WorldWideScience

Sample records for protocols electronic resource

  1. Verbal protocols as methodological resources: research evidence

    Directory of Open Access Journals (Sweden)

    Alessandra Baldo

    2012-01-01

    Full Text Available This article aims at reflecting on the use of verbal protocols as a methodological resource in qualitative research, more specifically on the aspect regarded as the main limitation of a study about lexical inferencing in L2 (BALDO; VELASQUES, 2010: its subjective trait. The article begins with a brief literature review on protocols, followed by a description of the study in which they were employed as methodological resources. Based on that, protocol subjectivity is illustrated through samples of unparalleled data classification, carried out independently by two researchers. In the final section, the path followed to minimize the problem is presented, intending to contribute to improve efficiency in the use of verbal protocols in future research.

  2. The HPA photon protocol and proposed electron protocol

    International Nuclear Information System (INIS)

    Pitchford, W.G.

    1985-01-01

    The Hospital Physicists Association (HPA) photon dosimetry protocol has been produced and was published in 1983. Revised values of some components of Csub(lambda) and refinements introduced into the theory in the last few years have enabled new Csub(lambda) values to be produced. The proposed HPA electron protocol is at present in draft form and will be published shortly. Both protocels are discussed. (Auth.)

  3. Multiprofissional electronic protocol in ophtalmology with enfasis in strabismus

    Directory of Open Access Journals (Sweden)

    CHRISTIE GRAF RIBEIRO

    Full Text Available ABSTRACT Objective: to create and validate an electronic database in ophthalmology focused on strabismus, to computerize this database in the form of a systematic data collection software named Electronic Protocol, and to incorporate this protocol into the Integrated System of Electronic Protocols (SINPE(c. Methods: this is a descriptive study, with the methodology divided into three phases: (1 development of a theoretical ophthalmologic database with emphasis on strabismus; (2 computerization of this theoretical ophthalmologic database using SINPE(c and (3 interpretation of the information with demonstration of results to validate the protocol. We inputed data from the charts of fifty patients with known strabismus through the Electronic Protocol for testing and validation. Results: the new electronic protocol was able to store information regarding patient history, physical examination, laboratory exams, imaging results, diagnosis and treatment of patients with ophthalmologic diseases, with emphasis on strabismus. We included 2,141 items in this master protocol and created 20 new specific electronic protocols for strabismus, each with its own specifics. Validation was achieved through correlation and corroboration of the symptoms and confirmed diagnoses of the fifty included patients with the diagnostic criteria for the twenty new strabismus protocols. Conclusion: a new, validated electronic database focusing on ophthalmology, with emphasis on strabismus, was successfully created through the standardized collection of information, and computerization of the database using proprietary software. This protocol is ready for deployment to facilitate data collection, sorting and application for practitioners and researchers in numerous specialties.

  4. Bayesian adaptive survey protocols for resource management

    Science.gov (United States)

    Halstead, Brian J.; Wylie, Glenn D.; Coates, Peter S.; Casazza, Michael L.

    2011-01-01

    Transparency in resource management decisions requires a proper accounting of uncertainty at multiple stages of the decision-making process. As information becomes available, periodic review and updating of resource management protocols reduces uncertainty and improves management decisions. One of the most basic steps to mitigating anthropogenic effects on populations is determining if a population of a species occurs in an area that will be affected by human activity. Species are rarely detected with certainty, however, and falsely declaring a species absent can cause improper conservation decisions or even extirpation of populations. We propose a method to design survey protocols for imperfectly detected species that accounts for multiple sources of uncertainty in the detection process, is capable of quantitatively incorporating expert opinion into the decision-making process, allows periodic updates to the protocol, and permits resource managers to weigh the severity of consequences if the species is falsely declared absent. We developed our method using the giant gartersnake (Thamnophis gigas), a threatened species precinctive to the Central Valley of California, as a case study. Survey date was negatively related to the probability of detecting the giant gartersnake, and water temperature was positively related to the probability of detecting the giant gartersnake at a sampled location. Reporting sampling effort, timing and duration of surveys, and water temperatures would allow resource managers to evaluate the probability that the giant gartersnake occurs at sampled sites where it is not detected. This information would also allow periodic updates and quantitative evaluation of changes to the giant gartersnake survey protocol. Because it naturally allows multiple sources of information and is predicated upon the idea of updating information, Bayesian analysis is well-suited to solving the problem of developing efficient sampling protocols for species of

  5. Multiprocessor Real-Time Locking Protocols for Replicated Resources

    Science.gov (United States)

    2016-07-01

    assignment problem, the ac- tual identities of the allocated replicas must be known. When locking protocols are used, tasks may experience delays due to both...Multiprocessor Real-Time Locking Protocols for Replicated Resources ∗ Catherine E. Jarrett1, Kecheng Yang1, Ming Yang1, Pontus Ekberg2, and James H...replicas to execute. In prior work on replicated resources, k-exclusion locks have been used, but this restricts tasks to lock only one replica at a time. To

  6. Multiprofissional electronic protocol in ophtalmology with enfasis in strabismus

    OpenAIRE

    RIBEIRO, CHRISTIE GRAF; MOREIRA, ANA TEREZA RAMOS; PINTO, JOSÉ SIMÃO DE PAULA; MALAFAIA, OSVALDO

    2016-01-01

    ABSTRACT Objective: to create and validate an electronic database in ophthalmology focused on strabismus, to computerize this database in the form of a systematic data collection software named Electronic Protocol, and to incorporate this protocol into the Integrated System of Electronic Protocols (SINPE(c)). Methods: this is a descriptive study, with the methodology divided into three phases: (1) development of a theoretical ophthalmologic database with emphasis on strabismus; (2) compute...

  7. Electronic Voting Protocol Using Identity-Based Cryptography

    Directory of Open Access Journals (Sweden)

    Gina Gallegos-Garcia

    2015-01-01

    Full Text Available Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC, which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE. With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI. Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  8. Electronic Voting Protocol Using Identity-Based Cryptography.

    Science.gov (United States)

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  9. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  10. Electronic Resource Management and Design

    Science.gov (United States)

    Abrams, Kimberly R.

    2015-01-01

    We have now reached a tipping point at which electronic resources comprise more than half of academic library budgets. Because of the increasing work associated with the ever-increasing number of e-resources, there is a trend to distribute work throughout the library even in the presence of an electronic resources department. In 2013, the author…

  11. A New Resource Allocation Protocol for the Backhaul of Underwater Cellular Wireless Networks

    Directory of Open Access Journals (Sweden)

    Changho Yun

    2018-01-01

    Full Text Available In this paper, an underwater base station initiating (UBSI resource allocation is proposed for underwater cellular wireless networks (UCWNs, which is a new approach to determine the backhaul capacity of underwater base stations (UBSs. This backhaul is a communication link from a UBS to a UBS controller (UBSC. Contrary to conventional resource allocation protocols, a UBS initiates to re-determine its backhaul capacity for itself according to its queue status; it releases a portion of its backhaul capacity in the case of experiencing resource under-utilization, and also requests additional backhaul capacity to the UBSC if packet drops are caused due to queue-overflow. This protocol can be appropriate and efficient to the underwater backhaul link where the transmission rate is quite low and the latency is unneglectable. In order to investigate the applicability of the UBSI resource allocation protocol to the UCWN, its performance is extensively analyzed via system level simulations. In our analysis, considered performance measures include average packet drop rate, average resource utilization, average message overhead, and the reserved capacity of the UBSC. In particular, the simulation results show that our proposed protocol not only utilizes most of the given backhaul capacity (more than 90 percent of resource utilization on the average, but also reduces controlling message overheads induced by resource allocation (less than 2 controlling messages on the average. It is expected that the simulation results and analysis in this paper can be used as operating guidelines to apply our new resource allocation protocol for the UCWN.

  12. Protocol-transparent resource sharing in hierarchically scheduled real-time systems

    NARCIS (Netherlands)

    Heuvel, van den M.M.H.P.; Bril, R.J.; Lukkien, J.J.

    2010-01-01

    Hierarchical scheduling frameworks (HSFs) provide means for composing complex real-time systems from well-defined, independently analyzed subsystems. To support resource sharing within two-level HSFs, three synchronization protocols based on the stack resource policy (SRP) have recently been

  13. Compact Modbus TCP/IP protocol for data acquisition systems based on limited hardware resources

    Science.gov (United States)

    Bai, Q.; Jin, B.; Wang, D.; Wang, Y.; Liu, X.

    2018-04-01

    The Modbus TCP/IP has been a standard industry communication protocol and widely utilized for establishing sensor-cloud platforms on the Internet. However, numerous existing data acquisition systems built on traditional single-chip microcontrollers without sufficient resources cannot support it, because the complete Modbus TCP/IP protocol always works dependent on a full operating system which occupies abundant hardware resources. Hence, a compact Modbus TCP/IP protocol is proposed in this work to make it run efficiently and stably even on a resource-limited hardware platform. Firstly, the Modbus TCP/IP protocol stack is analyzed and the refined protocol suite is rebuilt by streamlining the typical TCP/IP suite. Then, specific implementation of every hierarchical layer is respectively presented in detail according to the protocol structure. Besides, the compact protocol is implemented in a traditional microprocessor to validate the feasibility of the scheme. Finally, the performance of the proposed scenario is assessed. The experimental results demonstrate that message packets match the frame format of Modbus TCP/IP protocol and the average bandwidth reaches to 1.15 Mbps. The compact protocol operates stably even based on a traditional microcontroller with only 4-kB RAM and 12-MHz system clock, and no communication congestion or frequent packet loss occurs.

  14. Multiprofissional electronic protocol in ophtalmology with enfasis in strabismus.

    Science.gov (United States)

    Ribeiro, Christie Graf; Moreira, Ana Tereza Ramos; Pinto, José Simão DE Paula; Malafaia, Osvaldo

    2016-01-01

    to create and validate an electronic database in ophthalmology focused on strabismus, to computerize this database in the form of a systematic data collection software named Electronic Protocol, and to incorporate this protocol into the Integrated System of Electronic Protocols (SINPE(c)). this is a descriptive study, with the methodology divided into three phases: (1) development of a theoretical ophthalmologic database with emphasis on strabismus; (2) computerization of this theoretical ophthalmologic database using SINPE(c) and (3) interpretation of the information with demonstration of results to validate the protocol. We inputed data from the charts of fifty patients with known strabismus through the Electronic Protocol for testing and validation. the new electronic protocol was able to store information regarding patient history, physical examination, laboratory exams, imaging results, diagnosis and treatment of patients with ophthalmologic diseases, with emphasis on strabismus. We included 2,141 items in this master protocol and created 20 new specific electronic protocols for strabismus, each with its own specifics. Validation was achieved through correlation and corroboration of the symptoms and confirmed diagnoses of the fifty included patients with the diagnostic criteria for the twenty new strabismus protocols. a new, validated electronic database focusing on ophthalmology, with emphasis on strabismus, was successfully created through the standardized collection of information, and computerization of the database using proprietary software. This protocol is ready for deployment to facilitate data collection, sorting and application for practitioners and researchers in numerous specialties. criar uma base eletrônica de dados em oftalmologia com ênfase em estrabismo através da coleta padronizada de informações. Informatizar esta base sob a forma de software para a coleta sistemática de dados chamado "Protocolo Eletrônico" e incorporar este

  15. Bell nonlocality: a resource for device-independent quantum information protocols

    Science.gov (United States)

    Acin, Antonio

    2015-05-01

    Bell nonlocality is not only one of the most fundamental properties of quantum physics, but has also recently acquired the status of an information resource for device-independent quantum information protocols. In the device-independent approach, protocols are designed so that their performance is independent of the internal working of the devices used in the implementation. We discuss all these ideas and argue that device-independent protocols are especially relevant or cryptographic applications, as they are insensitive to hacking attacks exploiting imperfections on the modelling of the devices.

  16. Comparison of IAEA protocols for clinical electron beam dosimetry

    International Nuclear Information System (INIS)

    Novotny, J.; Soukup, M.

    2002-01-01

    In most beam calibration protocols so far used in clinical practice, the method recommended for the determination of absorbed dose to water in high-energy electron beams is based on either an exposure or an air kerma calibration factor of an ionisation chamber in a C0 60 gamma-ray or 2 MV x-ray beam. These protocols are complex and the overall uncertainty in the absorbed dose to water under reference conditions is about 3-4%. The new generation of protocols, namely IAEA TRS 398, are based on absorbed dose-to-water standards in photon beams from Co 60 and accelerator beams. The possible errors in absorbed dose determination in reference conditions in practical clinical dosimetry caused by replacement of TRS 277 and TRS 381 protocols for a new TRS 398 protocol were carefully studied for clinical electron beams in energy range 6-20 MeV. All measurements were performed on Varian CLINAC 2100 C linear accelerator. The electron beam energy ranged from 6 to 20 MeV. Basically three different detectors were used for measurements: PTW Roos plane-parallel ionization chamber, calibrated PTW 30002 Farmer type, ionization, Scanditronix electron diode detector. Measurements of central axis percentage depth doses were made by diode using Wellhoefer WP700 beam scanner in 40 cm x 40 cm x 50 cm water phantom. A reference chamber or semiconductor diode mounted on electron treatment cone was used to correct beam output variations for a chamber or diode measurements during scanning. Absolute dose measurements were carried out with Roos plane-parallel chamber connected to PTW UNIDOS electrometer always for preselected number of monitor units. In a new IAEA dosimetry protocol clinical reference dosimetry for electron beam is performed at depth of d ref = 0.6R 50 - 0.1 [cm] instead of d max as in previous ones. To check the stability of electron beams for energy and to establish d ref and standard deviation for reference depth position, the depth dose curves obtained during the quality

  17. Counter-proposal: A Multi-Agent Negotiation Protocol for Resolving Resource Contention in Open Control Systems

    DEFF Research Database (Denmark)

    Sørensen, Jan Corfixen; Jørgensen, Bo Nørregaard

    2010-01-01

    The resource contention problem in control systems based on software agents occurs when agents with different goals compete with each other, to control a shared resource. In this paper we propose the counter-proposal protocol, a negotiation protocol that resolves the resource contention problem...

  18. Sharing Service Resource Information for Application Integration in a Virtual Enterprise - Modeling the Communication Protocol for Exchanging Service Resource Information

    Science.gov (United States)

    Yamada, Hiroshi; Kawaguchi, Akira

    Grid computing and web service technologies enable us to use networked resources in a coordinated manner. An integrated service is made of individual services running on coordinated resources. In order to achieve such coordinated services autonomously, the initiator of a coordinated service needs to know detailed service resource information. This information ranges from static attributes like the IP address of the application server to highly dynamic ones like the CPU load. The most famous wide-area service discovery mechanism based on names is DNS. Its hierarchical tree organization and caching methods take advantage of the static information managed. However, in order to integrate business applications in a virtual enterprise, we need a discovery mechanism to search for the optimal resources based on the given a set of criteria (search keys). In this paper, we propose a communication protocol for exchanging service resource information among wide-area systems. We introduce the concept of the service domain that consists of service providers managed under the same management policy. This concept of the service domain is similar to that for autonomous systems (ASs). In each service domain, the service information provider manages the service resource information of service providers that exist in this service domain. The service resource information provider exchanges this information with other service resource information providers that belong to the different service domains. We also verified the protocol's behavior and effectiveness using a simulation model developed for proposed protocol.

  19. Electronic Resource Management Systems

    Directory of Open Access Journals (Sweden)

    Mark Ellingsen

    2004-10-01

    Full Text Available Computer applications which deal with electronic resource management (ERM are quite a recent development. They have grown out of the need to manage the burgeoning number of electronic resources particularly electronic journals. Typically, in the early years of e-journal acquisition, library staff provided an easy means of accessing these journals by providing an alphabetical list on a web page. Some went as far as categorising the e-journals by subject and then grouping the journals either on a single web page or by using multiple pages. It didn't take long before it was recognised that it would be more efficient to dynamically generate the pages from a database rather than to continually edit the pages manually. Of course, once the descriptive metadata for an electronic journal was held within a database the next logical step was to provide administrative forms whereby that metadata could be manipulated. This in turn led to demands for incorporating more information and more functionality into the developing application.

  20. Electronic Resources Management Project Presentation 2012

    KAUST Repository

    Ramli, Rindra M.

    2012-11-05

    This presentation describes the electronic resources management project undertaken by the KAUST library. The objectives of this project is to migrate information from MS Sharepoint to Millennium ERM module. One of the advantages of this migration is to consolidate all electronic resources into a single and centralized location. This would allow for better information sharing among library staff.

  1. An electronic specimen collection protocol schema (eSCPS). Document architecture for specimen management and the exchange of specimen collection protocols between biobanking information systems.

    Science.gov (United States)

    Eminaga, O; Semjonow, A; Oezguer, E; Herden, J; Akbarov, I; Tok, A; Engelmann, U; Wille, S

    2014-01-01

    The integrity of collection protocols in biobanking is essential for a high-quality sample preparation process. However, there is not currently a well-defined universal method for integrating collection protocols in the biobanking information system (BIMS). Therefore, an electronic schema of the collection protocol that is based on Extensible Markup Language (XML) is required to maintain the integrity and enable the exchange of collection protocols. The development and implementation of an electronic specimen collection protocol schema (eSCPS) was performed at two institutions (Muenster and Cologne) in three stages. First, we analyzed the infrastructure that was already established at both the biorepository and the hospital information systems of these institutions and determined the requirements for the sufficient preparation of specimens and documentation. Second, we designed an eSCPS according to these requirements. Finally, a prospective study was conducted to implement and evaluate the novel schema in the current BIMS. We designed an eSCPS that provides all of the relevant information about collection protocols. Ten electronic collection protocols were generated using the supplementary Protocol Editor tool, and these protocols were successfully implemented in the existing BIMS. Moreover, an electronic list of collection protocols for the current studies being performed at each institution was included, new collection protocols were added, and the existing protocols were redesigned to be modifiable. The documentation time was significantly reduced after implementing the eSCPS (5 ± 2 min vs. 7 ± 3 min; p = 0.0002). The eSCPS improves the integrity and facilitates the exchange of specimen collection protocols in the existing open-source BIMS.

  2. PRINCIPLES OF CONTENT FORMATION EDUCATIONAL ELECTRONIC RESOURCE

    Directory of Open Access Journals (Sweden)

    О Ю Заславская

    2017-12-01

    Full Text Available The article considers modern possibilities of information and communication technologies for the design of electronic educational resources. The conceptual basis of the open educational multimedia system is based on the modular architecture of the electronic educational resource. The content of the electronic training module can be implemented in several versions of the modules: obtaining information, practical exercises, control. The regularities in the teaching process in modern pedagogical theory are considered: general and specific, and the principles for the formation of the content of instruction at different levels are defined, based on the formulated regularities. On the basis of the analysis, the principles of the formation of the electronic educational resource are determined, taking into account the general and didactic patterns of teaching.As principles of the formation of educational material for obtaining information for the electronic educational resource, the article considers: the principle of methodological orientation, the principle of general scientific orientation, the principle of systemic nature, the principle of fundamentalization, the principle of accounting intersubject communications, the principle of minimization. The principles of the formation of the electronic training module of practical studies in the article include: the principle of systematic and dose based consistency, the principle of rational use of study time, the principle of accessibility. The principles of the formation of the module for monitoring the electronic educational resource can be: the principle of the operationalization of goals, the principle of unified identification diagnosis.

  3. Implementing CORAL: An Electronic Resource Management System

    Science.gov (United States)

    Whitfield, Sharon

    2011-01-01

    A 2010 electronic resource management survey conducted by Maria Collins of North Carolina State University and Jill E. Grogg of University of Alabama Libraries found that the top six electronic resources management priorities included workflow management, communications management, license management, statistics management, administrative…

  4. Managing electronic resources a LITA guide

    CERN Document Server

    Weir, Ryan O

    2012-01-01

    Informative, useful, current, Managing Electronic Resources: A LITA Guide shows how to successfully manage time, resources, and relationships with vendors and staff to ensure personal, professional, and institutional success.

  5. Evaluation of Interoperability Protocols in Repositories of Electronic Theses and Dissertations

    Science.gov (United States)

    Hakimjavadi, Hesamedin; Masrek, Mohamad Noorman

    2013-01-01

    Purpose: The purpose of this study is to evaluate the status of eight interoperability protocols within repositories of electronic theses and dissertations (ETDs) as an introduction to further studies on feasibility of deploying these protocols in upcoming areas of interoperability. Design/methodology/approach: Three surveys of 266 ETD…

  6. Developing of the protocol for electron beam food irradiation facility

    International Nuclear Information System (INIS)

    Petreska, Svetlana

    2012-01-01

    By establishing the needs for institution of new technologies in the process of food processing, in this case a randomized choice of electron beam accelerator facility, arises the need for designing a protocol for safe and secure performance of the facility. The protocol encompasses safety and security measures for protection from ionizing radiation of the individuals who work at the facility, as well as, the population and the environment in the immediate neighborhood of the facility. Thus, the adopted approach is the establishment of appropriate systems responding to the protocol. Dosimetry system, which includes appropriate procedures for accurate measure and recording of the absorbed dose values, according to the provisions for protection from ionizing radiation. Ionizing radiation protection system and providing the safety and security of the facility for food processing by means of ionizing radiation. System for providing quality and safety control of the facility for food processing by means of ionizing radiation. Pursuant to the designed a protocol for safe and secure performance of the facility for electron beam food processing, contributes to protection against ionizing radiation as occupationally exposed persons as well the population. (Author)

  7. Rivers rapid assessment protocols and insertion of society in monitoring of water resources

    Directory of Open Access Journals (Sweden)

    Guilherme Malafaia

    2008-12-01

    Full Text Available The degradation of water resources has been detected and changes both institutional and in the legislation have been demanded. The careless use of rivers has ecological changes as direct consequence, causing serious modifications in the landscape and fluvial regime, besides altering the availability of habitats and the trophic composition of the aquatic environment. Pressed by this scenario, scientists have been developing assessment methods that are efficient both for the evaluation itself and for supporting decision taking in the environmental management processes. In this perspective, the objective of this study is to present the Rapid River Assessment Protocols (RAPs and to emphasize how these protocols can promote the community participation in water resources monitoring. The RAPs can used to evaluate in an integrated form the characteristics of a river section according to the conservation or degradation condition of the fluvial environment and it is characterized by its economic viability and easy applicability. In regions with poor financial resources and serious problems of water quality, the RAPs can be used in environmental management programs. By using these protocols, the integration of the community in water resources monitoring generates data which represent the quality of fluvial ecosystems throughout time, without requesting high costs or specialized professionals. The RAPs in a simplified but not simplistic tool, which can be used in activities that aim at promoting a quick and reliable assessment of the “health” of a river.

  8. Gender Analysis Of Electronic Information Resource Use: The Case ...

    African Journals Online (AJOL)

    Based on the findings the study concluded that access and use of electronic information resources creates a “social digital divide” along gender lines. The study ... Finally, the library needs to change its marketing strategies on the availability of electronic information resources to increase awareness of these resources.

  9. A Web Resource for Standardized Benchmark Datasets, Metrics, and Rosetta Protocols for Macromolecular Modeling and Design.

    Directory of Open Access Journals (Sweden)

    Shane Ó Conchúir

    Full Text Available The development and validation of computational macromolecular modeling and design methods depend on suitable benchmark datasets and informative metrics for comparing protocols. In addition, if a method is intended to be adopted broadly in diverse biological applications, there needs to be information on appropriate parameters for each protocol, as well as metrics describing the expected accuracy compared to experimental data. In certain disciplines, there exist established benchmarks and public resources where experts in a particular methodology are encouraged to supply their most efficient implementation of each particular benchmark. We aim to provide such a resource for protocols in macromolecular modeling and design. We present a freely accessible web resource (https://kortemmelab.ucsf.edu/benchmarks to guide the development of protocols for protein modeling and design. The site provides benchmark datasets and metrics to compare the performance of a variety of modeling protocols using different computational sampling methods and energy functions, providing a "best practice" set of parameters for each method. Each benchmark has an associated downloadable benchmark capture archive containing the input files, analysis scripts, and tutorials for running the benchmark. The captures may be run with any suitable modeling method; we supply command lines for running the benchmarks using the Rosetta software suite. We have compiled initial benchmarks for the resource spanning three key areas: prediction of energetic effects of mutations, protein design, and protein structure prediction, each with associated state-of-the-art modeling protocols. With the help of the wider macromolecular modeling community, we hope to expand the variety of benchmarks included on the website and continue to evaluate new iterations of current methods as they become available.

  10. Users satisfaction with electronic information resources and services ...

    African Journals Online (AJOL)

    This study investigated users satisfaction on the use of electronic information resources and services in MTN Net libraries in ABU & UNIBEN. Two objectives and one null hypotheses were formulated and tested with respect to the users' satisfaction on electronic information resources and services in MTN Net libraries in ...

  11. Organizational matters of competition in electronic educational resources

    Directory of Open Access Journals (Sweden)

    Ирина Карловна Войтович

    2015-12-01

    Full Text Available The article examines the experience of the Udmurt State University in conducting competitions of educational publications and electronic resources. The purpose of such competitions is to provide methodological support to educational process. The main focus is on competition of electronic educational resources. The technology of such contests is discussed through detailed analysis of the main stages of the contest. It is noted that the main task of the preparatory stage of the competition is related to the development of regulations on competition and the definition of criteria for selection of the submitted works. The paper also proposes a system of evaluation criteria of electronic educational resources developed by members of the contest organizing committee and jury members. The article emphasizes the importance of not only the preparatory stages of the competition, but also measures for its completion, aimed at training teachers create quality e-learning resources.

  12. CHALLENGES OF ELECTRONIC INFORMATION RESOURCES IN ...

    African Journals Online (AJOL)

    This paper discusses the role of policy for proper and efficient library services in the electronic era. It points out some of the possible dangers of embarking in electronic resources without a proper focus at hand. Thus, it calls for today's librarians and policy makers to brainstorm and come up with working policies suitable to ...

  13. Use of Electronic Resources in a Private University in Nigeria ...

    African Journals Online (AJOL)

    The study examined awareness and constraints in the use of electronic resources by lecturers and students of Ajayi Crowther University, Oyo, Nigeria. It aimed at justifying the resources expended in the provision of electronic resources in terms of awareness, patronage and factors that may be affecting awareness and use ...

  14. Electronic Resources Management System: Recommendation Report 2017

    KAUST Repository

    Ramli, Rindra M.

    2017-05-01

    This recommendation report provides an overview of the selection process for the new Electronic Resources Management System. The library has decided to move away from Innovative Interfaces Millennium ERM module. The library reviewed 3 system as potential replacements namely: Proquest 360 Resource Manager, Ex Libris Alma and Open Source CORAL ERMS. After comparing and trialling the systems, it was decided to go for Proquest 360 Resource Manager.

  15. Feasibility of Automatic Extraction of Electronic Health Data to Evaluate a Status Epilepticus Clinical Protocol.

    Science.gov (United States)

    Hafeez, Baria; Paolicchi, Juliann; Pon, Steven; Howell, Joy D; Grinspan, Zachary M

    2016-05-01

    Status epilepticus is a common neurologic emergency in children. Pediatric medical centers often develop protocols to standardize care. Widespread adoption of electronic health records by hospitals affords the opportunity for clinicians to rapidly, and electronically evaluate protocol adherence. We reviewed the clinical data of a small sample of 7 children with status epilepticus, in order to (1) qualitatively determine the feasibility of automated data extraction and (2) demonstrate a timeline-style visualization of each patient's first 24 hours of care. Qualitatively, our observations indicate that most clinical data are well labeled in structured fields within the electronic health record, though some important information, particularly electroencephalography (EEG) data, may require manual abstraction. We conclude that a visualization that clarifies a patient's clinical course can be automatically created using the patient's electronic clinical data, supplemented with some manually abstracted data. Future work could use this timeline to evaluate adherence to status epilepticus clinical protocols. © The Author(s) 2015.

  16. use of electronic resources by graduate students of the department

    African Journals Online (AJOL)

    respondent's access electronic resources from the internet via Cybercafé .There is a high ... KEY WORDS: Use, Electronic Resources, Graduate Students, Cybercafé. INTRODUCTION ... Faculty of Education, University of Uyo, Uyo. Olu Olat ...

  17. A protocol for amide bond formation with electron deficient amines and sterically hindered substrates

    DEFF Research Database (Denmark)

    Due-Hansen, Maria E; Pandey, Sunil K; Christiansen, Elisabeth

    2016-01-01

    A protocol for amide coupling by in situ formation of acyl fluorides and reaction with amines at elevated temperature has been developed and found to be efficient for coupling of sterically hindered substrates and electron deficient amines where standard methods failed.......A protocol for amide coupling by in situ formation of acyl fluorides and reaction with amines at elevated temperature has been developed and found to be efficient for coupling of sterically hindered substrates and electron deficient amines where standard methods failed....

  18. Electronic resource management practical perspectives in a new technical services model

    CERN Document Server

    Elguindi, Anne

    2012-01-01

    A significant shift is taking place in libraries, with the purchase of e-resources accounting for the bulk of materials spending. Electronic Resource Management makes the case that technical services workflows need to make a corresponding shift toward e-centric models and highlights the increasing variety of e-formats that are forcing new developments in the field.Six chapters cover key topics, including: technical services models, both past and emerging; staffing and workflow in electronic resource management; implementation and transformation of electronic resource management systems; the ro

  19. Utilization of electronic information resources by academic staff at ...

    African Journals Online (AJOL)

    The study investigated the utilization of Electronic Information resources by the academic staff of Makerere University in Uganda. It examined the academic staff awareness of the resources available, the types of resources provided by the Makerere University Library, the factors affecting resource utilization. The study was ...

  20. Electronic Resources Management Project Presentation 2012

    KAUST Repository

    Ramli, Rindra M.

    2012-01-01

    This presentation describes the electronic resources management project undertaken by the KAUST library. The objectives of this project is to migrate information from MS Sharepoint to Millennium ERM module. One of the advantages of this migration

  1. Auction-Based Resource Allocation for Cooperative Video Transmission Protocols over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Zhu Han

    2009-01-01

    Full Text Available Cooperative transmission has been proposed as a novel transmission strategy that takes advantage of broadcast nature of wireless networks, forms virtual MIMO system, and provides diversity gains. In this paper, wireless video transmission protocols are proposed, in which the spectrum resources are first allocated for the source side to broadcast video packets to the relay and destination, and then for the relay side to transmit side information generated from the received packets. The proposed protocols are optimized to minimize the end-to-end expected distortion via choosing bandwidth/power allocation, configuration of side information, subject to bandwidth and power constraints. For multiuser cases, most of current resource allocation approaches cannot be naturally extended and applied to the networks with relay nodes for video transmission. This paper extends the share auction approach into the cooperative video communication scenarios and provides a near-optimal solution for resource allocation. Experimental results have demonstrated that the proposed approach has significant advantage of up to 4 dB gain in single user case and 1.3 dB gain in multiuser case over the reference systems in terms of peak-to-signal-noise ratio. In addition, it reduces the formidable computational complexity of the optimal solution to linear complexity with performance degradation of less than 0.3 dB.

  2. Practical guide to electronic resources in the humanities

    CERN Document Server

    Dubnjakovic, Ana

    2010-01-01

    From full-text article databases to digitized collections of primary source materials, newly emerging electronic resources have radically impacted how research in the humanities is conducted and discovered. This book, covering high-quality, up-to-date electronic resources for the humanities, is an easy-to-use annotated guide for the librarian, student, and scholar alike. It covers online databases, indexes, archives, and many other critical tools in key humanities disciplines including philosophy, religion, languages and literature, and performing and visual arts. Succinct overviews of key eme

  3. Utilisation of Electronic Information Resources By Lecturers in ...

    African Journals Online (AJOL)

    This study assesses the use of information resources, specifically, electronic databases by lecturers/teachers in Universities and Colleges of Education in South Western Nigeria. Information resources are central to teachers' education. It provides lecturers/teachers access to information that enhances research and ...

  4. A CHANGE DETECTION AND RESOURCE-AWARE DATA SENSING APPROACHES FOR IMPROVING THE REPORTING PROTOCOL MECHANISM FOR MOBILE USER

    Directory of Open Access Journals (Sweden)

    annisaa sri indrawanti

    2015-08-01

    Full Text Available Update mechanism is an important process that relays information to the end-user by sending the data from the client to the server. There are several kinds of update mechanism that are used, one of them is reporting protocol. Reporting protocol sends the data from the client to the server continuously in a certain time interval. Reporting protocol occasionally sends the same information repeatedly to the end-user and sometimes the data aren’t needed by the end-user. This is an issue, because it can cause a large amount of bandwidth usage. In this research, we have developed an improvement of the reporting protocol mechanism for mobile user using change detection and resource-aware data sensing to minimize the bandwidth and resource usage. The improvement of reporting protocol that is implemented reduces frequency of data transfer with the prediction of the changes in user activity and position. The prediction is used as a trigger when the data is about to be sent. The results have shown that the adaptive reporting protocol could improve the performance of the overall reporting protocol. This is shown by the improvement of the bandwidth efficiency up to 36-97%, memory efficiency at 1.5-6% and battery efficiency at 7-13%.

  5. FuGeF: A Resource Bound Secure Forwarding Protocol for Wireless Sensor Networks.

    Science.gov (United States)

    Umar, Idris Abubakar; Mohd Hanapi, Zurina; Sali, A; Zulkarnain, Zuriati A

    2016-06-22

    Resource bound security solutions have facilitated the mitigation of spatio-temporal attacks by altering protocol semantics to provide minimal security while maintaining an acceptable level of performance. The Dynamic Window Secured Implicit Geographic Forwarding (DWSIGF) routing protocol for Wireless Sensor Network (WSN) has been proposed to achieve a minimal selection of malicious nodes by introducing a dynamic collection window period to the protocol's semantics. However, its selection scheme suffers substantial packet losses due to the utilization of a single distance based parameter for node selection. In this paper, we propose a Fuzzy-based Geographic Forwarding protocol (FuGeF) to minimize packet loss, while maintaining performance. The FuGeF utilizes a new form of dynamism and introduces three selection parameters: remaining energy, connectivity cost, and progressive distance, as well as a Fuzzy Logic System (FLS) for node selection. These introduced mechanisms ensure the appropriate selection of a non-malicious node. Extensive simulation experiments have been conducted to evaluate the performance of the proposed FuGeF protocol as compared to DWSIGF variants. The simulation results show that the proposed FuGeF outperforms the two DWSIGF variants (DWSIGF-P and DWSIGF-R) in terms of packet delivery.

  6. Discipline, availability of electronic resources and the use of Finnish National Electronic Library - FinELib

    Directory of Open Access Journals (Sweden)

    Sanna Torma

    2004-01-01

    Full Text Available This study elaborated relations between digital library use by university faculty, users' discipline and the availability of key resources in the Finnish National Electronic Library (FinELib, Finnish national digital library, by using nationwide representative survey data. The results show that the perceived availability of key electronic resources by researchers in FinELib was a stronger predictor of the frequency and purpose of use of its services than users' discipline. Regardless of discipline a good perceived provision of central resources led to a more frequent use of FinELib. The satisfaction with the services did not vary with the discipline, but with the perceived availability of resources.

  7. The Role of the Acquisitions Librarian in Electronic Resources Management

    Science.gov (United States)

    Pomerantz, Sarah B.

    2010-01-01

    With the ongoing shift to electronic formats for library resources, acquisitions librarians, like the rest of the profession, must adapt to the rapidly changing landscape of electronic resources by keeping up with trends and mastering new skills related to digital publishing, technology, and licensing. The author sought to know what roles…

  8. Quench detection electronics testing protocol for SST-1 magnets

    International Nuclear Information System (INIS)

    Banaudha, Moni; Varmora, Pankaj; Parghi, Bhadresh; Prasad, Upendra

    2017-01-01

    Quench Detection (QD) system consisting 204 signal channels has been successfully installed and working well during plasma experiment of SST-1 Tokamak. QD system requires testing, validation and maintenance in every SST-1 campaign for better reliability and maintainability of the system. Standalone test of each channel of the system is essential for hard-ware validation. The standard Testing Protocol follow in every campaign which validate each section of QD electronics as well as voltage tap signal cables which are routed inside the cryostat and then extended outside of the SST-1 machine up-to the magnet control room. Fiber link for Quench signal transmission to the SST-1 magnet power supply is also test and validate before every plasma campaign. Precise instrument used as a dummy source of quench signal and for manual quench generation to test the each channel and Master Quench Logic. Each signal Integrated with the magnet DAQ system, signal observed at 1Hz and 50Hz configuration to validate the logging data, compare with actual and previous test data. This paper describes the testing protocol follow in every campaign to validate functionality of QD electronics, limitation of testing, test results and overall integration of the quench detection system for SST-1 magnet. (author)

  9. Analysis of Pedagogic Potential of Electronic Educational Resources with Elements of Autodidactics

    Directory of Open Access Journals (Sweden)

    Igor A.

    2018-03-01

    Full Text Available Introduction: in recent years didactic properties of electronic educational resources undergo considerable changes, nevertheless, the question of studying of such complete phenomenon as “an electronic educational resource with autodidactics elements” remains open, despite sufficient scientific base of researches of the terms making this concept. Article purpose – determination of essence of electronic educational resources with autodidactics elements. Materials and Methods: the main method of research was the theoretical analysis of the pedagogical and psychological literature on the problem under study. We used the theoretical (analysis, synthesis, comparison and generalization methods, the method of interpretation, pedagogical modeling, and empirical methods (observation, testing, conversation, interview, analysis of students’ performance, pedagogical experiment, peer review. Results: we detected the advantages of electronic educational resources in comparison with traditional ones. The concept of autodidactics as applied to the subject of research is considered. Properties of electronic educational resources with a linear and nonlinear principle of construction are studied.The influence of the principle of construction on the development of the learners’ qualities is shown. We formulated an integral definition of electronic educational resources with elements of autodidactics, namely, the variability, adaptivity and cyclicity of training. A model of the teaching-learning process with electronic educational resources is developed. Discussion and Conclusions: further development of a problem will allow to define whether electronic educational resources with autodidactics elements pedagogical potential for realization of educational and self-educational activity of teachers have, to modify technological procedures taking into account age features of students, their specialties and features of the organization of process of training of

  10. Preservation and conservation of electronic information resources of ...

    African Journals Online (AJOL)

    The major holdings of the broadcast libraries of the Nigerian Television Authority (NTA) are electronic information resources; therefore, providing safe places for general management of these resources have aroused interest in the industry in Nigeria for sometimes. The need to study the preservation and conservation of ...

  11. Building an electronic resource collection a practical guide

    CERN Document Server

    Lee, Stuart D

    2004-01-01

    This practical book guides information professionals step-by-step through building and managing an electronic resource collection. It outlines the range of electronic products currently available in abstracting and indexing, bibliographic, and other services and then describes how to effectively select, evaluate and purchase them.

  12. Analysis of Human Resources Management Strategy in China Electronic Commerce Enterprises

    Science.gov (United States)

    Shao, Fang

    The paper discussed electronic-commerce's influence on enterprise human resources management, proposed and proved the human resources management strategy which electronic commerce enterprise should adopt from recruitment strategy to training strategy, keeping talent strategy and other ways.

  13. Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing.

    Science.gov (United States)

    Scarani, Valerio; Renner, Renato

    2008-05-23

    We derive a bound for the security of quantum key distribution with finite resources under one-way postprocessing, based on a definition of security that is composable and has an operational meaning. While our proof relies on the assumption of collective attacks, unconditional security follows immediately for standard protocols such as Bennett-Brassard 1984 and six-states protocol. For single-qubit implementations of such protocols, we find that the secret key rate becomes positive when at least N approximately 10(5) signals are exchanged and processed. For any other discrete-variable protocol, unconditional security can be obtained using the exponential de Finetti theorem, but the additional overhead leads to very pessimistic estimates.

  14. Using XML Technologies to Organize Electronic Reference Resources

    OpenAIRE

    Huser, Vojtech; Del Fiol, Guilherme; Rocha, Roberto A.

    2005-01-01

    Provision of access to reference electronic resources to clinicians is becoming increasingly important. We have created a framework for librarians to manage access to these resources at an enterprise level, rather than at the individual hospital libraries. We describe initial project requirements, implementation details, and some preliminary results.

  15. Electronic Resources and Mission Creep: Reorganizing the Library for the Twenty-First Century

    Science.gov (United States)

    Stachokas, George

    2009-01-01

    The position of electronic resources librarian was created to serve as a specialist in the negotiation of license agreements for electronic resources, but mission creep has added more functions to the routine work of electronic resources such as cataloging, gathering information for collection development, and technical support. As electronic…

  16. Clinical outcomes and mortality before and after implementation of a pediatric sepsis protocol in a limited resource setting: A retrospective cohort study in Bangladesh.

    Directory of Open Access Journals (Sweden)

    Teresa Bleakly Kortz

    Full Text Available Pediatric sepsis has a high mortality rate in limited resource settings. Sepsis protocols have been shown to be a cost-effective strategy to improve morbidity and mortality in a variety of populations and settings. At Dhaka Hospital in Bangladesh, mortality from pediatric sepsis in high-risk children previously approached 60%, which prompted the implementation of an evidenced-based protocol in 2010. The clinical effectiveness of this protocol had not been measured. We hypothesized that implementation of a pediatric sepsis protocol improved clinical outcomes, including reducing mortality and length of hospital stay.This was a retrospective cohort study of children 1-59 months old with a diagnosis of sepsis, severe sepsis or septic shock admitted to Dhaka Hospital from 10/25/2009-10/25/2011. The primary outcome was inpatient mortality pre- and post-protocol implementation. Secondary outcomes included fluid overload, heart failure, respiratory insufficiency, length of hospital stay, and protocol compliance, as measured by antibiotic and fluid bolus administration within 60 minutes of hospital presentation.404 patients were identified by a key-word search of the electronic medical record; 328 patients with a primary diagnosis of sepsis, severe sepsis, or septic shock were included (143 pre- and185 post-protocol in the analysis. Pre- and post-protocol mortality were similar and not statistically significant (32.17% vs. 34.59%, p = 0.72. The adjusted odds ratio (AOR for post-protocol mortality was 1.55 (95% CI, 0.88-2.71. The odds for developing fluid overload were significantly higher post-protocol (AOR 3.45, 95% CI, 2.04-5.85, as were the odds of developing heart failure (AOR 4.52, 95% CI, 1.43-14.29 and having a longer median length of stay (AOR 1.81, 95% CI 1.10-2.96. There was no statistically significant difference in respiratory insufficiency (pre- 65.7% vs. post- 70.3%, p = 0.4 or antibiotic administration between the cohorts (pre- 16.08% vs

  17. Electronic Resources Management System: Recommendation Report 2017

    KAUST Repository

    Ramli, Rindra M.

    2017-01-01

    This recommendation report provides an overview of the selection process for the new Electronic Resources Management System. The library has decided to move away from Innovative Interfaces Millennium ERM module. The library reviewed 3 system

  18. The Internet School of Medicine: use of electronic resources by medical trainees and the reliability of those resources.

    Science.gov (United States)

    Egle, Jonathan P; Smeenge, David M; Kassem, Kamal M; Mittal, Vijay K

    2015-01-01

    Electronic sources of medical information are plentiful, and numerous studies have demonstrated the use of the Internet by patients and the variable reliability of these sources. Studies have investigated neither the use of web-based resources by residents, nor the reliability of the information available on these websites. A web-based survey was distributed to surgical residents in Michigan and third- and fourth-year medical students at an American allopathic and osteopathic medical school and a Caribbean allopathic school regarding their preferred sources of medical information in various situations. A set of 254 queries simulating those faced by medical trainees on rounds, on a written examination, or during patient care was developed. The top 5 electronic resources cited by the trainees were evaluated for their ability to answer these questions accurately, using standard textbooks as the point of reference. The respondents reported a wide variety of overall preferred resources. Most of the 73 responding medical trainees favored textbooks or board review books for prolonged studying, but electronic resources are frequently used for quick studying, clinical decision-making questions, and medication queries. The most commonly used electronic resources were UpToDate, Google, Medscape, Wikipedia, and Epocrates. UpToDate and Epocrates had the highest percentage of correct answers (47%) and Wikipedia had the lowest (26%). Epocrates also had the highest percentage of wrong answers (30%), whereas Google had the lowest percentage (18%). All resources had a significant number of questions that they were unable to answer. Though hardcopy books have not been completely replaced by electronic resources, more than half of medical students and nearly half of residents prefer web-based sources of information. For quick questions and studying, both groups prefer Internet sources. However, the most commonly used electronic resources fail to answer clinical queries more than half

  19. Impacts on health outcomes and on resource utilisation of home-based parenteral chemotherapy administration: a systematic review protocol.

    Science.gov (United States)

    Mittaine-Marzac, Benedicte; De Stampa, Matthieu; Bagaragaza, Emmanuel; Ankri, Joël; Aegerter, Philippe

    2018-05-09

    Despite the demonstrated feasibility and policies to enable more to receive chemotherapy at home, in a few countries, parenteral chemotherapy administration at home remains currently marginal. Of note, findings of different studies on health outcomes and resources utilisation vary, leading to conflicting results. This protocol outlines a systematic review that seeks to synthesise and critically appraise the current state of evidence on the comparison between home setting and hospital setting for parenteral chemotherapy administration within the same high standards of clinical care. This protocol has been prepared following the Preferred Reporting Items for Systematic Reviews and Meta-Analyses Protocols approach. Electronic searches will be conducted on bibliographic databases selected from the earliest available data through 15 November 2017 published in French and English languages. Additional potential papers in the selected studies and grey literature will be also included in the review. The review will include all types of studies exploring patients receiving anticancer drugs for injection at home compared with patients receiving the drugs in a hospital setting, and will assess at least one of the following criteria: patients' health outcomes, patients' or caregivers' satisfaction, resource utilisation with cost savings, and incentives and/or barriers of each admission setting according to patients' and relatives' points of view. Two reviewers will independently screen studies and extract relevant data from the included studies. Methodological quality of studies will be assessed using the 'Quality Assessment Tool for Quantitative Studies' developed by the Effective Public Health Practice Project tool, in addition to the Consolidated Health Economic Evaluation Reporting Standards statement for economic studies. As the review is focused on the analysis of secondary data, it does not require ethics approval. The results of the study will be disseminated through

  20. ANALYTICAL REVIEW OF ELECTRONIC RESOURCES FOR THE STUDY OF LATIN

    Directory of Open Access Journals (Sweden)

    Olena Yu. Balalaieva

    2014-04-01

    Full Text Available The article investigates the current state of development of e-learning content in the Latin language. It is noted that the introduction of ICT in the educational space has expanded the possibility of studying Latin, opened access to digital libraries resources, made it possible to use scientific and educational potential and teaching Latin best practices of world's leading universities. A review of foreign and Ukrainian information resources and electronic editions for the study of Latin is given. Much attention was paid to the didactic potential of local and online multimedia courses of Latin, electronic textbooks, workbooks of interactive tests and exercises, various dictionaries and software translators, databases and digital libraries. Based on analysis of the world market of educational services and products the main trends in the development of information resources and electronic books are examined. It was found that multimedia courses with interactive exercises or workbooks with interactive tests, online dictionaries and translators are the most widely represented and demanded. The noticeable lagging of Ukrainian education and computer linguistics in quantitative and qualitative measures in this industry is established. The obvious drawback of existing Ukrainian resources and electronic editions for the study of Latin is their noninteractive nature. The prospects of e-learning content in Latin in Ukraine are outlined.

  1. Elektronik Bilgi Kaynaklarının Seçimi / Selection of Electronic Information Resources

    Directory of Open Access Journals (Sweden)

    Pınar Al

    2003-04-01

    Full Text Available For many years, library users have used only from the printed media in order to get the information that they have needed. Today with the widespread use of the Web and the addition of electronic information resources to library collections, the use of information in the electronic environment as well as in printed media is started to be used. In time, such types of information resources as, electronic journals, electronic books, electronic encyclopedias, electronic dictionaries and electronic theses have been added to library collections. In this study, selection criteria that can be used for electronic information resources are discussed and suggestions are provided for libraries that try to select electronic information resources for their collections.

  2. Access to electronic resources by visually impaired people

    Directory of Open Access Journals (Sweden)

    Jenny Craven

    2003-01-01

    Full Text Available Research into access to electronic resources by visually impaired people undertaken by the Centre for Research in Library and Information Management has not only explored the accessibility of websites and levels of awareness in providing websites that adhere to design for all principles, but has sought to enhance understanding of information seeking behaviour of blind and visually impaired people when using digital resources.

  3. Library training to promote electronic resource usage

    DEFF Research Database (Denmark)

    Frandsen, Tove Faber; Tibyampansha, Dativa; Ibrahim, Glory

    2017-01-01

    Purpose: Increasing the usage of electronic resources is an issue of concern for many libraries all over the world. Several studies stress the importance of information literacy and instruction in order to increase the usage. Design/methodology/approach: The present article presents the results...

  4. Why and How to Measure the Use of Electronic Resources

    Directory of Open Access Journals (Sweden)

    Jean Bernon

    2008-11-01

    Full Text Available A complete overview of library activity implies a complete and reliable measurement of the use of both electronic resources and printed materials. This measurement is based on three sets of definitions: document types, use types and user types. There is a common model of definitions for printed materials, but a lot of questions and technical issues remain for electronic resources. In 2006 a French national working group studied these questions. It relied on the COUNTER standard, but found it insufficient and pointed out the need for local tools such as web markers and deep analysis of proxy logs. Within the French national consortium COUPERIN, a new working group is testing ERMS, SUSHI standards, Shibboleth authentication, along with COUNTER standards, to improve the counting of the electronic resources use. At this stage this counting is insufficient and its improvement will be a European challenge for the future.

