheetah known, and it shares a number of unambiguous derived cranial traits with the Acinonyx lineage, but has more primitive dentition than previously known cheetahs, demonstrating that the many unusual skull and dental characters hitherto considered characteristic of cheetahs evolved in a gradual fashion. Isolated teeth of primitive cheetahs may not be recognizable as such, but can be confused with, for instance, those of leopards or other similar-sized pantherine cats or pumas. The age and morphology of the new specimen supports an Old World origin of the cheetah lineage, not a New World one, as has been suggested. We name the new species Acinonyx kurteni in honor of the late Björn Kurtén.

  12. p120 Catenin-Mediated Stabilization of E-Cadherin Is Essential for Primitive Endoderm Specification.

    Directory of Open Access Journals (Sweden)

    Tim Pieters

    2016-08-01

    Full Text Available E-cadherin-mediated cell-cell adhesion is critical for naive pluripotency of cultured mouse embryonic stem cells (mESCs. E-cadherin-depleted mESC fail to downregulate their pluripotency program and are unable to initiate lineage commitment. To further explore the roles of cell adhesion molecules during mESC differentiation, we focused on p120 catenin (p120ctn. Although one key function of p120ctn is to stabilize and regulate cadherin-mediated cell-cell adhesion, it has many additional functions, including regulation of transcription and Rho GTPase activity. Here, we investigated the role of mouse p120ctn in early embryogenesis, mESC pluripotency and early fate determination. In contrast to the E-cadherin-null phenotype, p120ctn-null mESCs remained pluripotent, but their in vitro differentiation was incomplete. In particular, they failed to form cystic embryoid bodies and showed defects in primitive endoderm formation. To pinpoint the underlying mechanism, we undertook a structure-function approach. Rescue of p120ctn-null mESCs with different p120ctn wild-type and mutant expression constructs revealed that the long N-terminal domain of p120ctn and its regulatory domain for RhoA were dispensable, whereas its armadillo domain and interaction with E-cadherin were crucial for primitive endoderm formation. We conclude that p120ctn is not only an adaptor and regulator of E-cadherin, but is also indispensable for proper lineage commitment.

  13. An analysis of moderate sedation protocols used in dental specialty programs: a retrospective observational study.

    Science.gov (United States)

    Setty, Madhavi; Montagnese, Thomas A; Baur, Dale; Aminoshariae, Anita; Mickel, Andre

    2014-09-01

    Pain and anxiety control is critical in dental practice. Moderate sedation is a useful adjunct in managing a variety of conditions that make it difficult or impossible for some people to undergo certain dental procedures. The purpose of this study was to analyze the sedation protocols used in 3 dental specialty programs at the Case Western Reserve University School of Dental Medicine, Cleveland, OH. A retrospective analysis was performed using dental school records of patients receiving moderate sedation in the graduate endodontic, periodontic, and oral surgery programs from January 1, 2010, to December 31, 2012. Information was gathered and the data compiled regarding the reasons for sedation, age, sex, pertinent medical conditions, American Society of Anesthesiologists physical status classifications, routes of administration, drugs, dosages, failures, complications, and other information that was recorded. The reasons for the use of moderate sedation were anxiety (54%), local anesthesia failures (15%), fear of needles (15%), severe gag reflex (8%), and claustrophobia with the rubber dam (8%). The most common medical conditions were hypertension (17%), asthma (15%), and bipolar disorder (8%). Most patients were classified as American Society of Anesthesiologists class II. More women (63.1%) were treated than men (36.9%). The mean age was 45 years. Monitoring and drugs varied among the programs. The most common tooth treated in the endodontic program was the mandibular molar. There are differences in the moderate sedation protocols used in the endodontic, periodontic, and oral surgery programs regarding monitoring, drugs used, and record keeping. Copyright © 2014 American Association of Endodontists. Published by Elsevier Inc. All rights reserved.

  14. Primary extraskeletal Ewing's sarcoma/primitive neuroectodermal tumor of breast

    Directory of Open Access Journals (Sweden)

    Smita Srivastava

    2016-01-01

    Full Text Available Extraskeletal Ewing's sarcoma (EES is a rare soft tissue tumor that is morphologically indistinguishable from skeletal ES. We report a case of a 25-year-old female with recurrent EES/primitive neuroectodermal tumor of right breast with imaging findings on mammogram, ultrasound, magnetic resonance imaging breast, and positron emission tomography–computed tomography.

  15. Evaluation of the effectiveness of a school-based cannabis prevention program.

    Science.gov (United States)

    Ariza, Carles; Pérez, Anna; Sánchez-Martínez, Francesca; Diéguez, Marta; Espelt, Albert; Pasarín, M Isabel; Suelves, Josep M; De la Torre, Rafael; Nebot, Manuel

    2013-09-01

    The effectiveness of a cannabis prevention program in high school students was assessed. A quasi-experimental study was designed to evaluate the effectiveness of an intervention implemented in an intervention group (IG) with 39 schools compared with a control group (CG) of 47 schools not exposed to the intervention. Of 224 secondary schools in Barcelona, 86 were assessed in the 2005-2006 school year through a personal questionnaire administered at baseline and 15 months after the intervention. Participants consisted of 4848 ninth graders (14-15 year-olds), 2803 assigned to the IG and 2043 to the CG, according to the type and size of the school and the socioeconomic status of the school's neighborhood. The intervention consisted of a school-based cannabis prevention program (xkpts.com), with four sessions and 16 activities, implemented over 6-10h, with materials for parents and web-based student involvement. Last-month cannabis use was assessed at baseline and at 15 months' follow-up. Process evaluation indicators were assessed. At 15 months follow-up, 8.2% of boys and 8.3% of girls in the IG became last-month cannabis users versus 11.8% of boys and 11.6% of girls in the CG. These differences were statistically significant (p=0.003), representing a 29% reduction in last-month cannabis users in the IG compared with the CG. The incidence of last-month cannabis use was lowest in classrooms that adhered to the program protocol. The xkpts.com program was effective in preventing progression to last-month cannabis use. Effectiveness was higher in classrooms that adhered closely to the protocol. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  16. An obesity/cardiometabolic risk reduction disease management program: a population-based approach.

    Science.gov (United States)

    Villagra, Victor G

    2009-04-01

    Obesity is a critical health concern that has captured the attention of public and private healthcare payers who are interested in controlling costs and mitigating the long-term economic consequences of the obesity epidemic. Population-based approaches to obesity management have been proposed that take advantage of a chronic care model (CCM), including patient self-care, the use of community-based resources, and the realization of care continuity through ongoing communications with patients, information technology, and public policy changes. Payer-sponsored disease management programs represent an important conduit to delivering population-based care founded on similar CCM concepts. Disease management is founded on population-based disease identification, evidence-based care protocols, and collaborative practices between clinicians. While substantial clinician training, technology infrastructure commitments, and financial support at the payer level will be needed for the success of disease management programs in obesity and cardiometabolic risk reduction, these barriers can be overcome with the proper commitment. Disease management programs represent an important tool to combat the growing societal risks of overweight and obesity.

  17. Communication protocol in chassis detecting wireless transmission system based on WiFi

    Science.gov (United States)

    In chassis detecting wireless transmission system, the wireless network communication protocol plays a key role in the information exchange and synchronization between the host and chassis PDA. This paper presents a wireless network transmission protocol based on TCP/IP which makes the rules of info...

  18. Canonical Wnt signaling induces a primitive endoderm metastable state in mouse embryonic stem cells.

    Science.gov (United States)

    Price, Feodor D; Yin, Hang; Jones, Andrew; van Ijcken, Wilfred; Grosveld, Frank; Rudnicki, Michael A

    2013-04-01

    Activation of the canonical Wnt signaling pathway synergizes with leukemia inhibitory factor (LIF) to maintain pluripotency of mouse embryonic stem cells (mESCs). However, in the absence of LIF, Wnt signaling is unable to maintain ESCs in the undifferentiated state. To investigate the role of canonical Wnt signaling in pluripotency and lineage specification, we expressed Wnt3a in mESCs and characterized them in growth and differentiation. We found that activated canonical Wnt signaling induced the formation of a reversible metastable primitive endoderm state in mESC. Upon subsequent differentiation, Wnt3a-stimulated mESCs gave rise to large quantities of visceral endoderm. Furthermore, we determined that the ability of canonical Wnt signaling to induce a metastable primitive endoderm state was mediated by Tbx3. Our data demonstrates a specific role for canonical Wnt signaling in promoting pluripotency while at the same time priming cells for subsequent differentiation into the primitive endoderm lineage. Copyright © 2013 AlphaMed Press.

  19. EpSoc: Social-Based Epidemic-Based Routing Protocol in Opportunistic Mobile Social Network

    Directory of Open Access Journals (Sweden)

    Halikul Lenando

    2018-01-01

    Full Text Available In opportunistic networks, the nature of intermittent and disruptive connections degrades the efficiency of routing. Epidemic routing protocol is used as a benchmark for most of routing protocols in opportunistic mobile social networks (OMSNs due to its high message delivery and latency. However, Epidemic incurs high cost in terms of overhead and hop count. In this paper, we propose a hybrid routing protocol called EpSoc which utilizes the Epidemic routing forwarding strategy and exploits an important social feature, that is, degree centrality. Two techniques are used in EpSoc. Messages’ TTL is adjusted based on the degree centrality of nodes, and the message blocking mechanism is used to control replication. Simulation results show that EpSoc increases the delivery ratio and decreases the overhead ratio, the average latency, and the hop counts as compared to Epidemic and Bubble Rap.

  20. A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Julien Haillot

    2010-01-01

    Full Text Available In content-based communication, information flows towards interested hosts rather than towards specifically set destinations. This new style of communication perfectly fits the needs of applications dedicated to information sharing, news distribution, service advertisement and discovery, etc. In this paper we address the problem of supporting content-based communication in partially or intermittently connected mobile ad hoc networks (MANETs. The protocol we designed leverages on the concepts of opportunistic networking and delay-tolerant networking in order to account for the absence of end-to-end connectivity in disconnected MANETs. The paper provides an overview of the protocol, as well as simulation results that show how this protocol can perform in realistic conditions.

  1. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    International Nuclear Information System (INIS)

    Xie Qi; Hu Bin; Chen Ke-Fei; Liu Wen-Hao; Tan Xiao

    2015-01-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. (paper)

  2. Quantum-key-distribution protocol with pseudorandom bases

    Science.gov (United States)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  3. Clinical and pathological characteristics of primitive neuroectodermal tumor of the cerebral

    International Nuclear Information System (INIS)

    Fu Jun; Zhou Youxin; Xu Feng; Ye Ming; Zhou Dai; Bao Yaodong; Kang Suya

    2004-01-01

    Objective: To study the features of the cerebral primitive neuroectodermal tumor (PNET) in the clinical manifestation and in the histogenesis, morphology. Methods: Seven cases of cerebral PNET was analyzed with their clinical manifestations, histologic and immunohistochemical results. Results: Five patients of this group were children or young adults. Seven tumors were composed of primitive cells with focal evidence of glial or neuronal differentiation. Five out seven expressed NSE, one out seven expressed Syn, two out seven expressed CD99 and only one case expressed Vimentin, None expressed GFAP and S-100. CT findings were a homogeneous high density or heterogeneous mass. MR findings were high signal intensity both on T1 and T2 images. Conclusion: To diagnose the cerebral PNET depends on pathology and cerebral PNET have poor prognosis

  4. Improving Anomaly Detection for Text-Based Protocols by Exploiting Message Structures

    Directory of Open Access Journals (Sweden)

    Christian M. Mueller

    2010-12-01

    Full Text Available Service platforms using text-based protocols need to be protected against attacks. Machine-learning algorithms with pattern matching can be used to detect even previously unknown attacks. In this paper, we present an extension to known Support Vector Machine (SVM based anomaly detection algorithms for the Session Initiation Protocol (SIP. Our contribution is to extend the amount of different features used for classification (feature space by exploiting the structure of SIP messages, which reduces the false positive rate. Additionally, we show how combining our approach with attribute reduction significantly improves throughput.

  5. A direct Primitive Variable Recovery Scheme for hyperbolic conservative equations: The case of relativistic hydrodynamics.

    Science.gov (United States)

    Aguayo-Ortiz, A; Mendoza, S; Olvera, D

    2018-01-01

    In this article we develop a Primitive Variable Recovery Scheme (PVRS) to solve any system of coupled differential conservative equations. This method obtains directly the primitive variables applying the chain rule to the time term of the conservative equations. With this, a traditional finite volume method for the flux is applied in order avoid violation of both, the entropy and "Rankine-Hugoniot" jump conditions. The time evolution is then computed using a forward finite difference scheme. This numerical technique evades the recovery of the primitive vector by solving an algebraic system of equations as it is often used and so, it generalises standard techniques to solve these kind of coupled systems. The article is presented bearing in mind special relativistic hydrodynamic numerical schemes with an added pedagogical view in the appendix section in order to easily comprehend the PVRS. We present the convergence of the method for standard shock-tube problems of special relativistic hydrodynamics and a graphical visualisation of the errors using the fluctuations of the numerical values with respect to exact analytic solutions. The PVRS circumvents the sometimes arduous computation that arises from standard numerical methods techniques, which obtain the desired primitive vector solution through an algebraic polynomial of the charges.

  6. Variability of United States Online Rehabilitation Protocols for Proximal Hamstring Tendon Repair.

    Science.gov (United States)

    Lightsey, Harry M; Kantrowitz, David E; Swindell, Hasani W; Trofa, David P; Ahmad, Christopher S; Lynch, T Sean

    2018-02-01

    The optimal postoperative rehabilitation protocol following repair of complete proximal hamstring tendon ruptures is the subject of ongoing investigation, with a need for more standardized regimens and evidence-based modalities. To assess the variability across proximal hamstring tendon repair rehabilitation protocols published online by United States (US) orthopaedic teaching programs. Cross-sectional study. Online proximal hamstring physical therapy protocols from US academic orthopaedic programs were reviewed. A web-based search using the search term complete proximal hamstring repair rehabilitation protocol provided an additional 14 protocols. A comprehensive scoring rubric was developed after review of all protocols and was used to assess each protocol for both the presence of various rehabilitation components and the point at which those components were introduced. Of 50 rehabilitation protocols identified, 35 satisfied inclusion criteria and were analyzed. Twenty-five protocols (71%) recommended immediate postoperative bracing: 12 (34%) prescribed knee bracing, 8 (23%) prescribed hip bracing, and 5 (14%) did not specify the type of brace recommended. Fourteen protocols (40%) advised immediate nonweightbearing with crutches, while 16 protocols (46%) permitted immediate toe-touch weightbearing. Advancement to full weightbearing was allowed at a mean of 7.1 weeks (range, 4-12 weeks). Most protocols (80%) recommended gentle knee and hip passive range of motion and active range of motion, starting at a mean 1.4 weeks (range, 0-3 weeks) and 4.0 weeks (range, 0-6 weeks), respectively. However, only 6 protocols (17%) provided specific time points to initiate full hip and knee range of motion: a mean 8.0 weeks (range, 4-12 weeks) and 7.8 weeks (range, 0-12 weeks), respectively. Considerable variability was noted in the inclusion and timing of strengthening, stretching, proprioception, and cardiovascular exercises. Fifteen protocols (43%) required completion of

  7. An Authenticated Key Agreement Scheme Based on Cyclic Automorphism Subgroups of Random Orders

    Directory of Open Access Journals (Sweden)

    Yang Jun

    2017-01-01

    Full Text Available Group-based cryptography is viewed as a modern cryptographic candidate solution to blocking quantum computer attacks, and key exchange protocols on the Internet are one of the primitives to ensure the security of communication. In 2016 Habeeb et al proposed a “textbook” key exchange protocol based on the semidirect product of two groups, which is insecure for use in real-world applications. In this paper, after discarding the unnecessary disguising notion of semidirect product in the protocol, we establish a simplified yet enhanced authenticated key agreement scheme based on cyclic automorphism subgroups of random orders by making hybrid use of certificates and symmetric-key encryption as challenge-and-responses in the public-key setting. Its passive security is formally analyzed, which is relative to the cryptographic hardness assumption of a computational number-theoretic problem. Cryptanalysis of this scheme shows that it is secure against the intruder-in-the-middle attack even in the worst case of compromising the signatures, and provides explicit key confirmation to both parties.

  8. Home-Based Intervention Program to Reduce Food Insecurity in Elderly Populations Using a TV App: Study Protocol of the Randomized Controlled Trial Saúde.Come Senior.

    Science.gov (United States)

    Rodrigues, Ana Maria; Gregório, Maria João; Gein, Pierre; Eusébio, Mónica; Santos, Maria José; de Sousa, Rute Dinis; Coelho, Pedro S; Mendes, Jorge M; Graça, Pedro; Oliveira, Pedro; Branco, Jaime C; Canhão, Helena

    2017-03-13

    The limited or uncertain access to adequate food in elderly people includes not only economic restrictions but also inability of food utilization due to functional or cognitive impairment, health problems, and illiteracy. The aim of this work is to present the protocol of the randomized controlled trial Saúde.Come Senior, an educational and motivational television (TV)-based intervention to promote healthy lifestyles and decrease food insecurity in elderly people. A randomized controlled study will be conducted in subjects aged 60 years and older with food insecurity, identified at 17 primary care centers in the Lisboa e Vale do Tejo health region in Lisbon, Portugal. The primary outcome will be the changes in participants' food insecurity score (evaluated by the Household Food Insecurity Scale) at 3 months. Change in other outcomes will be assessed (dietary habits, nutritional status, physical activity, health status, and clinical outcomes). Subjects will be followed over 6 months; the intervention will last 3 months. Data collection will be performed at 3 different time points (baseline, end of intervention at 3 months, and follow-up at 6 months). The intervention is based on an interactive TV app with an educational and motivational program specifically developed for the elderly that has weekly themes and includes daily content in video format: (1) nutrition and diet tips for healthy eating, (2) healthy, easy to cook and low-cost recipes, and (3) physical exercise programs. Furthermore, brief reminders on health behaviors will also be broadcasted through the TV app. The total duration of the study will be 6 months. The intervention is considered to be effective and meaningful if 50% of the individuals in the experimental group have a decrease of 1 point in the food insecurity score, all the remaining being unchanged. We expect to include and randomize 282 (141 experimental and 141 control) elderly with food insecurity. We will recruit a total of 1,128 subjects

  9. WE-D-207-03: CT Protocols for Screening and the ACR Designated Lung Screening Program

    International Nuclear Information System (INIS)

    McNitt-Gray, M.

    2015-01-01

    In the United States, Lung Cancer is responsible for more cancer deaths than the next four cancers combined. In addition, the 5 year survival rate for lung cancer patients has not improved over the past 40 to 50 years. To combat this deadly disease, in 2002 the National Cancer Institute launched a very large Randomized Control Trial called the National Lung Screening Trial (NLST). This trial would randomize subjects who had substantial risk of lung cancer (due to age and smoking history) into either a Chest X-ray arm or a low dose CT arm. In November 2010, the National Cancer Institute announced that the NLST had demonstrated 20% fewer lung cancer deaths among those who were screened with low-dose CT than with chest X-ray. In December 2013, the US Preventive Services Task Force recommended the use of Lung Cancer Screening using low dose CT and a little over a year later (Feb. 2015), CMS announced that Medicare would also cover Lung Cancer Screening using low dose CT. Thus private and public insurers are required to provide Lung Cancer Screening programs using CT to the appropriate population(s). The purpose of this Symposium is to inform medical physicists and prepare them to support the implementation of Lung Screening programs. This Symposium will focus on the clinical aspects of lung cancer screening, requirements of a screening registry for systematically capturing and tracking screening patients and results (such as required Medicare data elements) as well as the role of the medical physicist in screening programs, including the development of low dose CT screening protocols. Learning Objectives: To understand the clinical basis and clinical components of a lung cancer screening program, including eligibility criteria and other requirements. To understand the data collection requirements, workflow, and informatics infrastructure needed to support the tracking and reporting components of a screening program. To understand the role of the medical physicist in

  10. Primitive neuroectodermal tumour of the kidney: radiologic-pathological correlations.

    Science.gov (United States)

    Chea, Y W; Agrawal, Rashi; Poh, Angeline C C

    2008-06-01

    A primitive neuroectodermal tumour of the kidney is a rare malignancy. We report the computed tomographic features and the histopathological correlation of such a tumour occurring in a middle-aged man. Although the radiological appearance has significant overlap with other renal tumours, this tumour should be included in the differential diagnosis of a large renal mass in younger patients.

  11. Effects of Adding an Internet-Based Pain Coping Skills Training Protocol to a Standardized Education and Exercise Program for People With Persistent Hip Pain (HOPE Trial): Randomized Controlled Trial Protocol.

    Science.gov (United States)

    Bennell, Kim L; Rini, Christine; Keefe, Francis; French, Simon; Nelligan, Rachel; Kasza, Jessica; Forbes, Andrew; Dobson, Fiona; Abbott, J Haxby; Dalwood, Andrew; Vicenzino, Bill; Harris, Anthony; Hinman, Rana S

    2015-10-01

    Persistent hip pain in older people is usually due to hip osteoarthritis (OA), a major cause of pain, disability, and psychological dysfunction. The purpose of this study is to evaluate whether adding an Internet-based pain coping skills training (PCST) protocol to a standardized intervention of education followed by physical therapist-instructed home exercise leads to greater reductions in pain and improvements in function. An assessor-, therapist-, and participant-blinded randomized controlled trial will be conducted. The study will be conducted in a community setting. The participants will be 142 people over 50 years of age with self-reported hip pain consistent with hip OA. Participants will be randomly allocated to: (1) a control group receiving a 24-week standardized intervention comprising an 8-week Internet-based education package followed by 5 individual physical therapy exercise sessions plus home exercises (3 times weekly) or (2) a PCST group receiving an 8-week Internet-based PCST protocol in addition to the control intervention. Outcomes will be measured at baseline and 8, 24, and 52 weeks, with the primary time point at 24 weeks. Primary outcomes are hip pain on walking and self-reported physical function. Secondary outcomes include health-related quality-of-life, participant-perceived treatment response, self-efficacy for pain management and function, pain coping attempts, pain catastrophizing, and physical activity. Measurements of adherence, adverse events, use of health services, and process measures will be collected at 24 and 52 weeks. Cost-effectiveness will be assessed at 52 weeks. A self-reported diagnosis of persistent hip pain will be used. The findings will help determine whether adding an Internet-based PCST protocol to standardized education and physical therapist-instructed home exercise is more effective than education and exercise alone for persistent hip pain. This study has the potential to guide clinical practice toward innovative

  12. A hash based mutual RFID tag authentication protocol in telecare medicine information system.

    Science.gov (United States)

    Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C

    2015-01-01

    Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.

  13. Optimal primitive reference frames

    International Nuclear Information System (INIS)

    Jennings, David

    2011-01-01

    We consider the smallest possible directional reference frames allowed and determine the best one can ever do in preserving quantum information in various scenarios. We find that for the preservation of a single spin state, two orthogonal spins are optimal primitive reference frames; and in a product state, they do approximately 22% as well as an infinite-sized classical frame. By adding a small amount of entanglement to the reference frame, this can be raised to 2(2/3) 5 =26%. Under the different criterion of entanglement preservation, a very similar optimal reference frame is found; however, this time it is for spins aligned at an optimal angle of 87 deg. In this case 24% of the negativity is preserved. The classical limit is considered numerically, and indicates under the criterion of entanglement preservation, that 90 deg. is selected out nonmonotonically, with a peak optimal angle of 96.5 deg. for L=3 spins.

