WorldWideScience

Sample records for protocols current efforts

  1. FLOWER, an Innovative Fuzzy Lower-than-Best-Effort Transport Protocol

    OpenAIRE

    Trang, Si Quoc Viet; Lochin, Emmanuel

    2016-01-01

    We present a new delay-based transport protocol named FLOWER, that aims at providing a Lower-than-Best-Effort (LBE) service. The objective is to propose an alternative to the Low Extra Delay Background Transport (LEDBAT) widely deployed within the official BitTorrent client. Indeed, besides its intra-fairness problem, known as latecomer unfairness, LEDBAT can be too aggressive against TCP, making it ill suited for providing LBE services over certain networks such as constrained wireless netwo...

  2. Shell Inspection History and Current CMM Inspection Efforts

    Energy Technology Data Exchange (ETDEWEB)

    Montano, Joshua Daniel [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-01-26

    The following report provides a review of past and current CMM Shell Inspection efforts. Calibration of the Sheffield rotary contour gauge has expired and the primary inspector, Matthew Naranjo, has retired. Efforts within the Inspection team are transitioning from maintaining and training new inspectors on Sheffield to off-the-shelf CMM technology. Although inspection of a shell has many requirements, the scope of the data presented in this report focuses on the inner contour, outer contour, radial wall thickness and mass comparisons.

  3. Massive transfusion protocols: current best practice

    Directory of Open Access Journals (Sweden)

    Hsu YM

    2016-03-01

    Full Text Available Yen-Michael S Hsu,1 Thorsten Haas,2 Melissa M Cushing1 1Department of Pathology and Laboratory Medicine, Weill Cornell Medical College, New York, NY, USA; 2Department of Anesthesia, University Children's Hospital Zurich, Zurich, Switzerland Abstract: Massive transfusion protocols (MTPs are established to provide rapid blood replacement in a setting of severe hemorrhage. Early optimal blood transfusion is essential to sustain organ perfusion and oxygenation. There are many variables to consider when establishing an MTP, and studies have prospectively evaluated different scenarios and patient populations to establish the best practices to attain improved patient outcomes. The establishment and utilization of an optimal MTP is challenging given the ever-changing patient status during resuscitation efforts. Much of the MTP literature comes from the trauma population, due to the fact that massive hemorrhage is the leading cause of preventable trauma-related death. As we come to further understand the positive and negative clinical impacts of transfusion-related factors, massive transfusion practice can be further refined. This article will first discuss specific MTPs targeting different patient populations and current relevant international guidelines. Then, we will examine a wide selection of therapeutic products to support MTPs, including newly available products and the most suitable of the traditional products. Lastly, we will discuss the best design for an MTP, including ratio-based MTPs and MTPs based on the use of point-of-care coagulation diagnostic tools. Keywords: hemorrhage, MTP, antifibrinolytics, coagulopathy, trauma, ratio, logistics, guidelines, hemostatic

  4. Approach to integrate current safeguards measures with additional protocol requirements at national level

    International Nuclear Information System (INIS)

    Ramirez, R.

    2001-01-01

    Peru adhered to the Additional Protocol in March 2000 which was also approved by the Congress in May 2001. After approval by law the obligations derived from this Additional Protocol will be in force after 180 days. After the signing of the Protocol an approach was designed to help better fulfill these requirements in an integrated way with the previous measures. As first stage, a review of the current state of safeguards was undertaken. Under the current agreement (an INFCIRC/153 type agreement) the reporting is less complicated and inexpensive to be carried out because these reports include only the declared nuclear material and the features of declared facilities where the nuclear material is used. No other related facility or material or activity needs to be declared. In Peru there are only two MBAs where low enriched uranium (LEU) is used and the record system includes general ledgers, inventory records and operational books. The results of national inspections and copies of reports and communications sent to the IAEA are also kept in this system. Under the agreement and subsidiary arrangements material balance reports (MBR), physical inventory listings (PIL) and inventory change reports (ICR) are prepared and submitted to the IAEA at scheduled periods. The MBR and PIL reports are sent after yearly regular inspections carried out by the IAEA. The ICR is sent just every time when an import or export of nuclear material is made. The time devoted to carry out all of these activities is not so extensive for both the State System for Accountability and Control (SSAC) and the users because of the limited nuclear activities in the country. Because of the characteristics and limited quantities of nuclear material the efforts for inspection and reporting activities are few. Another subject under review was the procedure for controlling the imports of nuclear material. Under the current agreement this subject was not a problem, as all of the radioactive and nuclear

  5. Department of Energy Efforts to Promote Universal Adherence to the IAEA Additional Protocol

    International Nuclear Information System (INIS)

    Killinger, Mark H.; Hansen, Linda H.; Kovacic, Don N.; VanSickle, Matthew; Apt, Kenneth E.

    2009-01-01

    Entry-into-force of the U.S. Additional Protocol (AP) in January 2009 continues to demonstrate the ongoing commitment by the United States to promote universal adherence to the AP. The AP is a critical tool for improving the International Atomic Energy Agency's (IAEA) capabilities to detect undeclared activities that indicate a clandestine nuclear weapons program. This is because States Parties are required to provide information about, and access to, nuclear fuel cycle activities beyond their traditional safeguards reporting requirements. As part of the U.S. AP Implementation Act and Senate Resolution of Ratification, the Administration is required to report annually to Congress on measures taken to achieve the adoption of the AP in non-nuclear weapon states, as well as assistance to the IAEA to promote the effective implementation of APs in those states. A key U.S. effort in this area is being managed by the International Nuclear Safeguards and Engagement Program (INSEP) of the U.S. Department of Energy (DOE). Through new and existing bilateral cooperation agreements, INSEP has initiated technical assistance projects for AP implementation with selected non-weapon states. States with which INSEP is currently cooperating include Vietnam and Thailand, with Indonesia, Algeria, Morocco, and other countries as possible future collaborators in the area of AP implementation. The INSEP collaborative model begins with a joint assessment with our partners to identify specific needs they may have regarding entering the AP into force and any impediments to successful implementation. An action plan is then developed detailing and prioritizing the necessary joint activities. Such assistance may include: advice on developing legal frameworks and regulatory documents; workshops to promote understanding of AP requirements; training to determine possible declarable activities; assistance in developing a system to collect and submit declarations; performing industry outreach to

  6. [Effort-reward imbalance at work and depression: current research evidence].

    Science.gov (United States)

    Siegrist, J

    2013-01-01

    In view of highly prevalent stressful conditions in modern working life, in particular increasing work pressure and job insecurity, it is of interest to know whether specific constellations of an adverse psychosocial work environment increase the risk of depressive disorder among employed people. This contribution gives a short overview of current research evidence based on an internationally established work stress model of effort-reward imbalance. Taken together, results from seven prospective epidemiological investigations demonstrate a two-fold elevated relative risk of incident depressive disorder over a mean observation period of 2.7 years among exposed versus non-exposed employees. Additional findings from experimental and quasi-experimental studies point to robust associations of effort-reward imbalance at work with proinflammatory cytokines and markers of reduced immune competence. These latter markers may indicate potential psychobiological pathways. In conclusion, incorporating this new knowledge into medical treatment and preventive efforts seems well justified.

  7. Flaws in current human training protocols for spontaneous Brain-Computer Interfaces: lessons learned from instructional design

    Directory of Open Access Journals (Sweden)

    Fabien eLotte

    2013-09-01

    Full Text Available While recent research on Brain-Computer Interfaces (BCI has highlighted their potential for many applications, they remain barely used outside laboratories. The main reason is their lack of robustness. Indeed, with current BCI, mental state recognition is usually slow and often incorrect. Spontaneous BCI (i.e., mental imagery-based BCI often rely on mutual learning efforts by the user and the machine, with BCI users learning to produce stable EEG patterns (spontaneous BCI control being widely acknowledged as a skill while the computer learns to automatically recognize these EEG patterns, using signal processing. Most research so far was focused on signal processing, mostly neglecting the human in the loop. However, how well the user masters the BCI skill is also a key element explaining BCI robustness. Indeed, if the user is not able to produce stable and distinct EEG patterns, then no signal processing algorithm would be able to recognize them. Unfortunately, despite the importance of BCI training protocols, they have been scarcely studied so far, and used mostly unchanged for years.In this paper, we advocate that current human training approaches for spontaneous BCI are most likely inappropriate. We notably study instructional design literature in order to identify the key requirements and guidelines for a successful training procedure that promotes a good and efficient skill learning. This literature study highlights that current spontaneous BCI user training procedures satisfy very few of these requirements and hence are likely to be suboptimal. We therefore identify the flaws in BCI training protocols according to instructional design principles, at several levels: in the instructions provided to the user, in the tasks he/she has to perform, and in the feedback provided. For each level, we propose new research directions that are theoretically expected to address some of these flaws and to help users learn the BCI skill more efficiently.

  8. Current protocols in the management of oral submucous fibrosis: An update.

    Science.gov (United States)

    Arakeri, Gururaj; Rai, Kirthi Kumar; Boraks, George; Patil, Shekar Gowda; Aljabab, Abdulsalam S; Merkx, M A W; Carrozzo, Marco; Brennan, Peter A

    2017-07-01

    Oral submucous fibrosis (OSMF) is a debilitating condition of oral cavity which has significant potential for malignant transformation. In spite of over 20 years of research, the pathogenesis of the condition is still obscure and no single management modality is effective. Many OSMF treatment protocols have been proposed to alleviate the signs and symptoms of the disorder and there is overwhelming evidence that as areca nut is primary cause, stopping its use may have a considerable effect on symptoms rather than reversing pre-existing fibrosis. We present a review of the current protocols for managing OSMF. © 2017 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  9. Fiber Laser Component Testing for Space Qualification Protocol Development

    Science.gov (United States)

    Falvey, S.; Buelow, M.; Nelson, B.; Starcher, Y.; Thienel, L.; Rhodes, C.; Tull, Jackson; Drape, T.; Westfall, C.

    qualification of each of these all the way to the system level. As a result of the current effort, a validated protocol was developed for the space qualification of DPFLs, where validation via selected tests was mostly limited to the component level. It was the mission of this effort to validate selected aspects of the protocol with the limited set of tests proposed. The results of the environmental testing as well as lessons learned for space qualification of DPFL components are presented in this paper.

  10. Ocean fertilization, carbon credits and the Kyoto Protocol

    Science.gov (United States)

    Westley, M. B.; Gnanadesikan, A.

    2008-12-01

    Commercial interest in ocean fertilization as a carbon sequestration tool was excited by the December 1997 agreement of the Kyoto Protocol to the United Nations Convention on Climate Change. The Protocol commits industrialized countries to caps on net greenhouse gas emissions and allows for various flexible mechanisms to achieve these caps in the most economically efficient manner possible, including trade in carbon credits from projects that reduce emissions or enhance sinks. The carbon market was valued at 64 billion in 2007, with the bulk of the trading (50 billion) taking place in the highly regulated European Union Emission Trading Scheme, which deals primarily in emission allowances in the energy sector. A much smaller amount, worth $265 million, was traded in the largely unregulated "voluntary" market (Capoor and Ambrosi 2008). As the voluntary market grows, so do calls for its regulation, with several efforts underway to set rules and standards for the sale of voluntary carbon credits using the Kyoto Protocol as a starting point. Four US-based companies and an Australian company currently seek to develop ocean fertilization technologies for the generation of carbon credits. We review these plans through the lens of the Kyoto Protocol and its flexible mechanisms, and examine whether and how ocean fertilization could generate tradable carbon credits. We note that at present, ocean sinks are not included in the Kyoto Protocol, and that furthermore, the Kyoto Protocol only addresses sources and sinks of greenhouse gases within national boundaries, making open-ocean fertilization projects a jurisdictional challenge. We discuss the negotiating history behind the limited inclusion of land use, land use change and forestry in the Kyoto Protocol and the controversy and eventual compromise concerning methodologies for terrestrial carbon accounting. We conclude that current technologies for measuring and monitoring carbon sequestration following ocean fertilization

  11. Transcranial Alternating Current Stimulation (tACS Mechanisms and Protocols

    Directory of Open Access Journals (Sweden)

    Amir V. Tavakoli

    2017-09-01

    Full Text Available Perception, cognition and consciousness can be modulated as a function of oscillating neural activity, while ongoing neuronal dynamics are influenced by synaptic activity and membrane potential. Consequently, transcranial alternating current stimulation (tACS may be used for neurological intervention. The advantageous features of tACS include the biphasic and sinusoidal tACS currents, the ability to entrain large neuronal populations, and subtle control over somatic effects. Through neuromodulation of phasic, neural activity, tACS is a powerful tool to investigate the neural correlates of cognition. The rapid development in this area requires clarity about best practices. Here we briefly introduce tACS and review the most compelling findings in the literature to provide a starting point for using tACS. We suggest that tACS protocols be based on functional brain mechanisms and appropriate control experiments, including active sham and condition blinding.

  12. Neuroimaging in dementia and Alzheimer's disease: Current protocols and practice in the Republic of Ireland

    International Nuclear Information System (INIS)

    Kelly, I.; Butler, M.-L.; Ciblis, A.; McNulty, J.P.

    2016-01-01

    Introduction: Neuroimaging plays an essential supportive role in the diagnosis of dementia, assisting in establishing the dementia subtype(s). This has significant value in both treatment and care decisions and has important implications for prognosis. This study aims to explore the development and nature of neuroimaging protocols currently used in the assessment of dementia and Alzheimer's disease (AD). Methods: An online questionnaire was designed and distributed to lead radiography personnel working in computed tomography (CT), magnetic resonance imaging (MRI) and positron emission tomography (PET) departments (n = 94) in both hospital-based and out-patient imaging centres in the Republic of Ireland. Results: Response rates for each modality ranged from 42 to 44%. CT, MRI, and PET were used to specifically diagnose dementia or AD by 43%, 40% and 50% of responding centres respectively. Of these, dementia-specific neuroimaging protocols were utilised in 33%, 50% and 100% of CT, MRI and PET centres respectively, with the remainder using either standard or other non-specific protocols. Both radiologists and clinical specialist radiographers participated in the development of the majority of protocols. The Royal College of Radiologists (RCR) guidelines were most commonly referenced as informing protocol development, however, none of the MRI respondents were able to identify any guidelines used to inform MR protocol development. Conclusion: Currently there is no consensus in Ireland on optimal dementia/AD neuroimaging protocols, particularly for PET and MRI. Similarly the use of validated and published guidelines to inform protocols is not universal. - Highlights: • We examined the nature of neuroimaging protocols for dementia and Alzheimer's disease in Ireland. • Dementia or Alzheimer's disease-specific protocols were used by between 33 and 100% of centres depending on modality. • Stated dementia-specific protocols were identical for CT whereas

  13. Biomechanical Comparison of Three Perceived Effort Set Shots in Team Handball Players.

    Science.gov (United States)

    Plummer, Hillary A; Gascon, Sarah S; Oliver, Gretchen D

    2017-01-01

    Plummer, HA, Gascon, SS, and Oliver, GD. Biomechanical comparison of three perceived effort set shots in team handball players. J Strength Cond Res 31(1): 80-87, 2017-Shoulder injuries are prevalent in the sport of team handball; however, no guidelines currently exist in the implementation of an interval throwing protocol for players returning from an upper extremity injury. These guidelines exist for the sport of baseball, but team handball may present additional challenges due to greater ball mass that must be accounted for. The purpose of this study was to examine kinematic differences in the team handball set shot at 50, 75, and 100% effort which are common throwing intensities in throwing protocols. Eleven male team handball players (23.09 ± 3.05 years; 185.12 ± 8.33 cm; 89.65 ± 12.17 kg) volunteered. An electromagnetic tracking system was used to collect kinematic data at the pelvis, trunk, scapula, and shoulder. Kinematic differences at the shoulder, trunk, and pelvis were observed across effort levels throughout the set shot with most occurring at ball release and maximum internal rotation. Significant differences in ball speed were observed between all 3 effort level shots (p handball players are able to gauge the effort at which they shoot; however, it cannot be assumed that these speeds will be at a certain percentage of their maximum. The results of this study provide valuable evidence that can be used to prepare a team handball player to return to throwing activities.

  14. Protocol for audit of current Filipino practice in rehabilitation of stroke inpatients.

    Science.gov (United States)

    Gonzalez-Suarez, Consuelo B; Dizon, Janine Margarita R; Grimmer, Karen; Estrada, Myrna S; Liao, Lauren Anne S; Malleta, Anne-Rochelle D; Tan, Ma Elena R; Marfil, Vero; Versales, Cristina S; Suarez, Jimah L; So, Kleon C; Uyehara, Edgardo D

    2015-01-01

    Stroke is one of the leading medical conditions in the Philippines. Over 500,000 Filipinos suffer from stroke annually. Provision of evidence-based medical and rehabilitation management for stroke patients has been a challenge due to existing environmental, social, and local health system issues. Thus, existing western guidelines on stroke rehabilitation were contextualized to draft recommendations relevant to the local Philippine setting. Prior to fully implementing the guidelines, an audit of current practice needs to be undertaken, thus the purpose of this audit protocol. A clinical audit of current practices in stroke rehabilitation in the Philippines will be undertaken. A consensus list of data items to be captured was identified by the audit team during a 2-day meeting in 2012. These items, including patient demographics, type of stroke, time to referral for rehabilitation management, length of hospital stay, and other relevant descriptors of stroke management were included as part of the audit. Hospitals in the Philippines will be recruited to take part in the audit activity. Recruitment will be via the registry of the Philippine Academy of Rehabilitation Medicine, where 90% of physiatrists (medical doctors specialized in rehabilitation medicine) are active members and are affiliated with various hospitals in the Philippines. Data collectors will be identified and trained in the audit process. A pilot audit will be conducted to test the feasibility of the audit protocol, and refinements to the protocol will be undertaken as necessary. The comprehensive audit process will take place for a period of 3 months. Data will be encoded using MS Excel(®). Data will be reported as means and percentages as appropriate. Subgroup analysis will be undertaken to look into differences and variability of stroke patient descriptors and rehabilitation activities. This audit study is an ambitious project, but given the "need" to conduct the audit to identify "gaps" in current

  15. Remote Sensing and the Kyoto Protocol: A Workshop Summary

    Science.gov (United States)

    Rosenqvist, Ake; Imhoff, Marc; Milne, Anthony; Dobson, Craig

    2000-01-01

    The Kyoto Protocol to the United Nations Framework Convention on Climate Change contains quantified, legally binding commitments to limit or reduce greenhouse gas emissions to 1990 levels and allows carbon emissions to be balanced by carbon sinks represented by vegetation. The issue of using vegetation cover as an emission offset raises a debate about the adequacy of current remote sensing systems and data archives to both assess carbon stocks/sinks at 1990 levels, and monitor the current and future global status of those stocks. These concerns and the potential ratification of the Protocol among participating countries is stimulating policy debates and underscoring a need for the exchange of information between the international legal community and the remote sensing community. On October 20-22 1999, two working groups of the International Society for Photogrammetry and Remote Sensing (ISPRS) joined with the University of Michigan (Michigan, USA) to convene discussions on how remote sensing technology could contribute to the information requirements raised by implementation of, and compliance with, the Kyoto Protocol. The meeting originated as a joint effort between the Global Monitoring Working Group and the Radar Applications Working Group in Commission VII of the ISPRS, co-sponsored by the University of Michigan. Tile meeting was attended by representatives from national government agencies and international organizations and academic institutions. Some of the key themes addressed were: (1) legal aspects of transnational remote sensing in the context of the Kyoto Protocol; (2) a review of the current and future and remote sensing technologies that could be applied to the Kyoto Protocol; (3) identification of areas where additional research is needed in order to advance and align remote sensing technology with the requirements and expectations of the Protocol; and 94) the bureaucratic and research management approaches needed to align the remote sensing

  16. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  17. Current Sterilization Protocols-An Orthodontic Perspective

    Directory of Open Access Journals (Sweden)

    Abraham Vinod Korath

    2010-01-01

    Part I of this article focuses on the working principles of various methods of sterilization with an appraisalof their effects on orthodontic instruments. Additionally,contributory factors of instrument damage is enumerated to emphasis the importance of adhering to precise protocols and manufacturer recommendations as well as in alleviating some misconceptions about sterilization induced instrument damage.

  18. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  19. Overview of the current spectroscopy effort on the Livermore electron beam ion traps

    International Nuclear Information System (INIS)

    Beiersdorfer, P.; Lopez-Urrutia, J.C.; Brown, G.

    1995-01-01

    An overview is given of the current spectroscopic effort on the Livermore electron beam ion trap facilities. The effort focuses on four aspects: spectral line position, line intensity, temporal evolution, and line shape. Examples of line position measurements include studies of the K-shell transitions in heliumlike Kr 34+ and the 2s-2p intrashell transitions in lithiumlike Th 87+ and U 89+ , which provide benchmark values for testing the theory of relativistic and quantum electrodynamical contributions in high-Z ions. Examples of line intensity measurements are provided by measurements of the electron-impact excitation and dielectronic recombination cross sections of heliumlike transition-metal ions Ti 20+ through CO 25+ . A discussion of radiative lifetime measurements of metastable levels in heliumlike ions is given to illustrate the time-resolved spectroscopy techniques in the microsecond range. The authors also present a measurement of the spectral lineshape that illustrates the very low ion temperatures that can be achieved in an EBIT

  20. Protocol for audit of current Filipino practice in rehabilitation of stroke inpatients

    Directory of Open Access Journals (Sweden)

    Gonzalez-Suarez CB

    2015-03-01

    Full Text Available Consuelo B Gonzalez-Suarez,1–3 Janine Margarita R Dizon,2,3 Karen Grimmer,3 Myrna S Estrada,4 Lauren Anne S Liao,1 Anne-Rochelle D Malleta,5 Ma Elena R Tan,6 Vero Marfil,6 Cristina S Versales,1 Jimah L Suarez,5 Kleon C So,1 Edgardo D Uyehara6 1University of Santo Tomas Hospital, University of Santo Tomas, 2University of Santo Tomas, Manila, Philippines; 3International Centre for Allied Health Evidence, University of South Australia, City East Campus, North Terrace, Adelaide, SA, Australia; 4De La Salle University Hospital, Cavite, Dasmariñas, 5Philippine Orthopedic Center, 6Veterans’ Memorial Medical Center, Quezon City, Philippines Background: Stroke is one of the leading medical conditions in the Philippines. Over 500,000 Filipinos suffer from stroke annually. Provision of evidence-based medical and rehabilitation management for stroke patients has been a challenge due to existing environmental, social, and local health system issues. Thus, existing western guidelines on stroke rehabilitation were contextualized to draft recommendations relevant to the local Philippine setting. Prior to fully implementing the guidelines, an audit of current practice needs to be undertaken, thus the purpose of this audit protocol.Methods: A clinical audit of current practices in stroke rehabilitation in the Philippines will be undertaken. A consensus list of data items to be captured was identified by the audit team during a 2-day meeting in 2012. These items, including patient demographics, type of stroke, time to referral for rehabilitation management, length of hospital stay, and other relevant descriptors of stroke management were included as part of the audit. Hospitals in the Philippines will be recruited to take part in the audit activity. Recruitment will be via the registry of the Philippine Academy of Rehabilitation Medicine, where 90% of physiatrists (medical doctors specialized in rehabilitation medicine are active members and are affiliated

  1. Do we need 3D tube current modulation information for accurate organ dosimetry in chest CT? Protocols dose comparisons

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Rendon, Xochitl; Develter, Wim [KU Leuven, Department of Imaging and Pathology, Division of Medical Physics and Quality Assessment, Leuven (Belgium); Zhang, Guozhi; Coudyzer, Walter; Zanca, Federica [University Hospitals of the KU Leuven, Department of Radiology, Leuven (Belgium); Bosmans, Hilde [KU Leuven, Department of Imaging and Pathology, Division of Medical Physics and Quality Assessment, Leuven (Belgium); University Hospitals of the KU Leuven, Department of Radiology, Leuven (Belgium)

    2017-11-15

    To compare the lung and breast dose associated with three chest protocols: standard, organ-based tube current modulation (OBTCM) and fast-speed scanning; and to estimate the error associated with organ dose when modelling the longitudinal (z-) TCM versus the 3D-TCM in Monte Carlo simulations (MC) for these three protocols. Five adult and three paediatric cadavers with different BMI were scanned. The CTDI{sub vol} of the OBTCM and the fast-speed protocols were matched to the patient-specific CTDI{sub vol} of the standard protocol. Lung and breast doses were estimated using MC with both z- and 3D-TCM simulated and compared between protocols. The fast-speed scanning protocol delivered the highest doses. A slight reduction for breast dose (up to 5.1%) was observed for two of the three female cadavers with the OBTCM in comparison to the standard. For both adult and paediatric, the implementation of the z-TCM data only for organ dose estimation resulted in 10.0% accuracy for the standard and fast-speed protocols, while relative dose differences were up to 15.3% for the OBTCM protocol. At identical CTDI{sub vol} values, the standard protocol delivered the lowest overall doses. Only for the OBTCM protocol is the 3D-TCM needed if an accurate (<10.0%) organ dosimetry is desired. (orig.)

  2. Quality Assurance Protocol for AFCI Advanced Structural Materials Testing

    Energy Technology Data Exchange (ETDEWEB)

    Busby, Jeremy T [ORNL

    2009-05-01

    The objective of this letter is to inform you of recent progress on the development of advanced structural materials in support of advanced fast reactors and AFCI. As you know, the alloy development effort has been initiated in recent months with the procurement of adequate quantities of the NF616 and HT-UPS alloys. As the test alloys become available in the coming days, mechanical testing, evaluation of optimizing treatments, and screening of environmental effects will be possible at a larger scale. It is therefore important to establish proper quality assurance protocols for this testing effort in a timely manner to ensure high technical quality throughout testing. A properly implemented quality assurance effort will also enable preliminary data taken in this effort to be qualified as NQA-1 during any subsequent licensing discussions for an advanced design or actual prototype. The objective of this report is to describe the quality assurance protocols that will be used for this effort. An essential first step in evaluating quality protocols is assessing the end use of the data. Currently, the advanced structural materials effort is part of a long-range, basic research and development effort and not, as yet, involved in licensing discussions for a specific reactor design. After consultation with Mark Vance (an ORNL QA expert) and based on the recently-issued AFCI QA requirements, the application of NQA-1 quality requirements will follow the guidance provided in Part IV, Subpart 4.2 of the NQA-1 standard (Guidance on Graded Application of QA for Nuclear-Related Research and Development). This guidance mandates the application of sound scientific methodology and a robust peer review process in all phases, allowing for the data to be qualified for use even if the programmatic mission changes to include licensing discussions of a specific design or prototype. ORNL has previously implemented a QA program dedicated to GNEP activities and based on an appropriately graded

  3. Quality Assurance Protocol for AFCI Advanced Structural Materials Testing

    International Nuclear Information System (INIS)

    Busby, Jeremy T.

    2009-01-01

    The objective of this letter is to inform you of recent progress on the development of advanced structural materials in support of advanced fast reactors and AFCI. As you know, the alloy development effort has been initiated in recent months with the procurement of adequate quantities of the NF616 and HT-UPS alloys. As the test alloys become available in the coming days, mechanical testing, evaluation of optimizing treatments, and screening of environmental effects will be possible at a larger scale. It is therefore important to establish proper quality assurance protocols for this testing effort in a timely manner to ensure high technical quality throughout testing. A properly implemented quality assurance effort will also enable preliminary data taken in this effort to be qualified as NQA-1 during any subsequent licensing discussions for an advanced design or actual prototype. The objective of this report is to describe the quality assurance protocols that will be used for this effort. An essential first step in evaluating quality protocols is assessing the end use of the data. Currently, the advanced structural materials effort is part of a long-range, basic research and development effort and not, as yet, involved in licensing discussions for a specific reactor design. After consultation with Mark Vance (an ORNL QA expert) and based on the recently-issued AFCI QA requirements, the application of NQA-1 quality requirements will follow the guidance provided in Part IV, Subpart 4.2 of the NQA-1 standard (Guidance on Graded Application of QA for Nuclear-Related Research and Development). This guidance mandates the application of sound scientific methodology and a robust peer review process in all phases, allowing for the data to be qualified for use even if the programmatic mission changes to include licensing discussions of a specific design or prototype. ORNL has previously implemented a QA program dedicated to GNEP activities and based on an appropriately graded

  4. A Protocol for the Use of Remotely-Supervised Transcranial Direct Current Stimulation (tDCS) in Multiple Sclerosis (MS).

    Science.gov (United States)

    Kasschau, Margaret; Sherman, Kathleen; Haider, Lamia; Frontario, Ariana; Shaw, Michael; Datta, Abhishek; Bikson, Marom; Charvet, Leigh

    2015-12-26

    Transcranial direct current stimulation (tDCS) is a noninvasive brain stimulation technique that uses low amplitude direct currents to alter cortical excitability. With well-established safety and tolerability, tDCS has been found to have the potential to ameliorate symptoms such as depression and pain in a range of conditions as well as to enhance outcomes of cognitive and physical training. However, effects are cumulative, requiring treatments that can span weeks or months and frequent, repeated visits to the clinic. The cost in terms of time and travel is often prohibitive for many participants, and ultimately limits real-world access. Following guidelines for remote tDCS application, we propose a protocol that would allow remote (in-home) participation that uses specially-designed devices for supervised use with materials modified for patient use, and real-time monitoring through a telemedicine video conferencing platform. We have developed structured training procedures and clear, detailed instructional materials to allow for self- or proxy-administration while supervised remotely in real-time. The protocol is designed to have a series of checkpoints, addressing attendance and tolerability of the session, to be met in order to continue to the next step. The feasibility of this protocol was then piloted for clinical use in an open label study of remotely-supervised tDCS in multiple sclerosis (MS). This protocol can be widely used for clinical study of tDCS.

  5. Analysis of 213 currently used rehabilitation protocols in foot and ankle fractures.

    Science.gov (United States)

    Pfeifer, Christian G; Grechenig, Stephan; Frankewycz, Borys; Ernstberger, Antonio; Nerlich, Michael; Krutsch, Werner

    2015-10-01

    Fractures of the ankle, hind- and midfoot are amongst the five most common fractures. Besides initial operative or non-operative treatment, rehabilitation of the patients plays a crucial role for fracture union and long term functional outcome. Limited evidence is available with regard to what a rehabilitation regimen should include and what guidelines should be in place for the initial clinical course of these patients. This study therefore investigated the current rehabilitation concepts after fractures of the ankle, hind- and midfoot. Written rehabilitation protocols provided by orthopedic and trauma surgery institutions in terms of recommendations for weight bearing, range of motion (ROM), physiotherapy and choice of orthosis were screened and analysed. All protocols for lateral ankle fractures type AO 44A1, AO 44B1 and AO 44C1, for calcaneal fractures and fractures of the metatarsal as well as other not specific were included. Descriptive analysis was carried out and statistical analysis applied where appropriate. 209 rehabilitation protocols for ankle fractures type AO 44B1 and AO 44C1, 98 for AO 44A1, 193 for metatarsal fractures, 142 for calcaneal fractures, 107 for 5(th) metatarsal base fractures and 70 for 5(th) metatarsal Jones fractures were evaluated. The mean time recommended for orthosis treatment was 6.04 (SD 0.04) weeks. While the majority of protocols showed a trend towards increased weight bearing and increased ROM over time, the best consensus was noted for weight bearing recommendations. Our study shows that there exists a huge variability in rehabilitation of fractures of the ankle-, hind- and midfoot. This may be contributed to a lack of consensus (e.g. missing publication of guidelines), individualized patient care (e.g. in fragility fractures) or lack of specialization. This study might serve as basis for prospective randomized controlled trials in order to optimize rehabilitation for these common fractures. Copyright © 2015 Elsevier Ltd

  6. Do we need 3D tube current modulation information for accurate organ dosimetry in chest CT? Protocols dose comparisons.

    Science.gov (United States)

    Lopez-Rendon, Xochitl; Zhang, Guozhi; Coudyzer, Walter; Develter, Wim; Bosmans, Hilde; Zanca, Federica

    2017-11-01

    To compare the lung and breast dose associated with three chest protocols: standard, organ-based tube current modulation (OBTCM) and fast-speed scanning; and to estimate the error associated with organ dose when modelling the longitudinal (z-) TCM versus the 3D-TCM in Monte Carlo simulations (MC) for these three protocols. Five adult and three paediatric cadavers with different BMI were scanned. The CTDI vol of the OBTCM and the fast-speed protocols were matched to the patient-specific CTDI vol of the standard protocol. Lung and breast doses were estimated using MC with both z- and 3D-TCM simulated and compared between protocols. The fast-speed scanning protocol delivered the highest doses. A slight reduction for breast dose (up to 5.1%) was observed for two of the three female cadavers with the OBTCM in comparison to the standard. For both adult and paediatric, the implementation of the z-TCM data only for organ dose estimation resulted in 10.0% accuracy for the standard and fast-speed protocols, while relative dose differences were up to 15.3% for the OBTCM protocol. At identical CTDI vol values, the standard protocol delivered the lowest overall doses. Only for the OBTCM protocol is the 3D-TCM needed if an accurate (<10.0%) organ dosimetry is desired. • The z-TCM information is sufficient for accurate dosimetry for standard protocols. • The z-TCM information is sufficient for accurate dosimetry for fast-speed scanning protocols. • For organ-based TCM schemes, the 3D-TCM information is necessary for accurate dosimetry. • At identical CTDI vol , the fast-speed scanning protocol delivered the highest doses. • Lung dose was higher in XCare than standard protocol at identical CTDI vol .

  7. Preoperative magnetic resonance imaging protocol for endoscopic cranial base image-guided surgery.

    Science.gov (United States)

    Grindle, Christopher R; Curry, Joseph M; Kang, Melissa D; Evans, James J; Rosen, Marc R

    2011-01-01

    Despite the increasing utilization of image-guided surgery, no radiology protocols for obtaining magnetic resonance (MR) imaging of adequate quality are available in the current literature. At our institution, more than 300 endonasal cranial base procedures including pituitary, extended pituitary, and other anterior skullbase procedures have been performed in the past 3 years. To facilitate and optimize preoperative evaluation and assessment, there was a need to develop a magnetic resonance protocol. Retrospective Technical Assessment was performed. Through a collaborative effort between the otolaryngology, neurosurgery, and neuroradiology departments at our institution, a skull base MR image-guided (IGS) protocol was developed with several ends in mind. First, it was necessary to generate diagnostic images useful for the more frequently seen pathologies to improve work flow and limit the expense and inefficiency of case specific MR studies. Second, it was necessary to generate sequences useful for IGS, preferably using sequences that best highlight that lesion. Currently, at our institution, all MR images used for IGS are obtained using this protocol as part of preoperative planning. The protocol that has been developed allows for thin cut precontrast and postcontrast axial cuts that can be used to plan intraoperative image guidance. It also obtains a thin cut T2 axial series that can be compiled separately for intraoperative imaging, or may be fused with computed tomographic images for combined modality. The outlined protocol obtains image sequences effective for diagnostic and operative purposes for image-guided surgery using both T1 and T2 sequences. Copyright © 2011 Elsevier Inc. All rights reserved.

  8. Enteric disease surveillance under the AFHSC-GEIS: Current efforts, landscape analysis and vision forward

    Directory of Open Access Journals (Sweden)

    Kasper Matthew R

    2011-03-01

    Full Text Available Abstract The mission of the Armed Forces Health Surveillance Center, Division of Global Emerging Infections Surveillance and Response System (AFHSC-GEIS is to support global public health and to counter infectious disease threats to the United States Armed Forces, including newly identified agents or those increasing in incidence. Enteric diseases are a growing threat to U.S. forces, which must be ready to deploy to austere environments where the risk of exposure to enteropathogens may be significant and where routine prevention efforts may be impractical. In this report, the authors review the recent activities of AFHSC-GEIS partner laboratories in regards to enteric disease surveillance, prevention and response. Each partner identified recent accomplishments, including support for regional networks. AFHSC/GEIS partners also completed a Strengths, Weaknesses, Opportunities and Threats (SWOT survey as part of a landscape analysis of global enteric surveillance efforts. The current strengths of this network include excellent laboratory infrastructure, equipment and personnel that provide the opportunity for high-quality epidemiological studies and test platforms for point-of-care diagnostics. Weaknesses include inconsistent guidance and a splintered reporting system that hampers the comparison of data across regions or longitudinally. The newly chartered Enterics Surveillance Steering Committee (ESSC is intended to provide clear mission guidance, a structured project review process, and central data management and analysis in support of rationally directed enteric disease surveillance efforts.

  9. Current research efforts of EP study in Korea

    International Nuclear Information System (INIS)

    Ryu, C.M.

    2013-01-01

    After the successful demonstration of H mode on KSTAR, the problem of fast-ion driven MHD modes such as Alfven eigenmodes (AEs) and the reverse effects on fast ions of MHD modes is under study in KSTAR. In this paper, I will briefly describe some recent efforts of KSTAR on energetic particle physics study. (J.P.N.)

  10. Marketing Strategy Telkom Internet Protocol Televison (IPTV) to Increase Subscribers Number for Area Operation Bandung

    OpenAIRE

    Alby, Pradipta Wismaya; Purwanegara, Mustika Sufiati; Desiana, Krisnati

    2012-01-01

    Business transformation transfigured fromvoice communication to multimedia (Voice, Data andVideo) is not inevitable in the current telecommunicationsindustry. Telkom develops IPTV (Internet ProtocolTelevision) as an effort to revitalize the Fixed Wirelinebusiness in the middle of the changing landscape of thetelecommunications industry. This IPTV service utilizesthe existing network of fixed wire telephone network(Fixed Wireline). On this technology, one cable can be usedfor various data tran...

  11. RCRA groundwater data analysis protocol for the Hanford Site, Washington

    International Nuclear Information System (INIS)

    Chou, C.J.; Jackson, R.L.

    1992-04-01

    The Resource Conservation and Recovery Act of 1976 (RCRA) groundwater monitoring program currently involves site-specific monitoring of 20 facilities on the Hanford Site in southeastern Washington. The RCRA groundwater monitoring program has collected abundant data on groundwater quality. These data are used to assess the impact of a facility on groundwater quality or whether remediation efforts under RCRA corrective action programs are effective. Both evaluations rely on statistical analysis of groundwater monitoring data. The need for information on groundwater quality by regulators and environmental managers makes statistical analysis of monitoring data an important part of RCRA groundwater monitoring programs. The complexity of groundwater monitoring programs and variabilities (spatial, temporal, and analytical) exhibited in groundwater quality variables indicate the need for a data analysis protocol to guide statistical analysis. A data analysis protocol was developed from the perspective of addressing regulatory requirements, data quality, and management information needs. This data analysis protocol contains four elements: data handling methods; graphical evaluation techniques; statistical tests for trend, central tendency, and excursion analysis; and reporting procedures for presenting results to users

  12. A Survey on Application Layer Protocols for the Internet of Things

    OpenAIRE

    Karagiannis, Vasileios; Chatzimisios, Periklis; Vázquez-Gallego, Francisco; Alonso-Zárate, Jesús

    2015-01-01

    It has been more than fifteen years since the term Internet of Things (IoT) was introduced to the public. However, despite the efforts of research groups and innovative corporations, still today it is not possible to say that IoT is upon us. This is mainly due to the fact that a unified IoT architecture has not been yet clearly defined and there is no common agreement in defining protocols and standards for all IoT parts. The framework that current IoT platforms use consists mostly in technol...

  13. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  14. Pediatric Renal Transplantation: Focus on Current Transition Care and Proposal of the "RISE to Transition" Protocol.

    Science.gov (United States)

    Raina, Rupesh; Wang, Joseph; Krishnappa, Vinod; Ferris, Maria

    2018-01-16

    The transition from pediatric to adult medical services is an important time in the life of an adolescent or young adult with a renal transplant. Failure of proper transition can lead to medical non-adherence and subsequent loss of graft and/or return to dialysis. The aim of this study was to conduct a systematic review and survey to assess the challenges and existing practices in transition of renal transplant recipient children to adult services, and to develop a transition protocol. We conducted a literature review and performed a survey of pediatric nephrologists across the United States to examine the current state of transition care. A structured transition protocol was developed based on these results. Our literature review revealed that a transition program has a positive impact on decline in renal function and acute rejection episodes, and may improve long-term graft outcomes in pediatric kidney transplant patients. With a response rate of 40% (60/150) from nephrologists in 56% (49/87) of centers, our survey shows inconsistent use of validated tools despite their availability, inefficient communication between teams, and lack of use of dedicated clinics. To address these issues, we developed the "RISE to Transition" protocol, which relies on 4 competency areas: Recognition, Insight, Self-reliance, and Establishment of healthy habits. The transition program decreases acute graft rejection episodes, and the main challenges in transition care are the communication gap between health care providers and inconsistent use of transition tools. Our RISE to transition protocol incorporates transition tools, defines personnel, and aims to improve communication between teams.

  15. Individual variation in baseline and stress-induced corticosterone and prolactin levels predicts parental effort by nesting mourning doves

    Science.gov (United States)

    Miller, David A.; Vleck, Carol M.; Otis, David L.

    2009-01-01

    Endocrine systems have an important mechanistic role in structuring life-history trade-offs. During breeding, individual variation in prolactin (PRL) and corticosterone (CORT) levels affects behavioral and physiological processes that drive trade-offs between reproduction and self-maintenance. We examined patterns in baseline (BL) and stress induced (SI; level following a standard capture-restraint protocol) levels of PRL and CORT for breeding mourning doves (Zenaida macroura). We determined whether the relationship of adult condition and parental effort to hormone levels in wild birds was consistent with life-history predictions. Both BL PRL and BL CORT level in adults were positively related to nestling weight at early nestling ages, consistent with the prediction of a positive relationship of hormone levels to current parental effort of adults and associated increased energy demand. Results are consistent with the two hormones acting together at baseline levels to limit negative effects of CORT on reproduction while maintaining beneficial effects such as increased foraging for nestling feeding. Our data did not support predictions that SI responses would vary in response to nestling or adult condition. The magnitude of CORT response in the parents to our capture-restraint protocol was negatively correlated with subsequent parental effort. Average nestling weights for adults with the highest SI CORT response were on average 10–15% lighter than expected for their age in follow-up visits after the stress event. Our results demonstrated a relationship between individual hormone levels and within population variation in parental effort and suggested that hormonal control plays an important role in structuring reproductive decisions for mourning doves.

  16. Comparison of test protocols for standard room/corner tests

    Science.gov (United States)

    R. H. White; M. A. Dietenberger; H. Tran; O. Grexa; L. Richardson; K. Sumathipala; M. Janssens

    1998-01-01

    As part of international efforts to evaluate alternative reaction-to-fire tests, several series of room/comer tests have been conducted. This paper reviews the overall results of related projects in which different test protocols for standard room/corner tests were used. Differences in the test protocols involved two options for the ignition burner scenario and whether...

  17. Deterministic secure communication protocol without using entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

  18. Novel protocol for persister cells isolation.

    Directory of Open Access Journals (Sweden)

    Silvia J Cañas-Duarte

    Full Text Available Bacterial persistence, where a fraction of a population presents a transient resistance to bactericidal substances, has great medical importance due to its relation with the appearance of antibiotic resistances and untreatable bacterial chronic infections. The mechanisms behind this phenomenon remain largely unknown in spite of recent advances, in great part because of the difficulty in isolating the very small fraction of the population that is in this state at any given time. Current protocols for persister isolation have resulted in possible biases because of the induction of this state by the protocol itself. Here we present a novel protocol that allows rapid isolation of persister cells both from exponential and stationary phase. Moreover, it is capable of differentiating between type I and type II persister cells, which should allow the field to move beyond its current state of studying only one type. While this protocol prompts a revision of many of the current results, it should greatly facilitate further advances in the field.

  19. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  20. Using semantics for representing experimental protocols.

    Science.gov (United States)

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  1. Design and implementation of an intrusion detection system based on IPv6 protocol

    Science.gov (United States)

    Liu, Bin; Li, Zhitang; Li, Yao; Li, Zhanchun

    2005-11-01

    Network intrusion detection systems (NIDS) are important parts of network security architecture. Although many NIDS have been proposed, there is little effort to expand the current set of NIDS to support IPv6 protocol. This paper presents the design and implementation of a Network-based Intrusion Detection System that supports both IPv6 protocol and IPv4 protocol. It characters rules based logging to perform content pattern matching and detect a variety of attacks and probes from IPv4 and IPv6.There are four primary subsystems to make it up: packet capture, packet decoder, detection engine, and logging and alerting subsystem. A new approach to packet capture that combined NAPI with MMAP is proposed in this paper. The test results show that the efficiency of packet capture can be improved significantly by this method. Several new attack tools for IPv6 have been developed for intrusion detection evaluation. Test shows that more than 20 kinds of IPv6 attacks can be detected by this system and it also has a good performance under heavy traffic load.

  2. Test Protocols for Advanced Inverter Interoperability Functions – Main Document

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, Jay Dean [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gonzalez, Sigifredo [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ralph, Mark E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ellis, Abraham [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Broderick, Robert Joseph [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2013-11-01

    Distributed energy resources (DER) such as photovoltaic (PV) systems, when deployed in a large scale, are capable of influencing significantly the operation of power systems. Looking to the future, stakeholders are working on standards to make it possible to manage the potentially complex interactions between DER and the power system. In 2009, the Electric Power Research Institute (EPRI), Sandia National Laboratories (SNL) with the U.S. Department of Energy (DOE), and the Solar Electric Power Association (SEPA) initiated a large industry collaborative to identify and standardize definitions for a set of DER grid support functions. While the initial effort concentrated on grid-tied PV inverters and energy storage systems, the concepts have applicability to all DER. A partial product of this on-going effort is a reference definitions document (IEC TR 61850-90-7, Object models for power converters in distributed energy resources (DER) systems) that has become a basis for expansion of related International Electrotechnical Commission (IEC) standards, and is supported by US National Institute of Standards and Technology (NIST) Smart Grid Interoperability Panel (SGIP). Some industry-led organizations advancing communications protocols have also embraced this work. As standards continue to evolve, it is necessary to develop test protocols to independently verify that the inverters are properly executing the advanced functions. Interoperability is assured by establishing common definitions for the functions and a method to test compliance with operational requirements. This document describes test protocols developed by SNL to evaluate the electrical performance and operational capabilities of PV inverters and energy storage, as described in IEC TR 61850-90-7. While many of these functions are not currently required by existing grid codes or may not be widely available commercially, the industry is rapidly moving in that direction. Interoperability issues are already

  3. University of Washington/ Northwest National Marine Renewable Energy Center Tidal Current Technology Test Protocol, Instrumentation, Design Code, and Oceanographic Modeling Collaboration: Cooperative Research and Development Final Report, CRADA Number CRD-11-452

    Energy Technology Data Exchange (ETDEWEB)

    Driscoll, Frederick R. [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2016-11-01

    The University of Washington (UW) - Northwest National Marine Renewable Energy Center (UW-NNMREC) and the National Renewable Energy Laboratory (NREL) will collaborate to advance research and development (R&D) of Marine Hydrokinetic (MHK) renewable energy technology, specifically renewable energy captured from ocean tidal currents. UW-NNMREC is endeavoring to establish infrastructure, capabilities and tools to support in-water testing of marine energy technology. NREL is leveraging its experience and capabilities in field testing of wind systems to develop protocols and instrumentation to advance field testing of MHK systems. Under this work, UW-NNMREC and NREL will work together to develop a common instrumentation system and testing methodologies, standards and protocols. UW-NNMREC is also establishing simulation capabilities for MHK turbine and turbine arrays. NREL has extensive experience in wind turbine array modeling and is developing several computer based numerical simulation capabilities for MHK systems. Under this CRADA, UW-NNMREC and NREL will work together to augment single device and array modeling codes. As part of this effort UW NNMREC will also work with NREL to run simulations on NREL's high performance computer system.

  4. Schizophrenia research participants' responses to protocol safeguards: recruitment, consent, and debriefing.

    Science.gov (United States)

    Roberts, Laura Weiss; Warner, Teddy D; Anderson, Charles T; Smithpeter, Megan V; Rogers, Melinda K

    2004-04-01

    To examine the perspectives and preferences regarding ethically important aspects of recruitment, consent, and debriefing of people with schizophrenia who volunteered for research protocols. A structured interview to assess research-related views of people with schizophrenia was developed and piloted. Data collection occurred at three sites. For this analysis, we examined the subset of responses from schizophrenia patients currently enrolled in a protocol. Data from 28 schizophrenia research volunteers were analyzed. Of these, 22 were men and 11 were voluntary inpatients. Most (n=23) recalled speaking with someone before enrolling in the protocol, and most (n=26) reported trusting the person who told them about it. Participants reported a moderate understanding of their protocols. All but one person (n=27) remembered signing a consent form. Twenty-one volunteers indicated that consent forms are meant to help both the patient and the researcher. Most (n=23) reported making the enrollment decision alone, with 22 making this decision prior to reviewing the consent form. The decision was described as relatively easy. Respondents felt some pressure to enroll, with women experiencing more pressure. Debriefing practices were strongly endorsed by participants. All 28 of the volunteers wished to be informed if a health problem (i.e., "something wrong") was discovered during the protocol. The persons living with schizophrenia who were interviewed for this project expressed interesting perspectives and preferences regarding ethically important aspects of recruitment, consent, and debriefing in clinical research that may help guide efforts to make research processes more attuned to participants and merit further inquiry.

  5. A comparison of the additional protocols of the five nuclear weapon states and the ensuing safeguards benefits to international nonproliferation efforts

    Energy Technology Data Exchange (ETDEWEB)

    Uribe, Eva C [Los Alamos National Laboratory; Sandoval, M Analisa [Los Alamos National Laboratory; Sandoval, Marisa N [Los Alamos National Laboratory; Boyer, Brian D [Los Alamos National Laboratory; Leitch, Rosalyn M [Los Alamos National Laboratory

    2009-01-01

    With the 6 January 2009 entry into force of the Additional Protocol by the United States of America, all five declared Nuclear Weapon States that are part of the Nonproliferation Treaty have signed, ratified, and put into force the Additional Protocol. This paper makes a comparison of the strengths and weaknesses of the five Additional Protocols in force by the five Nuclear Weapon States with respect to the benefits to international nonproliferation aims. This paper also documents the added safeguards burden to the five declared Nuclear Weapon States that these Additional Protocols put on the states with respect to access to their civilian nuclear programs and the hosting of complementary access activities as part of the Additional Protocol.

  6. The UMTS-AKA Protocols for Intelligent Transportation Systems

    Directory of Open Access Journals (Sweden)

    Hwang Min-Shiang

    2009-01-01

    Full Text Available The integration of communication protocols into transport systems is a much adored research area today. Much of seminal work has been reported on the topic of intelligent transportation systems (ITS in the recent years. Many advanced techniques have been garnered to improve online communication and to promote the security, comfort, and efficiency of ITS. Of primary importance to the effective application of ITS is the communication protocol used. A fascinating development is that the yesterday's Global System for Mobile Communication protocol is being replaced by the Universal Mobile Telecommunication System protocol, which is the third-generation mobile technology. This article attempts to identify a suitable communication system for ITS applications. It is impracticable to substantially modify the original UMTS-IMS-AKA protocol which is in practice because it can disturb the operation of the current system, and thus we explore other possibilities through this research. We investigate a novel protocol to make the original UMTS-IMS-AKA protocol compliant with ITS as well as adaptable into the current UMTS protocol.

  7. Verification of communication protocols in web services model-checking service compositions

    CERN Document Server

    Tari, Zahir; Mukherjee, Anshuman

    2014-01-01

    Gathers recent advancements in the field of self-organizing wireless sensor networks and provides readers with the essential, state-of-the-art information about sensor networking. In the near future, wireless sensor networks will become an integral part of our day-to-day life. To solve different sensor networking related issues, researchers have put a great deal of effort into coming up with innovative ideas. Verification of Communication Protocols in Web Services: Model-Checking Service Compositions gathers recent advancements in the field of self-organizing wireless sensor networks and provides readers with integral information about sensor networking. It introduces current technological trends, particularly in node organization, and provides implementation details of each networking type to help readers set up sensor networks in their related job fields. In addition, it identifies the limitations of current technologies, as well as future research directions.

  8. Suicide Risk Protocols: Addressing the Needs of High Risk Youths Identified through Suicide Prevention Efforts and in Clinical Settings

    Science.gov (United States)

    Heilbron, Nicole; Goldston, David; Walrath, Christine; Rodi, Michael; McKeon, Richard

    2013-01-01

    Several agencies have emphasized the importance of establishing clear protocols or procedures to address the needs of youths who are identified as suicidal through suicide prevention programs or in emergency department settings. What constitutes optimal guidelines for developing and implementing such protocols, however, is unclear. At the request…

  9. MR efficiency using automated MRI-desktop eProtocol

    Science.gov (United States)

    Gao, Fei; Xu, Yanzhe; Panda, Anshuman; Zhang, Min; Hanson, James; Su, Congzhe; Wu, Teresa; Pavlicek, William; James, Judy R.

    2017-03-01

    MRI protocols are instruction sheets that radiology technologists use in routine clinical practice for guidance (e.g., slice position, acquisition parameters etc.). In Mayo Clinic Arizona (MCA), there are over 900 MR protocols (ranging across neuro, body, cardiac, breast etc.) which makes maintaining and updating the protocol instructions a labor intensive effort. The task is even more challenging given different vendors (Siemens, GE etc.). This is a universal problem faced by all the hospitals and/or medical research institutions. To increase the efficiency of the MR practice, we designed and implemented a web-based platform (eProtocol) to automate the management of MRI protocols. It is built upon a database that automatically extracts protocol information from DICOM compliant images and provides a user-friendly interface to the technologists to create, edit and update the protocols. Advanced operations such as protocol migrations from scanner to scanner and capability to upload Multimedia content were also implemented. To the best of our knowledge, eProtocol is the first MR protocol automated management tool used clinically. It is expected that this platform will significantly improve the radiology operations efficiency including better image quality and exam consistency, fewer repeat examinations and less acquisition errors. These protocols instructions will be readily available to the technologists during scans. In addition, this web-based platform can be extended to other imaging modalities such as CT, Mammography, and Interventional Radiology and different vendors for imaging protocol management.

  10. Prevention of Fetal Alcohol Spectrum Disorder: Current Canadian Efforts and Analysis of Gaps

    Directory of Open Access Journals (Sweden)

    Nancy Poole

    2016-01-01

    Full Text Available Effective prevention of risky alcohol use in pregnancy involves much more than providing information about the risk of potential birth defects and developmental disabilities in children. To categorize the breadth of possible initiatives, Canadian experts have identified a four-part framework for fetal alcohol spectrum disorder (FASD prevention: Level 1, public awareness and broad health promotion; Level 2, conversations about alcohol with women of childbearing age and their partners; Level 3, specialized support for pregnant women; and Level 4, postpartum support for new mothers. In order to describe the level of services across Canada, 50 Canadian service providers, civil servants, and researchers working in the area of FASD prevention were involved in an online Delphi survey process to create a snapshot of current FASD prevention efforts, identify gaps, and provide ideas on how to close these gaps to improve FASD prevention. Promising Canadian practices and key areas for future action are described. Overall, Canadian FASD prevention programming reflects evidence-based practices; however, there are many opportunities to improve scope and availability of these initiatives.

  11. An electronic specimen collection protocol schema (eSCPS). Document architecture for specimen management and the exchange of specimen collection protocols between biobanking information systems.

    Science.gov (United States)

    Eminaga, O; Semjonow, A; Oezguer, E; Herden, J; Akbarov, I; Tok, A; Engelmann, U; Wille, S

    2014-01-01

    The integrity of collection protocols in biobanking is essential for a high-quality sample preparation process. However, there is not currently a well-defined universal method for integrating collection protocols in the biobanking information system (BIMS). Therefore, an electronic schema of the collection protocol that is based on Extensible Markup Language (XML) is required to maintain the integrity and enable the exchange of collection protocols. The development and implementation of an electronic specimen collection protocol schema (eSCPS) was performed at two institutions (Muenster and Cologne) in three stages. First, we analyzed the infrastructure that was already established at both the biorepository and the hospital information systems of these institutions and determined the requirements for the sufficient preparation of specimens and documentation. Second, we designed an eSCPS according to these requirements. Finally, a prospective study was conducted to implement and evaluate the novel schema in the current BIMS. We designed an eSCPS that provides all of the relevant information about collection protocols. Ten electronic collection protocols were generated using the supplementary Protocol Editor tool, and these protocols were successfully implemented in the existing BIMS. Moreover, an electronic list of collection protocols for the current studies being performed at each institution was included, new collection protocols were added, and the existing protocols were redesigned to be modifiable. The documentation time was significantly reduced after implementing the eSCPS (5 ± 2 min vs. 7 ± 3 min; p = 0.0002). The eSCPS improves the integrity and facilitates the exchange of specimen collection protocols in the existing open-source BIMS.

  12. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  13. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  14. An investigation into current protocols and radiographer opinions on contrast extravasation in Irish CT departments

    International Nuclear Information System (INIS)

    Cleary, N.; McNulty, J.P.; Foley, S.J.; Kelly, E.

    2017-01-01

    Background: Iodinated contrast extravasation is a serious complication associated with intravenous administration in radiology. Departmental protocols and the radiographer's approach on both prevention techniques and treatment will affect the prevalence of extravasation, and the eventual outcome for the patient when it does occur. Aims: To examine contrast extravasation protocols in place in Irish CT departments for alignment with European Society of Urogenital Radiology (ESUR) Guidelines (2014); to establish radiographer's opinions on contrast extravasation; and to examine radiographer adherence to protocols. Methods: Contrast extravasation protocols from a purposively selected sample of CT departments across Ireland (n = 6) were compared to ESUR guidelines, followed by an online survey of CT radiographers practicing in the participating centres. Results: All participating CT departments (n = 5) had written protocols in place. High risk patients, such as elderly or unconscious, were identified in most protocols, however, children were mentioned in just one protocol and obese patients were not specified in any. The response rate of CT radiographers was 23% (n = 24). 58% (n = 14) of respondents indicated that contrast extravasation was more likely during CTA examinations. While high levels of confidence in managing extravasation were reported, suggested treatment approaches, and confidence in same, was more variable. Clinical workload in CT departments was also identified as a factor impacting on patient care and management. Conclusion: While contrast extravasation protocols were generally in line with ESUR Guidelines, high risk patients may not be getting sufficient attention. More radiographer awareness of patient monitoring needs, particularly in busy departments with a heavy workload may also reduce extravasation risk, and improve management of same. - Highlights: • Irish protocols on contrast extravasation are generally in line with

  15. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  16. The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol

    OpenAIRE

    Seema Mehla; Bhawna Gupta

    2010-01-01

    the Extensible Authentication Protocol (EAP) is a generic framework supporting multiple types of authentication methods. In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP exchange with another authenticator. The EAP reauthentication Protocol provides a consistent, methodindependentand low-latency re-authentication. It is extension to current EAP mechanism to support intradomain handoff authentication. This paper analyzed the performance of the EAP r...

  17. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  18. Current status of the MPEG-4 standardization effort

    Science.gov (United States)

    Anastassiou, Dimitris

    1994-09-01

    The Moving Pictures Experts Group (MPEG) of the International Standardization Organization has initiated a standardization effort, known as MPEG-4, addressing generic audiovisual coding at very low bit-rates (up to 64 kbits/s) with applications in videotelephony, mobile audiovisual communications, video database retrieval, computer games, video over Internet, remote sensing, etc. This paper gives a survey of the status of MPEG-4, including its planned schedule, and initial ideas about requirements and applications. A significant part of this paper is summarizing an incomplete draft version of a `requirements document' which presents specifications of desirable features on the video, audio, and system level of the forthcoming standard. Very low bit-rate coding algorithms are not described, because no endorsement of any particular algorithm, or class of algorithms, has yet been made by MPEG-4, and several seminars held concurrently with MPEG-4 meetings have not so far provided evidence that such high performance coding schemes are achievable.

  19. Transcranial direct current stimulation for depression in Alzheimer's disease: study protocol for a randomized controlled trial.