  5. Euler European Libraries and Electronic Resources in Mathematical Sciences

    CERN Document Server

    The Euler Project. Karlsruhe

    The European Libraries and Electronic Resources (EULER) Project in Mathematical Sciences provides the EulerService site for searching out "mathematical resources such as books, pre-prints, web-pages, abstracts, proceedings, serials, technical reports preprints) and NetLab (for Internet resources), this outstanding engine is capable of simple, full, and refined searches. It also offers a browse option, which responds to entries in the author, keyword, and title fields. Further information about the Project is provided at the EULER homepage.

  6. Effects of Electronic Information Resources Skills Training for Lecturers on Pedagogical Practices and Research Productivity

    Science.gov (United States)

    Bhukuvhani, Crispen; Chiparausha, Blessing; Zuvalinyenga, Dorcas

    2012-01-01

    Lecturers use various electronic resources at different frequencies. The university library's information literacy skills workshops and seminars are the main sources of knowledge of accessing electronic resources. The use of electronic resources can be said to have positively affected lecturers' pedagogical practices and their work in general. The…

  7. Shared access protocol (SAP) in femtocell channel resources for cellular coverage enhancement

    KAUST Repository

    Magableh, Amer M.

    2012-12-01

    Femtocells are promising techniques employed in cellular systems to enhance the indoor coverage, especially in areas with high density and high traffic rates. In this paper, we propose an efficient resource utilization protocol, named shared access protocol (SAP), that enables the unlicensed macro-cell user equipments (MC-UE) to communicate with partially closed access femtocell base stations and hence, improves and enhances the overall system performance in closed environments. For the proposed system model, we obtain, in closed-form, the main signal-to-interference plus noise ratio (SINR) characteristics, including the probability density function (PDF) and the cumulative distribution function (CDF). In addition, these expressions are further used to derive several performance metrics in closed-form, such as, the average bit error rate (BER), outage probability, and the average channel capacity for the proposed SAP herein. Furthermore, Monte-carlo simulations as well as numerical results are provided showing a good match that ensures and confirms the correctness of the derived expressions. © 2012 IEEE.

  8. Electronic Commerce Resource Centers. An Industry--University Partnership.

    Science.gov (United States)

    Gulledge, Thomas R.; Sommer, Rainer; Tarimcilar, M. Murat

    1999-01-01

    Electronic Commerce Resource Centers focus on transferring emerging technologies to small businesses through university/industry partnerships. Successful implementation hinges on a strategic operating plan, creation of measurable value for customers, investment in customer-targeted training, and measurement of performance outputs. (SK)

  9. A secure medical data exchange protocol based on cloud environment.

    Science.gov (United States)

    Chen, Chin-Ling; Yang, Tsai-Tung; Shih, Tzay-Farn

    2014-09-01

    In recent years, health care technologies already became matured such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concern issue. In spite of many literatures discussed about medical systems, but these literatures should face many security challenges. The most important issue is patients' privacy. Therefore, we propose a secure medical data exchange protocol based on cloud environment. In our scheme, we use mobile device's characteristics, allowing peoples use medical resources on the cloud environment to seek medical advice conveniently.

  10. Comparing calibration methods of electron beams using plane-parallel chambers with absorbed-dose to water based protocols

    International Nuclear Information System (INIS)

    Stewart, K.J.; Seuntjens, J.P.

    2002-01-01

    Recent absorbed-dose-based protocols allow for two methods of calibrating electron beams using plane-parallel chambers, one using the N D,w Co for a plane-parallel chamber, and the other relying on cross-calibration of the plane-parallel chamber in a high-energy electron beam against a cylindrical chamber which has an N D,w Co factor. The second method is recommended as it avoids problems associated with the P wall correction factors at 60 Co for plane-parallel chambers which are used in the determination of the beam quality conversion factors. In this article we investigate the consistency of these two methods for the PTW Roos, Scanditronics NACP02, and PTW Markus chambers. We processed our data using both the AAPM TG-51 and the IAEA TRS-398 protocols. Wall correction factors in 60 Co beams and absorbed-dose beam quality conversion factors for 20 MeV electrons were derived for these chambers by cross-calibration against a cylindrical ionization chamber. Systematic differences of up to 1.6% were found between our values of P wall and those from the Monte Carlo calculations underlying AAPM TG-51, and up to 0.6% when comparing with the IAEA TRS-398 protocol. The differences in P wall translate directly into differences in the beam quality conversion factors in the respective protocols. The relatively large spread in the experimental data of P wall , and consequently the absorbed-dose beam quality conversion factor, confirms the importance of the cross-calibration technique when using plane-parallel chambers for calibrating clinical electron beams. We confirmed that for well-guarded plane-parallel chambers, the fluence perturbation correction factor at d max is not significantly different from the value at d ref . For the PTW Markus chamber the variation in the latter factor is consistent with published fits relating it to average energy at depth

  11. USE OF ELECTRONIC EDUCATIONAL RESOURCES WHEN TRAINING IN WORK WITH SPREADSHEETS

    Directory of Open Access Journals (Sweden)

    Х А Гербеков

    2017-12-01

    Full Text Available Today the tools for maintaining training courses based on opportunities of information and communication technologies are developed. Practically in all directions of preparation and on all subject matters electronic textbook and self-instruction manuals are created. Nevertheless the industry of computer educational and methodical materials actively develops and gets more and more areas of development and introduction. In this regard more and more urgent is a problem of development of the electronic educational resources adequate to modern educational requirements. Creation and the organization of training courses with use of electronic educational resources in particular on the basis of Internet technologies remains a difficult methodical task.In article the questions connected with development of electronic educational resources for use when studying the substantial line “Information technologies” of a school course of informatics in particular for studying of spreadsheets are considered. Also the analysis of maintenance of a school course and the unified state examination from the point of view of representation of task in him corresponding to the substantial line of studying “Information technologies” on mastering technology of information processing in spreadsheets and the methods of visualization given by means of charts and schedules is carried out.

  12. Analytical Study of Usage of Electronic Information Resources at Pharmacopoeial Libraries in India

    Directory of Open Access Journals (Sweden)

    Sunil Tyagi

    2014-02-01

    Full Text Available The objective of this study is to know the rate and purpose of the use of e-resource by the scientists at pharmacopoeial libraries in India. Among other things, this study examined the preferences of the scientists toward printed books and journals, electronic information resources, and pattern of using e-resources. Non-probability sampling specially accidental and purposive technique was applied in the collection of primary data through administration of user questionnaire. The sample respondents chosen for the study consists of principle scientific officer, senior scientific officer, scientific officer, and scientific assistant of different division of the laboratories, namely, research and development, pharmaceutical chemistry, pharmacovigilance, pharmacology, pharmacogonosy, and microbiology. The findings of the study reveal the personal experiences and perceptions they have had on practice and research activity using e-resource. The major findings indicate that of the total anticipated participants, 78% indicated that they perceived the ability to use computer for electronic information resources. The data analysis shows that all the scientists belonging to the pharmacopoeial libraries used electronic information resources to address issues relating to drug indexes and compendia, monographs, drugs obtained through online databases, e-journals, and the Internet sources—especially polices by regulatory agencies, contacts, drug promotional literature, and standards.

  13. Comparison of dosimetric protocols to beamy of photons and electrons

    Energy Technology Data Exchange (ETDEWEB)

    Anglesio, S; Ragona, R; Cesana, P; Spandonari, T

    1986-01-01

    I+n this work different methods for the calculus of the absorbed dose at different photon and electron energies are utilized and the differences between their yields are evaluated. One of these methods is based on the consideration of the factors Csub(lambda) and Csub(E) (ICRU, HPA, AAPM protocols before 1980); by means of the others (AAPM-Task Group 21, NACP) we seek to obtain a better accuracy introducing new conversion factors. Our measurements were performed using cylindrical and flat ionisation chambers. In the considered energy range we obtained the following results: the new conversion factors have a higher avalue than Csub(lambda) and always smaller than Csub(E).

  14. Page 170 Use of Electronic Resources by Undergraduates in Two ...

    African Journals Online (AJOL)

    undergraduate students use electronic resources such as NUC virtual library, HINARI, ... web pages articles from magazines, encyclopedias, pamphlets and other .... of Nigerian university libraries have Internet connectivity, some of the system.

  15. Model of e-learning with electronic educational resources of new generation

    Directory of Open Access Journals (Sweden)

    A. V. Loban

    2017-01-01

    Full Text Available Purpose of the article: improving of scientific and methodical base of the theory of the е-learning of variability. Methods used: conceptual and logical modeling of the е-learning of variability process with electronic educational resource of new generation and system analysis of the interconnection of the studied subject area, methods, didactics approaches and information and communication technologies means. Results: the formalization complex model of the е-learning of variability with electronic educational resource of new generation is developed, conditionally decomposed into three basic components: the formalization model of the course in the form of the thesaurusclassifier (“Author of e-resource”, the model of learning as management (“Coordination. Consultation. Control”, the learning model with the thesaurus-classifier (“Student”. Model “Author of e-resource” allows the student to achieve completeness, high degree of didactic elaboration and structuring of the studied material in triples of variants: modules of education information, practical task and control tasks; the result of the student’s (author’s of e-resource activity is the thesaurus-classifier. Model of learning as management is based on the principle of personal orientation of learning in computer environment and determines the logic of interaction between the lecturer and the student when determining the triple of variants individually for each student; organization of a dialogue between the lecturer and the student for consulting purposes; personal control of the student’s success (report generation and iterative search for the concept of the class assignment in the thesaurus-classifier before acquiring the required level of training. Model “Student” makes it possible to concretize the learning tasks in relation to the personality of the student and to the training level achieved; the assumption of the lecturer about the level of training of a

  16. A survey of the use of electronic scientific information resources among medical and dental students

    Directory of Open Access Journals (Sweden)

    Aarnio Matti

    2006-05-01

    Full Text Available Abstract Background To evaluate medical and dental students' utilization of electronic information resources. Methods A web survey sent to 837 students (49.9% responded. Results Twenty-four per cent of medical students and ninteen per cent of dental students searched MEDLINE 2+ times/month for study purposes, and thiry-two per cent and twenty-four per cent respectively for research. Full-text articles were used 2+ times/month by thirty-three per cent of medical and ten per cent of dental students. Twelve per cent of respondents never utilized either MEDLINE or full-text articles. In multivariate models, the information-searching skills among students were significantly associated with use of MEDLINE and full-text articles. Conclusion Use of electronic resources differs among students. Forty percent were non-users of full-text articles. Information-searching skills are correlated with the use of electronic resources, but the level of basic PC skills plays not a major role in using these resources. The student data shows that adequate training in information-searching skills will increase the use of electronic information resources.

  17. Access to electronic information resources by students of federal ...

    African Journals Online (AJOL)

    The paper discusses access to electronic information resources by students of Federal Colleges of Education in Eha-Amufu and Umunze. Descriptive survey design was used to investigate sample of 526 students. Sampling technique used was a Multi sampling technique. Data for the study were generated using ...

  18. Adoption and use of electronic information resources by medical ...

    African Journals Online (AJOL)

    This study investigated the adoption and use of electronic information resources by medical science students of the University of Benin. The descriptive survey research design was adopted for the study and 390 students provided the data. Data collected were analysed with descriptive Statistics(Simple percentage and ...

  19. Implementation to spanish protocol of quality control of accelerators to daily control of electron beams

    International Nuclear Information System (INIS)

    Adaimi Hernandez, P.; Ramirez Ros, J. C.; Casa de Julian, M. A. de la; Clemente Gutierrez, F.; Cabello Murillo, E.; Diaz Fuente, R.; Ferrando Sanchez, A.

    2011-01-01

    A revised procedure for daily control of the electron beams to make measurements more meaningful physically, having a better reproducibility and more in line with the recommendations of the Spanish Protocol for Quality Control in Electron Linear Accelerators Clinical Use. The daily quality control beams of high energy electrons that had been done so far was the finding that the record of a series of measures (symmetry, uniformity, stability, energy, beam central dose) were within tolerance values established. The amendment is to check the beam quality by directly measuring changes in absorption depth at which the dose is reduced to half its maximum value, R50.

  20. Where Do Electronic Books Fit in the College Research Arsenal of Resources?

    Science.gov (United States)

    Barbier, Patricia

    2007-01-01

    Student use of electronic books has become an accepted supplement to traditional resources. Student use and satisfaction was monitored through an online course discussion board. Increased use of electronic books indicate this service is an accepted supplement to the print book collection.

  1. [Perspectives of an electronic data processing-controlled anesthesia protocol].

    Science.gov (United States)

    Martens, G; Naujoks, B

    1987-10-01

    There are two ways to introduce electronic data processing in anesthesia recording, which should be combined in the future: (1) computer-aided data collection (during anesthesia) and (2) data analysis. Both procedures have their own advantages and disadvantages. The first step in data collection is a system whereby the on-line registered data are automatically plotted and the discrete data are noted by hand (semi-automatic recording). The second step is to keep the minutes on a display screen instead of on paper, thus producing a protocol in digital form (automatic recording). We discuss the problems of these computer-aided recording systems and future trends, in particular the problems caused by the "human-computer interface" and by uncertainty with respect to the validity of the stored data. For computer-aided data analysis of anesthesia records, one has to select appropriate data in order to build up data bases. This selection is necessary whether the protocol is in analogical or in digital form, and we attempt to develop some general rules, the concrete selection depends, of course, on the aim of the evaluation. As an example we discuss evaluations for administrative purposes. Evaluations for scientific questions are even more affected by the quality of data definitions, and the efforts involved in data management are considerably higher. At the end of this paper we sketch a hybrid information system for computer-aided anesthesia recording that combines data collection and data analysis.

  2. Strategic Planning for Electronic Resources Management: A Case Study at Gustavus Adolphus College

    Science.gov (United States)

    Hulseberg, Anna; Monson, Sarah

    2009-01-01

    Electronic resources, the tools we use to manage them, and the needs and expectations of our users are constantly evolving; at the same time, the roles, responsibilities, and workflow of the library staff who manage e-resources are also in flux. Recognizing a need to be more intentional and proactive about how we manage e-resources, the…

  3. REVIEW OF MOODLE PLUGINS FOR DESIGNING MULTIMEDIA ELECTRONIC EDUCATIONAL RESOURCES FROM LANGUAGE DISCIPLINES

    Directory of Open Access Journals (Sweden)

    Anton M. Avramchuk

    2015-09-01

    Full Text Available Today the problem of designing multimedia electronic educational resources from language disciplines in Moodle is very important. This system has a lot of different, powerful resources, plugins to facilitate the learning of students with language disciplines. This article presents an overview and comparative analysis of the five Moodle plugins for designing multimedia electronic educational resources from language disciplines. There have been considered their key features and functionality in order to choose the best for studying language disciplines in the Moodle. Plugins are compared by a group of experts according to the criteria: efficiency, functionality and easy use. For a comparative analysis of the plugins it is used the analytic hierarchy process.

  4. Modern ICT Tools: Online Electronic Resources Sharing Using Web ...

    African Journals Online (AJOL)

    Modern ICT Tools: Online Electronic Resources Sharing Using Web 2.0 and Its Implications For Library And Information Practice In Nigeria. ... The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader). If you would like more ...

  5. THE MODEL OF LINGUISTIC TEACHERS’ COMPETENCY DEVELOPMENT ON DESIGNING MULTIMEDIA ELECTRONIC EDUCATIONAL RESOURCES IN THE MOODLE SYSTEM

    Directory of Open Access Journals (Sweden)

    Anton M. Avramchuk

    2017-10-01

    Full Text Available The article is devoted to the problem of developing the competency of teachers of language disciplines on designing multimedia electronic educational resources in the Moodle system. The concept of "the competence of teachers of language disciplines on designing multimedia electronic educational resources in the Moodle system" is justified and defined. Identified and characterized the components by which the levels of the competency development of teachers of language disciplines on designing multimedia electronic educational resources in the Moodle system should be assessed. Developed a model for the development of the competency of teachers of language disciplines on designing multimedia electronic educational resources in the Moodle system, which is based on the main scientific approaches, used in adult education, and consists of five blocks: target, informative, technological, diagnostic and effective.

  6. Developing Humanities Collections in the Digital Age: Exploring Humanities Faculty Engagement with Electronic and Print Resources

    Science.gov (United States)

    Kachaluba, Sarah Buck; Brady, Jessica Evans; Critten, Jessica

    2014-01-01

    This article is based on quantitative and qualitative research examining humanities scholars' understandings of the advantages and disadvantages of print versus electronic information resources. It explores how humanities' faculty members at Florida State University (FSU) use print and electronic resources, as well as how they perceive these…

  7. Intercomparison of absorbed dose to water and air-kerma based dosimetry protocols for photon and electron beams

    International Nuclear Information System (INIS)

    Huq, M.S.

    2002-01-01

    Full text: During the last three decades the International Atomic Energy Agency (IAEA), the American Association of Physicists in Medicine (AAPM) and organizations from various countries have published Codes of Practice (CoP) and dosimetry protocols for the calibration of high-energy photon and electron beams. They are based on the air-kerma or exposure calibration factor of an ionization chamber in a 60 Co gamma ray beam and formalism for the determination of absorbed dose to water in reference conditions. In recent years, the IAEA (IAEA TRS-398) and the AAPM (AAPM TG-51) have published new external beam dosimetry protocols that are based on the use of an ionization chamber calibrated in terms of absorbed dose to water in a standards laboratory's reference quality beam. These two new protocols follow those by the German Standard DIN, the British IPSM and the IAEA CoP for plane-parallel chambers, which have discussed and implemented the procedures for the determination of absorbed dose-to-water based on standards of absorbed dose-to-water. Since the publication of these protocols and CoPs, many comparisons, theoretical as well as experimental, between them have been published in the literature providing valuable information about the sources of similarities and discrepancies that exist among them. For example, the differences in the basic data for photon and electron beams included in the various IAEA CoPs are very small for the second edition of TRS-277 for photons, TRS-381 for electrons and TRS-398. In these cases the data changes posed by the adoption of TRS-398 are within about ±0.3% for the most commonly used energies. When implementing TRS-398 in these cases, the main difference will arise from the transition from K air to D w standards. For example, experimental comparison of absorbed doses between TRS-398 and TRS-277 for photons show an average difference of about 0.3% for most commonly used energies with a maximum difference of about 1% at a TPR 20

  8. Electronic resource management systems a workflow approach

    CERN Document Server

    Anderson, Elsa K

    2014-01-01

    To get to the bottom of a successful approach to Electronic Resource Management (ERM), Anderson interviewed staff at 11 institutions about their ERM implementations. Among her conclusions, presented in this issue of Library Technology Reports, is that grasping the intricacies of your workflow-analyzing each step to reveal the gaps and problems-at the beginning is crucial to selecting and implementing an ERM. Whether the system will be used to fill a gap, aggregate critical data, or replace a tedious manual process, the best solution for your library depends on factors such as your current soft

  9. Electronic Resource Management System. Vernetzung von Lizenzinformationen

    Directory of Open Access Journals (Sweden)

    Michaela Selbach

    2014-12-01

    Full Text Available In den letzten zehn Jahren spielen elektronische Ressourcen im Bereich der Erwerbung eine zunehmend wichtige Rolle: Eindeutig lässt sich hier ein Wandel in den Bibliotheken (fort vom reinen Printbestand zu immer größeren E-Only-Beständen feststellen. Die stetig wachsende Menge an E-Ressourcen und deren Heterogenität stellt Bibliotheken vor die Herausforderung, die E-Ressourcen effizient zu verwalten. Nicht nur Bibliotheken, sondern auch verhandlungsführende Institutionen von Konsortial- und Allianzlizenzen benötigen ein geeignetes Instrument zur Verwaltung von Lizenzinformationen, welches den komplexen Anforderungen moderner E-Ressourcen gerecht wird. Die Deutsche Forschungsgemeinschaft (DFG unterstützt ein Projekt des Hochschulbibliothekszentrums des Landes Nordrhein-Westfalen (hbz, der Universitätsbibliothek Freiburg, der Verbundzentrale des Gemeinsamen Bibliotheksverbundes (GBV und der Universitätsbibliothek Frankfurt, in dem ein bundesweit verfügbares Electronic Ressource Managementsystem (ERMS aufgebaut werden soll. Ein solches ERMS soll auf Basis einer zentralen Knowledge Base eine einheitliche Nutzung von Daten zur Lizenzverwaltung elektronischer Ressourcen auf lokaler, regionaler und nationaler Ebene ermöglichen. Statistische Auswertungen, Rechteverwaltung für alle angeschlossenen Bibliotheken, kooperative Datenpflege sowie ein über standardisierte Schnittstellen geführter Datenaustausch stehen bei der Erarbeitung der Anforderungen ebenso im Fokus wie die Entwicklung eines Daten- und Funktionsmodells. In the last few years the importance of electronic resources in library acquisitions has increased significantly. There has been a shift from mere print holdings to both e- and print combinations and even e-only subscriptions. This shift poses a double challenge for libraries: On the one hand they have to provide their e-resource collections to library users in an appealing way, on the other hand they have to manage these

  10. Protocol for the systematic review of the prevention, treatment and public health management of impetigo, scabies and fungal skin infections in resource-limited settings.

    Science.gov (United States)

    May, Philippa; Bowen, Asha; Tong, Steven; Steer, Andrew; Prince, Sam; Andrews, Ross; Currie, Bart; Carapetis, Jonathan

    2016-09-23

    Impetigo, scabies, and fungal skin infections disproportionately affect populations in resource-limited settings. Evidence for standard treatment of skin infections predominantly stem from hospital-based studies in high-income countries. The evidence for treatment in resource-limited settings is less clear, as studies in these populations may lack randomisation and control groups for cultural, ethical or economic reasons. Likewise, a synthesis of the evidence for public health control within endemic populations is also lacking. We propose a systematic review of the evidence for the prevention, treatment and public health management of skin infections in resource-limited settings, to inform the development of guidelines for the standardised and streamlined clinical and public health management of skin infections in endemic populations. The protocol has been designed in line with the Preferred Reporting Items for Systematic Reviews and Meta-Analyses Protocols statement. All trial designs and analytical observational study designs will be eligible for inclusion. A systematic search of the peer-reviewed literature will include PubMed, Excertpa Medica and Global Health. Grey literature databases will also be systematically searched, and clinical trials registries scanned for future relevant studies. The primary outcome of interest will be the clinical cure or decrease in prevalence of impetigo, scabies, crusted scabies, tinea capitis, tinea corporis or tinea unguium. Two independent reviewers will perform eligibility assessment and data extraction using standardised electronic forms. Risk of bias assessment will be undertaken by two independent reviewers according to the Cochrane Risk of Bias tool. Data will be tabulated and narratively synthesised. We expect there will be insufficient data to conduct meta-analysis. The final body of evidence will be reported against the Grades of Recommendation, Assessment, Development and Evaluation grading system. The evidence

  11. The Electron Microscopy Outreach Program: A Web-based resource for research and education.

    Science.gov (United States)

    Sosinsky, G E; Baker, T S; Hand, G; Ellisman, M H

    1999-01-01

    We have developed a centralized World Wide Web (WWW)-based environment that serves as a resource of software tools and expertise for biological electron microscopy. A major focus is molecular electron microscopy, but the site also includes information and links on structural biology at all levels of resolution. This site serves to help integrate or link structural biology techniques in accordance with user needs. The WWW site, called the Electron Microscopy (EM) Outreach Program (URL: http://emoutreach.sdsc.edu), provides scientists with computational and educational tools for their research and edification. In particular, we have set up a centralized resource containing course notes, references, and links to image analysis and three-dimensional reconstruction software for investigators wanting to learn about EM techniques either within or outside of their fields of expertise. Copyright 1999 Academic Press.

  12. Technical Communicator: A New Model for the Electronic Resources Librarian?

    Science.gov (United States)

    Hulseberg, Anna

    2016-01-01

    This article explores whether technical communicator is a useful model for electronic resources (ER) librarians. The fields of ER librarianship and technical communication (TC) originated and continue to develop in relation to evolving technologies. A review of the literature reveals four common themes for ER librarianship and TC. While the…

  13. CLOUD EDUCATIONAL RESOURCES FOR PHYSICS LEARNING RESEARCHES SUPPORT

    Directory of Open Access Journals (Sweden)

    Oleksandr V. Merzlykin

    2015-10-01

    Full Text Available The definition of cloud educational resource is given in paper. Its program and information components are characterized. The virtualization as the technological ground of transforming from traditional electronic educational resources to cloud ones is reviewed. Such levels of virtualization are described: data storage device virtualization (Data as Service, hardware virtualization (Hardware as Service, computer virtualization (Infrastructure as Service, software system virtualization (Platform as Service, «desktop» virtualization (Desktop as Service, software user interface virtualization (Software as Service. Possibilities of designing the cloud educational resources system for physics learning researches support taking into account standards of learning objects metadata (accessing via OAI-PMH protocol and standards of learning tools interoperability (LTI are shown. The example of integration cloud educational resources into Moodle learning management system with use of OAI-PMH and LTI is given.

  14. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  15. MODEL OF AN ELECTRONIC EDUCATIONAL RESOURCE OF NEW GENERATION

    Directory of Open Access Journals (Sweden)

    Anatoliy V. Loban

    2016-01-01

    Full Text Available The mathematical structure of the modular architecture of an electronic educational resource (EER of new generation, which allows to decompose the process of studying the subjects of the course at a hierarchically ordered set of data (knowledge and procedures for manipulating them, to determine the roles of participants of process of training of and technology the development and use of EOR in the study procrate.

  16. Varied Search Protocols Lead to Clinically Relevant Results. A review of: Patel, Manesh R., Connie M. Schardt, Linda L. Sanders, and Sheri A. Keitz. “Randomized Trial for Answers to Clinical Questions: Evaluating a Pre‐Appraised Versus a MEDLINE Search Protocol.” Journal of the Medical Library Association 94.4 (2006: 382‐6.

    Directory of Open Access Journals (Sweden)

    Marcy L. Brown

    2008-03-01

    Full Text Available Objective – To determine the success rate of electronic resources for answering clinical questions by comparing speed, validity, and applicability of two different protocols for searching the medical literature.Design – Randomized trial with results judged by blinded panel.Setting – Duke University Medical Center in Durham, North Carolina, United States ofAmerica.Subjects – Thirty‐two 2nd and 3rd year internal medicine residents on an eight week general medicine rotation at the Duke University Medical Center.Methods – Two search protocols were developed:Protocol A: Participants searched MEDLINE first, and then searched pre‐appraised resources if needed.Protocol B: Participants searched pre‐appraised resources first, which included UpToDate, ACP JournalClub, Cochrane Database of Systematic Reviews, and DARE. The residents then searched MEDLINE if an answer could not be found in the 66 initial group of pre‐appraised resources. Residents were randomised by computer-assisted block order into four blocks of eight residents each. Two blocks were assigned to Protocol A, and two to Protocol B. Each day, residents developed at least one clinical question related to caring for patients. The questions were transcribed onto pocket-sized cards, with the answer sought later using the assigned protocol. If answers weren’t found using either protocol, searches were permitted in other available resources. When an article that answered a question was found, the resident recorded basic information about the question and the answer as well as the time required to find the answer (less than five minutes; between five and ten minutes; or more than ten minutes. Residents were to select answers that were “methodologically sound and clinically important” (384. Ten faculty members formally trained in evidence‐based medicine (EBM reviewed a subset of therapy‐related questions and answers. The reviewers, who were blinded to the search protocols

  17. Clinician‐selected Electronic Information Resources do not Guarantee Accuracy in Answering Primary Care Physicians’ Information Needs. A review of: McKibbon, K. Ann, and Douglas B. Fridsma. “Effectiveness of Clinician‐selected Electronic Information Resources for Answering Primary Care Physicians’ Information Needs.” Journal of the American Medical Informatics Association 13.6 (2006: 653‐9.

    Directory of Open Access Journals (Sweden)

    Martha Ingrid Preddie

    2008-03-01

    Full Text Available Objective – To determine if electronic information resources selected by primary care physicians improve their ability to answer simulated clinical questions.Design – An observational study utilizing hour‐long interviews and think‐aloud protocols.Setting – The offices and clinics of primary care physicians in Canada and the United States.Subjects – Twenty‐five primary care physicians of whom 4 were women, 17 were from Canada, 22 were family physicians,and 24 were board certified.Methods – Participants provided responses to 23 multiple‐choice questions. Each physician then chose two questions and looked for the answers utilizing information resources of their own choice. The search processes, chosen resources and search times were noted. These were analyzed along with data on the accuracy of the answers and certainties related to the answer to each clinical question prior to the search.Main results – Twenty‐three physicians sought answers to 46 simulated clinical questions. Utilizing only electronic information resources, physicians spent a mean of 13.0 (SD 5.5 minutes searching for answers to the questions, an average of 7.3(SD 4.0 minutes for the first question and 5.8 (SD 2.2 minutes to answer the second question. On average, 1.8 resources were utilized per question. Resources that summarized information, such as the Cochrane Database of Systematic Reviews, UpToDate and Clinical Evidence, were favored 39.2% of the time, MEDLINE (Ovid and PubMed 35.7%, and Internet resources including Google 22.6%. Almost 50% of the search and retrieval strategies were keyword‐based, while MeSH, subheadings and limiting were used less frequently. On average, before searching physicians answered 10 of 23 (43.5% questions accurately. For questions that were searched using clinician‐selected electronic resources, 18 (39.1% of the 46 answers were accurate before searching, while 19 (42.1% were accurate after searching. The difference of

  18. Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol

    DEFF Research Database (Denmark)

    Giustolisi, Rosario; Iovino, Vincenzo; Lenzini, Gabriele

    2017-01-01

    We introduce the notion of privacy-preserving verifiability for security protocols. It holds when a protocol admits a verifiability test that does not reveal, to the verifier that runs it, more pieces of information about the protocol’s execution than those required to run the test. Our definition...... of privacy-preserving verifiability is general and applies to cryptographic protocols as well as to human security protocols. In this paper we exemplify it in the domain of e-exams. We prove that the notion is meaningful by studying an existing exam protocol that is verifiable but whose verifiability tests...... are not privacy-preserving. We prove that the notion is applicable: we review the protocol using functional encryption so that it admits a verifiability test that preserves privacy according to our definition. We analyse, in ProVerif, that the verifiability holds despite malicious parties and that the new...

  19. The evaluation of complex clinical trial protocols: resources available to research ethics committees and the use of clinical trial registries--a case study.

    Science.gov (United States)

    Homedes, Núria; Ugalde, Antonio

    2015-06-01

    To assess the potential role of clinical trial (CT) registries and other resources available to research ethics committees (RECs) in the evaluation of complex CT protocols in low-income and middle-income countries. Using a case study approach, the authors examined the decision-making process of a REC in Argentina and its efforts to use available resources to decide on a complex protocol. We also analysed the information in the USA and other CT registries and consulted 24 CT experts in seven countries. Information requested by the Argentinean REC from other national RECs and ethics' experts was not useful to verify the adequacy of the REC's decision whether or not to approve the CT. The responses from the national regulatory agency and the sponsor were not helpful either. The identification of international resources that could assist was beyond the REC's capability. The information in the USA and other CT registries is limited, and at times misleading; and its accuracy is not verified by register keepers. RECs have limited access to experts and institutions that could assist them in their deliberations. Sponsors do not always answer RECs' request for information to properly conduct the ethical and methodological assessment of CT protocols. The usefulness of the CT registries is curtailed by the lack of appropriate codes and by data errors. Information about reasons for rejection, withdrawal or suspension of the trial should be included in the registries. Establishing formal channels of communication among national and foreign RECs and with independent international reference centres could strengthen the ethical review of CT protocols. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  20. GUIDELINES FOR EVALUATION OF PSYCHOLOGICAL AND PEDAGOGICAL QUALITY CHARACTERISTICS OF ELECTRONIC EDUCATIONAL RESOURCES

    Directory of Open Access Journals (Sweden)

    Galina P. Lavrentieva

    2014-05-01

    Full Text Available The article highlights the causes of insufficient effective use of electronic learning resources and sets out the guidelines on ways to solve the aforementioned problems. The set of didactic, methodical, psychological, pedagogical, design and ergonomic quality requirements is considered for evaluation, selection and application of information and communication technologies in the educational process. The most appropriate mechanisms for the ICT introduction into the learning process are disclosed as it should meet the specific learning needs of the student and the objectives of the educational process. The guidance for psycho-educational assessment of quality of electronic educational resources is provided. It is argued that the effectiveness of the ICT use is to be improved by means of quality evaluation mechanisms involved into the educational process.

  1. Improving a mother to child HIV transmission programme through health system redesign: quality improvement, protocol adjustment and resource addition.

    Directory of Open Access Journals (Sweden)

    Michele S Youngleson

    2010-11-01

    Full Text Available Health systems that deliver prevention of mother to child transmission (PMTCT services in low and middle income countries continue to underperform, resulting in thousands of unnecessary HIV infections of newborns each year. We used a combination of approaches to health systems strengthening to reduce transmission of HIV from mother to infant in a multi-facility public health system in South Africa.All primary care sites and specialized birthing centers in a resource constrained sub-district of Cape Metro District, South Africa, were enrolled in a quality improvement (QI programme. All pregnant women receiving antenatal, intrapartum and postnatal infant care in the sub-district between January 2006 and March 2009 were included in the intervention that had a prototype-innovation phase and a rapid spread phase. System changes were introduced to help frontline healthcare workers to identify and improve performance gaps at each step of the PMTCT pathway. Improvement was facilitated and spread through the use of a Breakthrough Series Collaborative that accelerated learning and the spread of successful changes. Protocol changes and additional resources were introduced by provincial and municipal government. The proportion of HIV-exposed infants testing positive declined from 7.6% to 5%. Key intermediate PMTCT processes improved (antenatal AZT increased from 74% to 86%, PMTCT clients on HAART at the time of labour increased from 10% to 25%, intrapartum AZT increased from 43% to 84%, and postnatal HIV testing from 79% to 95% compared to baseline.System improvement methods, protocol changes and addition/reallocation of resources contributed to improved PMTCT processes and outcomes in a resource constrained setting. The intervention requires a clear design, leadership buy-in, building local capacity to use systems improvement methods, and a reliable data system. A systems improvement approach offers a much needed approach to rapidly improve under

  2. Availability, Use and Constraints to Use of Electronic Information Resources by Postgraduates Students at the University of Ibadan

    Directory of Open Access Journals (Sweden)

    Dare Samuel Adeleke

    2017-12-01

    Full Text Available Availability, awareness and use of electronic resources provide access to authoritative, reliable, accurate and timely access to information. The use of electronic information resources (EIRs can enable innovation in teaching and increase timeliness in research of postgraduate students which will eventual result into encouragement of the expected research-led enquiry in this digital age. The study adopted a descriptive survey design. Samples of 300 of postgraduate students within seven out 13 Faculties were randomly selected. Data were collected using questionnaire designed to elicit response from respondents and data were analyzed using descriptive statistics methods percentages, mean, and standard deviation. Results indicated that internet was ranked most available and used in the university. Low level of usage of electronic resources, in particular, full texts data bases is linked to a number of constraints: Interrupted power supply was ranked highest among other factors as speed and capacity of computers, retrieval of records with high recall and low precision, retrieving records relevant to information need, lack of knowledge of search techniques to retrieve information effectively, non possession of requisite IT skills and problems accessing the internet. The study recommended that usage of electronic resources be made compulsory, intensifying awareness campaigns concerning the availability, training on use of electronic resources and the problem of power outage be addressed.

  3. A Study on Developing Evaluation Criteria for Electronic Resources in Evaluation Indicators of Libraries

    Science.gov (United States)

    Noh, Younghee

    2010-01-01

    This study aimed to improve the current state of electronic resource evaluation in libraries. While the use of Web DB, e-book, e-journal, and other e-resources such as CD-ROM, DVD, and micro materials is increasing in libraries, their use is not comprehensively factored into the general evaluation of libraries and may diminish the reliability of…

  4. Three-dimensional structure determination protocol for noncrystalline biomolecules using x-ray free-electron laser diffraction imaging.

    Science.gov (United States)

    Oroguchi, Tomotaka; Nakasako, Masayoshi

    2013-02-01

    Coherent and intense x-ray pulses generated by x-ray free-electron laser (XFEL) sources are paving the way for structural determination of noncrystalline biomolecules. However, due to the small scattering cross section of electrons for x rays, the available incident x-ray intensity of XFEL sources, which is currently in the range of 10(12)-10(13) photons/μm(2)/pulse, is lower than that necessary to perform single-molecule diffraction experiments for noncrystalline biomolecules even with the molecular masses of megadalton and submicrometer dimensions. Here, we propose an experimental protocol and analysis method for visualizing the structure of those biomolecules by the combined application of coherent x-ray diffraction imaging and three-dimensional reconstruction methods. To compensate the small scattering cross section of biomolecules, in our protocol, a thin vitreous ice plate containing several hundred biomolecules/μm(2) is used as sample, a setup similar to that utilized by single-molecule cryoelectron microscopy. The scattering cross section of such an ice plate is far larger than that of a single particle. The images of biomolecules contained within irradiated areas are then retrieved from each diffraction pattern, and finally provide the three-dimensional electron density model. A realistic atomic simulation using large-scale computations proposed that the three-dimensional structure determination of the 50S ribosomal subunit embedded in a vitreous ice plate is possible at a resolution of 0.8 nm when an x-ray beam of 10(16) photons/500×500 nm(2)/pulse is available.

  5. THE MODEL OF LINGUISTIC TEACHERS’ COMPETENCY DEVELOPMENT ON DESIGNING MULTIMEDIA ELECTRONIC EDUCATIONAL RESOURCES IN THE MOODLE SYSTEM

    OpenAIRE

    Anton M. Avramchuk

    2017-01-01

    The article is devoted to the problem of developing the competency of teachers of language disciplines on designing multimedia electronic educational resources in the Moodle system. The concept of "the competence of teachers of language disciplines on designing multimedia electronic educational resources in the Moodle system" is justified and defined. Identified and characterized the components by which the levels of the competency development of teachers of language disciplines on designing ...

  6. Determining the level of awareness of the physicians in using the variety of electronic information resources and the effecting factors.

    Science.gov (United States)

    Papi, Ahmad; Ghazavi, Roghayeh; Moradi, Salimeh

    2015-01-01

    Understanding of the medical society's from the types of information resources for quick and easy access to information is an imperative task in medical researches and management of the treatment. The present study was aimed to determine the level of awareness of the physicians in using various electronic information resources and the factors affecting it. This study was a descriptive survey. The data collection tool was a researcher-made questionnaire. The study population included all the physicians and specialty physicians of the teaching hospitals affiliated to Isfahan University of Medical Sciences and numbered 350. The sample size based on Morgan's formula was set at 180. The content validity of the tool was confirmed by the library and information professionals and the reliability was 95%. Descriptive statistics were used including the SPSS software version 19. On reviewing the need of the physicians to obtain the information on several occasions, the need for information in conducting the researches was reported by the maximum number of physicians (91.9%) and the usage of information resources, especially the electronic resources, formed 65.4% as the highest rate with regard to meeting the information needs of the physicians. Among the electronic information databases, the maximum awareness was related to Medline with 86.5%. Among the various electronic information resources, the highest awareness (43.3%) was related to the E-journals. The highest usage (36%) was also from the same source. The studied physicians considered the most effective deterrent in the use of electronic information resources as being too busy and lack of time. Despite the importance of electronic information resources for the physician's community, there was no comprehensive knowledge of these resources. This can lead to less usage of these resources. Therefore, careful planning is necessary in the hospital libraries in order to introduce the facilities and full capabilities of the

  7. Protocol for the quality control systems of electronic portal imaging used in verification of radiotherapy treatment

    International Nuclear Information System (INIS)

    Silvestre, Ileana; Alfonso, Rodolfo; Garcia, Fernando

    2009-01-01

    Following the approach of quality control of radiotherapy equipment, conceived in the IAEA TECDOC-1151, we analyzed the different tests must be to an EPID to guarantee levels of accuracy required in the administration of radiation treatments, including the study of the impact of different parameters, geometric and dosimetric imaging, involved in the process. Established the types and frequency of checks, as well as procedures for their implementation, the allowable tolerances set of values records and forms for recording . Was carried out assessment protocol in various services based on amorphous silicon EPID for its applicability and scope. Was designed and validated in clinical practice protocol for EPID quality control, demonstrating its applicability with a minimum of material and human resources. It We concluded that with proper and systematic quality control program, tests including dosimetry, the EPID can provide valuable information about physico-beam dosimetry, and ensure adequate accuracy geometric in the patient's location. (author)

  8. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks.

    Science.gov (United States)

    Song, Caixia; Tan, Guozhen; Yu, Chao

    2017-10-09

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment) applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS) support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access) have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC) protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications.

  9. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Caixia Song

    2017-10-01

    Full Text Available Vehicular Ad Hoc Networks (VANETs employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications.

  10. Managing Selection for Electronic Resources: Kent State University Develops a New System to Automate Selection

    Science.gov (United States)

    Downey, Kay

    2012-01-01

    Kent State University has developed a centralized system that manages the communication and work related to the review and selection of commercially available electronic resources. It is an automated system that tracks the review process, provides selectors with price and trial information, and compiles reviewers' feedback about the resource. It…

  11. End-of-life resource recovery from emerging electronic products

    DEFF Research Database (Denmark)

    Parajuly, Keshav; Habib, Komal; Cimpan, Ciprian

    2016-01-01

    Integrating product design with appropriate end-of-life (EoL) processing is widely recognized to have huge potentials in improving resource recovery from electronic products. In this study, we investigate both the product characteristics and EoL processing of robotic vacuum cleaner (RVC), as a case...... of emerging electronic product, in order to understand the recovery fate of different materials and its linkage to product design. Ten different brands of RVC were dismantled and their material composition and design profiles were studied. Another 125 RVCs (349 kg) were used for an experimental trial...... at a conventional ‘shred-and-separate’ type preprocessing plant in Denmark. A detailed material flow analysis was performed throughout the recycling chain. The results show a mismatch between product design and EoL processing, and the lack of practical implementation of ‘Design for EoL’ thinking. In the best...

  12. Use of electronic sales data to tailor nutrition education resources for an ethnically diverse population.

    Science.gov (United States)

    Eyles, H; Rodgers, A; Ni Mhurchu, C

    2010-02-01

    Nutrition education may be most effective when personally tailored. Individualised electronic supermarket sales data offer opportunities to tailor nutrition education using shopper's usual food purchases. The present study aimed to use individualised electronic supermarket sales data to tailor nutrition resources for an ethnically diverse population in a large supermarket intervention trial in New Zealand. Culturally appropriate nutrition education resources (i.e. messages and shopping lists) were developed with the target population (through two sets of focus groups) and ethnic researchers. A nutrient database of supermarket products was developed using retrospective sales data and linked to participant sales to allow tailoring by usual food purchases. Modified Heart Foundation Tick criteria were used to identify 'healthier' products in the database suitable for promotion in the resources. Rules were developed to create a monthly report listing the tailored and culturally targeted messages to be sent to each participant, and to produce automated, tailored shopping lists. Culturally targeted nutrition messages (n = 864) and shopping lists (n = 3 formats) were developed. The food and nutrient database (n = 3000 top-selling products) was created using 12 months of retrospective sales data, and comprised 60%'healthier' products. Three months of baseline sales data were used to determine usual food purchases. Tailored resources were successfully mailed to 123 Māori, 52 Pacific and 346 non-Māori non-Pacific participants over the 6-month trial intervention period. Electronic supermarket sales data can be used to tailor nutrition education resources for a large number of ethnically diverse supermarket shoppers.

  13. The Nagoya Protocol: Fragmentation or Consolidation?

    Directory of Open Access Journals (Sweden)

    Carmen Richerzhagen

    2014-02-01

    Full Text Available In October, 2010, a protocol on access and benefit-sharing (ABS of genetic resources was adopted, the so-called Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity. Before the adoption of the Nagoya Protocol, the governance architecture of ABS was already characterized by a multifaceted institutional environment. The use of genetic resources is confronted with many issues (conservation, research and development, intellectual property rights, food security, health issues, climate change that are governed by different institutions and agreements. The Nagoya Protocol contributes to increased fragmentation. However, the question arises whether this new regulatory framework can help to advance the implementation of the ABS provisions of the Convention on Biological Diversity (CBD. This paper attempts to find an answer to that question by following three analytical steps. First, it analyzes the causes of change against the background of theories of institutional change. Second, it aims to assess the typology of the architecture in order to find out if this new set of rules will contribute to a more synergistic, cooperative or conflictive architecture of ABS governance. Third, the paper looks at the problem of “fit” and identifies criteria that can be used to assess the new ABS governance architecture with regard to its effectiveness.

  14. Efficient electronic entanglement concentration assisted by single mobile electrons

    International Nuclear Information System (INIS)

    Sheng Yu-Bo; Zhou Lan

    2013-01-01

    We present an efficient entanglement concentration protocol (ECP) for mobile electrons with charge detection. This protocol is quite different from other ECPs for one can obtain a maximally entangled pair from a pair of less-entangled state and a single mobile electron with a certain probability. With the help of charge detection, it can be repeated to reach a higher success probability. It also does not need to know the coefficient of the original less-entangled states. All these advantages may make this protocol useful in current distributed quantum information processing

  15. Availability, Level of Use and Constraints to Use of Electronic Resources by Law Lecturers in Public Universities in Nigeria

    Science.gov (United States)

    Amusa, Oyintola Isiaka; Atinmo, Morayo

    2016-01-01

    (Purpose) This study surveyed the level of availability, use and constraints to use of electronic resources among law lecturers in Nigeria. (Methodology) Five hundred and fifty-two law lecturers were surveyed and four hundred and forty-two responded. (Results) Data analysis revealed that the level of availability of electronic resources for the…

  16. A Survey of MAC Protocols for Cognitive Radio Body Area Networks.

    Science.gov (United States)

    Bhandari, Sabin; Moh, Sangman

    2015-04-20

    The advancement in electronics, wireless communications and integrated circuits has enabled the development of small low-power sensors and actuators that can be placed on, in or around the human body. A wireless body area network (WBAN) can be effectively used to deliver the sensory data to a central server, where it can be monitored, stored and analyzed. For more than a decade, cognitive radio (CR) technology has been widely adopted in wireless networks, as it utilizes the available spectra of licensed, as well as unlicensed bands. A cognitive radio body area network (CRBAN) is a CR-enabled WBAN. Unlike other wireless networks, CRBANs have specific requirements, such as being able to automatically sense their environments and to utilize unused, licensed spectra without interfering with licensed users, but existing protocols cannot fulfill them. In particular, the medium access control (MAC) layer plays a key role in cognitive radio functions, such as channel sensing, resource allocation, spectrum mobility and spectrum sharing. To address various application-specific requirements in CRBANs, several MAC protocols have been proposed in the literature. In this paper, we survey MAC protocols for CRBANs. We then compare the different MAC protocols with one another and discuss challenging open issues in the relevant research.

  17. A systematic review of portable electronic technology for health education in resource-limited settings.

    Science.gov (United States)

    McHenry, Megan S; Fischer, Lydia J; Chun, Yeona; Vreeman, Rachel C

    2017-08-01

    The objective of this study is to conduct a systematic review of the literature of how portable electronic technologies with offline functionality are perceived and used to provide health education in resource-limited settings. Three reviewers evaluated articles and performed a bibliography search to identify studies describing health education delivered by portable electronic device with offline functionality in low- or middle-income countries. Data extracted included: study population; study design and type of analysis; type of technology used; method of use; setting of technology use; impact on caregivers, patients, or overall health outcomes; and reported limitations. Searches yielded 5514 unique titles. Out of 75 critically reviewed full-text articles, 10 met inclusion criteria. Study locations included Botswana, Peru, Kenya, Thailand, Nigeria, India, Ghana, and Tanzania. Topics addressed included: development of healthcare worker training modules, clinical decision support tools, patient education tools, perceptions and usability of portable electronic technology, and comparisons of technologies and/or mobile applications. Studies primarily looked at the assessment of developed educational modules on trainee health knowledge, perceptions and usability of technology, and comparisons of technologies. Overall, studies reported positive results for portable electronic device-based health education, frequently reporting increased provider/patient knowledge, improved patient outcomes in both quality of care and management, increased provider comfort level with technology, and an environment characterized by increased levels of technology-based, informal learning situations. Negative assessments included high investment costs, lack of technical support, and fear of device theft. While the research is limited, portable electronic educational resources present promising avenues to increase access to effective health education in resource-limited settings, contingent

  18. SAGES: a suite of freely-available software tools for electronic disease surveillance in resource-limited settings.

    Directory of Open Access Journals (Sweden)

    Sheri L Lewis

    Full Text Available Public health surveillance is undergoing a revolution driven by advances in the field of information technology. Many countries have experienced vast improvements in the collection, ingestion, analysis, visualization, and dissemination of public health data. Resource-limited countries have lagged behind due to challenges in information technology infrastructure, public health resources, and the costs of proprietary software. The Suite for Automated Global Electronic bioSurveillance (SAGES is a collection of modular, flexible, freely-available software tools for electronic disease surveillance in resource-limited settings. One or more SAGES tools may be used in concert with existing surveillance applications or the SAGES tools may be used en masse for an end-to-end biosurveillance capability. This flexibility allows for the development of an inexpensive, customized, and sustainable disease surveillance system. The ability to rapidly assess anomalous disease activity may lead to more efficient use of limited resources and better compliance with World Health Organization International Health Regulations.