  14. Streetlight Control System Based on Wireless Communication over DALI Protocol

    Science.gov (United States)

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-01-01

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed. PMID:27128923

  15. Streetlight Control System Based on Wireless Communication over DALI Protocol.

    Science.gov (United States)

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-04-27

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed.

  16. Primitive Path Analysis and Stress Distribution in Highly Strained Macromolecules.

    Science.gov (United States)

    Hsu, Hsiao-Ping; Kremer, Kurt

    2018-01-16

    Polymer material properties are strongly affected by entanglement effects. For long polymer chains and composite materials, they are expected to be at the origin of many technically important phenomena, such as shear thinning or the Mullins effect, which microscopically can be related to topological constraints between chains. Starting from fully equilibrated highly entangled polymer melts, we investigate the effect of isochoric elongation on the entanglement structure and force distribution of such systems. Theoretically, the related viscoelastic response usually is discussed in terms of the tube model. We relate stress relaxation in the linear and nonlinear viscoelastic regimes to a primitive path analysis (PPA) and show that tension forces both along the original paths and along primitive paths, that is, the backbone of the tube, in the stretching direction correspond to each other. Unlike homogeneous relaxation along the chain contour, the PPA reveals a so far not observed long-lived clustering of topological constraints along the chains in the deformed state.

  17. Tubulin post-translational modifications in the primitive protist Trichomonas vaginalis.

    Science.gov (United States)

    Delgado-Viscogliosi, P; Brugerolle, G; Viscogliosi, E

    1996-01-01

    Using several specific monoclonal antibodies, we investigated the occurrence and distribution of different post-translationally modified tubulin during interphase and division of the primitive flagellated protist Trichomonas vaginalis. Immunoblotting and immunofluorescence experiments revealed that interphasic microtubular structures of T. vaginalis contained acetylated and glutamylated but non-tyrosinated and non-glycylated [Brugerolle and Adoutte, 1988: Bio Systems 21: 255-268] tubulin. Immunofluorescence studies performed on dividing cells showed that the extranuclear mitotic spindle (or paradesmosis) was acetylated and glutamylated, which contrast with the ephemeral nature of this structure. Newly formed short axostyles also contained acetylated and glutamylated tubulin suggesting that both post-translational modifications might take place very early after assembly of microtubular structures. Our results indicate that acetylation and glutamylation of tubulin appeared early in the history of eukaryotes and could reflect the occurrence of post-translational modifications of tubulin in the primitive eukaryotic cells. These cells probably had a highly ordered cross-linked microtubular cytoskeleton in which microtubules showed a low level of subunit exchange dynamics.

  18. EUS-FNA for the Diagnosis of Retroperitoneal Primitive Neuroectodermal Tumor

    Directory of Open Access Journals (Sweden)

    Aijaz A. Sofi

    2011-01-01

    Full Text Available Primitive neuroectodermal tumor (PNET is a rare “small round blue cell tumor” that is diagnosed by open biopsy or percutaneous biopsy of the lesion under radiologic guidance. In this case report, we present a novel approach to the diagnosis of a retroperitoneal PNET by endoscopic ultrasound- (EUS- guided fine needle aspiration (FNA. A 35-year-old man presented with the history of left-sided flank pain and swelling of 3-weeks duration. Computerized tomography (CT scan of his abdomen revealed a 12.8 × 13 × 12.5 cm cystic and solid mass arising from the retroperitoneum and displacing the third and fourth portions of the duodenum. He underwent EUS which revealed a well-circumscribed heterogeneous mass abutting the inferior portion of the stomach. EUS-FNA of the mass revealed malignant cells consistent with primitive neuroectodermal tumor (PNET/Ewing's sarcoma. EUS-guided FNA is an appropriate technique for diagnosing retroperitoneal PNET/Ewing's sarcoma.

  19. Fate of the three embryonic dural sinuses in infants: the primitive tentorial sinus, occipital sinus, and falcine sinus.

    Science.gov (United States)

    Mizutani, Katsuhiro; Miwa, Tomoru; Akiyama, Takenori; Sakamoto, Yoshiaki; Fujiwara, Hirokazu; Yoshida, Kazunari

    2018-03-01

    The primitive tentorial, occipital, and falcine sinuses are thought to attain the adult pattern or regress between the fetal stage and adulthood. The anatomy of these three primitive dural sinuses has seldom been studied in the infant population, and it remains unclear when these dural sinuses reach the adult condition. Using computed tomography digital subtraction venography (CT-DSV), we analyzed the anatomy of these embryonic dural sinuses in infants. We included 13 infants who underwent CT-DSV prior to neurosurgery and 35 cases with unruptured cerebral aneurysms as normal adult controls. Three embryonic dural sinuses, i.e., the primitive tentorial, occipital, and falcine sinuses, were retrospectively analyzed in CT-DSV images of infants and adults. We also analyzed the drainage patterns of the superficial middle cerebral vein (SMCV), determined by the connection between the primitive tentorial sinus and the cavernous sinus. The primitive tentorial, occipital, and falcine sinuses were present in 15.4%, 46.2%, and none of the infants, respectively, and in 10.0, 8.6, and 2.9% of the adults, respectively. The difference in SMCV draining pattern between infants and adults was insignificant. The incidence of the occipital sinus was significantly higher in infants than in adults. The connection between the primitive tentorial sinus and the cavernous sinus appears to be established before birth. The occipital sinus is formed at the embryonic stage and mostly regresses after infancy. The falcine sinus is usually obliterated prenatally. Our findings form the basis for interventions by pediatric interventional neuroradiologists and neurosurgeons.

  20. Cell adhesive affinity does not dictate primitive endoderm segregation and positioning during murine embryoid body formation.

    Science.gov (United States)

    Moore, Robert; Cai, Kathy Q; Escudero, Diogo O; Xu, Xiang-Xi

    2009-09-01

    The classical cell sorting experiments undertaken by Townes and Holtfreter described the intrinsic propensity of dissociated embryonic cells to self-organize and reconcile into their original embryonic germ layers with characteristic histotypic positioning. Steinberg presented the differential adhesion hypothesis to explain these patterning phenomena. Here, we have reappraised these issues by implementing embryoid bodies to model the patterning of epiblast and primitive endoderm layers. We have used combinations of embryonic stem (ES) cells and their derivatives differentiated by retinoic acid treatment to model epiblast and endoderm cells, and wild-type or E-cadherin null cells to represent strongly or weakly adherent cells, respectively. One cell type was fluorescently labeled and reconstituted with another heterotypically to generate chimeric embryoid bodies, and cell sorting was tracked by time-lapse video microscopy and confirmed by immunostaining. When undifferentiated wild-type and E-cadherin null ES cells were mixed, the resulting cell aggregates consisted of a core of wild-type cells surrounded by loosely associated E-cadherin null cells, consistent with the differential adhesion hypothesis. However, when mixed with undifferentiated ES cells, the differentiated primitive endoderm-like cells sorted to the surface to form a primitive endoderm layer irrespective of cell-adhesive strength, contradicting the differential adhesion hypothesis. We propose that the primitive endoderm cells reach the surface by random movement, and subsequently the cells generate an apical/basal polarity that prevents reentry. Thus, the ability to generate epithelial polarity, rather than adhesive affinity, determines the surface positioning of the primitive endoderm cells. (c) 2009 Wiley-Liss, Inc.

  1. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    Directory of Open Access Journals (Sweden)

    Srinivas Kanakala

    2014-01-01

    Full Text Available In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing protocol to further reduce the energy consumption. The proposed energy-efficient coding-aware cluster based routing protocol (ECCRP scheme applies network coding at cluster heads to reduce number of transmissions. We also modify the queue management procedure of COPE protocol to further improve coding opportunities. We also use an energy efficient scheme while selecting the cluster head. It helps to increase the life time of the network. We evaluate the performance of proposed energy efficient cluster based protocol using simulation. Simulation results show that the proposed ECCRP algorithm reduces energy consumption and increases life time of the network.

  2. A Test of Durkheim's Theory of Suicide in Primitive Societies.

    Science.gov (United States)

    Lester, David

    1992-01-01

    Classified primitive societies as high, moderate, or low on independent measures of social integration and social regulation to test Durkheim's theory of suicide. Estimated frequency of suicide did not differ between those societies predicted to have high, moderate, and low suicide rates. Durkheim's theory was not confirmed. (Author/NB)

  3. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks

    Science.gov (United States)

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-hoon

    2017-01-01

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads. PMID:28531159

  4. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.

    Science.gov (United States)

    Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-Hoon

    2017-05-22

    In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads.

  5. Programming with Intervals

    Science.gov (United States)

    Matsakis, Nicholas D.; Gross, Thomas R.

    Intervals are a new, higher-level primitive for parallel programming with which programmers directly construct the program schedule. Programs using intervals can be statically analyzed to ensure that they do not deadlock or contain data races. In this paper, we demonstrate the flexibility of intervals by showing how to use them to emulate common parallel control-flow constructs like barriers and signals, as well as higher-level patterns such as bounded-buffer producer-consumer. We have implemented intervals as a publicly available library for Java and Scala.

  6. The genomes of two key bumblebee species with primitive eusocial organization

    DEFF Research Database (Denmark)

    Sadd, Ben M.; Barribeau, Seth M.; Bloch, Guy

    2015-01-01

    BACKGROUND: The shift from solitary to social behavior is one of the major evolutionary transitions. Primitively eusocial bumblebees are uniquely placed to illuminate the evolution of highly eusocial insect societies. Bumblebees are also invaluable natural and agricultural pollinators, and there ...

  7. Implementation of an Evidence-Based Protocol for Surgical Infection Prophylaxis

    National Research Council Canada - National Science Library

    Savino, John A; Smeland, Jane; Flink, Ellen L; Ruperto, Angelo; Hines, Amanda; Sullivan, Thomas; Galvin, Kerri; Risucci, Donald A

    2005-01-01

    An evidence-based surgical antimicrobial prophylaxis (AMP) protocol was implemented in multiple facilities to determine if compliance led to a decrease in New York State reportable surgical site infections (SSIs...

  8. An Ada-based preprocessor language for concurrent object oriented programming

    International Nuclear Information System (INIS)

    Almulla, M.; Al-Haddad, M.; Loeper, H.

    2001-01-01

    In this paper, implementation issues of concurrent-objected programming using Ada 95 are addressed. Ada is not a pure object-oriented language; in order to make it so, a uniform template for structuring object classes is proposed. The template constitutes a basis for an Ada-based preprocessor language that handles concurrent object-oriented programming. The preprocessor accepts Ada-like object-oriented programs (object classes, subclasses and main program) as input and produces Ada 95 concurrent object-oriented program units as output. The preprocessor language has the advantage of adding a new component to the class specification called the protocol, which specifies the order for requesting methods f an object. The preprocessor also touches on the extensibility of object classes issue. It supports defining class hierarchies by inheritance and aggregation. In addition, the preprocessor language supports the re-use of Ada packages, which are not necessarily written according to the object-oriented approach. The paper also investigates the definition of circular dependent object classes and proposes a solution for introducing a collection of classes. (author)

  9. Commercial Building Energy Asset Score Program Overview and Technical Protocol (Version 1.1)

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Na; Goel, Supriya; Makhmalbaf, Atefe

    2013-08-09

    The U.S. Department of Energy (DOE) is developing a voluntary national scoring system for commercial buildings to help building owners and managers assess a building’s energy-related systems independent of operations. The goal of the score is to facilitate cost-effective investment in energy efficiency improvements of commercial buildings. The system, known as the Commercial Building Energy Asset Score, will allow building owners and managers to compare their building infrastructure against peers and track building upgrades over time. The system will also help other building stakeholders (e.g., building investors, tenants, financiers, and appraisers) understand the relative efficiency of different buildings in a way that is independent from operations and occupancy. This report outlines the technical protocol used to generate the energy asset score, explains the scoring methodology, and provides additional details regarding the energy asset scoring tool. The alternative methods that were considered prior to developing the current approach are described in the Program Overview and Technical Protocol Version 1.0.

  10. Octopus arm movements under constrained conditions: adaptation, modification and plasticity of motor primitives.

    Science.gov (United States)

    Richter, Jonas N; Hochner, Binyamin; Kuba, Michael J

    2015-04-01

    The motor control of the eight highly flexible arms of the common octopus (Octopus vulgaris) has been the focus of several recent studies. Our study is the first to manage to introduce a physical constraint to an octopus arm and investigate the adaptability of stereotypical bend propagation in reaching movements and the pseudo-limb articulation during fetching. Subjects (N=6) were placed inside a transparent Perspex box with a hole at the center that allowed the insertion of a single arm. Animals had to reach out through the hole toward a target, to retrieve a food reward and fetch it. All subjects successfully adjusted their movements to the constraint without an adaptation phase. During reaching tasks, the animals showed two movement strategies: stereotypical bend propagation reachings, which were established at the hole of the Perspex box and variant waving-like movements that showed no bend propagations. During fetching movements, no complete pseudo-joint fetching was observed outside the box and subjects pulled their arms through the hole in a pull-in like movement. Our findings show that there is some flexibility in the octopus motor system to adapt to a novel situation. However, at present, it seems that these changes are more an effect of random choices between different alternative motor programs, without showing clear learning effects in the choice between the alternatives. Interestingly, animals were able to adapt the fetching movements to the physical constraint, or as an alternative explanation, they could switch the motor primitive fetching to a different motor primitive 'arm pulling'. © 2015. Published by The Company of Biologists Ltd.

  11. Phase diagram of the restricted primitive model: charge-ordering instability

    Directory of Open Access Journals (Sweden)

    O.V.Patsahan

    2004-01-01

    Full Text Available We study the phase behaviour of the restricted primitive model (RPM using a microscopic approach based on the method of collective variables with a reference system. Starting from the Hamiltonian of the RPM we derive the functional of the grand partition function given in terms of the two collective variables: the collective variables ρk and ck describing fluctuations of the total number density and charge density, respectively. Within the framework of the Gaussian approximation we found the boundary of stability with respect to fluctuations of the charge density. It is shown that due to the approximated character of the theory the boundary of stability is very sensitive to the particular choice of the long-range part of potential inside the hard core. This point is discussed in more detail.

  12. Automatic Generation of Network Protocol Gateways

    DEFF Research Database (Denmark)

    Bromberg, Yérom-David; Réveillère, Laurent; Lawall, Julia

    2009-01-01

    for describing protocol behaviors, message structures, and the gateway logic.  Z2z includes a compiler that checks essential correctness properties and produces efficient code. We have used z2z to develop a number of gateways, including SIP to RTSP, SLP to UPnP, and SMTP to SMTP via HTTP, involving a range......The emergence of networked devices in the home has made it possible to develop applications that control a variety of household functions. However, current devices communicate via a multitude of incompatible protocols, and thus gateways are needed to translate between them.  Gateway construction......, however, requires an intimate knowledge of the relevant protocols and a substantial understanding of low-level network programming, which can be a challenge for many application programmers. This paper presents a generative approach to gateway construction, z2z, based on a domain-specific language...

  13. Researches on the Security of Cluster-based Communication Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yanhong Sun

    2014-08-01

    Full Text Available Along with the in-depth application of sensor networks, the security issues have gradually become the bottleneck of wireless sensor applications. To provide a solution for security scheme is a common concern not only of researchers but also of providers, integrators and users of wireless sensor networks. Based on this demand, this paper focuses on the research of strengthening the security of cluster-based wireless sensor networks. Based on the systematic analysis of the clustering protocol and its security enhancement scheme, the paper introduces the broadcast authentication scheme, and proposes an SA-LEACH network security enhancement protocol. The performance analysis and simulation experiments prove that the protocol consumes less energy with the same security requirements, and when the base station is comparatively far from the network deployment area, it is more advantageous in terms of energy consumption and t more suitable for wireless sensor networks.

  14. Acumulação primitiva:  um processo atuante na sociedade contemporânea Accumulation Primitive: un processus actif dans la societé contemporaine Primitive accumulation: a process active in contemporary society

    Directory of Open Access Journals (Sweden)

    Sandra Lencioni

    2012-03-01

    acumulação primitiva e reprodução do capital na sociedade contemporânea.Dans le contexte d'hégémonie de la reproduction sociale capitaliste, l'accumulation primitive est interprétée soit comme un processus du passé, soit comme un processus qui se fait présent jusqu’aujourd’hui. Notre point de vue est que l'accumulacion primitive historique n'a pas disparu. Au contraire, elle est encore une importante composante de la société contemporaine. En ce cas, les deux processus capitalistes, d'accumulation primitive et de reproduction du capital, coexistent et s’accomplissent de façon contradictoire et dialectique. Le premier processus est attaché à la spoliation et à la production d'un capital nouveau, alors que le second est attaché à l'exploration d’un capital déjà constitué qui, en même temps, fait partie de celui là. La différence entre les deux termes, spoliation et exploration, est examinée dans la première partie du texte, et en considérant la position de Harvey à propos de cette controverse. Dans la deuxième partie on discute l'accumulation primitive qui se manifeste aujourd’hui, comme la fraude, le vol et la violence, tels qu’ils se présentaient lors de la genèse du capitalisme. Bien que le monde ait changé, à cause du progrès technique, et malgré l’existence de lois de protection des droits de l'homme, il y a encore des actions semblables à celles de cette époque là. Ces actions se manifestent vraiment comme expédientes de la production du capital à la façon primitive, à savoir: le vol de terres; la rapine des ressources naturelles y inclus la biopiraterie; l'esclavage pour dette, une forme violente de spoliation où le travailleur libre, par les mécanismes de domination auxquels il est soumis, perd sa liberté. Par conséquent, on propose la thèse suivante : toutes les formes de spoliation sont productrices d'argent et de capital en potentiel et le capital financier, à son tour,  construit particuli

  15. The Fangshan/Family-based Ischemic Stroke Study In China (FISSIC protocol

    Directory of Open Access Journals (Sweden)

    Chen Dafang

    2007-09-01

    Full Text Available Abstract Background The exact etiology of ischemic stroke remains unclear, because multiple genetic predispositions and environmental risk factors may be involved, and their interactions dictate the complexity. Family-based studies provide unique features in design, while they are currently underrepresented for studies of ischemic stroke in developing countries. The Fangshan/Family-based Ischemic Stroke Study In China (FISSIC program aims to conduct a genetic pedigree study of ischemic stroke in rural communities of China. Methods/Design The pedigrees of ischemic stroke with clear documentation are recruited by using the proband-initiated contact method, based on the stroke registry in hospital and communities. Blood samples and detailed information of pedigrees are collected through the health care network in the rural area, and prospective follow-up of the pedigrees cohort is scheduled. Complementary strategies of both family-based design and matched case-spousal control design are used, and comprehensive statistical methods will be implemented to ascertain potential complex genetic and environmental factors and their interactions as well. Discussion This study is complementary to other genetic pedigree studies of ischemic stroke, such as the Siblings With Ischemic Stroke Study (SWISS, which are established in developed countries. We describe the protocol of this family-based genetic epidemiological study that may be used as a new practical guideline and research paradigm in developing countries and facilitate initiatives of stroke study for international collaborations.

  16. Research on Multioperator silk screen printer Based on Communication Protocol Macro

    Directory of Open Access Journals (Sweden)

    Zhiming Zhang

    2018-01-01

    Full Text Available Multioperator silk screen printer is automatic silk screen printing equipment. There are many advantages, such as energy saving, reduce the labor intensity and so on. The control system consists of an intermittent movement main motor and eight color working station printing cycle motion motors. The system controls nine frequency converters through protocol macro communication by using PLC. This paper studies the principle and process characteristics of multioperator silk screen printer. Besides, this paper adopts protocol macro sequence generation method for communication between PLC and frequency converter. This method can control the programming of parameters, such as frequency, operation and monitoring. It also can realize the printing of eight color working stations and monitor the printing status in real time. The practical application proves that the method meets the technical requirements and the reliability is good.

  17. On the small time asymptotics of 3D stochastic primitive equations

    OpenAIRE

    Dong, Zhao; Zhang, Rangrang

    2017-01-01

    In this paper, we establish a small time large deviation principle for the strong solution of 3D stochastic primitive equations driven by multiplicative noise. Both the small noise and the small, but highly nonlinear, unbounded nonlinear terms should be taken into consideration.

  18. Primary extraskeletal Ewing's sarcoma/primitive neuroectodermal tumour of breast

    OpenAIRE

    Ikhwan, S M; Kenneth, V K T; Seoparjoo, A; Zin, A A M

    2013-01-01

    Primary primitive neuroectodermal tumour (PNET) and extraskeletal Ewing's sarcoma belongs to the Ewing's family of tumours. Primary tumours arising from breast are very rare. There are only a few case reports published on primary extraskeletal Ewing's sarcoma and PNET arising from breast. We present an extremely rare case of an inoperable primary Ewing's sarcoma arising from left breast with contralateral breast, lymphatic and lung metastasis.

  19. Primary extraskeletal Ewing's sarcoma/primitive neuroectodermal tumour of breast.

    Science.gov (United States)

    Ikhwan, S M; Kenneth, V K T; Seoparjoo, A; Zin, A A M

    2013-06-21

    Primary primitive neuroectodermal tumour (PNET) and extraskeletal Ewing's sarcoma belongs to the Ewing's family of tumours. Primary tumours arising from breast are very rare. There are only a few case reports published on primary extraskeletal Ewing's sarcoma and PNET arising from breast. We present an extremely rare case of an inoperable primary Ewing's sarcoma arising from left breast with contralateral breast, lymphatic and lung metastasis.

  20. Streetlight Control System Based on Wireless Communication over DALI Protocol

    Directory of Open Access Journals (Sweden)

    Francisco José Bellido-Outeiriño

    2016-04-01

    Full Text Available Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed.

  1. Design of Bus Protocol Intelligent Initiation System Based On RS485

    Directory of Open Access Journals (Sweden)

    Li Liming

    2017-01-01

    Full Text Available In order to design an effective and reliable RS485 bus protocol based on RS485 bus, this paper introduces the structure and transmission mode of the command frame and the response frame, and also introduce four control measures and the communication in order to process quality of this system. The communication protocol is open, tolerant, reliable and fast, and can realize ignition more reliable and accurate in the intelligent initiation system.

  2. A PICKED SAMPLE TO THE FOOTPRINT OF PRIMITIVE INDIVIDUALISM OF RECENT DATE ART: BASQUIAT

    Directory of Open Access Journals (Sweden)

    Ozgur TOSUN

    2015-09-01

    Full Text Available Through the culturel history, meaning of art and art object have been queried and these researchs have emerged thesis and antithesis. Fundamentaly, this article aim to comparison interaction and/or conflict with mathematical rationalist art and primitive/heuristical/romantic art. In this context, effects of primitive and experssive art to the nowadays’ art perception are examined to envolve out of Basquiat and neo expressionism. Entailment of expressive art in contemporary art is researched for answers for questions in terms of cultural and genetic heritage of art and instinctive origins of making art object.