    Science.gov (United States)

    Narita, Zui; Yokoi, Yuma

    2017-06-19

    Patients with Alzheimer's disease frequently elicit neuropsychiatric symptoms as well as cognitive deficits. Above all, depression is one of the most common neuropsychiatric symptoms in Alzheimer's disease but antidepressant drugs have not shown significant beneficial effects on it. Moreover, electroconvulsive therapy has not ensured its safety for potential severe adverse events although it does show beneficial clinical effect. Transcranial direct current stimulation can be the safe alternative of neuromodulation, which applies weak direct electrical current to the brain. Although transcranial direct current stimulation has plausible evidence for its effect on depression in young adult patients, no study has explored it in older subjects with depression in Alzheimer's disease. Therefore, we present a study protocol designed to evaluate the safety and clinical effect of transcranial direct current stimulation on depression in Alzheimer's disease in subjects aged over 65 years. This is a two-arm, parallel-design, randomized controlled trial, in which patients and assessors will be blinded. Subjects will be randomized to either an active or a sham transcranial direct current stimulation group. Participants in both groups will be evaluated at baseline, immediately, and 2 weeks after the intervention. This study investigates the safety and effect of transcranial direct current stimulation that may bring a significant impact on both depression and cognition in patients with Alzheimer's disease, and may be useful to enhance their quality of life. ClinicalTrials.gov, NCT02351388 . Registered on 27 January 2015. Last updated on 30 May 2016.

  20. A Serviced-based Approach to Connect Seismological Infrastructures: Current Efforts at the IRIS DMC

    Science.gov (United States)

    Ahern, Tim; Trabant, Chad

    2014-05-01

    As part of the COOPEUS initiative to build infrastructure that connects European and US research infrastructures, IRIS has advocated for the development of Federated services based upon internationally recognized standards using web services. By deploying International Federation of Digital Seismograph Networks (FDSN) endorsed web services at multiple data centers in the US and Europe, we have shown that integration within seismological domain can be realized. By deploying identical methods to invoke the web services at multiple centers this approach can significantly ease the methods through which a scientist can access seismic data (time series, metadata, and earthquake catalogs) from distributed federated centers. IRIS has developed an IRIS federator that helps a user identify where seismic data from global seismic networks can be accessed. The web services based federator can build the appropriate URLs and return them to client software running on the scientists own computer. These URLs are then used to directly pull data from the distributed center in a very peer-based fashion. IRIS is also involved in deploying web services across horizontal domains. As part of the US National Science Foundation's (NSF) EarthCube effort, an IRIS led EarthCube Building Block's project is underway. When completed this project will aid in the discovery, access, and usability of data across multiple geoscienece domains. This presentation will summarize current IRIS efforts in building vertical integration infrastructure within seismology working closely with 5 centers in Europe and 2 centers in the US, as well as how we are taking first steps toward horizontal integration of data from 14 different domains in the US, in Europe, and around the world.

  1. Efforts Aimed To Reduce Attrition in Antimalarial Drug Discovery: A Systematic Evaluation of the Current Antimalarial Targets Portfolio.

    Science.gov (United States)

    Chaparro, María Jesús; Calderón, Félix; Castañeda, Pablo; Fernández-Alvaro, Elena; Gabarró, Raquel; Gamo, Francisco Javier; Gómez-Lorenzo, María G; Martín, Julio; Fernández, Esther

    2018-04-13

    Malaria remains a major global health problem. In 2015 alone, more than 200 million cases of malaria were reported, and more than 400,000 deaths occurred. Since 2010, emerging resistance to current front-line ACTs (artemisinin combination therapies) has been detected in endemic countries. Therefore, there is an urgency for new therapies based on novel modes of action, able to relieve symptoms as fast as the artemisinins and/or block malaria transmission. During the past few years, the antimalarial community has focused their efforts on phenotypic screening as a pragmatic approach to identify new hits. Optimization efforts on several chemical series have been successful, and clinical candidates have been identified. In addition, recent advances in genetics and proteomics have led to the target deconvolution of phenotypic clinical candidates. New mechanisms of action will also be critical to overcome resistance and reduce attrition. Therefore, a complementary strategy focused on identifying well-validated targets to start hit identification programs is essential to reinforce the clinical pipeline. Leveraging published data, we have assessed the status quo of the current antimalarial target portfolio with a focus on the blood stage clinical disease. From an extensive list of reported Plasmodium targets, we have defined triage criteria. These criteria consider genetic, pharmacological, and chemical validation, as well as tractability/doability, and safety implications. These criteria have provided a quantitative score that has led us to prioritize those targets with the highest probability to deliver successful and differentiated new drugs.

  2. Glass Property Models and Constraints for Estimating the Glass to be Produced at Hanford by Implementing Current Advanced Glass Formulation Efforts

    Energy Technology Data Exchange (ETDEWEB)

    Vienna, John D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Kim, Dong-Sang [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Skorski, Daniel C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Matyas, Josef [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2013-07-01

    Recent glass formulation and melter testing data have suggested that significant increases in waste loading in HLW and LAW glasses are possible over current system planning estimates. The data (although limited in some cases) were evaluated to determine a set of constraints and models that could be used to estimate the maximum loading of specific waste compositions in glass. It is recommended that these models and constraints be used to estimate the likely HLW and LAW glass volumes that would result if the current glass formulation studies are successfully completed. It is recognized that some of the models are preliminary in nature and will change in the coming years. Plus the models do not currently address the prediction uncertainties that would be needed before they could be used in plant operations. The models and constraints are only meant to give an indication of rough glass volumes and are not intended to be used in plant operation or waste form qualification activities. A current research program is in place to develop the data, models, and uncertainty descriptions for that purpose. A fundamental tenet underlying the research reported in this document is to try to be less conservative than previous studies when developing constraints for estimating the glass to be produced by implementing current advanced glass formulation efforts. The less conservative approach documented herein should allow for the estimate of glass masses that may be realized if the current efforts in advanced glass formulations are completed over the coming years and are as successful as early indications suggest they may be. Because of this approach there is an unquantifiable uncertainty in the ultimate glass volume projections due to model prediction uncertainties that has to be considered along with other system uncertainties such as waste compositions and amounts to be immobilized, split factors between LAW and HLW, etc.

  3. An one-time-pad key communication protocol with entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We present an one-time-pad key communication protocol that allows secure direct communication with entanglement. Alice can send message to Bob in a deterministic manner by using local measurements and public communication. The theoretical efficiency of this protocol is double compared with BB84 protocol. We show this protocol is unconditional secure under arbitrary quantum attack. And we discuss that this protocol can be perfectly implemented with current technologies.

  4. Quantitative Analysis of the Security of Software-Defined Network Controller Using Threat/Effort Model

    Directory of Open Access Journals (Sweden)

    Zehui Wu

    2017-01-01

    Full Text Available SDN-based controller, which is responsible for the configuration and management of the network, is the core of Software-Defined Networks. Current methods, which focus on the secure mechanism, use qualitative analysis to estimate the security of controllers, leading to inaccurate results frequently. In this paper, we employ a quantitative approach to overcome the above shortage. Under the analysis of the controller threat model we give the formal model results of the APIs, the protocol interfaces, and the data items of controller and further provide our Threat/Effort quantitative calculation model. With the help of Threat/Effort model, we are able to compare not only the security of different versions of the same kind controller but also different kinds of controllers and provide a basis for controller selection and secure development. We evaluated our approach in four widely used SDN-based controllers which are POX, OpenDaylight, Floodlight, and Ryu. The test, which shows the similarity outcomes with the traditional qualitative analysis, demonstrates that with our approach we are able to get the specific security values of different controllers and presents more accurate results.

  5. Effort-Based Decision-Making in Schizophrenia.

    Science.gov (United States)

    Culbreth, Adam J; Moran, Erin K; Barch, Deanna M

    2018-08-01

    Motivational impairment has long been associated with schizophrenia but the underlying mechanisms are not clearly understood. Recently, a small but growing literature has suggested that aberrant effort-based decision-making may be a potential contributory mechanism for motivational impairments in psychosis. Specifically, multiple reports have consistently demonstrated that individuals with schizophrenia are less willing than healthy controls to expend effort to obtain rewards. Further, this effort-based decision-making deficit has been shown to correlate with severity of negative symptoms and level of functioning, in many but not all studies. In the current review, we summarize this literature and discuss several factors that may underlie aberrant effort-based decision-making in schizophrenia.

  6. Supporting Students as Scientists: One Mission's Efforts

    Science.gov (United States)

    Taylor, J.; Chambers, L. H.; Trepte, C. R.

    2012-12-01

    activities. The program provides teachers with a one-week summer professional development workshop, long-term teacher support through classroom visits, teacher access to GLOBE instrumentation, and research opportunities for students. Professional development is centered on student engagement through inquiry, opportunities for collaborative student research, and the GLOBE Program's atmosphere protocols and learning activities. Beyond the training week, teachers receive follow-up specifically addressing current opportunities for student engagement in current research and opportunities for students to present research findings. The first cohort of teachers completed the professional development workshop in July 2012. This session will summarize the planning and implementation details of the summer workshop, including schedule and materials. In addition to these details, we will share our evaluation of follow-up activities and survey results highlighting teachers' perceived barriers to implementing atmosphere investigations. These results will add to the discussion on effective programs aimed at inspiring young scientists.

  7. Cluster protocols in Underwater Sensor Networks: a Research Review

    Directory of Open Access Journals (Sweden)

    K. Ovaliadis

    2014-07-01

    Full Text Available Underwater Wireless Sensor Networks (UWSN have different characteristics in relation to terrestrial wireless sensor networks; such as limited bandwidth capacity, high propagation delays and limited battery power. Although there has been much work completed in developing protocols and models for terrestrial networks, these are rarely applicable for underwater sensor networks. Up to today major efforts have been made for designing efficient protocols while considering the underwater communication characteristics. An important issue on this research area is the construction of an efficient clustering algorithm. Clustering in the context of UWSN is important as it contributes a great deal towards the efficient use of energy resources. This paper reviews the most significant cluster based protocols proposed for UWSN. Major performance issues of these protocols with respect to the network conditions such as packet delivery ratio, average packet delay, node mobility effect and energy consumption are examined. The advantages and disadvantages of each protocol are also pointed out.

  8. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  9. Remotely-Supervised Transcranial Direct Current Stimulation (tDCS for Clinical Trials: Guidelines for Technology and Protocols

    Directory of Open Access Journals (Sweden)

    Leigh E Charvet

    2015-03-01

    Full Text Available The effect of transcranial direct current stimulation (tDCS is cumulative. Treatment protocols typically require multiple consecutive sessions spanning weeks or months. However, traveling to clinic for a tDCS session can present an obstacle to subjects and their caregivers. With modified devices and headgear, tDCS treatment can be administered remotely under clinical supervision, potentially enhancing recruitment, throughput, and convenience. Here we propose standards and protocols for clinical trials utilizing remotely-supervised tDCS with the goal of providing safe, reproducible and well-tolerated stimulation therapy outside of the clinic. The recommendations include: 1 training of staff in tDCS treatment and supervision, 2 assessment of the user’s capability to participate in tDCS remotely, 3 ongoing training procedures and materials including assessments of the user and/or caregiver, 4 simple and fail-safe electrode preparation techniques and tDCS headgear, 5 strict dose control for each session, 6 ongoing monitoring to quantify compliance (device preparation, electrode saturation/placement, stimulation protocol, with corresponding corrective steps as required, 7 monitoring for treatment-emergent adverse effects, 8 guidelines for discontinuation of a session and/or study participation including emergency failsafe procedures tailored to the treatment population’s level of need. These guidelines are intended to provide a minimal level of methodological rigor for clinical trials seeking to apply tDCS outside a specialized treatment center. We outline indication-specific applications (Attention Deficit Hyperactivity Disorder, Depression, Multiple Sclerosis, Palliative Care following these recommendations that support a standardized framework for evaluating the tolerability and reproducibility of remote-supervised tDCS that, once established, will allow for translation of tDCS clinical trials to a greater size and range of patient populations.

  10. Risk of bias and confounding of observational studies of Zika virus infection: A scoping review of research protocols.

    Science.gov (United States)

    Reveiz, Ludovic; Haby, Michelle M; Martínez-Vega, Ruth; Pinzón-Flores, Carlos E; Elias, Vanessa; Smith, Emma; Pinart, Mariona; Broutet, Nathalie; Becerra-Posada, Francisco; Aldighieri, Sylvain; Van Kerkhove, Maria D

    2017-01-01

    Given the severity and impact of the current Zika virus (ZIKV) outbreak in the Americas, numerous countries have rushed to develop research studies to assess ZIKV and its potential health consequences. In an effort to ensure that studies are comprehensive, both internally and externally valid, and with reliable results, the World Health Organization, the Pan American Health Organization, Institut Pasteur, the networks of Fiocruz, the Consortia for the Standardization of Influenza Seroepidemiology (CONSISE) and the International Severe Acute Respiratory and Emerging Infection Consortium (ISARIC) have generated six standardized clinical and epidemiological research protocols and questionnaires to address key public health questions on ZIKV. We conducted a systematic search of ongoing study protocols related to ZIKV research. We analyzed the content of protocols of 32 cohort studies and 13 case control studies for systematic bias that could produce erroneous results. Additionally we aimed to characterize the risks of bias and confounding in observational studies related to ZIKV and to propose ways to minimize them, including the use of six newly standardized research protocols. Observational studies of ZIKV face an array of challenges, including measurement of exposure and outcomes (microcephaly and Guillain-Barré Syndrome). Potential confounders need to be measured where known and controlled for in the analysis. Selection bias due to non-random selection is a significant issue, particularly in the case-control design, and losses to follow-up is equally important for the cohort design. Observational research seeking to answer key questions on the ZIKV should consider these restrictions and take precautions to minimize bias in an effort to provide reliable and valid results. Utilization of the standardized research protocols developed by the WHO, PAHO, Institut Pasteur, and CONSISE will harmonize the key methodological aspects of each study design to minimize bias at

  11. Risk of bias and confounding of observational studies of Zika virus infection: A scoping review of research protocols.

    Directory of Open Access Journals (Sweden)

    Ludovic Reveiz

    Full Text Available Given the severity and impact of the current Zika virus (ZIKV outbreak in the Americas, numerous countries have rushed to develop research studies to assess ZIKV and its potential health consequences. In an effort to ensure that studies are comprehensive, both internally and externally valid, and with reliable results, the World Health Organization, the Pan American Health Organization, Institut Pasteur, the networks of Fiocruz, the Consortia for the Standardization of Influenza Seroepidemiology (CONSISE and the International Severe Acute Respiratory and Emerging Infection Consortium (ISARIC have generated six standardized clinical and epidemiological research protocols and questionnaires to address key public health questions on ZIKV.We conducted a systematic search of ongoing study protocols related to ZIKV research. We analyzed the content of protocols of 32 cohort studies and 13 case control studies for systematic bias that could produce erroneous results. Additionally we aimed to characterize the risks of bias and confounding in observational studies related to ZIKV and to propose ways to minimize them, including the use of six newly standardized research protocols.Observational studies of ZIKV face an array of challenges, including measurement of exposure and outcomes (microcephaly and Guillain-Barré Syndrome. Potential confounders need to be measured where known and controlled for in the analysis. Selection bias due to non-random selection is a significant issue, particularly in the case-control design, and losses to follow-up is equally important for the cohort design.Observational research seeking to answer key questions on the ZIKV should consider these restrictions and take precautions to minimize bias in an effort to provide reliable and valid results. Utilization of the standardized research protocols developed by the WHO, PAHO, Institut Pasteur, and CONSISE will harmonize the key methodological aspects of each study design to

  12. Protocol adherence for continuously titrated interventions in randomized trials: an overview of the current methodology and case study.

    Science.gov (United States)

    Lauzier, F; Adhikari, N K; Seely, A; Koo, K K Y; Belley-Côté, E P; Burns, K E A; Cook, D J; D'Aragon, F; Rochwerg, B; Kho, M E; Oczkowksi, S J W; Duan, E H; Meade, M O; Day, A G; Lamontagne, F

    2017-07-17

    The standard definition for protocol adherence is the proportion of all scheduled doses that are delivered. In clinical research, this definition has several limitations when evaluating protocol adherence in trials that study interventions requiring continuous titration. Building upon a specific case study, we analyzed a recent trial of a continuously titrated intervention to assess the impact of different definitions of protocol deviations on the interpretation of protocol adherence. The OVATION pilot trial was an open-label randomized controlled trial of higher (75-80 mmHg) versus lower (60-65 mmHg) mean arterial pressure (MAP) targets for vasopressor therapy in shock. In this trial, potential protocol deviations were defined as MAP values outside the targeted range for >4 consecutive hours during vasopressor therapy without synchronous and consistent adjustments of vasopressor doses. An adjudication committee reviewed each potential deviation to determine if it was clinically-justified or not. There are four reasons for this contextual measurement and reporting of protocol adherence. First, between-arm separation is a robust measure of adherence to complex protocols. Second, adherence assessed by protocol deviations varies in function of the definition of deviations and the frequency of measurements. Third, distinguishing clinically-justified vs. not clinically-justified protocol deviations acknowledges clinically sensible bedside decision-making and offers a clear terminology before the trial begins. Finally, multiple metrics exist to report protocol deviations, which provides different information but complementary information on protocol adherence. In trials of interventions requiring continuous titration, metrics used for defining protocol deviations have a considerable impact on the interpretation of protocol adherence. Definitions for protocol deviations should be prespecified and correlated with between-arm separation, if it can be measured.

  13. The Missouri River Floodplain: History of Oak Forest & Current Restoration Efforts

    Science.gov (United States)

    Daniel C. Dey; Dirk Burhans; John Kabrick; Brain Root; Jennifer Grabner; Mike Gold

    2000-01-01

    Efforts to restore floodplains are complicated by our variable understanding of history and ecology; our lack of knowledge of past environmental and vegetative conditions; and our differing viewpoints of what natural, what the role of humans is in the ecosystem, and what the desirable restored state is. Managers are challenged to decide how to restore native vegetation...

  14. Protocol adherence for continuously titrated interventions in randomized trials: an overview of the current methodology and case study

    Directory of Open Access Journals (Sweden)

    F. Lauzier

    2017-07-01

    Full Text Available Abstract Background The standard definition for protocol adherence is the proportion of all scheduled doses that are delivered. In clinical research, this definition has several limitations when evaluating protocol adherence in trials that study interventions requiring continuous titration. Discussion Building upon a specific case study, we analyzed a recent trial of a continuously titrated intervention to assess the impact of different definitions of protocol deviations on the interpretation of protocol adherence. The OVATION pilot trial was an open-label randomized controlled trial of higher (75–80 mmHg versus lower (60–65 mmHg mean arterial pressure (MAP targets for vasopressor therapy in shock. In this trial, potential protocol deviations were defined as MAP values outside the targeted range for >4 consecutive hours during vasopressor therapy without synchronous and consistent adjustments of vasopressor doses. An adjudication committee reviewed each potential deviation to determine if it was clinically-justified or not. There are four reasons for this contextual measurement and reporting of protocol adherence. First, between-arm separation is a robust measure of adherence to complex protocols. Second, adherence assessed by protocol deviations varies in function of the definition of deviations and the frequency of measurements. Third, distinguishing clinically-justified vs. not clinically-justified protocol deviations acknowledges clinically sensible bedside decision-making and offers a clear terminology before the trial begins. Finally, multiple metrics exist to report protocol deviations, which provides different information but complementary information on protocol adherence. Conclusions In trials of interventions requiring continuous titration, metrics used for defining protocol deviations have a considerable impact on the interpretation of protocol adherence. Definitions for protocol deviations should be prespecified and correlated

  15. Technical Analysis of SSP-21 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-09

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.

  16. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  17. Compliance with AAPM Practice Guideline 1.a: CT Protocol Management and Review — from the perspective of a university hospital

    Science.gov (United States)

    Bour, Robert K.; Pozniak, Myron; Ranallo, Frank N.

    2015-01-01

    The purpose of this paper is to describe our experience with the AAPM Medical Physics Practice Guideline 1.a: “CT Protocol Management and Review Practice Guideline”. Specifically, we will share how our institution's quality management system addresses the suggestions within the AAPM practice report. We feel this paper is needed as it was beyond the scope of the AAPM practice guideline to provide specific details on fulfilling individual guidelines. Our hope is that other institutions will be able to emulate some of our practices and that this article would encourage other types of centers (e.g., community hospitals) to share their methodology for approaching CT protocol optimization and quality control. Our institution had a functioning CT protocol optimization process, albeit informal, since we began using CT. Recently, we made our protocol development and validation process compliant with a number of the ISO 9001:2008 clauses and this required us to formalize the roles of the members of our CT protocol optimization team. We rely heavily on PACS‐based IT solutions for acquiring radiologist feedback on the performance of our CT protocols and the performance of our CT scanners in terms of dose (scanner output) and the function of the automatic tube current modulation. Specific details on our quality management system covering both quality control and ongoing optimization have been provided. The roles of each CT protocol team member have been defined, and the critical role that IT solutions provides for the management of files and the monitoring of CT protocols has been reviewed. In addition, the invaluable role management provides by being a champion for the project has been explained; lack of a project champion will mitigate the efforts of a CT protocol optimization team. Meeting the guidelines set forth in the AAPM practice guideline was not inherently difficult, but did, in our case, require the cooperation of radiologists, technologists, physicists, IT

  18. May the Kyoto protocol produce results?

    International Nuclear Information System (INIS)

    Jaureguy-Naudin, M.

    2009-01-01

    A not well managed drastic reduction of greenhouse emissions might result in significant decrease of living standards, but without such reduction efforts, climate change might have five to twenty times higher costs. Thus, while indicating estimated consequences or evolutions of greenhouse emissions and temperature, the author stresses the need of emission reduction. She discusses the role of economic instruments which can be used in policies aimed at the struggle against climate change. She recalls the emission reduction commitments specified in the Kyoto protocol, discusses the present status, operation and results of the international emission trading scheme, the lessons learned after the first years of operation, comments the involvement of emerging countries in relationship with another mechanism defined in the protocol: the Clean Development Mechanism

  19. An Argument Approach to Observation Protocol Validity

    Science.gov (United States)

    Bell, Courtney A.; Gitomer, Drew H.; McCaffrey, Daniel F.; Hamre, Bridget K.; Pianta, Robert C.; Qi, Yi

    2012-01-01

    This article develops a validity argument approach for use on observation protocols currently used to assess teacher quality for high-stakes personnel and professional development decisions. After defining the teaching quality domain, we articulate an interpretive argument for observation protocols. To illustrate the types of evidence that might…

  20. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  1. Non-Intrusive Load Monitoring Assessment: Literature Review and Laboratory Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Butner, R. Scott; Reid, Douglas J.; Hoffman, Michael G.; Sullivan, Greg; Blanchard, Jeremy

    2013-07-01

    To evaluate the accuracy of NILM technologies, a literature review was conducted to identify any test protocols or standardized testing approaches currently in use. The literature review indicated that no consistent conventions were currently in place for measuring the accuracy of these technologies. Consequently, PNNL developed a testing protocol and metrics to provide the basis for quantifying and analyzing the accuracy of commercially available NILM technologies. This report discusses the results of the literature review and the proposed test protocol and metrics in more detail.

  2. The 50th Anniversary of the International Indian Ocean Expedition: An Update on Current Planning Efforts and Progress

    Science.gov (United States)

    Hood, Raleigh; D'Adamo, Nick; Burkill, Peter; Urban, Ed; Bhikajee, Mitrasen

    2014-05-01

    The International Indian Ocean Expedition (IIOE) was one of the greatest international, interdisciplinary oceanographic research efforts of all time. Planning for the IIOE began in 1959 and the project officially continued through 1965, with forty-six research vessels participating under fourteen different flags. The IIOE motivated an unprecedented number of hydrographic surveys (and repeat surveys) over the course of the expedition covering the entire Indian Ocean basin. And it was an interdisciplinary endeavor that embraced physical oceanography, chemical oceanography, meteorology, marine biology, marine geology and geophysics. The end of 2015 will mark the 50th Anniversary of the completion of the IIOE. In the 50 years since the IIOE three fundamental changes have taken place in ocean science. The first is the deployment of a broad suite of oceanographic sensors on satellites that have dramatically improved the characterization of both physical and biological oceanographic variability. The second is the emergence of new components of the ocean observing system, most notably remote sensing and Argo floats. And the third is the development of ocean modeling in all its facets from short-term forecasting to seasonal prediction to climate projections. These advances have revolutionized our understanding of the global oceans, including the Indian Ocean. Compared to the IIOE era, we now have the capacity to provide a much more integrated picture of the Indian Ocean, especially if these new technologies can be combined with targeted and well-coordinated in situ measurements. In this presentation we report on current efforts to motivate an IIOE 50th Anniversary Celebration (IIOE-2). We envision this IIOE-2 as a 5-year expedition and effort beginning in 2015 and continuing through to 2020. An important objective of our planning efforts is assessing ongoing and planned research activities in the Indian Ocean in the 2015 to 2020 time frame, with the goal of embracing and

  3. Mapping telemedicine efforts

    DEFF Research Database (Denmark)

    Kierkegaard, Patrick

    2015-01-01

    are being utilized? What medical disciplines are being addressed using telemedicine systems? Methods: All data was surveyed from the "Telemedicinsk Landkort", a newly created database designed to provide a comprehensive and systematic overview of all telemedicine technologies in Denmark. Results......Objectives: The aim of this study is to survey telemedicine services currently in operation across Denmark. The study specifically seeks to answer the following questions: What initiatives are deployed within the different regions? What are the motivations behind the projects? What technologies......: The results of this study suggest that a growing number of telemedicine initiatives are currently in operation across Denmark but that considerable variations existed in terms of regional efforts as the number of operational telemedicine projects varied from region to region. Conclusions: The results...

  4. Control room envelope unfiltered air inleakage test protocols

    International Nuclear Information System (INIS)

    Lagus, P.L.; Grot, R.A.

    1997-01-01

    In 1983, the Advisory Committee on Reactor Safeguards (ACRS) recommended that the US NRC develop a control room HVAC performance testing protocol. To date no such protocol has been forthcoming. Beginning in mid-1994, an effort was funded by NRC under a Small Business Innovation Research (SBIR) grant to develop several simplified test protocols based on the principles of tracer gas testing in order to measure the total unfiltered inleakage entering a CRE during emergency mode operation of the control room ventilation system. These would allow accurate assessment of unfiltered air inleakage as required in SRP 6.4. The continuing lack of a standard protocol is unfortunate since one of the significant parameters required to calculate operator dose is the amount of unfiltered air inleakage into the control room. Often it is assumed that, if the Control Room Envelope (CRE) is maintained at +1/8 in. w.g. differential pressure relative to the surroundings, no significant unfiltered inleakage can occur it is further assumed that inleakage due to door openings is the only source of unfiltered air. 23 refs., 13 figs., 2 tabs

  5. Control room envelope unfiltered air inleakage test protocols

    Energy Technology Data Exchange (ETDEWEB)

    Lagus, P.L. [Lagus Applied Technology, San Diego, CA (United States); Grot, R.A. [Lagus Applied Technology, Olney, MD (United States)

    1997-08-01

    In 1983, the Advisory Committee on Reactor Safeguards (ACRS) recommended that the US NRC develop a control room HVAC performance testing protocol. To date no such protocol has been forthcoming. Beginning in mid-1994, an effort was funded by NRC under a Small Business Innovation Research (SBIR) grant to develop several simplified test protocols based on the principles of tracer gas testing in order to measure the total unfiltered inleakage entering a CRE during emergency mode operation of the control room ventilation system. These would allow accurate assessment of unfiltered air inleakage as required in SRP 6.4. The continuing lack of a standard protocol is unfortunate since one of the significant parameters required to calculate operator dose is the amount of unfiltered air inleakage into the control room. Often it is assumed that, if the Control Room Envelope (CRE) is maintained at +1/8 in. w.g. differential pressure relative to the surroundings, no significant unfiltered inleakage can occur it is further assumed that inleakage due to door openings is the only source of unfiltered air. 23 refs., 13 figs., 2 tabs.

  6. Quantifying commercial catch and effort of monkfish Lophius ...

    African Journals Online (AJOL)

    Catch-per-unit-effort (cpue) data of vessels targeting monkfish and sole (the two ... analysed using two different methods to construct indices of abundance. ... in Namibia to all tail-weight classes is not appropriate for the current fishery and needs ... Keywords: catch per unit effort, Generalized Linear Model, Lophius vaillanti, ...

  7. Optimization of TTEthernet Networks to Support Best-Effort Traffic

    DEFF Research Database (Denmark)

    Tamas-Selicean, Domitian; Pop, Paul

    2014-01-01

    This paper focuses on the optimization of the TTEthernet communication protocol, which offers three traffic classes: time-triggered (TT), sent according to static schedules, rate-constrained (RC) that has bounded end-to-end latency, and best-effort (BE), the classic Ethernet traffic, with no timing...... guarantees. In our earlier work we have proposed an optimization approach named DOTTS that performs the routing, scheduling and packing / fragmenting of TT and RC messages, such that the TT and RC traffic is schedulable. Although backwards compatibility with classic Ethernet networks is one of TTEthernet...

  8. Motivation and effort in individuals with social anhedonia.

    Science.gov (United States)

    McCarthy, Julie M; Treadway, Michael T; Blanchard, Jack J

    2015-06-01

    It has been proposed that anhedonia may, in part, reflect difficulties in reward processing and effortful decision making. The current study aimed to replicate previous findings of effortful decision making deficits associated with elevated anhedonia and expand upon these findings by investigating whether these decision making deficits are specific to elevated social anhedonia or are also associated with elevated positive schizotypy characteristics. The current study compared controls (n=40) to individuals elevated on social anhedonia (n=30), and individuals elevated on perceptual aberration/magical ideation (n=30) on the Effort Expenditure for Rewards Task (EEfRT). Across groups, participants chose a higher proportion of hard tasks with increasing probability of reward and reward magnitude, demonstrating sensitivity to probability and reward values. Contrary to our expectations, when the probability of reward was most uncertain (50% probability), at low and medium reward values, the social anhedonia group demonstrated more effortful decision making than either individuals high in positive schizotypy or controls. The positive schizotypy group only differed from controls (making less effortful choices than controls) when reward probability was lowest (12%) and the magnitude of reward was the smallest. Our results suggest that social anhedonia is related to intact motivation and effort for monetary rewards, but that individuals with this characteristic display a unique and perhaps inefficient pattern of effort allocation when the probability of reward is most uncertain. Future research is needed to better understand effortful decision making and the processing of reward across a range of individual difference characteristics. Copyright © 2015 Elsevier B.V. All rights reserved.

  9. Dental-CT: image quality and absorbed radiation dose of different scan protocols

    International Nuclear Information System (INIS)

    Schorn, C.; Alamo, L.; Funke, M.; Grabbe, E.; Visser, H.; Hermann, K.P.

    1999-01-01

    Purpose: To develop a scan protocol for dental-CT which guarantees good image quality at the lowest possible radiation dose. Methods: In an experimental investigation Dental-CT (HSA, GE, Milwaukee, USA) of the mandible of two human skeletons positioned in a water tank were performed in order to define the most advantageous scan protocol. Tube currents ranged from 40 to 200 mA and the scan technique was modified (axial mode or helical mode with pitches of 1 to 3 and corresponding increments of 0.4 to 1.0 mm). 39 patients underwent a dental-CT with decreased current (80 mA) in the helical scan mode (pitch 2, slice thickness 1 mm). Dose measurements were performed for two different scan protocols (A: axial, 130 mAs, B: helical, 80 mA, pitch 2). Results: The preliminary investigations of image quality showed only a minor effect of the applied current. For the helical scan mode, pitches of more than 2 impaired image quality. A low increment had no advantages. There were no disadvantages in clinical practice using protocol B with decreased tube current. Absorbed radiation dose of dental CT performed with protocol B was decreased to one third in comparison to protocol A. Conclusions: A scan protocol with a low tube current (e.g., 80 mA, for a rotation time of 1 s) and a helical scan mode (e.g., for a slice thickness of 1 mm with a pitch of 2 and an increment of 1 mm) is recommended for performing dental-CT. (orig.) [de

  10. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification. In r...

  11. Debate - Achievements of the Trafficking Protocol: Perspectives from the former UN Special Rapporteur on Trafficking in Persons

    OpenAIRE

    Joy N Ezeilo

    2015-01-01

    The United Nations (UN) Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and Children, Supplementing the UN Convention against Transnational Organized Crime, 2000 (Trafficking Protocol), is a watershed in galvanising the global movement against human trafficking. Thanks to the Protocol, international and regional bodies, along with civil society groups, have become involved in researching the issue and supporting anti-trafficking efforts; and states have begun...

  12. Efforts to reduce stratospheric ozone loss affect agriculture

    International Nuclear Information System (INIS)

    Weare, B.C.

    1995-01-01

    Research has shown that the increased ultraviolet radiation reaching the Earth's surface resulting from stratospheric ozone loss poses a danger to everyone. Concern about ozone loss prompted many nations to ratify the Montreal Protocol, the most comprehensive international environmental agreement ever enacted. Several provisions of this protocol will have substantial, long-term effects on the agricultural industry. Agriculture contributes substantially to ozone depletion, primarily through its use of chlorofluorocarbons (CFCs) for refrigeration in processing, storage and transport of meats and produce. This paper is meant to serve as an overview of the scientific basis for ozone depletion concerns, a description of the current international policy agreement, and the possible consequences of that policy for agriculture. (author)

  13. Standardization and Optimization of Computed Tomography Protocols to Achieve Low-Dose

    Science.gov (United States)

    Chin, Cynthia; Cody, Dianna D.; Gupta, Rajiv; Hess, Christopher P.; Kalra, Mannudeep K.; Kofler, James M.; Krishnam, Mayil S.; Einstein, Andrew J.

    2014-01-01

    The increase in radiation exposure due to CT scans has been of growing concern in recent years. CT scanners differ in their capabilities and various indications require unique protocols, but there remains room for standardization and optimization. In this paper we summarize approaches to reduce dose, as discussed in lectures comprising the first session of the 2013 UCSF Virtual Symposium on Radiation Safety in Computed Tomography. The experience of scanning at low dose in different body regions, for both diagnostic and interventional CT procedures, is addressed. An essential primary step is justifying the medical need for each scan. General guiding principles for reducing dose include tailoring a scan to a patient, minimizing scan length, use of tube current modulation and minimizing tube current, minimizing-tube potential, iterative reconstruction, and periodic review of CT studies. Organized efforts for standardization have been spearheaded by professional societies such as the American Association of Physicists in Medicine. Finally, all team members should demonstrate an awareness of the importance of minimizing dose. PMID:24589403

  14. Implementation of a protocol to reduce occurrence of retained sponges after vaginal delivery.

    Science.gov (United States)

    Lutgendorf, Monica A; Schindler, Lynnett L; Hill, James B; Magann, Everett F; O'Boyle, John D

    2011-06-01

    Retained sponges (gossypiboma) following vaginal delivery are an uncommon occurrence. Although significant morbidity from such an event is unlikely, there are many reported adverse effects, including symptoms of malodorous discharge, loss of confidence in providers and the medical system, and legal claims. To report a protocol intended to reduce the occurrence of retained sponges following vaginal delivery. After identification of limitations with existing delivery room protocols, we developed a sponge count protocol to reduce occurrence of retained vaginal sponges. We report our experience at Naval Medical Center Portsmouth, a large tertiary care military treatment facility with our efforts to implement a sponge count protocol to reduce retained sponges following vaginal delivery. With appropriate pre-implementation training, protocols which incorporate post-delivery vaginal sweep and sponge counts are well accepted by the health care team and can be incorporated into the delivery room routine.

  15. Transcranial direct current stimulation (tDCS) for treatment of major depression during pregnancy: study protocol for a pilot randomized controlled trial.

    Science.gov (United States)

    Vigod, Simone; Dennis, Cindy-Lee; Daskalakis, Zafiris; Murphy, Kellie; Ray, Joel; Oberlander, Tim; Somerton, Sarah; Hussain-Shamsy, Neesha; Blumberger, Daniel

    2014-09-18

    Women with depression in pregnancy are faced with difficult treatment decisions. Untreated, antenatal depression has serious negative implications for mothers and children. While antidepressant drug treatment is likely to improve depressive symptoms, it crosses the placenta and may pose risks to the unborn child. Transcranial direct current stimulation is a focal brain stimulation treatment that improves depressive symptoms within 3 weeks of treatment by inducing changes to brain areas involved in depression, without impacting any other brain areas, and without inducing changes to heart rate, blood pressure or core body temperature. The localized nature of transcranial direct current stimulation makes it an ideal therapeutic approach for treating depression during pregnancy, although it has never previously been evaluated in this population. We describe a pilot randomized controlled trial of transcranial direct current stimulation among women with depression in pregnancy to assess the feasibility of a larger, multicentre efficacy study. Women over 18 years of age and between 14 and 32 weeks gestation can be enrolled in the study provided they meet diagnostic criteria for a major depressive episode of at least moderate severity and have been offered but refused antidepressant medication. Participants are randomized to receive active transcranial direct current stimulation or a sham condition that is administered in 15 30-minute treatments over three weeks. Women sit upright during treatment and receive obstetrical monitoring prior to, during and after each treatment session. Depressive symptoms, treatment acceptability, and pregnancy outcomes are assessed at baseline (prior to randomization), at the end of each treatment week, every four weeks post-treatment until delivery, and at 4 and 12 weeks postpartum. Transcranial direct current stimulation is a novel therapeutic option for treating depression during pregnancy. This protocol allows for assessment of the

  16. Implementation of the Welfare Quality broiler assessment protocol – final report : overview of outcome-based measurement of broiler welfare and a general discussion on the Welfare Quality broiler assessment protocol

    NARCIS (Netherlands)

    Jong, de I.C.; Gunnink, H.; Hindle, V.A.

    2015-01-01

    In the current report, two topics related to our study on the implementation of the Welfare Quality® broiler assessment protocol are discussed. First, animal-based measures for broiler welfare, currently included in the Welfare Quality® broiler assessment protocol, are discussed with respect to

  17. Recommendations for Enhancing Implementation of Additional Protocol Declarations

    International Nuclear Information System (INIS)

    Niina, Toshiaki; Nidaira, Kazuo; Aono, Yosuke

    2010-01-01

    Japan signed the Additional Protocol (hereafter, AP) in December 1998. The domestic law and regulation had been revised to implement the initial and annual declarations for the Agency and the Additional Protocol came into force in December 1999. Since initial declaration in 2000, Japan has submitted the annual declaration in every May. Until 2010, Japan has made 10 annual declarations. This paper gives recommendations to enhance implementation of Additional Protocol declarations based on 10-year experience in Japan and addresses the following: Current status of additional protocol declaration in Japan; Outline of processing method; AP Information Management System; Recommendations for improving quality of declaration. Preparation of additional protocol declaration in NMCC has been conducted in the course of contract with Japan Safeguards Office (hereafter, JSGO) for safeguards information treatment. (author)

  18. Security Property Validation of the Sensor Network Encryption Protocol (SNEP

    Directory of Open Access Journals (Sweden)

    Salekul Islam

    2015-07-01

    Full Text Available Since wireless sensor networks (WSNs have been designed to be deployed in an unsecured, public environment, secured communication is really vital for their wide-spread use. Among all of the communication protocols developed for WSN, the Security Protocols for Sensor Networks (SPINS is exceptional, as it has been designed with security as a goal. SPINS is composed of two building blocks: Secure Network Encryption Protocol (SNEP and the “micro” version of the Timed Efficient Streaming Loss-tolerant Authentication (TESLA, named μTESLA. From the inception of SPINS, a number of efforts have been made to validate its security properties. In this paper, we have validated the security properties of SNEP by using an automated security protocol validation tool, named AVISPA. Using the protocol specification language, HLPSL, we model two combined scenarios—node to node key agreement and counter exchange protocols—followed by data transmission. Next, we validate the security properties of these combined protocols, using different AVISPA back-ends. AVISPA reports the models we have developed free from attacks. However, by analyzing the key distribution sub-protocol, we find one threat of a potential DoS attack that we have demonstrated by modeling in AVISPA. Finally, we propose a modification, and AVISPA reports this modified version free from the potential DoS attack.

  19. Model Checking A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs

    Science.gov (United States)

    Malekpour, Mahyar R.

    2012-01-01

    This report presents the mechanical verification of a self-stabilizing distributed clock synchronization protocol for arbitrary digraphs in the absence of faults. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. The system under study is an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. A bounded model of the protocol is verified using the Symbolic Model Verifier (SMV) for a subset of digraphs. Modeling challenges of the protocol and the system are addressed. The model checking effort is focused on verifying correctness of the bounded model of the protocol as well as confirmation of claims of determinism and linear convergence with respect to the self-stabilization period.

  20. Supporting Tablet Configuration, Tracking, and Infection Control Practices in Digital Health Interventions: Study Protocol.

    Science.gov (United States)

    Furberg, Robert D; Ortiz, Alexa M; Zulkiewicz, Brittany A; Hudson, Jordan P; Taylor, Olivia M; Lewis, Megan A

    2016-06-27

    Tablet-based health care interventions have the potential to encourage patient care in a timelier manner, allow physicians convenient access to patient records, and provide an improved method for patient education. However, along with the continued adoption of tablet technologies, there is a concomitant need to develop protocols focusing on the configuration, management, and maintenance of these devices within the health care setting to support the conduct of clinical research. Develop three protocols to support tablet configuration, tablet management, and tablet maintenance. The Configurator software, Tile technology, and current infection control recommendations were employed to develop three distinct protocols for tablet-based digital health interventions. Configurator is a mobile device management software specifically for iPhone operating system (iOS) devices. The capabilities and current applications of Configurator were reviewed and used to develop the protocol to support device configuration. Tile is a tracking tag associated with a free mobile app available for iOS and Android devices. The features associated with Tile were evaluated and used to develop the Tile protocol to support tablet management. Furthermore, current recommendations on preventing health care-related infections were reviewed to develop the infection control protocol to support tablet maintenance. This article provides three protocols: the Configurator protocol, the Tile protocol, and the infection control protocol. These protocols can help to ensure consistent implementation of tablet-based interventions, enhance fidelity when employing tablets for research purposes, and serve as a guide for tablet deployments within clinical settings.

  1. The Effort Paradox: Effort Is Both Costly and Valued.

    Science.gov (United States)

    Inzlicht, Michael; Shenhav, Amitai; Olivola, Christopher Y

    2018-04-01

    According to prominent models in cognitive psychology, neuroscience, and economics, effort (be it physical or mental) is costly: when given a choice, humans and non-human animals alike tend to avoid effort. Here, we suggest that the opposite is also true and review extensive evidence that effort can also add value. Not only can the same outcomes be more rewarding if we apply more (not less) effort, sometimes we select options precisely because they require effort. Given the increasing recognition of effort's role in motivation, cognitive control, and value-based decision-making, considering this neglected side of effort will not only improve formal computational models, but also provide clues about how to promote sustained mental effort across time. Copyright © 2018 Elsevier Ltd. All rights reserved.

  2. Weaknesses of a dynamic identity based authentication protocol for multi-server architecture

    OpenAIRE

    Han, Weiwei

    2012-01-01

    Recently, Li et al. proposed a dynamic identity based authentication protocol for multi-server architecture. They claimed their protocol is secure and can withstand various attacks. But we found some security loopholes in the protocol. Accordingly, the current paper demonstrates that Li et al.'s protocol is vulnerable to the replay attack, the password guessing attack and the masquerade attack.

  3. Workplace High Tech Spurs Retraining Efforts.

    Science.gov (United States)

    Davis, Dwight B.

    1984-01-01

    Discusses who should provide training for displaced workers who need new skills. Areas examined include: (1) the need for retraining; (2) current corporate efforts; (3) agreements in the automotive industry; (4) job quality; (5) the federal government's role; and (6) federal legislation related to the problem. (JN)

  4. Bidirectional Quantum Secure Direct Communication Network Protocol with Hyperentanglement

    International Nuclear Information System (INIS)

    Gu Bin; Chen Yulin; Huang Yugai; Fang Xia

    2011-01-01

    We propose a bidirectional quantum secure direct communication (QSDC) network protocol with the hyperentanglment in both the spatial-mode ad the polarization degrees of freedom of photon pairs which can in principle be produced with a beta barium borate crystal. The secret message can be encoded on the photon pairs with unitary operations in these two degrees of freedom independently. Compared with other QSDC network protocols, our QSDC network protocol has a higher capacity as each photon pair can carry 4 bits of information. Also, we discuss the security of our QSDC network protocol and its feasibility with current techniques. (general)

  5. Automated Planning Enables Complex Protocols on Liquid-Handling Robots.

    Science.gov (United States)

    Whitehead, Ellis; Rudolf, Fabian; Kaltenbach, Hans-Michael; Stelling, Jörg

    2018-03-16

    Robotic automation in synthetic biology is especially relevant for liquid handling to facilitate complex experiments. However, research tasks that are not highly standardized are still rarely automated in practice. Two main reasons for this are the substantial investments required to translate molecular biological protocols into robot programs, and the fact that the resulting programs are often too specific to be easily reused and shared. Recent developments of standardized protocols and dedicated programming languages for liquid-handling operations addressed some aspects of ease-of-use and portability of protocols. However, either they focus on simplicity, at the expense of enabling complex protocols, or they entail detailed programming, with corresponding skills and efforts required from the users. To reconcile these trade-offs, we developed Roboliq, a software system that uses artificial intelligence (AI) methods to integrate (i) generic formal, yet intuitive, protocol descriptions, (ii) complete, but usually hidden, programming capabilities, and (iii) user-system interactions to automatically generate executable, optimized robot programs. Roboliq also enables high-level specifications of complex tasks with conditional execution. To demonstrate the system's benefits for experiments that are difficult to perform manually because of their complexity, duration, or time-critical nature, we present three proof-of-principle applications for the reproducible, quantitative characterization of GFP variants.

  6. Quantum deterministic key distribution protocols based on the authenticated entanglement channel

    International Nuclear Information System (INIS)

    Zhou Nanrun; Wang Lijun; Ding Jie; Gong Lihua

    2010-01-01

    Based on the quantum entanglement channel, two secure quantum deterministic key distribution (QDKD) protocols are proposed. Unlike quantum random key distribution (QRKD) protocols, the proposed QDKD protocols can distribute the deterministic key securely, which is of significant importance in the field of key management. The security of the proposed QDKD protocols is analyzed in detail using information theory. It is shown that the proposed QDKD protocols can safely and effectively hand over the deterministic key to the specific receiver and their physical implementation is feasible with current technology.

  7. Quantum deterministic key distribution protocols based on the authenticated entanglement channel

    Energy Technology Data Exchange (ETDEWEB)

    Zhou Nanrun; Wang Lijun; Ding Jie; Gong Lihua [Department of Electronic Information Engineering, Nanchang University, Nanchang 330031 (China)], E-mail: znr21@163.com, E-mail: znr21@hotmail.com

    2010-04-15

    Based on the quantum entanglement channel, two secure quantum deterministic key distribution (QDKD) protocols are proposed. Unlike quantum random key distribution (QRKD) protocols, the proposed QDKD protocols can distribute the deterministic key securely, which is of significant importance in the field of key management. The security of the proposed QDKD protocols is analyzed in detail using information theory. It is shown that the proposed QDKD protocols can safely and effectively hand over the deterministic key to the specific receiver and their physical implementation is feasible with current technology.

  8. Test Protocols for Advanced Inverter Interoperability Functions - Appendices

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, Jay Dean [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gonzalez, Sigifredo [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ralph, Mark E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ellis, Abraham [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Broderick, Robert Joseph [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2013-11-01

    Distributed energy resources (DER) such as photovoltaic (PV) systems, when deployed in a large scale, are capable of influencing significantly the operation of power systems. Looking to the future, stakeholders are working on standards to make it possible to manage the potentially complex interactions between DER and the power system. In 2009, the Electric Power Research Institute (EPRI), Sandia National Laboratories (SNL) with the U.S. Department of Energy (DOE), and the Solar Electric Power Association (SEPA) initiated a large industry collaborative to identify and standardize definitions for a set of DER grid support functions. While the initial effort concentrated on grid-tied PV inverters and energy storage systems, the concepts have applicability to all DER. A partial product of this on-going effort is a reference definitions document (IEC TR 61850-90-7, Object models for power converters in distributed energy resources (DER) systems) that has become a basis for expansion of related International Electrotechnical Commission (IEC) standards, and is supported by US National Institute of Standards and Technology (NIST) Smart Grid Interoperability Panel (SGIP). Some industry-led organizations advancing communications protocols have also embraced this work. As standards continue to evolve, it is necessary to develop test protocols to independently verify that the inverters are properly executing the advanced functions. Interoperability is assured by establishing common definitions for the functions and a method to test compliance with operational requirements. This document describes test protocols developed by SNL to evaluate the electrical performance and operational capabilities of PV inverters and energy storage, as described in IEC TR 61850-90-7. While many of these functions are not now required by existing grid codes or may not be widely available commercially, the industry is rapidly moving in that direction. Interoperability issues are already apparent as

  9. Protocol to monitor trade agreement food-related aspects: the Fiji case study.

    Science.gov (United States)

    Ravuvu, Amerita; Friel, Sharon; Thow, Anne Marie; Snowdon, Wendy; Wate, Jillian

    2017-04-26

    Despite the growing rates of obesity and diet-related non-communicable diseases, globally, public health attention has only relatively recently turned to the links between trade agreements and the nutritional risks associated with it. Specific trade agreements appear to have played an influential role in the volume and types of foods entering different countries, yet there is currently no systematic and objective monitoring of trade agreements for their impacts on food environments. Recently, INFORMAS was set up to monitor and benchmark food environments, government policies and private sector actions within countries and globally. One of its projects/modules focuses on trade policy and in particular the food-related aspects of trade agreements. This paper describes the INFORMAS trade protocol, an approach to collecting food-related information about four domains of trade: trade in goods; trade in services and foreign direct investment; domestic supports, and policy space. Specifically, the protocol is tested in Fiji. The development and testing of this protocol in Fiji represents the first effort to set out a framework and process for objectively monitoring trade agreements and their impacts on national food supply and the wider food environment. It has shown that entry into WTO trade agreements contributed to the nutrition transition in Fiji through the increased availability of imported foods with varying nutritional quality. We observed an increase in imports of both healthy and less healthy foods. The application of the monitoring protocol also highlights challenges for data collection associated with each trade domain that should be considered for future data collection and analysis in other low and middle income countries. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  10. Authentication Protocol using Quantum Superposition States

    Energy Technology Data Exchange (ETDEWEB)

    Kanamori, Yoshito [University of Alaska; Yoo, Seong-Moo [University of Alabama, Huntsville; Gregory, Don A. [University of Alabama, Huntsville; Sheldon, Frederick T [ORNL

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  11. A Push-pull Protocol to Reduce Colonization of Bird Nest Boxes by Honey Bees.

    Science.gov (United States)

    Efstathion, Caroline A; Kern, William H

    2016-09-04

    Introduction of the invasive Africanized honey bee (AHB) into the Neotropics is a serious problem for many cavity nesting birds, specifically parrots. These bees select cavities that are suitable nest sites for birds, resulting in competition. The difficulty of removing bees and their defensive behavior makes a prevention protocol necessary. Here, we describe a push-pull integrated pest management protocol to deter bees from inhabiting bird boxes by applying a bird safe insecticide, permethrin, to repel bees from nest boxes, while simultaneously attracting them to pheromone-baited swarm traps. Shown here is an example experiment using Barn Owl nest boxes. This protocol successfully reduced colonization of Barn Owl nest boxes by Africanized honey bees. This protocol is flexible, allowing adjustments to accommodate a wide range of bird species and habitats. This protocol could benefit conservation efforts where AHB are located.

  12. Methods for culturing retinal pigment epithelial cells: a review of current protocols and future recommendations

    Directory of Open Access Journals (Sweden)

    Aaron H Fronk

    2016-07-01

    Full Text Available The retinal pigment epithelium is an important part of the vertebrate eye, particularly in studying the causes and possible treatment of age-related macular degeneration. The retinal pigment epithelium is difficult to access in vivo due to its location at the back of the eye, making experimentation with age-related macular degeneration treatments problematic. An alternative to in vivo experimentation is cultivating the retinal pigment epithelium in vitro, a practice that has been going on since the 1970s, providing a wide range of retinal pigment epithelial culture protocols, each producing cells and tissue of varying degrees of similarity to natural retinal pigment epithelium. The purpose of this review is to provide researchers with a ready list of retinal pigment epithelial protocols, their effects on cultured tissue, and their specific possible applications. Protocols using human and animal retinal pigment epithelium cells, derived from tissue or cell lines, are discussed, and recommendations for future researchers included.

  13. Analysis Efforts Supporting NSTX Upgrades

    International Nuclear Information System (INIS)

    Zhang, H.; Titus, P.; Rogoff, P.; Zolfaghari, A.; Mangra, D.; Smith, M.

    2010-01-01

    The National Spherical Torus Experiment (NSTX) is a low aspect ratio, spherical torus (ST) configuration device which is located at Princeton Plasma Physics Laboratory (PPPL) This device is presently being updated to enhance its physics by doubling the TF field to 1 Tesla and increasing the plasma current to 2 Mega-amperes. The upgrades include a replacement of the centerstack and addition of a second neutral beam. The upgrade analyses have two missions. The first is to support design of new components, principally the centerstack, the second is to qualify existing NSTX components for higher loads, which will increase by a factor of four. Cost efficiency was a design goal for new equipment qualification, and reanalysis of the existing components. Showing that older components can sustain the increased loads has been a challenging effort in which designs had to be developed that would limit loading on weaker components, and would minimize the extent of modifications needed. Two areas representing this effort have been chosen to describe in more details: analysis of the current distribution in the new TF inner legs, and, second, analysis of the out-of-plane support of the existing TF outer legs.

  14. Using a clinical protocol for orthognathic surgery and assessing a 3-dimensional virtual approach: current therapy.

    Science.gov (United States)

    Quevedo, Luis A; Ruiz, Jessica V; Quevedo, Cristobal A

    2011-03-01

    Oral and maxillofacial surgeons who perform orthognathic surgery face major changes in their practices, and these challenges will increase in the near future, because the extraordinary advances in technology applied to our profession are not only amazing but are becoming the standard of care as they promote improved outcomes for our patients. Orthognathic surgery is one of the favorite areas of practicing within the scope of practice of an oral and maxillofacial surgeon. Our own practice in orthognathic surgery has completed over 1,000 surgeries of this type. Success is directly related to the consistency and capability of the surgical-orthodontic team to achieve predictable, stable results, and our hypothesis is that a successful result is directly related to the way we take our records and perform diagnosis and treatment planning following basic general principles. Now that we have the opportunity to plan and treat 3-dimensional (3D) problems with 3D technology, we should enter into this new era with appropriate standards to ensure better results, instead of simply enjoying these new tools, which will clearly show not only us but everyone what we do when we perform orthognathic surgery. Appropriate principles need to be taken into account when implementing this new technology. In other words, new technology is welcome, but we do not have to reinvent the wheel. The purpose of this article is to review the current protocol that we use for orthognathic surgery and compare it with published protocols that incorporate new 3D and virtual technology. This report also describes our approach to this new technology. Copyright © 2011 American Association of Oral and Maxillofacial Surgeons. Published by Elsevier Inc. All rights reserved.

  15. Evaluating the effectiveness of burned area emergency response (BAER) efforts after the 2003 wildfires, southern California

    Science.gov (United States)

    Peter M. Wohlgemuth; Ken R. Hubbert; Jan L. Beyers; David R. Weise

    2007-01-01

    Wildfires burned approximately 300,000 hectares (750,000 acres) across southern California in the fall of 2003. Over 10 million dollars were spent on Burned Area Emergency Response (BAER) treatments following these fires. To support the BAER efforts, we designed a comprehensive strategy with standardized protocols to evaluate the effectiveness of various erosion...

  16. IAEA to implement Safeguards Additional Protocols in the EU

    International Nuclear Information System (INIS)

    2004-01-01

    Full text: IAEA Director General Mohamed ElBaradei welcomed the entry into force today of the Additional Protocols for 15 States of the European Union - France, the United Kingdom and the 13 non-nuclear weapon States of the EU - and the European Atomic Energy Community (EURATOM). The Protocols, which provide the Agency with better tools to verify compliance with nuclear non-proliferation commitments, entered into force when the European Commission informed the Agency that EURATOM's own requirements for entry into force had been met. The 15 States had provided similar notifications over the past years since signing the Protocols in 1998. The simultaneous entry into force of Additional Protocols for the 15 EU States is 'a very positive development and a milestone in our efforts to strengthen the verification regime', said Dr. ElBaradei. 'In my view, the Additional Protocol should become the standard for verification under the Treaty on the Non-Proliferation of Nuclear Weapons (NPT).' He added that the Agency had been preparing for the entry into force of the EU protocols and was confident that, in co-operation with the 15 States and EURATOM, it would be able to ensure effective and efficient implementation in the EU States. The Model Additional Protocol was developed following the discovery of Iraq's clandestine nuclear weapons programme to ensure that the IAEA is given the information and access it needs for timely discovery of any similar activities in States that have pledged not to use nuclear material and activities for weapons purposes. In the past year, Additional Protocols entered into force for 22 countries, and the Agency will now implement Additional Protocols in 58 States, which includes the 15 EU States. The 10 countries joining the EU on 1 May 2004 - seven of which already have brought into force Additional Protocols to their respective safeguards agreements - are expected to gradually accede to the Safeguards Agreement and Additional Protocol covering

  17. New logistics protocols for distributed interactive simulation

    Science.gov (United States)

    Taylor, Darrin; Morrison, John; Katz, Warren; Felton, Erik; Herman, Deborah A.

    1995-06-01

    In today's environment, the transportation and maintenance of military forces is nearly as important as combat operations. Rapid deployment to regions of low-intensity conflict will become a very common training scenario for the U.S. military. Thus it is desirable to apply distributed simulation technology to train logistics personnel in their combat support roles. Currently, distributed interactive simulation (DIS) only contains rudimentary logistics protocols. This paper introduces new protocols designed to handle the logistics problem. The Newtonian protocol takes a physics-based approach to modeling interactions on the simulation network. This protocol consists of a family of protocol data units (PDUs) which are used to communicate forces in different circumstances. The protocol implements a small set of physical relations. This represents a flexible and general mechanism to describe battlefield interactions between network entities. The migratory object protocol (MOP) family addresses the transfer of control. General mechanisms provide the means to simulate resupply, repair, and maintenance of entities at any level of abstraction (individual soldier to division). It can also increase the fidelity of mine laying, enable handover of weapons for terminal guidance, allow for the distribution of aggregate-level simulation entities, provide capabilities for the simulation of personnel, etc.

  18. Dynamic federations: storage aggregation using open tools and protocols

    CERN Document Server

    Fabrizio Furano, F F; Ricardo Brito da Rocha, R R; Adrien Devresse, A D; Oliver Keeble, O K; Alejandro Alvarez Ayllon, A A

    2012-01-01

    A number of storage elements now offer standard protocol interfaces like NFS 4.1/pNFS and WebDAV, for access to their data repositories, in line with the standardization effort of the European Middleware Initiative (EMI). Also the LCG FileCatalogue (LFC) can offer such features. Here we report on work that seeks to exploit the federation potential of these protocols and build a system that offers a unique view of the storage and metadata ensemble and the possibility of integration of other compatible resources such as those from cloud providers. The challenge, here undertaken by the providers of dCache and DPM, and pragmatically open to other Grid and Cloud storage solutions, is to build such a system while being able to accommodate name translations from existing catalogues (e.g. LFCs), experiment- based metadata catalogues, or stateless algorithmic name translations, also known as ”trivial file catalogues”. Such so-called storage federations of standard protocols-based storage elements give a unique vie...

  19. ISS protocol for EPR tooth dosimetry

    International Nuclear Information System (INIS)

    Onori, S.; Aragno, D.; Fattibene, P.; Petetti, E.; Pressello, M.C.