  19. Use and Cost of Electronic Resources in Central Library of Ferdowsi University Based on E-metrics

    Directory of Open Access Journals (Sweden)

    Mohammad Reza Davarpanah

    2012-07-01

    Full Text Available The purpose of this study was to investigate the usage of electronic journals in Ferdowsi University, Iran based on e-metrics. The paper also aimed to emphasize the analysis of cost-benefit and the correlation between the journal impact factors and the usage data. In this study experiences of Ferdowsi University library on licensing and usage of electronic resources was evaluated by providing a cost-benefit analysis based on the cost and usage statistics of electronic resources. Vendor-provided data were also compared with local usage data. The usage data were collected by tracking web-based access locally, and by collecting vender-provided usage data. The data sources were one-year of vendor-supplied e-resource usage data such as Ebsco, Elsevier, Proquest, Emerald, Oxford and Springer and local usage data collected from the Ferdowsi university web server. The study found that actual usage values differ for vendor-provided data and local usage data. Elsevier has got the highest usage degree in searches, sessions and downloads. Statistics also showed that a small number of journals satisfy significant amount of use while the majority of journals were used less frequent and some were never used at all. The users preferred the PDF rather than HTML format. The data in subject profile suggested that the provided e-resources were best suited to certain subjects. There was no correlation between IF and electronic journal use. Monitoring the usage of e-resources gained increasing importance for acquisition policy and budget decisions. The article provided information about local metrics for the six surveyed vendors/publishers, e.g. usage trends, requests per package, cost per use as related to the scientific specialty of the university.

  20. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  1. Building and Managing Electronic Resources in Digital Era in India with Special Reference to IUCAA and NIV, Pune: A Comparative Case Study

    Science.gov (United States)

    Sahu, H. K.; Singh, S. N.

    2015-04-01

    This paper discusses and presents a comparative case study of two libraries in Pune, India, Inter-University Centre for Astronomy and Astrophysics and Information Centre and Library of National Institute of Virology (Indian Council of Medical Research). It compares how both libraries have managed their e-resource collections, including acquisitions, subscriptions, and consortia arrangements, while also developing a collection of their own resources, including pre-prints and publications, video lectures, and other materials in an institutional repository. This study illustrates how difficult it is to manage electronic resources in a developing country like India, even though electronic resources are used more than print resources. Electronic resource management can be daunting, but with a systematic approach, various problems can be solved, and use of the materials will be enhanced.

  2. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  3. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  4. PERFORMANCE ANALYSIS OF DISTINCT SECURED AUTHENTICATION PROTOCOLS USED IN THE RESOURCE CONSTRAINED PLATFORM

    Directory of Open Access Journals (Sweden)

    S. Prasanna

    2014-03-01

    Full Text Available Most of the e-commerce and m-commerce applications in the current e-business world, has adopted asymmetric key cryptography technique in their authentication protocol to provide an efficient authentication of the involved parties. This paper exhibits the performance analysis of distinct authentication protocol which implements the public key cryptography like RSA, ECC and HECC. The comparison is made based on key generation, sign generation and sign verification processes. The results prove that the performance achieved through HECC based authentication protocol is better than the ECC- and RSA based authentication protocols.

  5. A Fair Cooperative MAC Protocol in IEEE 802.11 WLAN

    Directory of Open Access Journals (Sweden)

    Seyed Davoud Mousavi

    2018-05-01

    Full Text Available Cooperative communication techniques have recently enabled wireless technologies to overcome their challenges. The main objective of these techniques is to improve resource allocation. In this paper, we propose a new protocol in medium access control (MAC of the IEEE 802.11 standard. In our new protocol, which is called Fair Cooperative MAC (FC-MAC, every relay node participates in cooperation proportionally to its provided cooperation gain. This technique improves network resource allocation by exploiting the potential capacity of all relay candidates. Simulation results demonstrate that the FC-MAC protocol presents better performance in terms of throughput, fairness, and network lifetime.

  6. How to Improve the Accessibility and Reduce the Total Cost of Ownership with Ecolig Protocol and Android in Mobile Learning

    Directory of Open Access Journals (Sweden)

    Samira Muhammad Ismail

    2011-10-01

    Full Text Available A new electronic learning device generation can be created from a new paradigm in human sense and efferent resources. The brain computer interfaces (BCI with ECOLIG protocol can be used to get the advantages from “Near To Eye” and “Augmented Reality” technologies. In this way, this paper describes the results from an experiment using a mobile phone emulator system, a BCI and ECOLIG protocol to demonstrate the benefits in eliminating the use of touch screen and keyboards features. Finally, it concludes that ECOLIG can be a long life time communication technology between Human and Machines especially in a Singularity world.

  7. [Use of internet and electronic resources among Spanish intensivist physicians. First national survey].

    Science.gov (United States)

    Gómez-Tello, V; Latour-Pérez, J; Añón Elizalde, J M; Palencia-Herrejón, E; Díaz-Alersi, R; De Lucas-García, N

    2006-01-01

    Estimate knowledge and use habits of different electronic resources in a sample of Spanish intensivists: Internet, E-mail, distribution lists, and use of portable electronic devices. Self-applied questionnaire. A 50-question questionnaire was distributed among Spanish intensivists through the hospital marketing delegates of a pharmaceutical company and of electronic forums. A total of 682 questionnaires were analyzed (participation: 74%). Ninety six percent of those surveyed used Internet individually: 67% admitted training gap. Internet was the second source of clinical consultations most used (61%), slightly behind consultation to colleagues (65%). The pages consulted most were bibliographic databases (65%) and electronic professional journals (63%), with limited use of Evidence Based Medicine pages (19%). Ninety percent of those surveyed used e-mail regularly in the practice of their profession, although 25% admitted that were not aware of its possibilities. The use of E-mail decreased significantly with increase in age. A total of 62% of the intensivists used distribution lists. Of the rest, 42% were not aware of its existence and 32% admitted they had insufficient training to handle them. Twenty percent of those surveyed had portable electronic devices and 64% considered it useful, basically due to its rapid consultation at bedside. Female gender was a negative predictive factor of its use (OR 0.35; 95% CI 0.2-0.63; p=0.0002). A large majority of the Spanish intensivists use Internet and E-mail. E-mail lists and use of portable devices are still underused resources. There are important gaps in training and infrequent use of essential pages. There are specific groups that require directed educational policies.

  8. Model of e-learning with electronic educational resources of new generation

    OpenAIRE

    A. V. Loban; D. A. Lovtsov

    2017-01-01

    Purpose of the article: improving of scientific and methodical base of the theory of the е-learning of variability. Methods used: conceptual and logical modeling of the е-learning of variability process with electronic educational resource of new generation and system analysis of the interconnection of the studied subject area, methods, didactics approaches and information and communication technologies means. Results: the formalization complex model of the е-learning of variability with elec...

  9. Impact of Knowledge Resources Linked to an Electronic Health Record on Frequency of Unnecessary Tests and Treatments

    Science.gov (United States)

    Goodman, Kenneth; Grad, Roland; Pluye, Pierre; Nowacki, Amy; Hickner, John

    2012-01-01

    Introduction: Electronic knowledge resources have the potential to rapidly provide answers to clinicians' questions. We sought to determine clinicians' reasons for searching these resources, the rate of finding relevant information, and the perceived clinical impact of the information they retrieved. Methods: We asked general internists, family…

  10. Electronic Document Management: A Human Resource Management Case Study

    Directory of Open Access Journals (Sweden)

    Thomas Groenewald

    2004-11-01

    Full Text Available This case study serve as exemplar regarding what can go wrong with the implementation of an electronic document management system. Knowledge agility and knowledge as capital, is outlined against the backdrop of the information society and knowledge economy. The importance of electronic document management and control is sketched thereafter. The literature review is concluded with the impact of human resource management on knowledge agility, which includes references to the learning organisation and complexity theory. The intervention methodology, comprising three phases, follows next. The results of the three phases are presented thereafter. Partial success has been achieved with improving the human efficacy of electronic document management, however the client opted to discontinue the system in use. Opsomming Die gevalle studie dien as voorbeeld van wat kan verkeerd loop met die implementering van ’n elektroniese dokumentbestuur sisteem. Teen die agtergrond van die inligtingsgemeenskap en kennishuishouding word kennissoepelheid en kennis as kapitaal bespreek. Die literatuurstudie word afgesluit met die inpak van menslikehulpbronbestuur op kennissoepelheid, wat ook die verwysings na die leerorganisasie en kompleksietydsteorie insluit. Die metodologie van die intervensie, wat uit drie fases bestaan, volg daarna. Die resultate van die drie fases word vervolgens aangebied. Slegs gedeelte welslae is behaal met die verbetering van die menslike doeltreffendheid ten opsigte van elektroniese dokumentbestuur. Die klient besluit egter om nie voort te gaan om die huidige sisteem te gebruik nie.

  11. A Lightweight Protocol for Secure Video Streaming.

    Science.gov (United States)

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  12. Challenges in the implementation of an electronic surveillance system in a resource-limited setting: Alerta, in Peru

    Directory of Open Access Journals (Sweden)

    Soto Giselle

    2008-11-01

    Full Text Available Abstract Background Infectious disease surveillance is a primary public health function in resource-limited settings. In 2003, an electronic disease surveillance system (Alerta was established in the Peruvian Navy with support from the U.S. Naval Medical Research Center Detachment (NMRCD. Many challenges arose during the implementation process, and a variety of solutions were applied. The purpose of this paper is to identify and discuss these issues. Methods This is a retrospective description of the Alerta implementation. After a thoughtful evaluation according to the Centers for Disease Control and Prevention (CDC guidelines, the main challenges to implementation were identified and solutions were devised in the context of a resource-limited setting, Peru. Results After four years of operation, we have identified a number of challenges in implementing and operating this electronic disease surveillance system. These can be divided into the following categories: (1 issues with personnel and stakeholders; (2 issues with resources in a developing setting; (3 issues with processes involved in the collection of data and operation of the system; and (4 issues with organization at the central hub. Some of the challenges are unique to resource-limited settings, but many are applicable for any surveillance system. For each of these challenges, we developed feasible solutions that are discussed. Conclusion There are many challenges to overcome when implementing an electronic disease surveillance system, not only related to technology issues. A comprehensive approach is required for success, including: technical support, personnel management, effective training, and cultural sensitivity in order to assure the effective deployment of an electronic disease surveillance system.

  13. Data aggregation in wireless sensor networks using the SOAP protocol

    International Nuclear Information System (INIS)

    Al-Yasiri, A; Sunley, A

    2007-01-01

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks

  14. Data aggregation in wireless sensor networks using the SOAP protocol

    Energy Technology Data Exchange (ETDEWEB)

    Al-Yasiri, A; Sunley, A [School of Computing, Science and Engineering, University of Salford, Greater Manchester, M5 4WT (United Kingdom)

    2007-07-15

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks.

  15. Resource Management in Diffserv On DemAnd (RODA) PHR

    NARCIS (Netherlands)

    Westberg, L.; Jacobsson, M.; de Kogel, M.; Oosthoek, S.; Partain, D.; Rexhepi, V.; Wallentin, P.; Karagiannis, Georgios

    The purpose of this draft is to present the Resource Management in Diffserv (RMD) On DemAnd (RODA) Per Hop Reservation (PHR) protocol. The RODA PHR protocol is used on a per-hop basis in a Differentiated Services (Diffserv) domain and extends the Diffserv Per Hop Behavior (PHB) with resource

  16. Considering Point-of-Care Electronic Medical Resources in Lieu of Traditional Textbooks for Medical Education.

    Science.gov (United States)

    Hale, LaDonna S; Wallace, Michelle M; Adams, Courtney R; Kaufman, Michelle L; Snyder, Courtney L

    2015-09-01

    Selecting resources to support didactic courses is a critical decision, and the advantages and disadvantages must be carefully considered. During clinical rotations, students not only need to possess strong background knowledge but also are expected to be proficient with the same evidence-based POC resources used by clinicians. Students place high value on “real world” learning and therefore may place more value on POC resources that they know practicing clinicians use as compared with medical textbooks. The condensed nature of PA education requires students to develop background knowledge and information literacy skills over a short period. One way to build that knowledge and those skills simultaneously is to use POC resources in lieu of traditional medical textbooks during didactic training. Electronic POC resources offer several advantages over traditional textbooks and should be considered as viable options in PA education.

  17. Implementation to spanish protocol of quality control of accelerators to daily control of electron beams; Implementacion del protocolo espanol de control de calidad de aceleradores al control diario de haces de electrones

    Energy Technology Data Exchange (ETDEWEB)

    Adaimi Hernandez, P.; Ramirez Ros, J. C.; Casa de Julian, M. A. de la; Clemente Gutierrez, F.; Cabello Murillo, E.; Diaz Fuente, R.; Ferrando Sanchez, A.

    2011-07-01

    A revised procedure for daily control of the electron beams to make measurements more meaningful physically, having a better reproducibility and more in line with the recommendations of the Spanish Protocol for Quality Control in Electron Linear Accelerators Clinical Use. The daily quality control beams of high energy electrons that had been done so far was the finding that the record of a series of measures (symmetry, uniformity, stability, energy, beam central dose) were within tolerance values established. The amendment is to check the beam quality by directly measuring changes in absorption depth at which the dose is reduced to half its maximum value, R50.

  18. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  19. Resource conservation approached with an appropriate collection and upgrade-remanufacturing for used electronic products.

    Science.gov (United States)

    Zlamparet, Gabriel I; Tan, Quanyin; Stevels, A B; Li, Jinhui

    2018-03-01

    This comparative research represents an example for a better conservation of resources by reducing the amount of waste (kg) and providing it more value under the umbrella of remanufacturing. The three discussed cases will expose three issues already addressed separately in the literature. The generation of waste electrical and electronic equipment (WEEE) interacts with the environmental depletion. In this article, we gave the examples of addressed issues under the concept of remanufacturing. Online collection opportunity eliminating classical collection, a business to business (B2B) implementation for remanufactured servers and medical devices. The material reuse (recycling), component sustainability, reuse (part harvesting), product reuse (after repair/remanufacturing) indicates the recovery potential using remanufacturing tool for a better conservation of resources adding more value to the products. Our findings can provide an overview of new system organization for the general collection, market potential and the technological advantages using remanufacturing instead of recycling of WEEE or used electrical and electronic equipment. Copyright © 2017. Published by Elsevier Ltd.

  20. Effects of the Use of Electronic Human Resource Management (EHRM Within Human Resource Management (HRM Functions at Universities

    Directory of Open Access Journals (Sweden)

    Chux Gervase Iwu

    2016-09-01

    Full Text Available This study set out to examine the effect of e-hrm systems in assisting human resource practitioners to execute their duties and responsibilities. In comparison to developed economies of the world, information technology adoption in sub-Saharan Africa has not been without certain glitches. Some of the factors that are responsible for these include poor need identification, sustainable funding, and insufficient skills. Besides these factors, there is also the issue of change management and users sticking to what they already know. Although, the above factors seem negative, there is strong evidence that information systems such as electronic human resource management present benefits to an organization. To achieve this, a dual research approach was utilized. Literature assisted immensely in both the development of the conceptual framework upon which the study hinged as well as in the development of the questionnaire items. The study also made use of an interview checklist to guide the participants. The findings reveal a mix of responses that indicate that while there are gains in adopting e-hrm systems, it is wiser to consider supporting resources as well as articulate the needs of the university better before any investment is made.

  1. Electronic human resource management: Enhancing or entrancing?

    Directory of Open Access Journals (Sweden)

    Paul Poisat

    2017-07-01

    Full Text Available Orientation: This article provides an investigation into the current level of development of the body of knowledge related to electronic human resource management (e-HRM by means of a qualitative content analysis. Several aspects of e-HRM, namely definitions of e-HRM, the theoretical perspectives around e-HRM, the role of e-HRM, the various types of e-HRM and the requirements for successful e-HRM, are examined. Research purpose: The purpose of the article was to determine the status of e-HRM and examine the studies that report on the link between e-HRM and organisational productivity. Motivation for the study: e-HRM has the capacity to improve organisational efficiency and leverage the role of human resources (HR as a strategic business partner. Main findings: The notion that the implementation of e-HRM will lead to improved organisational productivity is commonly assumed; however, empirical evidence in this regard was found to be limited. Practical/managerial implications: From the results of this investigation it is evident that more research is required to gain a greater understanding of the influence of e-HRM on organisational productivity, as well as to develop measures for assessing this influence. Contribution: This article proposes additional areas to research and measure when investigating the effectiveness of e-HRM. It provides a different lens from which to view e-HRM assessment whilst keeping it within recognised HR measurement parameters (the HR value chain. In addition, it not only provides areas for measuring e-HRM’s influence but also provides important clues as to how the measurements may be approached.

  2. Identifying and evaluating electronic learning resources for use in adult-gerontology nurse practitioner education.

    Science.gov (United States)

    Thompson, Hilaire J; Belza, Basia; Baker, Margaret; Christianson, Phyllis; Doorenbos, Ardith; Nguyen, Huong

    2014-01-01

    Enhancing existing curricula to meet newly published adult-gerontology advanced practice registered nurse (APRN) competencies in an efficient manner presents a challenge to nurse educators. Incorporating shared, published electronic learning resources (ELRs) in existing or new courses may be appropriate in order to assist students in achieving competencies. The purposes of this project were to (a) identify relevant available ELR for use in enhancing geriatric APRN education and (b) to evaluate the educational utility of identified ELRs based on established criteria. A multilevel search strategy was used. Two independent team members reviewed identified ELR against established criteria to ensure utility. Only resources meeting all criteria were retained. Resources were found for each of the competency areas and included formats such as podcasts, Web casts, case studies, and teaching videos. In many cases, resources were identified using supplemental strategies and not through traditional search or search of existing geriatric repositories. Resources identified have been useful to advanced practice educators in improving lecture and seminar content in a particular topic area and providing students and preceptors with additional self-learning resources. Addressing sustainability within geriatric APRN education is critical for sharing of best practices among educators and for sustainability of teaching and related resources. © 2014.

  3. Systematic review of electronic surveillance of infectious diseases with emphasis on antimicrobial resistance surveillance in resource-limited settings.

    Science.gov (United States)

    Rattanaumpawan, Pinyo; Boonyasiri, Adhiratha; Vong, Sirenda; Thamlikitkul, Visanu

    2018-02-01

    Electronic surveillance of infectious diseases involves rapidly collecting, collating, and analyzing vast amounts of data from interrelated multiple databases. Although many developed countries have invested in electronic surveillance for infectious diseases, the system still presents a challenge for resource-limited health care settings. We conducted a systematic review by performing a comprehensive literature search on MEDLINE (January 2000-December 2015) to identify studies relevant to electronic surveillance of infectious diseases. Study characteristics and results were extracted and systematically reviewed by 3 infectious disease physicians. A total of 110 studies were included. Most surveillance systems were developed and implemented in high-income countries; less than one-quarter were conducted in low-or middle-income countries. Information technologies can be used to facilitate the process of obtaining laboratory, clinical, and pharmacologic data for the surveillance of infectious diseases, including antimicrobial resistance (AMR) infections. These novel systems require greater resources; however, we found that using electronic surveillance systems could result in shorter times to detect targeted infectious diseases and improvement of data collection. This study highlights a lack of resources in areas where an effective, rapid surveillance system is most needed. The availability of information technology for the electronic surveillance of infectious diseases, including AMR infections, will facilitate the prevention and containment of such emerging infectious diseases. Copyright © 2018 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Elsevier Inc. All rights reserved.

  4. Sharing network resources

    CERN Document Server

    Parekh, Abhay

    2014-01-01

    Resource Allocation lies at the heart of network control. In the early days of the Internet the scarcest resource was bandwidth, but as the network has evolved to become an essential utility in the lives of billions, the nature of the resource allocation problem has changed. This book attempts to describe the facets of resource allocation that are most relevant to modern networks. It is targeted at graduate students and researchers who have an introductory background in networking and who desire to internalize core concepts before designing new protocols and applications. We start from the fun

  5. Power-Controlled MAC Protocols with Dynamic Neighbor Prediction for Ad hoc Networks

    Institute of Scientific and Technical Information of China (English)

    LI Meng; ZHANG Lin; XIAO Yong-kang; SHAN Xiu-ming

    2004-01-01

    Energy and bandwidth are the scarce resources in ad hoc networks because most of the mobile nodes are battery-supplied and share the exclusive wireless medium. Integrating the power control into MAC protocol is a promising technique to fully exploit these precious resources of ad hoc wireless networks. In this paper, a new intelligent power-controlled Medium Access Control (MAC) (iMAC) protocol with dynamic neighbor prediction is proposed. Through the elaborate design of the distributed transmit-receive strategy of mobile nodes, iMAC greatly outperforms the prevailing IEEE 802.11 MAC protocols in not only energy conservation but also network throughput. Using the Dynamic Neighbor Prediction (DNP), iMAC performs well in mobile scenes. To the best of our knowledge, iMAC is the first protocol that considers the performance deterioration of power-controlled MAC protocols in mobile scenes and then proposes a solution. Simulation results indicate that DNP is important and necessary for power-controlled MAC protocols in mobile ad hoc networks.

  6. A chronic toxicity test protocol using Caridina nilotica (Decapoda ...

    African Journals Online (AJOL)

    Salinization of freshwater resources is an increasing global problem, yet there is a paucity of chronic salinity tolerance data linked to very few chronic toxicity test protocols. This research aimed to generate a chronic toxicity test protocol and protective salinity tolerance data for the indigenous South African freshwater shrimp ...

  7. Enhanced just-in-time plus protocol for optical burst switching networks

    Science.gov (United States)

    Rodrigues, Joel J. P. C.; Gregório, José M. B.; Vasilakos, Athanasios V.

    2010-07-01

    We propose a new one-way resource reservation protocol for optical burst switching (OBS) networks, called Enhanced Just-in-Time Plus (E-JIT+). The protocol is described in detail, and its formal specification is presented, following an extended finite state machine approach. The performance evaluation of E-JIT+ is analyzed in comparison with other proposed OBS protocols (JIT+ and E-JIT) for the following network topologies: rings; degree-two, degree-three, and degree-four chordal rings; mesh-torus; NSFNET; ARPANET; FCCN-NET; and the European Optical Network. We evaluate and compare the performance of the different protocols in terms of burst loss probability, taking into account the most important OBS network parameters. It was shown that E-JIT+ performs better than available one-way resource reservation protocols for all the evaluated network topologies. Moreover, the scalability of E-JIT+ was observed, and when the network traffic increases, the burst loss probability also increases, leading to a worse network performance.

  8. From Millennium ERM to Proquest 360 Resource Manager: Implementing a new Electronic Resources Management System ERMS in an International Graduate Research University in Saudi Arabia

    KAUST Repository

    Ramli, Rindra M.

    2017-01-01

    An overview of the Recommendation Study and the subsequent Implementation of a new Electronic Resources Management system ERMS in an international graduate research university in the Kingdom of Saudi Arabia. It covers the timeline, deliverables

  9. Open-Source Electronic Health Record Systems for Low-Resource Settings: Systematic Review.

    Science.gov (United States)

    Syzdykova, Assel; Malta, André; Zolfo, Maria; Diro, Ermias; Oliveira, José Luis

    2017-11-13

    Despite the great impact of information and communication technologies on clinical practice and on the quality of health services, this trend has been almost exclusive to developed countries, whereas countries with poor resources suffer from many economic and social issues that have hindered the real benefits of electronic health (eHealth) tools. As a component of eHealth systems, electronic health records (EHRs) play a fundamental role in patient management and effective medical care services. Thus, the adoption of EHRs in regions with a lack of infrastructure, untrained staff, and ill-equipped health care providers is an important task. However, the main barrier to adopting EHR software in low- and middle-income countries is the cost of its purchase and maintenance, which highlights the open-source approach as a good solution for these underserved areas. The aim of this study was to conduct a systematic review of open-source EHR systems based on the requirements and limitations of low-resource settings. First, we reviewed existing literature on the comparison of available open-source solutions. In close collaboration with the University of Gondar Hospital, Ethiopia, we identified common limitations in poor resource environments and also the main requirements that EHRs should support. Then, we extensively evaluated the current open-source EHR solutions, discussing their strengths and weaknesses, and their appropriateness to fulfill a predefined set of features relevant for low-resource settings. The evaluation methodology allowed assessment of several key aspects of available solutions that are as follows: (1) integrated applications, (2) configurable reports, (3) custom reports, (4) custom forms, (5) interoperability, (6) coding systems, (7) authentication methods, (8) patient portal, (9) access control model, (10) cryptographic features, (11) flexible data model, (12) offline support, (13) native client, (14) Web client,(15) other clients, (16) code

  10. Applications and methods utilizing the Simple Semantic Web Architecture and Protocol (SSWAP for bioinformatics resource discovery and disparate data and service integration

    Directory of Open Access Journals (Sweden)

    Nelson Rex T

    2010-06-01

    Full Text Available Abstract Background Scientific data integration and computational service discovery are challenges for the bioinformatic community. This process is made more difficult by the separate and independent construction of biological databases, which makes the exchange of data between information resources difficult and labor intensive. A recently described semantic web protocol, the Simple Semantic Web Architecture and Protocol (SSWAP; pronounced "swap" offers the ability to describe data and services in a semantically meaningful way. We report how three major information resources (Gramene, SoyBase and the Legume Information System [LIS] used SSWAP to semantically describe selected data and web services. Methods We selected high-priority Quantitative Trait Locus (QTL, genomic mapping, trait, phenotypic, and sequence data and associated services such as BLAST for publication, data retrieval, and service invocation via semantic web services. Data and services were mapped to concepts and categories as implemented in legacy and de novo community ontologies. We used SSWAP to express these offerings in OWL Web Ontology Language (OWL, Resource Description Framework (RDF and eXtensible Markup Language (XML documents, which are appropriate for their semantic discovery and retrieval. We implemented SSWAP services to respond to web queries and return data. These services are registered with the SSWAP Discovery Server and are available for semantic discovery at http://sswap.info. Results A total of ten services delivering QTL information from Gramene were created. From SoyBase, we created six services delivering information about soybean QTLs, and seven services delivering genetic locus information. For LIS we constructed three services, two of which allow the retrieval of DNA and RNA FASTA sequences with the third service providing nucleic acid sequence comparison capability (BLAST. Conclusions The need for semantic integration technologies has preceded

  11. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification. In r...

  12. Universal data access for run-time resource management in resource constrained wireless networks

    OpenAIRE

    Rerkrai, Krisakorn

    2012-01-01

    Resource-constrainedwireless networks, e.g.wireless sensor networks (WSNs), small embedded devices with limited computational power and energy, have been the subject of intense research in the past decade. Moreover, recent technological advances and growing demand for better efficiency have led to a great number of link and network protocols for WSNs. The protocols depend on specific interfaces to exchange necessary information. Unfortunately these interfaces are often proprietary and highly ...

  13. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  14. Vicissitudes of Nagoya Protocol in Colombia

    International Nuclear Information System (INIS)

    Rojas Blanco, Diana Lorena

    2013-01-01

    The fair and equitable sharing of benefits arising from the utilization of genetic resources is not only one of the central objectives of the Nagoya Protocol, but also a challenge for communities of scientists, researchers, and indigenous ancestral generally for the educational community. It is therefore essential to know what the real and material implications for the population, the ratification of the Nagoya Protocol, which despite having sufficient justification and argued, highlights the need to develop legal tools, economic, technological and education for proper and fair implementation.

  15. A novel immuno-gold labeling protocol for nanobody-based detection of HER2 in breast cancer cells using immuno-electron microscopy.

    Science.gov (United States)

    Kijanka, M; van Donselaar, E G; Müller, W H; Dorresteijn, B; Popov-Čeleketić, D; El Khattabi, M; Verrips, C T; van Bergen En Henegouwen, P M P; Post, J A

    2017-07-01

    Immuno-electron microscopy is commonly performed with the use of antibodies. In the last decade the antibody fragment indicated as nanobody (VHH or single domain antibody) has found its way to different applications previously done with conventional antibodies. Nanobodies can be selected to bind with high affinity and specificity to different antigens. They are small (molecular weight ca. 15kDa) and are usually easy to produce in microorganisms. Here we have evaluated the feasibility of a nanobody binding to HER2 for application in immuno-electron microscopy. To obtain highest labeling efficiency combined with optimal specificity, different labeling conditions were analysed, which included nanobody concentration, fixation and blocking conditions. The obtained optimal protocol was applied for post-embedment labeling of Tokuyasu cryosections and for pre-embedment labeling of HER2 for fluorescence microscopy and both transmission and scanning electron microscopy. We show that formaldehyde fixation after incubation with the anti-HER2 nanobody, improves labeling intensity. Among all tested blocking agents the best results were obtained with a mixture of cold water fish gelatine and acetylated bovine serum albumin, which prevented a-specific interactions causing background labeling while preserving specific interactions at the same time. In conclusion, we have developed a nanobody-based protocol for immuno-gold labeling of HER2 for Tokuyasu cryosections in TEM as well as for pre-embedment gold labeling of cells for both TEM and SEM. Copyright © 2017. Published by Elsevier Inc.

  16. Internet - a resource for nuclear utilities

    International Nuclear Information System (INIS)

    Slone, B.J. III; Richardson, C.E.

    1993-01-01

    Internet is the name of the largest computer network in the world. It is actually a collection of many networks all running the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite, connected through gateways and sharing common names and address spaces. Its purpose is to facilitate sharing of resources at participating organizations, which include government agencies, educational institutions, and private corporations. The Internet roots begin with the creation of the Advanced Research Projects Agency (ARPA) within the U.S. Department of Defense (DOD) in 1958. In 1969, the DOD formed a computer network for ARPA and gave it the name ARPANET. It was designed to help government scientists communicate and share information by allowing remote computer log-in and program execution, but it quickly became a tool for sharing information through file transfer, electronic mail, and interest-group mailing lists. In 1970, ARPA became the Defense Advanced Research Projects Agency (DARPA) and ARPANET became DARPANET. By 1980, the DARPANET had grown in size, and other connecting networks were being developed. To support system growth and performance, it was recognized that a new communication protocol was required. In 1983, DARPANET split into DARPANET and MILNET (Military Network), and the Internet was formed when the Defense Communications Agency, which managed both networks, mandated the use of TCP/IP for connected hosts. In 1986, the National Science Foundation (NSF) joined Internet. The NSF created NSFNET to link several national supercomputer centers to support scholarly research. It now comprises 17 networks, connecting to 23 midlevel wide-area networks across the continent. In turn, the midlevel networks link computers in more than 1000 university, government, and commercial research organizations throughout the world

  17. Evaluation of three electronic report processing systems for preparing hydrologic reports of the U.S Geological Survey, Water Resources Division

    Science.gov (United States)

    Stiltner, G.J.

    1990-01-01

    In 1987, the Water Resources Division of the U.S. Geological Survey undertook three pilot projects to evaluate electronic report processing systems as a means to improve the quality and timeliness of reports pertaining to water resources investigations. The three projects selected for study included the use of the following configuration of software and hardware: Ventura Publisher software on an IBM model AT personal computer, PageMaker software on a Macintosh computer, and FrameMaker software on a Sun Microsystems workstation. The following assessment criteria were to be addressed in the pilot studies: The combined use of text, tables, and graphics; analysis of time; ease of learning; compatibility with the existing minicomputer system; and technical limitations. It was considered essential that the camera-ready copy produced be in a format suitable for publication. Visual improvement alone was not a consideration. This report consolidates and summarizes the findings of the electronic report processing pilot projects. Text and table files originating on the existing minicomputer system were successfully transformed to the electronic report processing systems in American Standard Code for Information Interchange (ASCII) format. Graphics prepared using a proprietary graphics software package were transferred to all the electronic report processing software through the use of Computer Graphic Metafiles. Graphics from other sources were entered into the systems by scanning paper images. Comparative analysis of time needed to process text and tables by the electronic report processing systems and by conventional methods indicated that, although more time is invested in creating the original page composition for an electronically processed report , substantial time is saved in producing subsequent reports because the format can be stored and re-used by electronic means as a template. Because of the more compact page layouts, costs of printing the reports were 15% to 25

  18. Morphology and structure of lipoproteins revealed by an optimized negative-staining protocol of electron microscopy[S

    Science.gov (United States)

    Zhang, Lei; Song, James; Cavigiolio, Giorgio; Ishida, Brian Y.; Zhang, Shengli; Kane, John P.; Weisgraber, Karl H.; Oda, Michael N.; Rye, Kerry-Anne; Pownall, Henry J.; Ren, Gang

    2011-01-01

    Plasma lipoprotein levels are predictors of risk for coronary artery disease. Lipoprotein structure-function relationships provide important clues that help identify the role of lipoproteins in cardiovascular disease. The compositional and conformational heterogeneity of lipoproteins are major barriers to the identification of their structures, as discovered using traditional approaches. Although electron microscopy (EM) is an alternative approach, conventional negative staining (NS) produces rouleau artifacts. In a previous study of apolipoprotein (apo)E4-containing reconstituted HDL (rHDL) particles, we optimized the NS method in a way that eliminated rouleaux. Here we report that phosphotungstic acid at high buffer salt concentrations plays a key role in rouleau formation. We also validate our protocol for analyzing the major plasma lipoprotein classes HDL, LDL, IDL, and VLDL, as well as homogeneously prepared apoA-I-containing rHDL. High-contrast EM images revealed morphology and detailed structures of lipoproteins, especially apoA-I-containing rHDL, that are amenable to three-dimensional reconstruction by single-particle analysis and electron tomography. PMID:20978167

  19. Kyoto protocol and Nepal's energy sector

    International Nuclear Information System (INIS)

    Pokharel, Shaligram

    2007-01-01

    Nepal has recently ratified Kyoto Protocol, which considers justifiable use of resources to limit or reduce the emission of gases that contribute to green house gas inventory in the atmosphere. Nepal's per capita green gas (GHG) emission from energy use is insignificant. However, it is important for Nepal to adopt environmentally friendly energy options based on local resources like hydropower and biomass. Nepal can benefit from the provisions of clean development mechanism (CDM) under the Kyoto Protocol of the United Nations Framework Convention on Climate Change (UNFCC) or carbon funds being promoted by various organizations in order to obtain funding for new projects that reduce GHG emissions (ER). Funding can be generated through Carbon trading in international market as well. In this paper, the country's current contribution to GHG due to energy consumption is evaluated. Options for promoting more sustainable and environmentally friendly projects have also been discussed

  20. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  1. Use and User Perception of Electronic Information Resources: A Case Study of Siva Institute of Frontier Technology, India

    Directory of Open Access Journals (Sweden)

    Velmurugan Chandran

    2013-12-01

    Full Text Available The present study aims to explore the use and user perception of electronic resources in Siva Institute of Frontier Technology, India. A total number of 123 users were taken into account for the study through a questionnaire-based survey method. A well-structured questionnaire was designed and distributed to the selected 200 students and staff members. 123 copies of the questionnaires were returned dully filled in and the overall response rate was 61.50 percent. The questionnaire contained both open- and close-ended questions. The collected data were classified, analyzed, and tabulated by using simple statistical methods. This study covers the impact of electronic resources on students and faculty in their academic pursuit.

  2. Resource Discovery in Activity-Based Sensor Networks

    DEFF Research Database (Denmark)

    Bucur, Doina; Bardram, Jakob

    This paper proposes a service discovery protocol for sensor networks that is specifically tailored for use in humancentered pervasive environments. It uses the high-level concept of computational activities (as logical bundles of data and resources) to give sensors in Activity-Based Sensor Networ....... ABSN enhances the generic Extended Zone Routing Protocol with logical sensor grouping and greatly lowers network overhead during the process of discovery, while keeping discovery latency close to optimal.......This paper proposes a service discovery protocol for sensor networks that is specifically tailored for use in humancentered pervasive environments. It uses the high-level concept of computational activities (as logical bundles of data and resources) to give sensors in Activity-Based Sensor Networks...... (ABSNs) knowledge about their usage even at the network layer. ABSN redesigns classical network-level service discovery protocols to include and use this logical structuring of the network for a more practically applicable service discovery scheme. Noting that in practical settings activity-based sensor...

  3. A preliminary categorization of end-of-life electrical and electronic equipment as secondary metal resources

    International Nuclear Information System (INIS)

    Oguchi, Masahiro; Murakami, Shinsuke; Sakanakura, Hirofumi; Kida, Akiko; Kameya, Takashi

    2011-01-01

    Highlights: → End-of-life electrical and electronic equipment (EEE) as secondary metal resources. → The content and the total amount of metals in specific equipment are both important. → We categorized 21 EEE types from contents and total amounts of various metals. → Important equipment types as secondary resources were listed for each metal kind. → Collectability and possible collection systems of various EEE types were discussed. - Abstract: End-of-life electrical and electronic equipment (EEE) has recently received attention as a secondary source of metals. This study examined characteristics of end-of-life EEE as secondary metal resources to consider efficient collection and metal recovery systems according to the specific metals and types of EEE. We constructed an analogy between natural resource development and metal recovery from end-of-life EEE and found that metal content and total annual amount of metal contained in each type of end-of-life EEE should be considered in secondary resource development, as well as the collectability of the end-of-life products. We then categorized 21 EEE types into five groups and discussed their potential as secondary metal resources. Refrigerators, washing machines, air conditioners, and CRT TVs were evaluated as the most important sources of common metals, and personal computers, mobile phones, and video games were evaluated as the most important sources of precious metals. Several types of small digital equipment were also identified as important sources of precious metals; however, mid-size information and communication technology (ICT) equipment (e.g., printers and fax machines) and audio/video equipment were shown to be more important as a source of a variety of less common metals. The physical collectability of each type of EEE was roughly characterized by unit size and number of end-of-life products generated annually. Current collection systems in Japan were examined and potentially appropriate collection

  4. Reducing traffic in DHT-based discovery protocols for dynamic resources

    Science.gov (United States)

    Carlini, Emanuele; Coppola, Massimo; Laforenza, Domenico; Ricci, Laura

    Existing peer-to-peer approaches for resource location based on distributed hash tables focus mainly on optimizing lookup query resolution. The underlying assumption is that the arrival ratio of lookup queries is higher than the ratio of resource publication operations. We propose a set of optimization strategies to reduce the network traffic generated by the data publication and update process when resources have dynamic-valued attributes. We aim at reducing the publication overhead of supporting multi-attribute range queries. We develop a model predicting the bandwidth reduction, and we assign proper values to the model variables on the basis of real data measurements. We further validate these results by a set of simulations. Our experiments are designed to reproduce the typical behaviour of the resulting scheme within large distributed resource location system, like the resource location service of the XtreemOS Grid-enabled Operating System.

  5. A Web- and Mobile-Based Map of Mental Health Resources for Postsecondary Students (Thought Spot): Protocol for an Economic Evaluation.

    Science.gov (United States)

    Kaur, Amandeep; Isaranuwatchai, Wanrudee; Jaffer, Aliya; Ferguson, Genevieve; Abi-Jaoude, Alexxa; Johnson, Andrew; Hollenberg, Elisa; Wiljer, David

    2018-03-29

    Youth demonstrate a low propensity to seek help for mental health issues and exhibit low use of health services despite the high prevalence of mental health challenges in this population. Research has found that delivering interventions via the internet and mobile devices is an effective way to reach youth. Thought Spot, a Web- and mobile-based map, was developed to help transition-aged youth in postsecondary settings overcome barriers to help-seeking, thereby reducing the economic burden associated with untreated mental health issues. This paper presents the protocol for an economic evaluation that will be conducted in conjunction with a randomized controlled trial (RCT) to evaluate the effectiveness and cost of Thought Spot compared with usual care in terms of self-efficacy for mental health help-seeking among postsecondary students. A partially blinded RCT will be conducted to assess the impact of Thought Spot on the self-efficacy of students for mental health help-seeking. Students from 3 postsecondary institutions in Ontario, Canada will be randomly allocated to 1 of 2 intervention groups (resource pamphlet or Thought Spot) for 6 months. The economic evaluation will focus on the perspective of postsecondary institutions or other organizations interested in using Thought Spot. Costs and resources for operating and maintaining the platform will be reported and compared with the costs and resource needs associated with usual care. The primary outcome will be change in help-seeking intentions, measured using the General Help-Seeking Questionnaire. The cost-effectiveness of the intervention will be determined by calculating the incremental cost-effectiveness ratio, which will then be compared with willingness to pay. The RCT is scheduled to begin in February 2018 and will run for 6 months, after which the economic evaluation will be completed. We expect to demonstrate that Thought Spot is a cost-effective way to improve help-seeking intentions and encourage help

  6. Principles of formation of the content of an educational electronic resource on the basis of general and didactic patterns of learning

    Directory of Open Access Journals (Sweden)

    Ольга Юрьевна Заславская

    2018-12-01

    Full Text Available The article considers the influence of the development of technical means of teaching on the effectiveness of educational and methodical resources. Modern opportunities of information and communication technologies allow creating electronic educational resources that represent educational information that automates the learning process, provide information assistance, if necessary, collect and process statistical information on the degree of development of the content of the school material by schoolchildren, set an individual trajectory of learning, and so on. The main principle of data organization is the division of the training course into separate sections on the thematic elements and components of the learning process. General regularities include laws that encompass the entire didactic system, and in specific (particular cases, those whose actions extend to a separate component (aspect of the system. From the standpoint of the existence of three types of electronic training modules in the aggregate content of the electronic learning resource - information, control and module of practical classes - the principles of the formation of the electronic learning resource, in our opinion, should regulate all these components. Each of the certain principles is considered in the groups: scientific orientation, methodological orientation, systemic nature, accounting of interdisciplinary connections, fundamentalization, systematic and dosage sequence, rational use of study time, accessibility, minimization, operationalization of goals, unified identification diagnosis.

  7. Secure Protocol for “Host — NFC Reader” Communication

    Directory of Open Access Journals (Sweden)

    A. O. Menshenin

    2012-06-01

    Full Text Available The paper presents a secure protocol for communication between host and NFC reader. The protocol protection scheme uses symmetric cipher with cyclic session key generation and provides confidentiality, integrity, end parties authentication and resistance to replay attacks. Deployment scenario in a typical electronic payment system is also presented.

  8. Operating systems and network protocols for wireless sensor networks.

    Science.gov (United States)

    Dutta, Prabal; Dunkels, Adam

    2012-01-13

    Sensor network protocols exist to satisfy the communication needs of diverse applications, including data collection, event detection, target tracking and control. Network protocols to enable these services are constrained by the extreme resource scarcity of sensor nodes-including energy, computing, communications and storage-which must be carefully managed and multiplexed by the operating system. These challenges have led to new protocols and operating systems that are efficient in their energy consumption, careful in their computational needs and miserly in their memory footprints, all while discovering neighbours, forming networks, delivering data and correcting failures.

  9. From Millennium ERM to Proquest 360 Resource Manager: Implementing a new Electronic Resources Management System ERMS in an International Graduate Research University in Saudi Arabia

    KAUST Repository

    Ramli, Rindra M.

    2017-05-17

    An overview of the Recommendation Study and the subsequent Implementation of a new Electronic Resources Management system ERMS in an international graduate research university in the Kingdom of Saudi Arabia. It covers the timeline, deliverables and challenges as well as lessons learnt by the Project Team.

  10. Adaptive security protocol selection for mobile computing

    NARCIS (Netherlands)

    Pontes Soares Rocha, B.; Costa, D.N.O.; Moreira, R.A.; Rezende, C.G.; Loureiro, A.A.F.; Boukerche, A.

    2010-01-01

    The mobile computing paradigm has introduced new problems for application developers. Challenges include heterogeneity of hardware, software, and communication protocols, variability of resource limitations and varying wireless channel quality. In this scenario, security becomes a major concern for

  11. A Distributed Snapshot Protocol for Efficient Artificial Intelligence Computation in Cloud Computing Environments

    Directory of Open Access Journals (Sweden)

    JongBeom Lim

    2018-01-01

    Full Text Available Many artificial intelligence applications often require a huge amount of computing resources. As a result, cloud computing adoption rates are increasing in the artificial intelligence field. To support the demand for artificial intelligence applications and guarantee the service level agreement, cloud computing should provide not only computing resources but also fundamental mechanisms for efficient computing. In this regard, a snapshot protocol has been used to create a consistent snapshot of the global state in cloud computing environments. However, the existing snapshot protocols are not optimized in the context of artificial intelligence applications, where large-scale iterative computation is the norm. In this paper, we present a distributed snapshot protocol for efficient artificial intelligence computation in cloud computing environments. The proposed snapshot protocol is based on a distributed algorithm to run interconnected multiple nodes in a scalable fashion. Our snapshot protocol is able to deal with artificial intelligence applications, in which a large number of computing nodes are running. We reveal that our distributed snapshot protocol guarantees the correctness, safety, and liveness conditions.

  12. The Synthesis of the Hierarchical Structure of Information Resources for Management of Electronic Commerce Entities

    Directory of Open Access Journals (Sweden)

    Krutova Anzhelika S.

    2017-06-01

    Full Text Available The aim of the article is to develop the theoretical bases for the classification and coding of economic information and the scientific justification of the content of information resources of an electronic commerce enterprise. The essence of information resources for management of electronic business entities is investigated. It is proved that the organization of accounting in e-commerce systems is advisable to be built on the basis of two circuits: accounting for financial flows and accounting associated with transformation of business factors in products and services as a result of production activities. There presented a sequence of accounting organization that allows to combine the both circuits in a single information system, which provides a possibility for the integrated replenishment and distributed simultaneous use of the e-commerce system by all groups of users. It is proved that the guarantee of efficient activity of the information management system of electronic commerce entities is a proper systematization of the aggregate of information resources on economic facts and operations of an enterprise in accordance with the management tasks by building the hierarchy of accounting nomenclatures. It is suggested to understand nomenclature as an objective, primary information aggregate concerning a certain fact of the economic activity of an enterprise, which is characterized by minimum requisites, is entered into the database of the information system and is to be reflected in the accounting system. It is proposed to build a database of e-commerce systems as a part of directories (constants, personnel, goods / products, suppliers, buyers and the hierarchy of accounting nomenclatures. The package of documents regulating the organization of accounting at an enterprise should include: the provision on the accounting services, the order on the accounting policy, the job descriptions, the schedules of information exchange, the report card and

  13. Kajian Literatur Sinkronisasi Waktu Dengan Network Time Protocol Untuk Pemantauan Aktivitas Jaringan Telekomunikasi

    Directory of Open Access Journals (Sweden)

    Ahmad Budi Setiawan

    2015-12-01

    Abstract Network providers are providing services or networks that enable the implementation of electronic transactions. Each network operator is required to align the time in electronic transactions. The purpose is to provide time alignment of the time standard and provide a time frame for all forms of electronic transactions with the principles of accuracy and traceability. Indonesian Time Alignment System uses the principle of traceability and accuracy principles. The protocols used in the alignment of the time server in Indonesia-based Network Time Protocol. This study discusses the implementation of time synchronization with a network time protocol as a form of telecommunications network security monitoring. The method used in this study is a descriptive narrative on the implementation of time synchronization. Results of this study are input to the policy in the security of electronic transactions through time synchronization

  14. Optimization and validation of the protocol used to analyze the taste of traditional Chinese medicines using an electronic tongue.

    Science.gov (United States)

    Li, Xuelin; Gao, Xiaojie; Liu, Ruixin; Wang, Junming; Wu, Zidan; Zhang, Lu; Li, Huiling; Gui, Xinjing; Kang, Bingya; Shi, Junhan

    2016-11-01

    Tools to define the active ingredients and flavors of Traditional Chinese Medicines (TCMs) are limited by long analysis times, complex sample preparation and a lack of multiplexed analysis. The aim of the present study was to optimize and validate an electronic tongue (E-tongue) methodology to analyze the bitterness of TCMs. To test the protocol, 35 different TCM concoctions were measured using an E-tongue, and seven replicate measurements of each sample were taken to evaluate reproducibility and precision. E-tongue sensor information was identified and classified using analysis approaches including least squares support vector machine (LS-SVM), support vector machine (SVM), discriminant analysis (DA) and partial least squares (PLS). A benefit of this analytical protocol was that the analysis of a single sample took <15 min for all seven sensors. The results identified that the LS-SVM approach provided the best bitterness classification accuracy (binary classification accuracy, 100%; ternary classification accuracy, 89.66%). The E-tongue protocol developed showed good reproducibility and high precision within a 6 h measurement cycle. To the best of our knowledge, this is the first study of an E-tongue being applied to assay the bitterness of TCMs. This approach could be applied in the classification of the taste of TCMs, and serve important roles in other fields, including foods and beverages.