  3. Does a Wii-based exercise program enhance balance control of independently functioning older adults? A systematic review

    Science.gov (United States)

    Laufer, Yocheved; Dar, Gali; Kodesh, Einat

    2014-01-01

    Background Exercise programs that challenge an individual’s balance have been shown to reduce the risk of falls among older adults. Virtual reality computer-based technology that provides the user with opportunities to interact with virtual objects is used extensively for entertainment. There is a growing interest in the potential of virtual reality-based interventions for balance training in older adults. This work comprises a systematic review of the literature to determine the effects of intervention programs utilizing the Nintendo Wii console on balance control and functional performance in independently functioning older adults. Methods Studies were obtained by searching the following databases: PubMed, CINAHL, PEDro, EMBASE, SPORTdiscus, and Google Scholar, followed by a hand search of bibliographic references of the included studies. Included were randomized controlled trials written in English in which Nintendo Wii Fit was used to enhance standing balance performance in older adults and compared with an alternative exercise treatment, placebo, or no treatment. Results Seven relevant studies were retrieved. The four studies examining the effect of Wii-based exercise compared with no exercise reported positive effects on at least one outcome measure related to balance performance in older adults. Studies comparing Wii-based training with alternative exercise programs generally indicated that the balance improvements achieved by Wii-based training are comparable with those achieved by other exercise programs. Conclusion The review indicates that Wii-based exercise programs may serve as an alternative to more conventional forms of exercise aimed at improving balance control. However, due to the great variability between studies in terms of the intervention protocols and outcome measures, as well as methodological limitations, definitive recommendations as to optimal treatment protocols and the potential of such an intervention as a safe and effective home-based

  4. Does a Wii-based exercise program enhance balance control of independently functioning older adults? A systematic review.

    Science.gov (United States)

    Laufer, Yocheved; Dar, Gali; Kodesh, Einat

    2014-01-01

    Exercise programs that challenge an individual's balance have been shown to reduce the risk of falls among older adults. Virtual reality computer-based technology that provides the user with opportunities to interact with virtual objects is used extensively for entertainment. There is a growing interest in the potential of virtual reality-based interventions for balance training in older adults. This work comprises a systematic review of the literature to determine the effects of intervention programs utilizing the Nintendo Wii console on balance control and functional performance in independently functioning older adults. STUDIES WERE OBTAINED BY SEARCHING THE FOLLOWING DATABASES: PubMed, CINAHL, PEDro, EMBASE, SPORTdiscus, and Google Scholar, followed by a hand search of bibliographic references of the included studies. Included were randomized controlled trials written in English in which Nintendo Wii Fit was used to enhance standing balance performance in older adults and compared with an alternative exercise treatment, placebo, or no treatment. Seven relevant studies were retrieved. The four studies examining the effect of Wii-based exercise compared with no exercise reported positive effects on at least one outcome measure related to balance performance in older adults. Studies comparing Wii-based training with alternative exercise programs generally indicated that the balance improvements achieved by Wii-based training are comparable with those achieved by other exercise programs. The review indicates that Wii-based exercise programs may serve as an alternative to more conventional forms of exercise aimed at improving balance control. However, due to the great variability between studies in terms of the intervention protocols and outcome measures, as well as methodological limitations, definitive recommendations as to optimal treatment protocols and the potential of such an intervention as a safe and effective home-based treatment cannot be made at this

  5. Abundances of presolar silicon carbide grains in primitive meteorites determined by NanoSIMS

    Science.gov (United States)

    Davidson, Jemma; Busemann, Henner; Nittler, Larry R.; Alexander, Conel M. O.'D.; Orthous-Daunay, François-Régis; Franchi, Ian A.; Hoppe, Peter

    2014-08-01

    It has been suggested that the matrices of all chondrites are dominated by a common material with Ivuna-like (CI) abundances of volatiles, presolar grains and insoluble organic matter (IOM) (e.g., Alexander, 2005). However, matrix-normalized abundances of presolar silicon carbide (SiC) grains estimated from their noble gas components show significant variations in even the most primitive chondrites (Huss and Lewis, 1995; Huss et al., 2003), in contradiction to there being a common chondrite matrix material. Here we report presolar SiC abundances determined by NanoSIMS raster ion imaging of IOM extracted from primitive members of different meteorite groups. We show that presolar SiC abundance determinations are comparable between NanoSIMS instruments located at three different institutes, between residues prepared by different demineralization techniques, and between microtomed and non-microtomed samples. Our derived SiC abundances in CR chondrites are comparable to those found in the CI chondrites (∼30 ppm) and are much higher than previously determined by noble gas analyses. The revised higher CR SiC abundances are consistent with the CRs being amongst the most primitive chondrites in terms of the isotopic compositions and disordered nature of their organic matter. Similar abundances between CR1, CR2, and CR3 chondrites indicate aqueous alteration on the CR chondrite parent body has not progressively destroyed SiC grains in them. A low SiC abundance for the reduced CV3 RBT 04133 can be explained by parent body thermal metamorphism at an estimated temperature of ∼440 °C. Minor differences between primitive members of other meteorite classes, which did not experience such high temperatures, may be explained by prolonged oxidation at lower temperatures under which SiC grains formed outer layers of SiO2 that were not thermodynamically stable, leading to progressive degassing/destruction of SiC.

  6. Medulloblastomas - primitive neuroectodermal tumours in the adult population

    International Nuclear Information System (INIS)

    Smee, R.I.; Williams, J.R.

    2008-01-01

    Medulloblastomas - primitive neuroectodermal tumours are rare in adults. This review will evaluate a single centre's experience with this malignancy. The medulloblastoma - primitive neuroectodermal tumour database was evaluated for all patients aged more than 18 years who were referred for management. Relevant information from the database was abstracted to provide a descriptive record of this malignancy. Between 1977-2004 there were 11 patients referred, 1 with persistent disease and 10 were eligible, presenting with initial diagnosis. There was increased intracranial pressure in 50% of patients. Most patients had symptoms >3 months, with three having symptoms 1-3 months before diagnosis and one patient having thoracic dural metastases at presentation. Complete resection was recorded in four patients and six had 50-90% resection. All patients completed craniospinal radiotherapy (35-36 Gy at 1.8-2.0 Gy fractions) barring one patient, who died of surgical complications during his radiotherapy. Chemotherapy was given in five of the nine patients postradiotherapy. There were two posterior fossa recurrences, with associated supratentorial and extra central nervous system disease. Of the 10 primary patients 7 are alive with no evidence of diease, 2 died because of disease, with 1 intercurrent death. One patient developed a second malignancy. The outcome for adults matches that of the more common paediatric patients. Radiotherapy could control local disease even where complete resection was not achieved.

  7. Stochastic Ocean Predictions with Dynamically-Orthogonal Primitive Equations

    Science.gov (United States)

    Subramani, D. N.; Haley, P., Jr.; Lermusiaux, P. F. J.

    2017-12-01

    The coastal ocean is a prime example of multiscale nonlinear fluid dynamics. Ocean fields in such regions are complex and intermittent with unstationary heterogeneous statistics. Due to the limited measurements, there are multiple sources of uncertainties, including the initial conditions, boundary conditions, forcing, parameters, and even the model parameterizations and equations themselves. For efficient and rigorous quantification and prediction of these uncertainities, the stochastic Dynamically Orthogonal (DO) PDEs for a primitive equation ocean modeling system with a nonlinear free-surface are derived and numerical schemes for their space-time integration are obtained. Detailed numerical studies with idealized-to-realistic regional ocean dynamics are completed. These include consistency checks for the numerical schemes and comparisons with ensemble realizations. As an illustrative example, we simulate the 4-d multiscale uncertainty in the Middle Atlantic/New York Bight region during the months of Jan to Mar 2017. To provide intitial conditions for the uncertainty subspace, uncertainties in the region were objectively analyzed using historical data. The DO primitive equations were subsequently integrated in space and time. The probability distribution function (pdf) of the ocean fields is compared to in-situ, remote sensing, and opportunity data collected during the coincident POSYDON experiment. Results show that our probabilistic predictions had skill and are 3- to 4- orders of magnitude faster than classic ensemble schemes.

  8. Amylose primitive médiastinale d'aspect pseudotumoral

    Science.gov (United States)

    Mahfoudhi, Madiha; Mamlouk, Habiba; Turki, Sami; Kheder, Adel

    2015-01-01

    L'amylose primitive médiastinale isolée est rare et de diagnostic difficile. Nous rapportons l'observation d'un patient âgé de 41 ans ayant présenté une dyspnée et des crachats hémoptoïques. A l'examen physique il n'avait pas d'hypotension orthostatique. Les aires ganglionnaires périphériques étaient libres. La tomodensitométrie thoracique a objectivé un magma d'adénopathies médiastinales réalisant une masse de 45 mm x 60 mm. L'examen anatomopathologique d'une biopsie ganglionnaire guidée par médiastinoscopie a conclut a une amylose médiastinale de type AL. Il n'avait pas d'autres localisations amyloïdes. Un myélome multiple a été éliminé. Le diagnostic d'amylose primitive médiastinale de type AL a été retenu. Le traitement s'est basé sur des cures de Melphalan-prednisone. La chirurgie était évitée vu le risque hémorragique élevé. L’évolution était marquée par l'amélioration de la dyspnée, la disparition de l'hémoptysie et la diminution de la taille de la masse ganglionnaire devenant 25 mm x 20 mm. PMID:26308913

  9. Variability of United States Online Rehabilitation Protocols for Proximal Hamstring Tendon Repair

    Science.gov (United States)

    Lightsey, Harry M.; Kantrowitz, David E.; Swindell, Hasani W.; Trofa, David P.; Ahmad, Christopher S.; Lynch, T. Sean

    2018-01-01

    Background: The optimal postoperative rehabilitation protocol following repair of complete proximal hamstring tendon ruptures is the subject of ongoing investigation, with a need for more standardized regimens and evidence-based modalities. Purpose: To assess the variability across proximal hamstring tendon repair rehabilitation protocols published online by United States (US) orthopaedic teaching programs. Study Design: Cross-sectional study. Methods: Online proximal hamstring physical therapy protocols from US academic orthopaedic programs were reviewed. A web-based search using the search term complete proximal hamstring repair rehabilitation protocol provided an additional 14 protocols. A comprehensive scoring rubric was developed after review of all protocols and was used to assess each protocol for both the presence of various rehabilitation components and the point at which those components were introduced. Results: Of 50 rehabilitation protocols identified, 35 satisfied inclusion criteria and were analyzed. Twenty-five protocols (71%) recommended immediate postoperative bracing: 12 (34%) prescribed knee bracing, 8 (23%) prescribed hip bracing, and 5 (14%) did not specify the type of brace recommended. Fourteen protocols (40%) advised immediate nonweightbearing with crutches, while 16 protocols (46%) permitted immediate toe-touch weightbearing. Advancement to full weightbearing was allowed at a mean of 7.1 weeks (range, 4-12 weeks). Most protocols (80%) recommended gentle knee and hip passive range of motion and active range of motion, starting at a mean 1.4 weeks (range, 0-3 weeks) and 4.0 weeks (range, 0-6 weeks), respectively. However, only 6 protocols (17%) provided specific time points to initiate full hip and knee range of motion: a mean 8.0 weeks (range, 4-12 weeks) and 7.8 weeks (range, 0-12 weeks), respectively. Considerable variability was noted in the inclusion and timing of strengthening, stretching, proprioception, and cardiovascular exercises

  10. Standardizing serum 25-hydroxyvitamin D data from four Nordic population samples using the Vitamin D Standardization Program protocols: Shedding new light on vitamin D status in Nordic individuals

    DEFF Research Database (Denmark)

    Cashman, Kevin D; Dowling, Kirsten G; Škrabáková, Zuzana

    2015-01-01

    for the European Union are of variable quality making it difficult to estimate the prevalence of vitamin D deficiency across member states. As a consequence of the widespread, method-related differences in measurements of serum 25(OH)D concentrations, the Vitamin D Standardization Program (VDSP) developed...... protocols for standardizing existing serum 25(OH)D data from national surveys around the world. The objective of the present work was to apply the VDSP protocols to existing serum 25(OH)D data from a Danish, a Norwegian, and a Finnish population-based health survey and from a Danish randomized controlled...

  11. Learning and Chaining of Motor Primitives for Goal-directed Locomotion of a Snake-Like Robot with Screw-Drive Units

    DEFF Research Database (Denmark)

    Chatterjee, Sromona; Nachstedt, Timo; Tamosiunaite, Minija

    2015-01-01

    -directed locomotion for the robot. The behavioural primitives of the robot are generated using a reinforcement learning approach called "Policy Improvement with Path Integrals" (PI2). PI2 is numerically simple and has the ability to deal with high-dimensional systems. Here, PI2 is used to learn the robot’s motor...... controls by finding proper locomotion control parameters, like joint angles and screw-drive unit velocities, in a coordinated manner for different goals. Thus, it is able to generate a large repertoire of motor primitives, which are selectively stored to form a primitive library. The learning process...

  12. An XML-Based Protocol for Distributed Event Services

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    This viewgraph presentation provides information on the application of an XML (extensible mark-up language)-based protocol to the developing field of distributed processing by way of a computational grid which resembles an electric power grid. XML tags would be used to transmit events between the participants of a transaction, namely, the consumer and the producer of the grid scheme.

  13. Cryptanalysis of Wang et al.’s lattice-based key exchange protocol

    Directory of Open Access Journals (Sweden)

    Daya Sagar Gupta

    2016-09-01

    Full Text Available Wang et al. proposed a new hard problem on lattices which is an extension of the small integer solution (SIS on lattices. This new generated hard problem is named to be bilateral in-homogeneous small integer solution (Bi-ISIS. Using the hardness of Bi-ISIS, Wang et al. proposed a new key exchange protocol, which is based on the lattice-based cryptography. In this paper, we signalize that Wang et al.’s lattice-based key exchange protocol is vulnerable to an attack, namely, man-in-the-middle (MITM attack. Through this attack, Eavesdropper can intercept the authenticated messages and communicate the unauthentic messages among the communicating parties.

  14. Images from the Mind: BCI image reconstruction based on Rapid Serial Visual Presentations of polygon primitives

    Directory of Open Access Journals (Sweden)

    Luís F Seoane

    2015-04-01

    Full Text Available We provide a proof of concept for an EEG-based reconstruction of a visual image which is on a user's mind. Our approach is based on the Rapid Serial Visual Presentation (RSVP of polygon primitives and Brain-Computer Interface (BCI technology. In an experimental setup, subjects were presented bursts of polygons: some of them contributed to building a target image (because they matched the shape and/or color of the target while some of them did not. The presentation of the contributing polygons triggered attention-related EEG patterns. These Event Related Potentials (ERPs could be determined using BCI classification and could be matched to the stimuli that elicited them. These stimuli (i.e. the ERP-correlated polygons were accumulated in the display until a satisfactory reconstruction of the target image was reached. As more polygons were accumulated, finer visual details were attained resulting in more challenging classification tasks. In our experiments, we observe an average classification accuracy of around 75%. An in-depth investigation suggests that many of the misclassifications were not misinterpretations of the BCI concerning the users' intent, but rather caused by ambiguous polygons that could contribute to reconstruct several different images. When we put our BCI-image reconstruction in perspective with other RSVP BCI paradigms, there is large room for improvement both in speed and accuracy. These results invite us to be optimistic. They open a plethora of possibilities to explore non-invasive BCIs for image reconstruction both in healthy and impaired subjects and, accordingly, suggest interesting recreational and clinical applications.

  15. Preoperative magnetic resonance imaging protocol for endoscopic cranial base image-guided surgery.

    Science.gov (United States)

    Grindle, Christopher R; Curry, Joseph M; Kang, Melissa D; Evans, James J; Rosen, Marc R

    2011-01-01

    Despite the increasing utilization of image-guided surgery, no radiology protocols for obtaining magnetic resonance (MR) imaging of adequate quality are available in the current literature. At our institution, more than 300 endonasal cranial base procedures including pituitary, extended pituitary, and other anterior skullbase procedures have been performed in the past 3 years. To facilitate and optimize preoperative evaluation and assessment, there was a need to develop a magnetic resonance protocol. Retrospective Technical Assessment was performed. Through a collaborative effort between the otolaryngology, neurosurgery, and neuroradiology departments at our institution, a skull base MR image-guided (IGS) protocol was developed with several ends in mind. First, it was necessary to generate diagnostic images useful for the more frequently seen pathologies to improve work flow and limit the expense and inefficiency of case specific MR studies. Second, it was necessary to generate sequences useful for IGS, preferably using sequences that best highlight that lesion. Currently, at our institution, all MR images used for IGS are obtained using this protocol as part of preoperative planning. The protocol that has been developed allows for thin cut precontrast and postcontrast axial cuts that can be used to plan intraoperative image guidance. It also obtains a thin cut T2 axial series that can be compiled separately for intraoperative imaging, or may be fused with computed tomographic images for combined modality. The outlined protocol obtains image sequences effective for diagnostic and operative purposes for image-guided surgery using both T1 and T2 sequences. Copyright © 2011 Elsevier Inc. All rights reserved.

  16. An Individualized, Perception-Based Protocol to Investigate Human Physiological Responses to Cooling

    Science.gov (United States)

    Coolbaugh, Crystal L.; Bush, Emily C.; Galenti, Elizabeth S.; Welch, E. Brian; Towse, Theodore F.

    2018-01-01

    Cold exposure, a known stimulant of the thermogenic effects of brown adipose tissue (BAT), is the most widely used method to study BAT physiology in adult humans. Recently, individualized cooling has been recommended to standardize the physiological cold stress applied across participants, but critical experimental details remain unclear. The purpose of this work was to develop a detailed methodology for an individualized, perception-based protocol to investigate human physiological responses to cooling. Participants were wrapped in two water-circulating blankets and fitted with skin temperature probes to estimate BAT activity and peripheral vasoconstriction. We created a thermoesthesia graphical user interface (tGUI) to continuously record the subject's perception of cooling and shivering status during the cooling protocol. The protocol began with a 15 min thermoneutral phase followed by a series of 10 min cooling phases and concluded when sustained shivering (>1 min duration) occurred. Researchers used perception of cooling feedback (tGUI ratings) to manually adjust and personalize the water temperature at each cooling phase. Blanket water temperatures were recorded continuously during the protocol. Twelve volunteers (ages: 26.2 ± 1.4 years; 25% female) completed a feasibility study to evaluate the proposed protocol. Water temperature, perception of cooling, and shivering varied considerably across participants in response to cooling. Mean clavicle skin temperature, a surrogate measure of BAT activity, decreased (−0.99°C, 95% CI: −1.7 to −0.25°C, P = 0.16) after the cooling protocol, but an increase in supraclavicular skin temperature was observed in 4 participants. A strong positive correlation was also found between thermoesthesia and peripheral vasoconstriction (ρ = 0.84, P < 0.001). The proposed individualized, perception-based protocol therefore has potential to investigate the physiological responses to cold stress applied across populations with

  17. An SDN-Based Authentication Mechanism for Securing Neighbor Discovery Protocol in IPv6

    Directory of Open Access Journals (Sweden)

    Yiqin Lu

    2017-01-01

    Full Text Available The Neighbor Discovery Protocol (NDP is one of the main protocols in the Internet Protocol version 6 (IPv6 suite, and it provides many basic functions for the normal operation of IPv6 in a local area network (LAN, such as address autoconfiguration and address resolution. However, it has many vulnerabilities that can be used by malicious nodes to launch attacks, because the NDP messages are easily spoofed without protection. Surrounding this problem, many solutions have been proposed for securing NDP, but these solutions either proposed new protocols that need to be supported by all nodes or built mechanisms that require the cooperation of all nodes, which is inevitable in the traditional distributed networks. Nevertheless, Software-Defined Networking (SDN provides a new perspective to think about protecting NDP. In this paper, we proposed an SDN-based authentication mechanism to verify the identity of NDP packets transmitted in a LAN. Using the centralized control and programmability of SDN, it can effectively prevent the spoofing attacks and other derived attacks based on spoofing. In addition, this mechanism needs no additional protocol supporting or configuration at hosts and routers and does not introduce any dedicated devices.

  18. A hybrid path-oriented code assignment CDMA-based MAC protocol for underwater acoustic sensor networks.

    Science.gov (United States)

    Chen, Huifang; Fan, Guangyu; Xie, Lei; Cui, Jun-Hong

    2013-11-04

    Due to the characteristics of underwater acoustic channel, media access control (MAC) protocols designed for underwater acoustic sensor networks (UWASNs) are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA) CDMA MAC (POCA-CDMA-MAC), is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA) or receiver-oriented code assignment (ROCA). Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols.

  19. A Hybrid Path-Oriented Code Assignment CDMA-Based MAC Protocol for Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Huifang Chen

    2013-11-01

    Full Text Available Due to the characteristics of underwater acoustic channel, media access control (MAC protocols designed for underwater acoustic sensor networks (UWASNs are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA CDMA MAC (POCA-CDMA-MAC, is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA or receiver-oriented code assignment (ROCA. Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols.

  20. Development of membrane mechanical function during terminal stages of primitive erythropoiesis in mice.

    Science.gov (United States)

    Waugh, Richard E; Huang, Yu-Shan; Arif, Binish J; Bauserman, Richard; Palis, James

    2013-04-01

    During murine embryogenesis, primitive erythroblasts enter the circulation as immature nucleated cells and progressively mature as a semisynchronous cohort, enucleating between E12.5 and E16.5. In this report, we examine the mechanical properties of these cells to determine how their mechanical development differs from that of definitive erythroid cells, which mature extravascularly in protected marrow microenvironments. Primitive erythroid cells acquire normal membrane deformability by E12.5 (i.e., as late stage erythroblasts) and maintain the same level of surface stiffness through E17.5. During this same period, the strength of association between the membrane bilayer and the underlying skeleton increases, as indicated by an approximate doubling of the energy required to separate bilayer from skeleton. At the same time, these cells undergo dramatic changes in surface area and volume, losing 35% of their surface area and 50% of their volume from E14.5 to E17.5. Interestingly, membrane remodeling proceeded regardless of whether the cells completed enucleation. These data suggest that in primitive erythroid cells, unlike their definitive counterparts, the critical maturational processes of membrane remodeling and enucleation are uncoupled. Copyright © 2013 ISEH - Society for Hematology and Stem Cells. Published by Elsevier Inc. All rights reserved.

  1. An XML-based communication protocol for accelerator distributed controls

    International Nuclear Information System (INIS)

    Catani, L.

    2008-01-01

    This paper presents the development of XMLvRPC, an RPC-like communication protocol based, for this particular application, on the TCP/IP and XML (eXtensible Markup Language) tools built-in in LabVIEW. XML is used to format commands and data passed between client and server while socket interface for communication uses either TCP or UDP transmission protocols. This implementation extends the features of these general purpose libraries and incorporates solutions that might provide, with limited modifications, full compatibility with well established and more general communication protocol, i.e. XML-RPC, while preserving portability to different platforms supported by LabVIEW. The XMLvRPC suite of software has been equipped with specific tools for its deployment in distributed control systems as, for instance, a quasi-automatic configuration and registration of the distributed components and a simple plug-and-play approach to the installation of new services. Key feature is the management of large binary arrays that allow coding of large binary data set, e.g. raw images, more efficiently with respect to the standard XML coding

  2. An XML-based communication protocol for accelerator distributed controls

    Energy Technology Data Exchange (ETDEWEB)

    Catani, L. [INFN-Roma Tor Vergata, Rome (Italy)], E-mail: luciano.catani@roma2.infn.it

    2008-03-01

    This paper presents the development of XMLvRPC, an RPC-like communication protocol based, for this particular application, on the TCP/IP and XML (eXtensible Markup Language) tools built-in in LabVIEW. XML is used to format commands and data passed between client and server while socket interface for communication uses either TCP or UDP transmission protocols. This implementation extends the features of these general purpose libraries and incorporates solutions that might provide, with limited modifications, full compatibility with well established and more general communication protocol, i.e. XML-RPC, while preserving portability to different platforms supported by LabVIEW. The XMLvRPC suite of software has been equipped with specific tools for its deployment in distributed control systems as, for instance, a quasi-automatic configuration and registration of the distributed components and a simple plug-and-play approach to the installation of new services. Key feature is the management of large binary arrays that allow coding of large binary data set, e.g. raw images, more efficiently with respect to the standard XML coding.