    2000-01-01

    The accuracy in Electron Paramagnetic Resonance (EPR) dose reconstruction with tooth enamel is affected by sample preparation, dosimetric signal amplitude evaluation and unknown dose estimate. Worldwide efforts in the field of EPR dose reconstruction with tooth enamel are focused on the optimization of the three mentioned steps in dose assessment. In the present work, the protocol implemented at ISS in the framework of the European Community Nuclear Fission Safety project 'Dose Reconstruction' is presented. A combined mechanical-chemical procedure for ground enamel sample preparation is used. The signal intensity evaluation is carried out with powder spectra simulation program. Finally, the unknown dose is evaluated individually for each sample with the additive dose method. The unknown dose is obtained by subtracting a mean native dose from the back-extrapolated dose. As an example of the capability of the ISS protocol in unknown dose evaluation, the results obtained in the framework of the 2nd International Intercomparison on EPR tooth enamel dosimetry are reported

  20. Trust and Reciprocity: Are Effort and Money Equivalent?

    Science.gov (United States)

    Vilares, Iris; Dam, Gregory; Kording, Konrad

    2011-01-01

    Trust and reciprocity facilitate cooperation and are relevant to virtually all human interactions. They are typically studied using trust games: one subject gives (entrusts) money to another subject, which may return some of the proceeds (reciprocate). Currently, however, it is unclear whether trust and reciprocity in monetary transactions are similar in other settings, such as physical effort. Trust and reciprocity of physical effort are important as many everyday decisions imply an exchange of physical effort, and such exchange is central to labor relations. Here we studied a trust game based on physical effort and compared the results with those of a computationally equivalent monetary trust game. We found no significant difference between effort and money conditions in both the amount trusted and the quantity reciprocated. Moreover, there is a high positive correlation in subjects' behavior across conditions. This suggests that trust and reciprocity may be character traits: subjects that are trustful/trustworthy in monetary settings behave similarly during exchanges of physical effort. Our results validate the use of trust games to study exchanges in physical effort and to characterize inter-subject differences in trust and reciprocity, and also suggest a new behavioral paradigm to study these differences. PMID:21364931

  1. Private Speech Moderates the Effects of Effortful Control on Emotionality

    Science.gov (United States)

    Day, Kimberly L.; Smith, Cynthia L.; Neal, Amy; Dunsmore, Julie C.

    2018-01-01

    Research Findings: In addition to being a regulatory strategy, children's private speech may enhance or interfere with their effortful control used to regulate emotion. The goal of the current study was to investigate whether children's private speech during a selective attention task moderated the relations of their effortful control to their…

  2. Anticipated emotions and effort allocation in weight goal striving.

    Science.gov (United States)

    Nelissen, Rob M A; de Vet, Emely; Zeelenberg, Marcel

    2011-02-01

    This study aimed to investigate the influence of anticipated emotions on preventive health behaviour if specified at the level of behavioural outcomes. Consistent with predictions from a recently developed model of goal pursuit, we hypothesized that the impact of emotions on effort levels depended on the perceived proximity to the goal. Participants with weight-loss intentions were randomly selected from an Internet panel and completed questionnaires at three points in time, baseline (T1; N= 725), 2 weeks later at T2 (N= 582) and again 2 months later at T3 (N= 528). Questionnaires assessed anticipated emotions (at T1) and experienced emotions (at T2) towards goal attainment and non-attainment. Goal proximity, goal desirability, and effort levels in striving for weight loss were assessed at both T1 and T2. Current and target weights were reported at all three assessments. In line with predictions, we found that negative anticipated emotions towards goal non-attainment resulted in increased effort but only if people perceived themselves in close proximity to their goal. Effort, in turn, predicted weight loss and goal achievement. The current data bear important practical implications as they identify anticipated emotions as targets of behaviour change interventions aimed to stimulate effort in striving for broad, health-related goals like weight loss. ©2010 The British Psychological Society.

  3. ASAP: A MAC Protocol for Dense and Time-Constrained RFID Systems

    Directory of Open Access Journals (Sweden)

    Kyounghwan Lee

    2007-08-01

    Full Text Available We introduce a novel medium access control (MAC protocol for radio frequency identification (RFID systems which exploits the statistical information collected at the reader. The protocol, termed adaptive slotted ALOHA protocol (ASAP, is motivated by the need to significantly improve the total read time performance of the currently suggested MAC protocols for RFID systems. In order to accomplish this task, ASAP estimates the dynamic tag population and adapts the frame size in the subsequent round via a simple policy that maximizes an appropriately defined efficiency function. We demonstrate that ASAP provides significant improvement in total read time performance over the current RFID MAC protocols. We next extend the design to accomplish reliable performance of ASAP in realistic scenarios such as the existence of constraints on frame size, and mobile RFID systems where tags move at constant velocity in the reader's field. We also consider the case where tags may fail to respond because of a physical breakdown or a temporary malfunction, and show the robustness in those scenarios as well.

  4. A study of current world telecommunications and a projection of the future

    Science.gov (United States)

    Karageorgis, Costas

    1992-09-01

    Telecommunications today are important factors in economic and social progress. The last decades of the 20th century and the early years of the 21st have been characterized as the Information Age. Telecommunications, the movement of information through distances, is absolutely critical to the economic and military survival of nations. This thesis is an attempt to predict the future of telecommunications, by studying and analyzing the past and present. First it examines the meaning of telecommunications today and some basics of information transmission. The current status of telecommunications is then presented, by examining the regional profiles as they are divided by the International Telecommunications Union. A number of statistical studies are given, which present a thorough picture of current world telecommunications. In an effort to predict future industry trends, the competition among the three largest telecommunications markets, U.S.A., Japan and the European Community, is also considered by looking at their present telecommunications industry, the efforts they make to improve their technology, and their plans for future investment. Finally, some major technological trends including BISDN, the use of fiber technology in the communications loop, and the use of solitons are examined. The new Metropolitan Area Network Protocol, FDDI-2 is also reviewed.

  5. Eavesdropping on the two-way quantum communication protocols with invisible photons

    Energy Technology Data Exchange (ETDEWEB)

    Cai Qingyu [State Key Laboratory of Magnetics Resonance and Atomic and Molecular Physics, Wuhan Institution of Physics and Mathematics, Chinese Academy of Sciences, Wuhan 430071 (China)]. E-mail: qycai@wipm.ac.cn

    2006-02-20

    The crucial issue of quantum communication protocol is its security. In this Letter, we show that all the deterministic and direct two-way quantum communication protocols, sometimes called ping-pong (PP) protocols, are insecure when an eavesdropper uses the invisible photon to eavesdrop on the communication. With our invisible photon eavesdropping (IPE) scheme, the eavesdropper can obtain full information of the communication with zero risk of being detected. We show that this IPE scheme can be implemented experimentally with current technology. Finally, a possible improvement of PP communication protocols security is proposed00.

  6. Eavesdropping on the two-way quantum communication protocols with invisible photons

    International Nuclear Information System (INIS)

    Cai Qingyu

    2006-01-01

    The crucial issue of quantum communication protocol is its security. In this Letter, we show that all the deterministic and direct two-way quantum communication protocols, sometimes called ping-pong (PP) protocols, are insecure when an eavesdropper uses the invisible photon to eavesdrop on the communication. With our invisible photon eavesdropping (IPE) scheme, the eavesdropper can obtain full information of the communication with zero risk of being detected. We show that this IPE scheme can be implemented experimentally with current technology. Finally, a possible improvement of PP communication protocols security is proposed

  7. An evidence based blunt trauma protocol

    NARCIS (Netherlands)

    Vugt, R. van; Kool, D.R.; Lubeek, S.F.K.; Dekker, H.M.; Brink, M.; Deunk, J.; Edwards, M.J.R.

    2013-01-01

    OBJECTIVE: Currently CT is rapidly implemented in the evaluation of trauma patients. In anticipation of a large international multicentre trial, this study's aim was to evaluate the clinical feasibility of a new diagnostic protocol, used for the primary radiological evaluation in adult blunt

  8. Relapsed or refractory pediatric acute lymphoblastic leukemia: current and emerging treatments.

    Science.gov (United States)

    Martin, Alissa; Morgan, Elaine; Hijiya, Nobuko

    2012-12-01

    Relapsed acute lymphoblastic leukemia (ALL) represents a major cause of morbidity and mortality in pediatrics. With contemporary chemotherapy, >85% of patients with newly diagnosed ALL survive. Unfortunately, 20% of these patients will relapse and for these children, outcomes remain poor despite our best known chemotherapy protocols. Most of these children will achieve a second complete remission, but maintaining this remission remains difficult. Because relapsed ALL is such a significant cause of morbidity and mortality, it is the focus of much research interest. Efforts have been made and continue to focus on understanding the underlying biology that drives relapse. The role of hematopoietic stem cell transplantation in relapsed ALL remains unclear, but many clinicians still favor this for high-risk patients given the poor prognosis with current chemotherapy alone. It is important to use new drugs with little cross-resistance in the treatment of relapsed ALL. New classes of agents are currently being studied. We also discuss prognostic factors and the biology of relapsed ALL.

  9. Inpo/industry job and task analysis efforts

    International Nuclear Information System (INIS)

    Wigley, W.W.

    1985-01-01

    One of the goals of INPO is to develop and coordinate industrywide programs to improve the education, training and qualification of nuclear utility personnel. To accomplish this goal, INPO's Training and Education Division: conducts periodic evaluations of industry training programs; provides assistance to the industry in developing training programs; manages the accreditation of utility training programs. These efforts are aimed at satisfying the need for training programs for nuclear utility personnel to be performance-based. Performance-based means that training programs provide an incumbent with the skills and knowledge required to safely perform the job. One of the ways that INPO has provided assistance to the industry is through the industrywide job and task analysis effort. I will discuss the job analysis and task analysis processes, the current status of JTA efforts, JTA products and JTA lessons learned

  10. Energy-Aware RFID Anti-Collision Protocol.

    Science.gov (United States)

    Arjona, Laura; Simon, Hugo Landaluce; Ruiz, Asier Perallos

    2018-06-11

    The growing interest in mobile devices is transforming wireless identification technologies. Mobile and battery-powered Radio Frequency Identification (RFID) readers, such as hand readers and smart phones, are are becoming increasingly attractive. These RFID readers require energy-efficient anti-collision protocols to minimize the tag collisions and to expand the reader's battery life. Furthermore, there is an increasing interest in RFID sensor networks with a growing number of RFID sensor tags. Thus, RFID application developers must be mindful of tag anti-collision protocols. Energy-efficient protocols involve a low reader energy consumption per tag. This work presents a thorough study of the reader energy consumption per tag and analyzes the main factor that affects this metric: the frame size update strategy. Using the conclusion of this analysis, the anti-collision protocol Energy-Aware Slotted Aloha (EASA) is presented to decrease the energy consumption per tag. The frame size update strategy of EASA is configured to minimize the energy consumption per tag. As a result, EASA presents an energy-aware frame. The performance of the proposed protocol is evaluated and compared with several state of the art Aloha-based anti-collision protocols based on the current RFID standard. Simulation results show that EASA, with an average of 15 mJ consumed per tag identified, achieves a 6% average improvement in the energy consumption per tag in relation to the strategies of the comparison.

  11. Case Based Measles Surveillance in Pune: Evidence to Guide Current and Future Measles Control and Elimination Efforts in India

    Science.gov (United States)

    Bose, Anindya Sekhar; Jafari, Hamid; Sosler, Stephen; Narula, Arvinder Pal Singh; Kulkarni, V. M.; Ramamurty, Nalini; Oommen, John; Jadi, Ramesh S.; Banpel, R. V.; Henao-Restrepo, Ana Maria

    2014-01-01

    Background According to WHO estimates, 35% of global measles deaths in 2011 occurred in India. In 2013, India committed to a goal of measles elimination by 2020. Laboratory supported case based measles surveillance is an essential component of measles elimination strategies. Results from a case-based measles surveillance system in Pune district (November 2009 through December 2011) are reported here with wider implications for measles elimination efforts in India. Methods Standard protocols were followed for case identification, investigation and classification. Suspected measles cases were confirmed through serology (IgM) or epidemiological linkage or clinical presentation. Data regarding age, sex, vaccination status were collected and annualized incidence rates for measles and rubella cases calculated. Results Of the 1011 suspected measles cases reported to the surveillance system, 76% were confirmed measles, 6% were confirmed rubella, and 17% were non-measles, non-rubella cases. Of the confirmed measles cases, 95% were less than 15 years of age. Annual measles incidence rate was more than 250 per million persons and nearly half were associated with outbreaks. Thirty-nine per cent of the confirmed measles cases were vaccinated with one dose of measles vaccine (MCV1). Conclusion Surveillance demonstrated high measles incidence and frequent outbreaks in Pune where MCV1 coverage in infants was above 90%. Results indicate that even high coverage with a single dose of measles vaccine was insufficient to provide population protection and prevent measles outbreaks. An effective measles and rubella surveillance system provides essential information to plan, implement and evaluate measles immunization strategies and monitor progress towards measles elimination. PMID:25290339

  12. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  13. Authentication Protocols for Internet of Things: A Comprehensive Survey

    Directory of Open Access Journals (Sweden)

    Mohamed Amine Ferrag

    2017-01-01

    Full Text Available In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail. These protocols are categorized based on the target environment: (1 Machine to Machine Communications (M2M, (2 Internet of Vehicles (IoV, (3 Internet of Energy (IoE, and (4 Internet of Sensors (IoS. Threat models, countermeasures, and formal security verification techniques used in authentication protocols for the IoT are presented. In addition a taxonomy and comparison of authentication protocols that are developed for the IoT in terms of network model, specific security goals, main processes, computation complexity, and communication overhead are provided. Based on the current survey, open issues are identified and future research directions are proposed.

  14. Automatic Generation of Network Protocol Gateways

    DEFF Research Database (Denmark)

    Bromberg, Yérom-David; Réveillère, Laurent; Lawall, Julia

    2009-01-01

    for describing protocol behaviors, message structures, and the gateway logic.  Z2z includes a compiler that checks essential correctness properties and produces efficient code. We have used z2z to develop a number of gateways, including SIP to RTSP, SLP to UPnP, and SMTP to SMTP via HTTP, involving a range......The emergence of networked devices in the home has made it possible to develop applications that control a variety of household functions. However, current devices communicate via a multitude of incompatible protocols, and thus gateways are needed to translate between them.  Gateway construction......, however, requires an intimate knowledge of the relevant protocols and a substantial understanding of low-level network programming, which can be a challenge for many application programmers. This paper presents a generative approach to gateway construction, z2z, based on a domain-specific language...

  15. An Evaluation of Protocols for UAV Science Applications

    Science.gov (United States)

    Ivancic, William D.; Stewart, David E.; Sullivan, Donald V.; Finch, Patrick E.

    2012-01-01

    This paper identifies data transport needs for current and future science payloads deployed on the NASA Global Hawk Unmanned Aeronautical Vehicle (UAV). The NASA Global Hawk communication system and operational constrains are presented. The Genesis and Rapid Intensification Processes (GRIP) mission is used to provide the baseline communication requirements as a variety of payloads were utilized in this mission. User needs and desires are addressed. Protocols are matched to the payload needs and an evaluation of various techniques and tradeoffs are presented. Such techniques include utilization rate-base selective negative acknowledgement protocols and possible use of protocol enhancing proxies. Tradeoffs of communication architectures that address ease-of-use and security considerations are also presented.

  16. Protocol adaptations to conduct Systematic Literature Reviews in Software Engineering: a chronological study

    Directory of Open Access Journals (Sweden)

    Samuel Sepúlveda

    2015-09-01

    Full Text Available Systematic literature reviews (SLR have reached a considerable level of adoption in Software Engineering (SE, how-ever protocol adaptations for its implementation remain tangentially addressed. This work provides a chronological framework for the use and adaptation of the SLR protocol, including its current status. A systematic literature search was performed, reviewing a set of twelve articles being selected in accordance with the inclusion and exclusion criteria between 2004 and 2013, using digital data sources recognized by the SE community. A chronological framework is provided that includes the current state of the protocol adaptations to conduct SLR in SE. The results indicate areas where the quantity and quality of investigations needs to be increased and the identi- fication of the main proposals providing adaptations for the protocol conducting SLR in SE.

  17. Bayesian adaptive survey protocols for resource management

    Science.gov (United States)

    Halstead, Brian J.; Wylie, Glenn D.; Coates, Peter S.; Casazza, Michael L.

    2011-01-01

    Transparency in resource management decisions requires a proper accounting of uncertainty at multiple stages of the decision-making process. As information becomes available, periodic review and updating of resource management protocols reduces uncertainty and improves management decisions. One of the most basic steps to mitigating anthropogenic effects on populations is determining if a population of a species occurs in an area that will be affected by human activity. Species are rarely detected with certainty, however, and falsely declaring a species absent can cause improper conservation decisions or even extirpation of populations. We propose a method to design survey protocols for imperfectly detected species that accounts for multiple sources of uncertainty in the detection process, is capable of quantitatively incorporating expert opinion into the decision-making process, allows periodic updates to the protocol, and permits resource managers to weigh the severity of consequences if the species is falsely declared absent. We developed our method using the giant gartersnake (Thamnophis gigas), a threatened species precinctive to the Central Valley of California, as a case study. Survey date was negatively related to the probability of detecting the giant gartersnake, and water temperature was positively related to the probability of detecting the giant gartersnake at a sampled location. Reporting sampling effort, timing and duration of surveys, and water temperatures would allow resource managers to evaluate the probability that the giant gartersnake occurs at sampled sites where it is not detected. This information would also allow periodic updates and quantitative evaluation of changes to the giant gartersnake survey protocol. Because it naturally allows multiple sources of information and is predicated upon the idea of updating information, Bayesian analysis is well-suited to solving the problem of developing efficient sampling protocols for species of

  18. Efforts Towards The Development Of Recombinant Vaccines Against

    African Journals Online (AJOL)

    ABSTRACT. Hemorrhagic septicemia is caused by gram-negative bacterium of Pasteurella multocida (P. multocida) strains. Most of the current vaccines against P. multocida have shortcomings. Presently, there is increasing efforts towards construction of recombinant clone for vaccine development against P. multocida.

  19. The Protocol of Choice for Treatment of Snake Bite

    Directory of Open Access Journals (Sweden)

    Afshin Mohammad Alizadeh

    2016-01-01

    Full Text Available The aim of the current study is to compare three different methods of treatment of snake bite to determine the most efficient one. To unify the protocol of snake bite treatment in our center, we retrospectively reviewed files of the snake-bitten patients who had been referred to us between 2010 and 2014. They were contacted for follow-up using phone calls. Demographic and on-arrival characteristics, protocol used for treatment (WHO/Haddad/GF, and outcome/complications were evaluated. Patients were entered into one of the protocol groups and compared. Of a total of 63 patients, 56 (89% were males. Five, 19, and 28 patients were managed by Haddad, WHO, or GF protocols, respectively. Eleven patients had fallen into both GF and WHO protocols and were excluded. Serum sickness was significantly more common when WHO protocol was used while 100% of the compartment syndromes and 71% of deformities had been reported after GF protocol. The most important complications were considered to be deformity, compartment syndrome, and amputation and were more frequent after the use of WHO and GF protocols (23.1% versus 76.9%; none in Haddad; P = NS. Haddad protocol seems to be the best for treatment of snake-bitten patients in our region. However, this cannot be strictly concluded because of the limited sample size and nonsignificant P values.

  20. An Overview and Analysis of Mobile Internet Protocols in Cellular Environments.

    Science.gov (United States)

    Chao, Han-Chieh

    2001-01-01

    Notes that cellular is the inevitable future architecture for the personal communication service system. Discusses the current cellular support based on Mobile Internet Protocol version 6 (Ipv6) and points out the shortfalls of using Mobile IP. Highlights protocols especially for mobile management schemes which can optimize a high-speed mobile…

  1. Protocol notions from the bibliography of his authorities

    Directory of Open Access Journals (Sweden)

    Dra. María Luz Álvarez Rodríguez

    2008-01-01

    Full Text Available Protocol is a subject that has suffered great changes over the last years in Spain. Its presence at university training has shifted from being a mere anecdote to becoming one more subject to be taught in postgraduate courses endorsed by a big social and professional demand. With the aim of announcing Protocol as a subject to the Spanish academic field, the present article carries out a study of the theoretical situation of this subject and profession in Spain. This research means to get to know the scientific character of Protocol, at the same time as it tries to found such professional side in the current offer of courses and of training. For this reason, this research could be interesting for the Spanish academic field, by helping to explain the reality of Protocol in Spain and to impel its theoretical development in our country.

  2. Protocols for Monitoring Habitat Restoration Projects in the Lower Columbia River and Estuary

    Energy Technology Data Exchange (ETDEWEB)

    Roegner, G. Curtis; Diefenderfer, Heida L.; Borde, Amy B.; Thom, Ronald M.; Dawley, Earl M.; Whiting, Allan H.; Zimmerman, Shon A.; Johnson, Gary E.

    2008-04-25

    Protocols for monitoring salmon habitat restoration projects are essential for the U.S. Army Corps of Engineers' environmental efforts in the Columbia River estuary. This manual provides state-of-the science data collection and analysis methods for landscape features, water quality, and fish species composition, among others.

  3. Compositional mining of multiple object API protocols through state abstraction.

    Science.gov (United States)

    Dai, Ziying; Mao, Xiaoguang; Lei, Yan; Qi, Yuhua; Wang, Rui; Gu, Bin

    2013-01-01

    API protocols specify correct sequences of method invocations. Despite their usefulness, API protocols are often unavailable in practice because writing them is cumbersome and error prone. Multiple object API protocols are more expressive than single object API protocols. However, the huge number of objects of typical object-oriented programs poses a major challenge to the automatic mining of multiple object API protocols: besides maintaining scalability, it is important to capture various object interactions. Current approaches utilize various heuristics to focus on small sets of methods. In this paper, we present a general, scalable, multiple object API protocols mining approach that can capture all object interactions. Our approach uses abstract field values to label object states during the mining process. We first mine single object typestates as finite state automata whose transitions are annotated with states of interacting objects before and after the execution of the corresponding method and then construct multiple object API protocols by composing these annotated single object typestates. We implement our approach for Java and evaluate it through a series of experiments.

  4. Performance analysis of routing protocols for IoT

    Science.gov (United States)

    Manda, Sridhar; Nalini, N.

    2018-04-01

    Internet of Things (IoT) is an arrangement of advancements that are between disciplinary. It is utilized to have compelling combination of both physical and computerized things. With IoT physical things can have personal virtual identities and participate in distributed computing. Realization of IoT needs the usage of sensors based on the sector for which IoT is integrated. For instance, in healthcare domain, IoT needs to have integration with wearable sensors used by patients. As sensor devices produce huge amount of data, often called big data, there should be efficient routing protocols in place. To the extent remote systems is worried there are some current protocols, for example, OLSR, DSR and AODV. It additionally tosses light into Trust based routing protocol for low-power and lossy systems (TRPL) for IoT. These are broadly utilized remote directing protocols. As IoT is developing round the corner, it is basic to investigate routing protocols that and evaluate their execution regarding throughput, end to end delay, and directing overhead. The execution experiences can help in settling on very much educated choices while incorporating remote systems with IoT. In this paper, we analyzed different routing protocols and their performance is compared. It is found that AODV showed better performance than other routing protocols aforementioned.

  5. Simple proof of the unconditional security of the Bennett 1992 quantum key distribution protocol

    International Nuclear Information System (INIS)

    Zhang Quan; Tang Chaojing

    2002-01-01

    It is generally accepted that quantum key distribution (QKD) could supply legitimate users with unconditional security during their communication. Quite a lot of satisfactory efforts have been achieved on experimentations with quantum cryptography. However, when the eavesdropper has extra-powerful computational ability, has access to a quantum computer, for example, and can carry into execution any eavesdropping measurement that is allowed by the laws of physics, the security against such attacks has not been widely studied and rigorously proved for most QKD protocols. Quite recently, Shor and Preskill proved concisely the unconditional security of the Bennett-Brassard 1984 (BB84) protocol. Their method is highly valued for its clarity of concept and concision of form. In order to take advantage of the Shor-Preskill technique in their proof of the unconditional security of the BB84 QKD protocol, we introduced in this paper a transformation that can translate the Bennett 1992 (B92) protocol into the BB84 protocol. By proving that the transformation leaks no more information to the eavesdropper, we proved the unconditional security of the B92 protocol. We also settled the problem proposed by Lo about how to prove the unconditional security of the B92 protocol with the Shor-Preskill method

  6. Australian high-dose-rate brachytherapy protocols for gynaecological malignancy

    International Nuclear Information System (INIS)

    MacLeod, C.; Dally, M.; Stevens, M.; Thornton, D.; Carruthers, S.; Jeal, P.

    2001-01-01

    There is no consensus over the optimal dose fractionation schedules for high-dose-rate (HDR) brachytherapy used for gynaecological malignancy. In Australian public hospital departments of radiation oncology, HDR brachytherapy for gynaecological cancer is being more commonly used. A survey of public departments that are using this technology, or that plan to introduce this technology, was performed. Their current protocols are presented. In general, protocols are similar biologically; however, the practical aspects such as the number of fractions given do vary and may reflect resource restrictions or, alternatively, differences in interpretations of the literature and of the best protocols by clinicians. Copyright (2001) Blackwell Science Pty Ltd

  7. WE-E-304-00: Implementing SBRT Protocols

    International Nuclear Information System (INIS)

    2015-01-01

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective even unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation

  8. WE-E-304-00: Implementing SBRT Protocols

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2015-06-15

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective even unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation.

  9. Solar Flare Prediction Science-to-Operations: the ESA/SSA SWE A-EFFort Service

    Science.gov (United States)

    Georgoulis, Manolis K.; Tziotziou, Konstantinos; Themelis, Konstantinos; Magiati, Margarita; Angelopoulou, Georgia

    2016-07-01

    We attempt a synoptical overview of the scientific origins of the Athens Effective Solar Flare Forecasting (A-EFFort) utility and the actions taken toward transitioning it into a pre-operational service of ESA's Space Situational Awareness (SSA) Programme. The preferred method for solar flare prediction, as well as key efforts to make it function in a fully automated environment by coupling calculations with near-realtime data-downloading protocols (from the Solar Dynamics Observatory [SDO] mission), pattern recognition (solar active-region identification) and optimization (magnetic connectivity by simulated annealing) will be highlighted. In addition, the entire validation process of the service will be described, with its results presented. We will conclude by stressing the need for across-the-board efforts and synergistic work in order to bring science of potentially limited/restricted interest into realizing a much broader impact and serving the best public interests. The above presentation was partially supported by the ESA/SSA SWE A-EFFort project, ESA Contract No. 4000111994/14/D/MRP. Special thanks go to the ESA Project Officers R. Keil, A. Glover, and J.-P. Luntama (ESOC), M. Bobra and C. Balmer of the SDO/HMI team at Stanford University, and M. Zoulias at the RCAAM of the Academy of Athens for valuable technical help.

  10. A Self-Stabilizing Hybrid Fault-Tolerant Synchronization Protocol

    Science.gov (United States)

    Malekpour, Mahyar R.

    2015-01-01

    This paper presents a strategy for solving the Byzantine general problem for self-stabilizing a fully connected network from an arbitrary state and in the presence of any number of faults with various severities including any number of arbitrary (Byzantine) faulty nodes. The strategy consists of two parts: first, converting Byzantine faults into symmetric faults, and second, using a proven symmetric-fault tolerant algorithm to solve the general case of the problem. A protocol (algorithm) is also present that tolerates symmetric faults, provided that there are more good nodes than faulty ones. The solution applies to realizable systems, while allowing for differences in the network elements, provided that the number of arbitrary faults is not more than a third of the network size. The only constraint on the behavior of a node is that the interactions with other nodes are restricted to defined links and interfaces. The solution does not rely on assumptions about the initial state of the system and no central clock nor centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. A mechanical verification of a proposed protocol is also present. A bounded model of the protocol is verified using the Symbolic Model Verifier (SMV). The model checking effort is focused on verifying correctness of the bounded model of the protocol as well as confirming claims of determinism and linear convergence with respect to the self-stabilization period.

  11. Efficacy of transcranial direct-current stimulation (tDCS) in women with provoked vestibulodynia: study protocol for a randomized controlled trial.

    Science.gov (United States)

    Morin, Annie; Léonard, Guillaume; Gougeon, Véronique; Waddell, Guy; Bureau, Yves-André; Girard, Isabelle; Morin, Mélanie

    2016-05-14

    Provoked vestibulodynia is the most common form of vulvodynia. Despite its high prevalence and deleterious sexual, conjugal, and psychological repercussions, effective evidence-based interventions for provoked vestibulodynia remain limited. For a high proportion of women, significant pain persists despite the currently available treatments. Growing evidence suggests that the central nervous system (CNS) could play a key role in provoked vestibulodynia; thus, treatment targeting the CNS, rather than localized dysfunctions, may be beneficial for women suffering from provoked vestibulodynia. In this study, we aim to build on the promising results of a previous case report and evaluate whether transcranial direct-current stimulation, a non-invasive brain stimulation technique targeting the CNS, could be an effective treatment option for women with provoked vestibulodynia. This single-center, triple-blind, parallel group, randomized, controlled trial aims to compare the efficacy of transcranial direct-current stimulation with sham transcranial direct-current stimulation in women with provoked vestibulodynia. Forty women diagnosed with provoked vestibulodynia by a gynecologist, following a standardized treatment protocol, are randomized to either active transcranial direct-current stimulation treatment for ten sessions of 20 minutes at an intensity of 2 mA or sham transcranial direct-current stimulation over a 2-week period. Outcome measures are collected at baseline, 2 weeks after treatment and at 3-month follow-up. The primary outcome is pain during intercourse, assessed with a numerical rating scale. Secondary measurements focus on the sexual function, vestibular pain sensitivity, psychological distress, treatment satisfaction, and the patient's global impression of change. To our knowledge, this study is the first randomized controlled trial to examine the efficacy of transcranial direct-current stimulation in women with provoked vestibulodynia. Findings from this

  12. Overview of NASA/OAST efforts related to manufacturing technology

    Science.gov (United States)

    Saunders, N. T.

    1976-01-01

    An overview of some of NASA's current efforts related to manufacturing technology and some possible directions for the future are presented. The topics discussed are: computer-aided design, composite structures, and turbine engine components.

  13. Efforts towards the development of recombinant Vaccines against ...

    African Journals Online (AJOL)

    Hemorrhagic septicemia is caused by gram-negative bacterium of Pasteurella multocida (P. multocida) strains. Most of the current vaccines against P. multocida have shortcomings. Presently, there is increasing efforts towards construction of recombinant clone for vaccine development against P. multocida. In this review an ...

  14. Safeguards agreement and additional protocol - IAEA instruments for control of nuclear materials distribution and their application in Tajikistan

    International Nuclear Information System (INIS)

    Nasrulloev, Kh.; Mirsaidov, U.

    2010-01-01

    Full text: It is known that IAEA plays an important role in facilitation of nuclear non-proliferation as international authority which carries out nuclear inspections. Republic of Tajikistan in 1997 signed nuclear weapon non-proliferation treaty. Then in 2004 Safeguards agreement, additional protocol and small quantity protocol were signed. During 5 years Republic of Tajikistan submits information on its nuclear activity as declarations, foreseen in article 2.3 of Additional protocol to Safeguards agreement. Currently 66 declarations are submitted. Information required in accordance with Safeguards agreement and Additional Protocol is figured on that IAEA could compile more detailed and exact conception about nuclear activity in Tajikistan and it has the following purpose: information will lead to more transparency, and make it possible to IAEA to ensure with high extent of confidence that in the framework of declared program, any unstated nuclear activity is concealed; the more exact and comprehensive information, the rare is questions and discrepancies are originating; required information is the basis for effective planning and IAEA activity realization, related not only with safeguards implementation in regard to declared nuclear material but also ensuring of confidence in absence of undeclared nuclear activity in Tajikistan. IAEA inspection mission consisting of Messrs. N.Lazarev and F. Coillou visited Dushanbe in 2008 for verification of republic’s declarations on account for and control of nuclear materials under Additional protocol and Small quantity protocol, as well as consultations were provided on correct declaration completing and providing information on all nuclear materials. Besides, in 2006, the training course was conducted in Chkalovsk with participation of Commonwealth of Independent States countries on Safeguards agreement and Additional protocol. These visits and events will facilitate to strengthening of weapons of mass destruction non

  15. Protocols for pressure ulcer prevention: are they evidence-based?

    Science.gov (United States)

    Chaves, Lidice M; Grypdonck, Mieke H F; Defloor, Tom

    2010-03-01

    This study is a report of a study to determine the quality of protocols for pressure ulcer prevention in home care in the Netherlands. If pressure ulcer prevention protocols are evidence-based and practitioners use them correctly in practice, this will result a reduction in pressure ulcers. Very little is known about the evidence-based content and quality of the pressure ulcer prevention protocols. In 2008, current pressure ulcer prevention protocols from 24 home-care agencies in the Netherlands were evaluated. A checklist developed and validated by two pressure ulcer prevention experts was used to assess the quality of the protocols, and weighted and unweighted quality scores were computed and analysed using descriptive statistics. The 24 pressure ulcer prevention protocols had a mean weighted quality score of 63.38 points out of a maximum of 100 (sd 5). The importance of observing the skin at the pressure points at least once a day was emphasized in 75% of the protocols. Only 42% correctly warned against the use of materials that were 'less effective or that could potentially cause harm'. Pressure ulcer prevention commands a reasonable amount of attention in home care, but the incidence of pressure ulcers and lack of a consistent, standardized document for use in actual practice indicate a need for systematic implementation of national pressure ulcer prevention standards in the Netherlands to ensure adherence to the established protocols.

  16. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  17. Current Efforts in European Projects to Facilitate the Sharing of Scientific Observation Data

    Science.gov (United States)

    Bredel, Henning; Rieke, Matthes; Maso, Joan; Jirka, Simon; Stasch, Christoph

    2017-04-01

    This presentation is intended to provide an overview of currently ongoing efforts in European projects to facilitate and promote the interoperable sharing of scientific observation data. This will be illustrated through two examples: a prototypical portal developed in the ConnectinGEO project for matching available (in-situ) data sources to the needs of users and a joint activity of several research projects to harmonise the usage of the OGC Sensor Web Enablement standards for providing access to marine observation data. ENEON is an activity initiated by the European ConnectinGEO project to coordinate in-situ Earth observation networks with the aim to harmonise the access to observations, improve discoverability, and identify/close gaps in European earth observation data resources. In this context, ENEON commons has been developed as a supporting Web portal for facilitating discovery, access, re-use and creation of knowledge about observations, networks, and related activities (e.g. projects). The portal is based on developments resulting from the European WaterInnEU project and has been extended to cover the requirements for handling knowledge about in-situ earth observation networks. A first prototype of the portal was completed in January 2017 which offers functionality for interactive discussion, information exchange and querying information about data delivered by different observation networks. Within this presentation, we will introduce the presented prototype and initiate a discussion about potential future work directions. The second example concerns the harmonisation of data exchange in the marine domain. There are many organisation who operate ocean observatories or data archives. In recent years, the application of the OGC Sensor Web Enablement (SWE) technology has become more and more popular to increase the interoperability between marine observation networks. However, as the SWE standards were intentionally designed in a domain independent manner

  18. Reviewing efforts in global forest conservation for sustainable forest ...

    African Journals Online (AJOL)

    Reviewing efforts in global forest conservation for sustainable forest management: The World Wide Fund (WWF) case study. ... Global Journal of Pure and Applied Sciences. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current ...

  19. Sinusoidal voltage protocols for rapid characterisation of ion channel kinetics.

    Science.gov (United States)

    Beattie, Kylie A; Hill, Adam P; Bardenet, Rémi; Cui, Yi; Vandenberg, Jamie I; Gavaghan, David J; de Boer, Teun P; Mirams, Gary R

    2018-03-24

    Ion current kinetics are commonly represented by current-voltage relationships, time constant-voltage relationships and subsequently mathematical models fitted to these. These experiments take substantial time, which means they are rarely performed in the same cell. Rather than traditional square-wave voltage clamps, we fitted a model to the current evoked by a novel sum-of-sinusoids voltage clamp that was only 8 s long. Short protocols that can be performed multiple times within a single cell will offer many new opportunities to measure how ion current kinetics are affected by changing conditions. The new model predicts the current under traditional square-wave protocols well, with better predictions of underlying currents than literature models. The current under a novel physiologically relevant series of action potential clamps is predicted extremely well. The short sinusoidal protocols allow a model to be fully fitted to individual cells, allowing us to examine cell-cell variability in current kinetics for the first time. Understanding the roles of ion currents is crucial to predict the action of pharmaceuticals and mutations in different scenarios, and thereby to guide clinical interventions in the heart, brain and other electrophysiological systems. Our ability to predict how ion currents contribute to cellular electrophysiology is in turn critically dependent on our characterisation of ion channel kinetics - the voltage-dependent rates of transition between open, closed and inactivated channel states. We present a new method for rapidly exploring and characterising ion channel kinetics, applying it to the hERG potassium channel as an example, with the aim of generating a quantitatively predictive representation of the ion current. We fitted a mathematical model to currents evoked by a novel 8 second sinusoidal voltage clamp in CHO cells overexpressing hERG1a. The model was then used to predict over 5 minutes of recordings in the same cell in response to

  20. Modelling and Initial Validation of the DYMO Routing Protocol for Mobile Ad-Hoc Networks

    DEFF Research Database (Denmark)

    Espensen, Kristian Asbjørn Leth; Kjeldsen, Mads Keblov; Kristensen, Lars Michael

    2008-01-01

    A mobile ad-hoc network (MANET) is an infrastructureless network established by a set of mobile devices using wireless communication. The Dynamic MANET On-demand (DYMO) protocol is a routing protocol for multi-hop communication in MANETs currently under development by the Internet Engineering Task...... Force (IETF). This paper presents a Coloured Petri Net (CPN) model of the mandatory parts of the DYMO protocol, and shows how scenario-based state space exploration has been used to validate key properties of the protocol. Our CPN modelling and verification work has spanned two revisions of the DYMO...... protocol specification and have had direct impact on the most recent version of the protocol specification....

  1. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  2. Dynamic federations: storage aggregation using open tools and protocols

    International Nuclear Information System (INIS)

    Furano, Fabrizio; Brito da Rocha, Ricardo; Devresse, Adrien; Keeble, Oliver; Álvarez Ayllón, Alejandro; Fuhrmann, Patrick

    2012-01-01

    A number of storage elements now offer standard protocol interfaces like NFS 4.1/pNFS and WebDAV, for access to their data repositories, in line with the standardization effort of the European Middleware Initiative (EMI). Also the LCG FileCatalogue (LFC) can offer such features. Here we report on work that seeks to exploit the federation potential of these protocols and build a system that offers a unique view of the storage and metadata ensemble and the possibility of integration of other compatible resources such as those from cloud providers. The challenge, here undertaken by the providers of dCache and DPM, and pragmatically open to other Grid and Cloud storage solutions, is to build such a system while being able to accommodate name translations from existing catalogues (e.g. LFCs), experiment-based metadata catalogues, or stateless algorithmic name translations, also known as “trivial file catalogues”. Such so-called storage federations of standard protocols-based storage elements give a unique view of their content, thus promoting simplicity in accessing the data they contain and offering new possibilities for resilience and data placement strategies. The goal is to consider HTTP and NFS4.1-based storage elements and metadata catalogues and make them able to cooperate through an architecture that properly feeds the redirection mechanisms that they are based upon, thus giving the functionalities of a “loosely coupled” storage federation. One of the key requirements is to use standard clients (provided by OS'es or open source distributions, e.g. Web browsers) to access an already aggregated system; this approach is quite different from aggregating the repositories at the client side through some wrapper API, like for instance GFAL, or by developing new custom clients. Other technical challenges that will determine the success of this initiative include performance, latency and scalability, and the ability to create worldwide storage federations that

  3. A Self-Stabilizing Hybrid-Fault Tolerant Synchronization Protocol

    Science.gov (United States)

    Malekpour, Mahyar R.

    2014-01-01

    In this report we present a strategy for solving the Byzantine general problem for self-stabilizing a fully connected network from an arbitrary state and in the presence of any number of faults with various severities including any number of arbitrary (Byzantine) faulty nodes. Our solution applies to realizable systems, while allowing for differences in the network elements, provided that the number of arbitrary faults is not more than a third of the network size. The only constraint on the behavior of a node is that the interactions with other nodes are restricted to defined links and interfaces. Our solution does not rely on assumptions about the initial state of the system and no central clock nor centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. We also present a mechanical verification of a proposed protocol. A bounded model of the protocol is verified using the Symbolic Model Verifier (SMV). The model checking effort is focused on verifying correctness of the bounded model of the protocol as well as confirming claims of determinism and linear convergence with respect to the self-stabilization period. We believe that our proposed solution solves the general case of the clock synchronization problem.

  4. Promoting communication with older adults: protocols for resolving interpersonal conflicts and for enhancing interactions with doctors.

    Science.gov (United States)

    Weitzman, Patricia Flynn; Weitzman, Eben A

    2003-07-01

    In this paper, we review the importance of effective communication in older adulthood, and ideas for promoting it. We focus on theoretical and applied work in two communicative encounters that have particular relevance for older adult health, i.e., interpersonal conflict and visits with a healthcare provider. Little applied work has aimed to adapt training protocols for older adults in these two areas. We will present training protocols we have developed in constructive conflict resolution for older adults, and on enhancing doctor-patient communication. We present these protocols to stimulate ideas on the part of the reader on how to further develop and refine training efforts for older adults in effective communication.

  5. Two Phases Authentication Level (TPAL) protocol for nodes ...

    African Journals Online (AJOL)

    ... node may contain sensitive informations such as military data and monitoring data. ... LLN is a kind of Internet of Things (IoT) network with limited power source ... Current authentication Internet protocols cannot be adopted directly into LLN ...

  6. PERFORMANCE ANALYSIS OF DISTINCT SECURED AUTHENTICATION PROTOCOLS USED IN THE RESOURCE CONSTRAINED PLATFORM

    Directory of Open Access Journals (Sweden)

    S. Prasanna

    2014-03-01

    Full Text Available Most of the e-commerce and m-commerce applications in the current e-business world, has adopted asymmetric key cryptography technique in their authentication protocol to provide an efficient authentication of the involved parties. This paper exhibits the performance analysis of distinct authentication protocol which implements the public key cryptography like RSA, ECC and HECC. The comparison is made based on key generation, sign generation and sign verification processes. The results prove that the performance achieved through HECC based authentication protocol is better than the ECC- and RSA based authentication protocols.

  7. Effects of a common transcranial direct current stimulation (tDCS) protocol on motor evoked potentials found to be highly variable within individuals over 9 testing sessions.

    Science.gov (United States)

    Horvath, Jared Cooney; Vogrin, Simon J; Carter, Olivia; Cook, Mark J; Forte, Jason D

    2016-09-01

    Transcranial direct current stimulation (tDCS) uses a weak electric current to modulate neuronal activity. A neurophysiologic outcome measure to demonstrate reliable tDCS modulation at the group level is transcranial magnetic stimulation engendered motor evoked potentials (MEPs). Here, we conduct a study testing the reliability of individual MEP response patterns following a common tDCS protocol. Fourteen participants (7m/7f) each underwent nine randomized sessions of 1 mA, 10 min tDCS (3 anode; 3 cathode; 3 sham) delivered using an M1/orbito-frontal electrode montage (sessions separated by an average of ~5.5 days). Fifteen MEPs were obtained prior to, immediately following and in 5 min intervals for 30 min following tDCS. TMS was delivered at 130 % resting motor threshold using neuronavigation to ensure consistent coil localization. A number of non-experimental variables were collected during each session. At the individual level, considerable variability was seen among different testing sessions. No participant demonstrated an excitatory response ≥20 % to all three anodal sessions, and no participant demonstrated an inhibitory response ≥20 % to all three cathodal sessions. Intra-class correlation revealed poor anodal and cathodal test-retest reliability [anode: ICC(2,1) = 0.062; cathode: ICC(2,1) = 0.055] and moderate sham test-retest reliability [ICC(2,1) = 0.433]. Results also revealed no significant effect of tDCS at the group level. Using this common protocol, we found the effects of tDCS on MEP amplitudes to be highly variable at the individual level. In addition, no significant effects of tDCS on MEP amplitude were found at the group level. Future studies should consider utilizing a more strict experimental protocol to potentially account for intra-individual response variations.

  8. Detection of suboptimal effort with symbol span: development of a new embedded index.

    Science.gov (United States)

    Young, J Christopher; Caron, Joshua E; Baughman, Brandon C; Sawyer, R John

    2012-03-01

    Developing embedded indicators of suboptimal effort on objective neurocognitive testing is essential for detecting increasingly sophisticated forms of symptom feigning. The current study explored whether Symbol Span, a novel Wechsler Memory Scale-fourth edition measure of supraspan visual attention, could be used to discriminate adequate effort from suboptimal effort. Archival data were collected from 136 veterans classified into Poor Effort (n = 42) and Good Effort (n = 94) groups based on symptom validity test (SVT) performance. The Poor Effort group had significantly lower raw scores (p Span test. A raw score cutoff of Span can effectively differentiate veterans with multiple failures on established free-standing and embedded SVTs.

  9. Innovation Efforts in Education and School Administration: Views of Turkish School Administrators

    Science.gov (United States)

    Akin, Ugur

    2016-01-01

    Problem Statement: In the current information era, nearly all organizations make efforts to make innovations in the fields of information, communication, technology, etc. Educational organizations are no exception to this trend. Moreover, it can be argued that educational institutions make a particular effort to rapidly keep pace with change. In…

  10. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  11. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  12. Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols

    NARCIS (Netherlands)

    Pettorossi, Alberto; Delzanno, Giorgio; Etalle, Sandro

    2001-01-01

    We define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of principals and the current global state of the session. Hereby, we can describe the operational semantics of principals and of an intruder

  13. Physics Education Research efforts to promote diversity: Challenges and opportunities

    Science.gov (United States)

    Brahmia, Suzanne

    2015-04-01

    We begin this talk with a brief description of the gender and ethnic diversity of the physics community. We then discuss several current efforts within Physics Education Research that have the potential to further our understanding of issues surrounding underrepresentation. These efforts include research into (1) the role of community and strategies for developing effective communities; (2) physics identity and self-efficacy; (3) the affordances that students from underrepresented groups bring to physics learning; (4) socioeconomics and its impact on mathematization. One of the challenges to conducting this research is the relatively small proportion of underrepresented minority students in current physics classes, and the small number of women in physics and engineering majors. In collaboration with Stephen Kanim, New Mexico State University.

  14. SU-F-I-46: Optimizing Dose Reduction in Adult Head CT Protocols While Maintaining Image Quality in Postmortem Head Scans

    International Nuclear Information System (INIS)

    Lipnharski, I; Carranza, C; Quails, N; Correa, N; Rajderkar, D; Bennett, J; Rill, L; Arreola, M

    2016-01-01

    Purpose: To optimize adult head CT protocol by reducing dose to an appropriate level while providing CT images of diagnostic quality. Methods: Five cadavers were scanned from the skull base to the vertex using a routine adult head CT protocol (120 kVp, 270 mA, 0.75 s rotation, 0.5 mm × 32 detectors, 70.8 mGy CTDIvol) followed by seven reduced-dose protocols with varying combinations of reduced tube current, reduced rotation time, and increased detectors with CTDIvol ranging from 38.2 to 65.6 mGy. Organ doses were directly measured with 21 OSL dosimeters placed on the surface and implanted in the head by a neurosurgeon. Two neuroradiologists assessed grey-white matter differentiation, fluid space, ventricular size, midline shift, brain mass, edema, ischemia, and skull fractures on a three point scale: (1) Unacceptable, (2) Borderline Acceptable, and (3) Acceptable. Results: For the standard scan, doses to the skin, lens of the eye, salivary glands, thyroid, and brain were 37.55 mGy, 49.65 mGy, 40.67 mGy, 4.63 mGy, and 27.33 mGy, respectively. Two cadavers had cerebral edema due to changing dynamics of postmortem effects, causing the grey-white matter differentiation to appear less distinct. Two cadavers with preserved grey-white matter received acceptable scores for all image quality features for the protocol with a CTDIvol of 57.3 mGy, allowing organ dose savings ranging from 34% to 45%. One cadaver allowed for greater dose reduction for the protocol with a CTDIvol of 42 mGy. Conclusion: Efforts to optimize scan protocol should consider both dose and clinical image quality. This is made possible with postmortem subjects, whose brains are similar to patients, allowing for an investigation of ideal scan parameters. Radiologists at our institution accepted scan protocols acquired with lower scan parameters, with CTDIvol values closer to the American College of Radiology’s (ACR) Achievable Dose level of 57 mGy.

  15. SU-F-I-46: Optimizing Dose Reduction in Adult Head CT Protocols While Maintaining Image Quality in Postmortem Head Scans

    Energy Technology Data Exchange (ETDEWEB)

    Lipnharski, I; Carranza, C; Quails, N; Correa, N; Rajderkar, D; Bennett, J; Rill, L; Arreola, M [University of Florida, Gainesville, FL (United States)

    2016-06-15

    Purpose: To optimize adult head CT protocol by reducing dose to an appropriate level while providing CT images of diagnostic quality. Methods: Five cadavers were scanned from the skull base to the vertex using a routine adult head CT protocol (120 kVp, 270 mA, 0.75 s rotation, 0.5 mm × 32 detectors, 70.8 mGy CTDIvol) followed by seven reduced-dose protocols with varying combinations of reduced tube current, reduced rotation time, and increased detectors with CTDIvol ranging from 38.2 to 65.6 mGy. Organ doses were directly measured with 21 OSL dosimeters placed on the surface and implanted in the head by a neurosurgeon. Two neuroradiologists assessed grey-white matter differentiation, fluid space, ventricular size, midline shift, brain mass, edema, ischemia, and skull fractures on a three point scale: (1) Unacceptable, (2) Borderline Acceptable, and (3) Acceptable. Results: For the standard scan, doses to the skin, lens of the eye, salivary glands, thyroid, and brain were 37.55 mGy, 49.65 mGy, 40.67 mGy, 4.63 mGy, and 27.33 mGy, respectively. Two cadavers had cerebral edema due to changing dynamics of postmortem effects, causing the grey-white matter differentiation to appear less distinct. Two cadavers with preserved grey-white matter received acceptable scores for all image quality features for the protocol with a CTDIvol of 57.3 mGy, allowing organ dose savings ranging from 34% to 45%. One cadaver allowed for greater dose reduction for the protocol with a CTDIvol of 42 mGy. Conclusion: Efforts to optimize scan protocol should consider both dose and clinical image quality. This is made possible with postmortem subjects, whose brains are similar to patients, allowing for an investigation of ideal scan parameters. Radiologists at our institution accepted scan protocols acquired with lower scan parameters, with CTDIvol values closer to the American College of Radiology’s (ACR) Achievable Dose level of 57 mGy.

  16. Replacing the CCSDS Telecommand Protocol with the Next Generation Uplink (NGU)

    Science.gov (United States)

    Kazz, Greg J.; Greenberg, Ed; Burleigh, Scott C.

    2012-01-01

    The current CCSDS Telecommand (TC) Recommendations 1-3 have essentially been in use since the early 1960s. The purpose of this paper is to propose a successor protocol to TC. The current CCSDS recommendations can only accommodate telecommand rates up to approximately 1 mbit/s. However today's spacecraft are storehouses for software including software for Field Programmable Gate Arrays (FPGA) which are rapidly replacing unique hardware systems. Changes to flight software occasionally require uplinks to deliver very large volumes of data. In the opposite direction, high rate downlink missions that use acknowledged CCSDS File Delivery Protocol (CFDP)4 will increase the uplink data rate requirements. It is calculated that a 5 mbits/s downlink could saturate a 4 kbits/s uplink with CFDP downlink responses: negative acknowledgements (NAKs), FINISHs, End-of-File (EOF), Acknowledgements (ACKs). Moreover, it is anticipated that uplink rates of 10 to 20 mbits/s will be required to support manned missions. The current TC recommendations cannot meet these new demands. Specifically, they are very tightly coupled to the Bose-Chaudhuri-Hocquenghem (BCH) code in Ref. 2. This protocol requires that an uncorrectable BCH codeword delimit the TC frame and terminate the randomization process. This method greatly limits telecom performance since only the BCH code can support the protocol. More modern techniques such as the CCSDS Low Density Parity Check (LDPC)5 codes can provide a minimum performance gain of up to 6 times higher command data rates as long as sufficient power is available in the data. This paper will describe the proposed protocol format, trade-offs, and advantages offered, along with a discussion of how reliable communications takes place at higher nominal rates.

  17. Improvement of burn pain management through routine pain monitoring and pain management protocol.

    Science.gov (United States)

    Yang, Hyeong Tae; Hur, Giyeun; Kwak, In-Suk; Yim, Haejun; Cho, Yong Suk; Kim, Dohern; Hur, Jun; Kim, Jong Hyun; Lee, Boung Chul; Seo, Cheong Hoon; Chun, Wook

    2013-06-01

    Pain management is an important aspect of burn management. We developed a routine pain monitoring system and pain management protocol for burn patients. The purpose of this study is to evaluate the effectiveness of our new pain management system. From May 2011 to November 2011, the prospective study was performed with 107 burn patients. We performed control group (n=58) data analysis and then developed the pain management protocol and monitoring system. Next, we applied our protocol to patients and performed protocol group (n=49) data analysis, and compared this to control group data. Data analysis was performed using the Numeric Rating Scale (NRS) of background pain and procedural pain, Clinician-Administered PTSD Scale (CAPS), Hamilton Depression Rating Scale (HDRS), State-Trait Anxiety Inventory Scale (STAIS), and Holmes and Rahe Stress Scale (HRSS). The NRS of background pain for the protocol group was significantly decreased compared to the control group (2.8±2.0 versus 3.9±1.9), and the NRS of procedural pain of the protocol group was significantly decreased compared to the control group (4.8±2.8 versus 3.7±2.5). CAPS and HDRS were decreased in the protocol group, but did not have statistical significance. STAIS and HRSS were decreased in the protocol group, but only the STAIS had statistical significance. Our new pain management system was effective in burn pain management. However, adequate pain management can only be accomplished by a continuous and thorough effort. Therefore, pain control protocol and pain monitoring systems need to be under constant revision and improvement using creative ideas and approaches. Copyright © 2012 Elsevier Ltd and ISBI. All rights reserved.

  18. On the Performance of the Current MANET Routing Protocols for VoIP, HTTP, and FTP Applications

    Directory of Open Access Journals (Sweden)

    Waheb A. Jabbar

    2014-01-01

    Full Text Available The recent advances of ensemble mobile environment of smart devices with embedded sensors have enabled the MANET to play a key role in the smart cities as well as WSN and WMN. However, these smart devices are still limited in terms of energy, processor, and memory. Moreover, the efficient routing for reliable network connectivity at anytime, anywhere, and about everything is still a challenge in multihop wireless networks. This paper evaluates the QoS and energy efficiency of three active routing protocols: (i OLSRv2, a successor to OLSR, (ii DYMO, a successor to both DSR and AODV, and (iii MP-OLSR multipath extension to OLSRv2. In contrast to the related previous works which focused only on CBR traffic without considering the influence of specific traffic types on the performance of routing protocols, this work focused on this area from a different perspective. It evaluates the performance of three internet-based traffic types that can be used in the smart city applications: VoIP, HTTP, and FTP using different simulation models. The impact of the network density, load traffic, and nodes mobility on the considered protocols was evaluated by considering particular performance metrics for each traffic application. Based on the results, the study concludes by presenting useful recommendations for future work.

  19. Efforts in Public Relations on Fusion in Europe

    Science.gov (United States)

    Ongena, J.; van Oost, G.

    2001-10-01

    An overview will be given of different published materials currently in use in Europe for public relations on fusion. We will also present a CD-ROM for individual and classroom use, containing (i) a general background on different energy forms, (ii) general principles of fusion, (iii) current research efforts and (iv) future prospects of fusion. This CD-ROM is currently in English, German, French, Spanish, Portuguese and Italian. Fusion posters developed in collaboration with CPEP in Dutch, French, German, Italian, Spanish and Portuguese will be shown. Several new brochures and leaflets intended to increase the public awareness on fusion in Europe will be on display.

  20. Effort reward imbalance is associated with vagal withdrawal in Danish public sector employees

    DEFF Research Database (Denmark)

    Eller, Nanna Hurwitz; Blønd, Morten; Nielsen, Martin

    2011-01-01

    The current study analyzed the relationship between psychosocial work environment assessed by the Effort Reward Imbalance Model (ERI-model) and heart rate variability (HRV) measured at baseline and again, two years later, as this relationship is scarcely covered by the literature.......The current study analyzed the relationship between psychosocial work environment assessed by the Effort Reward Imbalance Model (ERI-model) and heart rate variability (HRV) measured at baseline and again, two years later, as this relationship is scarcely covered by the literature....

  1. Accuracy of prehospital triage protocols in selecting severely injured patients: A systematic review.

    Science.gov (United States)

    van Rein, Eveline A J; Houwert, R Marijn; Gunning, Amy C; Lichtveld, Rob A; Leenen, Luke P H; van Heijl, Mark

    2017-08-01

    Prehospital trauma triage ensures proper transport of patients at risk of severe injury to hospitals with an appropriate corresponding level of trauma care. Incorrect triage results in undertriage and overtriage. The American College of Surgeons Committee on Trauma recommends an undertriage rate below 5% and an overtriage rate below 50% for prehospital trauma triage protocols. To find the most accurate prehospital trauma triage protocol, a clear overview of all currently available protocols and corresponding outcomes is necessary. The aim of this systematic review was to evaluate the current literature on all available prehospital trauma triage protocols and determine accuracy of protocol-based triage quality in terms of sensitivity and specificity. A search of Pubmed, Embase, and Cochrane Library databases was performed to identify all studies describing prehospital trauma triage protocols before November 2016. The search terms included "trauma," "trauma center," or "trauma system" combined with "triage," "undertriage," or "overtriage." All studies describing protocol-based triage quality were reviewed. To assess the quality of these type of studies, a new critical appraisal tool was developed. In this review, 21 articles were included with numbers of patients ranging from 130 to over 1 million. Significant predictors for severe injury were: vital signs, suspicion of certain anatomic injuries, mechanism of injury, and age. Sensitivity ranged from 10% to 100%; specificity from 9% to 100%. Nearly all protocols had a low sensitivity, thereby failing to identify severely injured patients. Additionally, the critical appraisal showed poor quality of the majority of included studies. This systematic review shows that nearly all protocols are incapable of identifying severely injured patients. Future studies of high methodological quality should be performed to improve prehospital trauma triage protocols. Systematic review, level III.

  2. Beyond protocols

    DEFF Research Database (Denmark)

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impact...... information on risk and the exploration of improved methods for decision making on biodiversity management. This is crucial for efficient conservation resource allocation and uptake by stakeholders and the public......., transparency and repeatability of assessments as well as the incorporation of uncertainty should all be explicitly considered. We recommend improved quality control of risk assessments through formalized peer review with clear feedback between assessors and reviewers. Alternatively, a consensus building...

  3. Mouse cell culture - Methods and protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-12-01

    Full Text Available The mouse is, out of any doubt, the experimental animal par excellence for many many colleagues within the scientific community, notably for those working in mammalian biology (in a broad sense, from basic genetic to modeling human diseases, starting at least from 1664 Robert Hooke experiments on air’s propertyn. Not surprising then that mouse cell cultures is a well established field of research itself and that there are several handbooks devoted to this discipline. Here, Andrew Ward and David Tosh provide a necessary update of the protocols currently needed. In fact, nearly half of the book is devoted to stem cells culture protocols, mainly embryonic, from a list of several organs (kidney, lung, oesophagus and intestine, pancreas and liver to mention some........

  4. The Groningen Protocol - the Jewish perspective.

    Science.gov (United States)

    Gesundheit, Benjamin; Steinberg, Avraham; Blazer, Shraga; Jotkowitz, Alan

    2009-01-01

    Despite significant advances in neonatology, there will always be newborns with serious life-threatening conditions creating most difficult bioethical dilemmas. Active euthanasia for adult patients is one of the most controversial bioethical questions; for severely ill neonates, the issue is even more complex, due to their inability to take part in any decision concerning their future. The Groningen Protocol introduced in 2005 by P.J. Sauer proposes criteria allowing active euthanasia for severely ill, not necessarily terminal, newborns with incurable conditions and poor quality of life in order to spare them unbearable suffering. We discuss the ethical dilemma and ideological foundations of the protocol, the opinions of its defenders and critics, and the dangers involved. The Jewish perspective relating to the subject is presented based on classical Jewish sources, which we trust may enrich modern bioethical debates. In Jewish law, the fetus acquires full legal status only after birth. However, while the lives of terminally ill neonates must in no way be actively destroyed or shortened, there is no obligation to make extraordinary efforts to prolong their lives. Accurate preimplantation or prenatal diagnosis might significantly reduce the incidence of nonviable births, but active killing of infants violates the basic foundations of Jewish law, and opens the 'slippery slope' for uncontrolled abuse. Therefore, we call upon the international medical and bioethical community to reject the Groningen Protocol that permits euthanization and to develop ethical guidelines for the optimal care of severely compromised neonates. Copyright 2009 S. Karger AG, Basel.