  15. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  16. A More Efficient Contextuality Distillation Protocol

    Science.gov (United States)

    Meng, Hui-xian; Cao, Huai-xin; Wang, Wen-hua; Fan, Ya-jing; Chen, Liang

    2018-03-01

    Based on the fact that both nonlocality and contextuality are resource theories, it is natural to ask how to amplify them more efficiently. In this paper, we present a contextuality distillation protocol which produces an n-cycle box B ∗ B ' from two given n-cycle boxes B and B '. It works efficiently for a class of contextual n-cycle ( n ≥ 4) boxes which we termed as "the generalized correlated contextual n-cycle boxes". For any two generalized correlated contextual n-cycle boxes B and B ', B ∗ B ' is more contextual than both B and B '. Moreover, they can be distilled toward to the maximally contextual box C H n as the times of iteration goes to infinity. Among the known protocols, our protocol has the strongest approximate ability and is optimal in terms of its distillation rate. What is worth noting is that our protocol can witness a larger set of nonlocal boxes that make communication complexity trivial than the protocol in Brunner and Skrzypczyk (Phys. Rev. Lett. 102, 160403 2009), this might be helpful for exploring the problem that why quantum nonlocality is limited.

  17. Modeling and Verification of the Bitcoin Protocol

    Directory of Open Access Journals (Sweden)

    Kaylash Chaudhary

    2015-11-01

    Full Text Available Bitcoin is a popular digital currency for online payments, realized as a decentralized peer-to-peer electronic cash system. Bitcoin keeps a ledger of all transactions; the majority of the participants decides on the correct ledger. Since there is no trusted third party to guard against double spending, and inspired by its popularity, we would like to investigate the correctness of the Bitcoin protocol. Double spending is an important threat to electronic payment systems. Double spending would happen if one user could force a majority to believe that a ledger without his previous payment is the correct one. We are interested in the probability of success of such a double spending attack, which is linked to the computational power of the attacker. This paper examines the Bitcoin protocol and provides its formalization as an UPPAAL model. The model will be used to show how double spending can be done if the parties in the Bitcoin protocol behave maliciously, and with what probability double spending occurs.

  18. Minimal computational-space implementation of multiround quantum protocols

    International Nuclear Information System (INIS)

    Bisio, Alessandro; D'Ariano, Giacomo Mauro; Perinotti, Paolo; Chiribella, Giulio

    2011-01-01

    A single-party strategy in a multiround quantum protocol can be implemented by sequential networks of quantum operations connected by internal memories. Here, we provide an efficient realization in terms of computational-space resources.

  19. Electronic theses and dissertations: a review of this valuable resource for nurse scholars worldwide.

    Science.gov (United States)

    Goodfellow, L M

    2009-06-01

    A worldwide repository of electronic theses and dissertations (ETDs) could provide worldwide access to the most up-to-date research generated by masters and doctoral students. Until that international repository is established, it is possible to access some of these valuable knowledge resources. ETDs provide a technologically advanced medium with endless multimedia capabilities that far exceed the print and bound copies of theses and dissertations housed traditionally in individual university libraries. CURRENT USE: A growing trend exists for universities worldwide to require graduate students to submit theses or dissertations as electronic documents. However, nurse scholars underutilize ETDs, as evidenced by perusing bibliographic citation lists in many of the research journals. ETDs can be searched for and retrieved through several digital resources such as the Networked Digital Library of Theses and Dissertations (http://www.ndltd.org), ProQuest Dissertations and Theses (http://www.umi.com), the Australasian Digital Theses Program (http://adt.caul.edu.au/) and through individual university web sites and online catalogues. An international repository of ETDs benefits the community of nurse scholars in many ways. The ability to access recent graduate students' research electronically from anywhere in the world is advantageous. For scholars residing in developing countries, access to these ETDs may prove to be even more valuable. In some cases, ETDs are not available for worldwide access and can only be accessed through the university library from which the student graduated. Public access to university library ETD collections is not always permitted. Nurse scholars from both developing and developed countries could benefit from ETDs.

  20. Impact of the implementation of electronic guidelines for cardiovascular prevention in primary care: study protocol

    Directory of Open Access Journals (Sweden)

    Eva Comin

    2013-03-01

    Full Text Available Background The electronic medical records software of the Catalan Institute of Health has recently incorporated an electronic version of clinical practice guidelines (e-CPGs. This study aims to assess the impact of the implementation of e-CPGs on the diagnosis, treatment, control and management of hypercholesterolaemia, diabetes mellitus type 2 and hypertension.Methods Eligible study participants are those aged 35–74 years assigned to family practitioners (FPs of the Catalan Institute of Health. Routinely collected data from electronic primary care registries covering 80% of the Catalan population will be analysed using two approaches: (1 a cross-sectional study to describe the characteristics of the sample before e-CPG implementation; (2 a controlled before-and-after study with 1-year follow-up to ascertain the effect of e-CPG implementation. Patients of FPs who regularly use the e-CPGs will constitute the intervention group; the control group will comprise patients assigned to FPs not regularly using the e-CPG. The outcomes are: (1 suspected and confirmed diagnoses, (2 control of clinical variables, (3 requests for tests and (4 proportions of patients with adequate drug prescriptions.Results This protocol should represent a reproducible process to assess the impact of the implementation of e-CPGs. We anticipate reporting results in late 2013.Conclusion This project will assess the effectiveness of e-CPGs to improve clinical decisions and healthcare procedures in the three disorders analysed. The results will shed light on the use of evidence-based medicine to improve clinical practice of FPs.

  1. A Study of Shared-Memory Mutual Exclusion Protocols Using CADP

    Science.gov (United States)

    Mateescu, Radu; Serwe, Wendelin

    Mutual exclusion protocols are an essential building block of concurrent systems: indeed, such a protocol is required whenever a shared resource has to be protected against concurrent non-atomic accesses. Hence, many variants of mutual exclusion protocols exist in the shared-memory setting, such as Peterson's or Dekker's well-known protocols. Although the functional correctness of these protocols has been studied extensively, relatively little attention has been paid to their non-functional aspects, such as their performance in the long run. In this paper, we report on experiments with the performance evaluation of mutual exclusion protocols using Interactive Markov Chains. Steady-state analysis provides an additional criterion for comparing protocols, which complements the verification of their functional properties. We also carefully re-examined the functional properties, whose accurate formulation as temporal logic formulas in the action-based setting turns out to be quite involved.

  2. Biopiracy after the Nagoya Protocol: Problem Structure, Regime Design and Implementation Challenges

    Directory of Open Access Journals (Sweden)

    Florian Rabitz

    2015-08-01

    Full Text Available This article assesses the effectiveness of the 2010 Nagoya Protocol to the Convention on Biological Diversity (CBD for addressing "biopiracy" of genetic resources; that is, their biotechnological utilization in violation of either the provider country legislation or mutually agreed contractual obligations. Biopiracy is defined as a problem resulting from a distributive conflict between provider and user countries, the practical difficulties of monitoring the utilization of genetic resources in a transnational context, and the pervasive scientific uncertainty about the nature and extent of the problem. The Nagoya Protocol predominantly focuses on compliance management while lacking the necessary enforcement provisions for deterring non-compliance through effective monitoring and sanctions. Using the example of recent European Union implementing legislation, this article underscores how parties may use the Protocol's legal ambiguities to soften its regulatory impact on domestic industry. As a result, in light of both problem structure and regime design, the Protocol only offers modest improvements over the status quo ante.

  3. Library resources on the Internet

    Science.gov (United States)

    Buchanan, Nancy L.

    1995-07-01

    Library resources are prevalent on the Internet. Library catalogs, electronic books, electronic periodicals, periodical indexes, reference sources, and U.S. Government documents are available by telnet, Gopher, World Wide Web, and FTP. Comparatively few copyrighted library resources are available freely on the Internet. Internet implementations of library resources can add useful features, such as full-text searching. There are discussion lists, Gophers, and World Wide Web pages to help users keep up with new resources and changes to existing ones. The future will bring more library resources, more types of library resources, and more integrated implementations of such resources to the Internet.

  4. Focus on CSIR research in water resources: improved methods for aquifer vulnerability assessments and protocols (AVAP) for producing vulnerability maps, taking into account information on soils

    CSIR Research Space (South Africa)

    Colvin, C

    2007-08-01

    Full Text Available for Aquifer Vulnerability Assessments and Protocols (AVAP) for producing vulnerability maps, taking into account information on soils Groundwater resources are increas- ingly threatened by pollution. The AVAP project was initiated to develop improved... characteristics. Both intrinsic and specific vulnerability are taken into account. The approach used to determine the vulnerability of the in- termediate zone involved the descrip- tion and quantification of the factors that influence vulnerability (unsatu...

  5. A Novel Process Audit for Standardized Perioperative Handoff Protocols.

    Science.gov (United States)

    Pallekonda, Vinay; Scholl, Adam T; McKelvey, George M; Amhaz, Hassan; Essa, Deanna; Narreddy, Spurthy; Tan, Jens; Templonuevo, Mark; Ramirez, Sasha; Petrovic, Michelle A

    2017-11-01

    A perioperative handoff protocol provides a standardized delivery of communication during a handoff that occurs from the operating room to the postanestheisa care unit or ICU. The protocol's success is dependent, in part, on its continued proper use over time. A novel process audit was developed to help ensure that a perioperative handoff protocol is used accurately and appropriately over time. The Audit Observation Form is used for the Audit Phase of the process audit, while the Audit Averages Form is used for the Data Analysis Phase. Employing minimal resources and using quantitative methods, the process audit provides the necessary means to evaluate the proper execution of any perioperative handoff protocol. Copyright © 2017 The Joint Commission. Published by Elsevier Inc. All rights reserved.

  6. Resource Management in Broadband Communication Networks

    DEFF Research Database (Denmark)

    Hansen, Mads Stenhuus

    2003-01-01

    . The first part gives a brief description of some of the existing protocols for routing and controlling resources, such as RSVP, OSPF, BGP, PNNI, etc. The remaining part concerns the following two fundamentally different approaches to resource management etc.: - Software agents - Simulated ants......This thesis - Resource Management in Broadband Communication Networks - deals with different ways of optimizing the available resources of data- or telecommunication networks. Especially topics like optimal routing, load balancing and fast recovery of routes in case of link failures are covered...

  7. ELECTRONIC EDUCATIONAL RESOURCES FOR ONLINE SUPPORT OF MODERN CHEMISTRY CLASSES IN SPECIALIZED SCHOOL

    Directory of Open Access Journals (Sweden)

    Maria D. Tukalo

    2013-09-01

    Full Text Available This article contains material of some modern electronic educational resources that can be used via the Internet to support the modern chemistry classes in specialized school. It was drawn attention to the educational chemical experiments as means of knowledge; simulated key motivational characteristics to enhance students interest for learning subjects, their cognitive and practical activity in the formation of self-reliance and self-creative; commented forecasts for creating of conditions to enhance the creative potential of students in a modern learning environment.

  8. Analytical approach to cross-layer protocol optimization in wireless sensor networks

    Science.gov (United States)

    Hortos, William S.

    2008-04-01

    In the distributed operations of route discovery and maintenance, strong interaction occurs across mobile ad hoc network (MANET) protocol layers. Quality of service (QoS) requirements of multimedia service classes must be satisfied by the cross-layer protocol, along with minimization of the distributed power consumption at nodes and along routes to battery-limited energy constraints. In previous work by the author, cross-layer interactions in the MANET protocol are modeled in terms of a set of concatenated design parameters and associated resource levels by multivariate point processes (MVPPs). Determination of the "best" cross-layer design is carried out using the optimal control of martingale representations of the MVPPs. In contrast to the competitive interaction among nodes in a MANET for multimedia services using limited resources, the interaction among the nodes of a wireless sensor network (WSN) is distributed and collaborative, based on the processing of data from a variety of sensors at nodes to satisfy common mission objectives. Sensor data originates at the nodes at the periphery of the WSN, is successively transported to other nodes for aggregation based on information-theoretic measures of correlation and ultimately sent as information to one or more destination (decision) nodes. The "multimedia services" in the MANET model are replaced by multiple types of sensors, e.g., audio, seismic, imaging, thermal, etc., at the nodes; the QoS metrics associated with MANETs become those associated with the quality of fused information flow, i.e., throughput, delay, packet error rate, data correlation, etc. Significantly, the essential analytical approach to MANET cross-layer optimization, now based on the MVPPs for discrete random events occurring in the WSN, can be applied to develop the stochastic characteristics and optimality conditions for cross-layer designs of sensor network protocols. Functional dependencies of WSN performance metrics are described in

  9. Selection and Evaluation of Electronic Resources

    Directory of Open Access Journals (Sweden)

    Doğan Atılgan

    2013-11-01

    Full Text Available Publication boom and issues related to controlling and accession of printed sources have created some problems after World War II. Consequently, publishing industry has encountered the problem of finding possible solution for emerged situation. Industry of electronic publishing has started to improve with the rapid increase of the price of printed sources as well as the problem of publication boom. The first effects of electronic publishing were appeared on the academic and scholarly publications then electronic publishing became a crucial part of all types of publications. As a result of these developments, collection developments and service policies of information centers were also significantly changed. In this article, after a general introduction about selection and evaluation processes of electronic publications, the subscribed databases by a state and a privately owned university in Turkey and their usage were examined.

  10. Changing values of farm animal genomic resources. from historical breeds to the Nagoya Protocol.

    Science.gov (United States)

    Tamminen, Sakari

    2015-01-01

    The paper reviews the history of Animal genetic resources (AnGRs) and claims that over the course of history they have been conceptually transformed from economic, ecologic and scientific life forms into political objects, reflecting in the way in which any valuation of AnGRs is today inherently imbued with national politics and its values enacted by legally binding global conventions. Historically, the first calls to conservation were based on the economic, ecological and scientific values of the AnGR. While the historical arguments are valid and still commonly proposed values for conservation, the AnGR have become highly politicized since the adoption of the Convention of Biological Diversity (CBD), the subsequent Interlaken Declaration, the Global Plan for Action (GPA) and the Nagoya Protocol. The scientific and political definitions of the AnGRs were creatively reshuffled within these documents and the key criteria by which they are now identified and valued today were essentially redefined. The criteria of "in situ condition" has become the necessary starting point for all valuation efforts of AnGRs, effectively transforming their previous nature as natural property and global genetic commons into objects of national concern pertaining to territorially discrete national genetic landscapes, regulated by the sovereign powers of the parties to the global conventions.

  11. Dynamic QoS management in Differentiated Services using bandwidth brokers, RSVP aggregation and load control protocols

    NARCIS (Netherlands)

    Westberg, Lars; Eriksson, Anders; Karagiannis, Georgios; Heijenk, Geert; Rexhepi, Vlora; Partain, David

    2001-01-01

    A method and network subsystem for providing on demand end to end Quality of Service (Qos) in a dynamic manner, use a combination of Resource Reservation Protocol (RSVP), load control protocol (and its successors) and Bandwidth Brokers (BBs)(1106) which communicate using a predetermined protocol.

  12. Dynamic QoS management in Differentiated Services using bandwidth brokers, RSVP aggregation and load control protocols

    NARCIS (Netherlands)

    Westberg, Lars; Eriksson, Anders; Karagiannis, Georgios; Heijenk, Geert; Rexhepi, Vlora; Partain, David

    2009-01-01

    A method and network subsystem for providing on demand end to end Quality of Service (Qos) in a dynamic manner, use a combination of Resource Reservation Protocol (RSVP), load control protocol (and its successors) and Bandwidth Brokers (BBs)(1106) which communicate using a predetermined protocol.

  13. Evaluation of an electronic health record-supported obesity management protocol implemented in a community health center: a cautionary note.

    Science.gov (United States)

    Steglitz, Jeremy; Sommers, Mary; Talen, Mary R; Thornton, Louise K; Spring, Bonnie

    2015-07-01

    Primary care clinicians are well-positioned to intervene in the obesity epidemic. We studied whether implementation of an obesity intake protocol and electronic health record (EHR) form to guide behavior modification would facilitate identification and management of adult obesity in a Federally Qualified Health Center serving low-income, Hispanic patients. In three studies, we examined clinician and patient outcomes before and after the addition of the weight management protocol and form. In the Clinician Study, 12 clinicians self-reported obesity management practices. In the Population Study, BMI and order data from 5000 patients and all 40 clinicians in the practice were extracted from the EHR preintervention and postintervention. In the Exposure Study, EHR-documented outcomes for a sub-sample of 46 patients actually exposed to the obesity management form were compared to matched controls. Clinicians reported that the intake protocol and form increased their performance of obesity-related assessments and their confidence in managing obesity. However, no improvement in obesity management practices or patient weight-loss was evident in EHR records for the overall clinic population. Further analysis revealed that only 55 patients were exposed to the form. Exposed patients were twice as likely to receive weight-loss counseling following the intervention, as compared to before, and more likely than matched controls. However, their obesity outcomes did not differ. Results suggest that an obesity intake protocol and EHR-based weight management form may facilitate clinician weight-loss counseling among those exposed to the form. Significant implementation barriers can limit exposure, however, and need to be addressed. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  14. An Exploratory study on the use of LibAnswers to Resolve, Track and Monitor Electronic Resources Issues: The KAUST Library experience

    KAUST Repository

    Ramli, Rindra M.

    2017-01-01

    An Exploratory study on KAUST library use of LibAnswers in resolving electronic resources questions received in LibAnswers. It describes the findings of the questions received in LibAnswers. The author made suggestions based on the findings to improve the reference services in responding to e-resources questions.

  15. An Exploratory study on the use of LibAnswers to Resolve, Track and Monitor Electronic Resources Issues: The KAUST Library experience

    KAUST Repository

    Ramli, Rindra M.

    2017-05-03

    An Exploratory study on KAUST library use of LibAnswers in resolving electronic resources questions received in LibAnswers. It describes the findings of the questions received in LibAnswers. The author made suggestions based on the findings to improve the reference services in responding to e-resources questions.

  16. Electronic Entanglement Concentration for the Concatenated Greenberger-Horne-Zeilinger State

    Science.gov (United States)

    Ding, Shang-Ping; Zhou, Lan; Gu, Shi-Pu; Wang, Xing-Fu; Sheng, Yu-Bo

    2017-06-01

    Concatenated Greenberger-Horne-Zeilinger (C-GHZ) state, which encodes many physical qubits in a logic qubit will have important applications in both quantum communication and computation. In this paper, we will describe an entanglement concentration protocol (ECP) for electronic C-GHZ state, by exploiting the electronic polarization beam splitters (PBSs) and charge detection. This protocol has several advantages. First, the parties do not need to know the exact coefficients of the initial less-entangled C-GHZ state, which makes this protocol feasible. Second, with the help of charge detection, the distilled maximally entangled C-GHZ state can be remained for future application. Third, this protocol can be repeated to obtain a higher success probability. We hope that this protocol can be useful in future quantum computation based on electrons.

  17. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  18. The level of the usage of the human resource information system and electronic recruitment in Croatian companies

    Directory of Open Access Journals (Sweden)

    Snježana Pivac

    2014-12-01

    Full Text Available Performing business according to contemporary requirements influences companies for continuous usage of modern managerial tools, such as a human resource information system (HRIS and electronic recruitment (ER. Human resources have been recognised as curtail resources and the main source of a competitive advantage in creation of successful business performance. In order to attract and select the top employees, companies use quality information software for attracting internal ones, and electronic recruitment for attracting the best possible external candidates. The main aim of this paper is to research the level of the usage of HRIS and ER within medium-size and large Croatian companies. Moreover, the additional aim of this paper is to evaluate the relationship among the usage of these modern managerial tools and the overall success of human resource management within these companies. For the purpose of this paper, primary and secondary research has been conducted in order to reveal the level of the usage of HRIS and ER as well as the overall success of human resource management in Croatian companies. The companies’ classification (HRIS and ER is done by using the non-hierarchical k-means cluster method as well as the nonparametric Kruskal Wallis test. Further, the companies are ranked by the multicriteria PROMETHEE method. Relevant nonparametric tests are used for testing the overall companies’ HRM. Finally, binary logistic regression is estimated, relating binary variable HRM and HRIS development. After detailed research, it can be concluded that large Croatian companies apply HRIS in majority (with a positive relation to HRM performance, but still require certain degrees of its development.

  19. Single-electron quantum tomography in quantum Hall edge channels

    International Nuclear Information System (INIS)

    Grenier, Ch; Degiovanni, P; Herve, R; Bocquillon, E; Parmentier, F D; Placais, B; Berroir, J M; Feve, G

    2011-01-01

    We propose a quantum tomography protocol to measure single-electron coherence in quantum Hall edge channels, and therefore access for the first time the wavefunction of single-electron excitations propagating in ballistic quantum conductors. Its implementation would open the way to quantitative studies of single-electron decoherence and would provide a quantitative tool for analyzing single- to few-electron sources. We show how this protocol could be implemented using ultrahigh-sensitivity noise measurement schemes.

  20. The electronic encapsulation of knowledge in hydraulics, hydrology and water resources

    Science.gov (United States)

    Abbott, Michael B.

    The rapidly developing practice of encapsulating knowledge in electronic media is shown to lead necessarily to the restructuring of the knowledge itself. The consequences of this for hydraulics, hydrology and more general water-resources management are investigated in particular relation to current process-simulation, real-time control and advice-serving systems. The generic properties of the electronic knowledge encapsulator are described, and attention is drawn to the manner in which knowledge 'goes into hiding' through encapsulation. This property is traced in the simple situations of pure mathesis and in the more complex situations of taxinomia using one example each from hydraulics and hydrology. The consequences for systems architectures are explained, pointing to the need for multi-agent architectures for ecological modelling and for more general hydroinformatics systems also. The relevance of these developments is indicated by reference to ongoing projects in which they are currently being realised. In conclusion, some more general epistemological aspects are considered within the same context. As this contribution is so much concerned with the processes of signification and communication, it has been partly shaped by the theory of semiotics, as popularised by Eco ( A Theory of Semiotics, Indiana University, Bloomington, 1977).

  1. RESEARCH OF INFLUENCE OF QUALITY OF ELECTRONIC EDUCATIONAL RESOURCES ON QUALITY OF TRAINING WITH USE OF DISTANCE TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    H. M. Kravtsov

    2013-03-01

    Full Text Available Communication improving of educational processes requires today new approaches to the management arrangements and forming of educational policy in the field of distance learning, which is based on the use of modern information and communication technologies. An important step in this process is the continuous monitoring of the development and implementation of information technology and, in particular, the distance learning systems in higher educational establishments. The main objective of the monitoring is the impact assessment on the development of distance learning following the state educational standards, curricula, methodical and technical equipment and other factors; factors revelation that influence the implementation and outcomes of distance learning; results comparison of educational institution functioning and distance education systems in order to determine the most efficient ways of its development. The paper presents the analysis results of the dependence of the quality of educational services on the electronic educational resources. Trends in educational services development was studied by comparing the quality influence of electronic educational resources on the quality of educational services of higher pedagogical educational institutions of Ukraine as of 2009-2010 and 2012-2013. Generally, the analysis of the survey results allows evaluating quality of the modern education services as satisfactory and it can be said that almost 70% of the success of their future development depends on the quality of the used electronic educational resources and distance learning systems in particular.

  2. Tracking the Flow of Resources in Electronic Waste - The Case of End-of-Life Computer Hard Disk Drives.

    Science.gov (United States)

    Habib, Komal; Parajuly, Keshav; Wenzel, Henrik

    2015-10-20

    Recovery of resources, in particular, metals, from waste flows is widely seen as a prioritized option to reduce their potential supply constraints in the future. The current waste electrical and electronic equipment (WEEE) treatment system is more focused on bulk metals, where the recycling rate of specialty metals, such as rare earths, is negligible compared to their increasing use in modern products, such as electronics. This study investigates the challenges in recovering these resources in the existing WEEE treatment system. It is illustrated by following the material flows of resources in a conventional WEEE treatment plant in Denmark. Computer hard disk drives (HDDs) containing neodymium-iron-boron (NdFeB) magnets were selected as the case product for this experiment. The resulting output fractions were tracked until their final treatment in order to estimate the recovery potential of rare earth elements (REEs) and other resources contained in HDDs. The results further show that out of the 244 kg of HDDs treated, 212 kg comprising mainly of aluminum and steel can be finally recovered from the metallurgic process. The results further demonstrate the complete loss of REEs in the existing shredding-based WEEE treatment processes. Dismantling and separate processing of NdFeB magnets from their end-use products can be a more preferred option over shredding. However, it remains a technological and logistic challenge for the existing system.

  3. Importance of daily electronic portal imaging in radiotherapy

    International Nuclear Information System (INIS)

    Bell, L. J.; Shakespeare, T. P.; Willis, A.

    2008-01-01

    Full text: An audit was conducted on 20 randomly selected patients who had daily electronic portal imaging during the course of their radiotherapy treatment. The daily images were reviewed to determine whether they were within tolerance according to departmental protocol. If they were not, the actions that were taken were documented. Four treatment areas (spine, chest, breast and prostate) were compared among five patients belonging to each of these categories. The patients were also categorized according to their treatment intent (radical or palliative). A total of 889 electronic portal images of 475 fractions were audited and 33.5% of all fractions were outside tolerance. It was found that 95% of patients needed an action during their treatment and 80% of the patients needed a treatment centre move during the course of their treatment. We found that errors occurred throughout the treatment and it was not possible to predict patients who could have daily imaging omitted. Concordance between radiation therapists and radiation oncologists for identification of error was also investigated. Despite the use of familiar electronic portal imaging protocols, image reviewers (radiation therapists and radiation oncologists) disagreed in interpretation 10% of the time. Our results support the hypothesis that daily imaging may be a useful tool for patients undergoing radiotherapy and that imaging may be ideally carried out before each fraction. Image assessments would be ideally carried out by a team approach, with all images reviewed by both radiation therapists and radiation oncologists. This approach has significant resource implications and may require review of current Medicare and Health Program Grant reimbursements.

  4. Australian high-dose-rate brachytherapy protocols for gynaecological malignancy

    International Nuclear Information System (INIS)

    MacLeod, C.; Dally, M.; Stevens, M.; Thornton, D.; Carruthers, S.; Jeal, P.

    2001-01-01

    There is no consensus over the optimal dose fractionation schedules for high-dose-rate (HDR) brachytherapy used for gynaecological malignancy. In Australian public hospital departments of radiation oncology, HDR brachytherapy for gynaecological cancer is being more commonly used. A survey of public departments that are using this technology, or that plan to introduce this technology, was performed. Their current protocols are presented. In general, protocols are similar biologically; however, the practical aspects such as the number of fractions given do vary and may reflect resource restrictions or, alternatively, differences in interpretations of the literature and of the best protocols by clinicians. Copyright (2001) Blackwell Science Pty Ltd

  5. Performance evaluation of spatial vector routing protocol for wireless sensor networks

    International Nuclear Information System (INIS)

    Baloch, J.; Jokhio, I.

    2012-01-01

    WSNs (Wireless Sensor Networks) is an emerging area of research. Researchers worldwide are working on the issues faced by sensor nodes. Communication has been a major issue in wireless networks and the problem is manifolds in WSN s because of the limited resources. The routing protocol in such networks plays a pivotal role, as an effective routing protocol could significantly reduce the energy consumed in transmitting and receiving data packets throughout a network. In this paper the performance of SVR (Spatial Vector Routing) an energy efficient, location aware routing protocol is compared with the existing location aware protocols. The results from the simulation trials show the performance of SVR. (author)

  6. Performance Evaluation of Spatial Vector Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Javed Ali Baloch

    2012-10-01

    Full Text Available WSNs (Wireless Sensor Networks is an emerging area of research. Researchers worldwide are working on the issues faced by sensor nodes. Communication has been a major issue in wireless networks and the problem is manifolds in WSNs because of the limited resources. The routing protocol in such networks plays a pivotal role, as an effective routing protocol could significantly reduce the energy consumed in transmitting and receiving data packets throughout a network. In this paper the performance of SVR (Spatial Vector Routing an energy efficient, location aware routing protocol is compared with the existing location aware protocols. The results from the simulation trials show the performance of SVR.

  7. Blocking Optimality in Distributed Real-Time Locking Protocols

    Directory of Open Access Journals (Sweden)

    Björn Bernhard Brandenburg

    2014-09-01

    Full Text Available Lower and upper bounds on the maximum priority inversion blocking (pi-blocking that is generally unavoidable in distributed multiprocessor real-time locking protocols (where resources may be accessed only from specific synchronization processors are established. Prior work on suspension-based shared-memory multiprocessor locking protocols (which require resources to be accessible from all processors has established asymptotically tight bounds of Ω(m and Ω(n maximum pi-blocking under suspension-oblivious and suspension-aware analysis, respectively, where m denotes the total number of processors and n denotes the number of tasks. In this paper, it is shown that, in the case of distributed semaphore protocols, there exist two different task allocation scenarios that give rise to distinct lower bounds. In the case of co-hosted task allocation, where application tasks may also be assigned to synchronization processors (i.e., processors hosting critical sections, Ω(Φ · n maximum pi-blocking is unavoidable for some tasks under any locking protocol under both suspension-aware and suspension-oblivious schedulability analysis, where Φ denotes the ratio of the maximum response time to the shortest period. In contrast, in the case of disjoint task allocation (i.e., if application tasks may not be assigned to synchronization processors, only Ω(m and Ω(n maximum pi-blocking is fundamentally unavoidable under suspension-oblivious and suspension-aware analysis, respectively, as in the shared-memory case. These bounds are shown to be asymptotically tight with the construction of two new distributed real-time locking protocols that ensure O(m and O(n maximum pi-blocking under suspension-oblivious and suspension-aware analysis, respectively.

  8. Clinical application of dosimetry in electron beam therapy

    International Nuclear Information System (INIS)

    Yoshiura, Takao

    1995-01-01

    In everyday radiotherapy we must carry out the determination of absorbed dose measurement according to JARP's protocol. We explained an outline of JARP's 1974 and 1986 protocol in electron beam therapy, and mentioned it about the matter that should examined. To use it easily in clinic, a simplified procedure based on precisely to JARP's 1986 protocol is practical, the character of this procedure settles briefly the determination of mean incident energy of electron beams and get ready to table of ionization to absorbed dose conversion factor for various ionization chamber. Also, this procedure almost not influence on the accuracy of determination. We described systematically practical procedure for requisite absorbed dose calculation in a patient in electron beam therapy. (author)

  9. Improving Transition to Employment for Youth With Physical Disabilities: Protocol for a Peer Electronic Mentoring Intervention.

    Science.gov (United States)

    Lindsay, Sally; Stinson, Jennifer; Stergiou-Kita, Mary; Leck, Joanne

    2017-11-16

    Although youth with disabilities have much to gain from employment readiness programs, they are often excluded from or have limited access to vocational programs. One encouraging approach to address gaps in vocational programming is through peer electronic mentoring (e-mentoring), which may facilitate a smoother transition to adulthood by offering support to enhance coping skills. Despite the increase in online communities, little is known about their impact on vocational mentoring for youth with physical disabilities and their parents. The aim of this paper is to develop, implement, and assess the feasibility of an online peer mentor employment readiness intervention for youth with physical disabilities and their parents to improve their self-determination, career maturity, and social support compared to controls. A mixed-methods feasibility randomized controlled trial (RCT) design will be conducted to develop and assess the feasibility, acceptability, and initial efficacy of the "Empowering Youth Towards Employment" intervention. Youth (aged 15 to 25) with physical disabilities and their parents will be randomly assigned to a control or experimental group (4-week, interactive intervention, moderated by peer mentors). Data collection is in progress. Planned analyses include pre-post measures to determine the impact of the intervention on self-determination, career maturity, and social support. A qualitative thematic analysis of the discussion forums will complement the surveys to better understand why certain outcomes may have occurred. Our intervention includes evidence-informed content and was co-created by a multi-disciplinary group of researchers and knowledge users. It has the potential for widespread implications as a cost-effective resource to supplement educational and vocational programming for youth with disabilities. Clinicaltrials.gov NCT02522507; https://clinicaltrials.gov/ct2/show/NCT02522507 (Archived by WebCite at http://www.webcitation.org/6uD58

  10. Performance Evaluation of a Cluster-Based Service Discovery Protocol for Heterogeneous Wireless Sensor Networks

    NARCIS (Netherlands)

    Marin Perianu, Raluca; Scholten, Johan; Havinga, Paul J.M.; Hartel, Pieter H.

    2006-01-01

    Abstract—This paper evaluates the performance in terms of resource consumption of a service discovery protocol proposed for heterogeneous Wireless Sensor Networks (WSNs). The protocol is based on a clustering structure, which facilitates the construction of a distributed directory. Nodes with higher

  11. Resource management in Diffserv measurement-based admission control PHR

    NARCIS (Netherlands)

    Westberg, L.; Heijenk, Geert; Karagiannis, Georgios; Oosthoek, S.; Partain, D.; Rexhepi, Vlora; Szabo, R.; Wallentin, P.; El Allali, H.

    2002-01-01

    The purpose of this draft is to present the Resource Management in Diffserv (RMD) Measurement-Based Admission Control (RIMA) Per Hop Reservation (PHR) protocol. The RIMA PHR protocol is used on a per-hop basis in a Differentiated Services (Diffserv) domain and extends the Diffserv Per Hop Behavior

  12. Shared access protocol (SAP) in femtocell channel resources for cellular coverage enhancement

    KAUST Repository

    Magableh, Amer M.; Radaydeh, Redha Mahmoud Mesleh; Alouini, Mohamed-Slim

    2012-01-01

    protocol (SAP), that enables the unlicensed macro-cell user equipments (MC-UE) to communicate with partially closed access femtocell base stations and hence, improves and enhances the overall system performance in closed environments. For the proposed

  13. Cluster protocols in Underwater Sensor Networks: a Research Review

    Directory of Open Access Journals (Sweden)

    K. Ovaliadis

    2014-07-01

    Full Text Available Underwater Wireless Sensor Networks (UWSN have different characteristics in relation to terrestrial wireless sensor networks; such as limited bandwidth capacity, high propagation delays and limited battery power. Although there has been much work completed in developing protocols and models for terrestrial networks, these are rarely applicable for underwater sensor networks. Up to today major efforts have been made for designing efficient protocols while considering the underwater communication characteristics. An important issue on this research area is the construction of an efficient clustering algorithm. Clustering in the context of UWSN is important as it contributes a great deal towards the efficient use of energy resources. This paper reviews the most significant cluster based protocols proposed for UWSN. Major performance issues of these protocols with respect to the network conditions such as packet delivery ratio, average packet delay, node mobility effect and energy consumption are examined. The advantages and disadvantages of each protocol are also pointed out.

  14. Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Mahdi Zareei

    2017-09-01

    Full Text Available New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN. First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective.

  15. A software defined RTU multi-protocol automatic adaptation data transmission method

    Science.gov (United States)

    Jin, Huiying; Xu, Xingwu; Wang, Zhanfeng; Ma, Weijun; Li, Sheng; Su, Yong; Pan, Yunpeng

    2018-02-01

    Remote terminal unit (RTU) is the core device of the monitor system in hydrology and water resources. Different devices often have different communication protocols in the application layer, which results in the difficulty in information analysis and communication networking. Therefore, we introduced the idea of software defined hardware, and abstracted the common feature of mainstream communication protocols of RTU application layer, and proposed a uniformed common protocol model. Then, various communication protocol algorithms of application layer are modularized according to the model. The executable codes of these algorithms are labeled by the virtual functions and stored in the flash chips of embedded CPU to form the protocol stack. According to the configuration commands to initialize the RTU communication systems, it is able to achieve dynamic assembling and loading of various application layer communication protocols of RTU and complete the efficient transport of sensor data from RTU to central station when the data acquisition protocol of sensors and various external communication terminals remain unchanged.

  16. SSWAP: A Simple Semantic Web Architecture and Protocol for semantic web services.

    Science.gov (United States)

    Gessler, Damian D G; Schiltz, Gary S; May, Greg D; Avraham, Shulamit; Town, Christopher D; Grant, David; Nelson, Rex T

    2009-09-23

    SSWAP (Simple Semantic Web Architecture and Protocol; pronounced "swap") is an architecture, protocol, and platform for using reasoning to semantically integrate heterogeneous disparate data and services on the web. SSWAP was developed as a hybrid semantic web services technology to overcome limitations found in both pure web service technologies and pure semantic web technologies. There are currently over 2400 resources published in SSWAP. Approximately two dozen are custom-written services for QTL (Quantitative Trait Loci) and mapping data for legumes and grasses (grains). The remaining are wrappers to Nucleic Acids Research Database and Web Server entries. As an architecture, SSWAP establishes how clients (users of data, services, and ontologies), providers (suppliers of data, services, and ontologies), and discovery servers (semantic search engines) interact to allow for the description, querying, discovery, invocation, and response of semantic web services. As a protocol, SSWAP provides the vocabulary and semantics to allow clients, providers, and discovery servers to engage in semantic web services. The protocol is based on the W3C-sanctioned first-order description logic language OWL DL. As an open source platform, a discovery server running at http://sswap.info (as in to "swap info") uses the description logic reasoner Pellet to integrate semantic resources. The platform hosts an interactive guide to the protocol at http://sswap.info/protocol.jsp, developer tools at http://sswap.info/developer.jsp, and a portal to third-party ontologies at http://sswapmeet.sswap.info (a "swap meet"). SSWAP addresses the three basic requirements of a semantic web services architecture (i.e., a common syntax, shared semantic, and semantic discovery) while addressing three technology limitations common in distributed service systems: i.e., i) the fatal mutability of traditional interfaces, ii) the rigidity and fragility of static subsumption hierarchies, and iii) the

  17. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation

    Directory of Open Access Journals (Sweden)

    Triana Mugia Rahayu

    2015-06-01

    Full Text Available The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

  18. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.

    Science.gov (United States)

    Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen

    2011-01-01

    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.

  19. SPIRIT 2013 explanation and elaboration: guidance for protocols of clinical trials.

    Science.gov (United States)

    Chan, An-Wen; Tetzlaff, Jennifer M; Gøtzsche, Peter C; Altman, Douglas G; Mann, Howard; Berlin, Jesse A; Dickersin, Kay; Hróbjartsson, Asbjørn; Schulz, Kenneth F; Parulekar, Wendy R; Krleza-Jeric, Karmela; Laupacis, Andreas; Moher, David

    2013-01-08

    High quality protocols facilitate proper conduct, reporting, and external review of clinical trials. However, the completeness of trial protocols is often inadequate. To help improve the content and quality of protocols, an international group of stakeholders developed the SPIRIT 2013 Statement (Standard Protocol Items: Recommendations for Interventional Trials). The SPIRIT Statement provides guidance in the form of a checklist of recommended items to include in a clinical trial protocol. This SPIRIT 2013 Explanation and Elaboration paper provides important information to promote full understanding of the checklist recommendations. For each checklist item, we provide a rationale and detailed description; a model example from an actual protocol; and relevant references supporting its importance. We strongly recommend that this explanatory paper be used in conjunction with the SPIRIT Statement. A website of resources is also available (www.spirit-statement.org). The SPIRIT 2013 Explanation and Elaboration paper, together with the Statement, should help with the drafting of trial protocols. Complete documentation of key trial elements can facilitate transparency and protocol review for the benefit of all stakeholders.

  20. Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol

    Directory of Open Access Journals (Sweden)

    Seonho Choi

    2012-12-01

    Full Text Available A predictive-hashing based Denial-of-Service (DoS resistant multicast authentication protocol was proposed based upon predictive-hashing, one-way key chain, erasure codes, and distillation codes techniques [4, 5]. It was claimed that this new scheme should be more resistant to various types of DoS attacks, and its worst-case resource requirements were derived in terms of coarse-level system parameters including CPU times for signature verification and erasure/distillation decoding operations, attack levels, etc. To show the effectiveness of our approach and to analyze exact resource requirements in various attack scenarios with different parameter settings, we designed and implemented an attack simulator which is platformindependent. Various attack scenarios may be created with different attack types and parameters against a receiver equipped with the predictive-hashing based protocol. The design of the simulator is explained, and the simulation results are presented with detailed resource usage statistics. In addition, resistance level to various types of DoS attacks is formulated with a newly defined resistance metric. By comparing these results to those from another approach, PRABS [8], we show that the resistance level of our protocol is greatly enhanced even in the presence of many attack streams.

  1. A Forward-secure Grouping-proof Protocol for Multiple RFID Tags

    Directory of Open Access Journals (Sweden)

    Liu Ya-li

    2012-09-01

    Full Text Available Designing secure and robust grouping-proof protocols based on RFID characteristics becomes a hotspot in the research of security in Internet of Things (IOT. The proposed grouping-proof protocols recently have security and/or privacy omission and these schemes afford order-dependence by relaying message among tags through an RFID reader. In consequence, aiming at enhancing the robustness, improving scalability, reducing the computation costs on resource-constrained devices, and meanwhile combing Computational Intelligence (CI with Secure Multi-party Communication (SMC, a Forward-Secure Grouping-Proof Protocol (FSGP for multiple RFID tags based on Shamir's (, secret sharing is proposed. In comparison with the previous grouping-proof protocols, FSGP has the characteristics of forward-security and order-independence addressing the scalability issue by avoiding relaying message. Our protocol provides security enhancement, performance improvement, and meanwhile controls the computation cost, which equilibrates both security and low cost requirements for RFID tags.

  2. QoS-aware self-adaptation of communication protocols in a pervasive service middleware

    DEFF Research Database (Denmark)

    Zhang, Weishan; Hansen, Klaus Marius; Fernandes, João

    2010-01-01

    Pervasive computing is characterized by heterogeneous devices that usually have scarce resources requiring optimized usage. These devices may use different communication protocols which can be switched at runtime. As different communication protocols have different quality of service (Qo......S) properties, this motivates optimized self-adaption of protocols for devices, e.g., considering power consumption and other QoS requirements, e.g. round trip time (RTT) for service invocations, throughput, and reliability. In this paper, we present an extensible approach for self-adaptation of communication...... protocols for pervasive web services, where protocols are designed as reusable connectors and our middleware infrastructure can hide the complexity of using different communication protocols to upper layers. We also propose to use Genetic Algorithms (GAs) to find optimized configurations at runtime...

  3. Decellularization of placentas: establishing a protocol

    Directory of Open Access Journals (Sweden)

    L.C.P.C. Leonel

    2017-11-01

    Full Text Available Biological biomaterials for tissue engineering purposes can be produced through tissue and/or organ decellularization. The remaining extracellular matrix (ECM must be acellular and preserve its proteins and physical features. Placentas are organs of great interest because they are discarded after birth and present large amounts of ECM. Protocols for decellularization are tissue-specific and have not been established for canine placentas yet. This study aimed at analyzing a favorable method for decellularization of maternal and fetal portions of canine placentas. Canine placentas were subjected to ten preliminary tests to analyze the efficacy of parameters such as the type of detergents, freezing temperatures and perfusion. Two protocols were chosen for further analyses using histology, scanning electron microscopy, immunofluorescence and DNA quantification. Sodium dodecyl sulfate (SDS was the most effective detergent for cell removal. Freezing placentas before decellularization required longer periods of incubation in different detergents. Both perfusion and immersion methods were capable of removing cells. Placentas decellularized using Protocol I (1% SDS, 5 mM EDTA, 50 mM TRIS, and 0.5% antibiotic preserved the ECM structure better, but Protocol I was less efficient to remove cells and DNA content from the ECM than Protocol II (1% SDS, 5 mM EDTA, 0.05% trypsin, and 0.5% antibiotic.

  4. Quantum Information Protocols with Gaussian States of Light

    DEFF Research Database (Denmark)

    Jacobsen, Christian Scheffmann

    and hardware for secure quantum key distribution. These technologies directly exploit quantum effects, and indeed this is where they offer advantages to classical products. This thesis deals with the development and implementation of quantum information protocols that utilize the rather inexpensive resource......Quantum cryptography is widely regarded as the most mature field within the context of quantum information in the sense that its application and development has produced companies that base their products on genuine quantum mechanical principles. Examples include quantum random number generators...... of Gaussian states. A quantum information protocol is essentially a sequence of state exchanges between some number of parties and a certain ordering of quantum mechanical unitary operators performed by these parties. An example of this is the famous BB84 protocol for secret key generation, where photons...

  5. Modeling and Verification of the Bitcoin Protocol

    OpenAIRE

    Chaudhary, Kaylash; Fehnker, Ansgar; van de Pol, Jaco; Stoelinga, Marielle

    2015-01-01

    Bitcoin is a popular digital currency for online payments, realized as a decentralized peer-to-peer electronic cash system. Bitcoin keeps a ledger of all transactions; the majority of the participants decides on the correct ledger. Since there is no trusted third party to guard against double spending, and inspired by its popularity, we would like to investigate the correctness of the Bitcoin protocol. Double spending is an important threat to electronic payment systems. Double spending would...

  6. Using mobile electronic devices to deliver educational resources in developing countries.

    Science.gov (United States)

    Mazal, Jonathan Robert; Ludwig, Rebecca

    2015-01-01

    Developing countries have far fewer trained radiography professionals than developed countries, which exacerbates the limited access to imaging services. The lack of trained radiographers reflects, in part, limited availability of radiographer-specific educational resources. Historically, organizations that provided such resources in the developing world faced challenges related to the limited stock of current materials as well as expenses associated with shipping and delivery. Four mobile electronic devices (MEDs) were loaded with educational content (e-books, PDFs, and digital applications) spanning major radiography topics. The MEDs were distributed to 4 imaging departments in Ghana, India, Nepal, and Nigeria based on evidence of need for radiography-specific resources, as revealed by survey responses. A cost comparison of postal delivery vs digital delivery of educational content was performed. The effectiveness of delivering additional content via Wi-Fi transmission also was evaluated. Feedback was solicited on users' experience with the MEDs as a delivery tool for educational content. An initial average per e-book expense of $30.05, which included the cost of the device, was calculated for the MED delivery method compared with $15.56 for postal delivery of printed materials. The cost of the MED delivery method was reduced to an average of $10.05 for subsequent e-book deliveries. Additional content was successfully delivered via Wi-Fi transmission to all recipients during the 3-month follow-up period. Overall user feedback on the experience was positive, and ideas for enhancing the MED-based method were identified. Using MEDs to deliver radiography-specific educational content appears to be more cost effective than postal delivery of printed materials on a long-term basis. MEDs are more efficient for providing updates to educational materials. Customization of content to department needs, and using projector devices could enhance the usefulness of MEDs for

  7. Beyond protocols

    DEFF Research Database (Denmark)

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impact...... information on risk and the exploration of improved methods for decision making on biodiversity management. This is crucial for efficient conservation resource allocation and uptake by stakeholders and the public......., transparency and repeatability of assessments as well as the incorporation of uncertainty should all be explicitly considered. We recommend improved quality control of risk assessments through formalized peer review with clear feedback between assessors and reviewers. Alternatively, a consensus building...

  8. Energy efficient routing protocols for wireless sensor networks: comparison and future directions

    Directory of Open Access Journals (Sweden)

    Loganathan Murukesan

    2017-01-01

    Full Text Available Wireless sensor network consists of nodes with limited resources. Hence, it is important to design protocols or algorithms which increases energy efficiency in order to improve the network lifetime. In this paper, techniques used in the network layer (routing of the internet protocol stack to achieve energy efficiency are reviewed. Usually, the routing protocols are classified into four main schemes: (1 Network Structure, (2 Communication Model, (3 Topology Based, and (4 Reliable Routing. In this work, only network structure based routing protocols are reviewed due to the page constraint. Besides, this type of protocols are much popular among the researchers since they are fairly simple to implement and produce good results as presented in this paper. Also, the pros and cons of each protocols are presented. Finally, the paper concludes with possible further research directions.

  9. Success criteria for electronic medical record implementations in low-resource settings: a systematic review.

    Science.gov (United States)

    Fritz, Fleur; Tilahun, Binyam; Dugas, Martin

    2015-03-01

    Electronic medical record (EMR) systems have the potential of supporting clinical work by providing the right information at the right time to the right people and thus make efficient use of resources. This is especially important in low-resource settings where reliable data are also needed to support public health and local supporting organizations. In this systematic literature review, our objectives are to identify and collect literature about success criteria of EMR implementations in low-resource settings and to summarize them into recommendations. Our search strategy relied on PubMed queries and manual bibliography reviews. Studies were included if EMR implementations in low-resource settings were described. The extracted success criteria and measurements were summarized into 7 categories: ethical, financial, functionality, organizational, political, technical, and training. We collected 381 success criteria with 229 measurements from 47 articles out of 223 articles. Most papers were evaluations or lessons learned from African countries, published from 1999 to 2013. Almost half of the EMR systems served a specific disease area like human immunodeficiency virus (HIV). The majority of criteria that were reported dealt with the functionality, followed by organizational issues, and technical infrastructures. Sufficient training and skilled personnel were mentioned in roughly 10%. Political, ethical, and financial considerations did not play a predominant role. More evaluations based on reliable frameworks are needed. Highly reliable data handling methods, human resources and effective project management, as well as technical architecture and infrastructure are all key factors for successful EMR implementation. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  10. Electronic database of arterial aneurysms

    Directory of Open Access Journals (Sweden)

    Fabiano Luiz Erzinger

    2014-12-01

    Full Text Available Background:The creation of an electronic database facilitates the storage of information, as well as streamlines the exchange of data, making easier the exchange of knowledge for future research.Objective:To construct an electronic database containing comprehensive and up-to-date clinical and surgical data on the most common arterial aneurysms, to help advance scientific research.Methods:The most important specialist textbooks and articles found in journals and on internet databases were reviewed in order to define the basic structure of the protocol. Data were computerized using the SINPE© system for integrated electronic protocols and tested in a pilot study.Results:The data entered onto the system was first used to create a Master protocol, organized into a structure of top-level directories covering a large proportion of the content on vascular diseases as follows: patient history; physical examination; supplementary tests and examinations; diagnosis; treatment; and clinical course. By selecting items from the Master protocol, Specific protocols were then created for the 22 arterial sites most often involved by aneurysms. The program provides a method for collection of data on patients including clinical characteristics (patient history and physical examination, supplementary tests and examinations, treatments received and follow-up care after treatment. Any information of interest on these patients that is contained in the protocol can then be used to query the database and select data for studies.Conclusions:It proved possible to construct a database of clinical and surgical data on the arterial aneurysms of greatest interest and, by adapting the data to specific software, the database was integrated into the SINPE© system, thereby providing a standardized method for collection of data on these patients and tools for retrieving this information in an organized manner for use in scientific studies.