  3. Classical and molecular cytogenetic characterization of Agonostomus monticola, a primitive species of Mugilidae (Mugiliformes).

    Science.gov (United States)

    Nirchio, Mauro; Oliveira, Claudio; Ferreira, Irani A; Martins, Cesar; Rossi, Anna Rita; Sola, Luciana

    2009-01-01

    This study reports the first description of the karyotype of Agonostomus monticola, a species belonging to a genus which is considered to be the most primitive among living mugilid fish. Specimens from Panama and Venezuela were cytogenetically analysed by conventional chromosome banding (Ag and base-specific-fluorochrome staining, C-banding) and by fluorescent in situ hybridization (FISH). Agonostomus monticola showed a chromosome complement of 2n = 48, composed of 23 acrocentric and one subtelocentric chromosome pairs and a pericentromeric distribution of the C-positive heterochromatin in all chromosomes. Major ribosomal genes were found to be located on the short arms of the subtelocentric chromosome pair number 24 and minor ribosomal genes in a paracentromeric position of a single medium-sized chromosome pair. All these observed cytogenetic features are similar to those previously described in four representatives of two genera, Liza and Chelon, which are considered to be among the most advanced in the family. Thus, this karyotypic form might represent the plesiomorphic condition for the mullets. This hypothesis regarding the plesiomorphic condition, if confirmed, would shed new light on the previously inferred cytotaxonomic relationships for the studied species of Mugilidae, because the karyotype with 48 acrocentric chromosomes, which has been so far regarded as primitive for the family, would have to be considered as derived.

  4. Primary dorsal spine primitive neuroectodermal tumor in an adult patient: Case report and literature review

    Directory of Open Access Journals (Sweden)

    Satyashiva Munjal

    2017-01-01

    Full Text Available Primary spinal primitive neuroectodermal tumor (psPNET is a rare entity with few cases reported in literature. We report a case of a 50-year-old female who presented to us with paraplegia and was diagnosed with extradural dorsal spine psPNET. The diagnosis was not suspected at presentation or on radiology but was established on histopathological examination. It is important to distinguish it from central nervous system primitive neuroectodermal tumors and from other spinal tumors since it follows a different clinical course and therapeutic outcome.

  5. Aesthetic primitivism revisited: The global diaspora of ‘primitive art’ and the rise of indigenous modernisms

    Directory of Open Access Journals (Sweden)

    Ruth B. Phillips

    2015-06-01

    Full Text Available This paper examines the global export of the construct of primitive art which developed in Europe in the early-twentieth century and the catalytic role it played in the emergence of modernist art forms produced by Indigenous peoples. It argues for the need to distinguish between sociological primitivism grounded in cultural evolutionist theory and the aesthetic primitivism promoted by artists, ethnologists and patrons who admired and appropriated the traditional arts of non-Western peoples classified as 'primitive.' Case studies of two refugees from Nazi Europe, German ethnologist Leonhard Adam and Austrian artist George Swinton, demonstrate the tension between received understandings of primitive art and these men's growing awareness, following emigration, of Indigenous modernities. It also led to their active promotion of modern Australian Aboriginal and Inuit arts, despite the undoubted links between aesthetic primitivism and the oppressive assimilationist policies justified through sociological primitivism.

  6. A Logical Analysis of Quantum Voting Protocols

    Science.gov (United States)

    Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja

    2017-12-01

    In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.

  7. Primitivity and weak distributivity in near rings and matrix near rings

    International Nuclear Information System (INIS)

    Abbasi, S.J.

    1993-08-01

    This paper shows the structure of matrix near ring constructed over a weakly distributive and primative near ring. It is proved that a weakly distributive primitive near ring is a ring and the matrix near rings constructed over it is also a bag. (author). 14 refs

  8. Establishing the effectiveness, cost-effectiveness and student experience of a Simulation-based education Training program On the Prevention of Falls (STOP-Falls) among hospitalised inpatients: a protocol for a randomised controlled trial.

    Science.gov (United States)

    Williams, Cylie; Bowles, Kelly-Ann; Kiegaldie, Debra; Maloney, Stephen; Nestel, Debra; Kaplonyi, Jessica; Haines, Terry

    2016-06-02

    Simulation-based education (SBE) is now commonly used across health professional disciplines to teach a range of skills. The evidence base supporting the effectiveness of this approach for improving patient health outcomes is relatively narrow, focused mainly on the development of procedural skills. However, there are other simulation approaches used to support non-procedure specific skills that are in need of further investigation. This cluster, cross-over randomised controlled trial with a concurrent economic evaluation (cost per fall prevented) trial will evaluate the effectiveness, cost-effectiveness and student experience of health professional students undertaking simulation training for the prevention of falls among hospitalised inpatients. This research will target the students within the established undergraduate student placements of Monash University medicine, nursing and allied health across Peninsula Health acute and subacute inpatient wards. The intervention will train the students in how to provide the Safe Recovery program, the only single intervention approach demonstrated to reduce falls in hospitals. This will involve redevelopment of the Safe Recovery program into a one-to-many participant SBE program, so that groups of students learn the communication skills and falls prevention knowledge necessary for delivery of the program. The primary outcome of this research will be patient falls across participating inpatient wards, with secondary outcomes including student satisfaction with the SBE and knowledge gain, ward-level practice change and cost of acute/rehabilitation care for each patient measured using clinical costing data. The Human Research Ethics Committees of Peninsula Health (LRR/15/PH/11) and Monash University (CF15/3523-2015001384) have approved this research. The participant information and consent forms provide information on privacy, storage of results and dissemination. Registration of this trial has been completed with the

  9. Physical Therapy Protocols for Arthroscopic Bankart Repair.

    Science.gov (United States)

    DeFroda, Steven F; Mehta, Nabil; Owens, Brett D

    Outcomes after arthroscopic Bankart repair can be highly dependent on compliance and participation in physical therapy. Additionally, there are many variations in physician-recommended physical therapy protocols. The rehabilitation protocols of academic orthopaedic surgery departments vary widely despite the presence of consensus protocols. Descriptive epidemiology study. Level 3. Web-based arthroscopic Bankart rehabilitation protocols available online from Accreditation Council for Graduate Medical Education (ACGME)-accredited orthopaedic surgery programs were included for review. Individual protocols were reviewed to evaluate for the presence or absence of recommended therapies, goals for completion of ranges of motion, functional milestones, exercise start times, and recommended time to return to sport. Thirty protocols from 27 (16.4%) total institutions were identified out of 164 eligible for review. Overall, 9 (30%) protocols recommended an initial period of strict immobilization. Variability existed between the recommended time periods for sling immobilization (mean, 4.8 ± 1.8 weeks). The types of exercises and their start dates were also inconsistent. Goals to full passive range of motion (mean, 9.2 ± 2.8 weeks) and full active range of motion (mean, 12.2 ± 2.8 weeks) were consistent with other published protocols; however, wide ranges existed within the reviewed protocols as a whole. Only 10 protocols (33.3%) included a timeline for return to sport, and only 3 (10%) gave an estimate for return to game competition. Variation also existed when compared with the American Society of Shoulder and Elbow Therapists' (ASSET) consensus protocol. Rehabilitation protocols after arthroscopic Bankart repair were found to be highly variable. They also varied with regard to published consensus protocols. This discrepancy may lead to confusion among therapists and patients. This study highlights the importance of attending surgeons being very clear and specific with

  10. ABORt: Acknowledgement-Based Opportunistic Routing Protocol for High Data Rate Multichannel WSNs

    Directory of Open Access Journals (Sweden)

    Hamadoun Tall

    2017-10-01

    Full Text Available The ease of deployment and the auto-configuration capabilities of Wireless Sensor Networks (WSNs make them very attractive in different domains like environmental, home automation or heath care applications. The use of multichannel communications in WSNs helps to improve the overall performance of the network. However, in heavy traffic scenarios, routing protocols should be adapted to allow load balancing and to avoid losing data packets due to congestion and queue overflow. In this paper, we present an Acknowledgement-Based Opportunistic Routing (ABORt protocol designed for high data rate multichannel WSNs. It is a low overhead protocol that does not rely on synchronization for control traffic exchange during the operational phase of the network. ABORt is an opportunistic protocol that relies on link layer acknowledgements to disseminate routing metrics, which helps to reduce overhead. The performance of ABORt is evaluated using the Cooja simulator and the obtained results show that ABORt has a high packet delivery ratio with reduced packet end-to-end delay compared to two single channel routing protocols and two multichannel routing protocols that use number of hops and expected transmission count as routing metrics.

  11. Automated Planning Enables Complex Protocols on Liquid-Handling Robots.

    Science.gov (United States)

    Whitehead, Ellis; Rudolf, Fabian; Kaltenbach, Hans-Michael; Stelling, Jörg

    2018-03-16

    Robotic automation in synthetic biology is especially relevant for liquid handling to facilitate complex experiments. However, research tasks that are not highly standardized are still rarely automated in practice. Two main reasons for this are the substantial investments required to translate molecular biological protocols into robot programs, and the fact that the resulting programs are often too specific to be easily reused and shared. Recent developments of standardized protocols and dedicated programming languages for liquid-handling operations addressed some aspects of ease-of-use and portability of protocols. However, either they focus on simplicity, at the expense of enabling complex protocols, or they entail detailed programming, with corresponding skills and efforts required from the users. To reconcile these trade-offs, we developed Roboliq, a software system that uses artificial intelligence (AI) methods to integrate (i) generic formal, yet intuitive, protocol descriptions, (ii) complete, but usually hidden, programming capabilities, and (iii) user-system interactions to automatically generate executable, optimized robot programs. Roboliq also enables high-level specifications of complex tasks with conditional execution. To demonstrate the system's benefits for experiments that are difficult to perform manually because of their complexity, duration, or time-critical nature, we present three proof-of-principle applications for the reproducible, quantitative characterization of GFP variants.

  12. BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys

    OpenAIRE

    Wei, Songjie; Li, Shuai; Liu, Peilong; Liu, Meilin

    2018-01-01

    LEO constellation has received intensive research attention in the field of satellite communication. The existing centralized authentication protocols traditionally used for MEO/GEO satellite networks cannot accommodate LEO satellites with frequent user connection switching. This paper proposes a fast and efficient access verification protocol named BAVP by combining identity-based encryption and blockchain technology. Two different key management schemes with IBE and blockchain, respectively...

  13. Experimental bit commitment based on quantum communication and special relativity.

    Science.gov (United States)

    Lunghi, T; Kaniewski, J; Bussières, F; Houlmann, R; Tomamichel, M; Kent, A; Gisin, N; Wehner, S; Zbinden, H

    2013-11-01

    Bit commitment is a fundamental cryptographic primitive in which Bob wishes to commit a secret bit to Alice. Perfectly secure bit commitment between two mistrustful parties is impossible through asynchronous exchange of quantum information. Perfect security is however possible when Alice and Bob split into several agents exchanging classical and quantum information at times and locations suitably chosen to satisfy specific relativistic constraints. Here we report on an implementation of a bit commitment protocol using quantum communication and special relativity. Our protocol is based on [A. Kent, Phys. Rev. Lett. 109, 130501 (2012)] and has the advantage that it is practically feasible with arbitrary large separations between the agents in order to maximize the commitment time. By positioning agents in Geneva and Singapore, we obtain a commitment time of 15 ms. A security analysis considering experimental imperfections and finite statistics is presented.

  14. Leader-Following Consensus Stability of Discrete-Time Linear Multiagent Systems with Observer-Based Protocols

    Directory of Open Access Journals (Sweden)

    Bingbing Xu

    2013-01-01

    Full Text Available We consider the leader-following consensus problem of discrete-time multiagent systems on a directed communication topology. Two types of distributed observer-based consensus protocols are considered to solve such a problem. The observers involved in the proposed protocols include full-order observer and reduced-order observer, which are used to reconstruct the state variables. Two algorithms are provided to construct the consensus protocols, which are based on the modified discrete-time algebraic Riccati equation and Sylvester equation. In light of graph and matrix theory, some consensus conditions are established. Finally, a numerical example is provided to illustrate the obtained result.

  15. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  16. A Review of Offset Programs: Trading Systems, Funds, Protocols, Standards and Retailers

    Energy Technology Data Exchange (ETDEWEB)

    Kollmuss, Anja; Lazarus, Michael; Lee, Carrie; Polycarp, Clifford

    2008-11-15

    Carbon or greenhouse gas (GHG) offsets have long been promoted as an important element of a comprehensive climate policy approach. Offset programs can reduce the overall cost of achieving a given emission goal by enabling emission reductions to occur where costs are lower. Furthermore, offsets have the potential to deliver sustainability co-benefits, spurred through technology development and transfer, and to develop human and institutional capacity for reducing emissions in sectors and locations not included in a cap and trade or a mandatory government policy. However, offsets can pose a risk to the environmental integrity of climate actions, especially if issues surrounding additionality, permanence, leakage, quantification and verification are not adequately addressed. The challenge for policymakers is clear: to design offset programs and policies that can maximize their potential benefits while minimizing their potential risks. The goal of this review is to provide an up-to-date analysis and synthesis of the most influential offset programs and activities, to reflect on lessons learned, and thus to inform participants and designers of current and future offset programs. Our intention is to periodically update this review to stay abreast of ongoing developments, and to develop a website portal to make this information more accessible. This version targets programs that meet one or more of the following criteria: - a significant volume of credit transactions occurring or anticipated; - an established set of rules or protocols - path-breaking, novel or otherwise notable initiatives or important lessons learned

  17. A Decentralized Fuzzy C-Means-Based Energy-Efficient Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Osama Moh’d Alia

    2014-01-01

    Full Text Available Energy conservation in wireless sensor networks (WSNs is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network’s lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols.

  18. A decentralized fuzzy C-means-based energy-efficient routing protocol for wireless sensor networks.

    Science.gov (United States)

    Alia, Osama Moh'd

    2014-01-01

    Energy conservation in wireless sensor networks (WSNs) is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network's lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols.

  19. A Decentralized Fuzzy C-Means-Based Energy-Efficient Routing Protocol for Wireless Sensor Networks

    Science.gov (United States)

    2014-01-01

    Energy conservation in wireless sensor networks (WSNs) is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network's lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols. PMID:25162060

  20. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification. In r...

  1. Primitive Endoderm Differentiation: From Specification to Epithelialization.

    Science.gov (United States)

    Bassalert, Cécilia; Valverde-Estrella, Lorena; Chazaud, Claire

    2018-01-01

    At the time of implantation, the mouse blastocyst has developed three cell lineages: the epiblast (Epi), the primitive endoderm (PrE), and the trophectoderm (TE). The PrE and TE are extraembryonic tissues but their interactions with the Epi are critical to sustain embryonic growth, as well as to pattern the embryo. We review here the cellular and molecular events that lead to the production of PrE and Epi lineages and discuss the different hypotheses that are proposed for the induction of these cell types. In the second part, we report the current knowledge about the epithelialization of the PrE. © 2018 Elsevier Inc. All rights reserved.

  2. Primary primitive neuroectodermal tumor of the cervix

    Science.gov (United States)

    Li, Bo; Ouyang, Ling; Han, Xue; Zhou, Yang; Tong, Xin; Zhang, Shulang; Zhang, Qingfu

    2013-01-01

    Primary primitive neuroectodermal tumors (PNETs) are rare and high-grade malignant tumors that mostly occur in children and young adults. The most common sites are the trunk, limbs, and retroperitoneum. Herein, we present a case of a PNET involving the cervix uteri in a 27-year-old woman. The lesion showed characteristic histologic features of a PNET and was positive for the immunohistochemical markers cluster of differentiation (CD) 99, vimentin, neuron-specific enolase, neural cell adhesion molecule 1 (CD56), and CD117 (c-kit), further defining the tumor while helping to confirm PNET. The clinical Stage IIIB tumor was treated with chemotherapy and radiotherapy. PMID:23836982

  3. Feasibility of an online mindfulness-based program for patients with melanoma: study protocol for a randomised controlled trial.

    Science.gov (United States)

    Russell, Lahiru; Ugalde, Anna; Milne, Donna; Krishnasamy, Meinir; O Seung Chul, Eric; Austin, David W; Chambers, Richard; Orellana, Liliana; Livingston, Patricia M

    2018-04-13

    People with a melanoma diagnosis are at risk of recurrence, developing a new primary or experiencing disease progression. Previous studies have suggested that fear of a cancer recurrence is clinically relevant in this group of patients and, if not addressed, can lead to distress. Mindfulness-based interventions have been shown to alleviate symptoms of anxiety and depression among various groups of cancer patients. Online mindfulness-based interventions have the potential to reach people unable to attend face-to-face interventions due to limitations such as cancer-related illness, transportation or time constraints. This study aims to (1) examine whether individuals with a melanoma diagnosis are willing to participate and adhere to a 6-week online mindfulness-based intervention and (2) explore potential benefits of the program on fear of cancer recurrence, worries, rumination, perceived stress and trait mindfulness to inform the design of a clinical trial. This is a single-site randomised controlled trial of a feasibility study. Seventy-five participants with stage 2c or 3 melanoma will be recruited from a melanoma outpatient clinic and randomised (2:1) either to an online mindfulness-based program (intervention) or to usual care (control). The intervention is a 6-week program specifically developed for this study. It consists of videos describing the concept of mindfulness, short daily guided meditation practices (5-10 min), automated meditation reminders and instructions for applying mindfulness in daily life to enhance wellbeing. All participants will complete questionnaires at baseline and at 6-week post-randomisation. Participants in the control group will be given access to the online program at the end of the study. Primary outcomes are overall recruitment; retention; extent of questionnaire completion; and usability and acceptability of, and adherence to, the program. The secondary outcomes are fear of cancer recurrence, worries, rumination, perceived

  4. Performance Evaluation of a Cluster-Based Service Discovery Protocol for Heterogeneous Wireless Sensor Networks

    NARCIS (Netherlands)

    Marin Perianu, Raluca; Scholten, Johan; Havinga, Paul J.M.; Hartel, Pieter H.

    2006-01-01

    Abstract—This paper evaluates the performance in terms of resource consumption of a service discovery protocol proposed for heterogeneous Wireless Sensor Networks (WSNs). The protocol is based on a clustering structure, which facilitates the construction of a distributed directory. Nodes with higher

  5. the reception of the deuteronomic social law in the primitive church

    African Journals Online (AJOL)

    of the Primitive Church's social and ecclesiological (self-)understanding, this study highlights ... have been written by Moses as well, the Book of Deuteronomy presents itself overall as a .... to reform society reached their limits when they became economically, socially and ..... sins of adultery and prostitution. In light of these ...

  6. A statistical frame based TDMA protocol for human body communication.

    Science.gov (United States)

    Nie, Zedong; Li, Zhao; Huang, Renwei; Liu, Yuhang; Li, Jingzhen; Wang, Lei

    2015-07-09

    Human body communication (HBC) using the human body as the transmission medium, which has been regarded as one of the most promising short-range communications in wireless body area networks (WBAN). Compared to the traditional wireless networks, two challenges are existed in HBC based WBAN. (1) Its sensor nodes should be energy saving since it is inconvenient to replace or recharge the battery on these sensor nodes; (2) the coordinator should be able to react dynamically and rapidly to the burst traffic triggered by sensing events. Those burst traffic conditions include vital physical signal (electrocardiogram, electroencephalogram etc.) monitoring, human motion detection (fall detection, activity monitoring, gesture recognition, motion sensing etc.) and so on. To cope with aforementioned challenges, a statistical frame based TDMA (S-TDMA) protocol with multi-constrained (energy, delay, transmission efficiency and emergency management) service is proposed in this paper. The scenarios where burst traffic is often triggered rapidly with low power consumption and low delay is handled in our proposed S-TDMA. A beacon frame with the contained synchronous and poll information is designed to reduce the possibility of collisions of request frames. A statistical frame which broadcasts the unified scheduling information is adopted to avoid packet collisions, idle listening and overhearing. Dynamic time slot allocation mechanism is presented to manage the burst traffic and reduce the active period in each beacon period. An emergency mechanism is proposed for vital signals to be transmitted. The theory analysis is proceed and the result is evaluated in the hardware platform. To verify its feasibility, S-TDMA was fully implemented on our independently-developed HBC platform where four sensor nodes and a coordinator are fastened on a human body. Experiment results show that S-TDMA costs 89.397 mJ every 20 s when the payload size is 122 bytes, 9.51% lower than Lightweight MAC

  7. Computer programs for unit-cell determination in electron diffraction experiments

    International Nuclear Information System (INIS)

    Li, X.Z.

    2005-01-01

    A set of computer programs for unit-cell determination from an electron diffraction tilt series and pattern indexing has been developed on the basis of several well-established algorithms. In this approach, a reduced direct primitive cell is first determined from experimental data, in the means time, the measurement errors of the tilt angles are checked and minimized. The derived primitive cell is then checked for possible higher lattice symmetry and transformed into a proper conventional cell. Finally a least-squares refinement procedure is adopted to generate optimum lattice parameters on the basis of the lengths of basic reflections in each diffraction pattern and the indices of these reflections. Examples are given to show the usage of the programs

  8. The negative impact of Wnt signaling on megakaryocyte and primitive erythroid progenitors derived from human embryonic stem cells

    Directory of Open Access Journals (Sweden)

    Prasuna Paluru

    2014-03-01

    Full Text Available The Wnt gene family consists of structurally related genes encoding secreted signaling molecules that have been implicated in many developmental processes, including regulation of cell fate and patterning during embryogenesis. Previously, we found that Wnt signaling is required for primitive or yolk sac-derived-erythropoiesis using the murine embryonic stem cell (ESC system. Here, we examine the effect of Wnt signaling on the formation of early hematopoietic progenitors derived from human ESCs. The first hematopoietic progenitor cells in the human ESC system express the pan-hematopoietic marker CD41 and the erythrocyte marker, glycophorin A or CD235. We have developed a novel serum-free, feeder-free, adherent differentiation system that can efficiently generate large numbers of CD41 + CD235+ cells. We demonstrate that this cell population contains progenitors not just for primitive erythroid and megakaryocyte cells but for the myeloid lineage as well and term this population the primitive common myeloid progenitor (CMP. Treatment of mesoderm-specified cells with Wnt3a led to a loss of hematopoietic colony-forming ability while the inhibition of canonical Wnt signaling with DKK1 led to an increase in the number of primitive CMPs. Canonical Wnt signaling also inhibits the expansion and/or survival of primitive erythrocytes and megakaryocytes, but not myeloid cells, derived from this progenitor population. These findings are in contrast to the role of Wnt signaling during mouse ESC differentiation and demonstrate the importance of the human ESC system in studying species-specific differences in development.