  5. Current design efforts for the gas-cooled fast reactor (GFR)

    International Nuclear Information System (INIS)

    Weaver, K.D.

    2005-01-01

    Current research and development on the Gas-Cooled Fast Reactor (GCFR) has focused on the design of safety systems that will remove the decay heat during accident conditions, ion irradiations of candidate ceramic materials, joining studies of oxide dispersion strengthened alloys; and within the Advanced Fuel Cycle Initiative (AFC I) the fabrication of carbide fuels and ceramic fuel matrix materials, development of non-halide precursor low density and high density ceramic coatings, and neutron irradiation of candidate ceramic fuel matrix and metallic materials. The vast majority of this work has focused on the reference design for the GCFR: a helium-cooled, direct Brayton cycle power conversion system that will operate with an outlet temperature of 850 C at 7 MPa. In addition to the work being performed in the United States, seven international partners under the Generation IV International Forum (GIF) have identified their interest in participating in research related to the development of the GCFR. These are EURATOM (European Commission), France, Japan, South Africa, South Korea, Switzerland, and the United Kingdom. Of these, EURATOM (including the United Kingdom), France, Japan, and Switzerland have active research activities with respect to the GCFR. The research includes GCFR design and safety, and fuels/in-core materials/fuel cycle projects. This paper outlines the current design status of the GCFR, and includes work done in the areas mentioned above. (Author)

  6. Climate change ratification of the Kyoto Protocol : clearing the air on the debate

    International Nuclear Information System (INIS)

    2002-01-01

    The Kyoto Protocol on Climate Change would commit Canada to limit emissions of greenhouse gases to 6 per cent below 1990 levels by 2008-2012. The Canadian Chamber of Commerce has outlined the following 3 key prerequisites that the federal government should and will have in place before any decision on ratification is made: (1) a detailed plan for achieving the Kyoto reductions, (2) a detailed analysis of environmental and economic impacts associated with Kyoto implementation, and (3) consultations with all stakeholder and the Canadian public once the plan has been released. Currently, Canadian businesses are taking voluntary actions to reduce industrial sector emissions through programs such as the Canadian Industry Program for Energy Conservation. Between 1990 and 1999, industrial sector emissions fell by 6 per cent. However, it was emphasized that despite these efforts, the gap between Canada's Kyoto target and its current greenhouse gas emissions continues to grow because of population and economic growth and rising exports. At the current rate of growth, it is estimated that meeting the Kyoto target could cost the economy up to $30 billion in 2010. The paper also discusses the implementation of key flexibility mechanisms such as carbon sinks, Joint Implementation, the Clean Development Mechanism and credits for export of cleaner energy to the United States, a non-Kyoto country. It is argued that ratification of Kyoto could hurt investments and impact jobs in Canada by making Canadian industries uncompetitive relative to their American counterparts. It is emphasized that full participation by the Canadian public is required in adapting to major lifestyle changes to reduce the use of fossil fuels and other sources of greenhouse gases. In conclusion, the Canadian Chamber of Commerce does not believe that the Kyoto Protocol is the most effective and efficient way of moving forward on the climate change issue and recommends that the federal government develop a made

  7. Problems of the internet transition from protocol IPv4 to IPv6

    OpenAIRE

    Potrebuješ , Nejc

    2013-01-01

    Internet currently coexist of older IPv4 networks, new IPv6 network and networks that supports both IPv6 and IPv4 stack. IPv4 and IPv6 networks are unfortunately incompatible. To enable communication between these two networks several mechanisms were developed. These mechanisms are so called »IPv4/v6 transition mechanisms«. In this thesis first there are IPv4 and IPv6 protocols presented, disadvantages of an IPv4 protocol and advantages of an IPv6 protocol. Further there are some transitio...

  8. A new testing protocol for zirconia dental implants.

    Science.gov (United States)

    Sanon, Clarisse; Chevalier, Jérôme; Douillard, Thierry; Cattani-Lorente, Maria; Scherrer, Susanne S; Gremillard, Laurent

    2015-01-01

    Based on the current lack of standards concerning zirconia dental implants, we aim at developing a protocol to validate their functionality and safety prior their clinical use. The protocol is designed to account for the specific brittle nature of ceramics and the specific behavior of zirconia in terms of phase transformation. Several types of zirconia dental implants with different surface textures (porous, alveolar, rough) were assessed. The implants were first characterized in their as-received state by Scanning Electron Microscopy (SEM), Focused Ion Beam (FIB), X-Ray Diffraction (XRD). Fracture tests following a method adapted from ISO 14801 were conducted to evaluate their initial mechanical properties. Accelerated aging was performed on the implants, and XRD monoclinic content measured directly at their surface instead of using polished samples as in ISO 13356. The implants were then characterized again after aging. Implants with an alveolar surface presented large defects. The protocol shows that such defects compromise the long-term mechanical properties. Implants with a porous surface exhibited sufficient strength but a significant sensitivity to aging. Even if associated to micro cracking clearly observed by FIB, aging did not decrease mechanical strength of the implants. As each dental implant company has its own process, all zirconia implants may behave differently, even if the starting powder is the same. Especially, surface modifications have a large influence on strength and aging resistance, which is not taken into account by the current standards. Protocols adapted from this work could be useful. Copyright © 2014 Academy of Dental Materials. Published by Elsevier Ltd. All rights reserved.

  9. On the vulnerability of basic quantum key distribution protocols and three protocols stable to attack with 'blinding' of avalanche photodetectors

    Energy Technology Data Exchange (ETDEWEB)

    Molotkov, S. N., E-mail: sergei.molotkov@gmail.com [Russian Federation Academy of Cryptography (Russian Federation)

    2012-05-15

    The fundamental quantum mechanics prohibitions on the measurability of quantum states allow secure key distribution between spatially remote users to be performed. Experimental and commercial implementations of quantum cryptography systems, however, use components that exist at the current technology level, in particular, one-photon avalanche photodetectors. These detectors are subject to the blinding effect. It was shown that all the known basic quantum key distribution protocols and systems based on them are vulnerable to attacks with blinding of photodetectors. In such attacks, an eavesdropper knows all the key transferred, does not produce errors at the reception side, and remains undetected. Three protocols of quantum key distribution stable toward such attacks are suggested. The security of keys and detection of eavesdropping attempts are guaranteed by the internal structure of protocols themselves rather than additional technical improvements.

  10. Current practice and developmental efforts for leak detection in US reactor primary systems

    International Nuclear Information System (INIS)

    Kupperman, D.S.; Claytor, T.N.

    1985-07-01

    Current leak detection practices in 74 operating nuclear reactors have been reviewed. Existing leak detection systems are adequate to ensure a leak-before-break scenario in most situations, but no currently available, single method combines optimal leakage detection sensitivity, leak-locating ability, and leakage measurement accuracy. Simply tightening current leakage limits may produce an unacceptably large number of unnecessary shutdowns. The use of commercially available acoustic monitoring systems or moisture-sensitive tape may improve leak detection capability at specific sites. However, neither of these methods currently provides source discrimination (e.g., to distinguish between leaks from pipe cracks and valves) or leak-rate information (a small leak may saturate the system). A field-implementable acoustic leak detection system is being developed to address these limitations. 5 refs., 3 figs

  11. Development of high-reliable real-time communication network protocol for SMART

    Energy Technology Data Exchange (ETDEWEB)

    Song, Ki Sang; Kim, Young Sik [Korea National University of Education, Chongwon (Korea); No, Hee Chon [Korea Advanced Institute of Science and Technology, Taejon (Korea)

    1999-04-01

    In this research, we first define protocol subsets for SMART(System-integrated Modular Advanced Reactor) communication network based on the requirement of SMART MMIS transmission delay and traffic requirements and OSI(Open System Interconnection) 7 layers' network protocol functions. Also, current industrial purpose LAN protocols are analyzed and the applicability of commercialized protocols are checked. For the suitability test, we have applied approximated SMART data traffic and maximum allowable transmission delay requirement. With the simulation results, we conclude that IEEE 802.5 and FDDI which is an ANSI standard, is the most suitable for SMART. We further analyzed the FDDI and token ring protocols for SMART and nuclear plant network environment including IEEE 802.4, IEEE 802.5, and ARCnet. The most suitable protocol for SMART is FDDI and FDDI MAC and RMT protocol specifications have been verified with LOTOS and the verification results show that FDDI MAC and RMT satisfy the reachability and liveness, but does not show deadlock and livelock. Therefore, we conclude that FDDI MAC and RMT is highly reliable protocol for SMART MMIS network. After that, we consider the stacking fault of IEEE 802.5 token ring protocol and propose a fault tolerant MAM(Modified Active Monitor) protocol. The simulation results show that the MAM protocol improves lower priority traffic service rate when stacking fault occurs. Therefore, proposed MAM protocol can be applied to SMART communication network for high reliability and hard real-time communication purpose in data acquisition and inter channel network. (author). 37 refs., 79 figs., 39 tabs.

  12. Efforts to find a better measuring system for climatic gas discharges. CICERO in a new EU project which aims to improve GWP and radiation contribution expressions

    International Nuclear Information System (INIS)

    Fuglestvedt, Jan

    2000-01-01

    The article describes the problems with the present system used by the Kyoto protocol and the project efforts for improving the formulas and models of expressing climatic gas discharge measurements through a common measuring unit

  13. Advanced dementia pain management protocols.

    Science.gov (United States)

    Montoro-Lorite, Mercedes; Canalias-Reverter, Montserrat

    Pain management in advanced dementia is complex because of neurological deficits present in these patients, and nurses are directly responsible for providing interventions for the evaluation, management and relief of pain for people suffering from this health problem. In order to facilitate and help decision-makers, pain experts recommend the use of standardized protocols to guide pain management, but in Spain, comprehensive pain management protocols have not yet been developed for advanced dementia. This article reflects the need for an integrated management of pain in advanced dementia. From the review and analysis of the most current and relevant studies in the literature, we performed an approximation of the scales for the determination of pain in these patients, with the observational scale PAINAD being the most recommended for the hospital setting. In addition, we provide an overview for comprehensive management of pain in advanced dementia through the conceptual framework «a hierarchy of pain assessment techniques by McCaffery and Pasero» for the development and implementation of standardized protocols, including a four-phase cyclical process (evaluation, planning/performance, revaluation and recording), which can facilitate the correct management of pain in these patients. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.

  14. Protocol compliance and time management in blunt trauma resuscitation.

    Science.gov (United States)

    Spanjersberg, W R; Bergs, E A; Mushkudiani, N; Klimek, M; Schipper, I B

    2009-01-01

    To study advanced trauma life support (ATLS) protocol adherence prospectively in trauma resuscitation and to analyse time management of daily multidisciplinary trauma resuscitation at a level 1 trauma centre, for both moderately and severely injured patients. All victims of severe blunt trauma were consecutively included. Patients with a revised trauma score (RTS) of 12 were resuscitated by a "minor trauma" team and patients with an RTS of less than 12 were resuscitated by a "severe trauma" team. Digital video recordings were used to analyse protocol compliance and time management during initial assessment. From 1 May to 1 September 2003, 193 resuscitations were included. The "minor trauma" team assessed 119 patients, with a mean injury severity score (ISS) of 7 (range 1-45). Overall protocol compliance was 42%, ranging from 0% for thoracic percussion to 93% for thoracic auscultation. The median resuscitation time was 45.9 minutes (range 39.7-55.9). The "severe team" assessed 74 patients, with a mean ISS of 22 (range 1-59). Overall protocol compliance was 53%, ranging from 4% for thoracic percussion to 95% for thoracic auscultation. Resuscitation took 34.8 minutes median (range 21.6-44.1). Results showed the current trauma resuscitation to be ATLS-like, with sometimes very low protocol compliance rates. Timing of secondary survey and radiology and thus time efficiency remains a challenge in all trauma patients. To assess the effect of trauma resuscitation protocols on outcome, protocol adherence needs to be improved.

  15. The RBANS Effort Index: base rates in geriatric samples.

    Science.gov (United States)

    Duff, Kevin; Spering, Cynthia C; O'Bryant, Sid E; Beglinger, Leigh J; Moser, David J; Bayless, John D; Culp, Kennith R; Mold, James W; Adams, Russell L; Scott, James G

    2011-01-01

    The Effort Index (EI) of the RBANS was developed to assist clinicians in discriminating patients who demonstrate good effort from those with poor effort. However, there are concerns that older adults might be unfairly penalized by this index, which uses uncorrected raw scores. Using five independent samples of geriatric patients with a broad range of cognitive functioning (e.g., cognitively intact, nursing home residents, probable Alzheimer's disease), base rates of failure on the EI were calculated. In cognitively intact and mildly impaired samples, few older individuals were classified as demonstrating poor effort (e.g., 3% in cognitively intact). However, in the more severely impaired geriatric patients, over one third had EI scores that fell above suggested cutoff scores (e.g., 37% in nursing home residents, 33% in probable Alzheimer's disease). In the cognitively intact sample, older and less educated patients were more likely to have scores suggestive of poor effort. Education effects were observed in three of the four clinical samples. Overall cognitive functioning was significantly correlated with EI scores, with poorer cognition being associated with greater suspicion of low effort. The current results suggest that age, education, and level of cognitive functioning should be taken into consideration when interpreting EI results and that significant caution is warranted when examining EI scores in elders suspected of having dementia.

  16. ABS-SmartComAgri: An Agent-Based Simulator of Smart Communication Protocols in Wireless Sensor Networks for Debugging in Precision Agriculture.

    Science.gov (United States)

    García-Magariño, Iván; Lacuesta, Raquel; Lloret, Jaime

    2018-03-27

    Smart communication protocols are becoming a key mechanism for improving communication performance in networks such as wireless sensor networks. However, the literature lacks mechanisms for simulating smart communication protocols in precision agriculture for decreasing production costs. In this context, the current work presents an agent-based simulator of smart communication protocols for efficiently managing pesticides. The simulator considers the needs of electric power, crop health, percentage of alive bugs and pesticide consumption. The current approach is illustrated with three different communication protocols respectively called (a) broadcast, (b) neighbor and (c) low-cost neighbor. The low-cost neighbor protocol obtained a statistically-significant reduction in the need of electric power over the neighbor protocol, with a very large difference according to the common interpretations about the Cohen's d effect size. The presented simulator is called ABS-SmartComAgri and is freely distributed as open-source from a public research data repository. It ensures the reproducibility of experiments and allows other researchers to extend the current approach.

  17. GnRH antagonist versus long agonist protocols in IVF

    DEFF Research Database (Denmark)

    Lambalk, C B; Banga, F R; Huirne, J A

    2017-01-01

    BACKGROUND: Most reviews of IVF ovarian stimulation protocols have insufficiently accounted for various patient populations, such as ovulatory women, women with polycystic ovary syndrome (PCOS) or women with poor ovarian response, and have included studies in which the agonist or antagonist...... was not the only variable between the compared study arms. OBJECTIVE AND RATIONALE: The aim of the current study was to compare GnRH antagonist protocols versus standard long agonist protocols in couples undergoing IVF or ICSI, while accounting for various patient populations and treatment schedules. SEARCH...... in couples undergoing IVF or ICSI. The primary outcome was ongoing pregnancy rate. Secondary outcomes were: live birth rate, clinical pregnancy rate, number of oocytes retrieved and safety with regard to ovarian hyperstimulation syndrome (OHSS). Separate comparisons were performed for the general IVF...

  18. Canada and the Kyoto Protocol: Fact Sheet No. 5 - Developing countries

    International Nuclear Information System (INIS)

    2000-11-01

    This fact sheet acknowledges that global change affects developed and developing countries alike, and the fact that most developing countries do not have the human, financial and technical capacity to effectively address climate change issues without help from the industrialized nations. The fact sheet also puts Canada on record as being in agreement with the spirit of the Kyoto Protocol to encourage the participation of developing countries in global efforts to combat climate change and promote sustainable development and reaffirms Canada's willingness to provide financial and technical assistance to developing countries to enable them to play a meaningful part in this global effort. In this context, the fact sheet briefly describes the new Canada Climate Change Development Fund which has been set up to reduce the growth of GHG emissions and support carbon sink activities in developing countries, to strengthen the capacity of developing conuntries to reduce their vulnerability to adverse effects of climate change, and to participate in global efforts to combat them

  19. Activation of selected shoulder muscles during unilateral wall and bench press tasks under submaximal isometric effort.

    Science.gov (United States)

    Tucci, Helga T; Ciol, Marcia A; de Araújo, Rodrigo C; de Andrade, Rodrigo; Martins, Jaqueline; McQuade, Kevin J; Oliveira, Anamaria S

    2011-07-01

    Controlled laboratory study. To assess the activation of 7 shoulder muscles under 2 closed kinetic chain (CKC) tasks for the upper extremity using submaximal isometric effort, thus providing relative quantification of muscular isometric effort for these muscles across the CKC exercises, which may be applied to rehabilitation protocols for individuals with shoulder weakness. CKC exercises favor joint congruence, reduce shear load, and promote joint dynamic stability. Additionally, knowledge about glenohumeral and periscapular muscle activity elicited during CKC exercises may help clinicians to design protocols for shoulder rehabilitation. Using surface electromyography, activation level was measured across 7 shoulder muscles in 20 healthy males, during the performance of a submaximal isometric wall press and bench press. Signals were normalized to the maximal voluntary isometric contraction, and, using paired t tests, data were analyzed between the exercises for each muscle. Compared to the wall press, the bench press elicited higher activity for most muscles, except for the upper trapezius. Levels of activity were usually low but were above 20% maximal voluntary isometric contraction for the serratus anterior on both tasks, and for the long head triceps brachii on the bench press. Both the bench press and wall press, as performed in this study, led to relatively low EMG activation levels for the muscles measured and may be considered for use in the early phases of rehabilitation.

  20. Evaluation of Protocol Uniformity Concerning Laparoscopic Cholecystectomy in The Netherlands

    Science.gov (United States)

    Goossens, Richard H. M.; van Eijk, Daan J.; Lange, Johan F.

    2008-01-01

    Background Iatrogenic bile duct injury remains a current complication of laparoscopic cholecystectomy. One uniform and standardized protocol, based on the “critical view of safety” concept of Strasberg, should reduce the incidence of this complication. Furthermore, owing to the rapid development of minimally invasive surgery, technicians are becoming more frequently involved. To improve communication between the operating team and technicians, standardized actions should also be defined. The aim of this study was to compare existing protocols for laparoscopic cholecystectomy from various Dutch hospitals. Methods Fifteen Dutch hospitals were contacted for evaluation of their protocols for laparoscopic cholecystectomy. All evaluated protocols were divided into six steps and were compared accordingly. Results In total, 13 hospitals responded—5 academic hospitals, 5 teaching hospitals, 3 community hospitals—of which 10 protocols were usable for comparison. Concerning the trocar positions, only minor differences were found. The concept of “critical view of safety” was represented in just one protocol. Furthermore, the order of clipping and cutting the cystic artery and duct differed. Descriptions of instruments and apparatus were also inconsistent. Conclusions Present protocols differ too much to define a universal procedure among surgeons in The Netherlands. The authors propose one (inter)national standardized protocol, including standardized actions. This uniform standardized protocol has to be officially released and recommended by national scientific associations (e.g., the Dutch Society of Surgery) or international societies (e.g., European Association for Endoscopic Surgery and Society of American Gastrointestinal and Endoscopic Surgeons). The aim is to improve patient safety and professional communication, which are necessary for new developments. PMID:18224485

  1. Optimized exosome isolation protocol for cell culture supernatant and human plasma

    Directory of Open Access Journals (Sweden)

    Richard J. Lobb

    2015-07-01

    Full Text Available Extracellular vesicles represent a rich source of novel biomarkers in the diagnosis and prognosis of disease. However, there is currently limited information elucidating the most efficient methods for obtaining high yields of pure exosomes, a subset of extracellular vesicles, from cell culture supernatant and complex biological fluids such as plasma. To this end, we comprehensively characterize a variety of exosome isolation protocols for their efficiency, yield and purity of isolated exosomes. Repeated ultracentrifugation steps can reduce the quality of exosome preparations leading to lower exosome yield. We show that concentration of cell culture conditioned media using ultrafiltration devices results in increased vesicle isolation when compared to traditional ultracentrifugation protocols. However, our data on using conditioned media isolated from the Non-Small-Cell Lung Cancer (NSCLC SK-MES-1 cell line demonstrates that the choice of concentrating device can greatly impact the yield of isolated exosomes. We find that centrifuge-based concentrating methods are more appropriate than pressure-driven concentrating devices and allow the rapid isolation of exosomes from both NSCLC cell culture conditioned media and complex biological fluids. In fact to date, no protocol detailing exosome isolation utilizing current commercial methods from both cells and patient samples has been described. Utilizing tunable resistive pulse sensing and protein analysis, we provide a comparative analysis of 4 exosome isolation techniques, indicating their efficacy and preparation purity. Our results demonstrate that current precipitation protocols for the isolation of exosomes from cell culture conditioned media and plasma provide the least pure preparations of exosomes, whereas size exclusion isolation is comparable to density gradient purification of exosomes. We have identified current shortcomings in common extracellular vesicle isolation methods and provide a

  2. Protocollering is essentieel : Behandeling van paracetamolintoxicatie in Nederland

    NARCIS (Netherlands)

    Van Roon, E.N.; Van Den Bemt, P.M.L.A.; Van Zantvoort, C.A.; Touw, D.J.

    2000-01-01

    Paracetamol poisoning occurs frequently in the Netherlands. In order to study the way in which paracetamol poisonings are being treated in Dutch hospitals, a survey was sent to all Dutch hospital pharmacies, in which they were asked to sent their current protocol for the treatment of paracetamol

  3. Final report for the protocol extensions for ATM Security Laboratory Directed Research and Development Project

    Energy Technology Data Exchange (ETDEWEB)

    Tarman, T.D.; Pierson, L.G.; Brenkosh, J.P. [and others

    1996-03-01

    This is the summary report for the Protocol Extensions for Asynchronous Transfer Mode project, funded under Sandia`s Laboratory Directed Research and Development program. During this one-year effort, techniques were examined for integrating security enhancements within standard ATM protocols, and mechanisms were developed to validate these techniques and to provide a basic set of ATM security assurances. Based on our experience during this project, recommendations were presented to the ATM Forum (a world-wide consortium of ATM product developers, service providers, and users) to assist with the development of security-related enhancements to their ATM specifications. As a result of this project, Sandia has taken a leading role in the formation of the ATM Forum`s Security Working Group, and has gained valuable alliances and leading-edge experience with emerging ATM security technologies and protocols.

  4. An Analysis of Current Operational Contract Support Planning Doctrine

    Science.gov (United States)

    2015-09-01

    advertising timelines, or advertising timelines. As discussed in Chapter I, declaring a contingency under title 10 allows for streamlined protocols...increase goodwill with local businessmen toward United States Forces (CJCS, 2014). Additionally, factors such as road infrastructure maturity must also...providing those commander tools needed to create targeted effects through reconstruction and goodwill efforts. Debate continues today as to whether these

  5. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    diverse local-area networks, this protocol offers both (1) a random- access mode needed for the early PFF deployment phase and (2) a time-bounded-services mode needed during PFF-maintenance operations. Switching between these two modes could be controlled by upper-layer entities using standard link-management mechanisms. Because the early deployment phase of a PFF mission can be expected to involve multihop relaying to achieve network connectivity (see figure), the proposed protocol includes the open shortest path first (OSPF) network protocol that is commonly used in the Internet. Each spacecraft in a PFF network would be in one of seven distinct states as the mission evolved from initial deployment, through coarse formation, and into precise formation. Reconfiguration of the formation to perform different scientific observations would also cause state changes among the network nodes. The application protocol provides for recognition and tracking of the seven states for each node and for protocol changes under specified conditions to adapt the network and satisfy communication requirements associated with the current PFF mission phase. Except during early deployment, when peer-to-peer random access discovery methods would be used, the application protocol provides for operation in a centralized manner.

  6. Self-regulating the effortful "social dos".

    Science.gov (United States)

    Cortes, Kassandra; Kammrath, Lara K; Scholer, Abigail A; Peetz, Johanna

    2014-03-01

    In the current research, we explored differences in the self-regulation of the personal dos (i.e., engaging in active and effortful behaviors that benefit the self) and in the self-regulation of the social dos (engaging in those same effortful behaviors to benefit someone else). In 6 studies, we examined whether the same trait self-control abilities that predict task persistence on personal dos would also predict task persistence on social dos. That is, would the same behavior, such as persisting through a tedious and attentionally demanding task, show different associations with trait self-control when it is framed as benefitting the self versus someone else? In Studies 1-3, we directly compared the personal and social dos and found that trait self-control predicted self-reported and behavioral personal dos but not social dos, even when the behaviors were identical and when the incentives were matched. Instead, trait agreeableness--a trait linked to successful self-regulation within the social domain--predicted the social dos. Trait self-control did not predict the social dos even when task difficulty increased (Study 4), but it did predict the social don'ts, consistent with past research (Studies 5-6). The current studies provide support for the importance of distinguishing different domains of self-regulated behaviors and suggest that social dos can be successfully performed through routes other than traditional self-control abilities. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  7. Effort sharing in ambitious, global climate change mitigation scenarios

    International Nuclear Information System (INIS)

    Ekholm, Tommi; Soimakallio, Sampo; Moltmann, Sara; Hoehne, Niklas; Syri, Sanna; Savolainen, Ilkka

    2010-01-01

    The post-2012 climate policy framework needs a global commitment to deep greenhouse gas emission cuts. This paper analyzes reaching ambitious emission targets up to 2050, either -10% or -50% from 1990 levels, and how the economic burden from mitigation efforts could be equitably shared between countries. The scenarios indicate a large low-cost mitigation potential in electricity and industry, while reaching low emission levels in international transportation and agricultural emissions might prove difficult. The two effort sharing approaches, Triptych and Multistage, were compared in terms of equitability and coherence. Both approaches produced an equitable cost distribution between countries, with least developed countries having negative or low costs and more developed countries having higher costs. There is, however, no definitive solution on how the costs should be balanced equitably between countries. Triptych seems to be yet more coherent than other approaches, as it can better accommodate national circumstances. Last, challenges and possible hindrances to effective mitigation and equitable effort sharing are presented. The findings underline the significance of assumptions behind effort sharing on mitigation potentials and current emissions, the challenge of sharing the effort with uncertain future allowance prices and how inefficient markets might undermine the efficiency of a cap-and-trade system.

  8. Effort sharing in ambitious, global climate change mitigation scenarios

    Energy Technology Data Exchange (ETDEWEB)

    Ekholm, Tommi [TKK Helsinki University of Technology, Espoo (Finland); Soimakallio, Sampo; Syri, Sanna; Savolainen, Ilkka [VTT Technical Research Centre of Finland, P.O. Box 1000, FIN-02044 VTT (Finland); Moltmann, Sara; Hoehne, Niklas [Ecofys Germany GmbH, Cologne (Germany)

    2010-04-15

    The post-2012 climate policy framework needs a global commitment to deep greenhouse gas emission cuts. This paper analyzes reaching ambitious emission targets up to 2050, either or from 1990 levels, and how the economic burden from mitigation efforts could be equitably shared between countries. The scenarios indicate a large low-cost mitigation potential in electricity and industry, while reaching low emission levels in international transportation and agricultural emissions might prove difficult. The two effort sharing approaches, Triptych and Multistage, were compared in terms of equitability and coherence. Both approaches produced an equitable cost distribution between countries, with least developed countries having negative or low costs and more developed countries having higher costs. There is, however, no definitive solution on how the costs should be balanced equitably between countries. Triptych seems to be yet more coherent than other approaches, as it can better accommodate national circumstances. Last, challenges and possible hindrances to effective mitigation and equitable effort sharing are presented. The findings underline the significance of assumptions behind effort sharing on mitigation potentials and current emissions, the challenge of sharing the effort with uncertain future allowance prices and how inefficient markets might undermine the efficiency of a cap-and-trade system. (author)

  9. Using posts to an online social network to assess fishing effort

    Science.gov (United States)

    Martin, Dustin R.; Chizinski, Christopher J.; Eskridge, Kent M.; Pope, Kevin L

    2014-01-01

    Fisheries management has evolved from reservoir to watershed management, creating a need to simultaneously gather information within and across interacting reservoirs. However, costs to gather information on the fishing effort on multiple reservoirs using traditional creel methodology are often prohibitive. Angler posts about reservoirs online provide a unique medium to test hypotheses on the distribution of fishing pressure. We show that the activity on an online fishing social network is related to fishing effort and can be used to facilitate management goals. We searched the Nebraska Fish and Game Association Fishing Forum for all references from April 2009 to December 2010 to 19 reservoirs that comprise the Salt Valley regional fishery in southeastern Nebraska. The number of posts was positively related to monthly fishing effort on a regional scale, with individual reservoirs having the most annual posts also having the most annual fishing effort. Furthermore, this relationship held temporally. Online fishing social networks provide the potential to assess effort on larger spatial scales than currently feasible.

  10. Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks

    Science.gov (United States)

    Ivancic, William D.

    2009-01-01

    A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks, the Licklider Transport Protocol Security Extensions. This document provides a security analysis of the current DTN RFCs and proposed security related internet drafts with a focus on space-based communication networks, which is a rather restricted subset of DTN networks. Note, the original focus and motivation of DTN work was for the Interplanetary Internet . This document does not address general store-and-forward network overlays, just the current work being done by the Internet Research Task Force (IRTF) and the Consultative Committee for Space Data Systems (CCSDS) Space Internetworking Services Area (SIS) - DTN working group under the DTN and Bundle umbrellas. However, much of the analysis is relevant to general store-and-forward overlays.

  11. MDEP Protocol VICWG-01. MDEP Protocol: Witnessed, Joint, and Multinational Vendor Inspection Protocol

    International Nuclear Information System (INIS)

    2014-01-01

    The Multinational Design Evaluation Programme (MDEP) was launched in 2006 by the US Nuclear Regulatory Commission (NRC) and the French Nuclear Safety Authority (ASN) with the aim of developing innovative approaches to leverage the resources and knowledge of national regulatory authorities reviewing new reactor designs. MDEP full members are regulators from Canada, People's Republic of China, Finland, France, India, Japan, Republic of Korea, Russian Federation, South Africa, Sweden, the United Kingdom and the United States of America. The United Arab Emirates and Turkey are associate members. The OECD Nuclear Energy Agency (NEA) acts as the Technical Secretariat for the MDEP. The International Atomic Energy Agency (IAEA) participates in many of the MDEP activities, including harmonisation efforts. The Vendor Inspection Cooperation Working Group (VICWG) is one of the issue-specific working groups that the MDEP members are undertaking with one long term goal of the VICWG being to maximize the use of the results obtained from other regulator's efforts in inspecting vendors. To accomplish this goal, it is vital that the regulators learn about each other's procedures, processes, and regulations. To facilitate the learning process the VICWG is coordinating vendor inspections among the involved regulatory authorities with the purpose of enhancing the understanding of each other's vendor inspection procedures. This programme is administered by the NEA. Involvement in specific inspections provides a number of opportunities for member state regulators to witness other regulators' inspection methods, gain useful information on the quality systems and manufacturing arrangements of specific vendors and where appropriate, actively participate in the inspection. The purpose of this protocol is to provide guidance to regulators that wish to carry out vendor inspections or participate in or witness other regulators' vendor inspections. It also provides

  12. Comparison of cardiovascular response to combined static-dynamic effort, postprandial dynamic effort and dynamic effort alone in patients with chronic ischemic heart disease

    International Nuclear Information System (INIS)

    Hung, J.; McKillip, J.; Savin, W.; Magder, S.; Kraus, R.; Houston, N.; Goris, M.; Haskell, W.; DeBusk, R.

    1982-01-01

    The cardiovascular responses to combined static-dynamic effort, postprandial dynamic effort and dynamic effort alone were evaluated by upright bicycle ergometry during equilibrium-gated blood pool scintigraphy in 24 men, mean age 59 +/- 8 years, with chronic ischemic heart disease. Combined static-dynamic effort and the postprandial state elicited a peak cardiovascular response similar to that of dynamic effort alone. Heart rate, intraarterial systolic and diastolic pressures, rate-pressure product and ejection fraction were similar for the three test conditions at the onset of ischemia and at peak effort. The prevalence and extent of exercise-induced ischemic left ventricular dysfunction, ST-segment depression, angina pectoris and ventricular ectopic activity were also similar during the three test conditions. Direct and indirect measurements of systolic and diastolic blood pressure were highly correlated. The onset of ischemic ST-segment depression and angina pectoris correlated as strongly with heart rate alone as with the rate-pressure product during all three test conditions. The cardiovascular response to combined static-dynamic effort and to postprandial dynamic effort becomes more similar to that of dynamic effort alone as dynamic effort reaches a symptom limit. If significant ischemic and arrhythmic abnormalities are absent during symptom-limited dynamic exercise testing, they are unlikely to appear during combined static-dynamic or postprandial dynamic effort

  13. About the Design of QUIC Firefox Transport Protocol

    Directory of Open Access Journals (Sweden)

    Vraj Pandya

    2017-07-01

    Full Text Available QUIC (Quick UDP Internet Connections Chrome is an experimental transport layer network protocol designed by Jim Roskind at Google, initially implemented in 2012 and announced publicly in 2013. One of the QUIC's goals is to improve performance of connection-oriented web applications that are currently using the Transmission Control Protocol (TCP. To do that, QUIC achieves a reduced latency and a better stream-multiplexing support to avoid network congestion. In 2015, Firefox Mozilla started to work on an equivalent QUIC transport protocol for their browser. This idea was motivated by the differences between Chrome and Firefox. Despite the fact that Mozilla Firefox and Google Chrome are both web browser engines, there are some significant differences between them, such as file hierarchy, open source policies (Firefox is completely, while Chrome is only partial, tabs design, continuous integration, and more. Likewise QUIC Chrome, QUIC Firefox is a new multiplexed and secure transport based on User Datagram Protocol (UDP, designed from the ground up and optimized for Hyper-Text Transfer Protocol 2 (HTTP/2 semantics. While built with HTTP/2 as the primary application protocol, QUIC builds on decades of transport and security experience, and implements mechanisms that make it attractive as a modern general-purpose transport. In addition to describing the main design of QUIC Firefox, this paper will compare Firefox with QUIC Firefox. Our preliminary experimental results support that QUIC Firefox has a faster execution time, less latency time, and a better throughput time than the traditional Firefox.  

  14. Effort in Multitasking: Local and Global Assessment of Effort.

    Science.gov (United States)

    Kiesel, Andrea; Dignath, David

    2017-01-01

    When performing multiple tasks in succession, self-organization of task order might be superior compared to external-controlled task schedules, because self-organization allows optimizing processing modes and thus reduces switch costs, and it increases commitment to task goals. However, self-organization is an additional executive control process that is not required if task order is externally specified and as such it is considered as time-consuming and effortful. To compare self-organized and externally controlled task scheduling, we suggest assessing global subjective and objectives measures of effort in addition to local performance measures. In our new experimental approach, we combined characteristics of dual tasking settings and task switching settings and compared local and global measures of effort in a condition with free choice of task sequence and a condition with cued task sequence. In a multi-tasking environment, participants chose the task order while the task requirement of the not-yet-performed task remained the same. This task preview allowed participants to work on the previously non-chosen items in parallel and resulted in faster responses and fewer errors in task switch trials than in task repetition trials. The free-choice group profited more from this task preview than the cued group when considering local performance measures. Nevertheless, the free-choice group invested more effort than the cued group when considering global measures. Thus, self-organization in task scheduling seems to be effortful even in conditions in which it is beneficiary for task processing. In a second experiment, we reduced the possibility of task preview for the not-yet-performed tasks in order to hinder efficient self-organization. Here neither local nor global measures revealed substantial differences between the free-choice and a cued task sequence condition. Based on the results of both experiments, we suggest that global assessment of effort in addition to

  15. Three-stage treatment protocol for recalcitrant distal femoral nonunion.

    Science.gov (United States)

    Ma, Ching-Hou; Chiu, Yen-Chun; Tu, Yuan-Kun; Yen, Cheng-Yo; Wu, Chin-Hsien

    2017-04-01

    In this study, we proposed a three-stage treatment protocol for recalcitrant distal femoral nonunion and aimed to analyze the clinical results. We retrospective reviewed 12 consecutive patients with recalcitrant distal femoral nonunion undergoing our three-stage treatment protocol from January 2010 to December 2014 in our institute. The three-stage treatment protocol comprised debridement of the nonunion site, lengthening to eliminate leg length discrepancy, deformity correction, stabilization with a locked plate, filling of the defect with cement spacer for inducing membrane formation, and bone reconstruction using a cancellous bone autograft (Masquelet technique) or free vascularized fibular bone graft. The bone union time, wound complication, lower limbs alignment, amount of lengthening, knee range of motion, and functional outcomes were evaluated. Osseous union with angular deformity lengthening was 5.88 cm (range 3.5-12 cm). Excellent or good outcomes were obtained in 9 patients. Although the current study involved only a small number of patients and the intervention comprised three stages, we believe that such a protocol may be a valuable alternative for the treatment of recalcitrant distal femoral nonunion.

  16. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  17. IPv4 and IPv6 protocol compatibility options analysis

    Directory of Open Access Journals (Sweden)

    Regina Misevičienė

    2013-09-01

    Full Text Available The popularity of the internet has led to a very rapid growth of IPv4 (Internet Protocol v4 users. This caused a shortage of IP addresses, so it was created a new version – IPv6 (Internet Protocol v6. Currently, there are two versions of IP for IPv4 and IPv6. Due to the large differences in addressing the protocols IPv4 and IPv6 are incompatible. It is therefore necessary to find ways to move from IPv4 to IPv6. To facilitate the transition from one version to another are developed various mechanisms and strategies. Comparative analysis is done for dual stack, 6to4 tunnel and NAT64 mechanisms in this work. It has helped to reveal the shortcomings of these mechanisms and their application in selection of realization decisions.

  18. Do Haphazard Reviews Provide Sound Directions for Dissemination Efforts?

    Science.gov (United States)

    Gambrill, Eileen; Littell, Julia H.

    2010-01-01

    Comments on The dissemination and implementation of evidence-based psychological treatments: A review of current efforts by Kathryn R. McHugh and David H. Barlow. The lead article in the February-March issue by McHugh and Barlow (2010) emphasized the need for "dissemination and implementation of evidence-based psychological treatments."…

  19. Development of a new Emergency Medicine Spinal Immobilization Protocol for trauma patients and a test of applicability by German emergency care providers.

    Science.gov (United States)

    Kreinest, Michael; Gliwitzky, Bernhard; Schüler, Svenja; Grützner, Paul A; Münzberg, Matthias

    2016-05-14

    In order to match the challenges of quickly recognizing and treating any life-threatening injuries, the ABCDE principles were established for the assessment and treatment of trauma patients. The high priority of spine protection is emphasized by the fact that immobilization of the cervical spine is performed at the very first step in the ABCDE principles. Immobilization is typically performed to prevent or minimize secondary damage to the spinal cord if instability of the spinal column is suspected. Due to increasing reports about disadvantages of spinal immobilization, the indications for performing spinal immobilization must be refined. The aim of this study was (i) to develop a protocol that supports decision-making for spinal immobilization in adult trauma patients and (ii) to carry out the first applicability test by emergency medical personnel. A structured literature search considering the literature from 1980 to 2014 was performed. Based on this literature and on the current guidelines, a new protocol that supports on scene decision-making for spinal immobilization has been developed. Parameters found in the literature concerning mechanisms and factors increasing the likelihood of spinal injury have been included in the new protocol. In order to test the applicability of the new protocol two surveys were performed on German emergency care providers by means of a questionnaire focused on correct decision-making if applying the protocol. Based on the current literature and guidelines, the Emergency Medicine Spinal Immobilization Protocol (E.M.S. IMMO Protocol) for adult trauma patients was developed. Following a fist applicability test involving 21 participants, the first version of the E.M.S. IMMO Protocol has to be graphically re-organized. A second applicability test comprised 50 participants with the current version of the protocol confirmed good applicability. Questions regarding immobilization of trauma patients could be answered properly using the E

  20. Estimation of inspection effort

    International Nuclear Information System (INIS)

    Mullen, M.F.; Wincek, M.A.

    1979-06-01

    An overview of IAEA inspection activities is presented, and the problem of evaluating the effectiveness of an inspection is discussed. Two models are described - an effort model and an effectiveness model. The effort model breaks the IAEA's inspection effort into components; the amount of effort required for each component is estimated; and the total effort is determined by summing the effort for each component. The effectiveness model quantifies the effectiveness of inspections in terms of probabilities of detection and quantities of material to be detected, if diverted over a specific period. The method is applied to a 200 metric ton per year low-enriched uranium fuel fabrication facility. A description of the model plant is presented, a safeguards approach is outlined, and sampling plans are calculated. The required inspection effort is estimated and the results are compared to IAEA estimates. Some other applications of the method are discussed briefly. Examples are presented which demonstrate how the method might be useful in formulating guidelines for inspection planning and in establishing technical criteria for safeguards implementation

  1. Use of a Microprocessor to Implement an ADCCP Protocol (Federal Standard 1003).

    Science.gov (United States)

    1980-07-01

    results of other studies, to evaluate the operational and economic impact of incorporating various options in Federal Standard 1003. The effort...the LSI interface and the microprocessor; the LSI chip deposits bytes in its buffer as the producer, and the MPU reads this data as the consumer...on the interface between the MPU and the LSI protocol chip. This requires two main processes to be running at the same time--transmit and receive. The

  2. The Interface of Clinical Decision-Making With Study Protocols for Knowledge Translation From a Walking Recovery Trial.

    Science.gov (United States)

    Hershberg, Julie A; Rose, Dorian K; Tilson, Julie K; Brutsch, Bettina; Correa, Anita; Gallichio, Joann; McLeod, Molly; Moore, Craig; Wu, Sam; Duncan, Pamela W; Behrman, Andrea L

    2017-01-01

    Despite efforts to translate knowledge into clinical practice, barriers often arise in adapting the strict protocols of a randomized, controlled trial (RCT) to the individual patient. The Locomotor Experience Applied Post-Stroke (LEAPS) RCT demonstrated equal effectiveness of 2 intervention protocols for walking recovery poststroke; both protocols were more effective than usual care physical therapy. The purpose of this article was to provide knowledge-translation tools to facilitate implementation of the LEAPS RCT protocols into clinical practice. Participants from 2 of the trial's intervention arms: (1) early Locomotor Training Program (LTP) and (2) Home Exercise Program (HEP) were chosen for case presentation. The two cases illustrate how the protocols are used in synergy with individual patient presentations and clinical expertise. Decision algorithms and guidelines for progression represent the interface between implementation of an RCT standardized intervention protocol and clinical decision-making. In each case, the participant presents with a distinct clinical challenge that the therapist addresses by integrating the participant's unique presentation with the therapist's expertise while maintaining fidelity to the LEAPS protocol. Both participants progressed through an increasingly challenging intervention despite their own unique presentation. Decision algorithms and exercise progression for the LTP and HEP protocols facilitate translation of the RCT protocol to the real world of clinical practice. The two case examples to facilitate translation of the LEAPS RCT into clinical practice by enhancing understanding of the protocols, their progression, and their application to individual participants.Video Abstract available for more insights from the authors (see Supplemental Digital Content 1, available at: http://links.lww.com/JNPT/A147).

  3. A Geographical Heuristic Routing Protocol for VANETs

    Science.gov (United States)

    Urquiza-Aguiar, Luis; Tripp-Barba, Carolina; Aguilar Igartua, Mónica

    2016-01-01

    Vehicular ad hoc networks (VANETs) leverage the communication system of Intelligent Transportation Systems (ITS). Recently, Delay-Tolerant Network (DTN) routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR) protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation). PMID:27669254

  4. Development and validation of a remote home safety protocol.

    Science.gov (United States)

    Romero, Sergio; Lee, Mi Jung; Simic, Ivana; Levy, Charles; Sanford, Jon

    2018-02-01

    Environmental assessments and subsequent modifications conducted by healthcare professionals can enhance home safety and promote independent living. However, travel time, expense and the availability of qualified professionals can limit the broad application of this intervention. Remote technology has the potential to increase access to home safety evaluations. This study describes the development and validation of a remote home safety protocol that can be used by a caregiver of an elderly person to video-record their home environment for later viewing and evaluation by a trained professional. The protocol was developed based on literature reviews and evaluations from clinical and content experts. Cognitive interviews were conducted with a group of six caregivers to validate the protocol. The final protocol included step-by-step directions to record indoor and outdoor areas of the home. The validation process resulted in modifications related to safety, clarity of the protocol, readability, visual appearance, technical descriptions and usability. Our final protocol includes detailed instructions that a caregiver should be able to follow to record a home environment for subsequent evaluation by a home safety professional. Implications for Rehabilitation The results of this study have several implications for rehabilitation practice The remote home safety evaluation protocol can potentially improve access to rehabilitation services for clients in remote areas and prevent unnecessary delays for needed care. Using our protocol, a patient's caregiver can partner with therapists to quickly and efficiently evaluate a patient's home before they are released from the hospital. Caregiver narration, which reflects a caregiver's own perspective, is critical to evaluating home safety. In-home safety evaluations, currently not available to all who need them due to access barriers, can enhance a patient's independence and provide a safer home environment.

  5. Evaluating Protocol Lifecycle Time Intervals in HIV/AIDS Clinical Trials

    Science.gov (United States)

    Schouten, Jeffrey T.; Dixon, Dennis; Varghese, Suresh; Cope, Marie T.; Marci, Joe; Kagan, Jonathan M.

    2014-01-01

    present for a specific study phase may have been masked by combining protocols into phase groupings. Presence of informative censoring, such as withdrawal of some protocols from development if they began showing signs of lost interest among investigators, complicates interpretation of Kaplan-Meier estimates. Because this study constitutes a retrospective examination over an extended period of time, it does not allow for the precise identification of relative factors impacting timing. Conclusions Delays not only increase the time and cost to complete clinical trials, but they also diminish their usefulness by failing to answer research questions in time. We believe that research analyzing the time spent traversing defined intervals across the clinical trial protocol development and implementation continuum can stimulate business process analyses and reengineering efforts that could lead to reductions in the time from clinical trial concept to results, thereby accelerating progress in clinical research. PMID:24980279

  6. Characterizing College Science Assessments: The Three-Dimensional Learning Assessment Protocol

    Science.gov (United States)

    Underwood, Sonia M.; Matz, Rebecca L.; Posey, Lynmarie A.; Carmel, Justin H.; Caballero, Marcos D.; Fata-Hartley, Cori L.; Ebert-May, Diane; Jardeleza, Sarah E.; Cooper, Melanie M.

    2016-01-01

    Many calls to improve science education in college and university settings have focused on improving instructor pedagogy. Meanwhile, science education at the K-12 level is undergoing significant changes as a result of the emphasis on scientific and engineering practices, crosscutting concepts, and disciplinary core ideas. This framework of “three-dimensional learning” is based on the literature about how people learn science and how we can help students put their knowledge to use. Recently, similar changes are underway in higher education by incorporating three-dimensional learning into college science courses. As these transformations move forward, it will become important to assess three-dimensional learning both to align assessments with the learning environment, and to assess the extent of the transformations. In this paper we introduce the Three-Dimensional Learning Assessment Protocol (3D-LAP), which is designed to characterize and support the development of assessment tasks in biology, chemistry, and physics that align with transformation efforts. We describe the development process used by our interdisciplinary team, discuss the validity and reliability of the protocol, and provide evidence that the protocol can distinguish between assessments that have the potential to elicit evidence of three-dimensional learning and those that do not. PMID:27606671

  7. Characterizing College Science Assessments: The Three-Dimensional Learning Assessment Protocol.

    Science.gov (United States)

    Laverty, James T; Underwood, Sonia M; Matz, Rebecca L; Posey, Lynmarie A; Carmel, Justin H; Caballero, Marcos D; Fata-Hartley, Cori L; Ebert-May, Diane; Jardeleza, Sarah E; Cooper, Melanie M

    2016-01-01

    Many calls to improve science education in college and university settings have focused on improving instructor pedagogy. Meanwhile, science education at the K-12 level is undergoing significant changes as a result of the emphasis on scientific and engineering practices, crosscutting concepts, and disciplinary core ideas. This framework of "three-dimensional learning" is based on the literature about how people learn science and how we can help students put their knowledge to use. Recently, similar changes are underway in higher education by incorporating three-dimensional learning into college science courses. As these transformations move forward, it will become important to assess three-dimensional learning both to align assessments with the learning environment, and to assess the extent of the transformations. In this paper we introduce the Three-Dimensional Learning Assessment Protocol (3D-LAP), which is designed to characterize and support the development of assessment tasks in biology, chemistry, and physics that align with transformation efforts. We describe the development process used by our interdisciplinary team, discuss the validity and reliability of the protocol, and provide evidence that the protocol can distinguish between assessments that have the potential to elicit evidence of three-dimensional learning and those that do not.

  8. Advances and limitations of visual conditioning protocols in harnessed bees.

    Science.gov (United States)

    Avarguès-Weber, Aurore; Mota, Theo

    2016-10-01

    Bees are excellent invertebrate models for studying visual learning and memory mechanisms, because of their sophisticated visual system and impressive cognitive capacities associated with a relatively simple brain. Visual learning in free-flying bees has been traditionally studied using an operant conditioning paradigm. This well-established protocol, however, can hardly be combined with invasive procedures for studying the neurobiological basis of visual learning. Different efforts have been made to develop protocols in which harnessed honey bees could associate visual cues with reinforcement, though learning performances remain poorer than those obtained with free-flying animals. Especially in the last decade, the intention of improving visual learning performances of harnessed bees led many authors to adopt distinct visual conditioning protocols, altering parameters like harnessing method, nature and duration of visual stimulation, number of trials, inter-trial intervals, among others. As a result, the literature provides data hardly comparable and sometimes contradictory. In the present review, we provide an extensive analysis of the literature available on visual conditioning of harnessed bees, with special emphasis on the comparison of diverse conditioning parameters adopted by different authors. Together with this comparative overview, we discuss how these diverse conditioning parameters could modulate visual learning performances of harnessed bees. Copyright © 2016 Elsevier Ltd. All rights reserved.

  9. Redactions in protocols for drug trials: what industry sponsors concealed.

    Science.gov (United States)

    Marquardsen, Mikkel; Ogden, Michelle; Gøtzsche, Peter C

    2018-04-01

    Objective To describe the redactions in contemporary protocols for industry-sponsored randomised drug trials with patient relevant outcomes and to evaluate whether there was a legitimate rationale for the redactions. Design Cohort study. Under the Freedom of Information Act, we requested access to trial protocols approved by a research ethics committee in Denmark from October 2012 to March 2013. We received 17 consecutive protocols, which had been redacted before we got them, and nine protocols without redactions. In five additional cases, the companies refused to let the committees give us access, and in three other cases, documents were missing. Participants Not applicable. Setting Not applicable. Main outcome measure Amount and nature of redactions in 22 predefined key protocol variables. Results The redactions were most widespread in those sections of the protocol where there is empirical evidence of substantial problems with the trustworthiness of published drug trials: data analysis, handling of missing data, detection and analysis of adverse events, definition of the outcomes, interim analyses and premature termination of the study, sponsor's access to incoming data while the study is running, ownership to the data and investigators' publication rights. The parts of the text that were redacted differed widely, both between companies and within the same company. Conclusions We could not identify any legitimate rationale for the redactions. The current mistrust in industry-sponsored drug trials can only change if the industry offers unconditional access to its trial protocols and other relevant documents and data.

  10. Kyoto protocol and its implementation in pakistan: hurdles and expectations

    International Nuclear Information System (INIS)

    Iqbal, S.; Sher, H.A.; Qureshi, S.A

    2010-01-01

    In 1997 Kyoto protocol was adopted at the third session of Conference of the parties of UNFCC in Kyoto, Japan. This protocol restricts the industrialized countries and those in transition to a market economy agreed to limit or reduce their emissions. In Pakistan the government is also taking steps to reduce the pollution. This paper discusses the possible low carbon emitting electricity generation options by keeping in view the current energy scenario of Pakistan and the new energy policy announced by the Government of Pakistan for renewable energy promotion. (author)

  11. A Smart Collaborative Routing Protocol for Reliable Data Diffusion in IoT Scenarios.

    Science.gov (United States)

    Ai, Zheng-Yang; Zhou, Yu-Tong; Song, Fei

    2018-06-13

    It is knotty for current routing protocols to meet the needs of reliable data diffusion during the Internet of Things (IoT) deployments. Due to the random placement, limited resources and unattended features of existing sensor nodes, the wireless transmissions are easily exposed to unauthorized users, which becomes a vulnerable area for various malicious attacks, such as wormhole and Sybil attacks. However, the scheme based on geographic location is a suitable candidate to defend against them. This paper is inspired to propose a smart collaborative routing protocol, Geographic energy aware routing and Inspecting Node (GIN), for guaranteeing the reliability of data exchanging. The proposed protocol integrates the directed diffusion routing, Greedy Perimeter Stateless Routing (GPSR), and the inspecting node mechanism. We first discuss current wireless routing protocols from three diverse perspectives (improving transmission rate, shortening transmission range and reducing transmission consumption). Then, the details of GIN, including the model establishment and implementation processes, are presented by means of the theoretical analysis. Through leveraging the game theory, the inspecting node is elected to monitor the network behaviors. Thirdly, we evaluate the network performances, in terms of transmission delay, packet loss ratio, and throughput, between GIN and three traditional schemes (i.e., Flooding, GPSR, and GEAR). The simulation results illustrate that the proposed protocol is able to outperform the others.

  12. Altered Mental Status: Current Evidence-based Recommendations for Prehospital Care

    Directory of Open Access Journals (Sweden)

    Ashley Sanello

    2018-03-01

    Full Text Available Introduction: In the United States emergency medical services (EMS protocols vary widely across jurisdictions. We sought to develop evidence-based recommendations for the prehospital evaluation and treatment of a patient with an acute change in mental status and to compare these recommendations against the current protocols used by the 33 EMS agencies in the State of California. Methods: We performed a literature review of the current evidence in the prehospital treatment of a patient with altered mental status (AMS and augmented this review with guidelines from various national and international societies to create our evidence-based recommendations. We then compared the AMS protocols of each of the 33 EMS agencies for consistency with these recommendations. The specific protocol components that we analyzed were patient assessment, point-of-care tests, supplemental oxygen, use of standardized scoring, evaluating for causes of AMS, blood glucose evaluation, toxicological treatment, and pediatric evaluation and management. Results: Protocols across 33 EMS agencies in California varied widely. All protocols call for a blood glucose check, 21 (64% suggest treating adults at <60mg/dL, and half allow for the use of dextrose 10%. All the protocols recommend naloxone for signs of opioid overdose, but only 13 (39% give specific parameters. Half the agencies (52% recommend considering other toxicological causes of AMS, often by using the mnemonic AEIOU TIPS. Eight (24% recommend a 12-lead electrocardiogram; others simply suggest cardiac monitoring. Fourteen (42% advise supplemental oxygen as needed; only seven (21% give specific parameters. In terms of considering various etiologies of AMS, 25 (76% give instructions to consider trauma, 20 (61% to consider stroke, and 18 (55% to consider seizure. Twenty-three (70% of the agencies have separate pediatric AMS protocols; others include pediatric considerations within the adult protocol. Conclusion: Protocols

  13. Effortful echolalia.

    Science.gov (United States)

    Hadano, K; Nakamura, H; Hamanaka, T

    1998-02-01

    We report three cases of effortful echolalia in patients with cerebral infarction. The clinical picture of speech disturbance is associated with Type 1 Transcortical Motor Aphasia (TCMA, Goldstein, 1915). The patients always spoke nonfluently with loss of speech initiative, dysarthria, dysprosody, agrammatism, and increased effort and were unable to repeat sentences longer than those containing four or six words. In conversation, they first repeated a few words spoken to them, and then produced self initiated speech. The initial repetition as well as the subsequent self initiated speech, which were realized equally laboriously, can be regarded as mitigated echolalia (Pick, 1924). They were always aware of their own echolalia and tried to control it without effect. These cases demonstrate that neither the ability to repeat nor fluent speech are always necessary for echolalia. The possibility that a lesion in the left medial frontal lobe, including the supplementary motor area, plays an important role in effortful echolalia is discussed.

  14. Two-dimensional distributed-phase-reference protocol for quantum key distribution

    DEFF Research Database (Denmark)

    Bacco, Davide; Christensen, Jesper Bjerge; Usuga Castaneda, Mario A.

    2016-01-01

    10 years, long-distance fiber-based DPR systems have been successfully demonstrated, although fundamental obstacles such as intrinsic channel losses limit their performance. Here, we introduce the first two-dimensional DPR-QKD protocol in which information is encoded in the time and phase of weak......Quantum key distribution (QKD) and quantum communication enable the secure exchange of information between remote parties. Currently, the distributed-phase-reference (DPR) protocols, which are based on weak coherent pulses, are among the most practical solutions for long-range QKD. During the last...... coherent pulses. The ability of extracting two bits of information per detection event, enables a higher secret key rate in specific realistic network scenarios. Moreover, despite the use of more dimensions, the proposed protocol remains simple, practical, and fully integrable....

  15. Two-dimensional distributed-phase-reference protocol for quantum key distribution

    Science.gov (United States)

    Bacco, Davide; Christensen, Jesper Bjerge; Castaneda, Mario A. Usuga; Ding, Yunhong; Forchhammer, Søren; Rottwitt, Karsten; Oxenløwe, Leif Katsuo

    2016-12-01

    Quantum key distribution (QKD) and quantum communication enable the secure exchange of information between remote parties. Currently, the distributed-phase-reference (DPR) protocols, which are based on weak coherent pulses, are among the most practical solutions for long-range QKD. During the last 10 years, long-distance fiber-based DPR systems have been successfully demonstrated, although fundamental obstacles such as intrinsic channel losses limit their performance. Here, we introduce the first two-dimensional DPR-QKD protocol in which information is encoded in the time and phase of weak coherent pulses. The ability of extracting two bits of information per detection event, enables a higher secret key rate in specific realistic network scenarios. Moreover, despite the use of more dimensions, the proposed protocol remains simple, practical, and fully integrable.

  16. The need for LWR metrology standardization: the imec roughness protocol

    Science.gov (United States)

    Lorusso, Gian Francesco; Sutani, Takumichi; Rutigliani, Vito; van Roey, Frieda; Moussa, Alain; Charley, Anne-Laure; Mack, Chris; Naulleau, Patrick; Constantoudis, Vassilios; Ikota, Masami; Ishimoto, Toru; Koshihara, Shunsuke

    2018-03-01

    As semiconductor technology keeps moving forward, undeterred by the many challenges ahead, one specific deliverable is capturing the attention of many experts in the field: Line Width Roughness (LWR) specifications are expected to be less than 2nm in the near term, and to drop below 1nm in just a few years. This is a daunting challenge and engineers throughout the industry are trying to meet these targets using every means at their disposal. However, although current efforts are surely admirable, we believe they are not enough. The fact is that a specification has a meaning only if there is an agreed methodology to verify if the criterion is met or not. Such a standardization is critical in any field of science and technology and the question that we need to ask ourselves today is whether we have a standardized LWR metrology or not. In other words, if a single reference sample were provided, would everyone measuring it get reasonably comparable results? We came to realize that this is not the case and that the observed spread in the results throughout the industry is quite large. In our opinion, this makes the comparison of LWR data among institutions, or to a specification, very difficult. In this paper, we report the spread of measured LWR data across the semiconductor industry. We investigate the impact of image acquisition, measurement algorithm, and frequency analysis parameters on LWR metrology. We review critically some of the International Technology Roadmap for Semiconductors (ITRS) metrology guidelines (such as measurement box length larger than 2μm and the need to correct for SEM noise). We compare the SEM roughness results to AFM measurements. Finally, we propose a standardized LWR measurement protocol - the imec Roughness Protocol (iRP) - intended to ensure that every time LWR measurements are compared (from various sources or to specifications), the comparison is sensible and sound. We deeply believe that the industry is at a point where it is

  17. Current practice and developmental efforts for leak detection in U.S. reactor primary systems

    International Nuclear Information System (INIS)

    Kupperman, D.S.; Claytor, T.N.