  11. A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View

    OpenAIRE

    Baraka D. Sija; Young-Hoon Goo; Kyu-Seok Shim; Huru Hasanova; Myung-Sup Kim

    2018-01-01

    A network protocol defines rules that control communications between two or more machines on the Internet, whereas Automatic Protocol Reverse Engineering (APRE) defines the way of extracting the structure of a network protocol without accessing its specifications. Enough knowledge on undocumented protocols is essential for security purposes, network policy implementation, and management of network resources. This paper reviews and analyzes a total of 39 approaches, methods, and tools towards ...

  12. Localized radio frequency communication using asynchronous transfer mode protocol

    Science.gov (United States)

    Witzke, Edward L.; Robertson, Perry J.; Pierson, Lyndon G.

    2007-08-14

    A localized wireless communication system for communication between a plurality of circuit boards, and between electronic components on the circuit boards. Transceivers are located on each circuit board and electronic component. The transceivers communicate with one another over spread spectrum radio frequencies. An asynchronous transfer mode protocol controls communication flow with asynchronous transfer mode switches located on the circuit boards.

  13. Implementasi Sinkronisasi Waktu dengan Network Time Protocol untuk Pemantauan Keamanan Aktivitas Jaringan Telekomunikasi

    Directory of Open Access Journals (Sweden)

    Ahmad Budi Setiawan

    2017-03-01

    Full Text Available Abstrak           Penyelenggara Jaringan adalah menyediakan dan atau memberikan pelayanan jaringan yang memungkinkan terselenggaranya transaksi elektronik. Setiap penyelenggara jaringan diwajibkan untuk menyelaraskan waktu dalam transaksi elektronik. Tujuan dilakukannya penyelarasan waktu adalah untuk menyediakan waktu yang standar dan menyediakan acuan waktu untuk segala bentuk transaksi elektronik dengan prinsip keakuratan dan ketertelusuran. Sistem Penyelarasan Waktu Indonesia menggunakan prinsip ketertelusuran dan prinsip keakuratan. Protokol yang digunakan dalam penyelarasan waktu server di Indonesia berbasis Network Time Protocol. Kajian ini membahas mengenai implementasi sinkronisasi waktu dengan network time protocol sebagai salah satu bentuk pemantauan keamanan jaringan telekomunikasi. Metode yang digunakan dalam kajian ini adalah naratif deskriptif mengenai implementasi sinkronisasi waktu.Hasil kajian ini adalah masukan untuk kebijakan dalam keamanan transaksi elektronik melalui sinkronisasi waktu.    Abstract Network providers are providing services or networks that enable the implementation of electronic transactions. Each network operator is required to align the time in electronic transactions. The purpose is to provide time alignment of the time standard and provide a time frame for all forms of electronic transactions with the principles of accuracy and traceability. Indonesian Time Alignment System uses the principle of traceability and accuracy principles. The protocols used in the alignment of the time server in Indonesia-based Network Time Protocol. This study discusses the implementation of time synchronization with a network time protocol as a form of telecommunications network security monitoring. The method used in this study is a descriptive narrative on the implementation of time synchronization. Results of this study are input to the policy in the security of electronic transactions through time

  14. Comparison of absorbed dose determinations using the IAEA dosimetry protocol and the ferrous sulphate dosimeter

    International Nuclear Information System (INIS)

    Mattsson, Olof

    1988-01-01

    In 1985 a comparison of different revised protocols for the dosimetry of high-energy photon and electron beams was published (Mattsson, 1985). The conclusions were that the agreement in absorbed dose to water determined using the different protocols is very good and that the agreement between ionization chamber and ferrous sulphate dosimetry is generally good. For electron beams the differences obtained with the ionization chamber and ferrous sulphate dosimeters were up to about 2%. The influence of the energy and angular distribution of the electron beams on the ionization chamber dosimetry is not fully considered in the dosimetry protocols. The basis for the ionization chamber dosimetry has recently been changed when the Bureau International des Poids et Mesures (BIPM) in 1986 changed the air-kerma standard. The reason was the adaption of the new stopping-power values reported in the ICRU Report No. 37. To achieve consistency in the ionization chamber dosimetry the interaction coefficients and correction factors given in the dosimetry protocols should also be based on the same set of stopping-power values. This is not the case with the protocols included in the comparison made by Mattsson. However, in the international code of practice by the International Atomic Energy Agency (IAEA, 1987) the new stopping-power values have been used. The formalism is the same as in most of the previous protocols. Mattsson et al. (1989) have shown that the differences in the various steps cancel out for the protocols published by NACP (1980) and by IAEA (1987) for cobalt-60 gamma quality. However, it is also of interest to investigate the influence of the new air-kerma standard and the new values on coefficients and factors given in the IAEA protocol for other beam qualities. Therefore, the data given by Mattsson (1985) have been recalculated using the new air-kerma standard and the IAEA protocol

  15. Robust Multi-unit Auction Protocol against False-name Bids

    Science.gov (United States)

    Yokoo, Makoto; Sakurai, Yuko; Matsubara, Shigeo

    This paper presents a new multi-unit auction protocol (IR protocol) that is robust against false-name bids. Internet auctions have become an integral part of Electronic Commerce and a promising field for applying agent and Artificial Intelligence technologies. Although the Internet provides an excellent infrastructure for executing auctions, the possibility of a new type of cheating called false-name bids has been pointed out. A false-name bid is a bid submitted under a fictitious name. A protocol called LDS has been developed for combinatorial auctions of multiple different items and has proven to be robust against false-name bids. Although we can modify the LDS protocol to handle multi-unit auctions, in which multiple units of an identical item are auctioned, the protocol is complicated and requires the auctioneer to carefully pre-determine the combination of bundles to obtain a high social surplus or revenue. For the auctioneer, our newly developed IR protocol is easier to use than the LDS, since the combination of bundles is automatically determined in a flexible manner according to the declared evaluation values of agents. The evaluation results show that the IR protocol can obtain a better social surplus than that obtained by the LDS protocol.

  16. Fate of clinical research studies after ethical approval--follow-up of study protocols until publication.

    Directory of Open Access Journals (Sweden)

    Anette Blümle

    Full Text Available Many clinical studies are ultimately not fully published in peer-reviewed journals. Underreporting of clinical research is wasteful and can result in biased estimates of treatment effect or harm, leading to recommendations that are inappropriate or even dangerous.We assembled a cohort of clinical studies approved 2000-2002 by the Research Ethics Committee of the University of Freiburg, Germany. Published full articles were searched in electronic databases and investigators contacted. Data on study characteristics were extracted from protocols and corresponding publications. We characterized the cohort, quantified its publication outcome and compared protocols and publications for selected aspects.Of 917 approved studies, 807 were started and 110 were not, either locally or as a whole. Of the started studies, 576 (71% were completed according to protocol, 128 (16% discontinued and 42 (5% are still ongoing; for 61 (8% there was no information about their course. We identified 782 full publications corresponding to 419 of the 807 initiated studies; the publication proportion was 52% (95% CI: 0.48-0.55. Study design was not significantly associated with subsequent publication. Multicentre status, international collaboration, large sample size and commercial or non-commercial funding were positively associated with subsequent publication. Commercial funding was mentioned in 203 (48% protocols and in 205 (49% of the publications. In most published studies (339; 81% this information corresponded between protocol and publication. Most studies were published in English (367; 88%; some in German (25; 6% or both languages (27; 6%. The local investigators were listed as (co-authors in the publications corresponding to 259 (62% studies.Half of the clinical research conducted at a large German university medical centre remains unpublished; future research is built on an incomplete database. Research resources are likely wasted as neither health care

  17. Continuous wave protocol for simultaneous polarization and optical detection of P1-center electron spin resonance

    Science.gov (United States)

    Kamp, E. J.; Carvajal, B.; Samarth, N.

    2018-01-01

    The ready optical detection and manipulation of bright nitrogen vacancy center spins in diamond plays a key role in contemporary quantum information science and quantum metrology. Other optically dark defects such as substitutional nitrogen atoms (`P1 centers') could also become potentially useful in this context if they could be as easily optically detected and manipulated. We develop a relatively straightforward continuous wave protocol that takes advantage of the dipolar coupling between nitrogen vacancy and P1 centers in type 1b diamond to detect and polarize the dark P1 spins. By combining mutual spin flip transitions with radio frequency driving, we demonstrate the simultaneous optical polarization and detection of the electron spin resonance of the P1 center. This technique should be applicable to detecting and manipulating a broad range of dark spin populations that couple to the nitrogen vacancy center via dipolar fields, allowing for quantum metrology using these spin populations.

  18. The Montreal Protocol treaty and its illuminating history of science-policy decision-making

    Science.gov (United States)

    Grady, C.

    2017-12-01

    The Montreal Protocol on Substances that Deplete the Ozone Layer, hailed as one of the most effective environmental treaties of all time, has a thirty year history of science-policy decision-making. The partnership between Parties to the Montreal Protocol and its technical assessment panels serve as a basis for understanding successes and evaluating stumbles of global environmental decision-making. Real-world environmental treaty negotiations can be highly time-sensitive, politically motivated, and resource constrained thus scientists and policymakers alike are often unable to confront the uncertainties associated with the multitude of choices. The science-policy relationship built within the framework of the Montreal Protocol has helped constrain uncertainty and inform policy decisions but has also highlighted the limitations of the use of scientific understanding in political decision-making. This talk will describe the evolution of the scientist-policymaker relationship over the history of the Montreal Protocol. Examples will illustrate how the Montreal Protocol's technical panels inform decisions of the country governments and will characterize different approaches pursued by different countries with a particular focus on the recently adopted Kigali Amendment. In addition, this talk will take a deeper dive with an analysis of the historic technical panel assessments on estimating financial resources necessary to enable compliance to the Montreal Protocol compared to the political financial decisions made through the Protocol's Multilateral Fund replenishment negotiation process. Finally, this talk will describe the useful lessons and challenges from these interactions and how they may be applicable in other environmental management frameworks across multiple scales under changing climatic conditions.

  19. Developing a protocol for managing the biophysical condition of a ...

    African Journals Online (AJOL)

    Their function will focus on the overall management of water resources on a ... for the integrated management of the biophysical component of a catchment, with ... and implement a protocol which will combine and integrate the knowledge of ...

  20. Entanglement purification and concentration of electron-spin entangled states using quantum-dot spins in optical microcavities

    International Nuclear Information System (INIS)

    Wang Chuan; Zhang Yong; Jin Guangsheng

    2011-01-01

    We present an entanglement purification protocol and an entanglement concentration protocol for electron-spin entangled states, resorting to quantum-dot spin and optical-microcavity-coupled systems. The parity-check gates (PCGs) constructed by the cavity-spin-coupling system provide a different method for the entanglement purification of electron-spin entangled states. This protocol can efficiently purify an electron ensemble in a mixed entangled state. The PCGs can also concentrate electron-spin pairs in less-entangled pure states efficiently. The proposed methods are more flexible as only single-photon detection and single-electron detection are needed.

  1. Resource management for multimedia services in high data rate wireless networks

    CERN Document Server

    Zhang, Ruonan; Pan, Jianping

    2017-01-01

    This brief offers a valuable resource on principles of quality-of-service (QoS) provisioning and the related link-layer resource management techniques for high data-rate wireless networks. The primary emphasis is on protocol modeling and analysis. It introduces media access control (MAC) protocols, standards of wireless local area networks (WLANs), wireless personal area networks (WPANs), and wireless body area networks (WBANs), discussing their key technologies, applications, and deployment scenarios. The main analytical approaches and models for performance analysis of the fundamental resource scheduling mechanisms, including the contention-based, reservation-based, and hybrid MAC, are presented. To help readers understand and evaluate system performance, the brief contains a range of simulation results. In addition, a thorough bibliography provides an additional tool. This brief is an essential resource for engineers, researchers, students, and users of wireless networks.

  2. Implementation of the AAPM Task Group 21 protocol by the Radiological Physics Center and its implications

    International Nuclear Information System (INIS)

    Gastorf, R.J.; Hanson, W.F.; Shalek, R.J.; Berkley, L.W.

    1984-01-01

    The Radiation Therapy Committee of the American Association of Physicists in Medicine appointed Task Group 21 to write a new protocol for the calibration of high-energy photon and electron therapy beams. This protocol updates the physical parameters used in the calculations and is intended to account for differences in ionization chamber design and some differences between phantom materials that were not considered in previous protocols. This paper discusses how the Radiological Physics Center (RPC) intends to implement the new protocol, the changes required in the RPC calibration techniques, and the magnitude of the change in the RPC calculations of absorbed dose resulting from the implementation of the new protocol. Although the change in the RPC absorbed-dose calculations will be only 0%-2% over the range of photon and electron energies of interest, some institutions using specific dosimetry systems may find their absorbed-dose calculations changing by 4% or more

  3. Electronic Human Resources Management (e-HRM Adoption Studies: Past and Future Research

    Directory of Open Access Journals (Sweden)

    Winarto Winarto

    2018-05-01

    Full Text Available Electronic human resource management (e-HRM systems become more widely used by profit and non-profit organization. However, the field currently lacks sound theoretical frameworks that can be useful in addressing a key issue concerning the implementation of e-HRM systems, in particular to obtain a better understanding of the factors influencing the adoption of e-HRM systems. The objective of this paper is to provide a foundation towards the development of a theoretical framework for the implementation of e-HRM systems and develop a conceptual model that would reflect the nature of e-HRM systems’ adoption through systematic literature review. Adopting Crossan and Apaydin’s procedure of systematic review, this paper investigated 21 empirical papers of electronics human resources management, then categorized them into 4 characteristics which influence the adoption; System and technology characteristics; Organizational characteristics; User/individual characteristics, and Environmental and contextual characteristics. Finally, the e-HRM adoption research framework is drawn and based on the framework; avenues for future research are discussed.   Bahasa Indonesia Abstrak: Manajemen sumber daya manusia elektronik (selanjutnya disebut dengan e-HRM semakin banyak digunakan oleh organisasi profit dan nonprofit. Namun, bidang dan topik ini belum memiliki kerangka teori yang mapan, yang dapat digunakan untuk menganalisis isu-isu terkait penerapan e-HRM, terutama mengenai faktor-faktor yang mempengaruhi adopsi sistem e-HRM. Tujuan penelitian ini adalah untuk memberikan landasan bagi pengembangan kerangka teoritis untuk implementasi sistem e-HRM dan mengembangkan model konseptual yang akan menggambarkan adopsi sistem e-HRM melalui tinjauan literatur sistematis. Mengadopsi prosedur dan metode Crossan dan Apaydin untuk melakukan telaah literatur secara sistematis, paper ini menyelidiki 21 publikasi empiris manajemen sumber daya manusia elektronik dari 2

  4. Evaluating a Serious Gaming Electronic Medication Administration Record System Among Nursing Students: Protocol for a Pragmatic Randomized Controlled Trial.

    Science.gov (United States)

    Booth, Richard; Sinclair, Barbara; McMurray, Josephine; Strudwick, Gillian; Watson, Gavan; Ladak, Hanif; Zwarenstein, Merrick; McBride, Susan; Chan, Ryan; Brennan, Laura

    2018-05-28

    Although electronic medication administration record systems have been implemented in settings where nurses work, nursing students commonly lack robust learning opportunities to practice the skills and workflow of digitalized medication administration during their formative education. As a result, nursing students' performance in administering medication facilitated by technology is often poor. Serious gaming has been recommended as a possible intervention to improve nursing students' performance with electronic medication administration in nursing education. The objectives of this study are to examine whether the use of a gamified electronic medication administration simulator (1) improves nursing students' attention to medication administration safety within simulated practice, (2) increases student self-efficacy and knowledge of the medication administration process, and (3) improves motivational and cognitive processing attributes related to student learning in a technology-enabled environment. This study comprised the development of a gamified electronic medication administration record simulator and its evaluation in 2 phases. Phase 1 consists of a prospective, pragmatic randomized controlled trial with second-year baccalaureate nursing students at a Canadian university. Phase 2 consists of qualitative focus group interviews with a cross-section of nursing student participants. The gamified medication administration simulator has been developed, and data collection is currently under way. If the gamified electronic medication administration simulator is found to be effective, it could be used to support other health professional simulated education and scaled more widely in nursing education programs. ClinicalTrials.gov NCT03219151; https://clinicaltrials.gov/show/NCT03219151 (Archived by WebCite at http://www.webcitation.org/6yjBROoDt). RR1-10.2196/9601. ©Richard Booth, Barbara Sinclair, Josephine McMurray, Gillian Strudwick, Gavan Watson, Hanif Ladak

  5. Developing Distributed System With Service Resource Oriented Architecture

    Directory of Open Access Journals (Sweden)

    Hermawan Hermawan

    2012-06-01

    Full Text Available Service Oriented Architecture is a design paradigm in software engineering with which a distributed system is built for an enterprise. This paradigm aims at providing the system as a service through a protocol in web service technology, namely Simple Object Access Protocol (SOAP. However, SOA is service level agreements of webservice. For this reason, this reasearch aims at combining SOA with Resource Oriented Architecture in order to expand scalability of services. This combination creates Sevice Resource Oriented Architecture (SROA with which a distributed system is developed that integrates services within project management software. Following this design, the software is developed according to a framework of Agile Model Driven Development which can reduce complexities of the whole process of software development.

  6. Improving Electronic Resources through Holistic Budgeting

    Science.gov (United States)

    Kusik, James P.; Vargas, Mark A.

    2009-01-01

    To establish a more direct link between its collections and the educational goals of Saint Xavier University, the Byrne Memorial Library has adopted a "holistic" approach to collection development. This article examines how traditional budget practices influenced the library's selection of resources and describes how holistic collection…

  7. Implementing a protocol for selection and prioritisation of organic ...

    African Journals Online (AJOL)

    2012-07-09

    Jul 9, 2012 ... To safeguard drinking water industry customers, it was necessary to develop a generic protocol to assist with ... This is a very important guide to assist water utilities in optimising their resources while not ..... views and experience of the various experts. ...... wastewater by an innovative biological technology.

  8. Realistic continuous-variable quantum teleportation with non-Gaussian resources

    International Nuclear Information System (INIS)

    Dell'Anno, F.; De Siena, S.; Illuminati, F.

    2010-01-01

    We present a comprehensive investigation of nonideal continuous-variable quantum teleportation implemented with entangled non-Gaussian resources. We discuss in a unified framework the main decoherence mechanisms, including imperfect Bell measurements and propagation of optical fields in lossy fibers, applying the formalism of the characteristic function. By exploiting appropriate displacement strategies, we compute analytically the success probability of teleportation for input coherent states and two classes of non-Gaussian entangled resources: two-mode squeezed Bell-like states (that include as particular cases photon-added and photon-subtracted de-Gaussified states), and two-mode squeezed catlike states. We discuss the optimization procedure on the free parameters of the non-Gaussian resources at fixed values of the squeezing and of the experimental quantities determining the inefficiencies of the nonideal protocol. It is found that non-Gaussian resources enhance significantly the efficiency of teleportation and are more robust against decoherence than the corresponding Gaussian ones. Partial information on the alphabet of input states allows further significant improvement in the performance of the nonideal teleportation protocol.

  9. Informal and formal trail monitoring protocols and baseline conditions: Acadia National Park

    Science.gov (United States)

    Marion, Jeffrey L.; Wimpey, Jeremy F.; Park, L.

    2011-01-01

    At Acadia National Park, changing visitor use levels and patterns have contributed to an increasing degree of visitor use impacts to natural and cultural resources. To better understand the extent and severity of these resource impacts and identify effective management techniques, the park sponsored this research to develop monitoring protocols, collect baseline data, and identify suggestions for management strategies. Formal and informal trails were surveyed and their resource conditions were assessed and characterized to support park planning and management decision-making.

  10. Performance Analysis of Secure and Private Billing Protocols for Smart Metering

    Directory of Open Access Journals (Sweden)

    Tom Eccles

    2017-11-01

    Full Text Available Traditional utility metering is to be replaced by smart metering. Smart metering enables fine-grained utility consumption measurements. These fine-grained measurements raise privacy concerns due to the lifestyle information which can be inferred from the precise time at which utilities were consumed. This paper outlines and compares two privacy-respecting time of use billing protocols for smart metering and investigates their performance on a variety of hardware. These protocols protect the privacy of customers by never transmitting the fine-grained utility readings outside of the customer’s home network. One protocol favors complexity on the trusted smart meter hardware while the other uses homomorphic commitments to offload computation to a third device. Both protocols are designed to operate on top of existing cryptographic secure channel protocols in place on smart meters. Proof of concept software implementations of these protocols have been written and their suitability for real world application to low-performance smart meter hardware is discussed. These protocols may also have application to other privacy conscious aggregation systems, such as electronic voting.

  11. Computational Methodologies for Developing Structure–Morphology–Performance Relationships in Organic Solar Cells: A Protocol Review

    KAUST Repository

    Do, Khanh

    2016-09-08

    We outline a step-by-step protocol that incorporates a number of theoretical and computational methodologies to evaluate the structural and electronic properties of pi-conjugated semiconducting materials in the condensed phase. Our focus is on methodologies appropriate for the characterization, at the molecular level, of the morphology in blend systems consisting of an electron donor and electron acceptor, of importance for understanding the performance properties of bulk-heterojunction organic solar cells. The protocol is formulated as an introductory manual for investigators who aim to study the bulk-heterojunction morphology in molecular details, thereby facilitating the development of structure morphology property relationships when used in tandem with experimental results.

  12. Review of material recovery from used electric and electronic equipment-alternative options for resource conservation.

    Science.gov (United States)

    Friege, Henning

    2012-09-01

    For waste from electric and electronic equipment, the WEEE Directive stipulates the separate collection of electric and electronic waste. As to new electric and electronic devices, the Restriction of Hazardous Substances (RoHS) Directive bans the use of certain chemicals dangerous for man and environment. From the implementation of the WEEE directive, many unsolved problems have been documented: poor collection success, emission of dangerous substances during collection and recycling, irretrievable loss of valuable metals among others. As to RoHS, data from the literature show a satisfying success. The problems identified in the process can be reduced to some basic dilemmas at the borders between waste management, product policy and chemical safety. The objectives of the WEEE Directive and the specific targets for use and recycling of appliances are not consistent. There is no focus on scarce resources. Extended producer responsibility is not sufficient to guarantee sustainable waste management. Waste management reaches its limits due to problems of implementation but also due to physical laws. A holistic approach is necessary looking at all branch points and sinks in the stream of used products and waste from electric and electronic equipment. This may be done with respect to the general rules for sustainable management of material streams covering the three dimensions of sustainable policy. The relationships between the players in the field of electric and electronic devices have to be taken into account. Most of the problems identified in the implementation process will not be solved by the current amendment of the WEEE Directive.

  13. Charting a Course through CORAL: Texas A&M University Libraries' Experience Implementing an Open-Source Electronic Resources Management System

    Science.gov (United States)

    Hartnett, Eric; Beh, Eugenia; Resnick, Taryn; Ugaz, Ana; Tabacaru, Simona

    2013-01-01

    In 2010, after two previous unsuccessful attempts at electronic resources management system (ERMS) implementation, Texas A&M University (TAMU) Libraries set out once again to find an ERMS that would fit its needs. After surveying the field, TAMU Libraries selected the University of Notre Dame Hesburgh Libraries-developed, open-source ERMS,…

  14. Protection of pregnant women at work in Switzerland: practices, obstacles and resources. A mixed-methods study protocol.

    Science.gov (United States)

    Krief, Peggy; Zellweger, Alessia; Politis Mercier, Maria-Pia; Danuser, Brigitta; Wild, Pascal; Zenoni, Michela; Probst, Isabelle

    2018-06-14

    Like most industrialised countries, Switzerland has introduced legislation to protect the health of pregnant workers and their unborn children from workplace exposure. This legislation provides for a risk assessment, adaptations to workplaces and, if the danger is not eliminated, preventive leave (prescribed by a gynaecologist). This study's first objective is to analyse the degree to which companies, gynaecologists and midwives implement the law. Its second objective is to understand the obstacles and resources of this implementation, with a focus on how relevant stakeholders perceive protective measures and their involvement with them. Data will be collected using mixed methods: (1) online questionnaires for gynaecologists and midwives; telephone questionnaires with company human resources (HR) managers in the healthcare and food production sectors; (2a) case studies of 6-8 companies in each sector, including interviews with stakeholders such as women workers, HR managers and occupational health physicians; (2b) two focus groups, one involving occupational physicians and hygienists, one involving labour inspectors.Quantitative data will be analysed statistically using STATA software V.15. Qualitative data will be transcribed and thematically analysed using MaxQDA software. The Human Research Ethics Committee of the Canton Vaud (CER-VD) has certified that this research study protocol falls outside of the field of application of the Swiss Federal Act on Research Involving Humans.The publications and recommendations resulting from this study will form the starting point for future improvements to the protection of pregnant women at work and their unborn children.This study started in February 2017 and will continue until January 2020. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  15. A Standardized Protocol for the Prospective Follow-Up of Cleft Lip and Palate Patients.

    Science.gov (United States)

    Salimi, Negar; Jolanta, Aleksejūnienė; Edwin, Yen; Angelina, Loo

    2018-01-01

    To develop a standardized all-encompassing protocol for the assessment of cleft lip and palate patients with clinical and research implications. Electronic database searches were conducted and 13 major cleft centers worldwide were contacted in order to prepare for the development of the protocol. In preparation, the available evidence was reviewed and potential fistula-related risk determinants from 4 different domains were identified. No standardized protocol for the assessment of cleft patients could be found in any of the electronic database searches that were conducted. Interviews with representatives from several major centers revealed that the majority of centers do not have a standardized comprehensive strategy for the reporting and follow-up of cleft lip and palate patients. The protocol was developed and consisted of the following domains of determinants: (1) the sociodemographic domain, (2) the cleft defect domain, (3) the surgery domain, and (4) the fistula domain. The proposed protocol has the potential to enhance the quality of patient care by ensuring that multiple patient-related aspects are consistently reported. It may also facilitate future multicenter research, which could contribute to the reduction of fistula occurrence in cleft lip and palate patients.

  16. Designing a model of electronic human resource management’s implementation at the Ministry of Communications and Information Technology

    Directory of Open Access Journals (Sweden)

    Mirali Seyednaghavi

    2017-06-01

    Full Text Available : In the first phase of this study a model for electronic human resource management in government agencies based on new public services was explored by using software MAXQDA, then in the second phase, relationship between the elements of the theory were tested using software Smart PLS2. So the aim of this study is to design a model of electronic human resource management’s implementation at the Ministry of Communications and Information Technology. In this regard, according to Strauss and Corbin’s structured plan, five hypotheses were tested. Quantitative data analysis indicates that the pressures of the policies and global perspectives cause to move toward e-HRM. Among the contextual conditions macro structural mechanisms, considerations of actors, governance considerations have a significant impact on the strategy of new public services and therefore lead to the consequences of its implementation in public organizations. The findings suggest that e-HRM does not have a positive and meaningful impact on new public services, and in our country, although the recent political developments have somehow removed the gap between public policy makers, administrators, and the public, but there is still a long way to go.

  17. Packet traffic features of IPv6 and IPv4 protocol traffic

    OpenAIRE

    ÇİFLİKLİ, Cebrail; GEZER, Ali; ÖZŞAHİN, Abdullah Tuncay

    2012-01-01

    Nowadays, the IPv6 protocol is in a transition phase in operational networks. The ratio of its traffic volume is increasing day by day. The many provided facilities for IPv6 connection increasethe total IPv6 traffic load. IPv6-over-IPv4 tunnels, pilot programsto provide IPv6 connections, IPv6/IPv4 dual stack operating systems,and free IPv6 tunnel brokers cause the IPv6 protocol to expand quickly. For efficient resource utilization, the characteristics of network traffic should be determ...

  18. Declarative Specification of Fault Tolerant Auction Protocols: The English Auction Case Study

    DEFF Research Database (Denmark)

    Dragoni, Nicola; Gaspari, Mauro

    2012-01-01

    Auction mechanisms are nowadays widely used in electronic commerce Web sites for buying and selling items among different users. The increasing importance of auction protocols in the negotiation phase is not limited to online marketplaces. In fact, the wide applicability of auctions as resource‐a...... about the specification of an English Auction protocol which tolerate crashes of bidding agents and we discuss its properties....

  19. Including 10-Gigabit-capable Passive Optical Network under End-to-End Generalized Multi-Protocol Label Switching Provisioned Quality of Service

    DEFF Research Database (Denmark)

    Brewka, Lukasz Jerzy; Gavler, Anders; Wessing, Henrik

    2012-01-01

    of the network where quality of service signaling is bridged. This article proposes strategies for generalized multi-protocol label switching control over next emerging passive optical network standard, i.e., the 10-gigabit-capable passive optical network. Node management and resource allocation approaches...... are discussed, and possible issues are raised. The analysis shows that consideration of a 10-gigabit-capable passive optical network as a generalized multi-protocol label switching controlled domain is valid and may advance end-to-end quality of service provisioning for passive optical network based customers.......End-to-end quality of service provisioning is still a challenging task despite many years of research and development in this area. Considering a generalized multi-protocol label switching based core/metro network and resource reservation protocol capable home gateways, it is the access part...

  20. Resource Discovery in Activity-Based Sensor Networks

    DEFF Research Database (Denmark)

    Bucur, Doina; Bardram, Jakob

    This paper proposes a service discovery protocol for sensor networks that is specifically tailored for use in humancentered pervasive environments. It uses the high-level concept of computational activities (as logical bundles of data and resources) to give sensors in Activity-Based Sensor Networks...... (ABSNs) knowledge about their usage even at the network layer. ABSN redesigns classical network-level service discovery protocols to include and use this logical structuring of the network for a more practically applicable service discovery scheme. Noting that in practical settings activity-based sensor...

  1. Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-06-01

    Full Text Available Wireless sensor networks (WSNs consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC for WSNs. However, it turned out that Yeh et al.’s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.’s protocol. However, Shi et al.’s improvement introduces other security weaknesses. In this paper, we show that Shi et al.’s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  2. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography.

    Science.gov (United States)

    Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho

    2014-06-10

    Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  3. The module of methodical support in system of electronic educational resources as the innovative element of the modern maintenance of formation

    Directory of Open Access Journals (Sweden)

    Ольга Николаевна Крылова

    2009-06-01

    Full Text Available The article introduces some results of research, which were devoted to evaluation of tearches' mobility to introduce innovations in the contents of education. The author considers innovative potential of modules of the methodical support for system of electronic educational resources.

  4. On-chip COMA cache-coherence protocol for microgrids of microthreaded cores

    NARCIS (Netherlands)

    Zhang, L.; Jesshope, C.

    2008-01-01

    This paper describes an on-chip COMA cache coherency protocol to support the microthread model of concurrent program composition. The model gives a sound basis for building multi-core computers as it captures concurrency, abstracts communication and identifies resources, such as processor groups

  5. Impact of Electronic Resources and Usage in Academic Libraries in Ghana: Evidence from Koforidua Polytechnic & All Nations University College, Ghana

    Science.gov (United States)

    Akussah, Maxwell; Asante, Edward; Adu-Sarkodee, Rosemary

    2015-01-01

    The study investigates the relationship between impact of electronic resources and its usage in academic libraries in Ghana: evidence from Koforidua Polytechnic & All Nations University College, Ghana. The study was a quantitative approach using questionnaire to gather data and information. A valid response rate of 58.5% was assumed. SPSS…

  6. EMS Adherence to a Pre-hospital Cervical Spine Clearance Protocol

    Directory of Open Access Journals (Sweden)

    Johnson, David

    2001-10-01

    Full Text Available Purpose: To determine the degree of adherence to a cervical spine (c-spine clearance protocol by pre-hospital Emergency Medical Services (EMS personnel by both self-assessment and receiving hospital assessment, to describe deviations from the protocol, and to determine if the rate of compliance by paramedic self-assessment differed from receiving hospital assessment. Methods: A retrospective sample of pre-hospital (consecutive series and receiving hospital (convenience sample assessments of the compliance with and appropriateness of c-spine immobilization. The c-spine clearance protocol was implemented for Orange County EMS just prior to the April-November 1999 data collection period. Results: We collected 396 pre-hospital and 162 receiving hospital data forms. From the pre-hospital data sheet. the percentage deviation from the protocol was 4.096 (16/396. Only one out of 16 cases that did not comply with the protocol was due to over immobilization (0.2%. The remaining 15 cases were under immobilized, according to protocol. Nine of the under immobilized cases (66% that should have been placed in c-spine precautions met physical assessment criteria in the protocol, while the other five cases met mechanism of injury criteria. The rate of deviations from protocol did not differ over time. The receiving hospital identified 8.0% (13/162; 6/16 over immobilized, 7/16 under immobilized of patients with deviations from the protocol; none was determined to have actual c-spine injury. Conclusion: The implementation of a pre-hospital c-spine clearance protocol in Orange County was associated with a moderate overall adherence rate (96% from the pre-hospital perspective, and 92% from the hospital perspective, p=.08 for the two evaluation methods. Most patients who deviated from protocol were under immobilized, but no c-spine injuries were missed. The rate of over immobilization was better than previously reported, implying a saving of resources.

  7. Sponge-Like: A New Protocol for Preparing Bacterial Ghosts

    Directory of Open Access Journals (Sweden)

    Amro A. Amara

    2013-01-01

    Full Text Available Bacterial Ghosts (BGs received an increasing interest in the recent years for their promising medicinal and pharmaceutical applications. In this study, for the first time we introduce a new protocol for BGs production. E. coli BL21 (DE3 pLysS (Promega was used as a model to establish a general protocol for BGs preparation. The protocol is based on using active chemical compounds in concentrations less than the Minimum Inhibition Concentration (MIC. Those chemical compounds are SDS, NaOH, and H2O2. Plackett-Burman experimental design was used to map the best conditions for BGs production. Normal and electronic microscopes were used to evaluate the BGs quality (BGQ. Spectrophotometer was used to evaluate the amount of the released protein and DNA. Agarose gel electrophoresis was used to determine the existence of any residue of DNA after each BGs preparation. Viable cells, which existed after running this protocol, were subjected to lysis by inducing the lysozyme gene carried on pLysS plasmid. This protocol is able to produce BGs that can be used in different biotechnological applications.

  8. Electronic data collection for the analysis of surgical maneuvers on patients submitted to rhinoplasty

    Science.gov (United States)

    Berger, Cezar; Freitas, Renato; Malafaia, Osvaldo; Pinto, José Simão de Paula; Mocellin, Marcos; Macedo, Evaldo; Fagundes, Marina Serrato Coelho

    2012-01-01

    Summary Introduction: In the health field, computerization has become increasingly necessary in professional practice, since it facilitates data recovery and assists in the development of research with greater scientific rigor. Objective: the present work aimed to develop, apply, and validate specific electronic protocols for patients referred for rhinoplasty. Methods: The prospective research had 3 stages: (1) preparation of theoretical data bases; (2) creation of a master protocol using Integrated System of Electronic Protocol (SINPE©); and (3) elaboration, application, and validation of a specific protocol for the nose and sinuses regarding rhinoplasty. Results: After the preparation of the master protocol, which dealt with the entire field of otorhinolaryngology, we idealized a specific protocol containing all matters related to the patient. In particular, the aesthetic and functional nasal complaints referred for surgical treatment (i.e., rhinoplasty) were organized into 6 main hierarchical categories: anamnesis, physical examination, complementary exams, diagnosis, treatment, and outcome. This protocol utilized these categories and their sub-items: finality; access; surgical maneuvers on the nasal dorsum, tip, and base; clinical evolution after 3, 6, and 12 months; revisional surgery; and quantitative and qualitative evaluations. Conclusion: The developed electronic-specific protocol is feasible and important for information registration from patients referred to rhinoplasty. PMID:25991979

  9. Electronic data collection for the analysis of surgical maneuvers on patients submitted to rhinoplasty

    Directory of Open Access Journals (Sweden)

    Berger, Cezar

    2012-01-01

    Full Text Available Introduction: In the health field, computerization has become increasingly necessary in professional practice, since it facilitates data recovery and assists in the development of research with greater scientific rigor. Objective: the present work aimed to develop, apply, and validate specific electronic protocols for patients referred for rhinoplasty. Methods: The prospective research had 3 stages: (1 preparation of theoretical data bases; (2 creation of a master protocol using Integrated System of Electronic Protocol (SINPE©; and (3 elaboration, application, and validation of a specific protocol for the nose and sinuses regarding rhinoplasty. Results: After the preparation of the master protocol, which dealt with the entire field of otorhinolaryngology, we idealized a specific protocol containing all matters related to the patient. In particular, the aesthetic and functional nasal complaints referred for surgical treatment (i.e., rhinoplasty were organized into 6 main hierarchical categories: anamnesis, physical examination, complementary exams, diagnosis, treatment, and outcome. This protocol utilized these categories and their sub-items: finality; access; surgical maneuvers on the nasal dorsum, tip, and base; clinical evolution after 3, 6, and 12 months; revisional surgery; and quantitative and qualitative evaluations. Conclusion: The developed electronic-specific protocol is feasible and important for information registration from patients referred to rhinoplasty.

  10. Extending a HSF-enabled open-source real-time operating system with resource sharing

    NARCIS (Netherlands)

    Heuvel, van den M.M.H.P.; Bril, R.J.; Lukkien, J.J.; Behnam, M.; Petters, S.M.; Zijlstra, P.

    2010-01-01

    Hierarchical scheduling frameworks (HSFs) provide means for composing complex real-time systems from well-defined, independently analyzed subsystems. To support resource sharing within two-level, fixed priority scheduled HSFs, two synchronization protocols based on the stack resource policy (SRP)

  11. A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View

    Directory of Open Access Journals (Sweden)

    Baraka D. Sija

    2018-01-01

    Full Text Available A network protocol defines rules that control communications between two or more machines on the Internet, whereas Automatic Protocol Reverse Engineering (APRE defines the way of extracting the structure of a network protocol without accessing its specifications. Enough knowledge on undocumented protocols is essential for security purposes, network policy implementation, and management of network resources. This paper reviews and analyzes a total of 39 approaches, methods, and tools towards Protocol Reverse Engineering (PRE and classifies them into four divisions, approaches that reverse engineer protocol finite state machines, protocol formats, and both protocol finite state machines and protocol formats to approaches that focus directly on neither reverse engineering protocol formats nor protocol finite state machines. The efficiency of all approaches’ outputs based on their selected inputs is analyzed in general along with appropriate reverse engineering inputs format. Additionally, we present discussion and extended classification in terms of automated to manual approaches, known and novel categories of reverse engineered protocols, and a literature of reverse engineered protocols in relation to the seven layers’ OSI (Open Systems Interconnection model.

  12. Electronic nicotine delivery devices, and their impact on health and patterns of tobacco use: a systematic review protocol.

    Science.gov (United States)

    Glasser, Allison M; Cobb, Caroline O; Teplitskaya, Lyubov; Ganz, Ollie; Katz, Lauren; Rose, Shyanika W; Feirman, Shari; Villanti, Andrea C

    2015-04-29

    E-cigarettes or electronic nicotine delivery systems (ENDS) have recently attracted considerable attention. Among some individuals there is strong debate and a polarisation of views about the public health benefits versus harms of ENDS. With little regulation, the ENDS market is evolving, and new products are introduced and marketed constantly. Rapid developments in manufacturing, marketing and consumer domains related to ENDS will warrant frequent re-evaluation, based on the state of the evolving science. The purpose of this article is to describe a protocol for an ongoing comprehensive review of the published scientific literature on ENDS. We will undertake a systematic review of published empirical research literature on ENDS using the National Library of Medicine's PubMed electronic database to search for relevant articles. Data from included studies will be extracted into a standardised form, tables with study details and key outcomes for each article will be created, and studies will be synthesised qualitatively. This review synthesises published literature and presents no primary data. Therefore, no ethical approval is required for this study. Subsequent papers will provide greater detail on results, within select categories, that represent gaps in the literature base. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  13. Utilization of Electronic Information Resources by Undergraduate Students of University of Ibadan: A Case Study of Social Sciences and Education

    Science.gov (United States)

    Owolabi, Sola; Idowu, Oluwafemi A.; Okocha, Foluke; Ogundare, Atinuke Omotayo

    2016-01-01

    The study evaluated utilization of electronic information resources by undergraduates in the Faculties of Education and the Social Sciences in University of Ibadan. The study adopted a descriptive survey design with a study population of 1872 undergraduates in the Faculties of Education and the Social Sciences in University of Ibadan, from which a…

  14. Microbial Genome Analysis and Comparisons: Web-based Protocols and Resources

    Science.gov (United States)

    Fully annotated genome sequences of many microorganisms are publicly available as a resource. However, in-depth analysis of these genomes using specialized tools is required to derive meaningful information. We describe here the utility of three powerful publicly available genome databases and ana...

  15. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    Science.gov (United States)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-06-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  16. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    Science.gov (United States)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-03-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  17. Test Protocols for Advanced Inverter Interoperability Functions - Appendices

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, Jay Dean [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gonzalez, Sigifredo [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ralph, Mark E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ellis, Abraham [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Broderick, Robert Joseph [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2013-11-01

    Distributed energy resources (DER) such as photovoltaic (PV) systems, when deployed in a large scale, are capable of influencing significantly the operation of power systems. Looking to the future, stakeholders are working on standards to make it possible to manage the potentially complex interactions between DER and the power system. In 2009, the Electric Power Research Institute (EPRI), Sandia National Laboratories (SNL) with the U.S. Department of Energy (DOE), and the Solar Electric Power Association (SEPA) initiated a large industry collaborative to identify and standardize definitions for a set of DER grid support functions. While the initial effort concentrated on grid-tied PV inverters and energy storage systems, the concepts have applicability to all DER. A partial product of this on-going effort is a reference definitions document (IEC TR 61850-90-7, Object models for power converters in distributed energy resources (DER) systems) that has become a basis for expansion of related International Electrotechnical Commission (IEC) standards, and is supported by US National Institute of Standards and Technology (NIST) Smart Grid Interoperability Panel (SGIP). Some industry-led organizations advancing communications protocols have also embraced this work. As standards continue to evolve, it is necessary to develop test protocols to independently verify that the inverters are properly executing the advanced functions. Interoperability is assured by establishing common definitions for the functions and a method to test compliance with operational requirements. This document describes test protocols developed by SNL to evaluate the electrical performance and operational capabilities of PV inverters and energy storage, as described in IEC TR 61850-90-7. While many of these functions are not now required by existing grid codes or may not be widely available commercially, the industry is rapidly moving in that direction. Interoperability issues are already apparent as

  18. Optical protocols for advanced spacecraft networks

    Science.gov (United States)

    Bergman, Larry A.

    1991-01-01

    Most present day fiber optic networks are in fact extensions of copper wire networks. As a result, their speed is still limited by electronics even though optics is capable of running three orders of magnitude faster. Also, the fact that photons do not interact with one another (as electrons do) provides optical communication systems with some unique properties or new functionality that is not readily taken advantage of with conventional approaches. Some of the motivation for implementing network protocols in the optical domain, a few possible approaches including optical code-division multiple-access (CDMA), and how this class of networks can extend the technology life cycle of the Space Station Freedom (SSF) with increased performance and functionality are described.

  19. Optical protocols for advanced spacecraft networks

    Science.gov (United States)

    Bergman, Larry A.

    1991-09-01

    Most present day fiber optic networks are in fact extensions of copper wire networks. As a result, their speed is still limited by electronics even though optics is capable of running three orders of magnitude faster. Also, the fact that photons do not interact with one another (as electrons do) provides optical communication systems with some unique properties or new functionality that is not readily taken advantage of with conventional approaches. Some of the motivation for implementing network protocols in the optical domain, a few possible approaches including optical code-division multiple-access (CDMA), and how this class of networks can extend the technology life cycle of the Space Station Freedom (SSF) with increased performance and functionality are described.

  20. Shaping the Electronic Library--The UW-Madison Approach.

    Science.gov (United States)

    Dean, Charles W., Ed.; Frazier, Ken; Pope, Nolan F.; Gorman, Peter C.; Dentinger, Sue; Boston, Jeanne; Phillips, Hugh; Daggett, Steven C.; Lundquist, Mitch; McClung, Mark; Riley, Curran; Allan, Craig; Waugh, David

    1998-01-01

    This special theme section describes the University of Wisconsin-Madison's experience building its Electronic Library. Highlights include integrating resources and services; the administrative framework; the public electronic library, including electronic publishing capability and access to World Wide Web-based and other electronic resources;…

  1. A mixed methods protocol to evaluate the effect and cost-effectiveness of an Integrated electronic Diagnosis Approach (IeDA) for the management of childhood illnesses at primary health facilities in Burkina Faso.

    Science.gov (United States)

    Blanchet, Karl; Lewis, James J; Pozo-Martin, Francisco; Satouro, Arsene; Somda, Serge; Ilboudo, Patrick; Sarrassat, Sophie; Cousens, Simon

    2016-08-04

    Burkina Faso introduced the Integrated Management of Childhood Illnesses (IMCI) strategy in 2003. However, an evaluation conducted in 2013 found that only 28 % of children were assessed for three danger signs as recommended by IMCI, and only 15 % of children were correctly classified. About 30 % of children were correctly prescribed with an antibiotic for suspected pneumonia or oral rehydration salts (ORS) for diarrhoea, and 40 % were correctly referred. Recent advances in information and communication technologies (ICT) and use of electronic clinical protocols hold the potential to transform healthcare delivery in low-income countries. However, no evidence is available on the effect of ICT on adherence to IMCI. This paper describes the research protocol of a mixed methods study that aims to measure the effect of the Integrated electronic Diagnosis Approach innovation (an electronic IMCI protocol provided to nurses) in two regions of Burkina Faso. The study combines a stepped-wedge trial, a realistic evaluation and an economic study in order to capture the effect of the innovation after its introduction on the level of adherence, cost and acceptability. The main challenge is to interconnect the three substudies. In integrating outcome, process and cost data, we focus on three key questions: (i) How does the effectiveness and the cost of the intervention vary by type of health worker and type of health centre? (ii) What is the impact of changes in the content, coverage and quality of the IeDA intervention on adherence and cost-effectiveness? (iii) What mechanisms of change (including costs) might explain the relationship between the IeDA intervention and adherence? Clinicaltrials.gov, NCT02341469 .

  2. Energy Aware GPSR Routing Protocol in a Wireless Sensor Network ...

    African Journals Online (AJOL)

    Energy is the scarce resource in wireless sensor networks (WSNs), and it determines the lifetime of WSNs. For this reason, WSN algorithms and routing protocols should be selected in a manner which fulfills these energy requirements. This paper presents a solution to increase the lifetime of WSNs by decreasing their ...

  3. Insecurity of position-based quantum-cryptography protocols against entanglement attacks

    International Nuclear Information System (INIS)

    Lau, Hoi-Kwan; Lo, Hoi-Kwong

    2011-01-01

    Recently, position-based quantum cryptography has been claimed to be unconditionally secure. On the contrary, here we show that the existing proposals for position-based quantum cryptography are, in fact, insecure if entanglement is shared among two adversaries. Specifically, we demonstrate how the adversaries can incorporate ideas of quantum teleportation and quantum secret sharing to compromise the security with certainty. The common flaw to all current protocols is that the Pauli operators always map a codeword to a codeword (up to an irrelevant overall phase). We propose a modified scheme lacking this property in which the same cheating strategy used to undermine the previous protocols can succeed with a rate of at most 85%. We prove the modified protocol is secure when the shared quantum resource between the adversaries is a two- or three-level system.

  4. ADAPTIVE GOSSIP BASED PROTOCOL FOR ENERGY EFFICIENT MOBILE ADHOC NETWORK

    Directory of Open Access Journals (Sweden)

    S. Rajeswari

    2012-03-01

    Full Text Available In Gossip Sleep Protocol, network performance is enhanced based on energy resource. But energy conservation is achieved with the reduced throughput. In this paper, it has been proposed a new Protocol for Mobile Ad hoc Network to achieve reliability with energy conservation. Based on the probability (p values, the value of sleep nodes is fixed initially. The probability value can be adaptively adjusted by Remote Activated Switch during the transmission process. The adaptiveness of gossiping probability is determined by the Packet Delivery Ratio. For performance comparison, we have taken Routing overhead, Packet Delivery Ratio, Number of dropped packets and Energy consumption with the increasing number of forwarding nodes. We used UDP based traffic models to analyze the performance of this protocol. We analyzed TCP based traffic models for average end to end delay. We have used the NS-2 simulator.

  5. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  6. The use of quality benchmarking in assessing web resources for the dermatology virtual branch library of the National electronic Library for Health (NeLH).