  9. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  10. A Gossip-based Energy Efficient Protocol for Robust In-network Aggregation in Wireless Sensor Networks

    Science.gov (United States)

    Fauji, Shantanu

    We consider the problem of energy efficient and fault tolerant in--network aggregation for wireless sensor networks (WSNs). In-network aggregation is the process of aggregation while collecting data from sensors to the base station. This process should be energy efficient due to the limited energy at the sensors and tolerant to the high failure rates common in sensor networks. Tree based in--network aggregation protocols, although energy efficient, are not robust to network failures. Multipath routing protocols are robust to failures to a certain degree but are not energy efficient due to the overhead in the maintenance of multiple paths. We propose a new protocol for in-network aggregation in WSNs, which is energy efficient, achieves high lifetime, and is robust to the changes in the network topology. Our protocol, gossip--based protocol for in-network aggregation (GPIA) is based on the spreading of information via gossip. GPIA is not only adaptive to failures and changes in the network topology, but is also energy efficient. Energy efficiency of GPIA comes from all the nodes being capable of selective message reception and detecting convergence of the aggregation early. We experimentally show that GPIA provides significant improvement over some other competitors like the Ridesharing, Synopsis Diffusion and the pure version of gossip. GPIA shows ten fold, five fold and two fold improvement over the pure gossip, the synopsis diffusion and Ridesharing protocols in terms of network lifetime, respectively. Further, GPIA retains gossip's robustness to failures and improves upon the accuracy of synopsis diffusion and Ridesharing.

  11. Comparing minimally supervised home-based and closely supervised gym-based exercise programs in weight reduction and insulin resistance after bariatric surgery: A randomized clinical trial.

    Science.gov (United States)

    Kaviani, Sara; Dadgostar, Haleh; Mazaherinezhad, Ali; Adib, Hanie; Solaymani-Dodaran, Masoud; Soheilipour, Fahimeh; Hakiminezhad, Mahdi

    2017-01-01

    Background: Effectiveness of various exercise protocols in weight reduction after bariatric surgery has not been sufficiently explored in the literature. Thus, in the present study, we aimed at comparing the effect of minimally supervised home-based and closely supervised gym-based exercise programs on weight reduction and insulin resistance after bariatric surgery. Methods: Females undergoing gastric bypass surgery were invited to participate in an exercise program and were randomly allocated into 2 groups using a random number generator in Excel. They were either offered a minimally supervised home-based (MSHB) or closely supervised gym-based (CSGB) exercise program. The CSGB protocol constitutes 2 weekly training sessions under ACSM guidelines. In the MSHB protocol, the participants received a notebook containing a list of recommended aerobic and resistance exercises, a log to record their activity, and a schedule of follow-up phone calls and clinic visits. Both groups received a pedometer. We measured their weight, BMI, lipid profile, FBS, and insulin level at baseline and at 20 weeks after the exercises, the results of which were compared using t test or Mann-Whitney U test at the end of the study. All the processes were observed by 1 senior resident in sport medicine. Results: A total of 80 patients were recruited who were all able to complete our study (MSHB= 38 and CSGB= 42). The baseline comparison revealed that the 2 groups were similar. The mean change (reduction) in BMI was slightly better in CSGB (8.61 95% CI 7.76-9.45) compared with the MSHB (5.18 95% CI 3.91-6.46); p< 0.01. However, the 2 groups did not have a statistically significant difference in the amount of change in the other factors including FBS and Homa.ir. Conclusion: As we expected a non-inferiority result, our results showed that both MSHB and CSGB exercise methods are somewhat equally effective in improving lipid profile and insulin resistance in the 2 groups, but a slightly better

  12. Data-Based Energy Efficient Clustered Routing Protocol for Wireless Sensors Networks – Tabuk Flood Monitoring System Case Study

    Directory of Open Access Journals (Sweden)

    Ammar Babiker

    2017-10-01

    Full Text Available Energy efficiency has been considered as the most important issue in wireless sensor networks. As in many applications, wireless sensors are scattered in a wide harsh area, where the battery replacement or charging will be quite difficult and it is the most important challenge. Therefore, the design of energy saving mechanism becomes mandatory in most recent research. In this paper, a new energy efficient clustered routing protocol is proposed: the proposed protocol is based on analyzing the data collected from the sensors in a base-station. Based on this analysis the cluster head will be selected as the one with the most useful data. Then, a variable time slot is specified to each sensor to minimize the transmission of repetitive and un-useful data. The proposed protocol Data-Based Energy Efficient Clustered Routing Protocol for Wireless Sensors Networks (DCRP was compared with the famous energy efficient LEACH protocol and also with one of the recent energy efficient routing protocols named Position Responsive Routing Protocol (PRRP. DCRP has been used in monitoring the floods in Tabuk area –Saudi Arabia. It shows comparatively better results.

  13. Alcohol e-Help: study protocol for a web-based self-help program to reduce alcohol use in adults with drinking patterns considered harmful, hazardous or suggestive of dependence in middle-income countries.

    Science.gov (United States)

    Schaub, Michael P; Tiburcio, Marcela; Martinez, Nora; Ambekar, Atul; Balhara, Yatan Pal Singh; Wenger, Andreas; Monezi Andrade, André Luiz; Padruchny, Dzianis; Osipchik, Sergey; Gehring, Elise; Poznyak, Vladimir; Rekve, Dag; Souza-Formigoni, Maria Lucia Oliveira

    2018-02-01

    Given the scarcity of alcohol prevention and alcohol use disorder treatments in many low and middle-income countries, the World Health Organization launched an e-health portal on alcohol and health that includes a Web-based self-help program. This paper presents the protocol for a multicentre randomized controlled trial (RCT) to test the efficacy of the internet-based self-help intervention to reduce alcohol use. Two-arm randomized controlled trial (RCT) with follow-up 6 months after randomization. Community samples in middle-income countries. People aged 18+, with Alcohol Use Disorders Identification Test (AUDIT) scores of 8+ indicating hazardous alcohol consumption. Offer of an internet-based self-help intervention, 'Alcohol e-Health', compared with a 'waiting list' control group. The intervention, adapted from a previous program with evidence of effectiveness in a high-income country, consists of modules to reduce or entirely stop drinking. The primary outcome measure is change in the Alcohol Use Disorders Identification Test (AUDIT) score assessed at 6-month follow-up. Secondary outcomes include self-reported the numbers of standard drinks and alcohol-free days in a typical week during the past 6 months, and cessation of harmful or hazardous drinking (AUDIT world-wide is considerable. © 2017 Society for the Study of Addiction.

  14. A Secure Protocol Based on a Sedentary Agent for Mobile Agent Environments

    OpenAIRE

    Abdelmorhit E. Rhazi; Samuel Pierre; Hanifa Boucheneb

    2007-01-01

    The main challenge when deploying mobile agent environments pertains to security issues concerning mobile agents and their executive platform. This paper proposes a secure protocol which protects mobile agents against attacks from malicious hosts in these environments. Protection is based on the perfect cooperation of a sedentary agent running inside a trusted third host. Results show that the protocol detects several attacks, such as denial of service, incorrect execution and re-execution of...

  15. Monitoring habitat restoration projects: U.S. Fish and Wildlife Service Pacific Region Partners for Fish and Wildlife Program and Coastal Program Protocol

    Science.gov (United States)

    Woodward, Andrea; Hollar, Kathy

    2011-01-01

    The U.S. Fish and Wildlife Service's (FWS) Pacific Region (Region 1) includes more than 158 million acres (almost 247,000 square miles) of land base in Idaho, Oregon, Washington, Hawai`i, the Commonwealth of the Northern Mariana Islands, American Samoa, Guam, the Republic of Palau, the Federated States of Micronesia, and the Republic of the Marshall Islands. Region 1 is ecologically diverse with landscapes that range from coral reefs, broadleaf tropical forests, and tropical savannahs in the Pacific Islands, to glacial streams and lakes, lush old-growth rainforests, inland fjords, and coastal shoreline in the Pacific Northwest, to the forested mountains, shrub-steppe desert, and native grasslands in the Inland Northwest. Similarly, the people of the different landscapes perceive, value, and manage their natural resources in ways unique to their respective regions and cultures. The Partners for Fish and Wildlife Program (Partners Program) and Coastal Program work with a variety of partners in Region 1 including individual landowners, watershed councils, land trusts, Soil and Water Conservation Districts, non-governmental organizations, Tribal governments, Native Hawaiian organizations, and local, State, and Federal agencies. The Partners Program is the FWS's vanguard for working with private landowners to voluntarily restore and conserve fish and wildlife habitat. Using non-regulatory incentives, the Partners Program engages willing partners to conserve and protect valuable fish and wildlife habitat on their property and in their communities. This is accomplished by providing the funding support and technical and planning tools needed to make on-the-ground conservation affordable, feasible, and effective. The primary goals of the Pacific Region Partners Program are to: Promote citizen and community-based stewardship efforts for fish and wildlife conservation Contribute to the recovery of at-risk species, Protect the environmental integrity of the National Wildlife

  16. Polycomb enables primitive endoderm lineage priming in embryonic stem cells

    DEFF Research Database (Denmark)

    Illingworth, Robert S; Hölzenspies, Jurriaan J; Roske, Fabian V

    2016-01-01

    Mouse embryonic stem cells (ESCs), like the blastocyst from which they are derived, contain precursors of the epiblast (Epi) and primitive endoderm (PrEn) lineages. While transient in vivo, these precursor populations readily interconvert in vitro. We show that altered transcription is the driver...... polycomb with dynamic changes in transcription and stalled lineage commitment, allowing cells to explore alternative choices prior to a definitive decision....

  17. A General Self-Organized Tree-Based Energy-Balance Routing Protocol for Wireless Sensor Network

    Science.gov (United States)

    Han, Zhao; Wu, Jie; Zhang, Jie; Liu, Liefeng; Tian, Kaiyun

    2014-04-01

    Wireless sensor network (WSN) is a system composed of a large number of low-cost micro-sensors. This network is used to collect and send various kinds of messages to a base station (BS). WSN consists of low-cost nodes with limited battery power, and the battery replacement is not easy for WSN with thousands of physically embedded nodes, which means energy efficient routing protocol should be employed to offer a long-life work time. To achieve the aim, we need not only to minimize total energy consumption but also to balance WSN load. Researchers have proposed many protocols such as LEACH, HEED, PEGASIS, TBC and PEDAP. In this paper, we propose a General Self-Organized Tree-Based Energy-Balance routing protocol (GSTEB) which builds a routing tree using a process where, for each round, BS assigns a root node and broadcasts this selection to all sensor nodes. Subsequently, each node selects its parent by considering only itself and its neighbors' information, thus making GSTEB a dynamic protocol. Simulation results show that GSTEB has a better performance than other protocols in balancing energy consumption, thus prolonging the lifetime of WSN.

  18. A Lightweight RFID Grouping-Proof Protocol Based on Parallel Mode and DHCP Mechanism

    Directory of Open Access Journals (Sweden)

    Zhicai Shi

    2017-07-01

    Full Text Available A Radio Frequency Identification (RFID grouping-proof protocol is to generate an evidence of the simultaneous existence of a group of tags and it has been applied to many different fields. For current grouping-proof protocols, there still exist some flaws such as low grouping-proof efficiency, being vulnerable to trace attack and information leakage. To improve the secure performance and efficiency, we propose a lightweight RFID grouping-proof protocol based on parallel mode and DHCP (Dynamic Host Configuration Protocol mechanism. Our protocol involves multiple readers and multiple tag groups. During the grouping-proof period, one reader and one tag group are chosen by the verifier by means of DHCP mechanism. When only a part of the tags of the chosen group exist, the protocol can also give the evidence of their co-existence. Our protocol utilizes parallel communication mode between reader and tags so as to ensure its grouping-proof efficiency. It only uses Hash function to complete the mutual authentication among verifier, readers and tags. It can preserve the privacy of the RFID system and resist the attacks such as eavesdropping, replay, trace and impersonation. Therefore the protocol is secure, flexible and efficient. It only uses some lightweight operations such as Hash function and a pseudorandom number generator. Therefore it is very suitable to some low-cost RFID systems.

  19. Protocol converter for serial communication between digital rectifier controllers and a power plant SCADA system

    Directory of Open Access Journals (Sweden)

    Vukić Vladimir Đ.

    2016-01-01

    Full Text Available The paper describes the protocol converter INT-485-MBRTU, developed for serial communication between the thyristor rectifier (based on the proprietary protocol "INT-CPD-05", according to standard RS-485 and the SCADA system (based on protocol "Modbus RTU", of the same standard in the thermal power plant "Nikola Tesla B1". Elementary data on industrial communication protocols and communication gateways were provided. The basic technical characteristics of the "Omron" programmable logic controller CJ series were described, as well as the developed device INT-485-MBRTU. Protocol converters with two versions of communication software were tested, differing only in one control word, intended for a forced successive change of communication sequences, in opposite to automatic sequence relieve. The device iNT-485-MBRTU, with the program for forced successive change of communication sequences, demonstrated the reliability of data transfer of 100 %, in a sample of approximately 480 messages. For nearly the same sample, the same protocol converter, with a version of the program without any type of message identifiers, transferred less than 60 % of the foreseen data. During multiple sixty-hour tests, the reliability of data transfer of at least 99.9979% was recorded, in 100% of the analysed cases, and for a sample of nearly 96,000 pairs of the send and receive messages. We analysed the results and estimated the additional possibilities for application of the INT-485-MBRTU protocol converter.

  20. Experimental plug and play quantum coin flipping

    Science.gov (United States)

    Pappa, Anna; Jouguet, Paul; Lawson, Thomas; Chailloux, André; Legré, Matthieu; Trinkler, Patrick; Kerenidis, Iordanis; Diamanti, Eleni

    2014-04-01

    Performing complex cryptographic tasks will be an essential element in future quantum communication networks. These tasks are based on a handful of fundamental primitives, such as coin flipping, where two distrustful parties wish to agree on a randomly generated bit. Although it is known that quantum versions of these primitives can offer information-theoretic security advantages with respect to classical protocols, a demonstration of such an advantage in a practical communication scenario has remained elusive. Here we experimentally implement a quantum coin flipping protocol that performs strictly better than classically possible over a distance suitable for communication over metropolitan area optical networks. The implementation is based on a practical plug and play system, developed by significantly enhancing a commercial quantum key distribution device. Moreover, we provide combined quantum coin flipping protocols that are almost perfectly secure against bounded adversaries. Our results offer a useful toolbox for future secure quantum communications.

  1. Ionic and Wigner Glasses, Superionic Conductors, and Spinodal Electrostatic Gels: Dynamically Arrested Phases of the Primitive Model

    International Nuclear Information System (INIS)

    Sanchez-Diaz, L. E.; Juarez-Maldonado, R.; Vizcarra-Rendon, A.

    2009-01-01

    Based on the recently proposed self-consistent generalized Langevin equation theory of dynamic arrest, in this letter we show that the ergodic-nonergodic phase diagram of a classical mixture of charged hard spheres (the so-called 'primitive model' of ionic solutions and molten salts) includes arrested phases corresponding to nonconducting ionic glasses, partially arrested states that represent solid electrolytes (or 'superionic' conductors), low-density colloidal Wigner glasses, and low-density electrostatic gels associated with arrested spinodal decomposition.

  2. A compact representation of drawing movements with sequences of parabolic primitives.

    Directory of Open Access Journals (Sweden)

    Felix Polyakov

    2009-07-01

    Full Text Available Some studies suggest that complex arm movements in humans and monkeys may optimize several objective functions, while others claim that arm movements satisfy geometric constraints and are composed of elementary components. However, the ability to unify different constraints has remained an open question. The criterion for a maximally smooth (minimizing jerk motion is satisfied for parabolic trajectories having constant equi-affine speed, which thus comply with the geometric constraint known as the two-thirds power law. Here we empirically test the hypothesis that parabolic segments provide a compact representation of spontaneous drawing movements. Monkey scribblings performed during a period of practice were recorded. Practiced hand paths could be approximated well by relatively long parabolic segments. Following practice, the orientations and spatial locations of the fitted parabolic segments could be drawn from only 2-4 clusters, and there was less discrepancy between the fitted parabolic segments and the executed paths. This enabled us to show that well-practiced spontaneous scribbling movements can be represented as sequences ("words" of a small number of elementary parabolic primitives ("letters". A movement primitive can be defined as a movement entity that cannot be intentionally stopped before its completion. We found that in a well-trained monkey a movement was usually decelerated after receiving a reward, but it stopped only after the completion of a sequence composed of several parabolic segments. Piece-wise parabolic segments can be generated by applying affine geometric transformations to a single parabolic template. Thus, complex movements might be constructed by applying sequences of suitable geometric transformations to a few templates. Our findings therefore suggest that the motor system aims at achieving more parsimonious internal representations through practice, that parabolas serve as geometric primitives and that non

  3. Fermat’s ‘primitive solutions’ and some arithmetic of elliptic curves

    NARCIS (Netherlands)

    Top, Jaap

    1993-01-01

    In his work on Diophantine equations of the form y2=ax4+bx3+cx2+dx+e, Fermat introduced the notion of primitive solutions. In this expository note we intend to interpret this notion more geometrically, and explain what it means in terms of the arithmetic of elliptic curves. The specific equation

  4. Automatic Traffic-Based Internet Control Message Protocol (ICMP) Model Generation for ns-3

    Science.gov (United States)

    2015-12-01

    more protocols (especially at different layers of the OSI model ), implementing an inference engine to extract inter- and intrapacket dependencies, and...ARL-TR-7543 ● DEC 2015 US Army Research Laboratory Automatic Traffic-Based Internet Control Message Protocol (ICMP) Model ...ICMP) Model Generation for ns-3 by Jaime C Acosta and Felipe Jovel Survivability/Lethality Analysis Directorate, ARL Felipe Sotelo and Caesar

  5. Compact Modbus TCP/IP protocol for data acquisition systems based on limited hardware resources

    Science.gov (United States)

    Bai, Q.; Jin, B.; Wang, D.; Wang, Y.; Liu, X.

    2018-04-01

    The Modbus TCP/IP has been a standard industry communication protocol and widely utilized for establishing sensor-cloud platforms on the Internet. However, numerous existing data acquisition systems built on traditional single-chip microcontrollers without sufficient resources cannot support it, because the complete Modbus TCP/IP protocol always works dependent on a full operating system which occupies abundant hardware resources. Hence, a compact Modbus TCP/IP protocol is proposed in this work to make it run efficiently and stably even on a resource-limited hardware platform. Firstly, the Modbus TCP/IP protocol stack is analyzed and the refined protocol suite is rebuilt by streamlining the typical TCP/IP suite. Then, specific implementation of every hierarchical layer is respectively presented in detail according to the protocol structure. Besides, the compact protocol is implemented in a traditional microprocessor to validate the feasibility of the scheme. Finally, the performance of the proposed scenario is assessed. The experimental results demonstrate that message packets match the frame format of Modbus TCP/IP protocol and the average bandwidth reaches to 1.15 Mbps. The compact protocol operates stably even based on a traditional microcontroller with only 4-kB RAM and 12-MHz system clock, and no communication congestion or frequent packet loss occurs.

  6. Navigation Strategies for Primitive Solar System Body Rendezvous and Proximity Operations

    Science.gov (United States)

    Getzandanner, Kenneth M.

    2011-01-01

    A wealth of scientific knowledge regarding the composition and evolution of the solar system can be gained through reconnaissance missions to primitive solar system bodies. This paper presents analysis of a baseline navigation strategy designed to address the unique challenges of primitive body navigation. Linear covariance and Monte Carlo error analysis was performed on a baseline navigation strategy using simulated data from a· design reference mission (DRM). The objective of the DRM is to approach, rendezvous, and maintain a stable orbit about the near-Earth asteroid 4660 Nereus. The outlined navigation strategy and resulting analyses, however, are not necessarily limited to this specific target asteroid as they may he applicable to a diverse range of mission scenarios. The baseline navigation strategy included simulated data from Deep Space Network (DSN) radiometric tracking and optical image processing (OpNav). Results from the linear covariance and Monte Carlo analyses suggest the DRM navigation strategy is sufficient to approach and perform proximity operations in the vicinity of the target asteroid with meter-level accuracy.

  7. Conservative multimodal management of a primitive neuroectodermal tumor of the thyroid

    Directory of Open Access Journals (Sweden)

    Juliette Haudebourg

    2013-04-01

    Full Text Available Primitive neuroectodermal tumors (PNET represent 1% of sarcomas. Head and neck peripheral PNETs have an intermediate prognosis between abdominopelvic disease and extremities. We here report the case of a 40-year old male who presented with primitive neuroectodermal tumor of the thyroid and was treated by multimodal treatment, including surgery, chemotherapy and intermediate dose radiotherapy. The patient is alive and fit with a functional larynx at 27 months. Multimodal treatments yield five-year survival rates of about 60%. Major drug regimens use vincristine, doxorubicin, ifosfamide or cyclophosphamide, dactinomycin and/or etoposide. Complete surgical excision is undertaken whenever possible to improve long-term survival. However, the relative radiosensitivity of tumors of the Ewing family, suggest multimodal treatment including adjuvant conformal radiotherapy in case of positive margins or poor response to chemotherapy rather than resection with 2-3 cm margins, which would imply laryngeal sacrifice for thyroid tumors. The role of expert rare tumor networks is crucial for optimal decision-making and management of such rare tumors on a case by case basis.

  8. Does a Wii-based exercise program enhance balance control of independently functioning older adults? A systematic review

    Directory of Open Access Journals (Sweden)

    Laufer Y

    2014-10-01

    Full Text Available Yocheved Laufer, Gali Dar, Einat Kodesh Physical Therapy Department, Faculty of Social Welfare and Health Sciences, University of Haifa, Haifa, Israel Background: Exercise programs that challenge an individual’s balance have been shown to reduce the risk of falls among older adults. Virtual reality computer-based technology that provides the user with opportunities to interact with virtual objects is used extensively for entertainment. There is a growing interest in the potential of virtual reality-based interventions for balance training in older adults. This work comprises a systematic review of the literature to determine the effects of intervention programs utilizing the Nintendo Wii console on balance control and functional performance in independently functioning older adults.Methods: Studies were obtained by searching the following databases: PubMed, CINAHL, PEDro, EMBASE, SPORTdiscus, and Google Scholar, followed by a hand search of bibliographic references of the included studies. Included were randomized controlled trials written in English in which Nintendo Wii Fit was used to enhance standing balance performance in older adults and compared with an alternative exercise treatment, placebo, or no treatment.Results: Seven relevant studies were retrieved. The four studies examining the effect of Wii-based exercise compared with no exercise reported positive effects on at least one outcome measure related to balance performance in older adults. Studies comparing Wii-based training with alternative exercise programs generally indicated that the balance improvements achieved by Wii-based training are comparable with those achieved by other exercise programs.Conclusion: The review indicates that Wii-based exercise programs may serve as an alternative to more conventional forms of exercise aimed at improving balance control. However, due to the great variability between studies in terms of the intervention protocols and outcome measures, as

  9. A DUAL RESERVATION CDMA-BASED MAC PROTOCOL WITH POWER CONTROL FOR AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Jia Min; Chen Huimin; Yuan Yuhua

    2007-01-01

    This paper proposes a new multi-channel Medium Access Control (MAC) protocol named as Dual Reservation Code Division Multiple Access (CDMA) based MAC protocol with Power Control (DRCPC). The code channel is divided into common channel, broadcast channel and several data channels. And dynamic power control mechanism is implemented to reduce near-far interference. Compared with IEEE 802.11 Distributed Coordination Function (DCF) protocol, the results show that the proposed mechanism improves the average throughput and limits the transmission delay efficiently.

  10. Friend of GATA (FOG) interacts with the nucleosome remodeling and deacetylase complex (NuRD) to support primitive erythropoiesis in Xenopus laevis.