    1986-01-01

    Current leak detection practices in 74 operating nuclear reactors have been reviewed. Existing leak detection systems are adequate to ensure a leak-before-break scenario in most situations, but no currently available, single method combines optimal leakage detection sensitivity, leak-locating ability, and leakage measurement accuracy. Simply tightening current leakage limits may produce an unacceptably large number of unnecessary shutdowns. The use of commercially available acoustic monitoring systems or moisture-sensitive tape may improve leak detection capability at specific sites. However, neither of these methods currently provides source discrimination (e.g., to distinguish between leaks from pipe cracks and valves) or leak-rate information (a small leak may saturate the system). A field-implementable acoustic leak detection system is being developed to address these limitations. 5 refs.

  18. Variation in radiographic protocols in paediatric interventional cardiology

    International Nuclear Information System (INIS)

    McFadden, S L; Hughes, C M; Winder, R J

    2013-01-01

    The aim of this work is to determine current radiographic protocols in paediatric interventional cardiology (IC) in the UK and Ireland. To do this we investigated which imaging parameters/protocols are commonly used in IC in different hospitals, to identify if a standard technique is used and illustrate any variation in practice. A questionnaire was sent to all hospitals in the UK and Ireland which perform paediatric IC to obtain information on techniques used in each clinical department and on the range of clinical examinations performed. Ethical and research governance approval was sought from the Office for Research Ethics Committees Northern Ireland and the individual trusts. A response rate of 79% was achieved, and a wide variation in technique was found between hospitals. The main differences in technique involved variations in the use of an anti-scatter grid and the use of additional filtration to the radiation beam, frame rates for digital acquisition and pre-programmed projections/paediatric specific programming in the equipment. We conclude that there is no standard protocol for carrying out paediatric IC in the UK or Ireland. Each hospital carries out the IC procedure according to its own local protocols resulting in a wide variation in radiation dose. (paper)

  19. Variation in radiographic protocols in paediatric interventional cardiology.

    Science.gov (United States)

    McFadden, S L; Hughes, C M; Winder, R J

    2013-06-01

    The aim of this work is to determine current radiographic protocols in paediatric interventional cardiology (IC) in the UK and Ireland. To do this we investigated which imaging parameters/protocols are commonly used in IC in different hospitals, to identify if a standard technique is used and illustrate any variation in practice. A questionnaire was sent to all hospitals in the UK and Ireland which perform paediatric IC to obtain information on techniques used in each clinical department and on the range of clinical examinations performed. Ethical and research governance approval was sought from the Office for Research Ethics Committees Northern Ireland and the individual trusts. A response rate of 79% was achieved, and a wide variation in technique was found between hospitals. The main differences in technique involved variations in the use of an anti-scatter grid and the use of additional filtration to the radiation beam, frame rates for digital acquisition and pre-programmed projections/paediatric specific programming in the equipment. We conclude that there is no standard protocol for carrying out paediatric IC in the UK or Ireland. Each hospital carries out the IC procedure according to its own local protocols resulting in a wide variation in radiation dose.

  20. A Standardized and Reproducible Urine Preparation Protocol for Cancer Biomarkers Discovery

    Directory of Open Access Journals (Sweden)

    Julia Beretov

    2014-01-01

    Full Text Available A suitable and standardized protein purification technique is essential to maintain consistency and to allow data comparison between proteomic studies for urine biomarker discovery. Ultimately, efforts should be made to standardize urine preparation protocols. The aim of this study was to develop an optimal analytical protocol to achieve maximal protein yield and to ensure that this method was applicable to examine urine protein patterns that distinguish disease and disease-free states. In this pilot study, we compared seven different urine sample preparation methods to remove salts, and to precipitate and isolate urinary proteins. Sodium dodecyl sulfate-polyacrylamide gel electrophoresis (SDS-PAGE profiles showed that the sequential preparation of urinary proteins by combining acetone and trichloroacetic acid (TCA alongside high speed centrifugation (HSC provided the best separation, and retained the most urinary proteins. Therefore, this approach is the preferred method for all further urine protein analysis.

  1. Kyoto protocol and Nepal's energy sector

    International Nuclear Information System (INIS)

    Pokharel, Shaligram

    2007-01-01

    Nepal has recently ratified Kyoto Protocol, which considers justifiable use of resources to limit or reduce the emission of gases that contribute to green house gas inventory in the atmosphere. Nepal's per capita green gas (GHG) emission from energy use is insignificant. However, it is important for Nepal to adopt environmentally friendly energy options based on local resources like hydropower and biomass. Nepal can benefit from the provisions of clean development mechanism (CDM) under the Kyoto Protocol of the United Nations Framework Convention on Climate Change (UNFCC) or carbon funds being promoted by various organizations in order to obtain funding for new projects that reduce GHG emissions (ER). Funding can be generated through Carbon trading in international market as well. In this paper, the country's current contribution to GHG due to energy consumption is evaluated. Options for promoting more sustainable and environmentally friendly projects have also been discussed

  2. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  3. Safeguards Implementation Guide for States with Small Quantities Protocols

    International Nuclear Information System (INIS)

    2013-01-01

    The International Atomic Energy Agency (IAEA) works to enhance the contribution of nuclear energy for peace and prosperity around the world, while helping to ensure that nuclear material is not diverted to nuclear weapons or other nuclear explosive devices. In implementing safeguards, the IAEA plays an instrumental independent verification role, providing credible assurances that States' safeguards commitments are being respected. Most of the world's non-nuclear-weapon States (NNWSs) have concluded comprehensive safeguards agreements (CSAs) with the IAEA, pursuant to the Treaty on the Non- Proliferation of Nuclear Weapons (NPT). The IAEA and States are required to cooperate in the implementation of such agreements. Effective cooperation demonstrates a State's commitment to the peaceful use of nuclear energy and furthers the State's national interests by reducing the risk of unauthorized use of nuclear material. Over 100 NNWSs party to the NPT have very limited quantities of nuclear material and have concluded protocols to their CSAs which hold in abeyance many procedures in Part II of a CSA. These protocols are referred to as 'small quantities protocols' or 'SQPs' and remain in effect as long as the State meets certain eligibility criteria. The purpose of an SQP is to reduce the burden of safeguards implementation for States with little or no nuclear activities, while retaining the integrity of the safeguards system. States with SQPs have very important obligations they must fulfil under their CSAs. In 1997, as part of the IAEA's efforts to strengthen its safeguards system, the Model Additional Protocol to the Agreement(s) between State(s) and the International Atomic Energy Agency for the Application of Safeguards was developed to provide the IAEA with broader access to information and locations, thus significantly increasing the IAEA's ability to provide assurance of the absence of undeclared nuclear material and activities in States. Many States with SQPs have

  4. Evaluation of protocol uniformity concerning laparoscopic cholecystectomy in The Netherlands

    NARCIS (Netherlands)

    L.S.G.L. Wauben; R.H.M. Goossens (Richard); D.J. van Eijk (Daan); J.F. Lange (Johan)

    2008-01-01

    textabstractBackground: Iatrogenic bile duct injury remains a current complication of laparoscopic cholecystectomy. One uniform and standardized protocol, based on the "critical view of safety" concept of Strasberg, should reduce the incidence of this complication. Furthermore, owing to the rapid

  5. A mechanical protocol to replicate impact in walking footwear.

    Science.gov (United States)

    Price, Carina; Cooper, Glen; Graham-Smith, Philip; Jones, Richard

    2014-01-01

    Impact testing is undertaken to quantify the shock absorption characteristics of footwear. The current widely reported mechanical testing method mimics the heel impact in running and therefore applies excessive energy to walking footwear. The purpose of this study was to modify the ASTM protocol F1614 (Procedure A) to better represent walking gait. This was achieved by collecting kinematic and kinetic data while participants walked in four different styles of walking footwear (trainer, oxford shoe, flip-flop and triple-density sandal). The quantified heel-velocity and effective mass at ground-impact were then replicated in a mechanical protocol. The kinematic data identified different impact characteristics in the footwear styles. Significantly faster heel velocity towards the floor was recorded walking in the toe-post sandals (flip-flop and triple-density sandal) compared with other conditions (e.g. flip-flop: 0.36±0.05 ms(-1) versus trainer: 0.18±0.06 ms(-1)). The mechanical protocol was adapted by altering the mass and drop height specific to the data captured for each shoe (e.g. flip-flop: drop height 7 mm, mass 16.2 kg). As expected, the adapted mechanical protocol produced significantly lower peak force and accelerometer values than the ASTM protocol (pfootwear style specific. Copyright © 2014 Elsevier B.V. All rights reserved.

  6. A protocol for comprehensive assessment of bulbar dysfunction in amyotrophic lateral sclerosis (ALS).

    Science.gov (United States)

    Yunusova, Yana; Green, Jordan R; Wang, Jun; Pattee, Gary; Zinman, Lorne

    2011-02-21

    Improved methods for assessing bulbar impairment are necessary for expediting diagnosis of bulbar dysfunction in ALS, for predicting disease progression across speech subsystems, and for addressing the critical need for sensitive outcome measures for ongoing experimental treatment trials. To address this need, we are obtaining longitudinal profiles of bulbar impairment in 100 individuals based on a comprehensive instrumentation-based assessment that yield objective measures. Using instrumental approaches to quantify speech-related behaviors is very important in a field that has primarily relied on subjective, auditory-perceptual forms of speech assessment(1). Our assessment protocol measures performance across all of the speech subsystems, which include respiratory, phonatory (laryngeal), resonatory (velopharyngeal), and articulatory. The articulatory subsystem is divided into the facial components (jaw and lip), and the tongue. Prior research has suggested that each speech subsystem responds differently to neurological diseases such as ALS. The current protocol is designed to test the performance of each speech subsystem as independently from other subsystems as possible. The speech subsystems are evaluated in the context of more global changes to speech performance. These speech system level variables include speaking rate and intelligibility of speech. The protocol requires specialized instrumentation, and commercial and custom software. The respiratory, phonatory, and resonatory subsystems are evaluated using pressure-flow (aerodynamic) and acoustic methods. The articulatory subsystem is assessed using 3D motion tracking techniques. The objective measures that are used to quantify bulbar impairment have been well established in the speech literature and show sensitivity to changes in bulbar function with disease progression. The result of the assessment is a comprehensive, across-subsystem performance profile for each participant. The profile, when compared to

  7. Cyberbullying Prevention and Intervention Efforts: Current Knowledge and Future Directions

    Science.gov (United States)

    Hong, Jun Sung

    2016-01-01

    Bullying is a serious public health concern that is associated with significant negative mental, social, and physical outcomes. Technological advances have increased adolescents’ use of social media, and online communication platforms have exposed adolescents to another mode of bullying—cyberbullying. Prevention and intervention materials, from websites and tip sheets to classroom curriculum, have been developed to help youth, parents, and teachers address cyberbullying. While youth and parents are willing to disclose their experiences with bullying to their health care providers, these disclosures need to be taken seriously and handled in a caring manner. Health care providers need to include questions about bullying on intake forms to encourage these disclosures. The aim of this article is to examine the current status of cyberbullying prevention and intervention. Research support for several school-based intervention programs is summarised. Recommendations for future research are provided. PMID:28562094

  8. Cyberbullying Prevention and Intervention Efforts: Current Knowledge and Future Directions.

    Science.gov (United States)

    Espelage, Dorothy L; Hong, Jun Sung

    2017-06-01

    Bullying is a serious public health concern that is associated with significant negative mental, social, and physical outcomes. Technological advances have increased adolescents' use of social media, and online communication platforms have exposed adolescents to another mode of bullying- cyberbullying. Prevention and intervention materials, from websites and tip sheets to classroom curriculum, have been developed to help youth, parents, and teachers address cyberbullying. While youth and parents are willing to disclose their experiences with bullying to their health care providers, these disclosures need to be taken seriously and handled in a caring manner. Health care providers need to include questions about bullying on intake forms to encourage these disclosures. The aim of this article is to examine the current status of cyberbullying prevention and intervention. Research support for several school-based intervention programs is summarised. Recommendations for future research are provided.

  9. Transboundary protected area proposals along the Southern Andes of Chile and Argentina: Status of current efforts

    Science.gov (United States)

    Peter Keller

    2007-01-01

    An evolving network of protected areas along the southern Andes of Chile and Argentina-the heart of Patagonia-are in various stages of evaluation and potential Transboundary Protected Area designations. This paper examines three such efforts. The first proposal is the North Andean-Patagonia Regional Eco-Corridor, which was the subject of a recent bilateral meeting...

  10. On the efforts (man-day) concerned with inspection in uranium fuel fabrication facility

    International Nuclear Information System (INIS)

    Watanabe, T.; Tanaka, T.; Seki, Y.

    1990-01-01

    Taking notice of inspection efforts (man·day) of STA·IAEA and those of MNF concerned with them, their change and various factors affecting the change have been studied. Namely, first, main topics concerning inspection in our Tokai plant are mentioned and secondly the relation between the inspection efforts and such factors as PIV period, number of items, number of DA sampling and NDA measurements, and so forth is studied. According to our study, though efforts of STA·IAEA and MNF required for both routine FLOW inspection and PIT have been nearly unchanged each year, our efforts for PIV have been increasing gradually. The factors relating to this increase of our efforts are the PIV period, inspection efforts of STA·IAEA for PIV and the number of DA sampling and NDA measurements. Finally, a suggestion on the future inspection system has been mentioned and then some items for improvement under the current inspection system have been exemplified. (author)

  11. Lightweight UDP Pervasive Protocol in Smart Home Environment Based on Labview

    Science.gov (United States)

    Kurniawan, Wijaya; Hannats Hanafi Ichsan, Mochammad; Rizqika Akbar, Sabriansyah; Arwani, Issa

    2017-04-01

    TCP (Transmission Control Protocol) technology in a reliable environment was not a problem, but not in an environment where the entire Smart Home network connected locally. Currently employing pervasive protocols using TCP technology, when data transmission is sent, it would be slower because they have to perform handshaking process in advance and could not broadcast the data. On smart home environment, it does not need large size and complex data transmission between monitoring site and monitoring center required in Smart home strain monitoring system. UDP (User Datagram Protocol) technology is quick and simple on data transmission process. UDP can broadcast messages because the UDP did not require handshaking and with more efficient memory usage. LabVIEW is a programming language software for processing and visualization of data in the field of data acquisition. This paper proposes to examine Pervasive UDP protocol implementations in smart home environment based on LabVIEW. UDP coded in LabVIEW and experiments were performed on a PC and can work properly.

  12. Autonomous Power Control MAC Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available Battery energy limitation has become a performance bottleneck for mobile ad hoc networks. IEEE 802.11 has been adopted as the current standard MAC protocol for ad hoc networks. However, it was developed without considering energy efficiency. To solve this problem, many modifications on IEEE 802.11 to incorporate power control have been proposed in the literature. The main idea of these power control schemes is to use a maximum possible power level for transmitting RTS/CTS and the lowest acceptable power for sending DATA/ACK. However, these schemes may degrade network throughput and reduce the overall energy efficiency of the network. This paper proposes autonomous power control MAC protocol (APCMP, which allows mobile nodes dynamically adjusting power level for transmitting DATA/ACK according to the distances between the transmitter and its neighbors. In addition, the power level for transmitting RTS/CTS is also adjustable according to the power level for DATA/ACK packets. In this paper, the performance of APCMP protocol is evaluated by simulation and is compared with that of other protocols.

  13. Maximum effort in the minimum-effort game

    Czech Academy of Sciences Publication Activity Database

    Engelmann, Dirk; Normann, H.-T.

    2010-01-01

    Roč. 13, č. 3 (2010), s. 249-259 ISSN 1386-4157 Institutional research plan: CEZ:AV0Z70850503 Keywords : minimum-effort game * coordination game * experiments * social capital Subject RIV: AH - Economics Impact factor: 1.868, year: 2010

  14. Early functional outcome of two surgical protocols used in the repair ...

    African Journals Online (AJOL)

    A wide range of cleft lip and palate management protocols currently exists throughout ... surgery. It includes subjective as well as objective measures of evaluation. Postoperative ... tools that include visual assessment of the lip, teeth, alveolar.

  15. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  16. Application of low-dose radiation protocols in survey CT scans

    International Nuclear Information System (INIS)

    Fu Qiang; Liu Ting; Lu Tao; Xu Ke; Zhang Lin

    2009-01-01

    Objective: To characterize the protocols with low-dose radiation in survey CT scans for localization. Methods: Eighty standard adult patients, head and body phantoms were recruited. Default protocols provided by operator's manual setting were that all the tube voltage for head, chest, abdomen and lumbar was 120 kV; the tube currents were 20,10,20 and 40 mA, respectively. Values of kV and mA in the low-dose experiments were optimized according to the device options. For chest and abdomen, the tube position were compared between default (0 degree) and 180 degree. Phantoms were scanned with above protocols, and the radiation doses were measured respectively. Paired t-test were used for comparisons of standard deviation in CT value, noise and exposure surface dose (ESD) between group with default protocols and group with optimized protocols. Results: The optimized protocols in low-dose CT survey scans were 80 kV, 10 mA for head, 80 kV, 10 mA for chest, 80 kV, 10 mA for abdomen and 100 kV, 10 mA for lumbar. The values of ESD for phantom scan in default and optimized protocols were 0.38 mGy/0.16 mGy in head, 0.30 mGy/0.20 mGy in chest, 0.74 mGy/0.30 mGy in abdomen and 0.81 mGy/0.44 mGy in lumbar, respectively. Compared with default protocols, the optimized protocols reduced the radiation doses 59%, 33%, 59% and 46% in head, chest, abdomen and lumbar. When tube position changed from 0 degree to 180 degree, the ESD were 0.24 mGy/0.20 mGy for chest; 0.37 mGy/0.30 mGy for abdomen, and the radiation doses were reduced 20% and 17%. Conclusion: A certain amount of image noise is increased in low-dose protocols, but image quality is still acceptable without problem in CT localization. The reduction of radiation dose and the radiation harm to patients are the superiority. (authors)

  17. Insecurity of position-based quantum-cryptography protocols against entanglement attacks

    International Nuclear Information System (INIS)

    Lau, Hoi-Kwan; Lo, Hoi-Kwong

    2011-01-01

    Recently, position-based quantum cryptography has been claimed to be unconditionally secure. On the contrary, here we show that the existing proposals for position-based quantum cryptography are, in fact, insecure if entanglement is shared among two adversaries. Specifically, we demonstrate how the adversaries can incorporate ideas of quantum teleportation and quantum secret sharing to compromise the security with certainty. The common flaw to all current protocols is that the Pauli operators always map a codeword to a codeword (up to an irrelevant overall phase). We propose a modified scheme lacking this property in which the same cheating strategy used to undermine the previous protocols can succeed with a rate of at most 85%. We prove the modified protocol is secure when the shared quantum resource between the adversaries is a two- or three-level system.

  18. Performance Evaluation of Distributed Mobility Management Protocols: Limitations and Solutions for Future Mobile Networks

    Directory of Open Access Journals (Sweden)

    J. Carmona-Murillo

    2017-01-01

    Full Text Available Mobile Internet data traffic has experienced an exponential growth over the last few years due to the rise of demanding multimedia content and the increasing number of mobile devices. Seamless mobility support at the IP level is envisioned as a key architectural requirement in order to deal with the ever-increasing demand for data and to efficiently utilize a plethora of different wireless access networks. Current efforts from both industry and academia aim to evolve the mobility management protocols towards a more distributed operation to tackle shortcomings of fully centralized approaches. However, distributed solutions face several challenges that can result in lower performance which might affect real-time and multimedia applications. In this paper, we conduct an analytical and simulated evaluation of the main centralized and proposed Distributed Mobility Management (DMM solutions. Our results show that, in some scenarios, when users move at high speed and/or when the mobile node is running long-lasting applications, the DMM approaches incur high signaling cost and long handover latency.

  19. Development of a manualized protocol of massage therapy for clinical trials in osteoarthritis

    Directory of Open Access Journals (Sweden)

    Ali Ather

    2012-10-01

    Full Text Available Abstract Background Clinical trial design of manual therapies may be especially challenging as techniques are often individualized and practitioner-dependent. This paper describes our methods in creating a standardized Swedish massage protocol tailored to subjects with osteoarthritis of the knee while respectful of the individualized nature of massage therapy, as well as implementation of this protocol in two randomized clinical trials. Methods The manualization process involved a collaborative process between methodologic and clinical experts, with the explicit goals of creating a reproducible semi-structured protocol for massage therapy, while allowing some latitude for therapists’ clinical judgment and maintaining consistency with a prior pilot study. Results The manualized protocol addressed identical specified body regions with distinct 30- and 60-min protocols, using standard Swedish strokes. Each protocol specifies the time allocated to each body region. The manualized 30- and 60-min protocols were implemented in a dual-site 24-week randomized dose-finding trial in patients with osteoarthritis of the knee, and is currently being implemented in a three-site 52-week efficacy trial of manualized Swedish massage therapy. In the dose-finding study, therapists adhered to the protocols and significant treatment effects were demonstrated. Conclusions The massage protocol was manualized, using standard techniques, and made flexible for individual practitioner and subject needs. The protocol has been applied in two randomized clinical trials. This manualized Swedish massage protocol has real-world utility and can be readily utilized both in the research and clinical settings. Trial registration Clinicaltrials.gov NCT00970008 (18 August 2009

  20. A universal data access and protocol integration mechanism for smart home

    Science.gov (United States)

    Shao, Pengfei; Yang, Qi; Zhang, Xuan

    2013-03-01

    With the lack of standardized or completely missing communication interfaces in home electronics, there is no perfect solution to address every aspect in smart homes based on existing protocols and technologies. In addition, the central control unit (CCU) of smart home system working point-to-point between the multiple application interfaces and the underlying hardware interfaces leads to its complicated architecture and unpleasant performance. A flexible data access and protocol integration mechanism is required. The current paper offers a universal, comprehensive data access and protocol integration mechanism for a smart home. The universal mechanism works as a middleware adapter with unified agreements of the communication interfaces and protocols, offers an abstraction of the application level from the hardware specific and decoupling the hardware interface modules from the application level. Further abstraction for the application interfaces and the underlying hardware interfaces are executed based on adaption layer to provide unified interfaces for more flexible user applications and hardware protocol integration. This new universal mechanism fundamentally changes the architecture of the smart home and in some way meets the practical requirement of smart homes more flexible and desirable.

  1. Changing reproductive effort within a semelparous reproductive episode.

    Science.gov (United States)

    Hughes, P William; Simons, Andrew M

    2014-08-01

    • Life-history theory predicts a trade-off between current and future reproduction for iteroparous organisms-as individuals age, the expected value of future reproduction declines, and thus reproductive effort is expected to be higher in later clutches than in earlier. In contrast, models explaining the evolution of semelparity treat semelparous reproduction as instantaneous, with no scope for intraindividual variation. However, semelparous reproduction is also extended, but over shorter time scales; whether there are similar age- or stage-specific changes in reproductive effort within a semelparous episode is unclear. In this study, we assessed whether semelparous individuals increase reproductive effort as residual reproductive value declines by comparing the reproductive phenotype of flowers at five different floral positions along a main inflorescence.• Using the herbaceous monocarp Lobelia inflata, we conducted a longitudinal study of 409 individuals including both laboratory and field populations over three seasons. We recorded six reproductive traits-including the length of three phenological intervals as well as fruit size, seed size, and seed number-for all plants across floral positions produced throughout the reproductive episode.• We found that while the rate of flower initiation did not change, flowers at distal (late) floral positions developed more quickly and contained larger seed than flowers at basal (early) floral positions did.• Our results were consistent with the hypothesis that, like iteroparous organisms, L. inflata increases reproductive effort in response to low residual reproductive value. © 2014 Botanical Society of America, Inc.

  2. Development of the Diabetes Technology Society Blood Glucose Monitor System Surveillance Protocol.

    Science.gov (United States)

    Klonoff, David C; Lias, Courtney; Beck, Stayce; Parkes, Joan Lee; Kovatchev, Boris; Vigersky, Robert A; Arreaza-Rubin, Guillermo; Burk, Robert D; Kowalski, Aaron; Little, Randie; Nichols, James; Petersen, Matt; Rawlings, Kelly; Sacks, David B; Sampson, Eric; Scott, Steve; Seley, Jane Jeffrie; Slingerland, Robbert; Vesper, Hubert W

    2016-05-01

    Inaccurate blood glucsoe monitoring systems (BGMSs) can lead to adverse health effects. The Diabetes Technology Society (DTS) Surveillance Program for cleared BGMSs is intended to protect people with diabetes from inaccurate, unreliable BGMS products that are currently on the market in the United States. The Surveillance Program will provide an independent assessment of the analytical performance of cleared BGMSs. The DTS BGMS Surveillance Program Steering Committee included experts in glucose monitoring, surveillance testing, and regulatory science. Over one year, the committee engaged in meetings and teleconferences aiming to describe how to conduct BGMS surveillance studies in a scientifically sound manner that is in compliance with good clinical practice and all relevant regulations. A clinical surveillance protocol was created that contains performance targets and analytical accuracy-testing studies with marketed BGMS products conducted by qualified clinical and laboratory sites. This protocol entitled "Protocol for the Diabetes Technology Society Blood Glucose Monitor System Surveillance Program" is attached as supplementary material. This program is needed because currently once a BGMS product has been cleared for use by the FDA, no systematic postmarket Surveillance Program exists that can monitor analytical performance and detect potential problems. This protocol will allow identification of inaccurate and unreliable BGMSs currently available on the US market. The DTS Surveillance Program will provide BGMS manufacturers a benchmark to understand the postmarket analytical performance of their products. Furthermore, patients, health care professionals, payers, and regulatory agencies will be able to use the results of the study to make informed decisions to, respectively, select, prescribe, finance, and regulate BGMSs on the market. © 2015 Diabetes Technology Society.

  3. Development of the Diabetes Technology Society Blood Glucose Monitor System Surveillance Protocol

    Science.gov (United States)

    Klonoff, David C.; Lias, Courtney; Beck, Stayce; Parkes, Joan Lee; Kovatchev, Boris; Vigersky, Robert A.; Arreaza-Rubin, Guillermo; Burk, Robert D.; Kowalski, Aaron; Little, Randie; Nichols, James; Petersen, Matt; Rawlings, Kelly; Sacks, David B.; Sampson, Eric; Scott, Steve; Seley, Jane Jeffrie; Slingerland, Robbert; Vesper, Hubert W.

    2015-01-01

    Background: Inaccurate blood glucsoe monitoring systems (BGMSs) can lead to adverse health effects. The Diabetes Technology Society (DTS) Surveillance Program for cleared BGMSs is intended to protect people with diabetes from inaccurate, unreliable BGMS products that are currently on the market in the United States. The Surveillance Program will provide an independent assessment of the analytical performance of cleared BGMSs. Methods: The DTS BGMS Surveillance Program Steering Committee included experts in glucose monitoring, surveillance testing, and regulatory science. Over one year, the committee engaged in meetings and teleconferences aiming to describe how to conduct BGMS surveillance studies in a scientifically sound manner that is in compliance with good clinical practice and all relevant regulations. Results: A clinical surveillance protocol was created that contains performance targets and analytical accuracy-testing studies with marketed BGMS products conducted by qualified clinical and laboratory sites. This protocol entitled “Protocol for the Diabetes Technology Society Blood Glucose Monitor System Surveillance Program” is attached as supplementary material. Conclusion: This program is needed because currently once a BGMS product has been cleared for use by the FDA, no systematic postmarket Surveillance Program exists that can monitor analytical performance and detect potential problems. This protocol will allow identification of inaccurate and unreliable BGMSs currently available on the US market. The DTS Surveillance Program will provide BGMS manufacturers a benchmark to understand the postmarket analytical performance of their products. Furthermore, patients, health care professionals, payers, and regulatory agencies will be able to use the results of the study to make informed decisions to, respectively, select, prescribe, finance, and regulate BGMSs on the market. PMID:26481642

  4. Design Protocols and Analytical Strategies that Incorporate Structural Reliability Models

    Science.gov (United States)

    Duffy, Stephen F.

    1997-01-01

    Al single crystal turbine blade material; map a simplistic failure strength envelope of the material; develop a statistically based reliability computer algorithm, verify the reliability model and computer algorithm, and model stator vanes for rig tests. Thus establishing design protocols that enable the engineer to analyze and predict the mechanical behavior of ceramic composites and intermetallics would mitigate the prototype (trial and error) approach currently used by the engineering community. The primary objective of the research effort supported by this short term grant is the continued creation of enabling technologies for the macroanalysis of components fabricated from ceramic composites and intermetallic material systems. The creation of enabling technologies aids in shortening the product development cycle of components fabricated from the new high technology materials.

  5. Methods for CT automatic exposure control protocol translation between scanner platforms.

    Science.gov (United States)

    McKenney, Sarah E; Seibert, J Anthony; Lamba, Ramit; Boone, John M

    2014-03-01

    An imaging facility with a diverse fleet of CT scanners faces considerable challenges when propagating CT protocols with consistent image quality and patient dose across scanner makes and models. Although some protocol parameters can comfortably remain constant among scanners (eg, tube voltage, gantry rotation time), the automatic exposure control (AEC) parameter, which selects the overall mA level during tube current modulation, is difficult to match among scanners, especially from different CT manufacturers. Objective methods for converting tube current modulation protocols among CT scanners were developed. Three CT scanners were investigated, a GE LightSpeed 16 scanner, a GE VCT scanner, and a Siemens Definition AS+ scanner. Translation of the AEC parameters such as noise index and quality reference mAs across CT scanners was specifically investigated. A variable-diameter poly(methyl methacrylate) phantom was imaged on the 3 scanners using a range of AEC parameters for each scanner. The phantom consisted of 5 cylindrical sections with diameters of 13, 16, 20, 25, and 32 cm. The protocol translation scheme was based on matching either the volumetric CT dose index or image noise (in Hounsfield units) between two different CT scanners. A series of analytic fit functions, corresponding to different patient sizes (phantom diameters), were developed from the measured CT data. These functions relate the AEC metric of the reference scanner, the GE LightSpeed 16 in this case, to the AEC metric of a secondary scanner. When translating protocols between different models of CT scanners (from the GE LightSpeed 16 reference scanner to the GE VCT system), the translation functions were linear. However, a power-law function was necessary to convert the AEC functions of the GE LightSpeed 16 reference scanner to the Siemens Definition AS+ secondary scanner, because of differences in the AEC functionality designed by these two companies. Protocol translation on the basis of

  6. The HPA photon protocol and proposed electron protocol

    International Nuclear Information System (INIS)

    Pitchford, W.G.

    1985-01-01

    The Hospital Physicists Association (HPA) photon dosimetry protocol has been produced and was published in 1983. Revised values of some components of Csub(lambda) and refinements introduced into the theory in the last few years have enabled new Csub(lambda) values to be produced. The proposed HPA electron protocol is at present in draft form and will be published shortly. Both protocels are discussed. (Auth.)

  7. Protocol for maximizing energy savings and indoor environmental quality improvements when retrofitting apartments

    Energy Technology Data Exchange (ETDEWEB)

    Noris, Federico [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Delp, William W. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Vermeer, Kimberly [Urban Habitat Initiatives Inc., Boston, MA (United States); Adamkiewicz, Gary [Harvard School of Public Health, Boston, MA (United States); Singer, Brett C. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fisk, William J. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2013-06-01

    The current focus on building energy retrofit provides an opportunity to simultaneously improve indoor environmental quality (IEQ). Toward this end, we developed a protocol for selecting packages of retrofits that both save energy and improve IEQ in apartments. The protocol specifies the methodology for selecting retrofits from a candidate list while addressing expected energy savings, IEQ impacts, and costs in an integrated manner. Interviews, inspections and measurements are specified to collect the needed input information. The protocol was applied to 17 apartments in three buildings in two different climates within California. Diagnostic measurements and surveys conducted before and after retrofit implementation indicate enhanced apartment performance.

  8. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  9. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  10. Current understanding of treatment and management protocol for adult diabetic in-patients at a tertiary care hospital

    International Nuclear Information System (INIS)

    Waki, N.; Memon, A.; Khan, M.O.; Masood, S.; Rouf, M.; Mirza, R.

    2012-01-01

    Objective: To assess the current understanding of treatment and management protocols for adult diabetic in-patients at a tertiary care hospital. Methods: This cross-sectional study, conducted at the Civil Hospital Karachi from July to September 2009, involved 450 participants, who were interviewed through a well-structured questionnaire regarding the patient's demography, clinical features, past medical history, type of diabetes mellitus, duration, associated complications, and also involved patient notes for laboratory tests and management. SPSSv15.0 was used for descriptive analysis. Results: The study population of 450 diabetics had 144 (32%) males and 306 (68%) females. Of the total, 435 (96.7%) patients had type 2 diabetes. There were 231 (51%) patients using insulin, 168 (37.3%) oral hypoglycaemic drugs, and 51 (11.3%) using both. Among patients using insulin, regular insulin usage stood at 30% followed by a combination of regular insulin and NPH (26.7%) and NPH alone at 6%. The most popular drug used was metformin (27.3%) and the least used drug was glitazones (4%). In the study population, 73.3% patients controlled their diabetes with diet, and 24.7% with regular exercise. Conclusion: Majority of the study population had type 2 diabetes with a female preponderance. Insulin was prescribed for half the patients. Metformin was the most frequently used oral hypoglycaemic drug. (author)

  11. The Application of RPL Routing Protocol in Low Power Wireless Sensor and Lossy Networks

    Directory of Open Access Journals (Sweden)

    Xun Yang

    2014-05-01

    Full Text Available With the continuous development of computer information technology, wireless sensor has been successfully changed the mode of human life, at the same time, as one of the technologies continues to improve the future life, how to better integration with the RPL routing protocols together become one of research focuses in the current climate. This paper start from the wireless sensor network, briefly discusses the concept, followed by systematic exposition of RPL routing protocol developed background, relevant standards, working principle, topology and related terms, and finally explore the RPL routing protocol in wireless sensor low power lossy network applications.

  12. Aspirin desensitization in patients undergoing percutaneous coronary intervention: a survey of current practice.

    Science.gov (United States)

    Chapman, Andrew R; Rushworth, Gordon F; Leslie, Stephen J

    2013-01-01

    Aspirin remains the mainstay of anti-platelet therapy in cardiac patients. However, if a patient is allergic to aspirin and dual anti-platelet therapy is indicated - such as with percutaneous coronary intervention (PCI), then there is no clear guidance. One possibility is aspirin desensitization. A variety of protocols exist for the rapid desensitization of patients with aspirin allergy. The aim of this survey was to assess current knowledge and practice regarding aspirin desensitization in the UK. We conducted a UK wide survey of all UK 116 PCI centers and obtained complete responses from 40 (35.4%) centers. Of these, just 7 (17.5%) centers had previously desensitised patients; 29 (87.9%) centers suggested a lack of a local protocol prevented them from desensitizing, with 10 (30.3%) unsure of how to conduct desensitization. Only 5 (12.5%) centers had a local policy for aspirin desensitization although 25 (64.1%) units had a clinical strategy for dealing with aspirin allergy; the majority (72%) giving higher doses of thienopyridine class drugs. In the UK, there appears to be no consistent approach to patients with aspirin allergy. Patients undergoing PCI benefit from dual anti-platelet therapy (including aspirin), and aspirin desensitization in those with known allergy may facilitate this. Sustained effort should be placed on encouraging UK centers to use desensitization as a treatment modality prior to PCI rather than avoiding aspirin altogether.

  13. A Lightweight RFID Grouping-Proof Protocol Based on Parallel Mode and DHCP Mechanism

    Directory of Open Access Journals (Sweden)

    Zhicai Shi

    2017-07-01

    Full Text Available A Radio Frequency Identification (RFID grouping-proof protocol is to generate an evidence of the simultaneous existence of a group of tags and it has been applied to many different fields. For current grouping-proof protocols, there still exist some flaws such as low grouping-proof efficiency, being vulnerable to trace attack and information leakage. To improve the secure performance and efficiency, we propose a lightweight RFID grouping-proof protocol based on parallel mode and DHCP (Dynamic Host Configuration Protocol mechanism. Our protocol involves multiple readers and multiple tag groups. During the grouping-proof period, one reader and one tag group are chosen by the verifier by means of DHCP mechanism. When only a part of the tags of the chosen group exist, the protocol can also give the evidence of their co-existence. Our protocol utilizes parallel communication mode between reader and tags so as to ensure its grouping-proof efficiency. It only uses Hash function to complete the mutual authentication among verifier, readers and tags. It can preserve the privacy of the RFID system and resist the attacks such as eavesdropping, replay, trace and impersonation. Therefore the protocol is secure, flexible and efficient. It only uses some lightweight operations such as Hash function and a pseudorandom number generator. Therefore it is very suitable to some low-cost RFID systems.

  14. U.S., Russia join efforts to clean up nuclear sites

    International Nuclear Information System (INIS)

    Richard Seltzer.

    1993-01-01

    U.S. and Russian scientists are stepping up their cooperative efforts to deal with a vexing and controversial problem in both nations--cleanup of radioactive wastes at former nuclear weapons production sites. Last month, a top-level delegation of Russian officials and scientists came to the U.S. for two weeks. They visited Washington, D.C., and the Department of Energy's (DOE) Hanford site in Washington State, studying U.S. cleanup activities and providing information on Russian problems and efforts. The visit was part of a program of exchanges in the areas of environmental restoration and waste management called for by a 1990 memorandum of cooperation between DOE and the Russian Ministry of Atomic Energy. The memo helps implement a U.S.-Russian collaborative agreement on peaceful uses of atomic energy. Currently, cooperation under the memo exists in four areas: vitrification, waste separation, contaminant transport modeling, and student-scientist exchanges. The paper summarizes the visit to the Hanford Reservation and describes the cleanup efforts there

  15. Sincalide - the final protocol

    International Nuclear Information System (INIS)

    Clarke, E.A.; Notghi, A.; Hesslewood, S.R.; Harding, L.K.

    2002-01-01

    Full text: HIDA biliary studies examine the gallbladder (GB) to give a percentage ejection fraction (EF). Porcine CCK was an accepted agent for stimulating the GB prior to being withdrawn in the UK from 1998. Sincalide (a synthetic CCK) was the suggested replacement. We have tried many administration regimes in an attempt to get results comparable with our established CCK protocols. Dose concentration and length of infusion times have been studied. Initially a dose of 10 ngm/kg/min given over 2 minutes (manufacturer's recommended dose) was used. This gave falsely low ejection fractions. The dose was reduced to 3 ngm/kg/min over 3 minutes as it was felt the higher dose may be causing constriction of the sphincter of Oddi. This gave a slight improvement with 22 % of patients having normal EF (>35 %). The length of infusion was extended to 15 minutes and the dose concentration reduced again to 0.6 ngm/kg/min. 62 % of patients had a normal EF. However, on many of the curves the gallbladder was still contracting on completion of the 15 minute infusion and began to refill immediately after stopping Sincalide. A further change of protocol was indicated. The infusion time was extended to 30 minutes and the dose concentration per minute kept the same. Imaging began at 30 minutes post HIDA injection and continued for a total of 50 minutes. Sincalide infusion began at 35 minutes if a GB was visualized. This protocol has been performed on 17 patients. 53 % of these had a normal result (comparable with a normal rate of 40 % previously established with CCK) with a mean EF of 60 %. The mean EF of patients with abnormal studies was 15 %. Curves showed a plateau by 30 minutes in 94 % of patients indicating that gallbladder contraction was complete. No normal range is available so results were compared with ultrasound (US). All patients who had an abnormal US scan also had abnormal HIDA results. Three patients had a normal US scan and abnormal HIDA study. These are currently

  16. Respiratory effort from the photoplethysmogram.

    Science.gov (United States)

    Addison, Paul S

    2017-03-01

    The potential for a simple, non-invasive measure of respiratory effort based on the pulse oximeter signal - the photoplethysmogram or 'pleth' - was investigated in a pilot study. Several parameters were developed based on a variety of manifestations of respiratory effort in the signal, including modulation changes in amplitude, baseline, frequency and pulse transit times, as well as distinct baseline signal shifts. Thirteen candidate parameters were investigated using data from healthy volunteers. Each volunteer underwent a series of controlled respiratory effort maneuvers at various set flow resistances and respiratory rates. Six oximeter probes were tested at various body sites. In all, over three thousand pleth-based effort-airway pressure (EP) curves were generated across the various airway constrictions, respiratory efforts, respiratory rates, subjects, probe sites, and the candidate parameters considered. Regression analysis was performed to determine the existence of positive monotonic relationships between the respiratory effort parameters and resulting airway pressures. Six of the candidate parameters investigated exhibited a distinct positive relationship (poximeter probe and an ECG (P2E-Effort) and the other using two pulse oximeter probes placed at different peripheral body sites (P2-Effort); and baseline shifts in heart rate, (BL-HR-Effort). In conclusion, a clear monotonic relationship was found between several pleth-based parameters and imposed respiratory loadings at the mouth across a range of respiratory rates and flow constrictions. The results suggest that the pleth may provide a measure of changing upper airway dynamics indicative of the effort to breathe. Copyright © 2017 The Author. Published by Elsevier Ltd.. All rights reserved.

  17. Changing Trends in Modeling Mobility

    Directory of Open Access Journals (Sweden)

    Aarti Munjal

    2012-01-01

    Full Text Available A phenomenal increase in the number of wireless devices has led to the evolution of several interesting and challenging research problems in opportunistic networks. For example, the random waypoint mobility model, an early, popular effort to model mobility, involves generating random movement patterns. Previous research efforts, however, validate that movement patterns are not random; instead, human mobility is predictable to some extent. Since the performance of a routing protocol in an opportunistic network is greatly improved if the movement patterns of mobile users can be somewhat predicted in advance, several research attempts have been made to understand human mobility. The solutions developed use our understanding of movement patterns to predict the future contact probability for mobile nodes. In this work, we summarize the changing trends in modeling human mobility as random movements to the current research efforts that model human walks in a more predictable manner. Mobility patterns significantly affect the performance of a routing protocol. Thus, the changing trend in modeling mobility has led to several changes in developing routing protocols for opportunistic networks. For example, the simplest opportunistic routing protocol forwards a received packet to a randomly selected neighbor. With predictable mobility, however, routing protocols can use the expected contact information between a pair of mobile nodes in making forwarding decisions. In this work, we also describe the previous and current research efforts in developing routing protocols for opportunistic networks.

  18. A Service Differentiated MAC Protocol for OFDM/TDMA Wireless Systems

    Institute of Scientific and Technical Information of China (English)

    WANG Ying; ZHANG Ping

    2005-01-01

    This paper proposes a Service Differentiated-Dynamic Slotted Multiple Access (SD-DSMA) protocol with QoS guarantee. The Media Access Control (MAC) frame format is variable according to the traffic of uplink and downlink and the traffic of control and data. In addition, the services are divided into two categories, Guaranteed Bandwidth (GB) and Best Effort (BE). Uplink control message slots are designed for the GB users to reduce contention. Taking into consideration the techniques in physical layer, a two-Dimensional Radio Resource Allocation (2-D RRA) method is proposed. The 2-D RRA is an efficient way to allocate radio resources for multi-cell, multi-user OFDM/TDMA system as it takes into consideration both the channel condition and the co-channel interference. The piggyback mechanism and fair scheduling algorithm are adopted for GB services, and the max C/I scheduling algorithm is used for BE services. The simulation results show that the proposed MAC protocol has better performance in terms of delay, probability of successful access request.

  19. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  20. The National Acupuncture Detoxification Association protocol, auricular acupuncture to support patients with substance abuse and behavioral health disorders: current perspectives

    Directory of Open Access Journals (Sweden)

    Stuyt EB

    2016-12-01

    Full Text Available Elizabeth B Stuyt,1 Claudia A Voyles2 1Department of Psychiatry, University of Colorado Health Sciences Center, Pueblo, CO, 2Department of Clinical Studies, AOMA Graduate School of Integrative Medicine, Austin, TX, USA Abstract: The National Acupuncture Detoxification Association (NADA-standardized 3- to 5-point ear acupuncture protocol, born of a community-minded response to turbulent times not unlike today, has evolved into the most widely implemented acupuncture-assisted protocol, not only for substance abuse, but also for broad behavioral health applications. This evolution happened despite inconsistent research support. This review highlights the history of the protocol and the research that followed its development. Promising, early randomized-controlled trials were followed by a mixed field of positive and negative studies that may serve as a whole to prove that NADA, despite its apparent simplicity, is neither a reductive nor an independent treatment, and the need to refine the research approaches. Particularly focusing on the last decade and its array of trials that elucidate aspects of NADA application and effects, the authors recommend that, going forward, research continues to explore the comparison of the NADA protocol added to accepted treatments to those treatments alone, recognizing that it is not a stand-alone procedure but a psychosocial intervention that affects the whole person and can augment outcomes from other treatment modalities. Keywords: National Acupuncture Detoxification Association (NADA, ear acupuncture, acudetox, addiction, mental health, trauma

  1. Characterization of perovskite solar cells: Towards a reliable measurement protocol

    Directory of Open Access Journals (Sweden)

    Eugen Zimmermann

    2016-09-01

    Full Text Available Lead halide perovskite solar cells have shown a tremendous rise in power conversion efficiency with reported record efficiencies of over 20% making this material very promising as a low cost alternative to conventional inorganic solar cells. However, due to a differently severe “hysteretic” behaviour during current density-voltage measurements, which strongly depends on scan rate, device and measurement history, preparation method, device architecture, etc., commonly used solar cell measurements do not give reliable or even reproducible results. For the aspect of commercialization and the possibility to compare results of different devices among different laboratories, it is necessary to establish a measurement protocol which gives reproducible results. Therefore, we compare device characteristics derived from standard current density-voltage measurements with stabilized values obtained from an adaptive tracking of the maximum power point and the open circuit voltage as well as characteristics extracted from time resolved current density-voltage measurements. Our results provide insight into the challenges of a correct determination of device performance and propose a measurement protocol for a reliable characterisation which is easy to implement and has been tested on varying perovskite solar cells fabricated in different laboratories.

  2. The impact of a multidisciplinary blood conservation protocol on patient outcomes and cost after cardiac surgery.

    Science.gov (United States)

    Ad, Niv; Holmes, Sari D; Patel, Jay; Shuman, Deborah J; Massimiano, Paul S; Choi, Elmer; Fitzgerald, David; Halpin, Linda; Fornaresio, Lisa M

    2017-03-01

    Although associations between transfusion and inferior outcomes have been documented, there is a lack of blood transfusion standardization in cardiac surgery. At the Inova Heart and Vascular Institute, a multidisciplinary, criterion-driven algorithm for transfusion management was implemented. We examined the effect of our blood conservation protocol on transfusion rates and outcomes after cardiac surgery and on stability of transfusion over time. Patients undergoing first-time cardiac surgery from 2006 (full year before protocol) were compared with those in 2009 (after protocol) and propensity score matched to improve balance. Data were prospectively collected. Stability of transfusion incidence also was compared (2005-2006 vs 2008-2014). After matching, 890 patients from each year were included. Use of blood products decreased from 54% in 2006 to 25% in 2009 (P platelets (P conservation program can significantly control blood transfusion rates, improve outcomes, and be sustained over time. Efforts are needed to implement evidence-based protocols to standardize and decrease blood use in cardiac surgery to improve outcomes and reduce cost. Copyright © 2016 The American Association for Thoracic Surgery. Published by Elsevier Inc. All rights reserved.

  3. My home is my bazaar - A taxonomy and classification of current wireless home network protocols

    DEFF Research Database (Denmark)

    Torbensen, Rune; Hansen, Klaus Marius; Hjorth, Theis Solberg

    2011-01-01

    to considerable challenges for developers and integrators in understanding and choosing between the available wireless technologies. To further increase technology adoption and improve business risk assessments, it is necessary to determine the important properties of the technologies in order to compare them......, cost, security, etc. Third, a classification based on the taxonomy and the collected data is presented. In the final discussion, we identify a number of key aspects that could be important technology criteria for future development of home automation protocols....

  4. Development and implementation of the Dutch protocol for rehabilitative management in amyotrophic lateral sclerosis.

    Science.gov (United States)

    van den Berg, J P; de Groot, I J M; Joha, B C; van Haelst, J M; van Gorcom, P; Kalmijn, S

    2004-12-01

    In the Netherlands, rehabilitation care plays an important role in the symptomatic and palliative treatment of ALS patients. However, until 1999 there were no guidelines or practice parameters available for the management of ALS. Therefore, the Dutch protocol for rehabilitative management in ALS was developed. We describe the development process, the outcome and implementation of the protocol. A concept management protocol was written and the Delphi method was selected to develop the protocol further. This method comprises repetitive discussion sessions from postulates, using a combination of written questionnaires and work-conferences. Between 80 and 90 persons (rehabilitation team members of different professional backgrounds and neurologists) were involved in this process. The protocol was implemented by sending it to all consultants in rehabilitation medicine in the Netherlands; they were asked to inform all the treatment team members about the final protocol and to implement it in their treatment of ALS patients. The protocol was developed in 1999, implemented in 2000 and evaluated in 2001. Recommendations for improvement were made during the evaluation and improvements are currently being developed by an expert group. The protocol is widely used (88.9%) by consultants in rehabilitation medicine and their treatment teams in the Netherlands. The Dutch protocol for rehabilitative management was developed to provide an optimal and adequate care plan for patients with ALS. It is widely used in the Netherlands.

  5. The influence of music on mental effort and driving performance.

    Science.gov (United States)

    Ünal, Ayça Berfu; Steg, Linda; Epstude, Kai

    2012-09-01

    The current research examined the influence of loud music on driving performance, and whether mental effort mediated this effect. Participants (N=69) drove in a driving simulator either with or without listening to music. In order to test whether music would have similar effects on driving performance in different situations, we manipulated the simulated traffic environment such that the driving context consisted of both complex and monotonous driving situations. In addition, we systematically kept track of drivers' mental load by making the participants verbally report their mental effort at certain moments while driving. We found that listening to music increased mental effort while driving, irrespective of the driving situation being complex or monotonous, providing support to the general assumption that music can be a distracting auditory stimulus while driving. However, drivers who listened to music performed as well as the drivers who did not listen to music, indicating that music did not impair their driving performance. Importantly, the increases in mental effort while listening to music pointed out that drivers try to regulate their mental effort as a cognitive compensatory strategy to deal with task demands. Interestingly, we observed significant improvements in driving performance in two of the driving situations. It seems like mental effort might mediate the effect of music on driving performance in situations requiring sustained attention. Other process variables, such as arousal and boredom, should also be incorporated to study designs in order to reveal more on the nature of how music affects driving. Copyright © 2012 Elsevier Ltd. All rights reserved.

  6. Biologic comparison of partial breast irradiation protocols

    International Nuclear Information System (INIS)

    Rosenstein, Barry S.; Lymberis, Stella C.; Formenti, Silvia C.

    2004-01-01

    Purpose: To analyze the dose/fractionation schedules currently used in ongoing clinical trials of partial breast irradiation (PBI) by comparing their biologically effective dose (BED) values to those of three standard whole breast protocols commonly used after segmental mastectomy in the treatment of breast cancer. Methods and materials: The BED equation derived from the linear-quadratic model for radiation-induced cell killing was used to calculate the BEDs for three commonly used whole breast radiotherapy regimens, in addition to a variety of external beam radiotherapy, as well as high-dose-rate and low-dose-rate brachytherapy, PBI protocols. Results: The BED values of most PBI protocols resulted in tumor control BEDs roughly equivalent to a 50-Gy standard treatment, but consistently lower than the BEDs for regimens in which the tumor bed receives a total dose of either 60 Gy or 66 Gy. The BED values calculated for the acute radiation responses of erythema and desquamation were nearly all lower for the PBI schedules, and the late-response BEDs for most PBI regimens were in a similar range to the BEDs for the standard treatments. Conclusion: Biologically effective dose modeling raises the concern that inadequate doses might be delivered by PBI to ensure optimal in-field tumor control

  7. New insights from direct monitoring of turbidity currents; and a proposal for co-ordinating international efforts at a series of global "turbidity current test sites"

    Science.gov (United States)

    Talling, Peter

    2015-04-01

    Turbidity currents, and other types of submarine sediment density flow, arguably redistribute more sediment across the surface of the Earth than any other flow process. It is now over 60 years since the seminal publication of Kuenen and Migliorini (1950) in which they made the link between sequences of graded bedding and turbidity currents. The deposits of submarine sediment density flows have been described in numerous locations worldwide, and this might lead to the view that these flows are well understood. However, it is sobering to note quite how few direct measurements we have from these submarine flows in action. Sediment concentration is the critical parameter controlling such flows, yet it has never been measured directly for flows that reach and build submarine fans. How then do we know what type of flow to model in flume tanks, or which assumptions to use to formulate numerical simulations or analytical models? It is proposed here that international efforts are needed for an initiative to monitor active turbidity currents at a series of 'test sites' where flows occur frequently. The flows evolve significantly, such that source to sink data are needed. We also need to directly monitor flows in different settings with variable triggering factors and flow path morphologies because their character can vary significantly. Such work should integrate numerical and physical modelling with the collection of field observations in order to understand the significance of field observations. Such an international initiative also needs to include coring of deposits to link flow processes to deposit character, because in most global locations flow behaviour must be inferred from deposits alone. Collection of seismic datasets is also crucial for understanding the larger-scale evolution and resulting architecture of these systems, and to link with studies of subsurface reservoirs. Test site datasets should thus include a wide range of data types, not just from direct flow

  8. A proposed protocol for remote control of automated assessment devices

    International Nuclear Information System (INIS)

    Kissock, P.S.; Pritchard, D.A.

    1996-01-01

    Systems and devices that are controlled remotely are becoming more common in security systems in the US Air Force and other government agencies to provide protection of valuable assets. These systems reduce the number of needed personnel while still providing a high level of protection. However, each remotely controlled device usually has its own communication protocol. This limits the ability to change devices without changing the system that provides the communications control to the device. Sandia is pursuing a standard protocol that can be used to communicate with the different devices currently in use, or may be used in the future, in the US Air Force and other government agencies throughout the security community. Devices to be controlled include intelligent pan/tilt mounts, day/night video cameras, thermal imaging cameras, and remote data processors. Important features of this protocol include the ability to send messages of varying length, identify the sender, and more importantly, control remote data processors. This paper describes the proposed public domain protocol, features, and examples of use. The authors hope to elicit comments from security technology developers regarding format and use of remotely controlled automated assessment devices

  9. Evaluation of Extraction Protocols for Simultaneous Polar and Non-Polar Yeast Metabolite Analysis Using Multivariate Projection Methods

    Directory of Open Access Journals (Sweden)

    Nicolas P. Tambellini

    2013-07-01

    Full Text Available Metabolomic and lipidomic approaches aim to measure metabolites or lipids in the cell. Metabolite extraction is a key step in obtaining useful and reliable data for successful metabolite studies. Significant efforts have been made to identify the optimal extraction protocol for various platforms and biological systems, for both polar and non-polar metabolites. Here we report an approach utilizing chemoinformatics for systematic comparison of protocols to extract both from a single sample of the model yeast organism Saccharomyces cerevisiae. Three chloroform/methanol/water partitioning based extraction protocols found in literature were evaluated for their effectiveness at reproducibly extracting both polar and non-polar metabolites. Fatty acid methyl esters and methoxyamine/trimethylsilyl derivatized aqueous compounds were analyzed by gas chromatography mass spectrometry to evaluate non-polar or polar metabolite analysis. The comparative breadth and amount of recovered metabolites was evaluated using multivariate projection methods. This approach identified an optimal protocol consisting of 64 identified polar metabolites from 105 ion hits and 12 fatty acids recovered, and will potentially attenuate the error and variation associated with combining metabolite profiles from different samples for untargeted analysis with both polar and non-polar analytes. It also confirmed the value of using multivariate projection methods to compare established extraction protocols.

  10. ADAPTIVE CLUSTER BASED ROUTING PROTOCOL WITH ANT COLONY OPTIMIZATION FOR MOBILE AD-HOC NETWORK IN DISASTER AREA

    Directory of Open Access Journals (Sweden)

    Enrico Budianto

    2012-07-01

    Full Text Available In post-disaster rehabilitation efforts, the availability of telecommunication facilities takes important role. However, the process to improve telecommunication facilities in disaster area is risky if it is done by humans. Therefore, a network method that can work efficiently, effectively, and capable to reach the widest possible area is needed. This research introduces a cluster-based routing protocol named Adaptive Cluster Based Routing Protocol (ACBRP equipped by Ant Colony Optimization method, and its implementation in a simulator developed by author. After data analysis and statistical tests, it can be concluded that routing protocol ACBRP performs better than AODV and DSR routing protocol. Pada upaya rehabilitasi pascabencana, ketersediaan fasilitas telekomunikasi memiliki peranan yang sangat penting. Namun, proses untuk memperbaiki fasilitas telekomunikasi di daerah bencana memiliki resiko jika dilakukan oleh manusia. Oleh karena itu, metode jaringan yang dapat bekerja secara efisien, efektif, dan mampu mencapai area seluas mungkin diperlukan. Penelitian ini memperkenalkan sebuah protokol routing berbasis klaster bernama Adaptive Cluster Based Routing Protocol (ACBRP, yang dilengkapi dengan metode Ant Colony Optimization, dan diimplementasikan pada simulator yang dikembangkan penulis. Setelah data dianalisis dan dilakukan uji statistik, disimpulkan bahwa protokol routing ACBRP beroperasi lebih baik daripada protokol routing AODV maupun DSR.

  11. Effort-Based Decision-Making Paradigms for Clinical Trials in Schizophrenia: Part 1—Psychometric Characteristics of 5 Paradigms.

    Science.gov (United States)

    Reddy, L Felice; Horan, William P; Barch, Deanna M; Buchanan, Robert W; Dunayevich, Eduardo; Gold, James M; Lyons, Naomi; Marder, Stephen R; Treadway, Michael T; Wynn, Jonathan K; Young, Jared W; Green, Michael F

    2015-09-01

    Impairments in willingness to exert effort contribute to the motivational deficits characteristic of the negative symptoms of schizophrenia. The current study evaluated the psychometric properties of 5 new or adapted paradigms to determine their suitability for use in clinical trials of schizophrenia. This study included 94 clinically stable participants with schizophrenia and 40 healthy controls. The effort-based decision-making battery was administered twice to the schizophrenia group (baseline, 4-week retest) and once to the control group. The 5 paradigms included 1 that assesses cognitive effort, 1 perceptual effort, and 3 that assess physical effort. Each paradigm was evaluated on (1) patient vs healthy control group differences, (2) test-retest reliability, (3) utility as a repeated measure (ie, practice effects), and (4) tolerability. The 5 paradigms showed varying psychometric strengths and weaknesses. The Effort Expenditure for Rewards Task showed the best reliability and utility as a repeated measure, while the Grip Effort Task had significant patient-control group differences, and superior tolerability and administration duration. The other paradigms showed weaker psychometric characteristics in their current forms. These findings highlight challenges in adapting effort and motivation paradigms for use in clinical trials. Published by Oxford University Press on behalf of the Maryland Psychiatric Research Center 2015.

  12. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  13. WE-E-304-02: Implementing SBRT Protocols: A NRG CIRO Perspective

    International Nuclear Information System (INIS)

    Xiao, Y.

    2015-01-01

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective even unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation

  14. WE-E-304-02: Implementing SBRT Protocols: A NRG CIRO Perspective

    Energy Technology Data Exchange (ETDEWEB)

    Xiao, Y. [Thomas Jefferson University, Philadelphia, PA (United States)

    2015-06-15

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective even unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation.

  15. Cognitive effort: A neuroeconomic approach

    Science.gov (United States)

    Braver, Todd S.