    Science.gov (United States)

    Kamel Boulos, M N; Roudsari, A V; Gordon, C; Muir Gray, J A

    2001-01-01

    In 1998, the U.K. National Health Service Information for Health Strategy proposed the implementation of a National electronic Library for Health to provide clinicians, healthcare managers and planners, patients and the public with easy, round the clock access to high quality, up-to-date electronic information on health and healthcare. The Virtual Branch Libraries are among the most important components of the National electronic Library for Health. They aim at creating online knowledge based communities, each concerned with some specific clinical and other health-related topics. This study is about the envisaged Dermatology Virtual Branch Libraries of the National electronic Library for Health. It aims at selecting suitable dermatology Web resources for inclusion in the forthcoming Virtual Branch Libraries after establishing preliminary quality benchmarking rules for this task. Psoriasis, being a common dermatological condition, has been chosen as a starting point. Because quality is a principal concern of the National electronic Library for Health, the study includes a review of the major quality benchmarking systems available today for assessing health-related Web sites. The methodology of developing a quality benchmarking system has been also reviewed. Aided by metasearch Web tools, candidate resources were hand-selected in light of the reviewed benchmarking systems and specific criteria set by the authors. Over 90 professional and patient-oriented Web resources on psoriasis and dermatology in general are suggested for inclusion in the forthcoming Dermatology Virtual Branch Libraries. The idea of an all-in knowledge-hallmarking instrument for the National electronic Library for Health is also proposed based on the reviewed quality benchmarking systems. Skilled, methodical, organized human reviewing, selection and filtering based on well-defined quality appraisal criteria seems likely to be the key ingredient in the envisaged National electronic Library for

  7. There is a Relationship between Resource Expenditures and Reference Transactions in Academic Libraries. A Review of: Dubnjakovic, A. (2012. Electronic resource expenditure and the decline in reference transaction statistics in academic libraries. Journal of Academic Librarianship, 38(2, 94-100. doi:10.1016/j.acalib.2012.01.001

    Directory of Open Access Journals (Sweden)

    Annie M. Hughes

    2013-03-01

    Full Text Available Objective – To provide an analysis of the impact of expenditures on electronic resourcesand gate counts on the increase or decrease in reference transactions.Design – Analysis of results of existing survey data from the National Center for Educational Statistics (NCES 2006 Academic Library Survey(ALS.Setting – Academic libraries in the United States.Subjects – 3925 academic library respondents.Methods – The author chose to use survey data collected from the 2006 ALS conducted bythe NCES. The survey included data on various topics related to academic libraries, but in the case of this study, the author chose to analyze three of the 193 variables included. The three variables: electronic books expenditure, computer hardware and software, and expenditures on bibliographic utilities, were combined into one variable called electronic resource expenditure. Gate counts were also considered as a variable. Electronic resource expenditure was also split as a variable into three groups: low, medium, and high. Multiple regression analysis and general linear modeling, along with tests of reliability, were employed. Main Results – The author determined that low, medium, and high spenders with regard to electronic resources exhibited differences in gate counts, and gate counts have an effect on reference transactions in any given week. Gate counts tend to not have much of an effect on reference transactions for the higher spenders, and higher spenders tend to have a higher number of reference transactions overall. Low spenders have lower gate counts and also a lower amount of reference transactions.Conclusion – The findings from this study show that academic libraries spending more on electronic resources also tend to have an increase with regard to reference transactions. The author also concludes that library spaces are no longer the determining factor with regard to number of reference transactions. Spending more on electronic resources is

  8. Electronic resources access and usage among the postgraduates of ...

    African Journals Online (AJOL)

    ... and usage among the postgraduates of a Nigerian University of Technology. ... faced by postgraduates in using e-resources include takes too much time to find, ... Resources, Access, Use, Postgraduat, Students, University, Technology, Nigeria ... By Country · List All Titles · Free To Read Titles This Journal is Open Access.

  9. SPECT/CT workflow and imaging protocols

    Energy Technology Data Exchange (ETDEWEB)

    Beckers, Catherine [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Hustinx, Roland [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Domaine Universitaire du Sart Tilman, Service de Medecine Nucleaire et Imagerie Oncologique, CHU de Liege, Liege (Belgium)

    2014-05-15

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  10. SPECT/CT workflow and imaging protocols

    International Nuclear Information System (INIS)

    Beckers, Catherine; Hustinx, Roland

    2014-01-01

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  11. Long Term Resource Monitoring Program procedures: fish monitoring

    Science.gov (United States)

    Ratcliff, Eric N.; Glittinger, Eric J.; O'Hara, T. Matt; Ickes, Brian S.

    2014-01-01

    This manual constitutes the second revision of the U.S. Army Corps of Engineers’ Upper Mississippi River Restoration-Environmental Management Program (UMRR-EMP) Long Term Resource Monitoring Program (LTRMP) element Fish Procedures Manual. The original (1988) manual merged and expanded on ideas and recommendations related to Upper Mississippi River fish sampling presented in several early documents. The first revision to the manual was made in 1995 reflecting important protocol changes, such as the adoption of a stratified random sampling design. The 1995 procedures manual has been an important document through the years and has been cited in many reports and scientific manuscripts. The resulting data collected by the LTRMP fish component represent the largest dataset on fish within the Upper Mississippi River System (UMRS) with more than 44,000 collections of approximately 5.7 million fish. The goal of this revision of the procedures manual is to document changes in LTRMP fish sampling procedures since 1995. Refinements to sampling methods become necessary as monitoring programs mature. Possible refinements are identified through field experiences (e.g., sampling techniques and safety protocols), data analysis (e.g., planned and studied gear efficiencies and reallocations of effort), and technological advances (e.g., electronic data entry). Other changes may be required because of financial necessity (i.e., unplanned effort reductions). This version of the LTRMP fish monitoring manual describes the most current (2014) procedures of the LTRMP fish component.

  12. Dynamic federations: storage aggregation using open tools and protocols

    CERN Document Server

    Fabrizio Furano, F F; Ricardo Brito da Rocha, R R; Adrien Devresse, A D; Oliver Keeble, O K; Alejandro Alvarez Ayllon, A A

    2012-01-01

    A number of storage elements now offer standard protocol interfaces like NFS 4.1/pNFS and WebDAV, for access to their data repositories, in line with the standardization effort of the European Middleware Initiative (EMI). Also the LCG FileCatalogue (LFC) can offer such features. Here we report on work that seeks to exploit the federation potential of these protocols and build a system that offers a unique view of the storage and metadata ensemble and the possibility of integration of other compatible resources such as those from cloud providers. The challenge, here undertaken by the providers of dCache and DPM, and pragmatically open to other Grid and Cloud storage solutions, is to build such a system while being able to accommodate name translations from existing catalogues (e.g. LFCs), experiment- based metadata catalogues, or stateless algorithmic name translations, also known as ”trivial file catalogues”. Such so-called storage federations of standard protocols-based storage elements give a unique vie...

  13. A rapid infusion protocol is safe for total dose iron polymaltose: time for change.

    Science.gov (United States)

    Garg, M; Morrison, G; Friedman, A; Lau, A; Lau, D; Gibson, P R

    2011-07-01

    Intravenous correction of iron deficiency by total dose iron polymaltose is inexpensive and safe, but current protocols entail prolonged administration over more than 4 h. This results in reduced patient acceptance, and hospital resource strain. We aimed to assess prospectively the safety of a rapid intravenous protocol and compare this with historical controls. Consecutive patients in whom intravenous iron replacement was indicated were invited to have up to 1.5 g iron polymaltose by a 58-min infusion protocol after an initial 15-min test dose without pre-medication. Infusion-related adverse events (AE) and delayed AE over the ensuing 5 days were also prospectively documented and graded as mild, moderate or severe. One hundred patients, 63 female, mean age 54 (range 18-85) years were studied. Thirty-four infusion-related AE to iron polymaltose occurred in a total of 24 patients--25 mild, 8 moderate and 1 severe; higher than previously reported for a slow protocol iron infusion. Thirty-one delayed AE occurred in 26 patients--26 mild, 3 moderate and 2 severe; similar to previously reported. All but five patients reported they would prefer iron replacement through the rapid protocol again. The presence of inflammatory bowel disease (IBD) predicted infusion-related reactions (54% vs 14% without IBD, P cost, resource utilization and time benefits for the patient and hospital system. © 2011 The Authors. Internal Medicine Journal © 2011 Royal Australasian College of Physicians.

  14. Resource use and costs of type 2 diabetes patients receiving managed or protocolized primary care: a controlled clinical trial.

    Science.gov (United States)

    van der Heijden, Amber A W A; de Bruijne, Martine C; Feenstra, Talitha L; Dekker, Jacqueline M; Baan, Caroline A; Bosmans, Judith E; Bot, Sandra D M; Donker, Gé A; Nijpels, Giel

    2014-06-25

    The increasing prevalence of diabetes is associated with increased health care use and costs. Innovations to improve the quality of care, manage the increasing demand for health care and control the growth of health care costs are needed. The aim of this study is to evaluate the care process and costs of managed, protocolized and usual care for type 2 diabetes patients from a societal perspective. In two distinct regions of the Netherlands, both managed and protocolized diabetes care were implemented. Managed care was characterized by centralized organization, coordination, responsibility and centralized annual assessment. Protocolized care had a partly centralized organizational structure. Usual care was characterized by a decentralized organizational structure. Using a quasi-experimental control group pretest-posttest design, the care process (guideline adherence) and costs were compared between managed (n = 253), protocolized (n = 197), and usual care (n = 333). We made a distinction between direct health care costs, direct non-health care costs and indirect costs. Multivariate regression models were used to estimate differences in costs adjusted for confounding factors. Because of the skewed distribution of the costs, bootstrapping methods (5000 replications) with a bias-corrected and accelerated approach were used to estimate 95% confidence intervals (CI) around the differences in costs. Compared to usual and protocolized care, in managed care more patients were treated according to diabetes guidelines. Secondary health care use was higher in patients under usual care compared to managed and protocolized care. Compared to usual care, direct costs were significantly lower in managed care (€-1.181 (95% CI: -2.597 to -334)) while indirect costs were higher (€ 758 (95% CI: -353 to 2.701), although not significant. Direct, indirect and total costs were lower in protocolized care compared to usual care (though not significantly). Compared to usual care, managed

  15. The development of UK protocols for electron beam dosimetry

    International Nuclear Information System (INIS)

    Thwaites, D.I.

    1995-01-01

    The IPSM Electron Dosimetry Working Party has completed a new set of recommendations for clinical electron beam dosimetry to replace the 1985 Code of Practice and its 1992 addendum. The current approach takes account of the significant body of relevant work over the last ten years and adopts the best consistent set of physical data currently available. It is still an air-kerma based approach, but adopts the N D formalism. This means that single conversion/correction factors are no longer retained. The new Code of Practice is intended to provide a solid basis for clinical practice at present, and to allow confident assessment of the introduction of the direct absorbed dose calibration service for electrons, currently under development by NPL, when that is ready. The structure of the new Code is reviewed, with discussion of changes from the 1985 approach and of the physical data incorporated. In particular the changes for parallel plate chamber calibration and use are discussed. Points of similarity and difference to other international codes are noted and the doses measured using different codes are compared

  16. Clinical electron beam dosimetry: transition from AAPM TG-25 to AAPM TG-70

    International Nuclear Information System (INIS)

    Mihailidis, Dimitris

    2017-01-01

    The absolute calibration of clinical electron beams is increasingly based on TG-51 protocol. In addition, recently published dosimetry data on electrons beams bring up the question of how would one need to modify the widely used TG-25 that originally was based on TG-21 calibration protocol? The answer to the question is given by the recently published TG-70. This new protocol operates as supplement and update to TG-25 on issues that need to be modified because of TG-51 approach to electron dosimetry and because of newer data on clinical electron beams. It describes in detail the procedure of converting measured depth-ionization curves with ion chambers into depth-dose curves, making use of recently published stopping-power ratios and other conversion factors. It also describes the use of water equivalent phantoms to perform relative electron dosimetry based on recently published conversions factors. The report discusses small and irregularly shaped electron field dosimetry using the concept of lateral buildup ratio (LBR) as an avenue to evaluate electronic equilibrium and compute dose per MU for those fields. Finally, it gives some common clinical examples where electron beam dosimetry are applied

  17. Analysis of Pervasive Mobile Ad Hoc Routing Protocols

    Science.gov (United States)

    Qadri, Nadia N.; Liotta, Antonio

    Mobile ad hoc networks (MANETs) are a fundamental element of pervasive networks and therefore, of pervasive systems that truly support pervasive computing, where user can communicate anywhere, anytime and on-the-fly. In fact, future advances in pervasive computing rely on advancements in mobile communication, which includes both infrastructure-based wireless networks and non-infrastructure-based MANETs. MANETs introduce a new communication paradigm, which does not require a fixed infrastructure - they rely on wireless terminals for routing and transport services. Due to highly dynamic topology, absence of established infrastructure for centralized administration, bandwidth constrained wireless links, and limited resources in MANETs, it is challenging to design an efficient and reliable routing protocol. This chapter reviews the key studies carried out so far on the performance of mobile ad hoc routing protocols. We discuss performance issues and metrics required for the evaluation of ad hoc routing protocols. This leads to a survey of existing work, which captures the performance of ad hoc routing algorithms and their behaviour from different perspectives and highlights avenues for future research.

  18. Optimal resource states for local state discrimination

    Science.gov (United States)

    Bandyopadhyay, Somshubhro; Halder, Saronath; Nathanson, Michael

    2018-02-01

    We study the problem of locally distinguishing pure quantum states using shared entanglement as a resource. For a given set of locally indistinguishable states, we define a resource state to be useful if it can enhance local distinguishability and optimal if it can distinguish the states as well as global measurements and is also minimal with respect to a partial ordering defined by entanglement and dimension. We present examples of useful resources and show that an entangled state need not be useful for distinguishing a given set of states. We obtain optimal resources with explicit local protocols to distinguish multipartite Greenberger-Horne-Zeilinger and graph states and also show that a maximally entangled state is an optimal resource under one-way local operations and classical communication to distinguish any bipartite orthonormal basis which contains at least one entangled state of full Schmidt rank.

  19. Electronic Safety Resource Tools -- Supporting Hydrogen and Fuel Cell Commercialization

    Energy Technology Data Exchange (ETDEWEB)

    Barilo, Nick F.

    2014-09-29

    The Pacific Northwest National Laboratory (PNNL) Hydrogen Safety Program conducted a planning session in Los Angeles, CA on April 1, 2014 to consider what electronic safety tools would benefit the next phase of hydrogen and fuel cell commercialization. A diverse, 20-person team led by an experienced facilitator considered the question as it applied to the eight most relevant user groups. The results and subsequent evaluation activities revealed several possible resource tools that could greatly benefit users. The tool identified as having the greatest potential for impact is a hydrogen safety portal, which can be the central location for integrating and disseminating safety information (including most of the tools identified in this report). Such a tool can provide credible and reliable information from a trustworthy source. Other impactful tools identified include a codes and standards wizard to guide users through a series of questions relating to application and specific features of the requirements; a scenario-based virtual reality training for first responders; peer networking tools to bring users from focused groups together to discuss and collaborate on hydrogen safety issues; and a focused tool for training inspectors. Table ES.1 provides results of the planning session, including proposed new tools and changes to existing tools.

  20. Peer-to-peer I/O (P2PIO) protocol specification Version 0.6

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo; Essiari, Abdelilah; Gunter, Dan; Hoschek, Wolfgang

    2004-04-21

    Today's distributed systems require simple and powerful resource discovery queries in a dynamic environment consisting of a large number of resources spanning many autonomous administrative domains. The distributed search problem is hard due to the variety of query types, the number of resources and their autonomous, partitioned and dynamic nature. We propose a generalized resource discovery framework that is built around an application level messaging protocol called Peer-to-Peer I/O (P2PIO). P2PIO addresses a number of scalability problems in a general way. It provides flexible and uniform transport-independent resource discovery mechanisms to reduce both the client and network burden in multi-hop P2P systems.

  1. EFFECTIVE ELECTRONIC TUTORIAL

    Directory of Open Access Journals (Sweden)

    Andrei A. Fedoseev

    2014-01-01

    Full Text Available The article analyzes effective electronic tutorials creation and application based on the theory of pedagogy. Herewith the issues of necessary electronic tutorial functional, ways of the educational process organization with the use of information and communication technologies and the logistics of electronic educational resources are touched upon. 

  2. A Guide to Writing a Qualitative Systematic Review Protocol to Enhance Evidence-Based Practice in Nursing and Health Care.

    Science.gov (United States)

    Butler, Ashleigh; Hall, Helen; Copnell, Beverley

    2016-06-01

    The qualitative systematic review is a rapidly developing area of nursing research. In order to present trustworthy, high-quality recommendations, such reviews should be based on a review protocol to minimize bias and enhance transparency and reproducibility. Although there are a number of resources available to guide researchers in developing a quantitative review protocol, very few resources exist for qualitative reviews. To guide researchers through the process of developing a qualitative systematic review protocol, using an example review question. The key elements required in a systematic review protocol are discussed, with a focus on application to qualitative reviews: Development of a research question; formulation of key search terms and strategies; designing a multistage review process; critical appraisal of qualitative literature; development of data extraction techniques; and data synthesis. The paper highlights important considerations during the protocol development process, and uses a previously developed review question as a working example. This paper will assist novice researchers in developing a qualitative systematic review protocol. By providing a worked example of a protocol, the paper encourages the development of review protocols, enhancing the trustworthiness and value of the completed qualitative systematic review findings. Qualitative systematic reviews should be based on well planned, peer reviewed protocols to enhance the trustworthiness of results and thus their usefulness in clinical practice. Protocols should outline, in detail, the processes which will be used to undertake the review, including key search terms, inclusion and exclusion criteria, and the methods used for critical appraisal, data extraction and data analysis to facilitate transparency of the review process. Additionally, journals should encourage and support the publication of review protocols, and should require reference to a protocol prior to publication of the

  3. A Service Differentiated MAC Protocol for OFDM/TDMA Wireless Systems

    Institute of Scientific and Technical Information of China (English)

    WANG Ying; ZHANG Ping

    2005-01-01

    This paper proposes a Service Differentiated-Dynamic Slotted Multiple Access (SD-DSMA) protocol with QoS guarantee. The Media Access Control (MAC) frame format is variable according to the traffic of uplink and downlink and the traffic of control and data. In addition, the services are divided into two categories, Guaranteed Bandwidth (GB) and Best Effort (BE). Uplink control message slots are designed for the GB users to reduce contention. Taking into consideration the techniques in physical layer, a two-Dimensional Radio Resource Allocation (2-D RRA) method is proposed. The 2-D RRA is an efficient way to allocate radio resources for multi-cell, multi-user OFDM/TDMA system as it takes into consideration both the channel condition and the co-channel interference. The piggyback mechanism and fair scheduling algorithm are adopted for GB services, and the max C/I scheduling algorithm is used for BE services. The simulation results show that the proposed MAC protocol has better performance in terms of delay, probability of successful access request.

  4. Communication Schemes with Constrained Reordering of Resources

    DEFF Research Database (Denmark)

    Popovski, Petar; Utkovski, Zoran; Trillingsgaard, Kasper Fløe

    2013-01-01

    This paper introduces a communication model inspired by two practical scenarios. The first scenario is related to the concept of protocol coding, where information is encoded in the actions taken by an existing communication protocol. We investigate strategies for protocol coding via combinatorial...... reordering of the labelled user resources (packets, channels) in an existing, primary system. However, the degrees of freedom of the reordering are constrained by the operation of the primary system. The second scenario is related to communication systems with energy harvesting, where the transmitted signals...... are constrained by the energy that is available through the harvesting process. We have introduced a communication model that covers both scenarios and elicits their key feature, namely the constraints of the primary system or the harvesting process. We have shown how to compute the capacity of the channels...

  5. Cognitive Radio MAC Protocol for WLAN

    DEFF Research Database (Denmark)

    Zhang, Qi; Fitzek, Frank H.P.; Iversen, Villy Bæk

    2008-01-01

    hole; moreover, it designs dual inband sensing scheme to detect primary user appearance. Additionally, C-CSMA/CA has the advantage to effectively solve the cognitive radio self-coexistence issues in the overlapping CR BSSs scenario. It also realizes station-based dynamic resource selection......To solve the performance degradation issue in current WLAN caused by the crowded unlicensed spectrum, we propose a cognitive radio (CR) media access protocol, C-CSMA/CA. The basic idea is that with cognitive radio techniques the WLAN devices can not only access the legacy WLAN unlicensed spectrum...

  6. Protocol for fermionic positive-operator-valued measures

    Science.gov (United States)

    Arvidsson-Shukur, D. R. M.; Lepage, H. V.; Owen, E. T.; Ferrus, T.; Barnes, C. H. W.

    2017-11-01

    In this paper we present a protocol for the implementation of a positive-operator-valued measure (POVM) on massive fermionic qubits. We present methods for implementing nondispersive qubit transport, spin rotations, and spin polarizing beam-splitter operations. Our scheme attains linear opticslike control of the spatial extent of the qubits by considering ground-state electrons trapped in the minima of surface acoustic waves in semiconductor heterostructures. Furthermore, we numerically simulate a high-fidelity POVM that carries out Procrustean entanglement distillation in the framework of our scheme, using experimentally realistic potentials. Our protocol can be applied not only to pure ensembles with particle pairs of known identical entanglement, but also to realistic ensembles of particle pairs with a distribution of entanglement entropies. This paper provides an experimentally realizable design for future quantum technologies.

  7. OAI-PMH for resource harvesting, tutorial 2

    CERN Multimedia

    CERN. Geneva; Nelson, Michael

    2005-01-01

    A variety of examples have arisen in which the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH) has been used for applications beyond bibliographic metadata interchange. One of these examples is the use of OAI-PMH to harvest resources and not just metadata. Advanced resource discovery and preservations capabilities are possible by combining complex object formats such as MPEG-21 DIDL, METS and SCORM with the OAI-PMH. In this tutorial, we review community conventions and practices that have provided the impetus for resource harvesting. We show how the introduction of complex object formats for the representation of resources leads to a robust, OAI-PMH-based framework for resource harvesting. We detail how complex object formats fit in the OAI-PMH data model, and how (compound) digital objects can be represented using a complex object format for exposure by an OAI-PMH repository. We also cover tools that are available for the implementation of an OAI-PMH-based resource harvesting solution. Fu...

  8. The dynamic management system for grid resources information of IHEP

    International Nuclear Information System (INIS)

    Gu Ming; Sun Gongxing; Zhang Weiyi

    2003-01-01

    The Grid information system is an essential base for building a Grid computing environment, it collects timely the resources information of each resource in a Grid, and provides an entire information view of all resources to the other components in a Grid computing system. The Grid technology could support strongly the computing of HEP (High Energy Physics) with big science and multi-organization features. In this article, the architecture and implementation of a dynamic management system are described, as well as the grid and LDAP (Lightweight Directory Access Protocol), including Web-based design for resource information collecting, querying and modifying. (authors)

  9. Renewable energy resources

    DEFF Research Database (Denmark)

    Ellabban, Omar S.; Abu-Rub, Haitham A.; Blaabjerg, Frede

    2014-01-01

    Electric energy security is essential, yet the high cost and limited sources of fossil fuels, in addition to the need to reduce greenhouse gasses emission, have made renewable resources attractive in world energy-based economies. The potential for renewable energy resources is enormous because...... they can, in principle, exponentially exceed the world's energy demand; therefore, these types of resources will have a significant share in the future global energy portfolio, much of which is now concentrating on advancing their pool of renewable energy resources. Accordingly, this paper presents how...... renewable energy resources are currently being used, scientific developments to improve their use, their future prospects, and their deployment. Additionally, the paper represents the impact of power electronics and smart grid technologies that can enable the proportionate share of renewable energy...

  10. Preference and Use of Electronic Information and Resources by Blind/Visually Impaired in NCR Libraries in India

    Directory of Open Access Journals (Sweden)

    Shailendra Kumar

    2013-06-01

    Full Text Available This paper aims to determine the preference and use of electronic information and resources by blind/visually impaired users in the leading National Capital Region (NCR libraries of India. Survey methodology has been used as the basic research tool for data collection with the help of questionnaires. The 125 in total users surveyed in all the five libraries were selected randomly on the basis of willingness of the users with experience of working in digital environments to participate in the survey. The survey results were tabulated and analyzed with descriptive statistics methods using Excel software and 'Stata version 11'. The findings reveal that ICT have a positive impact in the lives of people with disabilities as it helps them to work independently and increases the level of confidence among them. The Internet is the most preferred medium of access to information among the majority of blind/visually impaired users. The 'Complexity of content available on the net' is found as the major challenge faced during Internet use by blind users of NCR libraries. 'Audio books on CDs/DVDs and DAISY books' are the most preferred electronic resources among the majority of blind/visually impaired users. This study will help the library professionals and organizations/institutions serving people with disabilities to develop effective library services for blind/visually impaired users in the digital environment on the basis of findings on information usage behavior in the study.

  11. An Outcomes Study on the Effects of the Singapore General Hospital Burns Protocol.

    Science.gov (United States)

    Liang, Weihao; Kok, Yee Onn; Tan, Bien Keem; Chong, Si Jack

    2018-01-01

    The Singapore General Hospital Burns Protocol was implemented in May 2014 to standardize treatment for all burns patients, incorporate new techniques and materials, and streamline the processes and workflow of burns management. This study aims to analyze the effects of the Burns Protocol 2 years after its implementation. Using a REDCap electronic database, all burns patients admitted from May 2013 to April 2016 were included in the study. The historical preimplementation control group composed of patients admitted from May 2013 to April 2014 (n = 96). The postimplementation prospective study cohort consisted of patients admitted from May 2014 to April 2016 (n = 243). Details of the patients collected included age, sex, comorbidities, total body surface area (TBSA) burns, time until surgery, number of surgeries, number of positive tissue and blood cultures, and length of hospital stay. There was no statistically significant difference in the demographics of both groups. The study group had a statistically significant shorter time to surgery compared with the control group (20.8 vs 38.1, P burns, was statistically significant (number of surgeries/TBSA, 0.324 vs 0.506; P = 0.0499). The study group also had significantly shorter length of stay (12.5 vs 16.8, P = 0.0273), a shorter length of stay/TBSA burns (0.874 vs 1.342, P = 0.0101), and fewer positive tissue cultures (0.6 vs 1.3, P = 0.0003). The study group also trended toward fewer positive blood culture results (0.09 vs 0.35, P = 0.0593), although the difference was just shy of statistical significance. The new Singapore General Hospital Burns Protocol had revolutionized Singapore burns care by introducing a streamlined, multidisciplinary burns management, resulting in improved patient outcomes, lowered health care costs, and improved system resource use.

  12. EMPReSS: European mouse phenotyping resource for standardized screens.

    Science.gov (United States)

    Green, Eain C J; Gkoutos, Georgios V; Lad, Heena V; Blake, Andrew; Weekes, Joseph; Hancock, John M

    2005-06-15

    Standardized phenotyping protocols are essential for the characterization of phenotypes so that results are comparable between different laboratories and phenotypic data can be related to ontological descriptions in an automated manner. We describe a web-based resource for the visualization, searching and downloading of standard operating procedures and other documents, the European Mouse Phenotyping Resource for Standardized Screens-EMPReSS. Direct access: http://www.empress.har.mrc.ac.uk e.green@har.mrc.ac.uk.

  13. A global protocol for monitoring of coral bleaching

    OpenAIRE

    Oliver, J.; Setiasih, N.; Marshall, P.; Hansen, L.

    2004-01-01

    Coral bleaching and subsequent mortality represent a major threat to the future health and productivity of coral reefs. However a lack of reliable data on occurrence, severity and other characteristics of bleaching events hampers research on the causes and consequences of this important phenomenon. This article describes a global protocol for monitoring coral bleaching events, which addresses this problem and can be used by people with different levels of expertise and resources.

  14. Delay-Tolerant, Low-Power Protocols for Large Security-Critical Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Claudio S. Malavenda

    2012-01-01

    Full Text Available This paper reports the analysis, implementation, and experimental testing of a delay-tolerant and energy-aware protocol for a wireless sensor node, oriented to security applications. The solution proposed takes advantages from different domains considering as a guideline the low power consumption and facing the problems of seamless and lossy connectivity offered by the wireless medium along with very limited resources offered by a wireless network node. The paper is organized as follows: first we give an overview on delay-tolerant wireless sensor networking (DTN; then we perform a simulation-based comparative analysis of state-of-the-art DTN approaches and illustrate the improvement offered by the proposed protocol; finally we present experimental data gathered from the implementation of the proposed protocol on a proprietary hardware node.

  15. FODA: a novel efficient multiple access protocol for highly dynamic self-organizing networks

    Science.gov (United States)

    Li, Hantao; Liu, Kai; Zhang, Jun

    2005-11-01

    Based on the concept of contention reservation for polling transmission and collision prevention strategy for collision resolution, a fair on-demand access (FODA) protocol for supporting node mobility and multihop architecture in highly dynamic self-organizing networks is proposed. In the protocol, a distributed clustering network architecture formed by self-organizing algorithm and a main idea of reserving channel resources to get polling service are adopted, so that the hidden terminal (HT) and exposed terminal (ET) problems existed in traffic transmission due to multihop architecture and wireless transmission can be eliminated completely. In addition, an improved collision prevention scheme based on binary countdown algorithm (BCA), called fair collision prevention (FCP) algorithm, is proposed to greatly eliminate unfair phenomena existed in contention access of newly active ordinary nodes and completely resolve access collisions. Finally, the performance comparison of the FODA protocol with carrier sense multiple access with collision avoidance (CSMA/CA) and polling protocols by OPNET simulation are presented. Simulation results show that the FODA protocol can overcome the disadvantages of CSMA/CA and polling protocols, and achieve higher throughput, lower average message delay and less average message dropping rate.

  16. Introduction to Open Core Protocol Fastpath to System-on-Chip Design

    CERN Document Server

    Schwaderer, W David

    2012-01-01

    This book introduces Open Core Protocol (OCP), not as a conventional hardware communications protocol but as a meta-protocol: a means for describing and capturing the communications requirements of an IP core, and mapping them to a specific set of signals with known semantics.  Readers will learn the capabilities of OCP as a semiconductor hardware interface specification that allows different System-On-Chip (SoC) cores to communicate.  The OCP methodology presented enables intellectual property designers to design core interfaces in standard ways. This facilitates reusing OCP-compliant cores across multiple SoC designs which, in turn, drastically reduces design times, support costs, and overall cost for electronics/SoCs. Provides a comprehensive introduction to Open Core Protocol, which is more accessible than the full specification; Designed as a hands-on, how-to guide to semiconductor design; Includes numerous, real “usage examples” which are not available in the full specification; Integrates coverag...

  17. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  18. Security of a single-state semi-quantum key distribution protocol

    Science.gov (United States)

    Zhang, Wei; Qiu, Daowen; Mateus, Paulo

    2018-06-01

    Semi-quantum key distribution protocols are allowed to set up a secure secret key between two users. Compared with their full quantum counterparts, one of the two users is restricted to perform some "classical" or "semi-quantum" operations, which potentially makes them easily realizable by using less quantum resource. However, the semi-quantum key distribution protocols mainly rely on a two-way quantum channel. The eavesdropper has two opportunities to intercept the quantum states transmitted in the quantum communication stage. It may allow the eavesdropper to get more information and make the security analysis more complicated. In the past ten years, many semi-quantum key distribution protocols have been proposed and proved to be robust. However, there are few works concerning their unconditional security. It is doubted that how secure the semi-quantum ones are and how much noise they can tolerate to establish a secure secret key. In this paper, we prove the unconditional security of a single-state semi-quantum key distribution protocol proposed by Zou et al. (Phys Rev A 79:052312, 2009). We present a complete proof from information theory aspect by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we figure out an error threshold value such that for all error rates that are less than this threshold value, the secure secret key can be established between the legitimate users definitely. Otherwise, the users should abort the protocol. We make an illustration of the protocol under the circumstance that the reverse quantum channel is a depolarizing one with parameter q. Additionally, we compare the error threshold value with some full quantum protocols and several existing semi-quantum ones whose unconditional security proofs have been provided recently.

  19. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  20. Library usage patterns in the electronic information environment. Electronic journals, Use studies, Libraries, Medical libraries

    Directory of Open Access Journals (Sweden)

    B. Franklin

    2004-01-01

    Full Text Available This paper examines the methodology and results from Web-based surveys of more than 15,000 networked electronic services users in the United States between July 1998 and June 2003 at four academic health sciences libraries and two large main campus libraries serving a variety of disciplines. A statistically valid methodology for administering simultaneous Web-based and print-based surveys using the random moments sampling technique is discussed and implemented. Results from the Web-based surveys showed that at the four academic health sciences libraries, there were approximately four remote networked electronic services users for each in-house user. This ratio was even higher for faculty, staff, and research fellows at the academic health sciences libraries, where more than five remote users for each in-house user were recorded. At the two main libraries, there were approximately 1.3 remote users for each in-house user of electronic information. Sponsored research (grant funded research accounted for approximately 32% of the networked electronic services activity at the health sciences libraries and 16% at the main campus libraries. Sponsored researchers at the health sciences libraries appeared to use networked electronic services most intensively from on-campus, but not from in the library. The purpose of use for networked electronic resources by patrons within the library is different from the purpose of use of those resources by patrons using the resources remotely. The implications of these results on how librarians reach decisions about networked electronic resources and services are discussed.

  1. Distributed project scheduling at NASA: Requirements for manual protocols and computer-based support

    Science.gov (United States)

    Richards, Stephen F.

    1992-01-01

    The increasing complexity of space operations and the inclusion of interorganizational and international groups in the planning and control of space missions lead to requirements for greater communication, coordination, and cooperation among mission schedulers. These schedulers must jointly allocate scarce shared resources among the various operational and mission oriented activities while adhering to all constraints. This scheduling environment is complicated by such factors as the presence of varying perspectives and conflicting objectives among the schedulers, the need for different schedulers to work in parallel, and limited communication among schedulers. Smooth interaction among schedulers requires the use of protocols that govern such issues as resource sharing, authority to update the schedule, and communication of updates. This paper addresses the development and characteristics of such protocols and their use in a distributed scheduling environment that incorporates computer-aided scheduling tools. An example problem is drawn from the domain of Space Shuttle mission planning.

  2. Data Mining to Identify Fraud Suspected on Electronic Elections

    NARCIS (Netherlands)

    Poloni, Yuri Tadeu; Formolo, Daniel

    2015-01-01

    Many democratic countries choose their representatives through electronic elections. Even being a modern tool, its results can be explored maliciously. Because that, many instruments and protocols are using to protect electronic elections from attacks. This work propose a new system to improve the

  3. ISS protocol for EPR tooth dosimetry

    International Nuclear Information System (INIS)

    Onori, S.; Aragno, D.; Fattibene, P.; Petetti, E.; Pressello, M.C.

    2000-01-01

    The accuracy in Electron Paramagnetic Resonance (EPR) dose reconstruction with tooth enamel is affected by sample preparation, dosimetric signal amplitude evaluation and unknown dose estimate. Worldwide efforts in the field of EPR dose reconstruction with tooth enamel are focused on the optimization of the three mentioned steps in dose assessment. In the present work, the protocol implemented at ISS in the framework of the European Community Nuclear Fission Safety project 'Dose Reconstruction' is presented. A combined mechanical-chemical procedure for ground enamel sample preparation is used. The signal intensity evaluation is carried out with powder spectra simulation program. Finally, the unknown dose is evaluated individually for each sample with the additive dose method. The unknown dose is obtained by subtracting a mean native dose from the back-extrapolated dose. As an example of the capability of the ISS protocol in unknown dose evaluation, the results obtained in the framework of the 2nd International Intercomparison on EPR tooth enamel dosimetry are reported

  4. A distance-aware replica adaptive data gathering protocol for Delay Tolerant Mobile Sensor Networks.

    Science.gov (United States)

    Feng, Yong; Gong, Haigang; Fan, Mingyu; Liu, Ming; Wang, Xiaomin

    2011-01-01

    In Delay Tolerant Mobile Sensor Networks (DTMSNs) that have the inherent features of intermitted connectivity and frequently changing network topology it is reasonable to utilize multi-replica schemes to improve the data gathering performance. However, most existing multi-replica approaches inject a large amount of message copies into the network to increase the probability of message delivery, which may drain each mobile node's limited battery supply faster and result in too much contention for the restricted resources of the DTMSN, so a proper data gathering scheme needs a trade off between the number of replica messages and network performance. In this paper, we propose a new data gathering protocol called DRADG (for Distance-aware Replica Adaptive Data Gathering protocol), which economizes network resource consumption through making use of a self-adapting algorithm to cut down the number of redundant replicas of messages, and achieves a good network performance by leveraging the delivery probabilities of the mobile sensors as main routing metrics. Simulation results have shown that the proposed DRADG protocol achieves comparable or higher message delivery ratios at the cost of the much lower transmission overhead than several current DTMSN data gathering schemes.

  5. Electronic resources of the rare books and valuable editions department of the Central Scientific Library of the V.N. Karazin Kharkiv National University: open access for research

    Directory of Open Access Journals (Sweden)

    І. К. Журавльова

    2014-12-01

    Full Text Available The article describes tasks that electronic collections of rare books fulfill: broad access for readers to rare and valuable editions providing, preservation of ensuring of the original. On the example of the electronic collection of the Central Scientific Library of the V.N. Karazin Kharkiv National University – «eScriptorium: electronic archive of rare books and manuscripts for research and education» the possibility of the full-text resources of the valuable editions using is shown. The principles of creation, structure, chronological frameworks, directions of adding the documents to the archive are represented. The perspectives of the project development are outlined as well as examples of the digital libraries of the European countries and Ukraine are provided, the actual task of preserving the originals of the rare books of the country is raised, the innovative approaches to serving users with electronic resources are considered. The evidences of cooperation of the Central Scientific Library of the V.N. Karazin Kharkiv National University with the largest world digital libraries: World Digital Library and Europeana are provided.

  6. A Priority-aware Frequency Domain Polling MAC Protocol for OFDMA-based Networks in Cyber-physical Systems

    Institute of Scientific and Technical Information of China (English)

    Meng Zheng; Junru Lin; Wei Liang; Haibin Yu

    2015-01-01

    Wireless networking in cyber-physical systems(CPSs) is characteristically different from traditional wireless systems due to the harsh radio frequency environment and applications that impose high real-time and reliability constraints.One of the fundamental considerations for enabling CPS networks is the medium access control protocol. To this end, this paper proposes a novel priority-aware frequency domain polling medium access control(MAC) protocol, which takes advantage of an orthogonal frequency-division multiple access(OFDMA)physical layer to achieve instantaneous priority-aware polling.Based on the polling result, the proposed work then optimizes the resource allocation of the OFDMA network to further improve the data reliability. Due to the non-polynomial-complete nature of the OFDMA resource allocation, we propose two heuristic rules,based on which an efficient solution algorithm to the OFDMA resource allocation problem is designed. Simulation results show that the reliability performance of CPS networks is significantly improved because of this work.

  7. QoS and energy aware cooperative routing protocol for wildfire monitoring wireless sensor networks.

    Science.gov (United States)

    Maalej, Mohamed; Cherif, Sofiane; Besbes, Hichem

    2013-01-01

    Wireless sensor networks (WSN) are presented as proper solution for wildfire monitoring. However, this application requires a design of WSN taking into account the network lifetime and the shadowing effect generated by the trees in the forest environment. Cooperative communication is a promising solution for WSN which uses, at each hop, the resources of multiple nodes to transmit its data. Thus, by sharing resources between nodes, the transmission quality is enhanced. In this paper, we use the technique of reinforcement learning by opponent modeling, optimizing a cooperative communication protocol based on RSSI and node energy consumption in a competitive context (RSSI/energy-CC), that is, an energy and quality-of-service aware-based cooperative communication routing protocol. Simulation results show that the proposed algorithm performs well in terms of network lifetime, packet delay, and energy consumption.

  8. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  9. Security analysis of standards-driven communication protocols for healthcare scenarios.

    Science.gov (United States)

    Masi, Massimiliano; Pugliese, Rosario; Tiezzi, Francesco

    2012-12-01

    The importance of the Electronic Health Record (EHR), that stores all healthcare-related data belonging to a patient, has been recognised in recent years by governments, institutions and industry. Initiatives like the Integrating the Healthcare Enterprise (IHE) have been developed for the definition of standard methodologies for secure and interoperable EHR exchanges among clinics and hospitals. Using the requisites specified by these initiatives, many large scale projects have been set up for enabling healthcare professionals to handle patients' EHRs. The success of applications developed in these contexts crucially depends on ensuring such security properties as confidentiality, authentication, and authorization. In this paper, we first propose a communication protocol, based on the IHE specifications, for authenticating healthcare professionals and assuring patients' safety. By means of a formal analysis carried out by using the specification language COWS and the model checker CMC, we reveal a security flaw in the protocol thus demonstrating that to simply adopt the international standards does not guarantee the absence of such type of flaws. We then propose how to emend the IHE specifications and modify the protocol accordingly. Finally, we show how to tailor our protocol for application to more critical scenarios with no assumptions on the communication channels. To demonstrate feasibility and effectiveness of our protocols we have fully implemented them.

  10. Experimental implementation of a real-time token-based network protocol on a microcontroller

    NARCIS (Netherlands)

    Hanssen, F.T.Y.; Krikke, Robert; Baron, Bert; Jansen, P.G.; Scholten, Johan

    The real-time token-based RTnet network protocol has been implemented on a standard Ethernet network to investigate the possibility to use cheap components with strict resource limitations while preserving Quality of Service guarantees. It will be shown that the proposed implementation is feasible

  11. Experimental implementation of a real-time token-based network protocol on a microcontroller

    NARCIS (Netherlands)

    Hanssen, F.T.Y.; Krikke, Robert; Baron, Bert; Jansen, P.G.; Scholten, Johan

    2004-01-01

    The real-time token-based RTnet network protocol has been implemented on a standard Ethernet network to investigate the possibility to use cheap components with strict resource limitations while preserving Quality of Service guarantees. It will be shown that the proposed implementation is feasible

  12. A universal data access and protocol integration mechanism for smart home

    Science.gov (United States)

    Shao, Pengfei; Yang, Qi; Zhang, Xuan

    2013-03-01

    With the lack of standardized or completely missing communication interfaces in home electronics, there is no perfect solution to address every aspect in smart homes based on existing protocols and technologies. In addition, the central control unit (CCU) of smart home system working point-to-point between the multiple application interfaces and the underlying hardware interfaces leads to its complicated architecture and unpleasant performance. A flexible data access and protocol integration mechanism is required. The current paper offers a universal, comprehensive data access and protocol integration mechanism for a smart home. The universal mechanism works as a middleware adapter with unified agreements of the communication interfaces and protocols, offers an abstraction of the application level from the hardware specific and decoupling the hardware interface modules from the application level. Further abstraction for the application interfaces and the underlying hardware interfaces are executed based on adaption layer to provide unified interfaces for more flexible user applications and hardware protocol integration. This new universal mechanism fundamentally changes the architecture of the smart home and in some way meets the practical requirement of smart homes more flexible and desirable.

  13. An Energy Efficient Protocol For The Internet Of Things

    Science.gov (United States)

    Venčkauskas, Algimantas; Jusas, Nerijus; Kazanavičius, Egidijus; Štuikys, Vytautas

    2015-01-01

    The Internet of Things (IoT) is a technological revolution that represents the future of computing and communications. One of the most important challenges of IoT is security: protection of data and privacy. The SSL protocol is the de-facto standard for secure Internet communications. The extra energy cost of encrypting and authenticating of the application data with SSL is around 15%. For IoT devices, where energy resources are limited, the increase in the cost of energy is a very significant factor. In this paper we present the energy efficient SSL protocol which ensures the maximum bandwidth and the required level of security with minimum energy consumption. The proper selection of the security level and CPU multiplier, can save up to 85% of the energy required for data encryption.

  14. Transition to electronic publishing

    Science.gov (United States)

    Bowning, Sam

    Previous communications have described some of the many changes that will occur in the next few months as AGU makes the transition to fully electronic publishing. With the advent of the new AGU electronic publishing system, manuscripts will be submitted, edited, reviewed, and published in electronic formats. This piece discusses how the electronic journals will differ from the print journals. Electronic publishing will require some adjustments to the ways we currently think about journals from our perspective of standard print versions. Visiting the Web site of AGU's Geochemistry, Geophysics, Geosystems (G-Cubed) is a great way to get familiar with the look and feel of electronic publishing. However, protocols, especially for citations of articles, are still evolving. Some of the biggest changes for users of AGU publications may be the lack of page numbers, the use of a unique identifier (DOI),and changes in citation style.

  15. Application of the No Action Level (NAL) protocol to correct for prostate motion based on electronic portal imaging of implanted markers

    International Nuclear Information System (INIS)

    Boer, Hans C.J. de; Os, Marjolein J.H. van; Jansen, Peter P.; Heijmen, Ben J.M.

    2005-01-01

    Purpose: To evaluate the efficacy of the No Action Level (NAL) off-line correction protocol in the reduction of systematic prostate displacements as determined from electronic portal images (EPI) using implanted markers. Methods and materials: Four platinum markers, two near the apex and two near the base of the prostate, were implanted for localization purposes in patients who received fractionated high dose rate brachytherapy. During the following course of 25 fractions of external beam radiotherapy, the position of each marker relative to the corresponding position in digitally reconstructed radiographs (DRRs) was measured in EPI in 15 patients for on average 17 fractions per patient. These marker positions yield the composite displacements due to both setup error and internal prostate motion, relative to the planning computed tomography scan. As the NAL protocol is highly effective in reducing systematic errors (recurring each fraction) due to setup inaccuracy alone, we investigated its efficacy in reducing systematic composite displacements. The analysis was performed for the center of mass (COM) of the four markers, as well as for the cranial and caudal markers separately. Furthermore, the impact of prostate rotation on the achieved positioning accuracy was determined. Results: In case of no setup corrections, the standard deviations of the systematic composite displacements of the COM were 3-4 mm in the craniocaudal and anterior-posterior directions, and 2 mm in the left-right direction. The corresponding SDs of the random displacements (interfraction fluctuations) were 2-3 mm in each direction. When applying a NAL protocol based on three initial treatment fractions, the SDs of the systematic COM displacements were reduced to 1-2 mm. Displacements at the cranial end of the prostate were slightly larger than at the caudal end, and quantitative analysis showed this originates from left-right axis rotations about the prostate apex. Further analysis revealed

  16. Electronic tracking of human resource skills and knowledge, just in time training, manageable due diligence

    Energy Technology Data Exchange (ETDEWEB)

    Kolodziej, M.A. [Quick Test International Inc., (Canada). Canadian Technology Human Resource Board; Baker, O. [KeySpan Energy Canada, Calgary, AB (Canada)

    2001-06-01

    KeySpan Energy Canada is in the process of obtaining recognition of various occupational profiles including pipeline operators, inspectors, and field and plant operators from various certifying organizations. The process of allowing individuals to obtain certification is recognized by Canadian Technology Human Resources Board as a step towards national standards for technologists and technicians. Proven competency is a must for workers in todays oil industry in response to increasingly stringent government safety regulations, environmental concerns and high public scrutiny. Quick Test international Inc. has developed a management tool in collaboration with end users at KeySpan Energy Canada. It is an electronic, Internet based competency tool for tracking personal competencies and maintaining continued competency. Response to the tool has been favourable. 2 refs., 4 figs.

  17. Comparison between IAEA/TRS-277 and IAEA/TRS-398 protocols for electron beam dosimetry with cylindrical ionization chambers

    International Nuclear Information System (INIS)

    Souza, Roberto Salomon de

    2004-01-01

    With the purpose to guarantee an uncertainty in the dosimetry in radiation therapy, the International Atomic Energy Agency (IAEA) published in 1987 the Technical Reports Series (TRS) number 277 - Absorbed Dose Determination in Photon and Electron Beams - An International Code of Practice -, updated in 1997, when was published its second edition. In 2000 was published the TRS number 398 - Absorbed Dose Determination in External Beam Radiotherapy - An International Code of Practice for Dosimetry Based on Standards of Absorbed Dose to Water. The TRS number 398 brings a great conceptual change in relation to the basis of the formalism, before based on calibration factor in terms of air kerma, and now based on calibration factor in terms of absorbed dose in water. Since the TRS number 398 was published, the Secondary Standard Dosimetry Laboratories are calibrating the user's ionization chambers in terms of absorbed dose to water. However, nor all the clinics in Rio de Janeiro and Brazil have its ionization chambers calibrated in terms of absorbed dose to water. The National Cancer Institute, where the measurements were taken, was the first institution in the Rio de Janeiro to have its ionization chambers calibrated in terms of a new formalism. This work describes a comparison between dosimetry done with a cylindrical ionization chamber under electron beams utilizing the TRS number 277 formalism, based on air kerma, and the TRS number 398 formalism, based on absorbed dose to water, reporting the uncertainties variation of the dosimetry associated to each protocol. (author)

  18. Quantum teleportation and entanglement swapping of electron spins in superconducting hybrid structures

    Energy Technology Data Exchange (ETDEWEB)

    Bubanja, Vladimir, E-mail: vladimir.bubanja@callaghaninnovation.govt.nz

    2015-06-15

    We present schemes for quantum teleportation and entanglement swapping of electronic spin states in hybrid superconductor–normal-metal systems. The proposed schemes employ subgap transport whereby the lowest order processes involve Cooper pair-electron and double Cooper-pair cotunneling in quantum teleportation and entanglement swapping protocols, respectively. The competition between elastic cotunneling and Cooper-pair splitting results in the success probability of 25% in both cases. Described implementations of these protocols are within reach of present-day experimental techniques.