    Science.gov (United States)

    Mimoto, Mizuho S; Christian, Jan L

    2012-01-01

    Friend of GATA (FOG) plays many diverse roles in adult and embryonic hematopoiesis, however the mechanisms by which it functions and the roles of potential interaction partners are not completely understood. Previous work has shown that overexpression of FOG in Xenopus laevis causes loss of blood suggesting that in contrast to its role in mammals, FOG might normally function to repress erythropoiesis in this species. Using loss-of-function analysis, we demonstrate that FOG is essential to support primitive red blood cell (RBC) development in Xenopus. Moreover, we show that it is specifically required to prevent excess apoptosis of circulating primitive RBCs and that in the absence of FOG, the pro-apoptotic gene Bim-1 is strongly upregulated. To identify domains of FOG that are essential for blood development and, conversely, to begin to understand the mechanism by which overexpressed FOG represses primitive erythropoiesis, we asked whether FOG mutants that are unable to interact with known co-factors retain their ability to rescue blood formation in FOG morphants and whether they repress erythropoiesis when overexpressed in wild type embryos. We find that interaction of FOG with the Nucleosome Remodeling and Deacetylase complex (NuRD), but not with C-terminal Binding Protein, is essential for normal primitive RBC development. In contrast, overexpression of all mutant and wild type constructs causes a comparable repression of primitive erythropoiesis. Together, our data suggest that a requirement for FOG and its interaction with NuRD during primitive erythropoiesis are conserved in Xenopus and that loss of blood upon FOG overexpression is due to a dominant-interfering effect.

  11. Research and Implementation of Collision Detection Based on Modbus Protocol

    Directory of Open Access Journals (Sweden)

    Yinglan Fang

    2013-01-01

    Full Text Available In order to solve the communication errors resulted by traditional working condition multi-platform device communication using the custom protocol communication and link congestion malpractice brought by retransmission, it ensures network communication using time-sharing communication conflict detection based on mature Modbus protocol. Thereby it enhances the stability of the entire system during operation process, and provides simple, efficient, stable business specification interface for the future expansion of the system. After a comprehensive evaluation and analysis of system communication messages before and after improvement, system comprehensive evaluation target has improved. While the system is more flexible to modular design, develop transparent, structure open side and has a broad application prospects.

  12. In Preparation of the Nationwide Dissemination of the School-Based Obesity Prevention Program DOiT: Stepwise Development Applying the Intervention Mapping Protocol

    NARCIS (Netherlands)

    van Nassau, F.; Singh, A.S.; van Mechelen, W.; Brug, J.; Chin A Paw, M.J.M.

    2014-01-01

    BACKGROUND: The school-based Dutch Obesity Intervention in Teenagers (DOiT) program is an evidence-based obesity prevention program. In preparation for dissemination throughout the Netherlands, this study aimed to adapt the initial program and to develop an implementation strategy and materials.

  13. The Effect of a Collaborative Mentoring Program on Beginning Science Teachers' Inquiry-based Teaching Practice

    Science.gov (United States)

    Nam, Jeonghee; Seung, Eulsun; Go, MunSuk

    2013-03-01

    This study investigated how a collaborative mentoring program influenced beginning science teachers' inquiry-based teaching and their reflection on practice. The one-year program consisted of five one-on-one mentoring meetings, weekly science education seminars, weekly mentoring group discussions, and self-evaluation activities. The participants were three beginning science teachers and three mentors at the middle school level (7-9th grades) in an urban area of South Korea. For each beginning teacher, five lessons were evaluated in terms of lesson design/implementation, procedural knowledge, and classroom culture by using the Reformed Teaching Observation Protocol. Five aspects of the beginning teachers' reflections were identified. This study showed that a collaborative mentoring program focusing on inquiry-based science teaching encouraged the beginning teachers to reflect on their own perceptions and teaching practice in terms of inquiry-based science teaching, which led to changes in their teaching practice. This study also highlighted the importance of collaborative interactions between the mentors and the beginning teachers during the mentoring process.

  14. Cluster chain based energy efficient routing protocol for moblie WSN

    Directory of Open Access Journals (Sweden)

    WU Ziyu

    2016-04-01

    Full Text Available With the ubiquitous smart devices acting as mobile sensor nodes in the wireless sensor networks(WSNs to sense and transmit physical information,routing protocols should be designed to accommodate the mobility issues,in addition to conventional considerations on energy efficiency.However,due to frequent topology change,traditional routing schemes cannot perform well.Moreover,existence of mobile nodes poses new challenges on energy dissipation and packet loss.In this paper,a novel routing scheme called cluster chain based routing protocol(CCBRP is proposed,which employs a combination of cluster and chain structure to accomplish data collection and transmission and thereafter selects qualified cluster heads as chain leaders to transmit data to the sink.Furthermore,node mobility is handled based on periodical membership update of mobile nodes.Simulation results demonstrate that CCBRP has a good performance in terms of network lifetime and packet delivery,also strikes a better balance between successful packet reception and energy consumption.

  15. Primary intraspinal extradural primitive neuroectodermal tumor: A rare case.

    Science.gov (United States)

    Rege, Shrikant V; Tadghare, Jitendra; Patil, Harshad; Narayan, Sharadendu

    2016-01-01

    Primitive neuroectodermal tumors (PNETs) are aggressive childhood malignancies and are difficult to treat. Primary intraspinal PNETs are rare. These patients have poor prognosis with short survival time even after surgery and chemoradiation. As there are no standard guidelines exist for the management of these tumors, a multidisciplinary approach has been employed with varying success. According to the review of literature, only few cases of primary intraspinal extradural PNETs have been reported. Herein, author has described a case of intraspinal, extradural PNET.

  16. WYSIWIB: A Declarative Approach to Finding Protocols and Bugs in Linux Code

    DEFF Research Database (Denmark)

    Lawall, Julia Laetitia; Brunel, Julien Pierre Manuel; Hansen, Rene Rydhof

    2008-01-01

    the tools to be able to find specific kinds of bugs. In this paper, we propose a declarative approach based on a control-flow based program search engine. Our approach is WYSIWIB (What You See Is Where It Bugs), since the programmer is able to express specifications for protocol and bug finding using...

  17. Primitive neuroectodermal tumour of the kidney with vena caval and atrial tumour thrombus: a case report

    Directory of Open Access Journals (Sweden)

    Ong Poh

    2008-08-01

    Full Text Available Abstract Introduction Renal primitive neuroectodermal tumour is an extremely rare malignancy. Case presentation A 21-year-old woman presented with microscopic haematuria, a palpable right loin mass, dyspnoea, dizziness and fatigue. Initial ultrasound scan of the kidneys revealed an 11 cm right renal mass with venous extension into the inferior vena cava. Computed tomography of the thorax and abdomen revealed an extension of the large renal mass into the right renal vein, inferior vena cava and up to the right atrium. A small paracaval lymph node was noted and three small metastatic nodules were identified within the lung parenchyma. The patient underwent a radical nephrectomy and inferior vena caval tumour (level IV thrombectomy with cardiopulmonary bypass and deep hypothermic circulatory arrest. Immunohistochemical staining of the specimen showed a highly specific cluster of differentiation (CD 99, thus confirming the diagnosis of a primitive neuroectodermal tumour. Conclusion It is important that a renal primitive neuroectodermal tumour be considered, particularly in young patients with a renal mass and extensive thrombus.

  18. The language of geometry: Fast comprehension of geometrical primitives and rules in human adults and preschoolers

    Science.gov (United States)

    Amalric, Marie; Wang, Liping; Figueira, Santiago; Sigman, Mariano; Dehaene, Stanislas

    2017-01-01

    During language processing, humans form complex embedded representations from sequential inputs. Here, we ask whether a “geometrical language” with recursive embedding also underlies the human ability to encode sequences of spatial locations. We introduce a novel paradigm in which subjects are exposed to a sequence of spatial locations on an octagon, and are asked to predict future locations. The sequences vary in complexity according to a well-defined language comprising elementary primitives and recursive rules. A detailed analysis of error patterns indicates that primitives of symmetry and rotation are spontaneously detected and used by adults, preschoolers, and adult members of an indigene group in the Amazon, the Munduruku, who have a restricted numerical and geometrical lexicon and limited access to schooling. Furthermore, subjects readily combine these geometrical primitives into hierarchically organized expressions. By evaluating a large set of such combinations, we obtained a first view of the language needed to account for the representation of visuospatial sequences in humans, and conclude that they encode visuospatial sequences by minimizing the complexity of the structured expressions that capture them. PMID:28125595

  19. Feasibility, Acceptability and Preliminary Treatment Outcomes in a School-Based CBT Intervention Program for Adolescents with ASD and Anxiety in Singapore

    Science.gov (United States)

    Drmic, Irene E.; Aljunied, Mariam; Reaven, Judy

    2017-01-01

    Adolescents with autism spectrum disorder (ASD) are at high risk for anxiety difficulties and disorders. Clinic-based cognitive behavioral therapy (CBT) is effective; however, few published school-based CBT programs for youth with ASD exist. In this study, the Facing Your Fears CBT protocol was adapted for delivery and piloted within a school…

  20. IDMA-Based MAC Protocol for Satellite Networks with Consideration on Channel Quality

    Directory of Open Access Journals (Sweden)

    Gongliang Liu

    2014-01-01

    Full Text Available In order to overcome the shortcomings of existing medium access control (MAC protocols based on TDMA or CDMA in satellite networks, interleave division multiple access (IDMA technique is introduced into satellite communication networks. Therefore, a novel wide-band IDMA MAC protocol based on channel quality is proposed in this paper, consisting of a dynamic power allocation algorithm, a rate adaptation algorithm, and a call admission control (CAC scheme. Firstly, the power allocation algorithm combining the technique of IDMA SINR-evolution and channel quality prediction is developed to guarantee high power efficiency even in terrible channel conditions. Secondly, the effective rate adaptation algorithm, based on accurate channel information per timeslot and by the means of rate degradation, can be realized. What is more, based on channel quality prediction, the CAC scheme, combining the new power allocation algorithm, rate scheduling, and buffering strategies together, is proposed for the emerging IDMA systems, which can support a variety of traffic types, and offering quality of service (QoS requirements corresponding to different priority levels. Simulation results show that the new wide-band IDMA MAC protocol can make accurate estimation of available resource considering the effect of multiuser detection (MUD and QoS requirements of multimedia traffic, leading to low outage probability as well as high overall system throughput.

  1. BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys

    Directory of Open Access Journals (Sweden)

    Songjie Wei

    2018-01-01

    Full Text Available LEO constellation has received intensive research attention in the field of satellite communication. The existing centralized authentication protocols traditionally used for MEO/GEO satellite networks cannot accommodate LEO satellites with frequent user connection switching. This paper proposes a fast and efficient access verification protocol named BAVP by combining identity-based encryption and blockchain technology. Two different key management schemes with IBE and blockchain, respectively, are investigated, which further enhance the authentication reliability and efficiency in LEO constellation. Experiments on OPNET simulation platform evaluate and demonstrate the effectiveness, reliability, and fast-switching efficiency of the proposed protocol. For LEO networks, BAVP surpasses the well-known existing solutions with significant advantages in both performance and scalability which are supported by theoretical analysis and simulation results.

  2. Dust formation in a galaxy with primitive abundances.

    Science.gov (United States)

    Sloan, G C; Matsuura, M; Zijlstra, A A; Lagadec, E; Groenewegen, M A T; Wood, P R; Szyszka, C; Bernard-Salas, J; van Loon, J Th

    2009-01-16

    Interstellar dust plays a crucial role in the evolution of galaxies. It governs the chemistry and physics of the interstellar medium. In the local universe, dust forms primarily in the ejecta from stars, but its composition and origin in galaxies at very early times remain controversial. We report observational evidence of dust forming around a carbon star in a nearby galaxy with a low abundance of heavy elements, 25 times lower than the solar abundance. The production of dust by a carbon star in a galaxy with such primitive abundances raises the possibility that carbon stars contributed carbonaceous dust in the early universe.

  3. AR-RBFS: Aware-Routing Protocol Based on Recursive Best-First Search Algorithm for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Farzad Kiani

    2016-01-01

    Full Text Available Energy issue is one of the most important problems in wireless sensor networks. They consist of low-power sensor nodes and a few base station nodes. They must be adaptive and efficient in data transmission to sink in various areas. This paper proposes an aware-routing protocol based on clustering and recursive search approaches. The paper focuses on the energy efficiency issue with various measures such as prolonging network lifetime along with reducing energy consumption in the sensor nodes and increasing the system reliability. Our proposed protocol consists of two phases. In the first phase (network development phase, the sensors are placed into virtual layers. The second phase (data transmission is related to routes discovery and data transferring so it is based on virtual-based Classic-RBFS algorithm in the lake of energy problem environments but, in the nonchargeable environments, all nodes in each layer can be modeled as a random graph and then begin to be managed by the duty cycle method. Additionally, the protocol uses new topology control, data aggregation, and sleep/wake-up schemas for energy saving in the network. The simulation results show that the proposed protocol is optimal in the network lifetime and packet delivery parameters according to the present protocols.

  4. [Process evaluation in relation to effectiveness assessment: experiences with school-based programs].

    Science.gov (United States)

    Ariza, Carles; Villalbí, Joan R; Sánchez-Martínez, Francesca; Nebot, Manel

    2011-06-01

    Evaluation of public health interventions usually focus on the quality of design and research methods, and less on the quality of the intervention or process evaluation. In process evaluation of school-based interventions, key issues are how completely the intervention is carried out and adherence to the protocol. In addition, exploration of intermediate variables, such as those that influence (and often predict) preventable behavior, is highly useful. This article describes the basic concepts in this topic, using examples of the effectiveness of some preventive interventions carried out in schools. The interventions discussed were mainly quasi-experimental studies, based on data from programs promoted by public health teams in the city of Barcelona. Data from process evaluation of preventive programs in secondary schools that underwent formal assessment of their effectiveness is provided. The examples are drawn from preventive programs of HIV infection or unprotected sexual intercourse (PRESSEC program) and drug consumption prevention (the PASE, PASE.bcn and x kpts programs). These examples show why the intervention process influences the impact of the programs and their results. Thorough planning of process evaluation is essential to obtain valid indicators that will identify, in the effectiveness evaluation of the intervention, the most efficacious strategies to obtain positive outcomes. Copyright © 2011 Sociedad Española de Salud Pública y Administración Sanitaria. Published by Elsevier Espana. All rights reserved.

  5. A Secure Cluster-Based Multipath Routing Protocol for WMSNs

    Directory of Open Access Journals (Sweden)

    Jamal N. Al-Karaki

    2011-04-01

    Full Text Available The new characteristics of Wireless Multimedia Sensor Network (WMSN and its design issues brought by handling different traffic classes of multimedia content (video streams, audio, and still images as well as scalar data over the network, make the proposed routing protocols for typical WSNs not directly applicable for WMSNs. Handling real-time multimedia data requires both energy efficiency and QoS assurance in order to ensure efficient utility of different capabilities of sensor resources and correct delivery of collected information. In this paper, we propose a Secure Cluster-based Multipath Routing protocol for WMSNs, SCMR, to satisfy the requirements of delivering different data types and support high data rate multimedia traffic. SCMR exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths to support timeliness and reliable high data rate multimedia communication with minimum energy dissipation. Also, we present a light-weight distributed security mechanism of key management in order to secure the communication between sensor nodes and protect the network against different types of attacks. Performance evaluation from simulation results demonstrates a significant performance improvement comparing with existing protocols (which do not even provide any kind of security feature in terms of average end-to-end delay, network throughput, packet delivery ratio, and energy consumption.

  6. Design and Analysis of Symmetric Primitives

    DEFF Research Database (Denmark)

    Lauridsen, Martin Mehl

    . In the second part, we delve into the matter of the various aspects of designing a symmetric cryptographic primitive. We start by considering generalizations of the widely acclaimed Advanced Encryption Standard (AES) block cipher. In particular, our focus is on a component operation in the cipher which permutes...... analyze and implement modes recommended by the National Institute of Standards and Technology (NIST), as well as authenticated encryption modes from the CAESAR competition, when instantiated with the AES. The data processed in our benchmarking has sizes representative to that of typical Internet traffic...... linear cryptanalysis. We apply this model to the standardized block cipher PRESENT. Finally, we present very generic attacks on two authenticated encryption schemes, AVALANCHE and RBS, by pointing out severe design flaws that can be leveraged to fully recover the secret key with very low complexity...

  7. A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2009-01-01

    ZigBee is a wireless sensor network standard that defines network and application layers on top of IEEE 802.15.4’s physical and medium access control layers. In the latest version of ZigBee, enhancements are prescribed for the security sublayer but we show in this paper that problems persist....... In particular we show that the End-to-End Application Key Establishment Protocol is flawed and we propose a secure protocol instead. We do so by using formal verification techniques based on static program analysis and process algebras. We present a way of using formal methods in wireless network security......, and propose a secure key establishment protocol for ZigBee networks....

  8. A Third-Party E-Payment Protocol Based on Quantum Group Blind Signature

    Science.gov (United States)

    Zhang, Jian-Zhong; Yang, Yuan-Yuan; Xie, Shu-Cui

    2017-09-01

    A third-party E-payment protocol based on quantum group blind signature is proposed in this paper. Our E-payment protocol could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems can not provide. To achieve that, quantum key distribution, one-time pad and quantum group blind signature are adopted in our scheme. Furthermore, if there were a dispute, the manager Trent can identify who tells a lie.

  9. Keyboard with Universal Communication Protocol Applied to CNC Machine

    Directory of Open Access Journals (Sweden)

    Mejía-Ugalde Mario

    2014-04-01

    Full Text Available This article describes the use of a universal communication protocol for industrial keyboard based microcontroller applied to computer numerically controlled (CNC machine. The main difference among the keyboard manufacturers is that each manufacturer has its own programming of source code, producing a different communication protocol, generating an improper interpretation of the function established. The above results in commercial industrial keyboards which are expensive and incompatible in their connection with different machines. In the present work the protocol allows to connect the designed universal keyboard and the standard keyboard of the PC at the same time, it is compatible with all the computers through the communications USB, AT or PS/2, to use in CNC machines, with extension to other machines such as robots, blowing, injection molding machines and others. The advantages of this design include its easy reprogramming, decreased costs, manipulation of various machine functions and easy expansion of entry and exit signals. The results obtained of performance tests were satisfactory, because each key has the programmed and reprogrammed facility in different ways, generating codes for different functions, depending on the application where it is required to be used.

  10. Self-testing protocols based on the chained Bell inequalities

    International Nuclear Information System (INIS)

    Šupić, I; Augusiak, R; Salavrakos, A; Acín, A

    2016-01-01

    Self-testing is a device-independent technique based on non-local correlations whose aim is to certify the effective uniqueness of the quantum state and measurements needed to produce these correlations. It is known that the maximal violation of some Bell inequalities suffices for this purpose. However, most of the existing self-testing protocols for two devices exploit the well-known Clauser–Horne–Shimony–Holt Bell inequality or modifications of it, and always with two measurements per party. Here, we generalize the previous results by demonstrating that one can construct self-testing protocols based on the chained Bell inequalities, defined for two devices implementing an arbitrary number of two-output measurements. On the one hand, this proves that the quantum state and measurements leading to the maximal violation of the chained Bell inequality are unique. On the other hand, in the limit of a large number of measurements, our approach allows one to self-test the entire plane of measurements spanned by the Pauli matrices X and Z. Our results also imply that the chained Bell inequalities can be used to certify two bits of perfect randomness. (paper)

  11. The self-describing data sets file protocol and Toolkit

    International Nuclear Information System (INIS)

    Borland, M.; Emery, L.

    1995-01-01

    The Self-Describing Data Sets (SDDS) file protocol continues to be used extensively in commissioning the Advanced Photon Source (APS) accelerator complex. SDDS protocol has proved useful primarily due to the existence of the SDDS Toolkit, a growing set of about 60 generic commandline programs that read and/or write SDDS files. The SDDS Toolkit is also used extensively for simulation postprocessing, giving physicists a single environment for experiment and simulation. With the Toolkit, new SDDS data is displayed and subjected to complex processing without developing new programs. Data from EPICS, lab instruments, simulation, and other sources are easily integrated. Because the SDDS tools are commandline-based, data processing scripts are readily written using the user's preferred shell language. Since users work within a UNIX shell rather than an application-specific shell or GUI, they may add SDDS-compliant programs and scripts to their personal toolkits without restriction or complication. The SDDS Toolkit has been run under UNIX on SUN OS4, HP-UX, and LINUX. Application of SDDS to accelerator operation is being pursued using Tcl/Tk to provide a GUI

  12. SACFIR: SDN-Based Application-Aware Centralized Adaptive Flow Iterative Reconfiguring Routing Protocol for WSNs.

    Science.gov (United States)

    Aslam, Muhammad; Hu, Xiaopeng; Wang, Fan

    2017-12-13

    Smart reconfiguration of a dynamic networking environment is offered by the central control of Software-Defined Networking (SDN). Centralized SDN-based management architectures are capable of retrieving global topology intelligence and decoupling the forwarding plane from the control plane. Routing protocols developed for conventional Wireless Sensor Networks (WSNs) utilize limited iterative reconfiguration methods to optimize environmental reporting. However, the challenging networking scenarios of WSNs involve a performance overhead due to constant periodic iterative reconfigurations. In this paper, we propose the SDN-based Application-aware Centralized adaptive Flow Iterative Reconfiguring (SACFIR) routing protocol with the centralized SDN iterative solver controller to maintain the load-balancing between flow reconfigurations and flow allocation cost. The proposed SACFIR's routing protocol offers a unique iterative path-selection algorithm, which initially computes suitable clustering based on residual resources at the control layer and then implements application-aware threshold-based multi-hop report transmissions on the forwarding plane. The operation of the SACFIR algorithm is centrally supervised by the SDN controller residing at the Base Station (BS). This paper extends SACFIR to SDN-based Application-aware Main-value Centralized adaptive Flow Iterative Reconfiguring (SAMCFIR) to establish both proactive and reactive reporting. The SAMCFIR transmission phase enables sensor nodes to trigger direct transmissions for main-value reports, while in the case of SACFIR, all reports follow computed routes. Our SDN-enabled proposed models adjust the reconfiguration period according to the traffic burden on sensor nodes, which results in heterogeneity awareness, load-balancing and application-specific reconfigurations of WSNs. Extensive experimental simulation-based results show that SACFIR and SAMCFIR yield the maximum scalability, network lifetime and stability

  13. SACFIR: SDN-Based Application-Aware Centralized Adaptive Flow Iterative Reconfiguring Routing Protocol for WSNs

    Directory of Open Access Journals (Sweden)

    Muhammad Aslam

    2017-12-01

    Full Text Available Smart reconfiguration of a dynamic networking environment is offered by the central control of Software-Defined Networking (SDN. Centralized SDN-based management architectures are capable of retrieving global topology intelligence and decoupling the forwarding plane from the control plane. Routing protocols developed for conventional Wireless Sensor Networks (WSNs utilize limited iterative reconfiguration methods to optimize environmental reporting. However, the challenging networking scenarios of WSNs involve a performance overhead due to constant periodic iterative reconfigurations. In this paper, we propose the SDN-based Application-aware Centralized adaptive Flow Iterative Reconfiguring (SACFIR routing protocol with the centralized SDN iterative solver controller to maintain the load-balancing between flow reconfigurations and flow allocation cost. The proposed SACFIR’s routing protocol offers a unique iterative path-selection algorithm, which initially computes suitable clustering based on residual resources at the control layer and then implements application-aware threshold-based multi-hop report transmissions on the forwarding plane. The operation of the SACFIR algorithm is centrally supervised by the SDN controller residing at the Base Station (BS. This paper extends SACFIR to SDN-based Application-aware Main-value Centralized adaptive Flow Iterative Reconfiguring (SAMCFIR to establish both proactive and reactive reporting. The SAMCFIR transmission phase enables sensor nodes to trigger direct transmissions for main-value reports, while in the case of SACFIR, all reports follow computed routes. Our SDN-enabled proposed models adjust the reconfiguration period according to the traffic burden on sensor nodes, which results in heterogeneity awareness, load-balancing and application-specific reconfigurations of WSNs. Extensive experimental simulation-based results show that SACFIR and SAMCFIR yield the maximum scalability, network lifetime

  14. Radiotherapy in stereotactic conditions with CyberKnife of primitive or secondary hepatic lesions: lessons learnt by the Alexis-Vautrin Centre

    International Nuclear Information System (INIS)

    Taste-George, H.; Peiffert, D.