    2015-01-01

    Cognitive effort has been implicated in numerous theories regarding normal and aberrant behavior and the physiological response to engagement with demanding tasks. Yet, despite broad interest, no unifying, operational definition of cognitive effort itself has been proposed. Here, we argue that the most intuitive and epistemologically valuable treatment is in terms of effort-based decision-making, and advocate a neuroeconomics-focused research strategy. We first outline psychological and neuroscientific theories of cognitive effort. Then we describe the benefits of a neuroeconomic research strategy, highlighting how it affords greater inferential traction than do traditional markers of cognitive effort, including self-reports and physiologic markers of autonomic arousal. Finally, we sketch a future series of studies that can leverage the full potential of the neuroeconomic approach toward understanding the cognitive and neural mechanisms that give rise to phenomenal, subjective cognitive effort. PMID:25673005

  16. 移动Ad Hoc网络路由协议综述%A Survey of Routing Protocols for Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    张顺亮; 叶澄清; 李方敏

    2003-01-01

    A review of current research about routing protocols for mobile Ad Hoc networks is made. Based on classifying of them, the characteristic, the strength and the weakness of these protocols are evaluated respectively. Then some crucial strategies to improve the existing routing protocols are proposed. Besides, a frame of new routing protocol for Ad Hoc networks is put forward. Finally, open issues that still need investigation are listed.

  17. Effort-Based Decision Making: A Novel Approach for Assessing Motivation in Schizophrenia.

    Science.gov (United States)

    Green, Michael F; Horan, William P; Barch, Deanna M; Gold, James M

    2015-09-01

    Because negative symptoms, including motivational deficits, are a critical unmet need in schizophrenia, there are many ongoing efforts to develop new pharmacological and psychosocial interventions for these impairments. A common challenge of these studies involves how to evaluate and select optimal endpoints. Currently, all studies of negative symptoms in schizophrenia depend on ratings from clinician-conducted interviews. Effort-based decision-making tasks may provide a more objective, and perhaps more sensitive, endpoint for trials of motivational negative symptoms. These tasks assess how much effort a person is willing to exert for a given level of reward. This area has been well-studied with animal models of effort and motivation, and effort-based decision-making tasks have been adapted for use in humans. Very recently, several studies have examined physical and cognitive types of effort-based decision-making tasks in cross-sectional studies of schizophrenia, providing evidence for effort-related impairment in this illness. This article covers the theoretical background on effort-based decision-making tasks to provide a context for the subsequent articles in this theme section. In addition, we review the existing literature of studies using these tasks in schizophrenia, consider some practical challenges in adapting them for use in clinical trials in schizophrenia, and discuss interpretive challenges that are central to these types of tasks. © The Author 2015. Published by Oxford University Press on behalf of the Maryland Psychiatric Research Center. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  18. A Review on Microdialysis Calibration Methods: the Theory and Current Related Efforts.

    Science.gov (United States)

    Kho, Chun Min; Enche Ab Rahim, Siti Kartini; Ahmad, Zainal Arifin; Abdullah, Norazharuddin Shah

    2017-07-01

    Microdialysis is a sampling technique first introduced in the late 1950s. Although this technique was originally designed to study endogenous compounds in animal brain, it is later modified to be used in other organs. Additionally, microdialysis is not only able to collect unbound concentration of compounds from tissue sites; this technique can also be used to deliver exogenous compounds to a designated area. Due to its versatility, microdialysis technique is widely employed in a number of areas, including biomedical research. However, for most in vivo studies, the concentration of substance obtained directly from the microdialysis technique does not accurately describe the concentration of the substance on-site. In order to relate the results collected from microdialysis to the actual in vivo condition, a calibration method is required. To date, various microdialysis calibration methods have been reported, with each method being capable to provide valuable insights of the technique itself and its applications. This paper aims to provide a critical review on various calibration methods used in microdialysis applications, inclusive of a detailed description of the microdialysis technique itself to start with. It is expected that this article shall review in detail, the various calibration methods employed, present examples of work related to each calibration method including clinical efforts, plus the advantages and disadvantages of each of the methods.

  19. Concrete Security for Entity Recognition: The Jane Doe Protocol

    DEFF Research Database (Denmark)

    Lucks, Stefan; Zenner, Erik; Weimerskirch, Andre

    2008-01-01

    Entity recognition does not ask whether the message is from some entity X, just whether a message is from the same entity as a previous message. This turns turns out to be very useful for low-end devices. The current paper proposes a new protocol – the “Jane Doe Protocol” –, and provides a formal...

  20. Cross-Layer Protocol as a Better Option in Wireless Mesh Network with Respect to Layered-Protocol

    OpenAIRE

    Ahmed Abdulwahab Al-Ahdal; Dr. V. P. Pawar; G. N. Shinde

    2014-01-01

    The Optimal way to improve Wireless Mesh Networks (WMNs) performance is to use a better network protocol, but whether layered-protocol design or cross-layer design is a better option to optimize protocol performance in WMNs is still an on-going research topic. In this paper, we focus on cross-layer protocol as a better option with respect to layered-protocol. The layered protocol architecture (OSI) model divides networking tasks into layers and defines a pocket of services for each layer to b...

  1. Multiple-specimen absolute paleointensity determination with the MSP-DSC protocol: Advantages and drawbacks.

    Science.gov (United States)

    Camps, P.; Fanjat, G.; Poidras, T.; Carvallo, C.; Nicol, P.

    2012-04-01

    The MSP-DSC protocol (Dekkers & Bohnel, 2006, EPSL; Fabian & Leonhardt, 2010, EPSL) is a recent development in the methodology for documenting the intensity of the ancient Earth magnetic field. Applicable both on rocks or archaeological artifacts it allows us to use samples that until now were not measured because their magnetic properties do not meet selection criteria required by conventional methods. However, this new experimental protocol requires that samples be heated and cooled under a field parallel to its natural remanent magnetization (NRM). Currently, standard paleointensity furnaces do not match precisely this constraint. Yet, such new measurement protocol seems very promising since it would possibly double the number of available data. We are developing in Montpellier (France), a very fast-heating oven with infrared dedicated to this protocol. Two key points determine its characteristics. The first is to heat uniformly a rock sample of a 10-cc-standard volume as fast as possible. The second is to apply to the sample during the heating (and the cooling) a precise magnetic induction field, perfectly controlled in 3D. We tested and calibrated a preliminary version of this oven along with the MSP-DSC protocol with 3 historical lava flows, 2 from Reunion Island (erupted in 2002 and 2007) and one from Etna (erupted in 1983). These lava flows were selected because they have different magnetic behaviors. Reunion 2002 is rather SD-PSD-like, while Reunion 2007 is PSD-MD-like, and Etna 1983 is MD-like. The paleointensity determinations obtained with the original protocol of Dekkers and Bohnel (2006, EPSL) are within +- 1 μT of the known field for the three lava flows. The same precision is obtained when we applied the fraction correction (MSP-FC protocol). However, we systematically observed a loss in the linearity of the MSP-FC plots. In addition, like Muxworthy and Taylor (2011, GJI), we found that the Domain State Correction is difficult to apply since alpha

  2. Design of Organic Transformations at Ambient Conditions: Our Sincere Efforts to the Cause of Green Chemistry Practice.

    Science.gov (United States)

    Brahmachari, Goutam

    2016-02-01

    This account summarizes our recent efforts in designing a good number of important organic transformations leading to the synthesis of biologically relevant compounds at room temperature and pressure. Currently, the concept of green chemistry is globally acclaimed and has already advanced quite significantly to emerge as a distinct branch of chemical sciences. Among the principles of green chemistry, one principle is dedicated to the "design of energy efficiency" - that is, to develop synthetic strategies that require less or the minimum amount of energy to carry out a specific reaction with optimum productivity - and the most effective way to save energy is to develop strategies/protocols that are capable enough to carry out the transformations at ambient temperature! As part of on-going developments in green synthetic strategies, the design of reactions under ambient conditions coupled with other green aspects is, thus, an area of current interest. The concept of developing reaction strategies at room temperature and pressure is now an emerging field of research in organic chemistry and is progressing steadily. This account is aimed to offer an overview of our recent research works directly related to this particular field of interest, and highlights the green chemistry practice leading to carbon-carbon and carbon-heteroatom bond-forming reactions of topical significance. Green synthetic routes to a variety of biologically relevant organic molecules (heterocyclic, heteroaromatic, alicyclic, acyclic, etc.) at room temperature and pressure are discussed. © 2015 The Chemical Society of Japan & Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  3. Marketing in current financial crisis

    OpenAIRE

    Mariánek, Lukáš

    2009-01-01

    The paper is describing the effects of recessions and current financial crisis on companies and their marketing. The topic covers the history of marketing throughout the world biggest recessions and describes the current marketing efforts of Czech companies under the current financial crisis. A strategical analysis with the impacts of crisis on long-term strategy planning is provided at the end of the paper.

  4. Current overview on challenges in regenerative endodontics

    Science.gov (United States)

    Bansal, Ramta; Jain, Aditya; Mittal, Sunandan

    2015-01-01

    Introduction: Regenerative endodontics provides hope of converting the non-vital tooth into vital once again. It focuses on substituting traumatized and pathological pulp with functional pulp tissue. Current regenerative procedures successfully produce root development but still fail to re-establish real pulp tissue and give unpredictable results. There are several drawbacks that need to be addressed to improve the quality and efficiency of the treatment. Aim: The aim of this review article is to discuss major priorities that ought to be dealt before applications of regenerative endodontics flourish the clinical practice. Materials and Methods: A web-based research on MEDLINE was done using filter terms Review, published in the last 10 years and Dental journals. Keywords used for research were “regenerative endodontics,” “dental stem cells,” “growth factor regeneration,” “scaffolds,” and “challenges in regeneration.” This review article screened about 150 articles and then the relevant information was compiled. Results: Inspite of the impressive growth in regenerative endodontic field, there are certain loopholes in the existing treatment protocols that might sometimes result in undesired and unpredictable outcomes. Conclusion: Considerable research and development efforts are required to improve and update existing regenerative endodontic strategies to make it an effective, safe, and biological mode to save teeth. PMID:25657518

  5. Performance Improvement Based Authentication Protocol for Intervessel Traffic Service Data Exchange Format Protocol Based on U-Navigation System in WoT Environment

    Directory of Open Access Journals (Sweden)

    Byunggil Lee

    2014-01-01

    Full Text Available International Association of Lighthouse Authorities (IALA is developing the standard intersystem VTS exchange format (IVEF protocol for exchange of navigation and vessel information between VTS systems and between VTS and vessels. VTS (vessel traffic system is an important marine traffic monitoring system which is designed to improve the safety and efficiency of navigation and the protection of the marine environment. And the demand of Inter-VTS networking has been increased for realization of e-Navigation as shore side collaboration for maritime safety. And IVEF (inter-VTS data exchange format for inter-VTS network has become a hot research topic of VTS system. Currently, the IVEF developed by the International Association of Lighthouse Authorities (IALA does not include any highly trusted certification technology for the connectors. The output of standardization is distributed as the IALA recommendation V-145, and the protocol is implemented with an open source. The IVEF open source, however, is the code used to check the functions of standard protocols. It is too slow to be used in the field and requires a large memory. And the vessel traffic information requires high security since it is highly protected by the countries. Therefore, this paper suggests the authentication protocol to increase the security of the VTS systems using the main certification server and IVEF.

  6. SU-F-207-16: CT Protocols Optimization Using Model Observer

    International Nuclear Information System (INIS)

    Tseng, H; Fan, J; Kupinski, M

    2015-01-01

    Purpose: To quantitatively evaluate the performance of different CT protocols using task-based measures of image quality. This work studies the task of size and the contrast estimation of different iodine concentration rods inserted in head- and body-sized phantoms using different imaging protocols. These protocols are designed to have the same dose level (CTDIvol) but using different X-ray tube voltage settings (kVp). Methods: Different concentrations of iodine objects inserted in a head size phantom and a body size phantom are imaged on a 64-slice commercial CT scanner. Scanning protocols with various tube voltages (80, 100, and 120 kVp) and current settings are selected, which output the same absorbed dose level (CTDIvol). Because the phantom design (size of the iodine objects, the air gap between the inserted objects and the phantom) is not ideal for a model observer study, the acquired CT images are used to generate simulation images with four different sizes and five different contracts iodine objects. For each type of the objects, 500 images (100 x 100 pixels) are generated for the observer study. The observer selected in this study is the channelized scanning linear observer which could be applied to estimate the size and the contrast. The figure of merit used is the correct estimation ratio. The mean and the variance are estimated by the shuffle method. Results: The results indicate that the protocols with 100 kVp tube voltage setting provides the best performance for iodine insert size and contrast estimation for both head and body phantom cases. Conclusion: This work presents a practical and robust quantitative approach using channelized scanning linear observer to study contrast and size estimation performance from different CT protocols. Different protocols at same CTDIvol setting could Result in different image quality performance. The relationship between the absorbed dose and the diagnostic image quality is not linear

  7. SU-F-207-16: CT Protocols Optimization Using Model Observer

    Energy Technology Data Exchange (ETDEWEB)

    Tseng, H [University of Arizona, Tucson, AZ (United States); Fan, J [CT Systems Engineering, GE Healthcare, Waukesha, Wisconsin (United States); Kupinski, M [Univ Arizona, Tucson, AZ (United States)

    2015-06-15

    Purpose: To quantitatively evaluate the performance of different CT protocols using task-based measures of image quality. This work studies the task of size and the contrast estimation of different iodine concentration rods inserted in head- and body-sized phantoms using different imaging protocols. These protocols are designed to have the same dose level (CTDIvol) but using different X-ray tube voltage settings (kVp). Methods: Different concentrations of iodine objects inserted in a head size phantom and a body size phantom are imaged on a 64-slice commercial CT scanner. Scanning protocols with various tube voltages (80, 100, and 120 kVp) and current settings are selected, which output the same absorbed dose level (CTDIvol). Because the phantom design (size of the iodine objects, the air gap between the inserted objects and the phantom) is not ideal for a model observer study, the acquired CT images are used to generate simulation images with four different sizes and five different contracts iodine objects. For each type of the objects, 500 images (100 x 100 pixels) are generated for the observer study. The observer selected in this study is the channelized scanning linear observer which could be applied to estimate the size and the contrast. The figure of merit used is the correct estimation ratio. The mean and the variance are estimated by the shuffle method. Results: The results indicate that the protocols with 100 kVp tube voltage setting provides the best performance for iodine insert size and contrast estimation for both head and body phantom cases. Conclusion: This work presents a practical and robust quantitative approach using channelized scanning linear observer to study contrast and size estimation performance from different CT protocols. Different protocols at same CTDIvol setting could Result in different image quality performance. The relationship between the absorbed dose and the diagnostic image quality is not linear.

  8. Development of Characterization Protocol for Mixed Liquid Radioactive Waste Classification

    International Nuclear Information System (INIS)

    Norasalwa Zakaria; Syed Asraf Wafa; Wo, Y.M.; Sarimah Mahat; Mohamad Annuar Assadat Husain

    2017-01-01

    Mixed organic liquid waste generated from health-care and research activities containing tritium, carbon-14, and other radionuclide posed specific challenges in its management. Often, this waste becomes legacy waste in many nuclear facilities and being considered as 'problematic' waste. One of the most important recommendations made by IAEA is to perform multistage processes aiming at declassification of the waste. At this moment, approximately 3000 bottles of mixed liquid waste, with estimated volume of 6000 litres are currently stored at the National Radioactive Waste Management Centre, Malaysia and some have been stored for more than 25 years. The aim of this study is to develop a characterization protocol towards reclassification of these wastes. The characterization protocol entails waste identification, waste screening and segregation, and analytical radionuclides profiling using analytical procedures involving gross alpha beta, and gamma spectrometry. The results obtained from the characterization protocol are used to establish criteria for speedy classification of the waste. (author)

  9. Development of characterization protocol for mixed liquid radioactive waste classification

    Energy Technology Data Exchange (ETDEWEB)

    Zakaria, Norasalwa, E-mail: norasalwa@nuclearmalaysia.gov.my [Waste Technology Development Centre, Malaysian Nuclear Agency, 43000 Kajang, Selangor (Malaysia); Wafa, Syed Asraf [Radioisotop Technology and Innovation, Malaysian Nuclear Agency, 43000 Kajang, Selangor (Malaysia); Wo, Yii Mei [Radiochemistry and Environment, Malaysian Nuclear Agency, 43000 Kajang, Selangor (Malaysia); Mahat, Sarimah [Material Technology Group, Malaysian Nuclear Agency, 43000 Kajang, Selangor (Malaysia)

    2015-04-29

    Mixed liquid organic waste generated from health-care and research activities containing tritium, carbon-14, and other radionuclides posed specific challenges in its management. Often, these wastes become legacy waste in many nuclear facilities and being considered as ‘problematic’ waste. One of the most important recommendations made by IAEA is to perform multistage processes aiming at declassification of the waste. At this moment, approximately 3000 bottles of mixed liquid waste, with estimated volume of 6000 litres are currently stored at the National Radioactive Waste Management Centre, Malaysia and some have been stored for more than 25 years. The aim of this study is to develop a characterization protocol towards reclassification of these wastes. The characterization protocol entails waste identification, waste screening and segregation, and analytical radionuclides profiling using various analytical procedures including gross alpha/ gross beta, gamma spectrometry, and LSC method. The results obtained from the characterization protocol are used to establish criteria for speedy classification of the waste.

  10. Effort rights-based management

    DEFF Research Database (Denmark)

    Squires, Dale; Maunder, Mark; Allen, Robin

    2017-01-01

    Effort rights-based fisheries management (RBM) is less widely used than catch rights, whether for groups or individuals. Because RBM on catch or effort necessarily requires a total allowable catch (TAC) or total allowable effort (TAE), RBM is discussed in conjunction with issues in assessing fish...... populations and providing TACs or TAEs. Both approaches have advantages and disadvantages, and there are trade-offs between the two approaches. In a narrow economic sense, catch rights are superior because of the type of incentives created, but once the costs of research to improve stock assessments...

  11. Integrating multiple distribution models to guide conservation efforts of an endangered toad

    Science.gov (United States)

    Treglia, Michael L.; Fisher, Robert N.; Fitzgerald, Lee A.

    2015-01-01

    Species distribution models are used for numerous purposes such as predicting changes in species’ ranges and identifying biodiversity hotspots. Although implications of distribution models for conservation are often implicit, few studies use these tools explicitly to inform conservation efforts. Herein, we illustrate how multiple distribution models developed using distinct sets of environmental variables can be integrated to aid in identification sites for use in conservation. We focus on the endangered arroyo toad (Anaxyrus californicus), which relies on open, sandy streams and surrounding floodplains in southern California, USA, and northern Baja California, Mexico. Declines of the species are largely attributed to habitat degradation associated with vegetation encroachment, invasive predators, and altered hydrologic regimes. We had three main goals: 1) develop a model of potential habitat for arroyo toads, based on long-term environmental variables and all available locality data; 2) develop a model of the species’ current habitat by incorporating recent remotely-sensed variables and only using recent locality data; and 3) integrate results of both models to identify sites that may be employed in conservation efforts. We used a machine learning technique, Random Forests, to develop the models, focused on riparian zones in southern California. We identified 14.37% and 10.50% of our study area as potential and current habitat for the arroyo toad, respectively. Generally, inclusion of remotely-sensed variables reduced modeled suitability of sites, thus many areas modeled as potential habitat were not modeled as current habitat. We propose such sites could be made suitable for arroyo toads through active management, increasing current habitat by up to 67.02%. Our general approach can be employed to guide conservation efforts of virtually any species with sufficient data necessary to develop appropriate distribution models.

  12. Generating Models of Infinite-State Communication Protocols Using Regular Inference with Abstraction

    Science.gov (United States)

    Aarts, Fides; Jonsson, Bengt; Uijen, Johan

    In order to facilitate model-based verification and validation, effort is underway to develop techniques for generating models of communication system components from observations of their external behavior. Most previous such work has employed regular inference techniques which generate modest-size finite-state models. They typically suppress parameters of messages, although these have a significant impact on control flow in many communication protocols. We present a framework, which adapts regular inference to include data parameters in messages and states for generating components with large or infinite message alphabets. A main idea is to adapt the framework of predicate abstraction, successfully used in formal verification. Since we are in a black-box setting, the abstraction must be supplied externally, using information about how the component manages data parameters. We have implemented our techniques by connecting the LearnLib tool for regular inference with the protocol simulator ns-2, and generated a model of the SIP component as implemented in ns-2.

  13. In situ protocol for butterfly pupal wings using riboprobes.

    Science.gov (United States)

    Ramos, Diane; Monteiro, Antonia

    2007-01-01

    Here we present, in video format, a protocol for in situ hybridizations in pupal wings of the butterfly Bicyclus anynana using riboprobes. In situ hybridizations, a mainstay of developmental biology, are useful to study the spatial and temporal patterns of gene expression in developing tissues at the level of transcription. If antibodies that target the protein products of gene transcription have not yet been developed, and/or there are multiple gene copies of a particular protein in the genome that cannot be differentiated using available antibodies, in situs can be used instead. While an in situ technique for larval wing discs has been available to the butterfly community for several years, the current protocol has been optimized for the larger and more fragile pupal wings.

  14. Paediatric end-of-life care needs in Switzerland: current practices, and perspectives from parents and professionals. A study protocol.

    Science.gov (United States)

    Bergstraesser, Eva; Zimmermann, Karin; Eskola, Katri; Luck, Patricia; Ramelet, Anne-Sylvie; Cignacco, Eva

    2015-08-01

    To present a protocol for a multi-phase study about the current practice of end-of-life care in paediatric settings in Switzerland. In Switzerland, paediatric palliative care is usually provided by teams, who may not necessarily have specific training. There is a lack of systematic data about specific aspects of care at the end of a child's life, such as symptom management, involvement of parents in decision-making and family-centred care and experiences and needs of parents, and perspectives of healthcare professionals. This retrospective nationwide multicentre study, Paediatric End-of-LIfe CAre Needs in Switzerland (PELICAN), combines quantitative and qualitative methods of enquiry. The PELICAN study consists of three observational parts, PELICAN I describes practices of end-of-life care (defined as the last 4 weeks of life) in the hospital and home care setting of children (0-18 years) who died in the years 2011-2012 due to a cardiac, neurological or oncological disease, or who died in the neonatal period. PELICAN II assesses the experiences and needs of parents during the end-of-life phase of their child. PELICAN III focuses on healthcare professionals and explores their perspectives concerning the provision of end-of-life care. This first study across Switzerland will provide comprehensive insight into the current end-of-life care in children with distinct diagnoses and the perspectives of affected parents and health professionals. The results may facilitate the development and implementation of programmes for end-of-life care in children across Switzerland, building on real experiences and needs. ClinicalTrials.gov Identifier: NCT01983852. © 2015 John Wiley & Sons Ltd.

  15. [Multidisciplinary protocol for computed tomography imaging and angiographic embolization of splenic injury due to trauma: assessment of pre-protocol and post-protocol outcomes].

    Science.gov (United States)

    Koo, M; Sabaté, A; Magalló, P; García, M A; Domínguez, J; de Lama, M E; López, S

    2011-11-01

    To assess conservative treatment of splenic injury due to trauma, following a protocol for computed tomography (CT) and angiographic embolization. To quantify the predictive value of CT for detecting bleeding and need for embolization. The care protocol developed by the multidisciplinary team consisted of angiography with embolization of lesions revealed by contrast extravasation under CT as well as embolization of grade III-V injuries observed, or grade I-II injuries causing hemodynamic instability and/or need for blood transfusion. We collected data on demographic variables, injury severity score (ISS), angiographic findings, and injuries revealed by CT. Pre-protocol and post-protocol outcomes were compared. The sensitivity and specificity of CT findings were calculated for all patients who required angiographic embolization. Forty-four and 30 angiographies were performed in the pre- and post-protocol periods, respectively. The mean (SD) ISSs in the two periods were 25 (11) and 26 (12), respectively. A total of 24 (54%) embolizations were performed in the pre-protocol period and 28 (98%) after implementation of the protocol. Two and 7 embolizations involved the spleen in the 2 periods, respectively; abdominal laparotomies numbered 32 and 25, respectively, and 10 (31%) vs 4 (16%) splenectomies were performed. The specificity and sensitivity values for contrast extravasation found on CT and followed by embolization were 77.7% and 79.5%. The implementation of this multidisciplinary protocol using CT imaging and angiographic embolization led to a decrease in the number of splenectomies. The protocol allows us to take a more conservative treatment approach.

  16. Comparative evaluation of a mixed-fisheries effort-management system based on the Faroe Islands example

    DEFF Research Database (Denmark)

    Baudron, Alan; Ulrich, Clara; Nielsen, J. Rasmus

    2010-01-01

    -specific measures may not be appropriate for such fisheries. A management strategy evaluation model was developed to compare an effort-management system based on the Faroese example with a TAC system as currently applied in EU fisheries. Results show that when stocks are considered in isolation, a total allowable...... effort system does not necessarily perform better than a TAC one. It depends on stock status and dynamics, the level of uncertainty, and the reactivity of the system to changes in scientific advice. When the stocks are considered together in mixed fisheries, effort management seems, however...

  17. iLAP: a workflow-driven software for experimental protocol development, data acquisition and analysis

    Directory of Open Access Journals (Sweden)

    McNally James

    2009-01-01

    Full Text Available Abstract Background In recent years, the genome biology community has expended considerable effort to confront the challenges of managing heterogeneous data in a structured and organized way and developed laboratory information management systems (LIMS for both raw and processed data. On the other hand, electronic notebooks were developed to record and manage scientific data, and facilitate data-sharing. Software which enables both, management of large datasets and digital recording of laboratory procedures would serve a real need in laboratories using medium and high-throughput techniques. Results We have developed iLAP (Laboratory data management, Analysis, and Protocol development, a workflow-driven information management system specifically designed to create and manage experimental protocols, and to analyze and share laboratory data. The system combines experimental protocol development, wizard-based data acquisition, and high-throughput data analysis into a single, integrated system. We demonstrate the power and the flexibility of the platform using a microscopy case study based on a combinatorial multiple fluorescence in situ hybridization (m-FISH protocol and 3D-image reconstruction. iLAP is freely available under the open source license AGPL from http://genome.tugraz.at/iLAP/. Conclusion iLAP is a flexible and versatile information management system, which has the potential to close the gap between electronic notebooks and LIMS and can therefore be of great value for a broad scientific community.

  18. Effect of two complex training protocols of back squats in blood indicators of muscular damage in military athletes.

    Science.gov (United States)

    Ojeda, Álvaro Huerta; Ríos, Luis Chirosa; Barrilao, Rafael Guisado; Ríos, Ignacio Chirosa; Serrano, Pablo Cáceres

    2016-05-01

    [Purpose] The aim of this study was to determine the variations in the blood muscular damage indicators post application of two complex training programs for back squats. [Subjects and Methods] Seven military athletes were the subjects of this study. The study had a quasi-experimental cross-over intra-subject design. Two complex training protocols were applied, and the variables to be measured were cortisol, metabolic creatine kinase, and total creatine kinase. For the statistical analysis, Student's t-test was used. [Results] Twenty-four hours post effort, a significant decrease in cortisol level was shown for both protocols; however, the metabolic creatine kinase and total creatine kinase levels showed a significant increase. [Conclusion] Both protocols lowered the indicator of main muscular damage in the blood supply (cortisol). This proved that the work weight did not generate significant muscular damage in the 24-hour post-exercise period.

  19. Delay tolerant networks protocols and applications

    CERN Document Server

    Vasilakos, Athanasios V; Spyropoulos, Thrasyvoulos

    2011-01-01

    Delay Tolerant Networks (DTN) - which include terrestrial mobile networks, exotic media networks, ad-hoc networks, and sensor networks - are becoming more important and may not be well served by the current end-to-end TCP/IP model. This book provides a self-contained, one-stop reference for researchers and practitioners who are looking toward the future of networking. The text presents a systematic exploration of DTN concepts, architectures, protocols, enabling technologies, and applications. It also discusses various challenges associated with DTN. The author includes a wealth of illustrative

  20. Cognitive Radio MAC Protocol for WLAN

    DEFF Research Database (Denmark)

    Zhang, Qi; Fitzek, Frank H.P.; Iversen, Villy Bæk

    2008-01-01

    hole; moreover, it designs dual inband sensing scheme to detect primary user appearance. Additionally, C-CSMA/CA has the advantage to effectively solve the cognitive radio self-coexistence issues in the overlapping CR BSSs scenario. It also realizes station-based dynamic resource selection......To solve the performance degradation issue in current WLAN caused by the crowded unlicensed spectrum, we propose a cognitive radio (CR) media access protocol, C-CSMA/CA. The basic idea is that with cognitive radio techniques the WLAN devices can not only access the legacy WLAN unlicensed spectrum...

  1. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  2. Modeling and Simulation of a Novel Relay Node Based Secure Routing Protocol Using Multiple Mobile Sink for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Madhumathy Perumal

    2015-01-01

    Full Text Available Data gathering and optimal path selection for wireless sensor networks (WSN using existing protocols result in collision. Increase in collision further increases the possibility of packet drop. Thus there is a necessity to eliminate collision during data aggregation. Increasing the efficiency is the need of the hour with maximum security. This paper is an effort to come up with a reliable and energy efficient WSN routing and secure protocol with minimum delay. This technique is named as relay node based secure routing protocol for multiple mobile sink (RSRPMS. This protocol finds the rendezvous point for optimal transmission of data using a “splitting tree” technique in tree-shaped network topology and then to determine all the subsequent positions of a sink the “Biased Random Walk” model is used. In case of an event, the sink gathers the data from all sources, when they are in the sensing range of rendezvous point. Otherwise relay node is selected from its neighbor to transfer packets from rendezvous point to sink. A symmetric key cryptography is used for secure transmission. The proposed relay node based secure routing protocol for multiple mobile sink (RSRPMS is experimented and simulation results are compared with Intelligent Agent-Based Routing (IAR protocol to prove that there is increase in the network lifetime compared with other routing protocols.

  3. Associations between Effortful Control, Psychological Control and Proactive and Reactive Aggression

    Science.gov (United States)

    Rathert, Jamie; Fite, Paula J.; Gaertner, Alden E.

    2011-01-01

    The current study examined relations between effortful control (ones ability to focus and shift attention in an adaptive manner), psychological control (caregiver attempts to manipulate the child's internal world) and proactive and reactive aggression. Participants were 69 children (54% male) ranging from 9 to 12 years of age (M = 10.35, SD =…

  4. The UK's Draft Guidance for Health in SEA in light of HIA community priorities and the UNECE SEA Protocol

    International Nuclear Information System (INIS)

    Posas, Paula J.

    2011-01-01

    The Protocol on Strategic Environmental Assessment (SEA) to the United Nations Economic Commission for Europe (UNECE) Espoo Convention came into force on 11 July 2010. This Protocol, to which the European Union is party, gives a legal basis for enhanced attention to human health in the SEA process. In this context, the United Kingdom's (UK's) 2007 Draft Guidance on Health in Strategic Environmental Assessment represents an important early government-led effort to bring health issues and public health considerations more significantly into the SEA process. Since the UK is a worldwide leader in environmental and various other types of impact assessment, and since other countries may eventually consider its example in efforts to meet UNECE SEA Protocol requirements, scrutiny of its outputs is warranted. This paper thus examines the UK's Draft Guidance from both HIA academic and practitioner perspectives. First it assesses the extent to which the Draft Guidance reflects recent issues and lessons learned in the academic literature. In order to make the assessment, a meta-analysis of 70 HIA-related peer-reviewed articles was undertaken to extract authors' priority recommendations. These recommendations were subsequently compared with the contents of the Draft Guidance. Secondly, the Draft Guidance was assessed for its accordance with recommendations of the UNECE SEA Protocol background paper written by two HIA practitioners. Overall, the Draft Guidance's accordance with both sets of recommendations was found to be high, with only a few easily-remedied gaps. This evaluation suggests that the UK's Draft Guidance can be a useful starting point in the creation of future guidance on health in SEA in both the UK and other countries.

  5. Cancer Disparities - Cancer Currents Blog

    Science.gov (United States)

    Blog posts on cancer health disparities research—including factors that influence disparities, disparities-related research efforts, and diversity in the cancer research workforce—from NCI Cancer Currents.

  6. A Survey on the Taxonomy of Cluster-Based Routing Protocols for Homogeneous Wireless Sensor Networks

    Science.gov (United States)

    Naeimi, Soroush; Ghafghazi, Hamidreza; Chow, Chee-Onn; Ishii, Hiroshi

    2012-01-01

    The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided. PMID:22969350

  7. Human Schedule Performance, Protocol Analysis, and the "Silent Dog" Methodology

    Science.gov (United States)

    Cabello, Francisco; Luciano, Carmen; Gomez, Inmaculada; Barnes-Holmes, Dermot

    2004-01-01

    The purpose of the current experiment was to investigate the role of private verbal behavior on the operant performances of human adults, using a protocol analysis procedure with additional methodological controls (the "silent dog" method). Twelve subjects were exposed to fixed ratio 8 and differential reinforcement of low rate 3-s schedules. For…

  8. Current management of hepatocellular carcinoma: An Eastern perspective

    Science.gov (United States)

    Yim, Hyung Joon; Suh, Sang Jun; Um, Soon Ho

    2015-01-01

    Hepatocellular carcinoma (HCC) is one of the leading causes of cancer death, especially in Eastern areas. With advancements in diagnosis and treatment modalities for HCC, the survival and prognosis of HCC patients are improving. However, treatment patterns are not uniform between areas despite efforts to promote a common protocol. Although many hepatologists in Asian countries may adopt the principles of the Barcelona Clinic Liver Cancer staging system, they are also independently making an effort to expand the indications of each treatment and to combine therapies for better outcomes. Several expanded criteria for liver transplantation in HCC have been developed in Asian countries. Living donor liver transplantation is much more commonly performed in these countries than deceased donor liver transplantation, and it may be preceded by other treatments such as the down-staging of tumors. Local ablation therapies are often combined with transarterial chemoembolization (TACE) and the outcome is comparable to that of surgical resection. The indications of TACE are expanding, and there are new types of transarterial therapies. Although data on drug-eluting beads, TACE, and radioembolization in Asian countries are still relatively sparse compared with Western countries, these methods are gradually gaining popularity because of better tolerability and the possibility of improved response rates. Hepatic arterial infusion chemotherapy and radiotherapy are not included in Western guidelines, but are currently being used actively in several Asian countries. For more advanced HCCs, appropriate combinations of TACE, radiotherapy, and sorafenib can be considered, and emerging data indicate improved outcomes of combination therapies compared with single therapies. To include these paradigm shifts into newer treatment guidelines, more studies may be needed, but they are certainly in progress. PMID:25852267

  9. Updating the U.S. SMART dispersant efficacy monitoring protocol

    International Nuclear Information System (INIS)

    Trudel, K.; Belore, R.; VanHaverbeke, M.; Mullin, J.

    2009-01-01

    The Special Monitoring of Applied Response Technologies (SMART) is a written dispersant effectiveness monitoring protocol developed in the United States in the mid 1990s. It has been the subject of considerable review and research since its development. This paper reported on the 2007-2008 review of the SMART dispersant effectiveness monitoring protocol which involved the following 3 tasks: (1) stakeholders reviewed their experience with SMART and identified the key deficiencies in the current protocol, (2) the SMART monitoring experience gathered during dispersant effectiveness testing at the Ohmsett National Oil Spill Response Test Facility was reviewed to evaluate the usefulness of existing SMART decision criteria, (3) available commercial off-the-shelf instruments (COTS) were surveyed to identify the instruments that might be more effective or simpler to use than those presently in use. The review concluded that the three-tiered approach in SMART was appropriate, but better guidance was needed for users. In addition, the fluorometer historically used for monitoring of dispersed oil was found to have several operating challenges and should be replaced with more modern equipment. It was recommended that all U.S. government sponsored monitoring teams work with identical instruments and operating protocols. The COTS survey identified 6 potentially suitable submersible and field-portable fluorometers and three particle-size analyzers. 26 refs., 5 tabs., 1 fig

  10. Quantifying motivation with effort-based decision-making paradigms in health and disease.

    Science.gov (United States)

    Chong, T T-J; Bonnelle, V; Husain, M

    2016-01-01

    Motivation can be characterized as a series of cost-benefit valuations, in which we weigh the amount of effort we are willing to expend (the cost of an action) in return for particular rewards (its benefits). Human motivation has traditionally been measured with self-report and questionnaire-based tools, but an inherent limitation of these methods is that they are unable to provide a mechanistic explanation of the processes underlying motivated behavior. A major goal of current research is to quantify motivation objectively with effort-based decision-making paradigms, by drawing on a rich literature from nonhuman animals. Here, we review this approach by considering the development of these paradigms in the laboratory setting over the last three decades, and their more recent translation to understanding choice behavior in humans. A strength of this effort-based approach to motivation is that it is capable of capturing the wide range of individual differences, and offers the potential to dissect motivation into its component elements, thus providing the basis for more accurate taxonomic classifications. Clinically, modeling approaches might provide greater sensitivity and specificity to diagnosing disorders of motivation, for example, in being able to detect subclinical disorders of motivation, or distinguish a disorder of motivation from related but separate syndromes, such as depression. Despite the great potential in applying effort-based paradigms to index human motivation, we discuss several caveats to interpreting current and future studies, and the challenges in translating these approaches to the clinical setting. © 2016 Elsevier B.V. All rights reserved.

  11. Desensitization to Mycofenolate Mofetil: a novel 12 step protocol.

    Science.gov (United States)

    Smith, M; Gonzalez-Estrada, A; Fernandez, J; Subramanian, A

    2016-07-01

    The use of MMF has become standard practice in many solid organ transplant recipients due its efficacy and favorable risk profile compared to other immunosuppressants. There has been a single case report of successful MMF desensitization. However, this protocol did not follow current Drug practice parameters. We report a successful desensitization to MMF in a double heart-kidney transplant recipient.

  12. Maternal Parenting as a Mediator of the Relationship between Intimate Partner Violence and Effortful Control

    OpenAIRE

    Gustafsson, Hanna C.; Cox, Martha J.; Blair, Clancy

    2011-01-01

    The current study examined the relationship between intimate partner violence (IPV), maternal parenting behaviors, and child effortful control in a diverse sample of 705 families living in predominantly low-income, rural communities. Using structural equation modeling, the authors simultaneously tested whether observed sensitive parenting and/or harsh-intrusive parenting over the toddler years mediated the relationship between early IPV and later effortful control. Results suggest that parent...

  13. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  14. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  15. Optical protocols for terabit networks

    Science.gov (United States)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  16. Closing the patient-oncologist communication gap: a review of historic and current efforts.

    Science.gov (United States)

    Pham, A Khoa; Bauer, Marianne T; Balan, Stefan

    2014-03-01

    Effective communication is essential in developing any relationship--this is particularly true between oncologists and their patients. The patient-oncologist relationship is one of the most delicate in medicine, and given the strong emotions associated with cancer, successful communication plays a paramount role in the wellbeing of patients and oncologists. Significant advances to close the communication gap have occurred over the past several decades, largely by addressing deficiencies in the various stages of an oncologist's lengthy training: undergraduate medical education, residency and fellowship, and continuing medical education. Stemming from several milestones achieved by highly motivated groups of individuals, including the creation of consensus statements and guidelines by communication education experts, progress has been made to improve patient-oncologist communication. This progress is marked by the development of evidence-based communication skills training programs, such as Oncotalk and Comskil, in addition to the creation of distant-learning modalities, such as the Studying Communication in Oncologist-Patient Encounters trial. This review article outlines the history of communication education during medical education and training, and brings to light more recent efforts to promote competent, communication-minded physicians necessary for effective cancer care.

  17. Protocols for sagebrush seed processing and seedling production at the Lucky Peak Nursery

    Science.gov (United States)

    Clark D. Fleege

    2010-01-01

    This paper presents the production protocols currently practiced at the USDA Forest Service Lucky Peak Nursery (Boise, ID) for seed processing and bareroot and container seedling production for three subspecies of big sagebrush (Artemisia tridentata).

  18. Epistemic Protocols for Distributed Gossiping

    Directory of Open Access Journals (Sweden)

    Krzysztof R. Apt

    2016-06-01

    Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.

  19. Safeguards Implementation Guide for States with Small Quantities Protocols (Spanish Edition)

    International Nuclear Information System (INIS)

    2013-01-01

    The International Atomic Energy Agency (IAEA) works to enhance the contribution of nuclear energy for peace and prosperity around the world, while helping to ensure that nuclear material is not diverted to nuclear weapons or other nuclear explosive devices. In implementing safeguards, the IAEA plays an instrumental independent verification role, providing credible assurances that States' safeguards commitments are being respected. Most of the world's non-nuclear-weapon States (NNWSs) have concluded comprehensive safeguards agreements (CSAs) with the IAEA, pursuant to the Treaty on the Non- Proliferation of Nuclear Weapons (NPT). The IAEA and States are required to cooperate in the implementation of such agreements. Effective cooperation demonstrates a State's commitment to the peaceful use of nuclear energy and furthers the State's national interests by reducing the risk of unauthorized use of nuclear material. Over 100 NNWSs party to the NPT have very limited quantities of nuclear material and have concluded protocols to their CSAs which hold in abeyance many procedures in Part II of a CSA. These protocols are referred to as 'small quantities protocols' or 'SQPs' and remain in effect as long as the State meets certain eligibility criteria. The purpose of an SQP is to reduce the burden of safeguards implementation for States with little or no nuclear activities, while retaining the integrity of the safeguards system. States with SQPs have very important obligations they must fulfil under their CSAs. In 1997, as part of the IAEA's efforts to strengthen its safeguards system, the Model Additional Protocol to the Agreement(s) between State(s) and the International Atomic Energy Agency for the Application of Safeguards was developed to provide the IAEA with broader access to information and locations, thus significantly increasing the IAEA's ability to provide assurance of the absence of undeclared nuclear material and activities in States. Many States with SQPs have

  20. Safeguards Implementation Guide for States with Small Quantities Protocols (French Edition)

    International Nuclear Information System (INIS)

    2013-01-01

    The International Atomic Energy Agency (IAEA) works to enhance the contribution of nuclear energy for peace and prosperity around the world, while helping to ensure that nuclear material is not diverted to nuclear weapons or other nuclear explosive devices. In implementing safeguards, the IAEA plays an instrumental independent verification role, providing credible assurances that States' safeguards commitments are being respected. Most of the world's non-nuclear-weapon States (NNWSs) have concluded comprehensive safeguards agreements (CSAs) with the IAEA, pursuant to the Treaty on the Non- Proliferation of Nuclear Weapons (NPT). The IAEA and States are required to cooperate in the implementation of such agreements. Effective cooperation demonstrates a State's commitment to the peaceful use of nuclear energy and furthers the State's national interests by reducing the risk of unauthorized use of nuclear material. Over 100 NNWSs party to the NPT have very limited quantities of nuclear material and have concluded protocols to their CSAs which hold in abeyance many procedures in Part II of a CSA. These protocols are referred to as 'small quantities protocols' or 'SQPs' and remain in effect as long as the State meets certain eligibility criteria. The purpose of an SQP is to reduce the burden of safeguards implementation for States with little or no nuclear activities, while retaining the integrity of the safeguards system. States with SQPs have very important obligations they must fulfil under their CSAs. In 1997, as part of the IAEA's efforts to strengthen its safeguards system, the Model Additional Protocol to the Agreement(s) between State(s) and the International Atomic Energy Agency for the Application of Safeguards was developed to provide the IAEA with broader access to information and locations, thus significantly increasing the IAEA's ability to provide assurance of the absence of undeclared nuclear material and activities in States. Many States with SQPs have

  1. Understanding the Association Between Negative Symptoms and Performance on Effort-Based Decision-Making Tasks: The Importance of Defeatist Performance Beliefs.

    Science.gov (United States)

    Reddy, L Felice; Horan, William P; Barch, Deanna M; Buchanan, Robert W; Gold, James M; Marder, Stephen R; Wynn, Jonathan K; Young, Jared; Green, Michael F

    2017-11-13

    Effort-based decision-making paradigms are increasingly utilized to gain insight into the nature of motivation deficits. Research has shown associations between effort-based decision making and experiential negative symptoms; however, the associations are not consistent. The current study had two primary goals. First, we aimed to replicate previous findings of a deficit in effort-based decision making among individuals with schizophrenia on a test of cognitive effort. Second, in a large sample combined from the current and a previous study, we sought to examine the association between negative symptoms and effort by including the related construct of defeatist beliefs. The results replicated previous findings of impaired cognitive effort-based decision making in schizophrenia. Defeatist beliefs significantly moderated the association between negative symptoms and effort-based decision making such that there was a strong association between high negative symptoms and deficits in effort-based decision making, but only among participants with high levels of defeatist beliefs. Thus, our findings suggest the relationship between negative symptoms and effort performance may be understood by taking into account the role of defeatist beliefs, and finding that might explain discrepancies in previous studies. Published by Oxford University Press on behalf of the Maryland Psychiatric Research Center 2017.

  2. Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Rabindra Bista

    2010-05-01

    Full Text Available Many wireless sensor network (WSN applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node. In this paper, we explore several existing privacy-preserving data aggregation (PPDA protocols for WSNs in order to provide some insights on their current status. For this, we evaluate the PPDA protocols on the basis of such metrics as communication and computation costs in order to demonstrate their potential for supporting privacy-preserving data aggregation in WSNs. In addition, based on the existing research, we enumerate some important future research directions in the field of privacy-preserving data aggregation for WSNs.

  3. Privacy-preserving data aggregation protocols for wireless sensor networks: a survey.

    Science.gov (United States)

    Bista, Rabindra; Chang, Jae-Woo

    2010-01-01

    Many wireless sensor network (WSN) applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node. In this paper, we explore several existing privacy-preserving data aggregation (PPDA) protocols for WSNs in order to provide some insights on their current status. For this, we evaluate the PPDA protocols on the basis of such metrics as communication and computation costs in order to demonstrate their potential for supporting privacy-preserving data aggregation in WSNs. In addition, based on the existing research, we enumerate some important future research directions in the field of privacy-preserving data aggregation for WSNs.

  4. A Comparison of Different Corneal Iontophoresis Protocols for Promoting Transepithelial Riboflavin Penetration.

    Science.gov (United States)

    Gore, Daniel M; O'Brart, David P; French, Paul; Dunsby, Chris; Allan, Bruce D

    2015-12-01

    To measure corneal riboflavin penetration using different transepithelial iontophoresis protocols. Freshly enucleated rabbit eyes were divided into nine treatment groups of 4 eyes. One group, in which 0.1% wt/vol riboflavin was applied for 30 minutes without iontophoresis after corneal epithelial debridement, acted as a control. The remaining groups were treated with an intact epithelium using different riboflavin formulations and varying iontophoresis current, soak, and rinse times. After riboflavin application, eyes were snap frozen in liquid nitrogen. Corneal cross sections 35 μm thick were then imaged immediately by two-photon fluorescence microscopy, using image processing software to quantify stromal riboflavin concentration at different corneal depths. In the epithelium-on iontophoresis treatment groups, greater stromal riboflavin penetration was achieved with higher-concentration riboflavin solutions, greater iontophoresis dosage, and longer solution contact times. A protocol utilizing 0.25% wt/vol riboflavin with benzalkonium chloride (BAC) 0.01% and two cycles of applied current and subsequent soaking (1 mA 5 minutes, soak 5 minutes; 0.5 mA 5 minutes, soak 5 minutes) achieved similar stromal riboflavin penetration to epithelium-off controls. The best-performing non-BAC-containing protocol produced stromal riboflavin penetration approximately 60% that of epithelium-off controls. Riboflavin solutions containing saline resulted in minimal stromal penetration. Riboflavin loading within the epithelium was equivalent to or higher than that in the subjacent stroma, despite rinsing the ocular surface with balanced salt solution. Modified iontophoresis protocols can significantly improve transepithelial riboflavin penetration in experimental corneal collagen cross-linking.

  5. An Hourly Dose-Escalation Desensitization Protocol for Aspirin-Exacerbated Respiratory Disease.

    Science.gov (United States)

    Chen, Justin R; Buchmiller, Brett L; Khan, David A

    2015-01-01

    Aspirin desensitization followed by maintenance therapy effectively improves symptom control in patients with aspirin exacerbated respiratory disease (AERD). The majority of current desensitization protocols use 3-hour dosing intervals and often require 2 to 3 days to complete. We evaluated hourly dose escalations in a subset of patients with chronic rhinosinusitis, nasal polyps, and asthma who historically reacted to aspirin within 1 hour or were avoiding aspirin with the goal of developing a safe and efficient desensitization protocol. Fifty-seven aspirin desensitizations were performed under the hourly protocol. All patients had refractory nasal polyposis as an indication for aspirin desensitization. The clinical characteristics of each subject were analyzed in relation to aspects of his or her reactions during the procedure. Ninety-eight percent of study patients were successfully treated under the hourly protocol, including those with a history of severe reactions and intubation. None required further medication than is available in an outpatient allergy clinic. A total of 96% of reactors recorded a bronchial or naso-ocular reaction within 1 hour of the preceding dose. Of the total patients on this protocol, 40% were able to complete the procedure in a single day, and 60% within 2 days. Patients with AERD who have a history of symptoms less than 1 hour after aspirin exposure can be safely desensitized with a 1-hour dose-escalation protocol that can often be completed in a single day. Copyright © 2015 American Academy of Allergy, Asthma & Immunology. Published by Elsevier Inc. All rights reserved.

  6. Dopamine and Effort-Based Decision Making

    Directory of Open Access Journals (Sweden)

    Irma Triasih Kurniawan

    2011-06-01

    Full Text Available Motivational theories of choice focus on the influence of goal values and strength of reinforcement to explain behavior. By contrast relatively little is known concerning how the cost of an action, such as effort expended, contributes to a decision to act. Effort-based decision making addresses how we make an action choice based on an integration of action and goal values. Here we review behavioral and neurobiological data regarding the representation of effort as action cost, and how this impacts on decision making. Although organisms expend effort to obtain a desired reward there is a striking sensitivity to the amount of effort required, such that the net preference for an action decreases as effort cost increases. We discuss the contribution of the neurotransmitter dopamine (DA towards overcoming response costs and in enhancing an animal’s motivation towards effortful actions. We also consider the contribution of brain structures, including the basal ganglia (BG and anterior cingulate cortex (ACC, in the internal generation of action involving a translation of reward expectation into effortful action.

  7. Understanding protocol performance: impact of test performance.

    Science.gov (United States)

    Turner, Robert G

    2013-01-01

    This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as

  8. Evaluation of radiation doses delivered in different chest CT protocols

    International Nuclear Information System (INIS)

    Gorycki, Tomasz; Lasek, Iwona; Kamiński, Kamil; Studniarek, Michał

    2014-01-01

    There are differences in the reference diagnostic levels for the computed tomography (CT) of the chest as cited in different literature sources. The doses are expressed either in weighted CT dose index (CTDI VOL ) used to express the dose per slice, dose-length product (DLP), and effective dose (E). The purpose of this study was to assess the radiation dose used in Low Dose Computer Tomography (LDCT) of the chest in comparison with routine chest CT examinations as well as to compare doses delivered in low dose chest CT with chest X-ray doses. CTDI VOL and DLP doses were taken to analysis from routine CT chest examinations (64 MDCT TK LIGHT SPEED GE Medical System) performed in 202 adult patients with FBP reconstruction: 51 low dose, 106 helical, 20 angio CT, and 25 high resolution CT protocols, as well as 19 helical protocols with iterative ASIR reconstruction. The analysis of chest X-ray doses was made on the basis of reports from 44 examinations. Mean values of CTDI VOL and DLP were, respectively: 2.1 mGy and 85.1 mGy·cm, for low dose, 9.7 mGy and 392.3 mGy·cm for helical, 18.2 mGy and 813.9 mGy·cm for angio CT, 2.3 mGy and 64.4 mGy·cm for high resolution CT, 8.9 mGy. and 317.6 mGy·cm for helical ASIR protocols. Significantly lower CTDI VOL and DLP values were observed for low dose and high resolution CT versus the remaining CT protocols; doses delivered in CT ASIR protocols were also lower (80–81%). The ratio between medial doses in low dose CT and chest X-ray was 11.56. Radiation dose in extended chest LDCT with parameters allowing for identification of mediastinal structures and adrenal glands is still much lower than that in standard CT protocols. Effective doses predicted for LDCT may exceed those used in chest X-ray examinations by a factor of 4 to 12, depending on LDCT scan parameters. Our results, as well as results from other authors, suggest a possibility of reducing the dose by means of iterative reconstruction. Efforts towards further dose

  9. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  10. It Is Time to Rethink Central Auditory Processing Disorder Protocols for School-Aged Children.

    Science.gov (United States)

    DeBonis, David A

    2015-06-01

    The purpose of this article is to review the literature that pertains to ongoing concerns regarding the central auditory processing construct among school-aged children and to assess whether the degree of uncertainty surrounding central auditory processing disorder (CAPD) warrants a change in current protocols. Methodology on this topic included a review of relevant and recent literature through electronic search tools (e.g., ComDisDome, PsycINFO, Medline, and Cochrane databases); published texts; as well as published articles from the Journal of the American Academy of Audiology; the American Journal of Audiology; the Journal of Speech, Language, and Hearing Research; and Language, Speech, and Hearing Services in Schools. This review revealed strong support for the following: (a) Current testing of CAPD is highly influenced by nonauditory factors, including memory, attention, language, and executive function; (b) the lack of agreement regarding the performance criteria for diagnosis is concerning; (c) the contribution of auditory processing abilities to language, reading, and academic and listening abilities, as assessed by current measures, is not significant; and (d) the effectiveness of auditory interventions for improving communication abilities has not been established. Routine use of CAPD test protocols cannot be supported, and strong consideration should be given to redirecting focus on assessing overall listening abilities. Also, intervention needs to be contextualized and functional. A suggested protocol is provided for consideration. All of these issues warrant ongoing research.

  11. A class-chest for deriving transport protocols

    Energy Technology Data Exchange (ETDEWEB)

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  12. A Key Establishment Protocol for RFID User in IPTV Environment

    Science.gov (United States)

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  13. A novel region-growing based semi-automatic segmentation protocol for three-dimensional condylar reconstruction using cone beam computed tomography (CBCT.

    Directory of Open Access Journals (Sweden)

    Tong Xi

    Full Text Available OBJECTIVE: To present and validate a semi-automatic segmentation protocol to enable an accurate 3D reconstruction of the mandibular condyles using cone beam computed tomography (CBCT. MATERIALS AND METHODS: Approval from the regional medical ethics review board was obtained for this study. Bilateral mandibular condyles in ten CBCT datasets of patients were segmented using the currently proposed semi-automatic segmentation protocol. This segmentation protocol combined 3D region-growing and local thresholding algorithms. The segmentation of a total of twenty condyles was performed by two observers. The Dice-coefficient and distance map calculations were used to evaluate the accuracy and reproducibility of the segmented and 3D rendered condyles. RESULTS: The mean inter-observer Dice-coefficient was 0.98 (range [0.95-0.99]. An average 90th percentile distance of 0.32 mm was found, indicating an excellent inter-observer similarity of the segmented and 3D rendered condyles. No systematic errors were observed in the currently proposed segmentation protocol. CONCLUSION: The novel semi-automated segmentation protocol is an accurate and reproducible tool to segment and render condyles in 3D. The implementation of this protocol in the clinical practice allows the CBCT to be used as an imaging modality for the quantitative analysis of condylar morphology.

  14. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    International Nuclear Information System (INIS)

    Soares, M. R.; Maia, A. F.; Batista, W. O. G.; Lara, P. A.

    2014-08-01

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  15. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    Energy Technology Data Exchange (ETDEWEB)

    Soares, M. R.; Maia, A. F. [Universidade Federal de Sergipe, Departamento de Fisica, Cidade Universitaria Prof. Jose Aloisio de Campos, Marechal Rondon s/n, Jardim Rosa Elze, 49-100000 Sao Cristovao, Sergipe (Brazil); Batista, W. O. G. [Instituto Federal da Bahia, Rua Emidio dos Santos s/n, Barbalho, Salvador, 40301015 Bahia (Brazil); Lara, P. A., E-mail: wilsonottobatista@gmail.com [Instituto de Pesquisas Energeticas e Nucleares / CNEN, Av. Lineu Prestes 2242, Cidade Universitaria, 05508-000 Sao Paulo (Brazil)

    2014-08-15

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  16. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  17. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  18. Student Recruitment and Retention Efforts in PETE: Cloudy Skies or Silver Linings

    Science.gov (United States)

    Bulger, Sean M.; Braga, Luciana; DiGiacinto, Kacey; Jones, Emily M.

    2016-01-01

    This article addresses current issues and trends related to teacher candidate recruitment in physical education teacher education programs. It highlights the efforts of program leaders in three different higher education institutions to recruit and retain well-qualified physical education majors. The key lessons learned from these cases serve as a…

  19. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  20. Safeguards Implementation Guide for States with Small Quantities Protocols (French Edition); Guide d'application des garanties pour les Etats ayant des protocoles relatifs aux petites quantites de matieres

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-10-15

    The International Atomic Energy Agency (IAEA) works to enhance the contribution of nuclear energy for peace and prosperity around the world, while helping to ensure that nuclear material is not diverted to nuclear weapons or other nuclear explosive devices. In implementing safeguards, the IAEA plays an instrumental independent verification role, providing credible assurances that States' safeguards commitments are being respected. Most of the world's non-nuclear-weapon States (NNWSs) have concluded comprehensive safeguards agreements (CSAs) with the IAEA, pursuant to the Treaty on the Non- Proliferation of Nuclear Weapons (NPT). The IAEA and States are required to cooperate in the implementation of such agreements. Effective cooperation demonstrates a State's commitment to the peaceful use of nuclear energy and furthers the State's national interests by reducing the risk of unauthorized use of nuclear material. Over 100 NNWSs party to the NPT have very limited quantities of nuclear material and have concluded protocols to their CSAs which hold in abeyance many procedures in Part II of a CSA. These protocols are referred to as 'small quantities protocols' or 'SQPs' and remain in effect as long as the State meets certain eligibility criteria. The purpose of an SQP is to reduce the burden of safeguards implementation for States with little or no nuclear activities, while retaining the integrity of the safeguards system. States with SQPs have very important obligations they must fulfil under their CSAs. In 1997, as part of the IAEA's efforts to strengthen its safeguards system, the Model Additional Protocol to the Agreement(s) between State(s) and the International Atomic Energy Agency for the Application of Safeguards was developed to provide the IAEA with broader access to information and locations, thus significantly increasing the IAEA's ability to provide assurance of the absence of undeclared nuclear material and activities in States. Many States with SQPs have

  1. Scaling-Up Youth-Led Social Justice Efforts through an Online School-Based Social Network.

    Science.gov (United States)

    Kornbluh, Mariah; Neal, Jennifer Watling; Ozer, Emily J

    2016-06-01

    The exploration of social networking sites (SNS) in promoting social change efforts offers great potential within the field of community psychology. Online communities on SNS provide opportunities for bridging across groups, thus fostering the exchange of novel ideas and practices. Currently, there have only been limited efforts to examine SNS within the context of youth-led efforts. To explore the potential of SNS to facilitate the diffusion of social justice efforts between distinct youth groups, we linked three school-based youth-led participatory action research projects involving 54 high school students through a SNS. This study offers an innovative methodological approach and framework, utilizing social network analysis and strategic sampling of key student informants to investigate what individual behaviors and online network features predict student adoption of social change efforts. Findings highlight prospective facilitators and barriers to diffusion processes within a youth-led online network, as well as key constructs that may inform future research. We conclude by providing suggestions for scholars and practitioners interested in examining how SNS can be used to enhance the diffusion of social justice strategies, youth-led engagement efforts, and large-scale civic organizing. © Society for Community Research and Action 2016.

  2. A family of multi-party authentication protocols

    NARCIS (Netherlands)

    Cremers, C.J.F.; Mauw, S.

    2006-01-01

    We introduce a family of multi-party authentication protocols and discuss six novel protocols, which are members of this family. The first three generalize the well-known Needham-Schroeder-Lowe public-key protocol, the Needham-Schroeder private-key protocol, and the Bilateral Key Exchange protocol.

  3. The Dow Chemical Company's synchrotron radiation effort - A case history

    International Nuclear Information System (INIS)

    Bubeck, R.A.; Bare, S.R.; DeKoven, B.M.; Heaney, M.D.; Rudolf, P.R.