  19. Interfaces and Communication Protocols in ATCA-Based LLRF Control Systems

    Science.gov (United States)

    Makowski, Dariusz; Koprek, Waldemar; Jezynski, Tomasz; Piotrowski, Adam; Jablonski, Grzegorz; Jalmuzna, Wojciech; Simrock, Stefan

    2009-10-01

    Linear accelerators driving Free Electron Lasers (FELs), such as the Free Electron Laser in Hamburg (FLASH) or the X-ray Free Electron Laser (XFEL), require sophisticated Low Level Radio Frequency (LLRF) control systems. The controller of the LLRF system should stabilize the phase and amplitude of the field in accelerating modules below 0.02% of the amplitude and 0.01 degree for phase tolerances to produce an ultra stable electron beam that meets the required conditions for Self-Amplified Spontaneous Emission (SASE). Since the LLRF system for the XFEL must be in operation for the next 20 years, it should be reliable, reproducible and upgradeable. Having in mind all requirements of the LLRF control system, the Advanced Telecommunications Computing Architecture (ATCA) has been chosen to build a prototype of the LLRF system for the FLASH accelerator that is able to supervise 32 cavities of one RF station. The LLRF controller takes advantage of features offered by the ATCA standard. The LLRF system consists of a few ATCA carrier blades, Rear Transition Modules (RTM) and several Advanced Mezzanine Cards (AMCs) that provide all necessary digital and analog hardware components. The distributed hardware of the LLRF system requires a number of communication links that should provide different latencies, bandwidths and protocols. The paper presents the general view of the ATC A-based LLRF system, discusses requirements and proposes an application for various interfaces and protocols in the distributed LLRF control system.

  20. Implementation of enteral feeding protocol in an intensive care unit

    DEFF Research Database (Denmark)

    Padar, Martin; Uusvel, Gerli; Starkopf, Liis

    2017-01-01

    AIM: To determine the effects of implementing an enteral feeding protocol on the nutritional delivery and outcomes of intensive care patients. METHODS: An uncontrolled, observational before-and-after study was performed in a tertiary mixed medical-surgical intensive care unit (ICU). In 2013......, a nurse-driven enteral feeding protocol was developed and implemented in the ICU. Nutrition and outcome-related data from patients who were treated in the study unit from 2011-2012 (the Before group) and 2014-2015 (the After group) were obtained from a local electronic database, the national Population...... the groups. Patients in the After group had a lower 90-d (P = 0.026) and 120-d (P = 0.033) mortality. In the After group, enteral nutrition was prescribed less frequently (P = 0.039) on day 1 but significantly more frequently on all days from day 3. Implementation of the feeding protocol resulted in a higher...

  1. A Survey on the Taxonomy of Cluster-Based Routing Protocols for Homogeneous Wireless Sensor Networks

    Science.gov (United States)

    Naeimi, Soroush; Ghafghazi, Hamidreza; Chow, Chee-Onn; Ishii, Hiroshi

    2012-01-01

    The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided. PMID:22969350

  2. Electron transparent graphene windows for environmental scanning electron microscopy in liquids and dense gases.

    Science.gov (United States)

    Stoll, Joshua D; Kolmakov, Andrei

    2012-12-21

    Due to its ultrahigh electron transmissivity in a wide electron energy range, molecular impermeability, high electrical conductivity and excellent mechanical stiffness, suspended graphene membranes appear to be a nearly ideal window material for in situ (in vivo) environmental electron microscopy of nano- and mesoscopic objects (including bio-medical samples) immersed in liquids and/or in dense gaseous media. In this paper, taking advantage of a small modification of the graphene transfer protocol onto metallic and SiN supporting orifices, reusable environmental cells with exchangeable graphene windows have been designed. Using colloidal gold nanoparticles (50 nm) dispersed in water as model objects for scanning electron microscopy in liquids as proof of concept, different conditions for imaging through the graphene membrane were tested. Limiting factors for electron microscopy in liquids, such as electron beam induced water radiolysis and damage of the graphene membrane at high electron doses, are discussed.

  3. The Biomedical Resource Ontology (BRO) to enable resource discovery in clinical and translational research.

    Science.gov (United States)

    Tenenbaum, Jessica D; Whetzel, Patricia L; Anderson, Kent; Borromeo, Charles D; Dinov, Ivo D; Gabriel, Davera; Kirschner, Beth; Mirel, Barbara; Morris, Tim; Noy, Natasha; Nyulas, Csongor; Rubenson, David; Saxman, Paul R; Singh, Harpreet; Whelan, Nancy; Wright, Zach; Athey, Brian D; Becich, Michael J; Ginsburg, Geoffrey S; Musen, Mark A; Smith, Kevin A; Tarantal, Alice F; Rubin, Daniel L; Lyster, Peter

    2011-02-01

    The biomedical research community relies on a diverse set of resources, both within their own institutions and at other research centers. In addition, an increasing number of shared electronic resources have been developed. Without effective means to locate and query these resources, it is challenging, if not impossible, for investigators to be aware of the myriad resources available, or to effectively perform resource discovery when the need arises. In this paper, we describe the development and use of the Biomedical Resource Ontology (BRO) to enable semantic annotation and discovery of biomedical resources. We also describe the Resource Discovery System (RDS) which is a federated, inter-institutional pilot project that uses the BRO to facilitate resource discovery on the Internet. Through the RDS framework and its associated Biositemaps infrastructure, the BRO facilitates semantic search and discovery of biomedical resources, breaking down barriers and streamlining scientific research that will improve human health. Copyright © 2010 Elsevier Inc. All rights reserved.

  4. Introduction to Cryptography and the Bitcoin Protocol (1/2)

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    The Bitcoin protocol not only supports an electronic currency, but also has the possibility for being (mis)used in other ways. Topics will include the basic operation of how Bitcoin operates including motivations and also such things as block chaining, bitcoin mining, and how financial transactions operate. A knowledge of the topics covered in the Basic Cryptography lecture will be assumed.

  5. Introduction to Cryptography and the Bitcoin Protocol (2/2)

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    The Bitcoin protocol not only supports an electronic currency, but also has the possibility for being (mis)used in other ways. Topics will include the basic operation of how Bitcoin operates including motivations and also such things as block chaining, bitcoin mining, and how financial transactions operate. A knowledge of the topics covered in the Basic Cryptography lecture will be assumed.

  6. Electronic Recruitment at CERN

    CERN Multimedia

    2004-01-01

    The Human Resources Department switches to electronic recruitment. From now on whenever you are involved in a recruitment action you will receive an e-mail giving you access to a Web folder. Inside you will find a shortlist of applications drawn up by the Human Resources Department. This will allow you to consult the folder, at the same time as everyone else involved in the recruitment process, for the vacancy you are interested in. This new electronic recruitment system, known as e-RT, will be introduced in a presentation given at 10 a.m. on 11 February in the Main Auditorium. Implemented by AIS (Administrative Information Services) and the Human Resources Department, e-RT will cover vacancies open in all of CERN's recruitment programmes. The electronic application system was initially made available to technical students in July 2003. By December it was extended to summer students, fellows, associates and Local Staff. Geraldine Ballet from the Recruitment Service prefers e-RT to mountains of paper! The Hu...

  7. Plastics disassembly versus bulk recycling: engineering design for end-of-life electronics resource recovery.

    Science.gov (United States)

    Rios, Pedro; Stuart, Julie Ann; Grant, Ed

    2003-12-01

    Annual plastic flows through the business and consumer electronics manufacturing supply chain include nearly 3 billion lb of high-value engineering plastics derived from petroleum. The recovery of resource value from this stream presents critical challenges in areas of materials identification and recycling process design that demand new green engineering technologies applied together with life cycle assessment and ecological supply chain analysis to create viable plastics-to-plastics supply cycles. The sustainable recovery of potentially high-value engineering plastics streams requires that recyclers either avoid mixing plastic parts or purify later by separating smaller plastic pieces created in volume reduction (shredding) steps. Identification and separation constitute significant barriers in the plastics-to-plastics recycling value proposition. In the present work, we develop a model that accepts randomly arriving electronic products to study scenarios by which a recycler might identify and separate high-value engineering plastics as well as metals. Using discrete eventsimulation,we compare current mixed plastics recovery with spectrochemical plastic resin identification and subsequent sorting. Our results show that limited disassembly with whole-part identification can produce substantial yields in separated streams of recovered engineering thermoplastics. We find that disassembly with identification does not constitute a bottleneck, but rather, with relatively few workers, can be configured to pull the process and thus decrease maximum staging space requirements.

  8. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.

    Science.gov (United States)

    Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A; Al-Muhtadi, Jalal; Rodrigues, Joel J P C; Khalil, Mohammed Sayim; Ali Ahmed, Adel

    2016-03-31

    The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.

  9. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks

    Science.gov (United States)

    Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A.; Al-Muhtadi, Jalal; Rodrigues, Joel J. P. C.; Khalil, Mohammed Sayim; Ali Ahmed, Adel

    2016-01-01

    The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks. PMID:27043572

  10. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kashif Saleem

    2016-03-01

    Full Text Available The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP involves an artificial immune system (AIS that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2 and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.

  11. Test Protocols for Advanced Inverter Interoperability Functions – Main Document

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, Jay Dean [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gonzalez, Sigifredo [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ralph, Mark E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ellis, Abraham [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Broderick, Robert Joseph [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2013-11-01

    Distributed energy resources (DER) such as photovoltaic (PV) systems, when deployed in a large scale, are capable of influencing significantly the operation of power systems. Looking to the future, stakeholders are working on standards to make it possible to manage the potentially complex interactions between DER and the power system. In 2009, the Electric Power Research Institute (EPRI), Sandia National Laboratories (SNL) with the U.S. Department of Energy (DOE), and the Solar Electric Power Association (SEPA) initiated a large industry collaborative to identify and standardize definitions for a set of DER grid support functions. While the initial effort concentrated on grid-tied PV inverters and energy storage systems, the concepts have applicability to all DER. A partial product of this on-going effort is a reference definitions document (IEC TR 61850-90-7, Object models for power converters in distributed energy resources (DER) systems) that has become a basis for expansion of related International Electrotechnical Commission (IEC) standards, and is supported by US National Institute of Standards and Technology (NIST) Smart Grid Interoperability Panel (SGIP). Some industry-led organizations advancing communications protocols have also embraced this work. As standards continue to evolve, it is necessary to develop test protocols to independently verify that the inverters are properly executing the advanced functions. Interoperability is assured by establishing common definitions for the functions and a method to test compliance with operational requirements. This document describes test protocols developed by SNL to evaluate the electrical performance and operational capabilities of PV inverters and energy storage, as described in IEC TR 61850-90-7. While many of these functions are not currently required by existing grid codes or may not be widely available commercially, the industry is rapidly moving in that direction. Interoperability issues are already

  12. Implementation of the protocol on treatment of outpatients and hospitalized patients with iodine 131r

    International Nuclear Information System (INIS)

    Mildred De Mendoza, L.

    1996-01-01

    In Nuclear medicine different working protocols are used which are adequate for the treatment of patients with radioactive materials and which at the same time prevent the contamination of the occupationally exposed workers In Guatemala (the implementation of these protocols aims at keeping a records all the personal and centers that make use of iodine 131, improving the quality of diagnostic information; utilizing the necessary amount of radionuclide activity so as to ensure a good diagnosis and effectively utilizing economic resources

  13. Deployment Strategies and Clustering Protocols Efficiency

    Directory of Open Access Journals (Sweden)

    Chérif Diallo

    2017-06-01

    Full Text Available Wireless sensor networks face significant design challenges due to limited computing and storage capacities and, most importantly, dependence on limited battery power. Energy is a critical resource and is often an important issue to the deployment of sensor applications that claim to be omnipresent in the world of future. Thus optimizing the deployment of sensors becomes a major constraint in the design and implementation of a WSN in order to ensure better network operations. In wireless networking, clustering techniques add scalability, reduce the computation complexity of routing protocols, allow data aggregation and then enhance the network performance. The well-known MaxMin clustering algorithm was previously generalized, corrected and validated. Then, in a previous work we have improved MaxMin by proposing a Single- node Cluster Reduction (SNCR mechanism which eliminates single-node clusters and then improve energy efficiency. In this paper, we show that MaxMin, because of its original pathological case, does not support the grid deployment topology, which is frequently used in WSN architectures. The unreliability feature of the wireless links could have negative impacts on Link Quality Indicator (LQI based clustering protocols. So, in the second part of this paper we show how our distributed Link Quality based d- Clustering Protocol (LQI-DCP has good performance in both stable and high unreliable link environments. Finally, performance evaluation results also show that LQI-DCP fully supports the grid deployment topology and is more energy efficient than MaxMin.

  14. Global property rights. The Kyoto protocol and the knowledge revolution

    International Nuclear Information System (INIS)

    Chichilnisky, G.

    2006-01-01

    This paper is about the origin of today's global environmental problems, and how to resolve them. At stake are catastrophic risks from global warming and damage to the world's biodiversity that ranks as the planet' sixth great extinction. The origin of today's global environmental problems is a historic difference in property rights regimes between industrial and developing countries, the North and the South. The solutions we suggest involve redefining property rights in the use of the global environment as well as in knowledge. We discuss the Kyoto Protocol's new systems of property rights on the use of the planet's atmosphere, and propose a parallel system of property rights on knowledge. Resources such as forests and oil and other mineral deposits are owned as private property in industrial countries but they are treated as common or government property in developing countries. Ill-defined protected property rights lead to the over-extraction of resources in the South, such as timber and oil. They are exported at low prices to the North that over-consumes them. The international market amplifies the tragedy of the commons, leading to inferior solutions for the world economy as a whole (Chichilnisky 1994). Updating property rights on resources in developing countries would face formidable opposition. The lack of property rights in inputs to production, such as timber and oil, could be compensated by assigning property rights on by-products of outputs. The 1997 Kyoto Protocol provides an example as it limits the countries' rights to emit carbon, a by-product of burning fossil fuels. Our suggestions for trading emissions rights (Chichilnisky 1995, 96) was adopted in the Kyoto Protocol, yet the atmosphere's carbon concentration is a global public good, which makes trading tricky. Trading rights to forests' carbon sequestration services or to genetic blueprints would also be trading global public goods. Markets that trade public goods have been shown to require a

  15. Combined Protocol for Acute Malnutrition Study (ComPAS) in rural South Sudan and urban Kenya

    DEFF Research Database (Denmark)

    Bailey, Jeanette; Lelijveld, Natasha; Marron, Bethany

    2018-01-01

    Background: Acute malnutrition is a continuum condition, but severe and moderate forms are treated separately, with different protocols and therapeutic products, managed by separate United Nations agencies. The Combined Protocol for Acute Malnutrition Study (ComPAS) aims to simplify and unify...... the treatment of uncomplicated severe and moderate acute malnutrition (SAM and MAM) for children 6-59 months into one protocol in order to improve the global coverage, quality, continuity of care and cost-effectiveness of acute malnutrition treatment in resource-constrained settings.  Methods/design: This study...... is a multi-site, cluster randomized non-inferiority trial with 12 clusters in Kenya and 12 clusters in South Sudan. Participants are 3600 children aged 6-59 months with uncomplicated acute malnutrition. This study will evaluate the impact of a simplified and combined protocol for the treatment of SAM and MAM...

  16. Merge of terminological resources

    DEFF Research Database (Denmark)

    Henriksen, Lina; Braasch, Anna

    2012-01-01

    In our globalized world, the amount of cross-national communication increases rapidly, which also calls for easy access to multi-lingual high quality terminological resources. Sharing of terminology resources is currently becoming common practice, and efficient strategies for integration...... – or merging – of terminology resources are strongly needed. This paper discusses prerequisites for successful merging with the focus on identification of candidate duplicates of a subject domain found in the resources to be merged, and it describes automatic merging strategies to be applied to such duplicates...... in electronic terminology resources. Further, some perspectives of manual, supplementary assessment methods supporting the automatic procedures are sketched. Our considerations are primarily based on experience gained in the IATE and EuroTermBank projects, as merging was a much discussed issue in both projects....

  17. Complete electronics self-teaching guide with projects

    CERN Document Server

    Boysen, Earl

    2012-01-01

    An all-in-one resource on everything electronics-related! For almost 30 years, this book has been a classic text for electronics enthusiasts. Now completely updated for today's technology, this latest version combines concepts, self-tests, and hands-on projects to offer you a completely repackaged and revised resource. This unique self-teaching guide features easy-to-understand explanations that are presented in a user-friendly format to help you learn the essentials you need to work with electronic circuits. All you need is a general understanding of electronics concepts such as Oh

  18. The U.S. Culture Collection Network Responding to the Requirements of the Nagoya Protocol on Access and Benefit Sharing

    Directory of Open Access Journals (Sweden)

    Kevin McCluskey

    2017-08-01

    Full Text Available The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD. The meeting included representatives of many culture collections and other biological collections, the U.S. Department of State, U.S. Department of Agriculture, Secretariat of the CBD, interested scientific societies, and collection groups, including Scientific Collections International and the Global Genome Biodiversity Network. The participants learned about the policies of the United States and other countries regarding access to genetic resources, the definition of genetic resources, and the status of historical materials and genetic sequence information. Key topics included what constitutes access and how the CBD Access and Benefit-Sharing Clearing-House can help guide researchers through the process of obtaining Prior Informed Consent on Mutually Agreed Terms. U.S. scientists and their international collaborators are required to follow the regulations of other countries when working with microbes originally isolated outside the United States, and the local regulations required by the Nagoya Protocol vary by the country of origin of the genetic resource. Managers of diverse living collections in the United States described their holdings and their efforts to provide access to genetic resources. This meeting laid the foundation for cooperation in establishing a set of standard operating procedures for U.S. and international culture collections in response to the Nagoya Protocol.

  19. Interplanetary Overlay Network Bundle Protocol Implementation

    Science.gov (United States)

    Burleigh, Scott C.

    2011-01-01

    The Interplanetary Overlay Network (ION) system's BP package, an implementation of the Delay-Tolerant Networking (DTN) Bundle Protocol (BP) and supporting services, has been specifically designed to be suitable for use on deep-space robotic vehicles. Although the ION BP implementation is unique in its use of zero-copy objects for high performance, and in its use of resource-sensitive rate control, it is fully interoperable with other implementations of the BP specification (Internet RFC 5050). The ION BP implementation is built using the same software infrastructure that underlies the implementation of the CCSDS (Consultative Committee for Space Data Systems) File Delivery Protocol (CFDP) built into the flight software of Deep Impact. It is designed to minimize resource consumption, while maximizing operational robustness. For example, no dynamic allocation of system memory is required. Like all the other ION packages, ION's BP implementation is designed to port readily between Linux and Solaris (for easy development and for ground system operations) and VxWorks (for flight systems operations). The exact same source code is exercised in both environments. Initially included in the ION BP implementations are the following: libraries of functions used in constructing bundle forwarders and convergence-layer (CL) input and output adapters; a simple prototype bundle forwarder and associated CL adapters designed to run over an IPbased local area network; administrative tools for managing a simple DTN infrastructure built from these components; a background daemon process that silently destroys bundles whose time-to-live intervals have expired; a library of functions exposed to applications, enabling them to issue and receive data encapsulated in DTN bundles; and some simple applications that can be used for system checkout and benchmarking.

  20. RCRA groundwater data analysis protocol for the Hanford Site, Washington

    International Nuclear Information System (INIS)

    Chou, C.J.; Jackson, R.L.

    1992-04-01

    The Resource Conservation and Recovery Act of 1976 (RCRA) groundwater monitoring program currently involves site-specific monitoring of 20 facilities on the Hanford Site in southeastern Washington. The RCRA groundwater monitoring program has collected abundant data on groundwater quality. These data are used to assess the impact of a facility on groundwater quality or whether remediation efforts under RCRA corrective action programs are effective. Both evaluations rely on statistical analysis of groundwater monitoring data. The need for information on groundwater quality by regulators and environmental managers makes statistical analysis of monitoring data an important part of RCRA groundwater monitoring programs. The complexity of groundwater monitoring programs and variabilities (spatial, temporal, and analytical) exhibited in groundwater quality variables indicate the need for a data analysis protocol to guide statistical analysis. A data analysis protocol was developed from the perspective of addressing regulatory requirements, data quality, and management information needs. This data analysis protocol contains four elements: data handling methods; graphical evaluation techniques; statistical tests for trend, central tendency, and excursion analysis; and reporting procedures for presenting results to users

  1. Wellness protocol for smart homes an integrated framework for ambient assisted living

    CERN Document Server

    Ghayvat, Hemant

    2017-01-01

    This book focuses on the development of wellness protocols for smart home monitoring, aiming to forecast the wellness of individuals living in ambient assisted living (AAL) environments. It describes in detail the design and implementation of heterogeneous wireless sensors and networks as applied to data mining and machine learning, which the protocols are based on. Further, it shows how these sensor and actuator nodes are deployed in the home environment, generating real-time data on object usage and other movements inside the home, and therefore demonstrates that the protocols have proven to offer a reliable, efficient, flexible, and economical solution for smart home systems. Documenting the approach from sensor to decision making and information generation, the book addresses various issues concerning interference mitigation, errors, security and large data handling. As such, it offers a valuable resource for researchers, students and practitioners interested in interdisciplinary studies at the intersecti...

  2. A comparison of two emergency medical dispatch protocols with respect to accuracy.

    Science.gov (United States)

    Torlén, Klara; Kurland, Lisa; Castrén, Maaret; Olanders, Knut; Bohm, Katarina

    2017-12-29

    Emergency medical dispatching should be as accurate as possible in order to ensure patient safety and optimize the use of ambulance resources. This study aimed to compare the accuracy, measured as priority level, between two Swedish dispatch protocols - the three-graded priority protocol Medical Index and a newly developed prototype, the four-graded priority protocol, RETTS-A. A simulation study was carried out at the Emergency Medical Communication Centre (EMCC) in Stockholm, Sweden, between October and March 2016. Fifty-three voluntary telecommunicators working at SOS Alarm were recruited nationally. Each telecommunicator handled 26 emergency medical calls, simulated by experienced standard patients. Manuscripts for the scenarios were based on recorded real-life calls, representing the six most common complaints. A cross-over design with 13 + 13 calls was used. Priority level and medical condition for each scenario was set through expert consensus and used as gold standard in the study. A total of 1293 calls were included in the analysis. For priority level, n = 349 (54.0%) of the calls were assessed correctly with Medical Index and n = 309 (48.0%) with RETTS-A (p = 0.012). Sensitivity for the highest priority level was 82.6% (95% confidence interval: 76.6-87.3%) in the Medical Index and 54.0% (44.3-63.4%) in RETTS-A. Overtriage was 37.9% (34.2-41.7%) in the Medical Index and 28.6% (25.2-32.2%) in RETTS-A. The corresponding proportion of undertriage was 6.3% (4.7-8.5%) and 23.4% (20.3-26.9%) respectively. In this simulation study we demonstrate that Medical Index had a higher accuracy for priority level and less undertriage than the new prototype RETTS-A. The overall accuracy of both protocols is to be considered as low. Overtriage challenges resource utilization while undertriage threatens patient safety. The results suggest that in order to improve patient safety both protocols need revisions in order to guarantee safe emergency medical

  3. iLAP: a workflow-driven software for experimental protocol development, data acquisition and analysis

    Directory of Open Access Journals (Sweden)

    McNally James

    2009-01-01

    Full Text Available Abstract Background In recent years, the genome biology community has expended considerable effort to confront the challenges of managing heterogeneous data in a structured and organized way and developed laboratory information management systems (LIMS for both raw and processed data. On the other hand, electronic notebooks were developed to record and manage scientific data, and facilitate data-sharing. Software which enables both, management of large datasets and digital recording of laboratory procedures would serve a real need in laboratories using medium and high-throughput techniques. Results We have developed iLAP (Laboratory data management, Analysis, and Protocol development, a workflow-driven information management system specifically designed to create and manage experimental protocols, and to analyze and share laboratory data. The system combines experimental protocol development, wizard-based data acquisition, and high-throughput data analysis into a single, integrated system. We demonstrate the power and the flexibility of the platform using a microscopy case study based on a combinatorial multiple fluorescence in situ hybridization (m-FISH protocol and 3D-image reconstruction. iLAP is freely available under the open source license AGPL from http://genome.tugraz.at/iLAP/. Conclusion iLAP is a flexible and versatile information management system, which has the potential to close the gap between electronic notebooks and LIMS and can therefore be of great value for a broad scientific community.

  4. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  5. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    International Nuclear Information System (INIS)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar

    2011-01-01

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  6. Oscillator clustering in a resource distribution chain

    DEFF Research Database (Denmark)

    Postnov, D.; Sosnovtseva, Olga; Mosekilde, Erik

    2005-01-01

    separate the inherent dynamics of the individual oscillator from the properties of the coupling network. Illustrated by examples from microbiological population dynamics, renal physiology, and electronic oscillator theory, we show how competition for primary resources in a resource distribution chain leads...

  7. Using Think Aloud Protocols to Assess E-Prescribing in Community Pharmacies

    Directory of Open Access Journals (Sweden)

    Olufunmilola K. Odukoya, BPharm, MS

    2012-01-01

    Full Text Available Introduction: Think aloud protocol has rarely been used as a method of data collection in community pharmacies.Purpose: The aim of the report is to describe how think aloud protocols were used to identify issues that arise when using e-prescribing technology in pharmacies. In this paper, we report on the benefits and challenges of using think aloud protocols in pharmacies to examine the use of e-prescribing systems.Methods: Sixteen pharmacists and pharmacy technicians were recruited from seven community pharmacies in Wisconsin. Data were collected using direct observation alongside think aloud protocol. Direct observations and think aloud protocols took place between January-February, 2011. Participants were asked to verbalize their thoughts as they process electronic prescriptions.Results: Participants identified weaknesses in e-prescribing that they had previously not conceived. This created heightened awareness for vigilance when processing e-prescriptions. The main challenge with using think aloud protocols was due to interruptions in the pharmacies. Also, a few participants found it challenging to remember to continue verbalizing their thought process during think aloud sessions.Conclusion: The use of think aloud protocols as method of data collection is a new way for understanding the issues related to technology use in community pharmacy practice. Think aloud protocol was beneficial in providing objective information on e-prescribing use not solely based on pharmacist’s or technician’s opinion of the technology. This method provided detailed information on a wide variety of real time challenges with e-prescribing technology use in community pharmacies. Using this data collection method can help identify potential patient safety issues when using e-prescribing and suggestions for redesign.

  8. Power Electronics

    DEFF Research Database (Denmark)

    Iov, Florin; Ciobotaru, Mihai; Blaabjerg, Frede

    2008-01-01

    is to change the electrical power production sources from the conventional, fossil (and short term) based energy sources to renewable energy resources. The other is to use high efficient power electronics in power generation, power transmission/distribution and end-user application. This paper discuss the most...... emerging renewable energy sources, wind energy, which by means of power electronics are changing from being a minor energy source to be acting as an important power source in the energy system. Power electronics is the enabling technology and the presentation will cover the development in wind turbine...... technology from kW to MW, discuss which power electronic solutions are most feasible and used today....

  9. Attacks on quantum key distribution protocols that employ non-ITS authentication

    Science.gov (United States)

    Pacher, C.; Abidin, A.; Lorünser, T.; Peev, M.; Ursin, R.; Zeilinger, A.; Larsson, J.-Å.

    2016-01-01

    We demonstrate how adversaries with large computing resources can break quantum key distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not information-theoretically secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced, it was shown to prevent straightforward man-in-the-middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact, we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols, we describe every single action taken by the adversary. For all protocols, the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD post-processing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.

  10. Human Resource Information Systems in Health Care: Protocol for a Systematic Review.

    Science.gov (United States)

    Tursunbayeva, Aizhan; Pagliari, Claudia; Bunduchi, Raluca; Franco, Massimo

    2015-12-01

    Compared with the eHealth literature as a whole, there has been relatively little published research on the use and impact of information and communication technologies (ICTs) designed to support business functions within health organizations. Human resource information systems (HRISs) have the potential to improve organizational efficiency and effectiveness by facilitating workforce planning, financial and operational administration, staff training, and management analytics. However, the evidence base regarding HRIS in health care is widely distributed across disciplinary boundaries and previous reviews have been somewhat limited in scope. This rigorous systematic review will identify, appraise, and synthesize existing international research on the implementation and impacts of HRIS in health organizations, to provide insights and recommendations that may guide future purchasers, commissioners, implementers, evaluators, and users of such systems. The objectives of this review are threefold: (1) to determine the prevalence and scope of existing research and evaluation pertaining to HRIS in health organizations; (2) to analyze, classify, and synthesize existing evidence on the processes and impacts of HRIS development, implementation, and adoption; and (3) to generate recommendations for HRIS research, practice, and policy, with reference to the needs of different stakeholders and communities of practice. A high-level scoping review was first undertaken to inform a draft search strategy, which was refined through several cycles of piloting and iteration to optimize its sensitivity and specificity. This was used by the first author, with the help of a medical librarian, to search international electronic databases indexing medical, business, ICT, and multi-disciplinary research. Sources of gray literature and reference lists of included studies were also searched. There were no restrictions on language or publication year. Two reviewers are now screening and coding

  11. EuroPhenome and EMPReSS: online mouse phenotyping resource.

    Science.gov (United States)

    Mallon, Ann-Marie; Blake, Andrew; Hancock, John M

    2008-01-01

    EuroPhenome (http://www.europhenome.org) and EMPReSS (http://empress.har.mrc.ac.uk/) form an integrated resource to provide access to data and procedures for mouse phenotyping. EMPReSS describes 96 Standard Operating Procedures for mouse phenotyping. EuroPhenome contains data resulting from carrying out EMPReSS protocols on four inbred laboratory mouse strains. As well as web interfaces, both resources support web services to enable integration with other mouse phenotyping and functional genetics resources, and are committed to initiatives to improve integration of mouse phenotype databases. EuroPhenome will be the repository for a recently initiated effort to carry out large-scale phenotyping on a large number of knockout mouse lines (EUMODIC).

  12. Mothers' and Fathers' Parenting Challenges, Strategies, and Resources in Toddlerhood

    Science.gov (United States)

    Kwon, Kyong-Ah; Han, Suejung; Jeon, Hyun-Joo; Bingham, Gary E.

    2013-01-01

    This study examined mothers' and fathers' parenting challenges and strategies/resources used when parenting toddlers. Through a qualitative interview protocol, implemented with mothers and fathers separately at a university laboratory, this study found that both fathers and mothers appeared to be transitioning from traditional gender roles towards…

  13. Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario

    Directory of Open Access Journals (Sweden)

    Yanan Chen

    2018-01-01

    Full Text Available Vehicle-to-infrastructure (V2I communication enables moving vehicles to upload real-time data about road surface situation to the Internet via fixed roadside units (RSU. Thanks to the resource restriction of mobile vehicles, fog computation-enhanced V2I communication scenario has received increasing attention recently. However, how to aggregate the sensed data from vehicles securely and efficiently still remains open to the V2I communication scenario. In this paper, a light-weight and anonymous aggregation protocol is proposed for the fog computing-based V2I communication scenario. With the proposed protocol, the data collected by the vehicles can be efficiently obtained by the RSU in a privacy-preserving manner. Particularly, we first suggest a certificateless aggregate signcryption (CL-A-SC scheme and prove its security in the random oracle model. The suggested CL-A-SC scheme, which is of independent interest, can achieve the merits of certificateless cryptography and signcryption scheme simultaneously. Then we put forward the anonymous aggregation protocol for V2I communication scenario as one extension of the suggested CL-A-SC scheme. Security analysis demonstrates that the proposed aggregation protocol achieves desirable security properties. The performance comparison shows that the proposed protocol significantly reduces the computation and communication overhead compared with the up-to-date protocols in this field.

  14. eagle-i: An Ontology-Driven Framework For Biomedical Resource Curation And Discovery

    OpenAIRE

    Erik Segerdell; Melanie L. Wilson; Ted Bashor; Daniela Bourges-Waldegg; Karen Corday; H. Robert Frost; Tenille Johnson; Christopher J. Shaffer; Larry Stone; Carlo Torniai; Melissa A. Haendel

    2010-01-01

    The eagle-i Consortium ("http://www.eagle-i.org/home":www.eagle-i.org/home) comprises nine geographically and ethnically diverse universities across America working to build a federated network of research resources. Biomedical research generates many resources that are rarely shared or published, including: reagents, protocols, instruments, expertise, organisms, training opportunities, software, human studies, and biological specimens. The goal of eagle-i is to improve biomedical r...

  15. Real-Time Electronic Dashboard Technology and Its Use to Improve Pediatric Radiology Workflow.

    Science.gov (United States)

    Shailam, Randheer; Botwin, Ariel; Stout, Markus; Gee, Michael S

    The purpose of our study was to create a real-time electronic dashboard in the pediatric radiology reading room providing a visual display of updated information regarding scheduled and in-progress radiology examinations that could help radiologists to improve clinical workflow and efficiency. To accomplish this, a script was set up to automatically send real-time HL7 messages from the radiology information system (Epic Systems, Verona, WI) to an Iguana Interface engine, with relevant data regarding examinations stored in an SQL Server database for visual display on the dashboard. Implementation of an electronic dashboard in the reading room of a pediatric radiology academic practice has led to several improvements in clinical workflow, including decreasing the time interval for radiologist protocol entry for computed tomography or magnetic resonance imaging examinations as well as fewer telephone calls related to unprotocoled examinations. Other advantages include enhanced ability of radiologists to anticipate and attend to examinations requiring radiologist monitoring or scanning, as well as to work with technologists and operations managers to optimize scheduling in radiology resources. We foresee increased utilization of electronic dashboard technology in the future as a method to improve radiology workflow and quality of patient care. Copyright © 2017 Elsevier Inc. All rights reserved.

  16. Protocol and Topology Issues for Wide-Area Satellite Interconnection of Terrestrial Optical LANs

    Science.gov (United States)

    Parraga, N.

    2002-01-01

    system for multimedia services. EuroSkyWay uses a GEO satellite with onboard switching. It has its own proprietary protocol stack for data link control (DLC), logical link control (LLC) and layer 3 functions such as resource management, call admission control and authentication. Special attention is paid to the IP interworking with Layer 3 function since IP does not support connection set-up and session protocols, thus proper interworking functions with IP signaling protocols for resource reservation routing such as RSVP, BGP, and ICMP need to be developed. Whereas the EuroSkyWay system is an representative for a meshed topology, DVB-RCS systems have usually star configuration with a central hub station. Different data streams are distinguished by program identifiers (PIDs). Recent proposals aim at the evolution of DVB-RCS towards a fully meshed structure. The paper will also discuss the protocol architecture for interconnect SONET LANs over these systems. Finally, a performance comparison of the different solutions will be given in terms of cell overhead rate and signalling effort for selected scenarios.

  17. Quantifying the nonlocality of Greenberger-Horne-Zeilinger quantum correlations by a bounded communication simulation protocol.

    Science.gov (United States)

    Branciard, Cyril; Gisin, Nicolas

    2011-07-08

    The simulation of quantum correlations with finite nonlocal resources, such as classical communication, gives a natural way to quantify their nonlocality. While multipartite nonlocal correlations appear to be useful resources, very little is known on how to simulate multipartite quantum correlations. We present a protocol that reproduces tripartite Greenberger-Horne-Zeilinger correlations with bounded communication: 3 bits in total turn out to be sufficient to simulate all equatorial Von Neumann measurements on the tripartite Greenberger-Horne-Zeilinger state.

  18. Indicators and protocols for monitoring impacts of formal and informal trails in protected areas

    Science.gov (United States)

    Marion, Jeffrey L.; Leung, Yu-Fai

    2011-01-01

    Trails are a common recreation infrastructure in protected areas and their conditions affect the quality of natural resources and visitor experiences. Various trail impact indicators and assessment protocols have been developed in support of monitoring programs, which are often used for management decision-making or as part of visitor capacity management frameworks. This paper reviews common indicators and assessment protocols for three types of trails, surfaced formal trails, unsurfaced formal trails, and informal (visitor-created) trails. Monitoring methods and selected data from three U.S. National Park Service units are presented to illustrate some common trail impact indicators and assessment options.

  19. Two-party secret key distribution via a modified quantum secret sharing protocol.

    Science.gov (United States)

    Grice, W P; Evans, P G; Lawrie, B; Legré, M; Lougovski, P; Ray, W; Williams, B P; Qi, B; Smith, A M

    2015-03-23

    We present and demonstrate a novel protocol for distributing secret keys between two and only two parties based on N-party single-qubit Quantum Secret Sharing (QSS). We demonstrate our new protocol with N = 3 parties using phase-encoded photons. We show that any two out of N parties can build a secret key based on partial information from each other and with collaboration from the remaining N - 2 parties. Our implementation allows for an accessible transition between N-party QSS and arbitrary two party QKD without modification of hardware. In addition, our approach significantly reduces the number of resources such as single photon detectors, lasers and dark fiber connections needed to implement QKD.

  20. Computational Methodologies for Developing Structure–Morphology–Performance Relationships in Organic Solar Cells: A Protocol Review

    KAUST Repository

    Do, Khanh; Ravva, Mahesh Kumar; Wang, Tonghui; Bredas, Jean-Luc

    2016-01-01

    We outline a step-by-step protocol that incorporates a number of theoretical and computational methodologies to evaluate the structural and electronic properties of pi-conjugated semiconducting materials in the condensed phase. Our focus

  1. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  2. Intellectual property right in genetic resources

    Directory of Open Access Journals (Sweden)

    Milošević Mirjana

    2017-01-01

    Full Text Available Plant genetic resources for food and agriculture are necessary in food production and biodiversity conservation. These are the most important natural resources, in addition to air, water and soil. Unfortunately, during the evolution large number of plant genetic resources has been lost. The biggest negative impact on loss of plant genetic resources had been made by humans through the modernization of agriculture and the creation of varieties of high genetic uniformity. FAO and its operation through international mechanisms, such as the adoption of the Convention on Biological Diversity, the first legal act which regulates all levels of biodiversity: ecosystems, species and genetic resources, biotechnology, including the Cartagena Protocol on Biosafety (regulates the transfer of genetic material across the border, contributed to the conservation of plant genetic resources for food and agriculture. In addition to the Convention on Biological Diversity, FAO has been defined by the International Treaty on Plant Genetic Resources for Food and Agriculture in more specific and detailed way, the preservation of genetic resources. The objectives of the International Treaty on Plant Genetic Resources for Food and Agriculture are the conservation and sustainable use of all plant genetic resources for food and agriculture and the fair and equitable sharing of the benefits arising out of their use. There are four basic pillars which form the substance of the Contract, Sustainable use of plant genetic resources, Farmers' Rights, the Multilateral System and the Global Information System. Two organizations, the International Biodiversity and the International Union for the Protection of New Varieties of Plants trying to solve the issues of protection of the population and old varieties as intellectual property.

  3. Electronic conferencing for continuing medical education: a resource survey.

    Science.gov (United States)

    Sternberg, R J

    1986-10-01

    The use of electronic technologies to link participants for education conferences is an option for providers of Continuing Medical Education. In order to profile the kinds of electronic networks currently offering audio- or videoteleconferences for physician audiences, a survey was done during late 1985. The information collected included range of services, fees, and geographic areas served. The results show a broad diversity of providers providing both interactive and didactic programming to both physicians and other health care professionals.

  4. A Multi-Hop Advertising Discovery and Delivering Protocol for Multi Administrative Domain MANET

    Directory of Open Access Journals (Sweden)

    Federico Mari

    2013-01-01

    Full Text Available A Mobile Ad-hoc NETwork (MANET is Multi Administrative Domain (MAD if each network node belongs to an independent authority, that is each node owns its resources and there is no central authority owning all network nodes. One of the main obstructions in designing Service Advertising, Discovery and Delivery (SADD protocol for MAD MANETs is the fact that, in an attempt to increase their own visibility, network nodes tend to flood the network with their advertisements. In this paper, we present a SADD protocol for MAD MANET, based on Bloom filters, that effectively prevents advertising floods due to such misbehaving nodes. Our results with the ns-2 simulator show that our SADD protocol is effective in counteracting advertising floods, it keeps low the collision rate as well as the energy consumption while ensuring that each peer receives all messages broadcasted by other peers.

  5. The research on electronic commerce security payment system based on set protocol

    Science.gov (United States)

    Guo, Hongliang

    2012-04-01

    With the rapid development of network technology, online transactions have become more and more common. In this paper, we firstly introduce the principle and the basic principal and technical foundation of SET, and then we analyze the progress of designing a system in the foundation of the procedure of the electronic business based on SET. On this basis, we design a system of the Payment System for Electronic Business. It will not only take on crucial realism signification for large-scale, medium-sized and mini-type corporations, but also provide guide meaning with programmer and design-developer to realize Electronic Commerce (EC).

  6. Analyzing Lysosome-Related Organelles by Electron Microscopy

    KAUST Repository

    Hurbain, Ilse

    2017-04-29

    Intracellular organelles have a particular morphological signature that can only be appreciated by ultrastructural analysis at the electron microscopy level. Optical imaging and associated methodologies allow to explore organelle localization and their dynamics at the cellular level. Deciphering the biogenesis and functions of lysosomes and lysosome-related organelles (LROs) and their dysfunctions requires their visualization and detailed characterization at high resolution by electron microscopy. Here, we provide detailed protocols for studying LROs by transmission electron microscopy. While conventional electron microscopy and its recent improvements is the method of choice to investigate organelle morphology, immunoelectron microscopy allows to localize organelle components and description of their molecular make up qualitatively and quantitatively.

  7. Messaging Performance of FIPA Interaction Protocols in Networked Embedded Controllers

    Directory of Open Access Journals (Sweden)

    García JoséAPérez

    2008-01-01

    Full Text Available Abstract Agent-based technologies in production control systems could facilitate seamless reconfiguration and integration of mechatronic devices/modules into systems. Advances in embedded controllers which are continuously improving computational capabilities allow for software modularization and distribution of decisions. Agent platforms running on embedded controllers could hide the complexity of bootstrap and communication. Therefore, it is important to investigate the messaging performance of the agents whose main motivation is the resource allocation in manufacturing systems (i.e., conveyor system. The tests were implemented using the FIPA-compliant JADE-LEAP agent platform. Agent containers were distributed through networked embedded controllers, and agents were communicating using request and contract-net FIPA interaction protocols. The test scenarios are organized in intercontainer and intracontainer communications. The work shows the messaging performance for the different test scenarios using both interaction protocols.

  8. Messaging Performance of FIPA Interaction Protocols in Networked Embedded Controllers

    Directory of Open Access Journals (Sweden)

    Omar Jehovani López Orozco

    2007-12-01

    Full Text Available Agent-based technologies in production control systems could facilitate seamless reconfiguration and integration of mechatronic devices/modules into systems. Advances in embedded controllers which are continuously improving computational capabilities allow for software modularization and distribution of decisions. Agent platforms running on embedded controllers could hide the complexity of bootstrap and communication. Therefore, it is important to investigate the messaging performance of the agents whose main motivation is the resource allocation in manufacturing systems (i.e., conveyor system. The tests were implemented using the FIPA-compliant JADE-LEAP agent platform. Agent containers were distributed through networked embedded controllers, and agents were communicating using request and contract-net FIPA interaction protocols. The test scenarios are organized in intercontainer and intracontainer communications. The work shows the messaging performance for the different test scenarios using both interaction protocols.

  9. A protocol using coho salmon to monitor Tongass National Forest Land and Resource Management Plan standards and guidelines for fish habitat.

    Science.gov (United States)

    M.D. Bryant; Trent McDonald; R. Aho; B.E. Wright; Michelle Bourassa Stahl

    2008-01-01

    We describe a protocol to monitor the effectiveness of the Tongass Land Management Plan (TLMP) management standards for maintaining fish habitat. The protocol uses juvenile coho salmon (Oncorhynchus kisutch) in small tributary streams in forested watersheds. We used a 3-year pilot study to develop detailed methods to estimate juvenile salmonid...

  10. Semianalytical expressions for (L-/rho)med(air) and P(repl) for electron beams

    International Nuclear Information System (INIS)

    Wielopolski, L.; Pai, S.; Mlyn, M.

    1991-01-01

    The tables of the mean restricted collision mass stopping power ratios for water, polystyrene and acrylic relative to air given in the AAPM TG-21 protocol have been fitted to an expression with 20 coefficients using the depth in the phantom and the mean incident electron energy as two independent variables. Using these expressions, the calculated values agree with the tabulated values within +0.5% in 85% of the cases and within +/- 1.0% in 95% of the cases. For each of the four cylindrical chamber inner diameters, given in the protocol, the electron fluence correction P(repl) has been fitted to an expression with four coefficients using the mean electron energy at depth z as an independent variable

  11. Energy Reduction Multipath Routing Protocol for MANET Using Recoil Technique

    Directory of Open Access Journals (Sweden)

    Rakesh Kumar Sahu

    2018-04-01

    Full Text Available In Mobile Ad-hoc networks (MANET, power conservation and utilization is an acute problem and has received significant attention from academics and industry in recent years. Nodes in MANET function on battery power, which is a rare and limited energy resource. Hence, its conservation and utilization should be done judiciously for the effective functioning of the network. In this paper, a novel protocol namely Energy Reduction Multipath Routing Protocol for MANET using Recoil Technique (AOMDV-ER is proposed, which conserves the energy along with optimal network lifetime, routing overhead, packet delivery ratio and throughput. It performs better than any other AODV based algorithms, as in AOMDV-ER the nodes transmit packets to their destination smartly by using a varying recoil off time technique based on their geographical location. This concept reduces the number of transmissions, which results in the improvement of network lifetime. In addition, the local level route maintenance reduces the additional routing overhead. Lastly, the prediction based link lifetime of each node is estimated which helps in reducing the packet loss in the network. This protocol has three subparts: an optimal route discovery algorithm amalgamation with the residual energy and distance mechanism; a coordinated recoiled nodes algorithm which eliminates the number of transmissions in order to reduces the data redundancy, traffic redundant, routing overhead, end to end delay and enhance the network lifetime; and a last link reckoning and route maintenance algorithm to improve the packet delivery ratio and link stability in the network. The experimental results show that the AOMDV-ER protocol save at least 16% energy consumption, 12% reduction in routing overhead, significant achievement in network lifetime and packet delivery ratio than Ad hoc on demand multipath distance vector routing protocol (AOMDV, Ad hoc on demand multipath distance vector routing protocol life

  12. Urban Adolescents Readily Comply with a Complicated Asthma Research Protocol

    Directory of Open Access Journals (Sweden)

    Stephanie Lovinsky-Desir

    2014-01-01

    Full Text Available Purpose Adolescents are often cited as having poor rates of compliance with medical regimens and research protocols. We quantified compliance in a cohort of urban adolescents participating in a complex research protocol in which measures were obtained without direct supervision by research personnel. Methods A total of 54 early adolescents ages 10-13 were asked to wear a vest containing a personal air pollutant exposure monitor for two 24-hour periods and to perform daily peak expiratory flow (PEF for six consecutive days. Compliance with wearing the vest was measured by comparing accelerometer data from a device within the vest to one worn continuously on the child's wrist. Daily PEF data were recorded using an electronic meter. Results A priori definition of compliance was met by 85% of the adolescents by wearing the exposure monitoring vest and 72% by performing PEF. Conclusions These findings suggest that early adolescents can be compliant with complex research protocols that are needed to help bridge gaps in pediatric asthma research.

  13. A Secure Cluster-Based Multipath Routing Protocol for WMSNs

    Directory of Open Access Journals (Sweden)

    Jamal N. Al-Karaki

    2011-04-01

    Full Text Available The new characteristics of Wireless Multimedia Sensor Network (WMSN and its design issues brought by handling different traffic classes of multimedia content (video streams, audio, and still images as well as scalar data over the network, make the proposed routing protocols for typical WSNs not directly applicable for WMSNs. Handling real-time multimedia data requires both energy efficiency and QoS assurance in order to ensure efficient utility of different capabilities of sensor resources and correct delivery of collected information. In this paper, we propose a Secure Cluster-based Multipath Routing protocol for WMSNs, SCMR, to satisfy the requirements of delivering different data types and support high data rate multimedia traffic. SCMR exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths to support timeliness and reliable high data rate multimedia communication with minimum energy dissipation. Also, we present a light-weight distributed security mechanism of key management in order to secure the communication between sensor nodes and protect the network against different types of attacks. Performance evaluation from simulation results demonstrates a significant performance improvement comparing with existing protocols (which do not even provide any kind of security feature in terms of average end-to-end delay, network throughput, packet delivery ratio, and energy consumption.

  14. Resource allocation for multichannel broadcasting visible light communication

    Science.gov (United States)

    Le, Nam-Tuan; Jang, Yeong Min

    2015-11-01

    Visible light communication (VLC), which offers the possibility of using light sources for both illumination and data communications simultaneously, will be a promising incorporation technique with lighting applications. However, it still remains some challenges especially coverage because of field-of-view limitation. In this paper, we focus on this issue by suggesting a resource allocation scheme for VLC broadcasting system. By using frame synchronization and a network calculus QoS approximation, as well as diversity technology, the proposed VLC architecture and QoS resource allocation for the multichannel-broadcasting MAC (medium access control) protocol can solve the coverage limitation problem and the link switching problem of exhibition service.

  15. A detailed description of the implementation of inpatient insulin orders with a commercial electronic health record system.