    2010-01-01

    The author report the experience gained on patients treated by irradiation in stereotactic conditions for primitive or secondary hepatic lesions. Thirty three patients have been treated, 22 suffering from secondary lesions and 11 from primitive lesions. The treatment technique is not much constraining for the patient, is not much toxic, and provides a high local tumour control. Short communication

  15. Learning abstract visual concepts via probabilistic program induction in a Language of Thought.

    Science.gov (United States)

    Overlan, Matthew C; Jacobs, Robert A; Piantadosi, Steven T

    2017-11-01

    The ability to learn abstract concepts is a powerful component of human cognition. It has been argued that variable binding is the key element enabling this ability, but the computational aspects of variable binding remain poorly understood. Here, we address this shortcoming by formalizing the Hierarchical Language of Thought (HLOT) model of rule learning. Given a set of data items, the model uses Bayesian inference to infer a probability distribution over stochastic programs that implement variable binding. Because the model makes use of symbolic variables as well as Bayesian inference and programs with stochastic primitives, it combines many of the advantages of both symbolic and statistical approaches to cognitive modeling. To evaluate the model, we conducted an experiment in which human subjects viewed training items and then judged which test items belong to the same concept as the training items. We found that the HLOT model provides a close match to human generalization patterns, significantly outperforming two variants of the Generalized Context Model, one variant based on string similarity and the other based on visual similarity using features from a deep convolutional neural network. Additional results suggest that variable binding happens automatically, implying that binding operations do not add complexity to peoples' hypothesized rules. Overall, this work demonstrates that a cognitive model combining symbolic variables with Bayesian inference and stochastic program primitives provides a new perspective for understanding people's patterns of generalization. Copyright © 2017 Elsevier B.V. All rights reserved.

  16. Intelligent QoS routing algorithm based on improved AODV protocol for Ad Hoc networks

    Science.gov (United States)

    Huibin, Liu; Jun, Zhang

    2016-04-01

    Mobile Ad Hoc Networks were playing an increasingly important part in disaster reliefs, military battlefields and scientific explorations. However, networks routing difficulties are more and more outstanding due to inherent structures. This paper proposed an improved cuckoo searching-based Ad hoc On-Demand Distance Vector Routing protocol (CSAODV). It elaborately designs the calculation methods of optimal routing algorithm used by protocol and transmission mechanism of communication-package. In calculation of optimal routing algorithm by CS Algorithm, by increasing QoS constraint, the found optimal routing algorithm can conform to the requirements of specified bandwidth and time delay, and a certain balance can be obtained among computation spending, bandwidth and time delay. Take advantage of NS2 simulation software to take performance test on protocol in three circumstances and validate the feasibility and validity of CSAODV protocol. In results, CSAODV routing protocol is more adapt to the change of network topological structure than AODV protocol, which improves package delivery fraction of protocol effectively, reduce the transmission time delay of network, reduce the extra burden to network brought by controlling information, and improve the routing efficiency of network.

  17. Friend of GATA (FOG interacts with the nucleosome remodeling and deacetylase complex (NuRD to support primitive erythropoiesis in Xenopus laevis.

    Directory of Open Access Journals (Sweden)

    Mizuho S Mimoto

    Full Text Available Friend of GATA (FOG plays many diverse roles in adult and embryonic hematopoiesis, however the mechanisms by which it functions and the roles of potential interaction partners are not completely understood. Previous work has shown that overexpression of FOG in Xenopus laevis causes loss of blood suggesting that in contrast to its role in mammals, FOG might normally function to repress erythropoiesis in this species. Using loss-of-function analysis, we demonstrate that FOG is essential to support primitive red blood cell (RBC development in Xenopus. Moreover, we show that it is specifically required to prevent excess apoptosis of circulating primitive RBCs and that in the absence of FOG, the pro-apoptotic gene Bim-1 is strongly upregulated. To identify domains of FOG that are essential for blood development and, conversely, to begin to understand the mechanism by which overexpressed FOG represses primitive erythropoiesis, we asked whether FOG mutants that are unable to interact with known co-factors retain their ability to rescue blood formation in FOG morphants and whether they repress erythropoiesis when overexpressed in wild type embryos. We find that interaction of FOG with the Nucleosome Remodeling and Deacetylase complex (NuRD, but not with C-terminal Binding Protein, is essential for normal primitive RBC development. In contrast, overexpression of all mutant and wild type constructs causes a comparable repression of primitive erythropoiesis. Together, our data suggest that a requirement for FOG and its interaction with NuRD during primitive erythropoiesis are conserved in Xenopus and that loss of blood upon FOG overexpression is due to a dominant-interfering effect.

  18. In Preparation of the Nationwide Dissemination of the School-Based Obesity Prevention Program DOiT: Stepwise Development Applying the Intervention Mapping Protocol

    Science.gov (United States)

    van Nassau, Femke; Singh, Amika S.; van Mechelen, Willem; Brug, Johannes; Chin A. Paw, Mai J. M.

    2014-01-01

    Background: The school-based Dutch Obesity Intervention in Teenagers (DOiT) program is an evidence-based obesity prevention program. In preparation for dissemination throughout the Netherlands, this study aimed to adapt the initial program and to develop an implementation strategy and materials. Methods: We revisited the Intervention Mapping (IM)…

  19. Generalized large-scale semigeostrophic approximations for the f-plane primitive equations

    Science.gov (United States)

    Oliver, Marcel; Vasylkevych, Sergiy

    2016-05-01

    We derive a family of balance models for rotating stratified flow in the primitive equation (PE) setting. By construction, the models possess conservation laws for energy and potential vorticity and are formally of the same order of accuracy as Hoskins’ semigeostrophic equations. Our construction is based on choosing a new coordinate frame for the PE variational principle in such a way that the consistently truncated Lagrangian degenerates. We show that the balance relations so obtained are elliptic when the fluid is stably stratified and certain smallness assumptions are satisfied. Moreover, the potential temperature can be recovered from the potential vorticity via inversion of a non-standard Monge-Ampère problem which is subject to the same ellipticity condition. While the present work is entirely formal, we conjecture, based on a careful rewriting of the equations of motion and a straightforward derivative count, that the Cauchy problem for the balance models is well posed subject to conditions on the initial data. Our family of models includes, in particular, the stratified analog of the L 1 balance model of Salmon.

  20. Generalized large-scale semigeostrophic approximations for the f-plane primitive equations

    International Nuclear Information System (INIS)

    Oliver, Marcel; Vasylkevych, Sergiy

    2016-01-01

    We derive a family of balance models for rotating stratified flow in the primitive equation (PE) setting. By construction, the models possess conservation laws for energy and potential vorticity and are formally of the same order of accuracy as Hoskins’ semigeostrophic equations. Our construction is based on choosing a new coordinate frame for the PE variational principle in such a way that the consistently truncated Lagrangian degenerates. We show that the balance relations so obtained are elliptic when the fluid is stably stratified and certain smallness assumptions are satisfied. Moreover, the potential temperature can be recovered from the potential vorticity via inversion of a non-standard Monge–Ampère problem which is subject to the same ellipticity condition. While the present work is entirely formal, we conjecture, based on a careful rewriting of the equations of motion and a straightforward derivative count, that the Cauchy problem for the balance models is well posed subject to conditions on the initial data. Our family of models includes, in particular, the stratified analog of the L 1 balance model of Salmon. (paper)

  1. A Rule-Based Data Transfer Protocol for On-Demand Data Exchange in Vehicular Environment

    Directory of Open Access Journals (Sweden)

    Liao Hsien-Chou

    2009-01-01

    Full Text Available The purpose of Intelligent Transport System (ITS is mainly to increase the driving safety and efficiency. Data exchange is an important way to achieve the purpose. An on-demand data exchange is especially useful to assist a driver avoiding some emergent events. In order to handle the data exchange under dynamic situations, a rule-based data transfer protocol is proposed in this paper. A set of rules is designed according to the principle of request-forward-reply (RFR. That is, they are used to determine the timing of data broadcasting, forwarding, and replying automatically. Two typical situations are used to demonstrate the operation of rules. One is the front view of a driver occluded by other vehicles. The other is the traffic jam. The proposed protocol is flexible and extensible for unforeseen situations. Three simulation tools were also implemented to demonstrate the feasibility of the protocol and measure the network transmission under high density of vehicles. The simulation results show that the rule-based protocol is efficient on data exchange to increase the driving safety.

  2. ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM: PROTOCOL FOR THE VERIFICATION OF GROUTING MATERIALS FOR INFRASTRUCTURE REHABILITATION AT THE UNIVERSITY OF HOUSTON - CIGMAT

    Science.gov (United States)

    This protocol was developed under the Environmental Protection Agency's Environmental Technology Verification (ETV) Program, and is intended to be used as a guide in preparing laboratory test plans for the purpose of verifying the performance of grouting materials used for infra...

  3. Low Cost ZigBee Protocol Based Laboratory Platforms

    Directory of Open Access Journals (Sweden)

    Alvaro Romero-Acero

    2013-11-01

    Full Text Available This paper presents a low cost wireless communication platform, based on the ZigBee protocol. It is designed with the purpose to strengthen the use of information technology in the classroom. Guides laboratory practices are focused on developing undergraduate engineering students to the area of telecommunications. The platform structure is composed of: Labs custom designed, web tools embedded wireless communication system for data acquisition in real time, and the Human Machine Interface (HMI, which records analog data and digital. 

  4. On the security of a novel key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Xiang Tao; Wong, K.-W.; Liao Xiaofeng

    2009-01-01

    Recently, Xiao et al. proposed a novel key agreement protocol based on Chebyshev chaotic map. In this paper, the security of the protocol is analyzed, and two attack methods can be found in different scenarios. The essential principle of Xiao et al.'s scheme is summarized. It is also pointed out with proof that any attempt along this line to improve the security of Chebyshev map is redundant.

  5. Lower Virial Coefficients of Primitive Models of Polar and Associating Fluids.

    Czech Academy of Sciences Publication Activity Database

    Rouha, M.; Nezbeda, Ivo

    2007-01-01

    Roč. 134, 1-3 (2007) , s. 107-110 Sp. Iss. SI ISSN 0167-7322 R&D Projects: GA AV ČR(CZ) IAA4072303; GA AV ČR(CZ) 1ET400720409 Institutional research plan: CEZ:AV0Z40720504 Keywords : primitive models * virial coefficients * metropolis like monte-carlo integration Subject RIV: CF - Physical ; Theoretical Chemistry Impact factor: 0.982, year: 2007

  6. Secure Execution of Distributed Session Programs

    Directory of Open Access Journals (Sweden)

    Nuno Alves

    2011-10-01

    Full Text Available The development of the SJ Framework for session-based distributed programming is part of recent and ongoing research into integrating session types and practical, real-world programming languages. SJ programs featuring session types (protocols are statically checked by the SJ compiler to verify the key property of communication safety, meaning that parties engaged in a session only communicate messages, including higher-order communications via session delegation, that are compatible with the message types expected by the recipient. This paper presents current work on security aspects of the SJ Framework. Firstly, we discuss our implementation experience from improving the SJ Runtime platform with security measures to protect and augment communication safety at runtime. We implement a transport component for secure session execution that uses a modified TLS connection with authentication based on the Secure Remote Password (SRP protocol. The key technical point is the delicate treatment of secure session delegation to counter a previous vulnerability. We find that the modular design of the SJ Runtime, based on the notion of an Abstract Transport for session communication, supports rapid extension to utilise additional transports whilst separating this concern from the application-level session programming task. In the second part of this abstract, we formally prove the target security properties by modelling the extended SJ delegation protocols in the pi-calculus.

  7. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  8. Pediatric Primitive Neuroectodermal Tumors of the Central Nervous System Differentially Express Granzyme Inhibitors

    NARCIS (Netherlands)

    Vermeulen, Jeroen F; van Hecke, Wim; Spliet, Wim G M; Villacorta Hidalgo, José; Fisch, Paul; Broekhuizen, Roel; Bovenschen, Niels

    2016-01-01

    BACKGROUND: Central nervous system (CNS) primitive neuroectodermal tumors (PNETs) are malignant primary brain tumors that occur in young infants. Using current standard therapy, up to 80% of the children still dies from recurrent disease. Cellular immunotherapy might be key to improve overall

  9. Development of a waste management protocol based on assessment of knowledge and practice of healthcare personnel in surgical departments.

    Science.gov (United States)

    Mostafa, Gehan M A; Shazly, Mona M; Sherief, Wafaa I

    2009-01-01

    Good healthcare waste management in a hospital depends on a dedicated waste management team, good administration, careful planning, sound organization, underpinning legislation, adequate financing, and full participation by trained staff. Hence, waste management protocols must be convenient and sensible. To assess the knowledge and practice related to waste management among doctors, nurses, and housekeepers in the surgical departments at Al-Mansoura University Hospital, and to design and validate a waste management protocol for the health team in these settings. This cross-sectional study was carried out in the eight surgical departments at Al-Mansoura University Hospital. All health care personnel and their assistants were included: 38 doctors, 106 nurses, and 56 housekeepers. Two groups of jury were included for experts' opinions validation of the developed protocol, one from academia (30 members) and the other from service providers (30 members). Data were collected using a self-administered knowledge questionnaire for nurses and doctors, and an interview questionnaire for housekeepers. Observation checklists were used for assessment of performance. The researchers developed the first draft of the waste management protocol according to the results of the analysis of the data collected in the assessment phase. Then, the protocol was presented to the jury group for validation, and then was implemented. Only 27.4% of the nurses, 32.1% of the housekeepers, and 36.8% of the doctors had satisfactory knowledge. Concerning practice, 18.9% of the nurses, 7.1% of the housekeepers, and none of the doctors had adequate practice. Nurses' knowledge score had a statistically significant weak positive correlation with the attendance of training courses (r=0.23, pwaste management. The knowledge among nurses is positively affected by attendance of training programs. Based on the findings, a protocol for healthcare waste management was developed and validated. It is recommended to

  10. Looking for the most ``primitive'' organism(s) on Earth today: the state of the art

    Science.gov (United States)

    Forterre, Patrick

    1995-02-01

    Molecular phylogenetic studies have revealed a tripartite division of the living world into two procaryotic groups, Bacteria and Archaea, and one eucaryotic group, Eucarya. Which group is the most "primitive"? Which groups are sister? The answer to these questions would help to delineate the characters of the last common ancestor to all living beings, as a first step to reconstruct the earliest periods of biological evolution on Earth. The current "Procaryotic dogma" claims that procaryotes are primitive. Since the ancestor of Archaea was most probably a hyperthermophile, and since bacteria too might have originated from hyperthermophiles, the procaryotic dogma has been recently connected to the hot origin of life hypothesis. However, the notion that present-day hyperthermophiles are primitive has been challenged by recent findings, in these unique microorganisms, of very elaborate adaptative devices for life at high temperature. Accordingly, I discuss here alternative hypotheses that challenge the procaryotic dogma, such as the idea of a universal ancestor with molecular features in between those of eucaryotes and procaryotes, or the origin of procaryotes via thermophilic adaptation. Clearly, major evolutionary questions about early cellular evolution on Earth remain to be settled before we can speculate with confidence about which kinds of life might have appeared on other planets.

  11. Rho kinase activity controls directional cell movements during primitive streak formation in the rabbit embryo.

    Science.gov (United States)

    Stankova, Viktoria; Tsikolia, Nikoloz; Viebahn, Christoph

    2015-01-01

    During animal gastrulation, the specification of the embryonic axes is accompanied by epithelio-mesenchymal transition (EMT), the first major change in cell shape after fertilization. EMT takes place in disparate topographical arrangements, such as the circular blastopore of amphibians, the straight primitive streak of birds and mammals or in intermediate gastrulation forms of other amniotes such as reptiles. Planar cell movements are prime candidates to arrange specific modes of gastrulation but there is no consensus view on their role in different vertebrate classes. Here, we test the impact of interfering with Rho kinase-mediated cell movements on gastrulation topography in blastocysts of the rabbit, which has a flat embryonic disc typical for most mammals. Time-lapse video microscopy, electron microscopy, gene expression and morphometric analyses of the effect of inhibiting ROCK activity showed - besides normal specification of the organizer region - a dose-dependent disruption of primitive streak formation; this disruption resulted in circular, arc-shaped or intermediate forms, reminiscent of those found in amphibians, fishes and reptiles. Our results reveal a crucial role of ROCK-controlled directional cell movements during rabbit primitive streak formation and highlight the possibility that temporal and spatial modulation of cell movements were instrumental for the evolution of gastrulation forms. © 2015. Published by The Company of Biologists Ltd.

  12. Act In case of Depression: The evaluation of a care program to improve the detection and treatment of depression in nursing homes. Study Protocol

    Directory of Open Access Journals (Sweden)

    Vernooij-Dassen Myrra JFJ

    2011-05-01

    Full Text Available Abstract Background The aim of this study is evaluating the (cost- effectiveness of a multidisciplinary, evidence based care program to improve the management of depression in nursing home residents of somatic and dementia special care units. The care program is an evidence based standardization of the management of depression, including standardized use of measurement instruments and diagnostical methods, and protocolized psychosocial, psychological and pharmacological treatment. Methods/Design In a 19-month longitudinal controlled study using a stepped wedge design, 14 somatic and 14 dementia special care units will implement the care program. All residents who give informed consent on the participating units will be included. Primary outcomes are the frequency of depression on the units and quality of life of residents on the units. The effect of the care program will be estimated using multilevel regression analysis. Secondary outcomes include accuracy of depression-detection in usual care, prevalence of depression-diagnosis in the intervention group, and response to treatment of depressed residents. An economic evaluation from a health care perspective will also be carried out. Discussion The care program is expected to be effective in reducing the frequency of depression and in increasing the quality of life of residents. The study will further provide insight in the cost-effectiveness of the care program. Trial registration Netherlands Trial Register (NTR: NTR1477

  13. Development of a theory and evidence-based program to promote community treatment of fevers in children under five in a rural district in Southern Ghana: An intervention mapping approach

    Directory of Open Access Journals (Sweden)

    Mercy Abbey

    2017-01-01

    Full Text Available Abstract Background This paper describes the development and implementation of a program to promote prompt and appropriate care seeking for fever in children under the age of five. Designed as a multicomponent program, the intervention comprises elements to influence the behavior of caregivers of children, Community Health Workers, professional health care providers and the wider community. Methods Following the six fundamental steps of the Intervention Mapping protocol, we involved relevant stakeholders from the commencement of planning to program end. The IM protocol also recommends various behavior change methods to guide intervention development. Results The intervention components implemented were successful in achieving program goals. For example, the intervention resulted in the primary outcome of reductions in all-cause mortality of 30% and 44%, among children treated with an antimalarial and those treated with the antimalarial plus an antibiotic respectively. Most Community Health Workers were retained on the program, with an attrition rate of 21.2% over a period of 30 months and the Community Health Workers rate of adherence to performance guidelines was high at 94.6%. Conclusion We were able to systematically develop a theory- and evidence-based health promotion program based on the Intervention Mapping protocol. This article contributes to the response to recent calls for a more detailed description of the development of interventions and trials. The intervention mapping approach can serve as a guide for others interested in developing community- based health interventions in similar settings.

  14. Development of a theory and evidence-based program to promote community treatment of fevers in children under five in a rural district in Southern Ghana: An intervention mapping approach.

    Science.gov (United States)

    Abbey, Mercy; Bartholomew, L Kay; Chinbuah, Margaret A; Gyapong, Margaret; Gyapong, John O; van den Borne, Bart

    2017-01-25

    This paper describes the development and implementation of a program to promote prompt and appropriate care seeking for fever in children under the age of five. Designed as a multicomponent program, the intervention comprises elements to influence the behavior of caregivers of children, Community Health Workers, professional health care providers and the wider community. Following the six fundamental steps of the Intervention Mapping protocol, we involved relevant stakeholders from the commencement of planning to program end. The IM protocol also recommends various behavior change methods to guide intervention development. The intervention components implemented were successful in achieving program goals. For example, the intervention resulted in the primary outcome of reductions in all-cause mortality of 30% and 44%, among children treated with an antimalarial and those treated with the antimalarial plus an antibiotic respectively. Most Community Health Workers were retained on the program, with an attrition rate of 21.2% over a period of 30 months and the Community Health Workers rate of adherence to performance guidelines was high at 94.6%. We were able to systematically develop a theory- and evidence-based health promotion program based on the Intervention Mapping protocol. This article contributes to the response to recent calls for a more detailed description of the development of interventions and trials. The intervention mapping approach can serve as a guide for others interested in developing community- based health interventions in similar settings.

  15. Channels as Objects in Concurrent Object-Oriented Programming

    Directory of Open Access Journals (Sweden)

    Joana Campos

    2011-10-01

    Full Text Available There is often a sort of a protocol associated to each class, stating when and how certain methods should be called. Given that this protocol is, if at all, described in the documentation accompanying the class, current mainstream object-oriented languages cannot provide for the verification of client code adherence against the sought class behaviour. We have defined a class-based concurrent object-oriented language that formalises such protocols in the form of usage types. Usage types are attached to class definitions, allowing for the specification of (1 the available methods, (2 the tests clients must perform on the result of methods, and (3 the object status - linear or shared - all of which depend on the object's state. Our work extends the recent approach on modular session types by eliminating channel operations, and defining the method call as the single communication primitive in both sequential and concurrent settings. In contrast to previous works, we define a single category for objects, instead of distinct categories for linear and for shared objects, and let linear objects evolve into shared ones. We introduce a standard sync qualifier to prevent thread interference in certain operations on shared objects. We formalise the language syntax, the operational semantics, and a type system that enforces by static typing that methods are called only when available, and by a single client if so specified in the usage type. We illustrate the language via a complete example.

  16. WYSIWYB: A Declarative Approach to Finding API Protocols and Bugs in Linux Code

    DEFF Research Database (Denmark)

    Lawall, Julia; Lawall, Julia; Palix, Nicolas

    2009-01-01

    the tools to be able to find specific kinds of bugs. In this paper, we propose a declarative approach based on a control-flow based program search engine. Our approach is WYSIWIB (What You See Is Where It Bugs), since the programmer is able to express specifications for protocol and bug finding using...

  17. Thoracoabdominal peripheral primitive neuroectodermal tumors in childhood: radiological features

    International Nuclear Information System (INIS)

    Schulman, H.; Laufer, L.; Newman-Heinman, N.; Kurtzbart, E.; Maor, E.; Zirkin, H.