    1994-01-01

    Synchrotron radiation is used in a broad array of technologies to study everything from molecular orientation at interfaces, through the structure of active catalyst phases. It is also a key to understanding structure-property relationships and providing fundamental information in polymers, ceramics, and other materials. The Dow Synchrotron User group, formed in 1991, has developed a long-term plan for effective utilization of synchrotron technology. The current efforts at Brookhaven National Lab. and Cornell High Energy Synchrotron Source are examined, as will the long-term commitment at the Advanced Photon Source. Current examples included are in-situ studies of polymer processing, surface and interfaces characterization, and real-time deformation studies. The APS is one of only three open-quotes Third Generationclose quotes synchrotron sources that are planned world-wide, the others being in France and Japan. With a scheduled completion date of mid-1995, the APS has remained both on-budget and ahead-of-schedule since ground-breaking in the spring of 1990. The DuPont - Northwestern University - Dow Collaborative Access Team (DND-CAT) is the first CAT to successfully pass all the necessary hurdles before beamline construction can begin. Some of the goals of the DND-CAT program are mentioned, together with the strengths of this unique collaborative effort

  4. Method-centered digital communities on protocols.io for fast-paced scientific innovation.

    Science.gov (United States)

    Kindler, Lori; Stoliartchouk, Alexei; Teytelman, Leonid; Hurwitz, Bonnie L

    2016-01-01

    The Internet has enabled online social interaction for scientists beyond physical meetings and conferences. Yet despite these innovations in communication, dissemination of methods is often relegated to just academic publishing. Further, these methods remain static, with subsequent advances published elsewhere and unlinked. For communities undergoing fast-paced innovation, researchers need new capabilities to share, obtain feedback, and publish methods at the forefront of scientific development. For example, a renaissance in virology is now underway given the new metagenomic methods to sequence viral DNA directly from an environment. Metagenomics makes it possible to "see" natural viral communities that could not be previously studied through culturing methods. Yet, the knowledge of specialized techniques for the production and analysis of viral metagenomes remains in a subset of labs.  This problem is common to any community using and developing emerging technologies and techniques. We developed new capabilities to create virtual communities in protocols.io, an open access platform, for disseminating protocols and knowledge at the forefront of scientific development. To demonstrate these capabilities, we present a virology community forum called VERVENet. These new features allow virology researchers to share protocols and their annotations and optimizations, connect with the broader virtual community to share knowledge, job postings, conference announcements through a common online forum, and discover the current literature through personalized recommendations to promote discussion of cutting edge research. Virtual communities in protocols.io enhance a researcher's ability to: discuss and share protocols, connect with fellow community members, and learn about new and innovative research in the field.  The web-based software for developing virtual communities is free to use on protocols.io. Data are available through public APIs at protocols.io.

  5. Industrial wireless sensor networks applications, protocols, and standards

    CERN Document Server

    Güngör, V Çagri

    2013-01-01

    The collaborative nature of industrial wireless sensor networks (IWSNs) brings several advantages over traditional wired industrial monitoring and control systems, including self-organization, rapid deployment, flexibility, and inherent intelligent processing. In this regard, IWSNs play a vital role in creating more reliable, efficient, and productive industrial systems, thus improving companies' competitiveness in the marketplace. Industrial Wireless Sensor Networks: Applications, Protocols, and Standards examines the current state of the art in industrial wireless sensor networks and outline

  6. Notes on Human Trials of Transcranial Direct Current Stimulation between 1960 and 1998

    Science.gov (United States)

    Esmaeilpour, Zeinab; Schestatsky, Pedro; Bikson, Marom; Brunoni, André R.; Pellegrinelli, Ada; Piovesan, Fernanda X.; Santos, Mariana M. S. A.; Menezes, Renata B.; Fregni, Felipe

    2017-01-01

    Background: Transcranial direct current stimulation (tDCS) is investigated to modulate neuronal function including cognitive neuroscience and neuropsychiatric therapies. While cases of human stimulation with rudimentary batteries date back more than 200 years, clinical trials with current controlled stimulation were published intermittently since the 1960s. The modern era of tDCS only started after 1998. Objectives: To review methods and outcomes of tDCS studies from old literature (between 1960 and 1998) with intention of providing new insight for ongoing tDCS trials and development of tDCS protocols especially for the purpose of treatment. Methods: Articles were identified through a search in PubMed and through the reference list from its selected articles. We included only non-invasive human studies that provided controlled direct current and were written in English, French, Spanish or Portuguese before the year of 1998, the date in which modern stimulation paradigms were implemented. Results: Fifteen articles met our criteria. The majority were small-randomized controlled clinical trials that enrolled a mean of approximately 26 subjects (Phase II studies). Most of the studies (around 83%) assessed the role of tDCS in the treatment of psychiatric conditions, in which the main outcomes were measured by means of behavioral scales and clinical observation, but the diagnostic precision and the quality of outcome monitoring, including adverse events, were deficient by modern standards. Compared to modern tDCS dose, the stimulation intensities used (0.1–1 mA) were lower, however as the electrodes were typically smaller (e.g., 1.26 cm2), the average electrode current density (0.2 mA/cm2) was approximately 4× higher. The number of sessions ranged from one to 120 (median 14). Notably, the stimulation session durations of several minutes to 11 h (median 4.5 h) could markedly exceed modern tDCS protocols. Twelve studies out of 15 showed positive results. Only mild side

  7. Brief Self-Report Scales Assessing Life History Dimensions of Mating and Parenting Effort

    Directory of Open Access Journals (Sweden)

    Daniel J. Kruger

    2017-02-01

    Full Text Available Life history theory (LHT is a powerful evolutionary framework for understanding physiological, psychological, and behavioral variation both between and within species. Researchers and theorists are increasingly integrating LHT into evolutionary psychology, as it provides a strong foundation for research across many topical areas. Human life history variation has been represented in psychological and behavioral research in several ways, including indicators of conditions in the developmental environment, indicators of conditions in the current environment, and indicators of maturation and life milestones (e.g., menarche, initial sexual activity, first pregnancy, and in self-report survey scale measures. Survey scale measures have included constructs such as time perspective and future discounting, although the most widely used index is a constellation of indicators assessing the K-factor, thought to index general life history speed (from fast to slow. The current project examined the utility of two brief self-report survey measures assessing the life history dimensions of mating effort and parenting effort with a large undergraduate sample in the United States. Consistent with the theory, items reflected two inversely related dimensions. In regressions including the K-factor, the Mating Effort Scale proved to be a powerful predictor of other constructs and indicators related to life history variation. The Parenting Effort Scale had less predictive power overall, although it explained unique variance across several constructs and was the only unique predictor of the number of long-term (serious and committed relationships. These scales may be valuable additions to self-report survey research projects examining life history variation.

  8. Current research efforts with Bacillus thuringiensis

    Science.gov (United States)

    Normand R. Dubois

    1991-01-01

    The bioassay of 260 strains of Bacillus thuringiensis (Bt) and 70 commercial preparations show that regression coefficient estimates may be as critical as LC5O estimates when evaluating them for future consideration.

  9. Field validation of protocols developed to evaluate in-line mastitis detection systems.

    Science.gov (United States)

    Kamphuis, C; Dela Rue, B T; Eastwood, C R

    2016-02-01

    This paper reports on a field validation of previously developed protocols for evaluating the performance of in-line mastitis-detection systems. The protocols outlined 2 requirements of these systems: (1) to detect cows with clinical mastitis (CM) promptly and accurately to enable timely and appropriate treatment and (2) to identify cows with high somatic cell count (SCC) to manage bulk milk SCC levels. Gold standard measures, evaluation tests, performance measures, and performance targets were proposed. The current study validated the protocols on commercial dairy farms with automated in-line mastitis-detection systems using both electrical conductivity (EC) and SCC sensor systems that both monitor at whole-udder level. The protocol for requirement 1 was applied on 3 commercial farms. For requirement 2, the protocol was applied on 6 farms; 3 of them had low bulk milk SCC (128×10(3) cells/mL) and were the same farms as used for field evaluation of requirement 1. Three farms with high bulk milk SCC (270×10(3) cells/mL) were additionally enrolled. The field evaluation methodology and results were presented at a workshop including representation from 7 international suppliers of in-line mastitis-detection systems. Feedback was sought on the acceptance of standardized performance evaluation protocols and recommended refinements to the protocols. Although the methodology for requirement 1 was relatively labor intensive and required organizational skills over an extended period, no major issues were encountered during the field validation of both protocols. The validation, thus, proved the protocols to be practical. Also, no changes to the data collection process were recommended by the technology supplier representatives. However, 4 recommendations were made to refine the protocols: inclusion of an additional analysis that ignores small (low-density) clot observations in the definition of CM, extension of the time window from 4 to 5 milkings for timely alerts for CM

  10. Colon distension and scan protocol for CT-colonography: An overview

    Energy Technology Data Exchange (ETDEWEB)

    Boellaard, Thierry N., E-mail: t.n.boellaard@amc.uva.nl [Department of Radiology, Academic Medical Center, University of Amsterdam, PB 22660, 1100 DD Amsterdam (Netherlands); Haan, Margriet C. de, E-mail: m.c.dehaan@amc.uva.nl [Department of Radiology, Academic Medical Center, University of Amsterdam, PB 22660, 1100 DD Amsterdam (Netherlands); Venema, Henk W., E-mail: h.w.venema@amc.uva.nl [Department of Radiology, Academic Medical Center, University of Amsterdam, PB 22660, 1100 DD Amsterdam (Netherlands); Department of Biomedical Engineering and Physics, Academic Medical Center, University of Amsterdam, PB 22660, 1100 DD Amsterdam (Netherlands); Stoker, Jaap, E-mail: j.stoker@amc.uva.nl [Department of Radiology, Academic Medical Center, University of Amsterdam, PB 22660, 1100 DD Amsterdam (Netherlands)

    2013-08-15

    This article reviews two important aspects of CT-colonography, namely colonic distension and scan parameters. Adequate distension should be obtained to visualize the complete colonic lumen and optimal scan parameters should be used to prevent unnecessary radiation burden. For optimal distension, automatic carbon dioxide insufflation should be performed, preferably via a thin, flexible catheter. Hyoscine butylbromide is – when available – the preferred spasmolytic agent because of the positive effect on insufflation and pain/burden and its low costs. Scans in two positions are required for adequate distension and high polyp sensitivity and decubitus position may be used as an alternative for patients unable to lie in prone position. The great intrinsic contrast between air or tagging and polyps allows the use of low radiation dose. Low-dose protocol without intravenous contrast should be used when extracolonic findings are deemed unimportant. In patients suspected for colorectal cancer, normal abdominal CT scan protocols and intravenous contrast should be used in supine position for the evaluation of extracolonic findings. Dose reduction can be obtained by lowering the tube current and/or voltage. Tube current modulation reduces the radiation dose (except in obese patients), and should be used when available. Iterative reconstructions is a promising dose reducing tool and dual-energy CT is currently evaluated for its applications in CT-colonography. This review also provides our institution's insufflation procedure and scan parameters.

  11. A Cryptographic Moving-Knife Cake-Cutting Protocol

    Directory of Open Access Journals (Sweden)

    Yoshifumi Manabe

    2012-02-01

    Full Text Available This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum.

  12. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... active and adaptive corruptions in the random oracle model. Due to its simplicity, the protocol is extremely efficient and it allows to perform m 1-out-of-n OTs using only: - Computation: (n+1)m+2 exponentiations (mn for the receiver, mn+2 for the sender) and - Communication: 32(m+1) bytes (for the group...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  13. Building a protocol expressway: the case of Mayo Clinic Cancer Center.

    Science.gov (United States)

    McJoynt, Terre A; Hirzallah, Muhanad A; Satele, Daniel V; Pitzen, Jason H; Alberts, Steven R; Rajkumar, S Vincent

    2009-08-10

    Inconsistencies and errors resulting from nonstandard processes, together with redundancies, rework, and excess workload, lead to extended time frames for clinical trial protocol development. This results in dissatisfaction among sponsors, investigators, and staff and restricts the availability of novel treatment options for patients. A team of experts from Mayo Clinic formed, including Protocol Development Unit staff and management from the three Mayo Clinic campuses (Florida, Minnesota, and Arizona), a systems and procedures analyst, a quality office analyst, and two physician members to address the identified deficiencies. The current-state process was intensively reviewed, and improvement steps were taken to accelerate the development and approval of cancer-related clinical trials. The primary goal was to decrease the time from receipt of a new protocol through submission to an approving authority, such as the National Cancer Institute or institutional review board. Using the Define, Measure, Analyze, Improve, Control (DMAIC) framework infused with Lean waste-reduction methodologies, areas were identified for improvement, including enhancing first-time quality and processing new studies on a first-in/first-out basis. The project was successful in improving the mean turnaround time for internally authored protocols (P Lean methodologies is an effective tool to structure the definition, planning, analysis, and implementation of significant process changes.

  14. Optimized workflow and imaging protocols for whole-body oncologic PET/MRI.

    Science.gov (United States)

    Ishii, Shirou; Hara, Takamitsu; Nanbu, Takeyuki; Suenaga, Hiroki; Sugawara, Shigeyasu; Kuroiwa, Daichi; Sekino, Hirofumi; Miyajima, Masayuki; Kubo, Hitoshi; Oriuchi, Noboru; Ito, Hiroshi

    2016-11-01

    Although PET/MRI has the advantages of a simultaneous acquisition of PET and MRI, high soft-tissue contrast of the MRI images, and reduction of radiation exposure, its low profitability and long acquisition time are significant problems in clinical settings. Thus, MRI protocols that meet oncological purposes need to be used in order to reduce examination time while securing detectability. Currently, half-Fourier acquisition single-shot turbo spin echo and 3D-T1 volumetric interpolated breath-hold examination may be the most commonly used sequences for whole-body imaging due to their shorter acquisition time and higher diagnostic accuracy. Although there have been several reports that adding diffusion weighted image (DWI) to PET/MRI protocol has had no effect on tumor detection to date, in cases of liver, kidney, bladder, and prostate cancer, the use of DWI may be beneficial in detecting lesions. Another possible option is to scan each region with different MRI sequences instead of scanning the whole body using one sequence continuously. We herein report a workflow and imaging protocols for whole-body oncologic PET/MRI using an integrated system in the clinical routine, designed for the detection, for example by cancer screening, of metastatic lesions, in order to help future users optimize their workflow and imaging protocols.

  15. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  16. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  17. Asymptotic adaptive bipartite entanglement-distillation protocol

    International Nuclear Information System (INIS)

    Hostens, Erik; Dehaene, Jeroen; De Moor, Bart

    2006-01-01

    We present an asymptotic bipartite entanglement-distillation protocol that outperforms all existing asymptotic schemes. This protocol is based on the breeding protocol with the incorporation of two-way classical communication. Like breeding, the protocol starts with an infinite number of copies of a Bell-diagonal mixed state. Breeding can be carried out as successive stages of partial information extraction, yielding the same result: one bit of information is gained at the cost (measurement) of one pure Bell state pair (ebit). The basic principle of our protocol is at every stage to replace measurements on ebits by measurements on a finite number of copies, whenever there are two equiprobable outcomes. In that case, the entropy of the global state is reduced by more than one bit. Therefore, every such replacement results in an improvement of the protocol. We explain how our protocol is organized as to have as many replacements as possible. The yield is then calculated for Werner states

  18. Patient-reported outcome (PRO assessment in clinical trials: a systematic review of guidance for trial protocol writers.

    Directory of Open Access Journals (Sweden)

    Melanie Calvert

    Full Text Available Evidence suggests there are inconsistencies in patient-reported outcome (PRO assessment and reporting in clinical trials, which may limit the use of these data to inform patient care. For trials with a PRO endpoint, routine inclusion of key PRO information in the protocol may help improve trial conduct and the reporting and appraisal of PRO results; however, it is currently unclear exactly what PRO-specific information should be included. The aim of this review was to summarize the current PRO-specific guidance for clinical trial protocol developers.We searched the MEDLINE, EMBASE, CINHAL and Cochrane Library databases (inception to February 2013 for PRO-specific guidance regarding trial protocol development. Further guidance documents were identified via Google, Google scholar, requests to members of the UK Clinical Research Collaboration registered clinical trials units and international experts. Two independent investigators undertook title/abstract screening, full text review and data extraction, with a third involved in the event of disagreement. 21,175 citations were screened and 54 met the inclusion criteria. Guidance documents were difficult to access: electronic database searches identified just 8 documents, with the remaining 46 sourced elsewhere (5 from citation tracking, 27 from hand searching, 7 from the grey literature review and 7 from experts. 162 unique PRO-specific protocol recommendations were extracted from included documents. A further 10 PRO recommendations were identified relating to supporting trial documentation. Only 5/162 (3% recommendations appeared in ≥50% of guidance documents reviewed, indicating a lack of consistency.PRO-specific protocol guidelines were difficult to access, lacked consistency and may be challenging to implement in practice. There is a need to develop easily accessible consensus-driven PRO protocol guidance. Guidance should be aimed at ensuring key PRO information is routinely included in

  19. Patient-reported outcome measures (PROMs) for assessing perceived listening effort in hearing loss: protocol for a systematic review

    Science.gov (United States)

    Rapport, Frances L; Boisvert, Isabelle; McMahon, Catherine M; Hutchings, Hayley A

    2017-01-01

    Introduction In the UK, it is estimated that a disabling hearing loss (HL) affects 1 in 6 people. HL has functional, economic and social-emotional consequences for affected individuals. Intervention for HL focuses on improving access to the auditory signal using hearing aids or cochlear implants. However, even if sounds are audible and speech is understood, individuals with HL often report increased effort when listening. Listening effort (LE) may be measured using self-reported measures such as patient-reported outcome measures (PROMs). PROMs are validated questionnaires completed by patients to measure their perceptions of their own functional status and well-being. When selecting a PROM for use in research or clinical practice, it is necessary to appraise the evidence of a PROM’s acceptability to patients, validity, responsiveness and reliability. Methods and analysis A systematic review of studies evaluating the measurement properties of PROMs available to measure LE in HL will be undertaken. MEDLINE, EMBASE, CINAHL, PsychINFO and Web of Science will be searched electronically. Reference lists of included studies, key journals and the grey literature will be hand-searched to identify further studies for inclusion. Two reviewers will independently complete title, abstract and full-text screening to determine study eligibility. Data on the characteristics of each study and each PROM will be extracted. Methodological quality of the included studies will be appraised using the COnsensus-based Standards for the selection of health Measurement INstruments, the quality of included PROMs appraised and the credibility of the evidence assessed. A narrative synthesis will summarise extracted data. Ethics and dissemination Ethical permission is not required, as this study uses data from published research. Dissemination will be through publication in peer-reviewed journals, conference presentations and the lead author’s doctoral dissertation. Findings may inform the

  20. Reproductive effort in biparental care : an experimental study in long-lived Cape gannets

    NARCIS (Netherlands)

    Bijleveld, Allert I.; Mullers, Ralf H. E.

    2009-01-01

    Life-history theory predicts a trade-off between current and future reproduction, such that long-lived species should not increase their reproductive effort (RE) at a cost to their own survival. In species with long-term pair bonds and biparental care, each parent must balance its reproductive

  1. Average current is better than peak current as therapeutic dosage for biphasic waveforms in a ventricular fibrillation pig model of cardiac arrest.

    Science.gov (United States)

    Chen, Bihua; Yu, Tao; Ristagno, Giuseppe; Quan, Weilun; Li, Yongqin

    2014-10-01

    Defibrillation current has been shown to be a clinically more relevant dosing unit than energy. However, the effects of average and peak current in determining shock outcome are still undetermined. The aim of this study was to investigate the relationship between average current, peak current and defibrillation success when different biphasic waveforms were employed. Ventricular fibrillation (VF) was electrically induced in 22 domestic male pigs. Animals were then randomized to receive defibrillation using one of two different biphasic waveforms. A grouped up-and-down defibrillation threshold-testing protocol was used to maintain the average success rate of 50% in the neighborhood. In 14 animals (Study A), defibrillations were accomplished with either biphasic truncated exponential (BTE) or rectilinear biphasic waveforms. In eight animals (Study B), shocks were delivered using two BTE waveforms that had identical peak current but different waveform durations. Both average and peak currents were associated with defibrillation success when BTE and rectilinear waveforms were investigated. However, when pathway impedance was less than 90Ω for the BTE waveform, bivariate correlation coefficient was 0.36 (p=0.001) for the average current, but only 0.21 (p=0.06) for the peak current in Study A. In Study B, a high defibrillation success (67.9% vs. 38.8%, pcurrent (14.9±2.1A vs. 13.5±1.7A, pcurrent unchanged. In this porcine model of VF, average current was better than peak current to be an adequate parameter to describe the therapeutic dosage when biphasic defibrillation waveforms were used. The institutional protocol number: P0805. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  2. New Mexico district work-effort analysis computer program

    Science.gov (United States)

    Hiss, W.L.; Trantolo, A.P.; Sparks, J.L.

    1972-01-01

    The computer program (CAN 2) described in this report is one of several related programs used in the New Mexico District cost-analysis system. The work-effort information used in these programs is accumulated and entered to the nearest hour on forms completed by each employee. Tabulating cards are punched directly from these forms after visual examinations for errors are made. Reports containing detailed work-effort data itemized by employee within each project and account and by account and project for each employee are prepared for both current-month and year-to-date periods by the CAN 2 computer program. An option allowing preparation of reports for a specified 3-month period is provided. The total number of hours worked on each account and project and a grand total of hours worked in the New Mexico District is computed and presented in a summary report for each period. Work effort not chargeable directly to individual projects or accounts is considered as overhead and can be apportioned to the individual accounts and projects on the basis of the ratio of the total hours of work effort for the individual accounts or projects to the total New Mexico District work effort at the option of the user. The hours of work performed by a particular section, such as General Investigations or Surface Water, are prorated and charged to the projects or accounts within the particular section. A number of surveillance or buffer accounts are employed to account for the hours worked on special events or on those parts of large projects or accounts that require a more detailed analysis. Any part of the New Mexico District operation can be separated and analyzed in detail by establishing an appropriate buffer account. With the exception of statements associated with word size, the computer program is written in FORTRAN IV in a relatively low and standard language level to facilitate its use on different digital computers. The program has been run only on a Control Data Corporation

  3. ASSESSMENT OF RIP-V1 AND OSPF-V2 PROTOCOL WITH CONSIDERATION OF CONVERGENCE CRITERIA AND SENDING PROTOCOLS TRAFFIC

    Directory of Open Access Journals (Sweden)

    Hamed Jelodar

    2014-03-01

    Full Text Available Routing Protocols are underlying principles in networks like internet, transport and mobile. Routing Protocols include a series of rules and algorithms that consider routing metric and select the best way for sending healthy data packets from origin to destination. Dynamic routing protocol compatible to topology has a changeable state. RIP and OSPF are dynamic routing protocol that we consider criteria like convergence and sending protocols traffic assessment RIP first version and OSPF second version. By the test we have done on OPNET stimulation we understood that the OSPF protocol was more efficient than RIP protocol.

  4. Should the diagnostic and therapeutic protocols for adrenal incidentalomas be changed?

    Science.gov (United States)

    Mateo-Gavira, Isabel; Vilchez-López, Francisco Javier; Larrán-Escandón, Laura; Ojeda-Schuldt, María Belén; Tinoco, Cristina López; Aguilar-Diosdado, Manuel

    2015-01-01

    The prevalence of adrenal incidentalomas is increasing with the aging of the population and the use of high resolution imaging technics. Current protocols propose a comprehensive monitoring of their functional and morphological state, but with no conclusive clinical evidence that endorses it. Retrospective study of 96 patients diagnosed with adrenal incidentaloma between 2008 and 2012. We evaluated clinical, functional and imaging at baseline and during follow-up. Initially, 9 cases were surgically removed: 4 due to hyperfunction (2 Cushing syndromes and 2 pheochromocytomas) and 5 due to size larger than 4cm. During follow-up one case of pheochromocytoma was diagnosed and another grew more than 1cm, needing surgery. In 98.86% of nonfunctional and benign lesions, there was no functional and/or morphological changes in the final evaluation. The results of our study challenge the validity of current diagnostic-therapeutic protocols of incidentalomas, which should be reassessed in prospective studies taking into account efficiency characteristics. Copyright © 2013 AEC. Publicado por Elsevier España, S.L.U. All rights reserved.

  5. Access to finance for community forest management under the UNFCCC and Kyoto Protocol

    NARCIS (Netherlands)

    Skutsch, Margaret

    2002-01-01

    A previous article in ETFRN News reviewed the potential for funding for forestry under international climate agreements, particularly under the Kyoto Protocol (Skutsch, 2000). Since then, further negotiations have taken place and this article aims at giving an overview of the current situation.

  6. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols.

    Science.gov (United States)

    Campagne, Fabien

    2008-02-29

    The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79-0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86-0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these protocols can fully substitute

  7. Rift Valley fever: current challenges and future prospects

    Directory of Open Access Journals (Sweden)

    Himeidan YE

    2016-03-01

    Full Text Available Yousif E Himeidan Vector Control Unit, Africa Technical Research Centre, Vector Health International, Arusha, Tanzania Abstract: Rift Valley fever (RVF is a zoonotic, mosquito-borne viral disease that affects human health and causes significant losses in the livestock industry. Recent outbreaks have led to severe human infections with high mortality rates. There are many challenges to applying effective preventive and control measures, including weak infrastructure of health facilities, lack of capacity and support systems for field logistics and communication, access to global expert organizations, and insufficient information on the epidemiological and reservoir status of the RVF virus. The health systems in East African countries are underdeveloped, with gaps in adaptability to new, more accurate and rapid techniques, and well-trained staff that affect their capacity to monitor and evaluate the disease. Surveillance and response systems are inadequate in providing accurate information in a timely manner for decision making to deal with the scope of interrupting the disease transmission by applying mass animal vaccination, and other preventive measures at the early stage of an outbreak. The historical vaccines are unsuitable for use in newborn and gestating livestock, and the recent ones require a booster and annual revaccination. Future live-attenuated RVF vaccines should possess lower safety concerns regardless of the physiologic state of the animal, and provide rapid and long-term immunity after a single dose of vaccination. In the absence of an effective vaccination program, prevention and control measures must be immediately undertaken after an alert is generated. These measures include enforcing and adapting standard protocols for animal trade and movement, extensive vector control, safe disposal of infected animals, and modification of human–animal contact behavior. Directing control efforts on farmers and workers who deal with

  8. How do different components of Effortful Control contribute to children's mathematics achievement?

    Directory of Open Access Journals (Sweden)

    Noelia eSánchez-Pérez

    2015-09-01

    Full Text Available This work sought to investigate the specific contribution of two different components of Effortful Control -attentional focusing and inhibitory control- to children’s mathematics achievement. The sample was composed of 142 children aged 9 to 12 years old. Effortful Control components were measured through the Temperament in Middle Childhood Questionnaire (TMCQ; parent´s report; math achievement was measured via teacher’s report and through the standard Woodcock-Johnson test. Additionally, the contribution of other cognitive and socio-emotional processes was taken into account. Our results showed that only attentional focusing significantly contributed to the variance of children’s mathematics achievement; interestingly, mediational models showed that the relationship between effortful attentional self-regulation and mathematics achievement was mediated by academic peer popularity, as well as by intelligence and study skills. Results are discussed in the light of the current theories on the role of children’ self-regulation abilities in the context of school.

  9. Incentive Design and Mis-Allocated Effort

    OpenAIRE

    Schnedler, Wendelin

    2013-01-01

    Incentives often distort behavior: they induce agents to exert effort but this effort is not employed optimally. This paper proposes a theory of incentive design allowing for such distorted behavior. At the heart of the theory is a trade-off between getting the agent to exert effort and ensuring that this effort is used well. The theory covers various moral-hazard models, ranging from traditional single-task to multi-task models. It also provides -for the first time- a formalization and proof...

  10. Efficacy of transcranial direct current stimulation (tDCS) in reducing consumption in patients with alcohol use disorders: study protocol for a randomized controlled trial.

    Science.gov (United States)

    Trojak, Benoit; Soudry-Faure, Agnès; Abello, Nicolas; Carpentier, Maud; Jonval, Lysiane; Allard, Coralie; Sabsevari, Foroogh; Blaise, Emilie; Ponavoy, Eddy; Bonin, Bernard; Meille, Vincent; Chauvet-Gelinier, Jean-Christophe

    2016-05-17

    Approximately 15 million persons in the European Union and 10 million persons in the USA are alcohol-dependent. The global burden of disease and injury attributable to alcohol is considerable: worldwide, approximately one in 25 deaths in 2004 was caused by alcohol. At the same time, alcohol use disorders remain seriously undertreated. In this context, alternative or adjunctive therapies such as brain stimulation may play a prominent role. The early results of studies using transcranial direct current stimulation found that stimulations delivered to the dorsolateral prefrontal cortex result in a significant reduction of craving and an improvement of the decision-making processes in various additive disorders. We, therefore, hypothesize that transcranial direct current stimulation can lead to a decrease in alcohol consumption in patients suffering from alcohol use disorders. We report the protocol of a randomized, double-blind, placebo-controlled, parallel-group trial, to evaluate the efficacy of transcranial direct current stimulation on alcohol reduction in patients with an alcohol use disorder. The study will be conducted in 14 centers in France and Monaco. Altogether, 340 subjects over 18 years of age and diagnosed with an alcohol use disorder will be randomized to receive five consecutive twice-daily sessions of either active or placebo transcranial direct current stimulation. One session consists in delivering a current flow continuously (anode F4; cathode F3) twice for 13 minutes, with treatments separated by a rest interval of 20 min. Efficacy will be evaluated using the change from baseline (alcohol consumption during the 4 weeks before randomization) to 24 weeks in the total alcohol consumption and number of heavy drinking days. Secondary outcome measures will include alcohol craving, clinical and biological improvements, and the effects on mood and quality of life, as well as cognitive and safety assessments, and, for smokers, an assessment of the

  11. Comparison between two clomiphene citrate protocols for induction of ovulation in clomiphene resistant polycystic ovary syndrome

    Directory of Open Access Journals (Sweden)

    Mervat Sheikh-El-Arab Elsedeek

    2014-12-01

    Conclusions: The current study reports significantly higher ovulation and pregnancy rates with the longer lower dose protocol probably because of prolonged FSH rise. Study web address: ACTRN12611000639921.

  12. 75 FR 8137 - Coordination and Strategic Planning of the Federal Effort Against Intellectual Property...

    Science.gov (United States)

    2010-02-23

    .... Government can use to obtain more accurate information concerning the identities, corporate structures and... Government is currently undertaking a landmark effort to develop an intellectual property enforcement... intellectual property rights. By committing to common goals, the Government will more effectively and...

  13. Estimation of total Effort and Effort Elapsed in Each Step of Software Development Using Optimal Bayesian Belief Network

    Directory of Open Access Journals (Sweden)

    Fatemeh Zare Baghiabad

    2017-09-01

    Full Text Available Accuracy in estimating the needed effort for software development caused software effort estimation to be a challenging issue. Beside estimation of total effort, determining the effort elapsed in each software development step is very important because any mistakes in enterprise resource planning can lead to project failure. In this paper, a Bayesian belief network was proposed based on effective components and software development process. In this model, the feedback loops are considered between development steps provided that the return rates are different for each project. Different return rates help us determine the percentages of the elapsed effort in each software development step, distinctively. Moreover, the error measurement resulted from optimized effort estimation and the optimal coefficients to modify the model are sought. The results of the comparison between the proposed model and other models showed that the model has the capability to highly accurately estimate the total effort (with the marginal error of about 0.114 and to estimate the effort elapsed in each software development step.

  14. States and compacts: Issues and events affecting facility development efforts, including the Barnwell opening

    Energy Technology Data Exchange (ETDEWEB)

    Larson, G.S.

    1995-12-31

    Ten years have passed since the first regional low-level radioactive waste compacts received Congressional consent and initiated their efforts to develop new disposal capacity. During these 10 years, both significant achievements and serious setbacks have marked our efforts and affect our current outlook. Recent events in the waste marketplace, particularly in the operating status of the Barnwell disposal facility, have now raised legitimate questions about the continued rationale for the regional framework that grew out of the original legislation enacted by Congress in 1980. At the same time, licensing activities for new regional disposal facilities are under way in three states, and a fourth awaits the final go-ahead to begin construction. Uncertainty over the meaning and reliability of the marketplace events makes it difficult to gauge long-term implications. In addition, differences in the status of individual state and compact facility development efforts lead to varying assessments of the influence these events will, or should, have on such efforts.

  15. States and compacts: Issues and events affecting facility development efforts, including the Barnwell opening

    International Nuclear Information System (INIS)

    Larson, G.S.

    1995-01-01

    Ten years have passed since the first regional low-level radioactive waste compacts received Congressional consent and initiated their efforts to develop new disposal capacity. During these 10 years, both significant achievements and serious setbacks have marked our efforts and affect our current outlook. Recent events in the waste marketplace, particularly in the operating status of the Barnwell disposal facility, have now raised legitimate questions about the continued rationale for the regional framework that grew out of the original legislation enacted by Congress in 1980. At the same time, licensing activities for new regional disposal facilities are under way in three states, and a fourth awaits the final go-ahead to begin construction. Uncertainty over the meaning and reliability of the marketplace events makes it difficult to gauge long-term implications. In addition, differences in the status of individual state and compact facility development efforts lead to varying assessments of the influence these events will, or should, have on such efforts

  16. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  17. PERFORMANCE EVALUATION OF INTEGRATED MACRO AND MICRO MOBILITY PROTOCOLS FOR WIDE AREA WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    R.Gunasundari

    2010-03-01

    Full Text Available The success of next generation wireless networks will rely much on advanced mechanisms for seamless mobility support among emerging heterogeneous technologies. Currently, Mobile IP is the most promising solution for mobility management in the Internet. Several IP micro mobility approaches have been proposed to enhance the performance of Mobile IP which supports quality of service, minimum packet loss, limited handoff delay and scalability and power conservation but they are not scalable for macro mobility. A practical solution would therefore require integration of Mobile IP and Micro mobility protocols where Mobile IP handles macro mobility and micro mobility protocols handles micro mobility. In this paper an integrated mobility management protocol for IP based wireless networks is proposed and analyzed. Simulation results presented in this paper are based on ns 2.

  18. Peru continues to press privitization efforts

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This paper reports that Peru has again extended the deadline for bids on a 30 year operating contract for state owned Petromar SA's offshore Block Z-2b. The tender is key to efforts to privatize Petromar, a subsidiary of state oil company Petroleos del Peru. The committee charged with implementing Petromar privatization extended the deadline for bids another 70 days Oct. 30, following a 60 day extension made in September. The latest deadline for bids is Feb. 10, with the contract expected to be awarded Feb. 26. A bid package on Block Z-2b is available from Petroperu's Lima headquarters for $20,000. Petromar operates the former Belco Petroleum Corp. offshore assets Peru's government expropriated in 1985. It currently produces 17,600 b/d, compared with 27,000 b/d at the time of expropriation

  19. Mapping telemedicine efforts: surveying regional initiatives in Denmark.

    Science.gov (United States)

    Kierkegaard, Patrick

    2015-05-01

    The aim of this study is to survey telemedicine services currently in operation across Denmark. The study specifically seeks to answer the following questions: What initiatives are deployed within the different regions? What are the motivations behind the projects? What technologies are being utilized? What medical disciplines are being supported using telemedicine systems? All data were surveyed from the Telemedicinsk Landkort, a newly created database designed to provide a comprehensive and systematic overview of all telemedicine technologies in Denmark. The results of this study suggest that a growing numbers of telemedicine initiatives are currently in operation across Denmark but that considerable variations exist in terms of regional efforts as the number of operational telemedicine projects varied from region to region. The results of this study provide a timely picture of the factors that are shaping the telemedicine landscape of Denmark and suggest potential strategies to help policymakers increase and improve national telemedicine deployment.

  20. [Computerized clinical protocol for occlusion].

    Science.gov (United States)

    Salsench, J; Ferrer, J; Nogueras, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself. In this work we all data collected in the protocol and we give the explanations of each concept.

  1. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  2. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  3. Group covariant protocols for quantum string commitment

    International Nuclear Information System (INIS)

    Tsurumaru, Toyohiro

    2006-01-01

    We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next using this result, we prove that for every irreducible representation of a finite group, there always exists a corresponding nontrivial QSC protocol which reaches a level of security impossible to achieve classically

  4. Families of quantum fingerprinting protocols

    Science.gov (United States)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  5. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  6. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  7. Effectiveness of oxaliplatin desensitization protocols.

    Science.gov (United States)

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  8. The Kyoto Protocol and forestry practices in the United States

    Science.gov (United States)

    Bov B. Eav; Richard A. Birdsey; Linda S. Heath

    2000-01-01

    Forestry may play an important if not critical role in the ability of the U.S. to meet its greenhouse gas emissions target under the terms of the Kyoto Protocol. Given the low rate of change in the U.S. forest land area, the major anthropogenic influences on the current net forest carbon flux are forest management and protection activities that have resulted in...

  9. Investigation of the Study Characteristics Affecting Clinical Trial Quality Using the Protocol Deviations Leading to Exclusion of Subjects From the Per Protocol Set Data in Studies for New Drug Application: A Retrospective Analysis.

    Science.gov (United States)

    Kohara, Norihito; Kaneko, Masayuki; Narukawa, Mamoru

    2018-01-01

    The concept of the risk-based approach has been introduced as an effort to secure the quality of clinical trials. In the risk-based approach, identification and evaluation of risk in advance are considered important. For recently completed clinical trials, we investigated the relationship between study characteristics and protocol deviations leading to the exclusion of subjects from Per Protocol Set (PPS) efficacy analysis. New drugs approved in Japan in the fiscal year 2014-2015 were targeted in the research. The reasons for excluding subjects from the PPS efficacy analysis were described in 102 trials out of 492 in the summary of new drug application documents, which was publicly disclosed after the drug's regulatory approval. The author extracted these reasons along with the numbers of the cases and the study characteristics of each clinical trial. Then, the direct comparison, univariate regression analysis, and multivariate regression analysis was carried out based on the exclusion rate. The study characteristics for which exclusion of subjects from the PPS efficacy analysis were frequently observed was multiregional clinical trials in study region; inhalant and external use in administration route; Anti-infective for systemic use; Respiratory system, Dermatologicals, and Nervous system in therapeutic drug under the Anatomical Therapeutic Chemical Classification. In the multivariate regression analysis, the clinical trial variables of inhalant, Respiratory system, or Dermatologicals were selected as study characteristics leading to a higher exclusion rate. The characteristics of the clinical trial that is likely to cause protocol deviations that will affect efficacy analysis were suggested. These studies should be considered for specific attention and priority observation in the trial protocol or its monitoring plan and execution, such as a clear description of inclusion/exclusion criteria in the protocol, development of training materials to site staff, and

  10. Mental and physical effort affect vigilance differently

    NARCIS (Netherlands)

    Smit, A.S.; Eling, P.A.T.M.; Hopman, M.T.E.; Coenen, A.M.L.

    2005-01-01

    Both physical and mental effort are thought to affect vigilance. Mental effort is known for its vigilance declining effects, but the effects of physical effort are less clear. This study investigated whether these two forms of effort affect the EEG and subjective alertness differently. Participants

  11. Mental and physical effort affect vigilance differently.

    NARCIS (Netherlands)

    Smit, A.S.; Eling, P.A.T.M.; Hopman, M.T.E.; Coenen, A.M.L.

    2005-01-01

    Both physical and mental effort are thought to affect vigilance. Mental effort is known for its vigilance declining effects, but the effects of physical effort are less clear. This study investigated whether these two forms of effort affect the EEG and subjective alertness differently. Participants

  12. Protocol and Topology Issues for Wide-Area Satellite Interconnection of Terrestrial Optical LANs

    Science.gov (United States)

    Parraga, N.

    2002-01-01

    system for multimedia services. EuroSkyWay uses a GEO satellite with onboard switching. It has its own proprietary protocol stack for data link control (DLC), logical link control (LLC) and layer 3 functions such as resource management, call admission control and authentication. Special attention is paid to the IP interworking with Layer 3 function since IP does not support connection set-up and session protocols, thus proper interworking functions with IP signaling protocols for resource reservation routing such as RSVP, BGP, and ICMP need to be developed. Whereas the EuroSkyWay system is an representative for a meshed topology, DVB-RCS systems have usually star configuration with a central hub station. Different data streams are distinguished by program identifiers (PIDs). Recent proposals aim at the evolution of DVB-RCS towards a fully meshed structure. The paper will also discuss the protocol architecture for interconnect SONET LANs over these systems. Finally, a performance comparison of the different solutions will be given in terms of cell overhead rate and signalling effort for selected scenarios.

  13. Global Land Product Validation Protocols: An Initiative of the CEOS Working Group on Calibration and Validation to Evaluate Satellite-derived Essential Climate Variables

    Science.gov (United States)

    Guillevic, P. C.; Nickeson, J. E.; Roman, M. O.; camacho De Coca, F.; Wang, Z.; Schaepman-Strub, G.

    2016-12-01

    The Global Climate Observing System (GCOS) has specified the need to systematically produce and validate Essential Climate Variables (ECVs). The Committee on Earth Observation Satellites (CEOS) Working Group on Calibration and Validation (WGCV) and in particular its subgroup on Land Product Validation (LPV) is playing a key coordination role leveraging the international expertise required to address actions related to the validation of global land ECVs. The primary objective of the LPV subgroup is to set standards for validation methods and reporting in order to provide traceable and reliable uncertainty estimates for scientists and stakeholders. The Subgroup is comprised of 9 focus areas that encompass 10 land surface variables. The activities of each focus area are coordinated by two international co-leads and currently include leaf area index (LAI) and fraction of absorbed photosynthetically active radiation (FAPAR), vegetation phenology, surface albedo, fire disturbance, snow cover, land cover and land use change, soil moisture, land surface temperature (LST) and emissivity. Recent additions to the focus areas include vegetation indices and biomass. The development of best practice validation protocols is a core activity of CEOS LPV with the objective to standardize the evaluation of land surface products. LPV has identified four validation levels corresponding to increasing spatial and temporal representativeness of reference samples used to perform validation. Best practice validation protocols (1) provide the definition of variables, ancillary information and uncertainty metrics, (2) describe available data sources and methods to establish reference validation datasets with SI traceability, and (3) describe evaluation methods and reporting. An overview on validation best practice components will be presented based on the LAI and LST protocol efforts to date.

  14. Low-effort thought promotes political conservatism.

    Science.gov (United States)

    Eidelman, Scott; Crandall, Christian S; Goodman, Jeffrey A; Blanchar, John C

    2012-06-01

    The authors test the hypothesis that low-effort thought promotes political conservatism. In Study 1, alcohol intoxication was measured among bar patrons; as blood alcohol level increased, so did political conservatism (controlling for sex, education, and political identification). In Study 2, participants under cognitive load reported more conservative attitudes than their no-load counterparts. In Study 3, time pressure increased participants' endorsement of conservative terms. In Study 4, participants considering political terms in a cursory manner endorsed conservative terms more than those asked to cogitate; an indicator of effortful thought (recognition memory) partially mediated the relationship between processing effort and conservatism. Together these data suggest that political conservatism may be a process consequence of low-effort thought; when effortful, deliberate thought is disengaged, endorsement of conservative ideology increases.

  15. Phase Transition in Protocols Minimizing Work Fluctuations

    Science.gov (United States)

    Solon, Alexandre P.; Horowitz, Jordan M.

    2018-05-01

    For two canonical examples of driven mesoscopic systems—a harmonically trapped Brownian particle and a quantum dot—we numerically determine the finite-time protocols that optimize the compromise between the standard deviation and the mean of the dissipated work. In the case of the oscillator, we observe a collection of protocols that smoothly trade off between average work and its fluctuations. However, for the quantum dot, we find that as we shift the weight of our optimization objective from average work to work standard deviation, there is an analog of a first-order phase transition in protocol space: two distinct protocols exchange global optimality with mixed protocols akin to phase coexistence. As a result, the two types of protocols possess qualitatively different properties and remain distinct even in the infinite duration limit: optimal-work-fluctuation protocols never coalesce with the minimal-work protocols, which therefore never become quasistatic.

  16. A SURVEY on WIRELESS MESH NETWORKS, ROUTING METRICS and PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Safak DURUKAN ODABASI

    2013-01-01

    Full Text Available Today, Internet has become an indispensable part of our daily lives. It has a growing user community in many fields from banking transactions to online entertainment. It will be very efficient for users, as the next generation internet access becomes wireless like frequently used services such as cellular phones. But for providing this, a new network is needed to be designed or an existing network must be improved as well as making changes on infrastructure. At this point, mesh network infrastructure arises and offers more sophisticated internet access with less need. The most important advantage of mesh networks is the capability of working without infrastructure. Mesh networks are an additional access technology more than being a renewed one in the next generation wireless networks called 4G. In this study, wireless mesh networks and example applications are mentioned. Base architecture and design factors are emphasized, current routing protocols that are used on wireless mesh networks and routing metrics on which these protocols are based, are explained. Finally, the performance effects of these protocols and metrics on different network topologies are referred.

  17. Fiscal 1998 research report. Survey on the current trend of private R and D efforts; 1998 nendo chosa hokokusho. Minkan no kenkyu kaihatsu doko no jittai ni kansuru chosa

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-03-01

    For promotion of the R and D system of technologies creating new industries, this survey collected the basic data and information on the trend of private R and D efforts and industries, and arranged every data and information obtained. The data on United States, Germany, France and U.K. in addition to Japan were collected. Survey was made first on the administrative support system for private R and D efforts. The R and D-related budget, R and D support program and private R and D-related fund of Japan, United States and U.K. are mainly outlined. Survey was made next on private R and D activities. The R and D-related fund, researcher and patent of main countries are outlined in international comparison. Survey was also made on the current state of various industries. The industry scale and structure of every Japanese manufacturing industry are outlined. Finally, the industrial statistics are given concerning Japanese 'chemical industry,' 'communication-electronics-electric measuring instrument industry' and 'automobile industry' with a high rate of R and D-related expenditures. (NEDO)

  18. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  19. Goal striving strategies and effort mobilization: When implementation intentions reduce effort-related cardiac activity during task performance.

    Science.gov (United States)

    Freydefont, Laure; Gollwitzer, Peter M; Oettingen, Gabriele

    2016-09-01

    Two experiments investigate the influence of goal and implementation intentions on effort mobilization during task performance. Although numerous studies have demonstrated the beneficial effects of setting goals and making plans on performance, the effects of goals and plans on effort-related cardiac activity and especially the cardiac preejection period (PEP) during goal striving have not yet been addressed. According to the Motivational Intensity Theory, participants should increase effort mobilization proportionally to task difficulty as long as success is possible and justified. Forming goals and making plans should allow for reduced effort mobilization when participants perform an easy task. However, when the task is difficult, goals and plans should differ in their effect on effort mobilization. Participants who set goals should disengage, whereas participants who made if-then plans should stay in the field showing high effort mobilization during task performance. As expected, using an easy task in Experiment 1, we observed a lower cardiac PEP in both the implementation intention and the goal intention condition than in the control condition. In Experiment 2, we varied task difficulty and demonstrated that while participants with a mere goal intention disengaged from difficult tasks, participants with an implementation intention increased effort mobilization proportionally with task difficulty. These findings demonstrate the influence of goal striving strategies (i.e., mere goals vs. if-then plans) on effort mobilization during task performance. Copyright © 2016 Elsevier B.V. All rights reserved.

  20. Status of Educational Efforts in National Security Workforce

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This report documents the status of educational efforts for the preparation of a national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This report includes an assessment of the current educational situation for the national security workforce.

  1. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  2. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    Science.gov (United States)

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  3. Maximally efficient protocols for direct secure quantum communication

    Energy Technology Data Exchange (ETDEWEB)

    Banerjee, Anindita [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); Department of Physics and Center for Astroparticle Physics and Space Science, Bose Institute, Block EN, Sector V, Kolkata 700091 (India); Pathak, Anirban, E-mail: anirban.pathak@jiit.ac.in [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); RCPTM, Joint Laboratory of Optics of Palacky University and Institute of Physics of Academy of Science of the Czech Republic, Faculty of Science, Palacky University, 17. Listopadu 12, 77146 Olomouc (Czech Republic)

    2012-10-01

    Two protocols for deterministic secure quantum communication (DSQC) using GHZ-like states have been proposed. It is shown that one of these protocols is maximally efficient and that can be modified to an equivalent protocol of quantum secure direct communication (QSDC). Security and efficiency of the proposed protocols are analyzed and compared. It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. Maximally efficient QSDC protocols are shown to be more efficient than their DSQC counterparts. This additional efficiency arises at the cost of message transmission rate. -- Highlights: ► Two protocols for deterministic secure quantum communication (DSQC) are proposed. ► One of the above protocols is maximally efficient. ► It is modified to an equivalent protocol of quantum secure direct communication (QSDC). ► It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. ► Efficient QSDC protocols are always more efficient than their DSQC counterparts.

  4. Physical Therapy Protocols for Arthroscopic Bankart Repair.

    Science.gov (United States)

    DeFroda, Steven F; Mehta, Nabil; Owens, Brett D

    Outcomes after arthroscopic Bankart repair can be highly dependent on compliance and participation in physical therapy. Additionally, there are many variations in physician-recommended physical therapy protocols. The rehabilitation protocols of academic orthopaedic surgery departments vary widely despite the presence of consensus protocols. Descriptive epidemiology study. Level 3. Web-based arthroscopic Bankart rehabilitation protocols available online from Accreditation Council for Graduate Medical Education (ACGME)-accredited orthopaedic surgery programs were included for review. Individual protocols were reviewed to evaluate for the presence or absence of recommended therapies, goals for completion of ranges of motion, functional milestones, exercise start times, and recommended time to return to sport. Thirty protocols from 27 (16.4%) total institutions were identified out of 164 eligible for review. Overall, 9 (30%) protocols recommended an initial period of strict immobilization. Variability existed between the recommended time periods for sling immobilization (mean, 4.8 ± 1.8 weeks). The types of exercises and their start dates were also inconsistent. Goals to full passive range of motion (mean, 9.2 ± 2.8 weeks) and full active range of motion (mean, 12.2 ± 2.8 weeks) were consistent with other published protocols; however, wide ranges existed within the reviewed protocols as a whole. Only 10 protocols (33.3%) included a timeline for return to sport, and only 3 (10%) gave an estimate for return to game competition. Variation also existed when compared with the American Society of Shoulder and Elbow Therapists' (ASSET) consensus protocol. Rehabilitation protocols after arthroscopic Bankart repair were found to be highly variable. They also varied with regard to published consensus protocols. This discrepancy may lead to confusion among therapists and patients. This study highlights the importance of attending surgeons being very clear and specific with

  5. Effort, anhedonia, and function in schizophrenia: reduced effort allocation predicts amotivation and functional impairment.

    Science.gov (United States)

    Barch, Deanna M; Treadway, Michael T; Schoen, Nathan

    2014-05-01

    One of the most debilitating aspects of schizophrenia is an apparent interest in or ability to exert effort for rewards. Such "negative symptoms" may prevent individuals from obtaining potentially beneficial outcomes in educational, occupational, or social domains. In animal models, dopamine abnormalities decrease willingness to work for rewards, implicating dopamine (DA) function as a candidate substrate for negative symptoms given that schizophrenia involves dysregulation of the dopamine system. We used the effort-expenditure for rewards task (EEfRT) to assess the degree to which individuals with schizophrenia were wiling to exert increased effort for either larger magnitude rewards or for rewards that were more probable. Fifty-nine individuals with schizophrenia and 39 demographically similar controls performed the EEfRT task, which involves making choices between "easy" and "hard" tasks to earn potential rewards. Individuals with schizophrenia showed less of an increase in effort allocation as either reward magnitude or probability increased. In controls, the frequency of choosing the hard task in high reward magnitude and probability conditions was negatively correlated with depression severity and anhedonia. In schizophrenia, fewer hard task choices were associated with more severe negative symptoms and worse community and work function as assessed by a caretaker. Consistent with patterns of disrupted dopamine functioning observed in animal models of schizophrenia, these results suggest that 1 mechanism contributing to impaired function and motivational drive in schizophrenia may be a reduced allocation of greater effort for higher magnitude or higher probability rewards.

  6. An overview of the V&V of Flight-Critical Systems effort at NASA

    Science.gov (United States)

    Brat, Guillaume P.

    2011-01-01

    As the US is getting ready for the Next Generation (NextGen) of Air Traffic System, there is a growing concern that the current techniques for verification and validation will not be adequate for the changes to come. The JPDO (in charge of implementing NextGen) has given NASA a mandate to address the problem and it resulted in the formulation of the V&V of Flight-Critical Systems effort. This research effort is divided into four themes: argument-based safety assurance, distributed systems, authority and autonomy, and, software intensive systems. This paper presents an overview of the technologies that will address the problem.

  7. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  8. Recent sexually transmitted disease prevention efforts and their implications for AIDS health education.

    Science.gov (United States)

    Solomon, M Z; DeJong, W

    1986-01-01

    In the absence of a cure or vaccine for acquired immune deficiency syndrome (AIDS) educational and social marketing efforts to reduce the transmission of Human T-lymphotropic type III/lymphadenopathy-associated virus (HTLV-III/LAV) are currently our best hope for controlling the disease. Since 1983, the Centers for Disease Control (CDC) has funded a series of research studies to determine whether education efforts can successfully motivate the adoption of key behaviors relevant to the control of a variety of sexually transmitted diseases (STDs). Analysis of the first two studies which are now completed, and preliminary data from a third study, have documented dramatic changes in behavior, knowledge, and attitudes among clients in inner-city public health clinics. The authors describe the principles and underlying assumptions that have guided the design of their STD initiatives, drawing special attention to the implications for AIDS health education efforts.

  9. Welfare Quality assessment protocol for laying hens = Welfare Quality assessment protocol voor leghennen

    NARCIS (Netherlands)

    Niekerk, van T.G.C.M.; Gunnink, H.; Reenen, van C.G.

    2012-01-01

    Results of a study on the Welfare Quality® assessment protocol for laying hens. It reports the development of the integration of welfare assessment as scores per criteria as well as simplification of the Welfare Quality® assessment protocol. Results are given from assessment of 122 farms.

  10. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  11. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  12. Collaborative Efforts Driving Progress in Pediatric Acute Myeloid Leukemia

    Science.gov (United States)

    Zwaan, C. Michel; Kolb, Edward A.; Reinhardt, Dirk; Abrahamsson, Jonas; Adachi, Souichi; Aplenc, Richard; De Bont, Eveline S.J.M.; De Moerloose, Barbara; Dworzak, Michael; Gibson, Brenda E.S.; Hasle, Henrik; Leverger, Guy; Locatelli, Franco; Ragu, Christine; Ribeiro, Raul C.; Rizzari, Carmelo; Rubnitz, Jeffrey E.; Smith, Owen P.; Sung, Lillian; Tomizawa, Daisuke; van den Heuvel-Eibrink, Marry M.; Creutzig, Ursula; Kaspers, Gertjan J.L.

    2015-01-01

    Diagnosis, treatment, response monitoring, and outcome of pediatric acute myeloid leukemia (AML) have made enormous progress during the past decades. Because AML is a rare type of childhood cancer, with an incidence of approximately seven occurrences per 1 million children annually, national and international collaborative efforts have evolved. This overview describes these efforts and includes a summary of the history and contributions of each of the main collaborative pediatric AML groups worldwide. The focus is on translational and clinical research, which includes past, current, and future clinical trials. Separate sections concern acute promyelocytic leukemia, myeloid leukemia of Down syndrome, and relapsed AML. A plethora of novel antileukemic agents that have emerged, including new classes of drugs, are summarized as well. Finally, an important aspect of the treatment of pediatric AML—supportive care—and late effects are discussed. The future is bright, with a wide range of emerging innovative therapies and with more and more international collaboration that ultimately aim to cure all children with AML, with fewer adverse effects and without late effects. PMID:26304895

  13. Standardization of a Videofluoroscopic Swallow Study Protocol to Investigate Dysphagia in Dogs.

    Science.gov (United States)

    Harris, R A; Grobman, M E; Allen, M J; Schachtel, J; Rawson, N E; Bennett, B; Ledyayev, J; Hopewell, B; Coates, J R; Reinero, C R; Lever, T E

    2017-03-01

    Videofluoroscopic swallow study (VFSS) is the gold standard for diagnosis of dysphagia in veterinary medicine but lacks standardized protocols that emulate physiologic feeding practices. Age impacts swallow function in humans but has not been evaluated by VFSS in dogs. To develop a protocol with custom kennels designed to allow free-feeding of 3 optimized formulations of contrast media and diets that address limitations of current VFSS protocols. We hypothesized that dogs evaluated by a free-feeding VFSS protocol would show differences in objective swallow metrics based on age. Healthy juvenile, adult, and geriatric dogs (n = 24). Prospective, experimental study. Custom kennels were developed to maintain natural feeding behaviors during VFSS. Three food consistencies (thin liquid, pureed food, and dry kibble) were formulated with either iohexol or barium to maximize palatability and voluntary prehension. Dogs were evaluated by 16 swallow metrics and compared across age groups. Development of a standardized VFSS protocol resulted in successful collection of swallow data in healthy dogs. No significant differences in swallow metrics were observed among age groups. Substantial variability was observed in healthy dogs when evaluated under these physiologic conditions. Features typically attributed to pathologic states, such as gastric reflux, were seen in healthy dogs. Development of a VFSS protocol that reflects natural feeding practices may allow emulation of physiology resulting in clinical signs of dysphagia. Age did not result in significant changes in swallow metrics, but additional studies are needed, particularly in light of substantial normal variation. Copyright © 2017 The Authors. Journal of Veterinary Internal Medicine published by Wiley Periodicals, Inc. on behalf of the American College of Veterinary Internal Medicine.

  14. Universally composable protocols with relaxed set-up assumptions

    DEFF Research Database (Denmark)

    Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus

    2004-01-01

    A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally composable (UC) protocols provide this guarantee in a strong sense: A protocol remains secure even when composed concurrently with an unbounded number of ...

  15. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  16. DC Control Effort Minimized for Magnetic-Bearing-Supported Shaft

    Science.gov (United States)

    Brown, Gerald V.

    2001-01-01

    A magnetic-bearing-supported shaft may have a number of concentricity and alignment problems. One of these involves the relationship of the position sensors, the centerline of the backup bearings, and the magnetic center of the magnetic bearings. For magnetic bearings with permanent magnet biasing, the average control current for a given control axis that is not bearing the shaft weight will be minimized if the shaft is centered, on average over a revolution, at the magnetic center of the bearings. That position may not yield zero sensor output or center the shaft in the backup bearing clearance. The desired shaft position that gives zero average current can be achieved if a simple additional term is added to the control law. Suppose that the instantaneous control currents from each bearing are available from measurements and can be input into the control computer. If each control current is integrated with a very small rate of accumulation and the result is added to the control output, the shaft will gradually move to a position where the control current averages to zero over many revolutions. This will occur regardless of any offsets of the position sensor inputs. At that position, the average control effort is minimized in comparison to other possible locations of the shaft. Nonlinearities of the magnetic bearing are minimized at that location as well.

  17. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  18. Quality-oriented efforts in IPD, - a framework

    DEFF Research Database (Denmark)

    Andreasen, Mogens Myrup

    1998-01-01

    It is generally expected that modern quality efforts like TQM and ISO9000 should deliver a sufficient framework for quality efforts in industrial companies. Our findings in Danish industry shows a fragmented picture of islands of efforts and a weak understanding of basic quality concepts between...... designers. The paper propose a framework for quality efforts, illustrated by simple metaphors....

  19. Learning Environment and Student Effort

    Science.gov (United States)

    Hopland, Arnt O.; Nyhus, Ole Henning

    2016-01-01

    Purpose: The purpose of this paper is to explore the relationship between satisfaction with learning environment and student effort, both in class and with homework assignments. Design/methodology/approach: The authors use data from a nationwide and compulsory survey to analyze the relationship between learning environment and student effort. The…

  20. Scientific Research & Subsistence: Protocols to Ensure Co-Existence

    Science.gov (United States)

    Nachman, C.; Holman, A.; DeMaster, D.