    2000-01-01

    Peripheral primitive neuroectodermal tumors (PNET) are extremely uncommon, malignant neoplasms affecting mostly children and young adults. We retrospectively reviewed the clinical data and radiological studies of four such cases. All cases were pathologically proven. Plain films, US, and CT scans were used. The youngest child had a huge pelvic tumor and two adolescents each had a chest wall (Askin) tumor. The fourth patient had a most unusual location of the PNET in the anterior mediastinum. The CT findings are emphasized. We emphasize that the markedly abnormal CT findings are not specific for PNET. (orig.)

  18. Characterizing Digital Light Processing (DLP) 3D Printed Primitives

    DEFF Research Database (Denmark)

    Tyge, Emil; Pallisgaard, Jens J.; Lillethorup, Morten

    2015-01-01

    The resolution and repeatability of 3D printing processes depends on a number of factors including the software, hardware, and material used. When printing parts with features that are near or below the nominal printing resolution, it is important to understand how the printer works. For example......, what is the smallest unit shape that can be produced? And what is the reproducibility of that process? This paper presents a method for automatically detecting and characterizing the height, width, and length of micro scale geometric primitives produced via a digital light processing (DLP) 3D printing...

  19. The Virtual Insect Brain protocol: creating and comparing standardized neuroanatomy

    Science.gov (United States)

    Jenett, Arnim; Schindelin, Johannes E; Heisenberg, Martin

    2006-01-01

    Background In the fly Drosophila melanogaster, new genetic, physiological, molecular and behavioral techniques for the functional analysis of the brain are rapidly accumulating. These diverse investigations on the function of the insect brain use gene expression patterns that can be visualized and provide the means for manipulating groups of neurons as a common ground. To take advantage of these patterns one needs to know their typical anatomy. Results This paper describes the Virtual Insect Brain (VIB) protocol, a script suite for the quantitative assessment, comparison, and presentation of neuroanatomical data. It is based on the 3D-reconstruction and visualization software Amira, version 3.x (Mercury Inc.) [1]. Besides its backbone, a standardization procedure which aligns individual 3D images (series of virtual sections obtained by confocal microscopy) to a common coordinate system and computes average intensities for each voxel (volume pixel) the VIB protocol provides an elaborate data management system for data administration. The VIB protocol facilitates direct comparison of gene expression patterns and describes their interindividual variability. It provides volumetry of brain regions and helps to characterize the phenotypes of brain structure mutants. Using the VIB protocol does not require any programming skills since all operations are carried out at an intuitively usable graphical user interface. Although the VIB protocol has been developed for the standardization of Drosophila neuroanatomy, the program structure can be used for the standardization of other 3D structures as well. Conclusion Standardizing brains and gene expression patterns is a new approach to biological shape and its variability. The VIB protocol provides a first set of tools supporting this endeavor in Drosophila. The script suite is freely available at [2] PMID:17196102

  20. A class-chest for deriving transport protocols

    Energy Technology Data Exchange (ETDEWEB)

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  1. A research-based child welfare employee selection protocol: strengthening retention of the workforce.

    Science.gov (United States)

    Ellett, Alberta J; Ellett, Chad D; Ellis, Jacquelyn; Lerner, Betsy

    2009-01-01

    This article describes the development and initial implementation of a new employee selection protocol (ESP) for child welfare grounded in the results of recent large-scale employee retention studies and a set of research-based, minimally essential knowledge, skills, abilities, and values. The complete ESP consists of a sequenced set of Web- and site-based assessment processes and procedures for potential applicants. Using the ESP, applicants and employers make informed decisions about the goodness of fit between the applicant and the demands of a career in child welfare. To date, the new ESP has been piloted in three Georgia Division of Family and Children Services (DFCS) regions and implemented by all nine colleges and universities participating in IV-E child welfare education programs. Evaluation data collected from students and new employees in one DFCS region strongly support the value of the ESP Web-based activities to make a more informed decision about whether to apply for the IV-E stipends and child welfare positions. Feedback from trained ESP assessors supports the value of various ESP activities. A major goal of implementing the ESP is to select more professionally committed and highly qualified applicants to strengthen employee retention and outcomes for children and families.

  2. Strategy for Developing Expert-System-Based Internet Protocols (TCP/IP)

    Science.gov (United States)

    Ivancic, William D.

    1997-01-01

    The Satellite Networks and Architectures Branch of NASA's Lewis Research is addressing the issue of seamless interoperability of satellite networks with terrestrial networks. One of the major issues is improving reliable transmission protocols such as TCP over long latency and error-prone links. Many tuning parameters are available to enhance the performance of TCP including segment size, timers and window sizes. There are also numerous congestion avoidance algorithms such as slow start, selective retransmission and selective acknowledgment that are utilized to improve performance. This paper provides a strategy to characterize the performance of TCP relative to various parameter settings in a variety of network environments (i.e. LAN, WAN, wireless, satellite, and IP over ATM). This information can then be utilized to develop expert-system-based Internet protocols.

  3. Boltzmann's dynamic on the primitive earth about 3.9 billion years ago

    International Nuclear Information System (INIS)

    Matsuno, Koichiro

    1995-01-01

    An evolutionary significant event that could have happened on the primitive earth would be a process of enhancing energy concentrations locally. Once the concentrated energy be released, it could drive various molecular association and dissociation. We have examined, both theoretically and experimentally, a possibility of forming such microscopic heat engines feeding upon the then available thermal environment. Theoretically, Boltzmann's dynamics of molecules that would lose their memory of pas collisions with others is found to uphold those molecules that could feed upon thermal energy if the thermal environment would fluctuate through, for instance, a diurnal cycle. Experimentally, thermal heterocomplex molecules from amino acids, that could have been ubiquitous on the primitive earth, are shown to carry with themselves a wide variety of quasi-stable states such that they could remain in excited states for a considerable period of time even if the temperature of the thermal environment is lowered. The stored energy in these excited states, once released, can be utilized as a factor for driving various molecular association and dissociation. (author). Abstract only

  4. An Improved Constraint-Based System for the Verification of Security Protocols

    NARCIS (Netherlands)

    Corin, R.J.; Etalle, Sandro

    We propose a constraint-based system for the verification of security protocols that improves upon the one developed by Millen and Shmatikov [30]. Our system features (1) a significantly more efficient implementation, (2) a monotonic behavior, which also allows to detect flaws associated to partial

  5. An Improved Constraint-based system for the verification of security protocols

    NARCIS (Netherlands)

    Corin, R.J.; Etalle, Sandro; Hermenegildo, Manuel V.; Puebla, German

    We propose a constraint-based system for the verification of security protocols that improves upon the one developed by Millen and Shmatikov. Our system features (1) a significantly more efficient implementation, (2) a monotonic behavior, which also allows to detect aws associated to partial runs

  6. Goal-setting protocol in adherence to exercise by Italian adults.

    Science.gov (United States)

    Annesi, James J

    2002-04-01

    A goal-setting protocol, based on research in goal setting and performance and personal construct theory, was tested for its effect on adherence to a new exercise program. The Goal-setting group (n = 50) had significantly less dropout (30%) than the control group (n = 50) (74%). The Goal-setting group also had significantly better attendance (psettings were discussed.

  7. Is Home-Based, High-Intensity Interval Training Cycling Feasible and Safe for Patients With Knee Osteoarthritis?: Study Protocol for a Randomized Pilot Study.

    Science.gov (United States)

    Keogh, Justin W L; Grigg, Josephine; Vertullo, Christopher J

    2017-03-01

    Osteoarthritis (OA) is a degenerative joint disease affecting the knee joint of many middle-aged and older adults. As OA symptoms typically involve knee pain and stiffness, individuals with knee OA are often insufficiently physically active, have low levels of physical function, and are at increased risk of other comorbidities and reduced quality of life. While moderate-intensity continuous training (MICT) cycling is often recommended, little is known about the feasibility, safety, and benefits of high-intensity interval training (HIIT) cycling for this population, even though the feasibility, safety, and benefits of HIIT have been demonstrated in other chronic disease groups. The primary objective of this pilot study was to examine the feasibility and safety of home-based HIIT and MICT cycling in middle-aged and older adults with knee OA. A secondary objective was to gain some insight into the relative efficacy of HIIT and MICT for improving health status (pain, stiffness, and disability), muscle function, and body composition in this population. This study protocol is being published separately to allow a detailed description of the research methods, explain the rationale for choosing the methodological details, and to stimulate consideration of the best means to simulate a research protocol that is relevant to a real-life treatment environment. Randomized pilot study protocol. This trial sought to recruit 40 middle-aged and older adults with knee OA. Participants were randomly allocated to either continuous (MICT) or HIIT home-based cycle training programs, with both programs requiring the performance of 4 cycling sessions (approximately 25 minutes per session) each week. Participants were measured at baseline and postintervention (8 weeks). Feasibility and safety were assessed by adherence rate, dropout rate, and number of adverse events. The relative efficacy of the cycling programs was investigated by 2 knee OA health status questionnaires (Western Ontario

  8. Visceral endoderm and the primitive streak interact to build the fetal-placental interface of the mouse gastrula.

    Science.gov (United States)

    Rodriguez, Adriana M; Downs, Karen M

    2017-12-01

    Hypoblast/visceral endoderm assists in amniote nutrition, axial positioning and formation of the gut. Here, we provide evidence, currently limited to humans and non-human primates, that hypoblast is a purveyor of extraembryonic mesoderm in the mouse gastrula. Fate mapping a unique segment of axial extraembryonic visceral endoderm associated with the allantoic component of the primitive streak, and referred to as the "AX", revealed that visceral endoderm supplies the placentae with extraembryonic mesoderm. Exfoliation of the AX was dependent upon contact with the primitive streak, which modulated Hedgehog signaling. Resolution of the AX's epithelial-to-mesenchymal transition (EMT) by Hedgehog shaped the allantois into its characteristic projectile and individualized placental arterial vessels. A unique border cell separated the delaminating AX from the yolk sac blood islands which, situated beyond the limit of the streak, were not formed by an EMT. Over time, the AX became the hindgut lip, which contributed extensively to the posterior interface, including both embryonic and extraembryonic tissues. The AX, in turn, imparted antero-posterior (A-P) polarity on the primitive streak and promoted its elongation and differentiation into definitive endoderm. Results of heterotopic grafting supported mutually interactive functions of the AX and primitive streak, showing that together, they self-organized into a complete version of the fetal-placental interface, forming an elongated structure that exhibited A-P polarity and was composed of the allantois, an AX-derived rod-like axial extension reminiscent of the embryonic notochord, the placental arterial vasculature and visceral endoderm/hindgut. Copyright © 2017 The Authors. Published by Elsevier Inc. All rights reserved.

  9. A new and primitive retrobursal planarian from Australian fresh waters (Platyhelminthes, Turbellaria, Tricladida)

    NARCIS (Netherlands)

    Ball, Ian R.

    1977-01-01

    A primitive freshwater planarian, Eviella hynesae gen. et sp. nov. is described from Australia. It is characterized by its lack of eyes and pigment, possession of caudally branched oviducts, and fully fused testes. Although a primary bursa is absent, its function being taken over by the modified

  10. Remote direct memory access over datagrams

    Science.gov (United States)

    Grant, Ryan Eric; Rashti, Mohammad Javad; Balaji, Pavan; Afsahi, Ahmad

    2014-12-02

    A communication stack for providing remote direct memory access (RDMA) over a datagram network is disclosed. The communication stack has a user level interface configured to accept datagram related input and communicate with an RDMA enabled network interface card (NIC) via an NIC driver. The communication stack also has an RDMA protocol layer configured to supply one or more data transfer primitives for the datagram related input of the user level. The communication stack further has a direct data placement (DDP) layer configured to transfer the datagram related input from a user storage to a transport layer based on the one or more data transfer primitives by way of a lower layer protocol (LLP) over the datagram network.

  11. A comparison of sennosides-based bowel protocols with and without docusate in hospitalized patients with cancer.

    Science.gov (United States)

    Hawley, Philippa Helen; Byeon, Jai Jun

    2008-05-01

    Constipation is a common and distressing condition in patients with cancer, especially those taking opioid analgesics. Many institutions prevent and treat constipation with titrated laxatives, which is known as a bowel protocol. An effective and well-tolerated bowel protocol is a very important component of cancer care, and there is little evidence on which to base selection of the most appropriate agents. This study compares a protocol of the stimulant laxative sennosides alone with a protocol of sennosides plus the stool softener docusate, in hospitalized patients at an oncology center. The docusate-containing protocol had an initial docusate-only step for patients not taking opioids, and four to six 100-mg capsules of docusate sodium in addition to the sennosides for the rest of the protocol. Thirty patients received the sennosides-only (S) protocol and 30 the sennosides plus docusate (DS) protocol. The efficacy and adverse effects of the protocols were monitored for 5-12 days. The two protocols were used sequentially, creating two cohorts, one on each protocol. Eighty percent of patients were taking oral opioids and 72% were admitted for symptom control/supportive care. Over a total of 488 days of observation it was found that the S protocol produced more bowel movements than the DS protocol, and in the symptom control/supportive care patients this difference was statistically significant (p sennosides did not reduce bowel cramps, and was less effective in inducing laxation than the sennosides-only protocol. Further research into the appropriate use of docusate and into the details of bowel protocol design are required.

  12. Dispossessing Urbanization: Urban Marxism in the Face of the Problem of Primitive Accumulation

    Directory of Open Access Journals (Sweden)

    Piotr Juskowiak

    2015-04-01

    Full Text Available The article is a complex attempt to present the achievements of the broadly understood urban Marxism in the field of reinterpretation of the classic concept from the cards of Capital – “primitive accumulation”. Drawing on theories of such scholars as David Harvey (“accumulation by dispossession” or Saskia Sassen (“expulsions”, the author points to the possible ways to operationalize the concept of “dispossessing urbanization”. Inspired by the theorizations of autonomist Marxists (Antonio Negri, Sandro Mezzadra, Massimo De Angelis, he proposes to see it as a relatively new and increasingly important dispostif that allows not only to improve traditional methods of enclosures and construct entirely new ones, but also to instrumentalize urban cultures which seems unlikely for the historical versions of primitive accumulation. This theoretical inspiration leads him also to highlight another gap in the accumulation by dispossession theory, namely the lack of sufficient reflection on the production of subjectivity processes which seem constitutive for the broad set of dispossessing practices.

  13. Multipath Activity Based Routing Protocol for Mobile ‎Cognitive Radio Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Shereen Omar

    2017-01-01

    Full Text Available Cognitive radio networks improve spectrum utilization by ‎sharing licensed spectrum with cognitive radio devices. In ‎cognitive radio ad hoc networks the routing protocol is one ‎of the most challenging tasks due to the changes in ‎frequency spectrum and the interrupted connectivity ‎caused by the primary user activity. In this paper, a multi‎path activity based routing protocol for cognitive radio ‎network (MACNRP is proposed. The protocol utilizes ‎channel availability and creates multiple node-disjoint ‎routes between the source and destination nodes. The ‎proposed protocol is compared with D2CARP and FTCRP ‎protocols. The performance evaluation is conducted ‎through mathematical analysis and using OPNET ‎simulation. The performance of the proposed protocol ‎achieves an increase in network throughput; besides it ‎decreases the probability of route failure due to node ‎mobility and primary user activity. We have found that the ‎MACNRP scheme results in 50% to 75% reduction in ‎blocking probability and 33% to 78% improvement in ‎network throughput, with a reasonable additional routing ‎overhead and average packet delay. Due to the successful ‎reduction of collision between primary users and ‎cognitive users, the MACNRP scheme results in decreasing ‎the path failure rate by 50% to 87%.‎

  14. Organic cofactors participated more frequently than transition metals in redox reactions of primitive proteins.

    Science.gov (United States)

    Ji, Hong-Fang; Chen, Lei; Zhang, Hong-Yu

    2008-08-01

    Protein redox reactions are one of the most basic and important biochemical actions. As amino acids are weak redox mediators, most protein redox functions are undertaken by protein cofactors, which include organic ligands and transition metal ions. Since both kinds of redox cofactors were available in the pre-protein RNA world, it is challenging to explore which one was more involved in redox processes of primitive proteins? In this paper, using an examination of the redox cofactor usage of putative ancient proteins, we infer that organic ligands participated more frequently than transition metals in redox reactions of primitive proteins, at least as protein cofactors. This is further supported by the relative abundance of amino acids in the primordial world. Supplementary material for this article can be found on the BioEssays website. (c) 2008 Wiley Periodicals, Inc.

  15. A Phase II Study of Preradiotherapy Chemotherapy Followed by Hyperfractionated Radiotherapy for Newly Diagnosed High-Risk Medulloblastoma/Primitive Neuroectodermal Tumor: A Report From the Children's Oncology Group (CCG 9931)

    International Nuclear Information System (INIS)

    Allen, Jeffrey; Donahue, Bernadine; Mehta, Minesh; Miller, Douglas C.; Rorke, Lucy B.; Jakacki, Regina; Robertson, Patricia; Sposto, Richard; Holmes, Emi; Vezina, Gilbert; Muraszko, Karin; Puccetti, Diane; Prados, Michael; Chan, K.-W.

    2009-01-01

    Purpose: To verify feasibility and monitor progression-free survival and overall survival in children with high-risk medulloblastoma and noncerebellar primitive neuroectodermal tumors (PNETs) treated in a Phase II study with preradiotherapy chemotherapy (CHT) followed by high-dose, hyperfractionated craniospinal radiotherapy (CSRT). Methods and Materials: Eligibility criteria included age >3 years at diagnosis, medulloblastoma with either high M stage and/or >1.5 cm 2 postoperative residual disease, and all patients with noncerebellar PNET. Treatment was initiated with five alternating monthly cycles of CHT (A [cisplatin, cyclophosphamide, etoposide, and vincristine], B [carboplatin and etoposide], A, B, and A) followed by hyperfractionated CSRT (40 Gy) with a boost to the primary tumor (72 Gy) given in twice-daily 1-Gy fractions. Results: The valid study group consisted of 124 patients whose median age at diagnosis was 7.8 years. Eighty-four patients (68%) completed the entire protocol according to study guidelines (within 9 months), and the median time to complete CSRT was 1.6 months. Major reasons for failure to complete CHT included progressive disease (17%) and toxic death (2.4%). The 5-year progression-free survival and overall survival rates were 43% ± 5% and 52% ± 5%, respectively. No significant differences were detected in subset analysis related to response to CHT, site of primary tumor, postoperative residual disease, or M stage. Conclusions: The feasibility of this intensive multimodality protocol was confirmed, and response to pre-RT CHT did not impact on survival. Survival data from this protocol can not be compared with data from other studies, given the protocol design.

  16. Prediction of Intention during Interaction with iCub with Probabilistic Movement Primitives

    Directory of Open Access Journals (Sweden)

    Oriane Dermy

    2017-10-01

    Full Text Available This article describes our open-source software for predicting the intention of a user physically interacting with the humanoid robot iCub. Our goal is to allow the robot to infer the intention of the human partner during collaboration, by predicting the future intended trajectory: this capability is critical to design anticipatory behaviors that are crucial in human–robot collaborative scenarios, such as in co-manipulation, cooperative assembly, or transportation. We propose an approach to endow the iCub with basic capabilities of intention recognition, based on Probabilistic Movement Primitives (ProMPs, a versatile method for representing, generalizing, and reproducing complex motor skills. The robot learns a set of motion primitives from several demonstrations, provided by the human via physical interaction. During training, we model the collaborative scenario using human demonstrations. During the reproduction of the collaborative task, we use the acquired knowledge to recognize the intention of the human partner. Using a few early observations of the state of the robot, we can not only infer the intention of the partner but also complete the movement, even if the user breaks the physical interaction with the robot. We evaluate our approach in simulation and on the real iCub. In simulation, the iCub is driven by the user using the Geomagic Touch haptic device. In the real robot experiment, we directly interact with the iCub by grabbing and manually guiding the robot’s arm. We realize two experiments on the real robot: one with simple reaching trajectories, and one inspired by collaborative object sorting. The software implementing our approach is open source and available on the GitHub platform. In addition, we provide tutorials and videos.

  17. Data exchange technology based on handshake protocol for industrial automation system

    Science.gov (United States)

    Astafiev, A. V.; Shardin, T. O.

    2018-05-01

    In the article, questions of data exchange technology based on the handshake protocol for industrial automation system are considered. The methods of organizing the technology in client-server applications are analyzed. In the process of work, the main threats of client-server applications that arise during the information interaction of users are indicated. Also, a comparative analysis of analogue systems was carried out, as a result of which the most suitable option was chosen for further use. The basic schemes for the operation of the handshake protocol are shown, as well as the general scheme of the implemented application, which describes the entire process of interaction between the client and the server.

  18. Design and implementation of an intrusion detection system based on IPv6 protocol

    Science.gov (United States)

    Liu, Bin; Li, Zhitang; Li, Yao; Li, Zhanchun

    2005-11-01

    Network intrusion detection systems (NIDS) are important parts of network security architecture. Although many NIDS have been proposed, there is little effort to expand the current set of NIDS to support IPv6 protocol. This paper presents the design and implementation of a Network-based Intrusion Detection System that supports both IPv6 protocol and IPv4 protocol. It characters rules based logging to perform content pattern matching and detect a variety of attacks and probes from IPv4 and IPv6.There are four primary subsystems to make it up: packet capture, packet decoder, detection engine, and logging and alerting subsystem. A new approach to packet capture that combined NAPI with MMAP is proposed in this paper. The test results show that the efficiency of packet capture can be improved significantly by this method. Several new attack tools for IPv6 have been developed for intrusion detection evaluation. Test shows that more than 20 kinds of IPv6 attacks can be detected by this system and it also has a good performance under heavy traffic load.

  19. Efficient and Rapid Derivation of Primitive Neural Stem Cells and Generation of Brain Subtype Neurons From Human Pluripotent Stem Cells

    OpenAIRE

    Yan, Yiping; Shin, Soojung; Jha, Balendu Shekhar; Liu, Qiuyue; Sheng, Jianting; Li, Fuhai; Zhan, Ming; Davis, Janine; Bharti, Kapil; Zeng, Xianmin; Rao, Mahendra; Malik, Nasir; Vemuri, Mohan C.

    2013-01-01

    This study developed a highly efficient serum-free pluripotent stem cell (PSC) neural induction medium that can induce human PSCs into primitive neural stem cells (NSCs) in 7 days, obviating the need for time-consuming, laborious embryoid body generation or rosette picking. This method of primitive NSC derivation sets the stage for the scalable production of clinically relevant neural cells for cell therapy applications in good manufacturing practice conditions.

  20. A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function.

    Science.gov (United States)

    Xu, He; Ding, Jie; Li, Peng; Zhu, Feng; Wang, Ruchuan

    2018-03-02

    With the fast development of the Internet of Things, Radio Frequency Identification (RFID) has been widely applied into many areas. Nevertheless, security problems of the RFID technology are also gradually exposed, when it provides life convenience. In particular, the appearance of a large number of fake and counterfeit goods has caused massive loss for both producers and customers, for which the clone tag is a serious security threat. If attackers acquire the complete information of a tag, they can then obtain the unique identifier of the tag by some technological means. In general, because there is no extra identifier of a tag, it is difficult to distinguish an original tag and its clone one. Once the legal tag data is obtained, attackers can be able to clone this tag. Therefore, this paper shows an efficient RFID mutual verification protocol. This protocol is based on the Physical Unclonable Function (PUF) and the lightweight cryptography to achieve efficient verification of a single tag. The protocol includes three process: tag recognition, mutual verification and update. The tag recognition is that the reader recognizes the tag; mutual verification is that the reader and tag mutually verify the authenticity of each other; update is supposed to maintain the latest secret key for the following verification. Analysis results show that this protocol has a good balance between performance and security.