    2017-12-01

    Commercial, industrial, and research interests in the Arctic are expanding rapidly. Potentials are numerous and exciting, giving rise to the need for guidelines to ensure interactions among waterway users do not conflict. Of particular concern is the potential for adverse impacts to U.S. Arctic coastal communities that rely on living marine resources for nutritional and cultural health, through subsistence hunts from small craft, ice edges, and shore. Recent events raised concerns over research surveys potentially interfering with subsistence hunts in the Bering, Chukchi, and Beaufort Seas. Incidents led to calls by Native Alaskan communities to restrict science activities with a mixed response from the scientific community (i.e., some sympathetic, some defensive). With a common goal of wanting to mitigate this potential interaction, Federal agencies made a commitment in the National Strategy for the Arctic Region to coordinate and consult with Alaska Natives and also to pursue responsible Arctic stewardship, with understanding through scientific research and traditional knowledge. The effort to create a "Standard of Care" for research surveys incorporates years of experience by subsistence hunters working to mitigate impacts of other anthropogenic activities in the region, as well as best practices by many in the research community. The protocols are designed to ensure potential conflicts between the scientific research community and subsistence hunters are avoided and to encourage mutual assistance and collaboration between researchers and hunters. The guidelines focus on enhancing communication between researchers and subsistence hunters before, during, and after research occurs. The best management practices outlined in the Standard of Care assist those overseeing and funding scientific research in making decisions about how best to accomplish the goals of the research while ensuring protection of the Alaska subsistence lifestyle. These protocols could also be

  1. Status of standardization efforts for packaging and transportation of spent fuel and high-level waste

    International Nuclear Information System (INIS)

    Eggers, P.E.; Dawson, D.M.

    1986-01-01

    This paper provides a current review of the status of efforts to develop standards and guidelines related to the packaging and transportation of spent fuel and high-level waste. An overview of each of the organizations and agencies developing standards and guidelines is discussed and includes the efforts of the N14 Division of the American National Standards Institute (ANSI), NUPACK Committee of Section III of the American Society of Mechanical Engineers, Nuclear Regulatory Commission and Department of Energy. This comparative overview identifies the scope and areas of application of each standard and guideline. In addition, the current or proposed standards and guidelines are considered collectively with commentary on areas of apparent or potential complimentary fit, overlap and incompatability. Finally, the paper reviews initiatives now being taken within the N14 division of ANSI to identify where new standards development activities are required

  2. An extended protocol for usability validation of medical devices : Research design and reference model

    NARCIS (Netherlands)

    Schmettow, M.; Schnittker, R.; Schraagen, J.M.

    2017-01-01

    This paper proposes and demonstrates an extended protocol for usability validation testing of medical devices. A review of currently used methods for the usability evaluation of medical devices revealed two main shortcomings. Firstly, the lack of methods to closely trace the interaction sequences

  3. The association of perceived organizational justice and organizational expectations with nurses' efforts.

    Science.gov (United States)

    Motlagh, Farhad Shafiepour; Yarmohammadian, Mohammad Hossein; Yaghoubi, Maryam

    2012-03-01

    One important factor in growth, progress, and increase in work efficiency of employees of any enterprise is to make considerable effort. Supreme leader of the Islamic Republic of Iran also addressed the issue of need for more efforts. The goal of this study was to determine the association of perceived organizational justice and organizational expectations with efforts of nurses to provide a suitable model. The current study was a descriptive study. The study group consists of all nurses who worked in hospitals of Isfahan. Due to some limitations all nurses of the special unit, surgery wards and operating room were questioned. The data collection tools were the Organizational Justice Questionnaire, organizational expectations questionnaire, and double effort questionnaire. Content validity of the mentioned questionnaires was confirmed after considering the experts' comments. The reliability of these questionnaires, using the Cronbach's alpha, were 0.79, 0.83 and 0.92, respectively. The Pearson correlation and the structural equation model were used for the analysis of data. There was a significant correlation between the perceived organizational justice and the double effort of nurses during the surgery of patients. Correlation of the expectation from job, usefulness of job, and its attractiveness with double effort of nurses before the surgery was also statistically significant. Moreover, it was shown that the root of the mean square error of estimation (RMSEA) was 0.087, the fitted goodness index (GFI) was 0.953, the value of chi-square was 268.5, and the model was statistically significant (p Justice is an essential need for human life and its importance in organizations and social life of individuals is evident.

  4. Cancer Currents Now Available in Spanish

    Science.gov (United States)

    As part of our effort to more effectively reach patients, health care providers, and researchers with timely, authoritative, and scientifically accurate cancer information, we are now offering selected Cancer Currents blog posts in Spanish.

  5. Is overall similarity classification less effortful than single-dimension classification?

    Science.gov (United States)

    Wills, Andy J; Milton, Fraser; Longmore, Christopher A; Hester, Sarah; Robinson, Jo

    2013-01-01

    It is sometimes argued that the implementation of an overall similarity classification is less effortful than the implementation of a single-dimension classification. In the current article, we argue that the evidence securely in support of this view is limited, and report additional evidence in support of the opposite proposition--overall similarity classification is more effortful than single-dimension classification. Using a match-to-standards procedure, Experiments 1A, 1B and 2 demonstrate that concurrent load reduces the prevalence of overall similarity classification, and that this effect is robust to changes in the concurrent load task employed, the level of time pressure experienced, and the short-term memory requirements of the classification task. Experiment 3 demonstrates that participants who produced overall similarity classifications from the outset have larger working memory capacities than those who produced single-dimension classifications initially, and Experiment 4 demonstrates that instructions to respond meticulously increase the prevalence of overall similarity classification.

  6. Effort-reward imbalance and depression among private practice physicians.

    Science.gov (United States)

    Tsutsumi, Akizumi; Kawanami, Shoko; Horie, Seichi

    2012-02-01

    Current private practice physicians provide medical services in a harsh economic situation. The effort-reward imbalance (ERI) model puts its emphasis on an imbalance between high efforts spent and low rewards received in occupational life. ERI model includes three different reward factors from task to organizational levels. We examined whether ERI in terms of low organizational reward (poor prospective and job insecurity) could be the most relevant and strongly associated with depression among private practice physicians. This is a cross-sectional questionnaire study of 1,103 private practice physicians who were currently working in clinical settings and completed the data of exposure and outcome. The study questionnaire was mailed to all the physicians listed as members of a local branch of the Japan Medical Association (n = 3,441) between November and December 2008. Outcomes were prevalence of depression as measured by the Center for Epidemiologic Studies Depression Scale and adjusted odds ratios (OR) of depression with respect to ERI. Fifty-seven percent of physicians were exposed to ERI, and 18% of the physicians were depressed. Logistic regression analyses revealed that ERI was significantly associated with depression (OR and 95% confidence interval = 3.57; 2.43-5.26). ERI with regard to organizational reward was most prevalent (60%) and had the strongest association with depression (5.14; 3.36-7.92). Predominant prevalence of ERI in terms of organizational level low reward and strong associations between the ERI component and depression suggests that countermeasures from social perspective are crucial.

  7. Quality and Variability of Online Available Physical Therapy Protocols From Academic Orthopaedic Surgery Programs for Anterior Cruciate Ligament Reconstruction.

    Science.gov (United States)

    Makhni, Eric C; Crump, Erica K; Steinhaus, Michael E; Verma, Nikhil N; Ahmad, Christopher S; Cole, Brian J; Bach, Bernard R

    2016-08-01

    To assess the quality and variability found across anterior cruciate ligament (ACL) rehabilitation protocols published online by academic orthopaedic programs. Web-based ACL physical therapy protocols from United States academic orthopaedic programs available online were included for review. Main exclusion criteria included concomitant meniscus repair, protocols aimed at pediatric patients, and failure to provide time points for the commencement or recommended completion of any protocol components. A comprehensive, custom scoring rubric was created that was used to assess each protocol for the presence or absence of various rehabilitation components, as well as when those activities were allowed to be initiated in each protocol. Forty-two protocols were included for review from 155 U.S. academic orthopaedic programs. Only 13 protocols (31%) recommended a prehabilitation program. Five protocols (12%) recommended continuous passive motion postoperatively. Eleven protocols (26%) recommended routine partial or non-weight bearing immediately postoperatively. Ten protocols (24%) mentioned utilization of a secondary/functional brace. There was considerable variation in range of desired full-weight-bearing initiation (9 weeks), as well as in the types of strength and proprioception exercises specifically recommended. Only 8 different protocols (19%) recommended return to sport after achieving certain strength and activity criteria. Many ACL rehabilitation protocols recommend treatment modalities not supported by current reports. Moreover, high variability in the composition and time ranges of rehabilitation components may lead to confusion among patients and therapists. Level II. Copyright © 2016 Arthroscopy Association of North America. Published by Elsevier Inc. All rights reserved.

  8. [Perinatal bioethics: euthanasia or end-of-life decisions? Analysis of the Groningen Protocol].

    Science.gov (United States)

    Halac, Jacobo; Halac, Eduardo; Moya, Martín P; Olmas, José M; Dopazo, Silvina L; Dolagaray, Nora

    2009-12-01

    The so called "Groningen Protocol" was conceived as a framework to discuss the euthanasia in neonates. Originally, it presents three groups of babies who might be candidates to this option. We analyzed the protocol in its original context and that of the Dutch society in which it was created. The analysis started with a careful reading of the protocol in both English and Dutch versions, translated later into Spanish. The medical and nursing staff participated in discussing it. A final consensus was reached. The Institutional Ethics Committee at our hospital discussed it freely and made recommendations for its application as a guideline to honestly discuss with parents the clinical condition of their babies, without permitting the option included literally in the word euthanasia. We selected four extremely ill infants. Their parents were interviewed at least twice daily: three stages were identified: the initial one of promoting all possible treatments; a second one of guarded and cautious request for the staff to evaluate "suffering", and a last one where requests were made to reduce therapeutic efforts to provide dignified death. A week after the death of their infants, they were presented with the facts of the protocol and the limits of our legal system. In all four cases the parents suggested that they would have chosen ending the life of their infants, in order to avoid them undue suffering. They clearly pointed out that this option emerged as a viable one to them once the ultimate outcome was evident. The protocol must not be viewed as a guideline for euthanasia in newborns, but rather as a mean to discuss the critical condition of an infant with the parents. Its direct implementation in our setting remains difficult. As a clear limitation for its overall application remains the definition of what is considered "unbearable suffering" in newborns, and how to certify when the infant has "no prospect". We emphasize the benefits of securing the help of the Ethics

  9. e-SCP-ECG+ Protocol: An Expansion on SCP-ECG Protocol for Health Telemonitoring—Pilot Implementation

    Directory of Open Access Journals (Sweden)

    George J. Mandellos

    2010-01-01

    Full Text Available Standard Communication Protocol for Computer-assisted Electrocardiography (SCP-ECG provides standardized communication among different ECG devices and medical information systems. This paper extends the use of this protocol in order to be included in health monitoring systems. It introduces new sections into SCP-ECG structure for transferring data for positioning, allergies, and five additional biosignals: noninvasive blood pressure (NiBP, body temperature (Temp, Carbon dioxide (CO2, blood oxygen saturation (SPO2, and pulse rate. It also introduces new tags in existing sections for transferring comprehensive demographic data. The proposed enhanced version is referred to as e-SCP-ECG+ protocol. This paper also considers the pilot implementation of the new protocol as a software component in a Health Telemonitoring System.

  10. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  11. Approximating the Qualitative Vickrey Auction by a Negotiation Protocol

    Science.gov (United States)

    Hindriks, Koen V.; Tykhonov, Dmytro; de Weerdt, Mathijs

    A result of Bulow and Klemperer has suggested that auctions may be a better tool to obtain an efficient outcome than negotiation. For example, some auction mechanisms can be shown to be efficient and strategy-proof. However, they generally also require that the preferences of at least one side of the auction are publicly known. However, sometimes it is very costly, impossible, or undesirable to publicly announce such preferences. It thus is interesting to find methods that do not impose this constraint but still approximate the outcome of the auction. In this paper we show that a multi-round multi-party negotiation protocol may be used to this end if the negotiating agents are capable of learning opponent preferences. The latter condition can be met by current state of the art negotiation technology. We show that this protocol approximates the theoretical outcome predicted by a so-called Qualitative Vickrey auction mechanism (even) on a complex multi-issue domain.

  12. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  13. No significant effect of transcranial direct current stimulation (tDCS) found on simple motor reaction time comparing 15 different simulation protocols.

    Science.gov (United States)

    Horvath, Jared Cooney; Carter, Olivia; Forte, Jason D

    2016-10-01

    Research exploring the behavioral impact of transcranial direct current stimulation (tDCS) over M1 has produced homogenous results. The most common explanations to address this homogeneity concerns the differential impact of varied tDCS parameters (such as stimulation intensity or electrode montage). To explore this, we systematically examined the effects of 15 different tDCS protocols on a well-elucidated neurobehavioral system: simple visual motor reaction time (smRT). For the initial phase of this study, 150 healthy participants were randomly assigned to one of 5 experimental groups (2mA anodal, 2mA cathodal, 1mA anodal, 1mA cathodal, or sham) across 3 different conditions (orbitofrontal, bilateral, or extracephalic reference electrode location). The active electrode was always placed over M1 and tDCS lasted for 20min. Starting ~5min prior to stimulation and running continuously for ~30min, participants were repeatedly presented with a visual cue centered on a computer monitor and asked to press a response button as quickly as possible at stimulus onset (stimuli number: 100 pre-, 400 during-, and 100-post stimulation - interstimulus interval: 1-3s). Ex-gaussian distribution curves, miss, and error rates were determined for each normalized batch of 100 RTs and compared using a two-way ANOVA. As the largest group differences were seen with 2mA anodal (compared to sham) stimulation using an orbitofrontal montage, an additional 60 healthy participants were recruited to further test for significance in this condition. No significant impact of tDCS was seen on any parameter of smRT distribution, error rate, or miss rate, regardless of polarity, stimulation intensity, electrode montage, or stimulation-to-task relationship. Our results suggest that tDCS over M1 might not have a predictable or reliable effect on short duration smRT. Our results raise interesting questions regarding the mechanisms by which tDCS might modulate more complex motor behaviors. Additional

  14. Construction of an Anthropomorphic Phantom for Use in Evaluating Pediatric Airway Digital Tomosynthesis Protocols

    Directory of Open Access Journals (Sweden)

    Nima Kasraie

    2018-01-01

    Full Text Available Interpretation of radiolucent foreign bodies (FBs is a common task charged to pediatric radiologists. The use of a motion compensated technique to decrease breathing motion on images would greatly decrease overall exposure to ionizing radiation and increase access to treatment yielding a great impact on clinical care. This study reports on the methodology and materials used to construct an in-house anthropomorphic phantom for investigating image quality in digital tomosynthesis protocols for volumetric imaging of the pediatric airway. Availability and cost of possible substitute materials were considered and simplifying assumptions were made. Two different modular phantoms were assembled in coronal slab layers using materials designed to approximate a one- and three-year-old thorax at diagnostic photon energies for use with digital tomosynthesis protocols such as those offered on GE’s VolumeRAD application. Exposures were made using both phantoms with inserted food particles inside an oscillating airway. The goal of the phantom is to help evaluate (1 whether the currently used protocol is sufficient to image the airway despite breathing motion and (2 whether it is not, to find the optimal protocol by testing various commercially available protocols using this phantom. The affordable construction of the pediatric sized phantom aimed at optimizing GE’s VolumeRAD protocol for airway foreign body imaging is demonstrated in this study which can be used to test VolumeRAD’s ability to image the airways with and without a low-density foreign body within the airways.

  15. Use of a patient hand hygiene protocol to reduce hospital-acquired infections and improve nurses' hand washing.

    Science.gov (United States)

    Fox, Cherie; Wavra, Teresa; Drake, Diane Ash; Mulligan, Debbie; Bennett, Yvonne Pacheco; Nelson, Carla; Kirkwood, Peggy; Jones, Louise; Bader, Mary Kay

    2015-05-01

    Critically ill patients are at marked risk of hospital-acquired infections, which increase patients' morbidity and mortality. Registered nurses are the main health care providers of physical care, including hygiene to reduce and prevent hospital-acquired infections, for hospitalized critically ill patients. To investigate a new patient hand hygiene protocol designed to reduce hospital-acquired infection rates and improve nurses' hand-washing compliance in an intensive care unit. A preexperimental study design was used to compare 12-month rates of 2 common hospital-acquired infections, central catheter-associated bloodstream infection and catheter-associated urinary tract infection, and nurses' hand-washing compliance measured before and during use of the protocol. Reductions in 12-month infection rates were reported for both types of infections, but neither reduction was statistically significant. Mean 12-month nurse hand-washing compliance also improved, but not significantly. A hand hygiene protocol for patients in the intensive care unit was associated with reductions in hospital-acquired infections and improvements in nurses' hand-washing compliance. Prevention of such infections requires continuous quality improvement efforts to monitor lasting effectiveness as well as investigation of strategies to eliminate these infections. ©2015 American Association of Critical-Care Nurses.

  16. Neuroimaging in refractory epilepsy. Current practice and evolving trends

    Energy Technology Data Exchange (ETDEWEB)

    Ramli, N. [Department of Biomedical Imaging, University Malaya Research Imaging Centre (Malaysia); Rahmat, K., E-mail: katt_xr2000@yahoo.com [Department of Biomedical Imaging, University Malaya Research Imaging Centre (Malaysia); Lim, K.S.; Tan, C.T. [Neurology Unit, Department of Medicine, University Malaya, Kuala Lumpur (Malaysia)

    2015-09-15

    Highlights: • Neuroimaging is imperative in diagnostic work up and therapeutic assessment of refractory epilepsy. • Identification of epileptogenic zone on EEG, MRI and functional imaging improves the success of surgery. • High performance MRI greatly enhanced metabolic information and elucidate brain functions. • Optimisation of epilepsy protocols in structural and functional MRI are presented in this article. - Abstract: Identification of the epileptogenic zone is of paramount importance in refractory epilepsy as the success of surgical treatment depends on complete resection of the epileptogenic zone. Imaging plays an important role in the locating and defining anatomic epileptogenic abnormalities in patients with medically refractory epilepsy. The aim of this article is to present an overview of the current MRI sequences used in epilepsy imaging with special emphasis of lesion seen in our practices. Optimisation of epilepsy imaging protocols are addressed and current trends in functional MRI sequences including MR spectroscopy, diffusion tensor imaging and fusion MR with PET and SPECT are discussed.

  17. Neuroimaging in refractory epilepsy. Current practice and evolving trends

    International Nuclear Information System (INIS)

    Ramli, N.; Rahmat, K.; Lim, K.S.; Tan, C.T.

    2015-01-01

    Highlights: • Neuroimaging is imperative in diagnostic work up and therapeutic assessment of refractory epilepsy. • Identification of epileptogenic zone on EEG, MRI and functional imaging improves the success of surgery. • High performance MRI greatly enhanced metabolic information and elucidate brain functions. • Optimisation of epilepsy protocols in structural and functional MRI are presented in this article. - Abstract: Identification of the epileptogenic zone is of paramount importance in refractory epilepsy as the success of surgical treatment depends on complete resection of the epileptogenic zone. Imaging plays an important role in the locating and defining anatomic epileptogenic abnormalities in patients with medically refractory epilepsy. The aim of this article is to present an overview of the current MRI sequences used in epilepsy imaging with special emphasis of lesion seen in our practices. Optimisation of epilepsy imaging protocols are addressed and current trends in functional MRI sequences including MR spectroscopy, diffusion tensor imaging and fusion MR with PET and SPECT are discussed

  18. Costing 'healthy' food baskets in Australia - a systematic review of food price and affordability monitoring tools, protocols and methods.

    Science.gov (United States)

    Lewis, Meron; Lee, Amanda

    2016-11-01

    To undertake a systematic review to determine similarities and differences in metrics and results between recently and/or currently used tools, protocols and methods for monitoring Australian healthy food prices and affordability. Electronic databases of peer-reviewed literature and online grey literature were systematically searched using the PRISMA approach for articles and reports relating to healthy food and diet price assessment tools, protocols, methods and results that utilised retail pricing. National, state, regional and local areas of Australia from 1995 to 2015. Assessment tools, protocols and methods to measure the price of 'healthy' foods and diets. The search identified fifty-nine discrete surveys of 'healthy' food pricing incorporating six major food pricing tools (those used in multiple areas and time periods) and five minor food pricing tools (those used in a single survey area or time period). Analysis demonstrated methodological differences regarding: included foods; reference households; use of availability and/or quality measures; household income sources; store sampling methods; data collection protocols; analysis methods; and results. 'Healthy' food price assessment methods used in Australia lack comparability across all metrics and most do not fully align with a 'healthy' diet as recommended by the current Australian Dietary Guidelines. None have been applied nationally. Assessment of the price, price differential and affordability of healthy (recommended) and current (unhealthy) diets would provide more robust and meaningful data to inform health and fiscal policy in Australia. The INFORMAS 'optimal' approach provides a potential framework for development of these methods.

  19. Effort Estimation in BPMS Migration

    Directory of Open Access Journals (Sweden)

    Christopher Drews

    2018-04-01

    Full Text Available Usually Business Process Management Systems (BPMS are highly integrated in the IT of organizations and are at the core of their business. Thus, migrating from one BPMS solution to another is not a common task. However, there are forces that are pushing organizations to perform this step, e.g. maintenance costs of legacy BPMS or the need for additional functionality. Before the actual migration, the risk and the effort must be evaluated. This work provides a framework for effort estimation regarding the technical aspects of BPMS migration. The framework provides questions for BPMS comparison and an effort evaluation schema. The applicability of the framework is evaluated based on a simplified BPMS migration scenario.

  20. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees.

    Science.gov (United States)

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-04-01

    A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  1. Important historical efforts at emergency department categorization in the United States and implications for regionalization.

    Science.gov (United States)

    Mehrotra, Abhishek; Sklar, David P; Tayal, Vivek S; Kocher, Keith E; Handel, Daniel A; Myles Riner, R

    2010-12-01

    This article is drawn from a report created for the American College of Emergency Physicians (ACEP) Emergency Department (ED) Categorization Task Force and also reflects the proceedings of a breakout session, "Beyond ED Categorization-Matching Networks to Patient Needs," at the 2010 Academic Emergency Medicine consensus conference, "Beyond Regionalization: Integrated Networks of Emergency Care." The authors describe a brief history of the significant national and state efforts at categorization and suggest reasons why many of these efforts failed to persevere or gain wider implementation. The history of efforts to categorize hospital (and ED) emergency services demonstrates recognition of the potential benefits of categorization, but reflects repeated failures to implement full categorization systems or limited excursions into categorization through licensing of EDs or designation of receiving and referral facilities. An understanding of the history of hospital and ED categorization could better inform current efforts to develop categorization schemes and processes. 2010 by the Society for Academic Emergency Medicine.

  2. Implementation of a rapid chest pain protocol in the emergency department: A quality improvement project.

    Science.gov (United States)

    Bunch, Azalea Marie; Leasure, A Renee; Carithers, Cathrin; Burnette, Robert E; Berryman, Michael Scott

    2016-02-01

    The purpose of this quality improvement (QI) project is to compare the effectiveness of a rapid 90-min chest pain screening and evaluation protocol to a 120-min screening and evaluation protocol in determining patient readiness for hospital admission or discharge home. The existing chest pain protocol utilized in the emergency department (ED) was revised based on a review of current research changing initial screening and reevaluation times from 120 to 90 min. A prospective comparative study of patients presenting to the ED with chest pain was performed comparing the existing chest pain protocol of 120 min (standard care) with a rapid screening evaluation protocol of 90 min. A total of 128 patients presenting to an ED in Texas with chest pain comprised the sample for this study. There was a significant difference in the number of minutes between the groups for readiness for disposition. The average time from chest pain evaluation to readiness for disposition home, observation, or admission decreased from an average of 191 min in the standard care group to an average of 118 min in the rapid screening group. Use of the rapid screening and evaluation protocol decreased the time to disposition by an average of 73 min, which enhanced ED flow without influencing disposition and patient safety. ©2015 American Association of Nurse Practitioners.

  3. Large family of quantum weak coin-flipping protocols

    International Nuclear Information System (INIS)

    Mochon, Carlos

    2005-01-01

    Each classical public-coin protocol for coin flipping is naturally associated with a quantum protocol for weak coin flipping. The quantum protocol is obtained by replacing classical randomness with quantum entanglement and by adding a cheat detection test in the last round that verifies the integrity of this entanglement. The set of such protocols defines a family which contains the protocol with bias 0.192 previously found by the author, as well as protocols with bias as low as 1/6 described herein. The family is analyzed by identifying a set of optimal protocols for every number of messages. In the end, tight lower bounds for the bias are obtained which prove that 1/6 is optimal for all protocols within the family

  4. Economics of "essential use exemptions" for metered-dose inhalers under the Montreal Protocol.

    Science.gov (United States)

    DeCanio, Stephen J; Norman, Catherine S

    2007-10-01

    The Montreal Protocol on Substances that Deplete the Ozone Layer has led to rapid reductions in the use of ozone-depleting substances worldwide. However, the Protocol provides for "essential use exemptions" (EUEs) if there are no "technically and economically feasible" alternatives. An application that might qualify as an "essential use" is CFC-powered medical metered-dose inhalers (MDIs) for the treatment of asthma and chronic obstructive pulmonary disease (COPD), and the US and other nations have applied for exemptions in this case. One concern is that exemptions are necessary to ensure access to medications for low-income uninsureds. We examine the consequences of granting or withholding such exemptions, and conclude that government policies and private-sector programs are available that make it economically feasible to phase out chlorofluorocarbons (CFCs) in this application, thereby furthering the global public health objectives of the Montreal Protocol without compromising the treatment of patients who currently receive medication by means of MDIs.

  5. Immunosuppression for in vivo research: state-of-the-art protocols and experimental approaches

    Institute of Scientific and Technical Information of China (English)

    Rita Diehl; Fabienne Ferrara; Claudia Müller; Antje Y Dreyer; Damian D McLeod; Stephan Fricke; Johannes Boltze

    2017-01-01

    Almost every experimental treatment strategy using non-autologous cell,tissue or organ transplantation is tested in small and large animal models before clinical translation.Because these strategies require immunosuppression in most cases,immunosuppressive protocols are a key element in transplantation experiments.However,standard immunosuppressive protocols are often applied without detailed knowledge regarding their efficacy within the particular experimental setting and in the chosen model species.Optimization of such protocols is pertinent to the translation of experimental results to human patients and thus warrants further investigation.This review summarizes current knowledge regarding immunosuppressive drug classes as well as their dosages and application regimens with consideration of species-specific drug metabolization and side effects.It also summarizes contemporary knowledge of novel immunomodulatory strategies,such as the use of mesenchymal stem cells or antibodies.Thus,this review is intended to serve as a state-of-the-art compendium for researchers to refine applied experimental immunosuppression and immunomodulation strategies to enhance the predictive value of preclinical transplantation studies.

  6. The Kyoto Protocol. An economic appraisal

    International Nuclear Information System (INIS)

    Grubb, M.

    2000-05-01

    This paper examines the overall economics of the Kyoto Protocol on climate change, in three main parts. The first part explores the structure of the Protocol and how this matches against classical economic criteria of an 'optimal' climate change agreement. This discussion also considers the nature of and reasons for shortcomings, and the prospects for its evolution. Given the various flexibilities in the agreement, the Kyoto Protocol is far more economically efficient in its structure than any previous global environmental agreement. The central conclusion is that, from an economic perspective, the Protocol's structure for industrialised country commitments is as good as could reasonably be expected. The second part of the paper explores more closely the economics of the commitments themselves and how they combine with the various flexibilities, briefly reviewing the available literature and using a simple spreadsheet model of how the commitments might combine with trading mechanisms under a range of assumptions. Flexibility is intrinsic and necessary, but it is argued that the allocations to Russia and Ukraine in particular mean that unlimited flexibility could render the Protocol's commitments weaker in their impacts than is economically desirable to address climate change. It is argued that, should this prove to be the case, access to the large surplus in the transition economies could be used as a control valve to limit the costs of the Protocol to within acceptable limits. Finally, the paper considers the issues of developing country involvement in the Kyoto Protocol, and the Protocol's longer-term impact and evolution, including its impact on technological evolution and dissemination and the evolution of future commitments. It is argued that taking account of such issues critically affects views of the Protocol

  7. Dopamine, behavioral economics, and effort

    Directory of Open Access Journals (Sweden)

    John D Salamone

    2009-09-01

    Full Text Available Abstract. There are numerous problems with the hypothesis that brain dopamine (DA systems, particularly in the nucleus accumbens, directly mediate the rewarding or primary motivational characteristics of natural stimuli such as food. Research and theory related to the functions of mesolimbic DA are undergoing a substantial conceptual restructuring, with the traditional emphasis on hedonia and primary reward yielding to other concepts and lines of inquiry. The present review is focused upon the involvement of nucleus accumbens DA in behavioral activation and effort-related processes. Viewed from the framework of behavioral economics, the effects of accumbens DA depletions and antagonism on food-reinforced behavior are highly dependent upon the work requirements of the instrumental task, and DA depleted rats are more sensitive to increases in response costs (i.e., ratio requirements. Moreover, interference with accumbens DA transmission exerts a powerful influence over effort-related choice behavior. Rats with accumbens DA depletions or antagonism reallocate their instrumental behavior away from food-reinforced tasks that have high response requirements, and instead these rats select a less-effortful type of food-seeking behavior. Nucleus accumbens DA and adenosine interact in the regulation of effort-related functions, and other brain structures (anterior cingulate cortex, amygdala, ventral pallidum also are involved. Studies of the brain systems regulating effort-based processes may have implications for understanding drug abuse, as well as energy-related disorders such as psychomotor slowing, fatigue or anergia in depression and other neurological disorders.

  8. What makes a reach movement effortful? Physical effort discounting supports common minimization principles in decision making and motor control.

    Directory of Open Access Journals (Sweden)

    Pierre Morel

    2017-06-01

    Full Text Available When deciding between alternative options, a rational agent chooses on the basis of the desirability of each outcome, including associated costs. As different options typically result in different actions, the effort associated with each action is an essential cost parameter. How do humans discount physical effort when deciding between movements? We used an action-selection task to characterize how subjective effort depends on the parameters of arm transport movements and controlled for potential confounding factors such as delay discounting and performance. First, by repeatedly asking subjects to choose between 2 arm movements of different amplitudes or durations, performed against different levels of force, we identified parameter combinations that subjects experienced as identical in effort (isoeffort curves. Movements with a long duration were judged more effortful than short-duration movements against the same force, while movement amplitudes did not influence effort. Biomechanics of the movements also affected effort, as movements towards the body midline were preferred to movements away from it. Second, by introducing movement repetitions, we further determined that the cost function for choosing between effortful movements had a quadratic relationship with force, while choices were made on the basis of the logarithm of these costs. Our results show that effort-based action selection during reaching cannot easily be explained by metabolic costs. Instead, force-loaded reaches, a widely occurring natural behavior, imposed an effort cost for decision making similar to cost functions in motor control. Our results thereby support the idea that motor control and economic choice are governed by partly overlapping optimization principles.

  9. "I put in effort, therefore I am passionate": Investigating the path from effort to passion in entrepreneurship

    OpenAIRE

    Gielnik, Michael Marcus; Spitzmuller, Matthias; Schmitt, Antje; Klemann, Katharina; Frese, Michael

    2015-01-01

    Most theoretical frameworks in entrepreneurship emphasize that entrepreneurial passion drives entrepreneurial effort. We hypothesize that the reverse effect is also true, and investigate changes in passion as an outcome of effort. Based on theories of self-regulation and self-perception, we hypothesize that making new venture progress and free choice are two factors that help to explain why and under which conditions entrepreneurial effort affects entrepreneurial passion. We undertook two stu...

  10. Wireless networking for the dental office: current wireless standards and security protocols.

    Science.gov (United States)

    Mupparapu, Muralidhar; Arora, Sarika

    2004-11-15

    Digital radiography has gained immense popularity in dentistry today in spite of the early difficulty for the profession to embrace the technology. The transition from film to digital has been happening at a faster pace in the fields of Orthodontics, Oral Surgery, Endodontics, Periodontics, and other specialties where the radiographic images (periapical, bitewing, panoramic, cephalometric, and skull radiographs) are being acquired digitally, stored within a server locally, and eventually accessed for diagnostic purposes, along with the rest of the patient data via the patient management software (PMS). A review of the literature shows the diagnostic performance of digital radiography is at least comparable to or even better than that of conventional radiography. Similarly, other digital diagnostic tools like caries detectors, cephalometric analysis software, and digital scanners were used for many years for the diagnosis and treatment planning purposes. The introduction of wireless charged-coupled device (CCD) sensors in early 2004 (Schick Technologies, Long Island City, NY) has moved digital radiography a step further into the wireless era. As with any emerging technology, there are concerns that should be looked into before adapting to the wireless environment. Foremost is the network security involved in the installation and usage of these wireless networks. This article deals with the existing standards and choices in wireless technologies that are available for implementation within a contemporary dental office. The network security protocols that protect the patient data and boost the efficiency of modern day dental clinics are enumerated.

  11. Principles of the new quantum cryptography protocols building

    International Nuclear Information System (INIS)

    Kurochkin, V.; Kurochkin, Yu.

    2009-01-01

    The main aim of the quantum cryptography protocols is the maximal secrecy under the conditions of the real experiment. This work presents the result of the new protocol building with the use of the secrecy maximization. While using some well-known approaches this method has allowed one to achieve completely new results in quantum cryptography. The process of the protocol elaboration develops from the standard BB84 protocol upgrading to the building of completely new protocol with arbitrary large bases number. The secrecy proofs of the elaborated protocol appear to be natural continuation of the protocol building process. This approach reveals possibility to reach extremely high parameters of the protocol. It suits both the restrictions of contemporary technologies and requirements for high bit rate while being absolutely secret

  12. Domestic Efforts for SFCL Application and Hybrid SFCL

    International Nuclear Information System (INIS)

    Hyun, O. B.; KIm, H. R.; Yim, Y. S.; Sim, J.; Park, K. B.; Oh, I. S.

    2008-01-01

    We present domestic efforts for superconducting fault current limiter (SFCL) application in the Korea Electric Power Corporation (KEPCO) grid and pending points at issue. KEPCO's decision to upgrade the 154 kV/22.9 kV main transformer from 60 MVA to 100 MVA cast a problem of high fault current in the 22.9 kV distribution lines. The grid planners supported adopting an SFCL to control the fault current. This environment friendly to SFCL application must be highly dependent upon the successful development of SFCL having specifications that domestic utility required. The required conditions are (1) small size of not greater than twice of 22.9 kV gas insulated switch-gear (GIS), (2) sustainability of current limitation without the line breaking by circuit breakers (CB) for maximum 1.5 seconds. Also, optionally, recommended is (3) the reclosing capability. Conventional resistive SFCLs do not meet (1) ∼ (3) all together. A hybrid SFCL is an excellent solution to meet the conditions. The hybrid SFCL consists of HTS SFCL components for fault detection and line commutation, a fast switch (FS) to break the primary path, and a limiter. This characteristic structure not only enables excellent current limiting performances and the reclosing capability, but also allows drastic reduction of HTS volume and small size of the cryostat, resulting in economic feasibility and compactness of the equipment. External current limiter also enables long term limitation since it is far less sensitive to heat generation than HTS. Semi-active operation is another advantage of the hybrid structure. We will discuss more pending points at issues such as maintenance-free long term operation, small size to accommodate the in-house substation, passive and active control, back-up plans, diagnosis, and so on.

  13. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  14. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  15. Development of pig welfare assessment protocol integrating animal-, environment-, and management-based measures.

    Science.gov (United States)

    Renggaman, Anriansyah; Choi, Hong L; Sudiarto, Sartika Ia; Alasaarela, Laura; Nam, Ok S

    2015-01-01

    Due to increased interest in animal welfare, there is now a need for a comprehensive assessment protocol to be used in intensive pig farming systems. There are two current welfare assessment protocols for pigs: Welfare Quality® Assessment Protocols (applicable in the Europe Union), that mostly focuses on animal-based measures, and the Swine Welfare Assurance Program (applicable in the United States), that mostly focuses on management- and environment-based measures. In certain cases, however, animal-based measures might not be adequate for properly assessing pig welfare status. Similarly, welfare assessment that relies only on environment- and management-based measures might not represent the actual welfare status of pigs. Therefore, the objective of this paper was to develop a new welfare protocol by integrating animal-, environment-, and management-based measures. The background for selection of certain welfare criteria and modification of the scoring systems from existing welfare assessment protocols are described. The developed pig welfare assessment protocol consists of 17 criteria that are related to four main principles of welfare (good feeding, good housing, good health, and appropriate behavior). Good feeding, good housing, and good health were assessed using a 3-point scale: 0 (good welfare), 1 (moderate welfare), and 2 (poor welfare). In certain cases, only a 2-point scale was used: 0 (certain condition is present) or 2 (certain condition is absent). Appropriate behavior was assessed by scan sampling of positive and negative social behaviors based on qualitative behavior assessment and human-animal relationship tests. Modification of the body condition score into a 3-point scale revealed pigs with a moderate body condition (score 1). Moreover, additional criteria such as feed quality confirmed that farms had moderate (score 1) or poor feed quality (score 2), especially those farms located in a high relative humidity region. The developed protocol can be

  16. Robowell: An automated process for monitoring ground water quality using established sampling protocols

    Science.gov (United States)

    Granato, G.E.; Smith, K.P.

    1999-01-01

    Robowell is an automated process for monitoring selected ground water quality properties and constituents by pumping a well or multilevel sampler. Robowell was developed and tested to provide a cost-effective monitoring system that meets protocols expected for manual sampling. The process uses commercially available electronics, instrumentation, and hardware, so it can be configured to monitor ground water quality using the equipment, purge protocol, and monitoring well design most appropriate for the monitoring site and the contaminants of interest. A Robowell prototype was installed on a sewage treatment plant infiltration bed that overlies a well-studied unconfined sand and gravel aquifer at the Massachusetts Military Reservation, Cape Cod, Massachusetts, during a time when two distinct plumes of constituents were released. The prototype was operated from May 10 to November 13, 1996, and quality-assurance/quality-control measurements demonstrated that the data obtained by the automated method was equivalent to data obtained by manual sampling methods using the same sampling protocols. Water level, specific conductance, pH, water temperature, dissolved oxygen, and dissolved ammonium were monitored by the prototype as the wells were purged according to U.S Geological Survey (USGS) ground water sampling protocols. Remote access to the data record, via phone modem communications, indicated the arrival of each plume over a few days and the subsequent geochemical reactions over the following weeks. Real-time availability of the monitoring record provided the information needed to initiate manual sampling efforts in response to changes in measured ground water quality, which proved the method and characterized the screened portion of the plume in detail through time. The methods and the case study described are presented to document the process for future use.

  17. Multidisciplinary Efforts Driving Translational Theranostics

    Science.gov (United States)

    Hu, Tony Y.

    2014-01-01

    This themed issue summarizes significant efforts aimed at using “biological language” to discern between “friends” and “foes” in the context of theranostics for true clinical application. It is expected that the success of theranostics depends on multidisciplinary efforts, combined to expedite our understanding of host responses to “customized” theranostic agents and formulating individualized therapies. PMID:25285169

  18. Examining human resources' efforts to develop a culturally competent workforce.

    Science.gov (United States)

    Whitman, Marilyn V; Valpuesta, Domingo

    2010-01-01

    The increasing diversification of the nation's population poses significant challenges in providing care that meets the needs of culturally diverse patients. Human resource management plays a vital role in developing a more culturally competent workforce. This exploratory study examines current efforts by human resource directors (HRDs) in Alabama's general hospitals to recruit more diverse candidates, train staff, and make language access resources available. A questionnaire was developed based on the Office of Minority Health's Culturally and Linguistically Appropriate Services standards. The HRDs of the 101 Alabama general hospitals served as the study's target population. A sample of 61 responses, or 60.4% of the population, was obtained. The findings indicate that most HRDs are focusing their efforts on recruiting racially/ethnically diverse candidates and training clerical and nursing staff to care for culturally and linguistically diverse patients. Less effort is being focused on recruiting candidates who speak a different language, and only 44.3% have a trained interpreter on the staff. The HRDs who indicated that they work closely with organizations that provide support to diverse groups were more likely to recruit diverse employees and have racially/ethnically and linguistically diverse individuals in leadership positions. It is crucial that health care organizations take the necessary steps to diversify their workforce to broaden access, improve the quality and equity of care, and capture a greater market share.

  19. Pediatric superficial scald burns--reassessment of our follow-up protocol.

    Science.gov (United States)

    Egro, Francesco M; O'Neill, Jennifer K; Briard, Robert; Cubison, Tania C S; Kay, Alan R; Estela, Catalina M; Burge, Timothy S

    2010-01-01

    The most common pediatric burn injury is a superficial scald. The current follow-up protocol for such burns includes review of the patient at 2 weeks postinjury and then 2 months later. The authors decided to review the protocol to assess the need for this second follow-up. A retrospective study reviewed the case notes of patients younger than 16 years at the time of their injury presenting with a scald over 5% TBSA. The progress of healing and scar development up to 5 years follow-up was assessed. This study showed that scalds healing within 2 weeks following injury rarely became hypertrophic. A prospective study was performed over a 10-month period. All children who suffered a superficial partial-thickness scald injury were included. At the 2-week appointment, the need for further follow-up was predicted. The accuracy of this prediction was assessed 2 months later. This study showed that an experienced member of the burns team could reliably predict at 2-week appointment those children who could be safely discharged with no subsequent need for scar management. This study suggests that it will be safe to modify the follow-up protocol, reducing the number of clinic attendances.

  20. Designing of Roaming Protocol for Bluetooth Equipped Multi Agent Systems

    Science.gov (United States)

    Subhan, Fazli; Hasbullah, Halabi B.

    Bluetooth is an established standard for low cost, low power, wireless personal area network. Currently, Bluetooth does not support any roaming protocol in which handoff occurs dynamically when a Bluetooth device is moving out of the piconet. If a device is losing its connection to the master device, no provision is made to transfer it to another master. Handoff is not possible in a piconet, as in order to stay within the network, a slave would have to keep the same master. So, by definition intra-handoff is not possible within a piconet. This research mainly focuses on Bluetooth technology and designing a roaming protocol for Bluetooth equipped multi agent systems. A mathematical model is derived for an agent. The idea behind the mathematical model is to know when to initiate the roaming process for an agent. A desired trajectory for the agent is calculated using its x and y coordinates system, and is simulated in SIMULINK. Various roaming techniques are also studied and discussed. The advantage of designing a roaming protocol is to ensure the Bluetooth enabled roaming devices can freely move inside the network coverage without losing its connection or break of service in case of changing the base stations.

  1. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  2. Effort levels of the partners in networked manufacturing

    Science.gov (United States)

    Chai, G. R.; Cai, Z.; Su, Y. N.; Zong, S. L.; Zhai, G. Y.; Jia, J. H.

    2017-08-01

    Compared with traditional manufacturing mode, could networked manufacturing improve effort levels of the partners? What factors will affect effort level of the partners? How to encourage the partners to improve their effort levels? To answer these questions, we introduce network effect coefficient to build effort level model of the partners in networked manufacturing. The results show that (1) with the increase of the network effect in networked manufacturing, the actual effort level can go beyond the ideal level of traditional manufacturing. (2) Profit allocation based on marginal contribution rate would help improve effort levels of the partners in networked manufacturing. (3) The partners in networked manufacturing who wishes to have a larger distribution ratio must make a higher effort level, and enterprises with insufficient effort should be terminated in networked manufacturing.

  3. Comparison of low- and ultralow-dose computed tomography protocols for quantitative lung and airway assessment.

    Science.gov (United States)

    Hammond, Emily; Sloan, Chelsea; Newell, John D; Sieren, Jered P; Saylor, Melissa; Vidal, Craig; Hogue, Shayna; De Stefano, Frank; Sieren, Alexa; Hoffman, Eric A; Sieren, Jessica C

    2017-09-01

    Quantitative computed tomography (CT) measures are increasingly being developed and used to characterize lung disease. With recent advances in CT technologies, we sought to evaluate the quantitative accuracy of lung imaging at low- and ultralow-radiation doses with the use of iterative reconstruction (IR), tube current modulation (TCM), and spectral shaping. We investigated the effect of five independent CT protocols reconstructed with IR on quantitative airway measures and global lung measures using an in vivo large animal model as a human subject surrogate. A control protocol was chosen (NIH-SPIROMICS + TCM) and five independent protocols investigating TCM, low- and ultralow-radiation dose, and spectral shaping. For all scans, quantitative global parenchymal measurements (mean, median and standard deviation of the parenchymal HU, along with measures of emphysema) and global airway measurements (number of segmented airways and pi10) were generated. In addition, selected individual airway measurements (minor and major inner diameter, wall thickness, inner and outer area, inner and outer perimeter, wall area fraction, and inner equivalent circle diameter) were evaluated. Comparisons were made between control and target protocols using difference and repeatability measures. Estimated CT volume dose index (CTDIvol) across all protocols ranged from 7.32 mGy to 0.32 mGy. Low- and ultralow-dose protocols required more manual editing and resolved fewer airway branches; yet, comparable pi10 whole lung measures were observed across all protocols. Similar trends in acquired parenchymal and airway measurements were observed across all protocols, with increased measurement differences using the ultralow-dose protocols. However, for small airways (1.9 ± 0.2 mm) and medium airways (5.7 ± 0.4 mm), the measurement differences across all protocols were comparable to the control protocol repeatability across breath holds. Diameters, wall thickness, wall area fraction

  4. Adults with autism spectrum disorders exhibit decreased sensitivity to reward parameters when making effort-based decisions

    Directory of Open Access Journals (Sweden)

    Damiano Cara R

    2012-05-01

    Full Text Available Abstract Background Efficient effort expenditure to obtain rewards is critical for optimal goal-directed behavior and learning. Clinical observation suggests that individuals with autism spectrum disorders (ASD may show dysregulated reward-based effort expenditure, but no behavioral study to date has assessed effort-based decision-making in ASD. Methods The current study compared a group of adults with ASD to a group of typically developing adults on the Effort Expenditure for Rewards Task (EEfRT, a behavioral measure of effort-based decision-making. In this task, participants were provided with the probability of receiving a monetary reward on a particular trial and asked to choose between either an “easy task” (less motoric effort for a small, stable reward or a “hard task” (greater motoric effort for a variable but consistently larger reward. Results Participants with ASD chose the hard task more frequently than did the control group, yet were less influenced by differences in reward value and probability than the control group. Additionally, effort-based decision-making was related to repetitive behavior symptoms across both groups. Conclusions These results suggest that individuals with ASD may be more willing to expend effort to obtain a monetary reward regardless of the reward contingencies. More broadly, results suggest that behavioral choices may be less influenced by information about reward contingencies in individuals with ASD. This atypical pattern of effort-based decision-making may be relevant for understanding the heightened reward motivation for circumscribed interests in ASD.

  5. SPP: A data base processor data communications protocol

    Science.gov (United States)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  6. Measuring collections effort improves cash performance.

    Science.gov (United States)

    Shutts, Joe

    2009-09-01

    Having a satisfied work force can lead to an improved collections effort. Hiring the right people and training them ensures employee engagement. Measuring collections effort and offering incentives is key to revenue cycle success.

  7. Visual cues and listening effort: individual variability.

    Science.gov (United States)

    Picou, Erin M; Ricketts, Todd A; Hornsby, Benjamin W Y

    2011-10-01

    To investigate the effect of visual cues on listening effort as well as whether predictive variables such as working memory capacity (WMC) and lipreading ability affect the magnitude of listening effort. Twenty participants with normal hearing were tested using a paired-associates recall task in 2 conditions (quiet and noise) and 2 presentation modalities (audio only [AO] and auditory-visual [AV]). Signal-to-noise ratios were adjusted to provide matched speech recognition across audio-only and AV noise conditions. Also measured were subjective perceptions of listening effort and 2 predictive variables: (a) lipreading ability and (b) WMC. Objective and subjective results indicated that listening effort increased in the presence of noise, but on average the addition of visual cues did not significantly affect the magnitude of listening effort. Although there was substantial individual variability, on average participants who were better lipreaders or had larger WMCs demonstrated reduced listening effort in noise in AV conditions. Overall, the results support the hypothesis that integrating auditory and visual cues requires cognitive resources in some participants. The data indicate that low lipreading ability or low WMC is associated with relatively effortful integration of auditory and visual information in noise.

  8. [Perspectives of an electronic data processing-controlled anesthesia protocol].

    Science.gov (United States)

    Martens, G; Naujoks, B

    1987-10-01

    There are two ways to introduce electronic data processing in anesthesia recording, which should be combined in the future: (1) computer-aided data collection (during anesthesia) and (2) data analysis. Both procedures have their own advantages and disadvantages. The first step in data collection is a system whereby the on-line registered data are automatically plotted and the discrete data are noted by hand (semi-automatic recording). The second step is to keep the minutes on a display screen instead of on paper, thus producing a protocol in digital form (automatic recording). We discuss the problems of these computer-aided recording systems and future trends, in particular the problems caused by the "human-computer interface" and by uncertainty with respect to the validity of the stored data. For computer-aided data analysis of anesthesia records, one has to select appropriate data in order to build up data bases. This selection is necessary whether the protocol is in analogical or in digital form, and we attempt to develop some general rules, the concrete selection depends, of course, on the aim of the evaluation. As an example we discuss evaluations for administrative purposes. Evaluations for scientific questions are even more affected by the quality of data definitions, and the efforts involved in data management are considerably higher. At the end of this paper we sketch a hybrid information system for computer-aided anesthesia recording that combines data collection and data analysis.

  9. The Development of Korea Additional Protocol System

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yeo, Jin Kyun

    2008-01-01

    The Agreement between the Republic of Korea (ROK) and the IAEA for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Safeguards Agreement) entered into force on 14 November 1975. The Additional Protocol to the Safeguards Agreement (the Additional Protocol) was signed on 21 June 1999 and entered into force on 19 February 2004. ROK has been submitting annual updated reports of initial declaration on every May 15th since August 2004. Additional protocol reports were submitted through Protocol Reporter provided by IAEA. Annual declarations were simply uploaded and stored in the Accounting Information Treatment System of KINAC, which did not provide data analysis and management function. There have been demands for improvement to handle ever-increasing information. KAPS (Korea Additional Protocol System) has been developed to assist and administrate the additional protocol related works effectively. The new system enables integrated management including composition of additional protocol report and version control, periodical update of related information, results of IAEA complementary access to each facility

  10. Evaluation of the Effectiveness of Two Morphine Protocols to Treat Neonatal Abstinence Syndrome in a Level II Nursery in a Community Hospital.

    Science.gov (United States)

    DeAtley, Heather N; Burton, Amanda; Fraley, Michelle DeLuca; Haltom, Joan

    2017-07-01

    The authors sought to evaluate the impact on length of hospital stay and treatment duration of morphine after implementation of a change in the institutional protocol for managing neonatal abstinence syndrome (NAS) in an effort to improve patient outcomes. A single-center, retrospective chart review was conducted at a Level II nursery in a community hospital in Kentucky. Fifty-nine neonates born between January 1, 2014, and December 31, 2015, who were diagnosed with NAS and received morphine for treatment were included. The protocol 1 group consisted of 33 neonates who received an initial dose of morphine 0.04 mg/kg/dose administered orally every 4 hours (January 1-December 31, 2014), and the protocol 2 group consisted of 26 neonates who received an initial dose of morphine 0.06 mg/kg/dose administered orally every 3 hours (January 1-November 30, 2015), after a change in the protocol for managing NAS was implemented on January 1, 2015. Data were reviewed and compared between the two protocol groups to determine the impact that the dosage change had on length of hospital stay and morphine treatment duration. The average length of stay decreased by 7 days in the protocol 2 group compared with the protocol 1 group (21 vs 28.65 days). The average duration of treatment decreased by 7 days in the protocol 2 group compared with the protocol 1 group (18.3 vs 25.4 days). These differences between groups were not statistically significant, however, because the population size was not large enough to achieve adequate power. These results indicate that protocol 2 displayed the potential to decrease length of stay and duration of treatment compared with protocol 1 at this facility; however, balancing higher starting doses with the risk of oversedation will continue to challenge the health care team. Concern for oversedation when using the higher starting dose in protocol 2 has prompted further research (e.g., protocol 3, initial morphine 0.05 mg/kg/dose every 3 hrs). Continued

  11. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  12. Quantum-key-distribution protocol with pseudorandom bases

    Science.gov (United States)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  13. Interoperability and Reliability of Multiplatform MPLS VPN: Comparison of Traffic Engineering with RSVP-TE Protocol and LDP Protocol

    Directory of Open Access Journals (Sweden)

    Nanang Ismail

    2017-10-01

    48% of packet loss per 100 sent packets while on RSVP packet loss percentage is 35.5% per 100 sent packets. Both protocols have interoperability on the third layer of multiplatform MPLS VPN, but on heavy loaded traffic condition, RSVP protocol has better reliability than the LDP protocol.

  14. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.

    Science.gov (United States)

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-06-17

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV's research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.

  15. Comparison of four measures in reducing length of stay in burns: An Asian centre's evolved multimodal burns protocol.

    Science.gov (United States)

    Chong, Si Jack; Kok, Yee Onn; Choke, Abby; Tan, Esther W X; Tan, Kok Chai; Tan, Bien-Keem

    2017-09-01

    Multidisciplinary burns care is constantly evolving to improve outcomes given the numerous modalities available. We examine the use of Biobrane, micrografting, early renal replacement therapy and a strict target time of surgery within 24h of burns on improving outcomes of length of stay, duration of surgery, mean number of surgeries and number of positive tissue cultures in a tertiary burns centre. A post-implementation prospective cohort of inpatient burns patients from 2014 to 2015 (n=137) was compared against a similar pre-implementation cohort from 2013 to 2014 (n=93) using REDCAP, an electronic database. There was no statistically significant difference for comorbidities, age and percentage (%) TBSA between the new protocol and control groups. The protocol group had shorter mean time to surgery (23.5-38.5h) (pburns protocol improved burns care and validated the collective effort of a multi-disciplinary, multipronged burns management supported by surgeons, anesthetists, renal physicians, emergency physicians, nurses, and allied healthcare providers. Biobrane, single stage onlay micrograft/allograft, early CRRT and surgery within 24h were successfully introduced. These are useful adjuncts in the armamentarium to be considered for any burns centre. Copyright © 2017. Published by Elsevier Ltd.

  16. Acoustic emissions and electric signal recordings, when cement mortar beams are subjected to three-point bending under various loading protocols

    Directory of Open Access Journals (Sweden)

    A. Kyriazopoulos

    2017-04-01

    Full Text Available Two experimental techniques are used study the response of cement mortar beams subjected to three-point bending under various load¬ing protocols. The techniques used are the detection of weak electric current emissions known as Pressure Stimulated Currents and the Acoustic Emissions (in particular, the cumulative AE energy and the b-value analysis. Patterns are detected that can be used to predict upcoming fracture, regard¬less of the adopted loading protocol in each experiment. The expe¬rimental results of the AE and PSC techniques lead to the conclusion that when the calculated Ib values decrease, the PSC starts increasing strongly.

  17. Greater effort increases perceived value in an invertebrate.

    Science.gov (United States)

    Czaczkes, Tomer J; Brandstetter, Birgit; di Stefano, Isabella; Heinze, Jürgen

    2018-05-01

    Expending effort is generally considered to be undesirable. However, both humans and vertebrates will work for a reward they could also get for free. Moreover, cues associated with high-effort rewards are preferred to low-effort associated cues. Many explanations for these counterintuitive findings have been suggested, including cognitive dissonance (self-justification) or a greater contrast in state (e.g., energy or frustration level) before and after an effort-linked reward. Here, we test whether effort expenditure also increases perceived value in ants, using both classical cue-association methods and pheromone deposition, which correlates with perceived value. In 2 separate experimental setups, we show that pheromone deposition is higher toward the reward that requires more effort: 47% more pheromone deposition was performed for rewards reached via a vertical runway (high effort) compared with ones reached via a horizontal runway (low effort), and deposition rates were 28% higher on rough (high effort) versus smooth (low effort) runways. Using traditional cue-association methods, 63% of ants trained on different surface roughness, and 70% of ants trained on different runway elevations, preferred the high-effort related cues on a Y maze. Finally, pheromone deposition to feeders requiring memorization of one path bifurcation was up to 29% higher than to an identical feeder requiring no learning. Our results suggest that effort affects value perception in ants. This effect may stem from a cognitive process, which monitors the change in a generalized hedonic state before and after reward. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  18. Protocol for the management of psychiatric patients with psychomotor agitation.

    Science.gov (United States)

    Vieta, Eduard; Garriga, Marina; Cardete, Laura; Bernardo, Miquel; Lombraña, María; Blanch, Jordi; Catalán, Rosa; Vázquez, Mireia; Soler, Victòria; Ortuño, Noélia; Martínez-Arán, Anabel

    2017-09-08

    Psychomotor agitation (PMA) is a state of motor restlessness and mental tension that requires prompt recognition, appropriate assessment and management to minimize anxiety for the patient and reduce the risk for escalation to aggression and violence. Standardized and applicable protocols and algorithms can assist healthcare providers to identify patients at risk of PMA, achieve timely diagnosis and implement minimally invasive management strategies to ensure patient and staff safety and resolution of the episode. Spanish experts in PMA from different disciplines (psychiatrists, psychologists and nurses) convened in Barcelona for a meeting in April 2016. Based on recently issued international consensus guidelines on the standard of care for psychiatric patients with PMA, the meeting provided the opportunity to address the complexities in the assessment and management of PMA from different perspectives. The attendees worked towards producing a consensus for a unified approach to PMA according to the local standards of care and current local legislations. The draft protocol developed was reviewed and ratified by all members of the panel prior to its presentation to the Catalan Society of Psychiatry and Mental Health, the Spanish Society of Biological Psychiatry (SEPB) and the Spanish Network Centre for Research in Mental Health (CIBERSAM) for input. The final protocol and algorithms were then submitted to these organizations for endorsement. The protocol presented here provides guidance on the appropriate selection and use of pharmacological agents (inhaled/oral/IM), seclusion, and physical restraint for psychiatric patients suspected of or presenting with PMA. The protocol is applicable within the Spanish healthcare system. Implementation of the protocol and the constituent algorithms described here should ensure the best standard of care of patients at risk of PMA. Episodes of PMA could be identified earlier in their clinical course and patients could be managed in

  19. Transcranial Alternating Current Stimulation Attenuates Neuronal Adaptation.

    Science.gov (United States)

    Kar, Kohitij; Duijnhouwer, Jacob; Krekelberg, Bart

    2017-03-01

    We previously showed that brief application of 2 mA (peak-to-peak) transcranial currents alternating at 10 Hz significantly reduces motion adaptation in humans. This is but one of many behavioral studies showing that weak currents applied to the scalp modulate neural processing. Transcranial stimulation has been shown to improve perception, learning, and a range of clinical symptoms. Few studies, however, have measured the neural consequences of transcranial current stimulation. We capitalized on the strong link between motion perception and neural activity in the middle temporal (MT) area of the macaque monkey to study the neural mechanisms that underlie the behavioral consequences of transcranial alternating current stimulation. First, we observed that 2 mA currents generated substantial intracranial fields, which were much stronger in the stimulated hemisphere (0.12 V/m) than on the opposite side of the brain (0.03 V/m). Second, we found that brief application of transcranial alternating current stimulation at 10 Hz reduced spike-frequency adaptation of MT neurons and led to a broadband increase in the power spectrum of local field potentials. Together, these findings provide a direct demonstration that weak electric fields applied to the scalp significantly affect neural processing in the primate brain and that this includes a hitherto unknown mechanism that attenuates sensory adaptation. SIGNIFICANCE STATEMENT Transcranial stimulation has been claimed to improve perception, learning, and a range of clinical symptoms. Little is known, however, how transcranial current stimulation generates such effects, and the search for better stimulation protocols proceeds largely by trial and error. We investigated, for the first time, the neural consequences of stimulation in the monkey brain. We found that even brief application of alternating current stimulation reduced the effects of adaptation on single-neuron firing rates and local field potentials; this mechanistic

  20. Energy sector in Ecuador: Current status

    International Nuclear Information System (INIS)

    Pelaez-Samaniego, M.R.; Garcia-Perez, M.; Cortez, L.A.B.; Oscullo, J.; Olmedo, G.

    2007-01-01

    This paper describes the current energy sector in Ecuador, its present structure, the oil industry, subsidies, and renewable energy, focusing on the evolution and reform of the electricity sector. Currently, 86% of the primary energy originates from nonrenewable sources. In 2005, the gross electricity generation was 15 127 GWh (45.5% hydropower, 43.11% thermal, and 11.39% imported). Ecuador is the fifth largest oil producer in South America but lacks sufficient oil refining capacity. Reserves of natural gas (NG) are small, and most of NG is produced from oil fields without energy recovery. Several projects are underway to increase the utilization of NG and renewable energies to meet Ecuador commitments to the Kyoto Protocol