    Science.gov (United States)

    Neinstein, Aaron; MacMaster, Heidemarie Windham; Sullivan, Mary M; Rushakoff, Robert

    2014-07-01

    In the setting of Meaningful Use laws and professional society guidelines, hospitals are rapidly implementing electronic glycemic management order sets. There are a number of best practices established in the literature for glycemic management protocols and programs. We believe that this is the first published account of the detailed steps to be taken to design, implement, and optimize glycemic management protocols in a commercial computerized provider order entry (CPOE) system. Prior to CPOE implementation, our hospital already had a mature glycemic management program. To transition to CPOE, we underwent the following 4 steps: (1) preparation and requirements gathering, (2) design and build, (3) implementation and dissemination, and (4) optimization. These steps required more than 2 years of coordinated work between physicians, nurses, pharmacists, and programmers. With the move to CPOE, our complex glycemic management order sets were successfully implemented without any significant interruptions in care. With feedback from users, we have continued to refine the order sets, and this remains an ongoing process. Successful implementation of glycemic management protocols in CPOE is dependent on broad stakeholder input and buy-in. When using a commercial CPOE system, there may be limitations of the system, necessitating workarounds. There should be an upfront plan to apply resources for continuous process improvement and optimization after implementation. © 2014 Diabetes Technology Society.

  16. A Practice-Based Evaluation of Distress Screening Protocol Adherence and Medical Service Utilization.

    Science.gov (United States)

    Zebrack, Brad; Kayser, Karen; Bybee, Deborah; Padgett, Lynne; Sundstrom, Laura; Jobin, Chad; Oktay, Julianne

    2017-07-01

    Background: This study examined the extent to which cancer programs demonstrated adherence to their own prescribed screening protocol, and whether adherence to that protocol was associated with medical service utilization. The hypothesis is that higher rates of service utilization are associated with lower rates of adherence to screening protocols. Methods: Oncology social workers at Commission on Cancer-accredited cancer programs reviewed electronic health records (EHRs) in their respective cancer programs during a 2-month period in 2014. Rates of overall adherence to a prescribed distress screening protocol were calculated based on documentation in the EHR that screening adherence and an appropriate clinical response had occurred. We examined documentation of emergency department (ED) use and hospitalization within 2 months after the screening visit. Results: Review of 8,409 EHRs across 55 cancer centers indicated that the overall adherence rate to screening protocols was 62.7%. The highest rates of adherence were observed in Community Cancer Programs (76.3%) and the lowest rates were in NCI-designated Cancer Centers (43.3%). Rates of medical service utilization were significantly higher than expected when overall protocol adherence was lacking. After controlling for patient and institutional characteristics, risk ratios for ED use (0.82) and hospitalization (0.81) suggest that when overall protocol adherence was documented, 18% to 19% fewer patients used these medical services. Conclusions: The observed associations between a mandated psychosocial care protocol and medical service utilization suggest opportunities for operational efficiencies and costs savings. Further investigations of protocol integrity, as well as the clinical care models by which psychosocial care is delivered, are warranted. Copyright © 2017 by the National Comprehensive Cancer Network.

  17. Utilization of bio-resources by low energy electron beam

    International Nuclear Information System (INIS)

    Kume, Tamikazu

    2003-01-01

    Utilization of bio-resources by radiation has been investigated for recycling the natural resources and reducing the environmental pollution. Polysaccharides such as chitosan and sodium alginate were easily degraded by irradiation and induced various kinds of biological activities, i.g. anti-microbial activity, promotion of plant growth, suppression of heavy metal stress, phytoalexins induction. Radiation degraded chitosan was effective to enhance the growth of plants in tissue culture. It was demonstrated that the liquid sample irradiation system using low energy EB was effective for the preparation of degraded polysaccharides. Methylcellulose (MC) can be crosslinked under certain radiation condition as same as carboxymethylcellulose (CMC) and produced the biodegradable hydrogel for medical and agricultural use. Treatment of soybean seeds by low energy EB enhanced the growth and the number of rhizobia on the root. (author)

  18. The field-testing of a novel integrated mapping protocol for neglected tropical diseases.

    Directory of Open Access Journals (Sweden)

    Sonia Pelletreau

    2011-11-01

    Full Text Available BACKGROUND: Vertical control and elimination programs focused on specific neglected tropical diseases (NTDs can achieve notable success by reducing the prevalence and intensity of infection. However, many NTD-endemic countries have not been able to launch or scale-up programs because they lack the necessary baseline data for planning and advocacy. Each NTD program has its own mapping guidelines to collect missing data. Where geographic overlap among NTDs exists, an integrated mapping approach could result in significant resource savings. We developed and field-tested an innovative integrated NTD mapping protocol (Integrated Threshold Mapping (ITM Methodology for lymphatic filariasis (LF, trachoma, schistosomiasis and soil-transmitted helminths (STH. METHODOLOGY/PRINCIPAL FINDINGS: The protocol is designed to be resource-efficient, and its specific purpose is to determine whether a threshold to trigger public health interventions in an implementation unit has been attained. The protocol relies on World Health Organization (WHO recommended indicators in the disease-specific age groups. For each disease, the sampling frame was the district, but for schistosomiasis, the sub-district rather than the ecological zone was used. We tested the protocol by comparing it to current WHO mapping methodologies for each of the targeted diseases in one district each in Mali and Senegal. Results were compared in terms of public health intervention, and feasibility, including cost. In this study, the ITM methodology reached the same conclusions as the WHO methodologies regarding the initiation of public health interventions for trachoma, LF and STH, but resulted in more targeted intervention recommendations for schistosomiasis. ITM was practical, feasible and demonstrated an overall cost saving compared with the standard, non-integrated, WHO methodologies. CONCLUSIONS/SIGNIFICANCE: This integrated mapping tool could facilitate the implementation of much

  19. Adaptation of mathematical educational content in e-learning resources

    Directory of Open Access Journals (Sweden)

    Yuliya V. Vainshtein

    2017-01-01

    Full Text Available Modern trends in the world electronic educational system development determine the necessity of adaptive learning intellectual environments and resources’ development and implementation. An upcoming trend in improvement the quality of studying mathematical disciplines is the development and application of adaptive electronic educational resources. However, the development and application experience of adaptive technologies in higher education is currently extremely limited and does not imply the usage flexibility. Adaptive educational resources in the electronic environment are electronic educational resources that provide the student with a personal educational space, filled with educational content that “adapts” to the individual characteristics of the students and provides them with the necessary information.This article focuses on the mathematical educational content adaptation algorithms development and their implementation in the e-learning system. The peculiarity of the proposed algorithms is the possibility of their application and distribution for adaptive e-learning resources construction. The novelty of the proposed approach is the three-step content organization of the adaptive algorithms for the educational content: “introductory adaptation of content”, “the current adaptation of content”, “estimative and a corrective adaptation”. For each stage of the proposed system, mathematical algorithms for educational content adaptation in adaptive e-learning resources are presented.Due to the high level of abstraction and complexity perception of mathematical disciplines, educational content is represented in the various editions of presentation that correspond to the levels of assimilation of the course material. Adaptation consists in the selection of the optimal edition of the material that best matches the individual characteristics of the student. The introduction of a three-step content organization of the adaptive

  20. A new testing protocol for zirconia dental implants.

    Science.gov (United States)

    Sanon, Clarisse; Chevalier, Jérôme; Douillard, Thierry; Cattani-Lorente, Maria; Scherrer, Susanne S; Gremillard, Laurent

    2015-01-01

    Based on the current lack of standards concerning zirconia dental implants, we aim at developing a protocol to validate their functionality and safety prior their clinical use. The protocol is designed to account for the specific brittle nature of ceramics and the specific behavior of zirconia in terms of phase transformation. Several types of zirconia dental implants with different surface textures (porous, alveolar, rough) were assessed. The implants were first characterized in their as-received state by Scanning Electron Microscopy (SEM), Focused Ion Beam (FIB), X-Ray Diffraction (XRD). Fracture tests following a method adapted from ISO 14801 were conducted to evaluate their initial mechanical properties. Accelerated aging was performed on the implants, and XRD monoclinic content measured directly at their surface instead of using polished samples as in ISO 13356. The implants were then characterized again after aging. Implants with an alveolar surface presented large defects. The protocol shows that such defects compromise the long-term mechanical properties. Implants with a porous surface exhibited sufficient strength but a significant sensitivity to aging. Even if associated to micro cracking clearly observed by FIB, aging did not decrease mechanical strength of the implants. As each dental implant company has its own process, all zirconia implants may behave differently, even if the starting powder is the same. Especially, surface modifications have a large influence on strength and aging resistance, which is not taken into account by the current standards. Protocols adapted from this work could be useful. Copyright © 2014 Academy of Dental Materials. Published by Elsevier Ltd. All rights reserved.

  1. Resource utilisation and costs in predementia and dementia: a systematic review protocol

    Science.gov (United States)

    Landeiro, Filipa; Wace, Helena; Ghinai, Isaac; Nye, Elsbeth; Mughal, Seher; Walsh, Katie; Roberts, Nia; Lecomte, Pascal; Wittenberg, Raphael; Wolstenholme, Jane; Handels, Ron; Roncancio-Diaz, Emilse; Potashman, Michele H; Tockhorn-Heidenreich, Antje; Gray, Alastair M

    2018-01-01

    Introduction Dementia is the fastest growing major cause of disability globally with a mounting social and financial impact for patients and their families but also to health and social care systems. This review aims to systematically synthesise evidence on the utilisation of resources and costs incurred by patients and their caregivers and by health and social care services across the full spectrum of dementia, from its preceding preclinical stage to end of life. The main drivers of resources used and costs will also be identified. Methods and analysis A systematic literature review was conducted in MEDLINE, EMBASE, CDSR, CENTRAL, DARE, EconLit, CEA Registry, TRIP, NHS EED, SCI, RePEc and OpenGrey between January 2000 and beginning of May 2017. Two reviewers will independently assess each study for inclusion and disagreements will be resolved by a third reviewer. Data will be extracted using a predefined data extraction form following best practice. Study quality will be assessed with the Effective Public Health Practice Project quality assessment tool. The reporting of costing methodology will be assessed using the British Medical Journal checklist. A narrative synthesis of all studies will be presented for resources used and costs incurred, by level of disease severity when available. If feasible, the data will be synthesised using appropriate statistical techniques. Ethics and dissemination Included articles will be reviewed for an ethics statement. The findings of the review will be disseminated in a related peer-reviewed journal and presented at conferences. They will also contribute to the work developed in the Real World Outcomes across the Alzheimer’s disease spectrum for better care: multi-modal data access platform (ROADMAP). Trial registration number CRD42017071413. PMID:29362261

  2. A Depletion Protocol for Non-Renewable Natural Resources: Australia as an Example

    International Nuclear Information System (INIS)

    Bartlett, Albert A.

    2006-01-01

    This paper examines the implications of statements by Australia's Minister of Resources that Australia's exports of coal are growing rapidly and that Australia's coal will last '110 years at current rates of production.' If one assumes that coal production P(t), follows a Gaussian curve (similar to a Hubbert curve) one can construct a family of Gaussian curves showing possible future paths of P(t) which are consistent with the cited '110 years.' Each curve reaches a maximum after which P(t) declines toward zero. Knowledge of the present value of dP/dt allows one member of the family to be identified as the most probable future path of P(t). Families of curves and tabular data are presented for resource quantities that would last 50, 100 and 200 years 'at current rates of production.' If, instead, Australia's P(t) follows a declining exponential curve (exp(-kt)) with k = (1/110) per year, the stated quantity of coal will allow production to continue forever, with P(t) declining with a half life of 76 y. This and more rapidly declining exponential paths are the only paths that can be said to be sustainable. The envelope of the family of Gaussian curves divides the (P, t) plane into 'allowed' and 'forbidden' areas. The declining exponential curve divides the 'allowed' area into an upper area that is 'terminal' and a lower area that is 'sustainable.' These facts, coupled with Australia's expectations of rapid growth of its population, suggest that Australia's present resource policies are 'anti-sustainable' and that the people of Australia need to rethink their present policy of rapidly exporting their fossil fuels

  3. Right to Food and the Nagoya Protocol

    Directory of Open Access Journals (Sweden)

    Romina Ysabel Bazán Barba

    2016-12-01

    Full Text Available In the perspective of Environmental Law, the juridical-sociological aspect addresses the problem for the Right to Food, which has been intensified by the lack of equity, social justice and mainly by environmental degradation. Based on theoretical research, the Constitution and international treaties on the subject, the problem of hunger is studied, with emphasis on the Nagoya Protocol – a new international instrument for access and distribution of genetic resources. It aims to analyze the geopolitics behind the hunger issue; the indiscriminate use of agrochemicals; the monopoly of seeds; and the lives wasted in the process of maintenance/circulation in the food market.

  4. Public health facility resource availability and provider adherence to first antenatal guidelines in a low resource setting in Accra, Ghana.

    Science.gov (United States)

    Amoakoh-Coleman, Mary; Agyepong, Irene Akua; Kayode, Gbenga A; Grobbee, Diederick E; Klipstein-Grobusch, Kerstin; Ansah, Evelyn K

    2016-09-21

    Lack of resources has been identified as a reason for non-adherence to clinical guidelines. Our aim was to describe public health facility resource availability in relation to provider adherence to first antenatal visit guidelines. A cross-sectional analysis of the baseline data of a prospective cohort study on adherence to first antenatal care visit guidelines was carried out in 11 facilities in the Greater Accra Region of Ghana. Provider adherence was studied in relation to health facility resource availability such as antenatal workload for clinical staffs, routine antenatal drugs, laboratory testing, protocols, ambulance and equipment. Eleven facilities comprising 6 hospitals (54.5 %), 4 polyclinics (36.4 %) and 1 health center were randomly sampled. Complete provider adherence to first antenatal guidelines for all the 946 participants was 48.1 % (95 % CI: 41.8-54.2 %), varying significantly amongst the types of facilities, with highest rate in the polyclinics. Average antenatal workload per month per clinical staff member was higher in polyclinics compared to the hospitals. All facility laboratories were able to conduct routine antenatal tests. Most routine antenatal drugs were available in all facilities except magnesium sulphate and sulphadoxine-pyrimethamine which were lacking in some. Antenatal service protocols and equipment were also available in all facilities. Although antenatal workload varies across different facility types in the Greater Accra region, other health facility resources that support implementation of first antenatal care guidelines are equally available in all the facilities. These factors therefore do not adequately account for the low and varying proportions of complete adherence to guidelines across facility types. Providers should be continually engaged for a better understanding of the barriers to their adherence to these guidelines.

  5. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  6. DEVELOPMENT OF ENTERPRISE RESOURCE PLANNING APPLICATIONS TO HELP RESOURCES MANAGEMENT OF FURNITURE COMPANY USING TECHNOLOGY WINDOWS COMMUNICATION FOUNDATION

    Directory of Open Access Journals (Sweden)

    Didiek S Wiyono

    2013-09-01

    Full Text Available Furniture companies need the latest information of its resources to maintain efficiency and productivity. ERP can be used as a tool to manage the existing resources on furniture company and can quickly display the suitable information. The study was conducted to design a simple ERP application that can help resource management on the furniture company. ERP application built with object-oriented methods. The implementation is using web technology as the user interface, Windows Communication Foundation (WCF as the application interface with other systems, and HTTP / HTTPS as the transport protocol to access the application. The results of study is a simple ERP application which consist of order management, production, inventory, purchasing, and reporting. ERP applications can be accessible to users through the web. For the purposes of integration, has built 72 services of WCF that can be accessed by other applications even though using different platforms. Keywords: erp, web, windows communication foundation, integration

  7. Internet and Electronic Information Management

    Science.gov (United States)

    2004-12-01

    centers to form consortia and share electronic information sources. Although traditional resource sharing arrangements encouraged competition rather...outside world, through public relations and through marketing information products or services, to its own competitive advantage (Davenport 1997: 193-217... electronic information sources are a challenge for electronic information managers. Libraries and information centers are no longer “the only game in town

  8. Design and Practical Evaluation of a Family of Lightweight Protocols for Heterogeneous Sensing through BLE Beacons in IoT Telemetry Applications

    Science.gov (United States)

    2017-01-01

    The Internet of Things (IoT) involves a wide variety of heterogeneous technologies and resource-constrained devices that interact with each other. Due to such constraints, IoT devices usually require lightweight protocols that optimize the use of resources and energy consumption. Among the different commercial IoT devices, Bluetooth and Bluetooth Low Energy (BLE)-based beacons, which broadcast periodically certain data packets to notify their presence, have experienced a remarkable growth, specially due to their application in indoor positioning systems. This article proposes a family of protocols named Lightweight Protocol for Sensors (LP4S) that provides fast responses and enables plug-and-play mechanisms that allow IoT telemetry systems to discover new nodes and to describe and auto-register the sensors and actuators connected to a beacon. Thus, three protocols are defined depending on the beacon hardware characteristics: LP4S-6 (for resource-constraint beacons), LP4S-X (for more powerful beacons) and LP4S-J (for beacons able to run complex firmware). In order to demonstrate the capabilities of the designed protocols, the most restrictive (LP4S-6) is tested after implementing it for a telemetry application in a beacon based on Eddystone (Google’s open beacon format). Thus, the beacon specification is extended in order to increase its ability to manage unlimited sensors in a telemetry system without interfering in its normal operation with Eddystone frames. The performed experiments show the feasibility of the proposed solution and its superiority, in terms of latency and energy consumption, with respect to approaches based on Generic Attribute Profile (GATT) when multiple users connect to a mote or in scenarios where latency is not a restriction, but where low-energy consumption is essential. PMID:29280975

  9. Design and Practical Evaluation of a Family of Lightweight Protocols for Heterogeneous Sensing through BLE Beacons in IoT Telemetry Applications.

    Science.gov (United States)

    Hernández-Rojas, Dixys L; Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Escudero, Carlos J

    2017-12-27

    The Internet of Things (IoT) involves a wide variety of heterogeneous technologies and resource-constrained devices that interact with each other. Due to such constraints, IoT devices usually require lightweight protocols that optimize the use of resources and energy consumption. Among the different commercial IoT devices, Bluetooth and Bluetooth Low Energy (BLE)-based beacons, which broadcast periodically certain data packets to notify their presence, have experienced a remarkable growth, specially due to their application in indoor positioning systems. This article proposes a family of protocols named Lightweight Protocol for Sensors (LP4S) that provides fast responses and enables plug-and-play mechanisms that allow IoT telemetry systems to discover new nodes and to describe and auto-register the sensors and actuators connected to a beacon. Thus, three protocols are defined depending on the beacon hardware characteristics: LP4S-6 (for resource-constraint beacons), LP4S-X (for more powerful beacons) and LP4S-J (for beacons able to run complex firmware). In order to demonstrate the capabilities of the designed protocols, the most restrictive (LP4S-6) is tested after implementing it for a telemetry application in a beacon based on Eddystone (Google's open beacon format). Thus, the beacon specification is extended in order to increase its ability to manage unlimited sensors in a telemetry system without interfering in its normal operation with Eddystone frames. The performed experiments show the feasibility of the proposed solution and its superiority, in terms of latency and energy consumption, with respect to approaches based on Generic Attribute Profile (GATT) when multiple users connect to a mote or in scenarios where latency is not a restriction, but where low-energy consumption is essential.

  10. Design and Practical Evaluation of a Family of Lightweight Protocols for Heterogeneous Sensing through BLE Beacons in IoT Telemetry Applications

    Directory of Open Access Journals (Sweden)

    Dixys L. Hernández-Rojas

    2017-12-01

    Full Text Available The Internet of Things (IoT involves a wide variety of heterogeneous technologies and resource-constrained devices that interact with each other. Due to such constraints, IoT devices usually require lightweight protocols that optimize the use of resources and energy consumption. Among the different commercial IoT devices, Bluetooth and Bluetooth Low Energy (BLE-based beacons, which broadcast periodically certain data packets to notify their presence, have experienced a remarkable growth, specially due to their application in indoor positioning systems. This article proposes a family of protocols named Lightweight Protocol for Sensors (LP4S that provides fast responses and enables plug-and-play mechanisms that allow IoT telemetry systems to discover new nodes and to describe and auto-register the sensors and actuators connected to a beacon. Thus, three protocols are defined depending on the beacon hardware characteristics: LP4S-6 (for resource-constraint beacons, LP4S-X (for more powerful beacons and LP4S-J (for beacons able to run complex firmware. In order to demonstrate the capabilities of the designed protocols, the most restrictive (LP4S-6 is tested after implementing it for a telemetry application in a beacon based on Eddystone (Google’s open beacon format. Thus, the beacon specification is extended in order to increase its ability to manage unlimited sensors in a telemetry system without interfering in its normal operation with Eddystone frames. The performed experiments show the feasibility of the proposed solution and its superiority, in terms of latency and energy consumption, with respect to approaches based on Generic Attribute Profile (GATT when multiple users connect to a mote or in scenarios where latency is not a restriction, but where low-energy consumption is essential.

  11. Resource Allocation Model for Modelling Abstract RTOS on Multiprocessor System-on-Chip

    DEFF Research Database (Denmark)

    Virk, Kashif Munir; Madsen, Jan

    2003-01-01

    Resource Allocation is an important problem in RTOS's, and has been an active area of research. Numerous approaches have been developed and many different techniques have been combined for a wide range of applications. In this paper, we address the problem of resource allocation in the context...... of modelling an abstract RTOS on multiprocessor SoC platforms. We discuss the implementation details of a simplified basic priority inheritance protocol for our abstract system model in SystemC....

  12. Stream Control Transmission Protocol as a Transport for SIP: a case study

    Directory of Open Access Journals (Sweden)

    Giuseppe De Marco

    2004-06-01

    Full Text Available The dominant signalling protocol both in future wireless and wired networks will be the Session Initiation Protocol (SIP, as pointed out in the 3G IP-based mobile networks specifications, entailing a fully Internet integrated network. The use of SIP in the IP Multimedia Subsytem (IMS of Release 5 involves the development of servers capable to handle a large number of call requests. The signaling traffic associated to such requests could explode, if an intelligent congestion control were not introduced. Stream Control Transmission Protocol (SCTP was born to support transport of SS7 signaling messages. However, many of the SCTP features are also useful for transport of SIP messages, as: congestion control mechanism, good separation among independent messages, multihoming. Indeed, adoption of SCTP as transport of SIP signaling might prove useful in some situations where usual transport protocols, like TCP and UDP, suffer performance degradation. In this paper, we analyse the general framework wherein SIP operates and we discuss the benefits of using SCTP as a transport for SIP, toward fair sharing of network resources. This study is carried on in the context of the implementation of an high-performance SIP Proxy Server. We also present some preliminar results of an implementation of SIP over SCTP/UDP in a real LAN environment.

  13. Electronic Information Access and Utilization by Makerere University Students in Uganda

    Directory of Open Access Journals (Sweden)

    Elisam Magara

    2008-09-01

    Full Text Available Objectives – The objectives of this study were to establish the level of computer utilization skills of Makerere University (Uganda Library and Information Science (LIS students; to determine the use of electronic information resources by LIS students; to determine the attitudes of LIS students towards electronic information resources; and to establish the problems faced by LIS students in accessing electronic information resources.Methods – A questionnaire survey was used for data collection.Results – The majority of Library and Information Science students at Makerere University depend on university computers for their work, and very few of them access the library’s e-resources. The few who access e-resources are self-taught. The majority of students surveyed were unaware of Emerald and EBSCO databases relevant to Library and Information Science students, and they found accessing eresources time-consuming. Conclusion – The study concluded that a concerted effort is needed by both LIS lecturers and university librarians in promoting use of the library’s electronic resources.

  14. Dynamic models for distributed generation resources

    Energy Technology Data Exchange (ETDEWEB)

    Morched, A.S. [BPR Energie, Sherbrooke, PQ (Canada)

    2010-07-01

    Distributed resources can impact the performance of host power systems during both normal and abnormal system conditions. This PowerPoint presentation discussed the use of dynamic models for identifying potential interaction problems between interconnected systems. The models were designed to simulate steady state behaviour as well as transient responses to system disturbances. The distributed generators included directly coupled and electronically coupled generators. The directly coupled generator was driven by wind turbines. Simplified models of grid-side inverters, electronically coupled wind generators and doubly-fed induction generators (DFIGs) were presented. The responses of DFIGs to wind variations were evaluated. Synchronous machine and electronically coupled generator responses were compared. The system model components included load models, generators, protection systems, and system equivalents. Frequency responses to islanding events were reviewed. The study demonstrated that accurate simulations are needed to predict the impact of distributed generation resources on the performance of host systems. Advances in distributed generation technology have outpaced the development of models needed for integration studies. tabs., figs.

  15. Resource utilisation and costs in predementia and dementia: a systematic review protocol.

    Science.gov (United States)

    Landeiro, Filipa; Wace, Helena; Ghinai, Isaac; Nye, Elsbeth; Mughal, Seher; Walsh, Katie; Roberts, Nia; Lecomte, Pascal; Wittenberg, Raphael; Wolstenholme, Jane; Handels, Ron; Roncancio-Diaz, Emilse; Potashman, Michele H; Tockhorn-Heidenreich, Antje; Gray, Alastair M

    2018-01-23

    Dementia is the fastest growing major cause of disability globally with a mounting social and financial impact for patients and their families but also to health and social care systems. This review aims to systematically synthesise evidence on the utilisation of resources and costs incurred by patients and their caregivers and by health and social care services across the full spectrum of dementia, from its preceding preclinical stage to end of life. The main drivers of resources used and costs will also be identified. A systematic literature review was conducted in MEDLINE, EMBASE, CDSR, CENTRAL, DARE, EconLit, CEA Registry, TRIP, NHS EED, SCI, RePEc and OpenGrey between January 2000 and beginning of May 2017. Two reviewers will independently assess each study for inclusion and disagreements will be resolved by a third reviewer. Data will be extracted using a predefined data extraction form following best practice. Study quality will be assessed with the Effective Public Health Practice Project quality assessment tool. The reporting of costing methodology will be assessed using the British Medical Journal checklist. A narrative synthesis of all studies will be presented for resources used and costs incurred, by level of disease severity when available. If feasible, the data will be synthesised using appropriate statistical techniques. Included articles will be reviewed for an ethics statement. The findings of the review will be disseminated in a related peer-reviewed journal and presented at conferences. They will also contribute to the work developed in the Real World Outcomes across the Alzheimer's disease spectrum for better care: multi-modal data access platform (ROADMAP). CRD42017071413. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  16. A Smart Collaborative Routing Protocol for Reliable Data Diffusion in IoT Scenarios.

    Science.gov (United States)

    Ai, Zheng-Yang; Zhou, Yu-Tong; Song, Fei

    2018-06-13

    It is knotty for current routing protocols to meet the needs of reliable data diffusion during the Internet of Things (IoT) deployments. Due to the random placement, limited resources and unattended features of existing sensor nodes, the wireless transmissions are easily exposed to unauthorized users, which becomes a vulnerable area for various malicious attacks, such as wormhole and Sybil attacks. However, the scheme based on geographic location is a suitable candidate to defend against them. This paper is inspired to propose a smart collaborative routing protocol, Geographic energy aware routing and Inspecting Node (GIN), for guaranteeing the reliability of data exchanging. The proposed protocol integrates the directed diffusion routing, Greedy Perimeter Stateless Routing (GPSR), and the inspecting node mechanism. We first discuss current wireless routing protocols from three diverse perspectives (improving transmission rate, shortening transmission range and reducing transmission consumption). Then, the details of GIN, including the model establishment and implementation processes, are presented by means of the theoretical analysis. Through leveraging the game theory, the inspecting node is elected to monitor the network behaviors. Thirdly, we evaluate the network performances, in terms of transmission delay, packet loss ratio, and throughput, between GIN and three traditional schemes (i.e., Flooding, GPSR, and GEAR). The simulation results illustrate that the proposed protocol is able to outperform the others.

  17. The Classroom Communication Resource (CCR) intervention to change peer's attitudes towards children who stutter (CWS): study protocol for a randomised controlled trial.

    Science.gov (United States)

    Mallick, Rizwana; Kathard, Harsha; Thabane, Lehana; Pillay, Mershen

    2018-01-17

    Children who stutter (CWS) are at a high-risk of being teased and bullied in primary school because of negative peer attitudes and perceptions towards stuttering. There is little evidence to determine if classroom-based interventions are effective in changing peer attitudes towards stuttering. The primary objective is to determine the effect of the Classroom Communication Resource (CCR) intervention versus usual practice, measured using the Stuttering Resource Outcomes Measure (SROM) 6-months post-intervention among grade 7 students. The secondary objective is to investigate attitude changes towards stuttering among grade participants on the SROM subscales. A cluster randomised controlled trial (RCT) will be conducted with schools as the unit of randomization. Schools will be stratified into quintile groups, and then randomized to receive the CCR intervention or usual practice. Quintile stratification will be conducted in accordance to the Western Cape Department of Education classification of schools according to geographical location, fee per school and allocation of resources and funding. Participants will include primary schools in the lower (second and third) and higher (fourth and fifth) quintiles and children aged 11 years or older in grade 7 will be included. The study will consist of the CCR intervention program or usual practice as a no-CCR control. The CCR is a classroom-based, teacher led intervention tool including a story, role-play and discussion. The grade 7 teachers allocated to the CCR intervention, will be trained and will administer the intervention. The analysis will follow intention-to-treat (ITT) principle and generalized estimating equations (GEE) to compare groups on the global SROM and its subscales to account for possible clustering within schools. The subgroup hypothesis will be tested by adding an interaction term of quintile group x intervention. This study is designed to assess whether the CCR intervention versus usual practice in

  18. Method selection for sustainability assessments: The case of recovery of resources from waste water.

    Science.gov (United States)

    Zijp, M C; Waaijers-van der Loop, S L; Heijungs, R; Broeren, M L M; Peeters, R; Van Nieuwenhuijzen, A; Shen, L; Heugens, E H W; Posthuma, L

    2017-07-15

    Sustainability assessments provide scientific support in decision procedures towards sustainable solutions. However, in order to contribute in identifying and choosing sustainable solutions, the sustainability assessment has to fit the decision context. Two complicating factors exist. First, different stakeholders tend to have different views on what a sustainability assessment should encompass. Second, a plethora of sustainability assessment methods exist, due to the multi-dimensional characteristic of the concept. Different methods provide other representations of sustainability. Based on a literature review, we present a protocol to facilitate method selection together with stakeholders. The protocol guides the exploration of i) the decision context, ii) the different views of stakeholders and iii) the selection of pertinent assessment methods. In addition, we present an online tool for method selection. This tool identifies assessment methods that meet the specifications obtained with the protocol, and currently contains characteristics of 30 sustainability assessment methods. The utility of the protocol and the tool are tested in a case study on the recovery of resources from domestic waste water. In several iterations, a combination of methods was selected, followed by execution of the selected sustainability assessment methods. The assessment results can be used in the first phase of the decision procedure that leads to a strategic choice for sustainable resource recovery from waste water in the Netherlands. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Availability of Electronic Resources for Service Provision in ...

    African Journals Online (AJOL)

    The study also revealed that majority of the University libraries have adequate basic infrastructure for effective electronic information services. ... acquired by the library are put into maximal use by the library clientele, thereby ensuring the achievement of the library's objective which is satisfying the users, information needs.

  20. Strong Authentication Protocol based on Java Crypto Chip as a Secure Element

    Directory of Open Access Journals (Sweden)

    Majid Mumtaz

    2016-10-01

    Full Text Available Smart electronic devices and gadgets and their applications are becoming more and more popular. Most of those devices and their applications handle personal, financial, medical and other sensitive data that require security and privacy protection. In this paper we describe one aspect of such protection – user authentication protocol based on the use of X.509 certificates. The system uses Public Key Infrastructure (PKI, challenge/response protocol, mobile proxy servers, and Java cards with crypto capabilities used as a Secure Element. Innovative design of the protocol, its implementation, and evaluation results are described. In addition to end-user authentication, the described solution also supports the use of X.509 certificates for additional security services – confidentiality, integrity, and non-repudiation of transactions and data in an open network environment. The system uses Application Programming Interfaces (APIs to access Java cards functions and credentials that can be used as add-ons to enhance any mobile application with security features and services.

  1. Relay Selection and Resource Allocation in One-Way and Two-Way Cognitive Relay Networks

    KAUST Repository

    Alsharoa, Ahmad M.

    2013-01-01

    In this work, the problem of relay selection and resource power allocation in one- way and two-way cognitive relay networks using half duplex channels with different relaying protocols is investigated. Optimization problems for both single

  2. Evaluating Protocol Lifecycle Time Intervals in HIV/AIDS Clinical Trials

    Science.gov (United States)

    Schouten, Jeffrey T.; Dixon, Dennis; Varghese, Suresh; Cope, Marie T.; Marci, Joe; Kagan, Jonathan M.

    2014-01-01

    Background Identifying efficacious interventions for the prevention and treatment of human diseases depends on the efficient development and implementation of controlled clinical trials. Essential to reducing the time and burden of completing the clinical trial lifecycle is determining which aspects take the longest, delay other stages, and may lead to better resource utilization without diminishing scientific quality, safety, or the protection of human subjects. Purpose In this study we modeled time-to-event data to explore relationships between clinical trial protocol development and implementation times, as well as identify potential correlates of prolonged development and implementation. Methods We obtained time interval and participant accrual data from 111 interventional clinical trials initiated between 2006 and 2011 by NIH’s HIV/AIDS Clinical Trials Networks. We determined the time (in days) required to complete defined phases of clinical trial protocol development and implementation. Kaplan-Meier estimates were used to assess the rates at which protocols reached specified terminal events, stratified by study purpose (therapeutic, prevention) and phase group (pilot/phase I, phase II, and phase III/ IV). We also examined several potential correlates to prolonged development and implementation intervals. Results Even though phase grouping did not determine development or implementation times of either therapeutic or prevention studies, overall we observed wide variation in protocol development times. Moreover, we detected a trend toward phase III/IV therapeutic protocols exhibiting longer developmental (median 2 ½ years) and implementation times (>3years). We also found that protocols exceeding the median number of days for completing the development interval had significantly longer implementation. Limitations The use of a relatively small set of protocols may have limited our ability to detect differences across phase groupings. Some timing effects

  3. Analyses of resource reservation schemes for optical burst switching networks

    Science.gov (United States)

    Solanska, Michaela; Scholtz, Lubomir; Ladanyi, Libor; Mullerova, Jarmila

    2017-12-01

    With growing demands of Internet Protocol services for transmission capacity and speed, the Optical Burst Switching presents the solution for future high-speed optical networks. Optical Burst Switching is a technology for transmitting large amounts of data bursts through a transparent optical switching network. To successfully transmit bursts over OBS network and reach the destination node, resource reservation schemes have to be implemented to allocate resources and configure optical switches for that burst at each node. The one-way resource reservation schemes and the performance evaluation of reservation schemes are presented. The OBS network model is performed using OMNeT++ simulation environment. During the reservation of network resources, the optical cross-connect based on semiconductor optical amplifier is used as the core node. Optical switches based on semiconductor optical amplifiers are a promising technology for high-speed optical communication networks.

  4. Emotional Intelligence Research within Human Resource Development Scholarship

    Science.gov (United States)

    Farnia, Forouzan; Nafukho, Fredrick Muyia

    2016-01-01

    Purpose: The purpose of this study is to review and synthesize pertinent emotional intelligence (EI) research within the human resource development (HRD) scholarship. Design/methodology/approach: An integrative review of literature was conducted and multiple electronic databases were searched to find the relevant resources. Using the content…

  5. An improved resource management model based on MDS

    Science.gov (United States)

    Yuan, Man; Sun, Changying; Li, Pengfei; Sun, Yongdong; He, Rui

    2005-11-01

    GRID technology provides a kind of convenient method for managing GRID resources. This service is so-called monitoring, discovering service. This method is proposed by Globus Alliance, in this GRID environment, all kinds of resources, such as computational resources, storage resources and other resources can be organized by MDS specifications. However, this MDS is a theory framework, particularly, in a small world intranet, in the case of limit of resources, the MDS has its own limitation. Based on MDS, an improved light method for managing corporation computational resources and storage resources is proposed in intranet(IMDS). Firstly, in MDS, all kinds of resource description information is stored in LDAP, it is well known although LDAP is a light directory access protocol, in practice, programmers rarely master how to access and store resource information into LDAP store, in such way, it limits MDS to be used. So, in intranet, these resources' description information can be stored in RDBMS, programmers and users can access this information by standard SQL. Secondly, in MDS, how to monitor all kinds of resources in GRID is not transparent for programmers and users. In such way, it limits its application scope, in general, resource monitoring method base on SNMP is widely employed in intranet, therefore, a kind of resource monitoring method based on SNMP is integrated into MDS. Finally, all kinds of resources in the intranet can be described by XML, and all kinds of resources' description information is stored in RDBMS, such as MySql, and retrieved by standard SQL, dynamic information for all kinds of resources can be sent to resource storage by SNMP, A prototype resource description, monitoring is designed and implemented in intranet.

  6. Cognitive LF-Ant: A Novel Protocol for Healthcare Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Marcelo Alencar

    2012-08-01

    Full Text Available In this paper, the authors present the Cognitive LF-Ant protocol for emergency reporting in healthcare wireless sensor networks. The protocol is inspired by the natural behaviour of ants and a cognitive component provides the capabilities to dynamically allocate resources, in accordance with the emergency degree of each patient. The intra-cluster emergency reporting is inspired by the different capabilities of leg-manipulated ants. The inter-cluster reporting is aided by the cooperative modulation diversity with spectrum sensing, which can detect new emergency reporting requests and forward them. Simulations results show the decrease of average delay time as the probability of opportunistic access increases, which privileges the emergency reporting related to the patients with higher priority of resources’ usage. Furthermore, the packet loss rate is decreased by the use of cooperative modulation diversity with spectrum sensing.

  7. Development and implementation of intranasal naloxone opioid overdose response protocol at a homeless health clinic.

    Science.gov (United States)

    Dahlem, Chin Hwa Y; Horstman, Molly J; Williams, Brent C

    2016-01-01

    To describe the development, implementation, and preliminary evaluation of Opioid Overdose Response Protocol using intranasal (IN) naloxone in a homeless shelter. Opioid Overdose Response Protocol and training curriculum were developed using the Massachusetts Department of Public Health Opioid Overdose Education and Naloxone Distribution (OEND) flow chart, the American Heart Association (AHA) simplified adult basic life support algorithm, and resources through Harms Reduction Coalition. Intranasal naloxone offers a safe and effective method for opioid reversal. To combat the rising incidence of opioid overdose, IN naloxone should be made available at homeless shelters and other facilities with high frequency of opioid overdose, including the training of appropriate staff. This project has demonstrated the effective training and implementation of an Opioid Overdose Response Protocol, based on feedback received from cardiopulmonary resuscitation (CPR) trained nonhealthcare staff. Nurse practitioners (NPs), with our focus on patient care, prevention, and education, are well suited to the deployment of this life-saving protocol. NPs are in critical positions to integrate opioid overdose prevention education and provide naloxone rescue kits in clinical practices. ©2015 American Association of Nurse Practitioners.

  8. Radiotherapy Dosimetry Protocols For High Energy Photons And Electrons

    International Nuclear Information System (INIS)

    Thwaites, D.I.

    1999-01-01

    One vital requirement in radiotherapy is to ensure as closely as possible consistency in determination of dose between different centers and at different times, both within a given country and internationally, because the comparison and transfer of clinical experience and the evaluation of clinical trials is dependent on common statements of dose delivered. In addition at each loon] centre it is vital that the absorbed dose calibration of each beam is carried out to exacting and consistent standards, as this is the fundamental measurement upon which the quality of all treatments on that machine depend throughout its clinical lifetime. The systems in place to ensure consistency in dosimetry differ in the details from country to country, but all depend on the same basic considerations: - the use of ion chambers of similar design and similar construction materials, - traceable calibrations of these chambers to an accredited primary or secondary standard dosimetry laboratory (SSDL) in terms of some agreed relevant dosimetric quantity, - dose statements in terms of absorbed dose to a common material, water, - the application of an appropriate recommended national or international dosimetry protocol (or code of practice) which ensures commonality in the method of use of the calibrated ion chamber, the radiotherapy treatment beam calibration conditions and any data required to convert the ion chamber reading to absorbed dose to water, and - strict quality control on each step in this process

  9. A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Comparison of Routing Protocol for WSNs: Redundancy Based Approach

    Directory of Open Access Journals (Sweden)

    Anand Prakash

    2014-03-01

    Full Text Available Wireless Sensor Networks (WSNs with their dynamic applications gained a tremendous attention of researchers. Constant monitoring of critical situations attracted researchers to utilize WSNs at vast platforms. The main focus in WSNs is to enhance network localization as much as one could, for efficient and optimal utilization of resources. Different approaches based upon redundancy are proposed for optimum functionality. Localization is always related with redundancy of sensor nodes deployed at remote areas for constant and fault tolerant monitoring. In this work, we propose a comparison of classic flooding and the gossip protocol for homogenous networks which enhances stability and throughput quiet significantly.  

  10. To get or not to get: the KAUST library e-resources acquisition experience

    KAUST Repository

    Ramli, Rindra M.

    2014-06-01

    In the challenging times of budget cuts and reviews, libraries are faced with issues, among others, such as justifying acquisition, negotiating deals and reviewing current subscriptions (pertaining to electronic resources). With the rapid increase in growth of electronic resources, libraries have to continuously assess their acquisition models and policies to constantly ensure that they are balancing their budget and users’ needs as well. This paper highlights the role played by Technical and IT department of King Abdullah University of Science and Technology (KAUST) library (Saudi Arabia) in acquiring the electronic resources (electronic books, electronic journals, databases, image and reference) for the community. It will describe the processes during the early days when KAUST library was inaugurated; how electronic resources were acquired and what went through during those days. The paper will elaborate further how the acquisition model has evolved and the various important roles played by the library staff in ensuring that acquisitions/subscriptions are justified, within the budget and provides ROI for the library. King Abdullah University is a graduate research university which opened in September 2009 with its first cohort of 800 graduate students (25% female) taught by 100 faculties. The focus of study and research in the university are: Mathematics and Computer Science, Physical Sciences and Life Sciences. The university library started with 10 staff. The library has a “state-of-the-art learning and information resource center supporting graduate education and advanced scientific research” (KAUST, 2010).

  11. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  12. Application Protocol, Initial Graphics Exchange Specification (IGES), Layered Electrical Product

    Energy Technology Data Exchange (ETDEWEB)

    O`Connell, L.J. [ed.

    1994-12-01

    An application protocol is an information systems engineering view of a specific product The view represents an agreement on the generic activities needed to design and fabricate the product the agreement on the information needed to support those activities, and the specific constructs of a product data standard for use in transferring some or all of the information required. This application protocol describes the data for electrical and electronic products in terms of a product description standard called the Initial Graphics Exchange Specification (IGES). More specifically, the Layered Electrical Product IGES Application Protocol (AP) specifies the mechanisms for defining and exchanging computer-models and their associated data for those products which have been designed in two dimensional geometry so as to be produced as a series of layers in IGES format The AP defines the appropriateness of the data items for describing the geometry of the various parts of a product (shape and location), the connectivity, and the processing and material characteristics. Excluded is the behavioral requirements which the product was intended to satisfy, except as those requirements have been recorded as design rules or product testing requirements.

  13. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  14. Initial Characterization of Optical Communications with Disruption-Tolerant Network Protocols

    Science.gov (United States)

    Schoolcraft, Joshua; Wilson, Keith

    2011-01-01

    Disruption-tolerant networks (DTNs) are groups of network assets connected with a suite of communication protocol technologies designed to mitigate the effects of link delay and disruption. Application of DTN protocols to diverse groups of network resources in multiple sub-networks results in an overlay network-of-networks with autonomous data routing capability. In space environments where delay or disruption is expected, performance of this type of architecture (such as an interplanetary internet) can increase with the inclusion of new communications mediums and techniques. Space-based optical communication links are therefore an excellent building block of space DTN architectures. When compared to traditional radio frequency (RF) communications, optical systems can provide extremely power-efficient and high bandwidth links bridging sub-networks. Because optical links are more susceptible to link disruption and experience the same light-speed delays as RF, optical-enabled DTN architectures can lessen potential drawbacks and maintain the benefits of autonomous optical communications over deep space distances. These environment-driven expectations - link delay and interruption, along with asymmetric data rates - are the purpose of the proof-of-concept experiment outlined herein. In recognizing the potential of these two technologies, we report an initial experiment and characterization of the performance of a DTN-enabled space optical link. The experiment design employs a point-to-point free-space optical link configured to have asymmetric bandwidth. This link connects two networked systems running a DTN protocol implementation designed and written at JPL for use on spacecraft, and further configured for higher bandwidth performance. Comparing baseline data transmission metrics with and without periodic optical link interruptions, the experiment confirmed the DTN protocols' ability to handle real-world unexpected link outages while maintaining capability of

  15. Utilisation of Online Resources among Undergraduates in Nigerian ...

    African Journals Online (AJOL)

    Electronic book (e-book) was mostly utilized as against Ejournals and E-thesis, while mobile phones and cybercafés remain the channels used in accessing online resources. it was discovered that incessant power supply, slow Internet connectivity and lack of time to access the information resources are constraints to ...

  16. PROTOCOLS FOR INCREASING THE LIFETIME OF NODES OF AD HOC WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    B.Malarkodi

    2010-03-01

    Full Text Available Power consumption of nodes in ad hoc networks is a critical issue as they predominantly operate on batteries. In order to improve the lifetime of an ad hoc network, all the nodes must be utilized evenly and the power required for connections must be minimized. Energy management deals with the process of managing energy resources by means of controlling the battery discharge, adjusting the transmission power and scheduling of power sources so as to increase the lifetime of the nodes of an ad hoc wireless network. In this paper, two protocols are proposed to improve the lifetime of the nodes. The first protocol assumes smart battery packages with L cells and uses dynamic programming (DP to optimally select the set of cells used to satisfy a request for power. The second one proposes a MAC layer protocol denoted as Power Aware medium Access Control (PAMAC protocol which enables the network layer to select a route with minimum total power requirement among the possible routes between a source and a destination provided all nodes in the routes have battery capacity above a threshold. The life time of the nodes using the DP based scheduling policy is found through simulation and compared with that obtained using the techniques reported in the literature. It is found that DP based policy increases the lifetime of the mobile nodes by a factor of 1.15 to 1.8. The life expectancy, the average power consumption and throughput of the network using PAMAC protocol are computed through simulation and compared with that of the other MAC layer protocols 802.11, MACA, and CSMA. Besides this, the life expectancy and average power consumption of the network for different values of threshold are also compared. From the simulation results, it is observed that PAMAC consumes the least power and provides the longest lifetime among the various MAC Layer protocols. Moreover, using PAMAC as the MAC layer protocol, the performance obtained using different routing layer

  17. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks

    Directory of Open Access Journals (Sweden)

    Raghav V. Sampangi

    2015-09-01

    Full Text Available Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID and Wireless Body Area Networks (WBAN that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG, and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  18. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks.

    Science.gov (United States)

    Sampangi, Raghav V; Sampalli, Srinivas

    2015-09-15

    Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  19. Automotive electronics design fundamentals

    CERN Document Server

    Zaman, Najamuz

    2015-01-01

    This book explains the topology behind automotive electronics architectures and examines how they can be profoundly augmented with embedded controllers. These controllers serve as the core building blocks of today’s vehicle electronics. Rather than simply teaching electrical basics, this unique resource focuses on the fundamental concepts of vehicle electronics architecture, and details the wide variety of Electronic Control Modules (ECMs) that enable the increasingly sophisticated "bells & whistles" of modern designs.  A must-have for automotive design engineers, technicians working in automotive electronics repair centers and students taking automotive electronics courses, this guide bridges the gap between academic instruction and industry practice with clear, concise advice on how to design and optimize automotive electronics with embedded controllers.

  20. Gaseous Electronics Tables, Atoms, and Molecules

    CERN Document Server

    Raju, Gorur Govinda

    2011-01-01

    With the constant emergence of new research and application possibilities, gaseous electronics is more important than ever in disciplines including engineering (electrical, power, mechanical, electronics, and environmental), physics, and electronics. The first resource of its kind, Gaseous Electronics: Tables, Atoms, and Molecules fulfills the author's vision of a stand-alone reference to condense 100 years of research on electron-neutral collision data into one easily searchable volume. It presents most--if not all--of the properly classified experimental results that scientists, researchers,

  1. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  2. Secure electronic commerce communication system based on CA

    Science.gov (United States)

    Chen, Deyun; Zhang, Junfeng; Pei, Shujun

    2001-07-01

    In this paper, we introduce the situation of electronic commercial security, then we analyze the working process and security for SSL protocol. At last, we propose a secure electronic commerce communication system based on CA. The system provide secure services such as encryption, integer, peer authentication and non-repudiation for application layer communication software of browser clients' and web server. The system can implement automatic allocation and united management of key through setting up the CA in the network.

  3. SNP typing on the NanoChip electronic microarray

    DEFF Research Database (Denmark)

    Børsting, Claus; Sanchez Sanchez, Juan Jose; Morling, Niels

    2005-01-01

    We describe a single nucleotide polymorphism (SNP) typing protocol developed for the NanoChip electronic microarray. The NanoChip array consists of 100 electrodes covered by a thin hydrogel layer containing streptavidin. An electric currency can be applied to one, several, or all electrodes...

  4. Factors and motivations associated with use of e-cigarette among primary care patients in a prospective cohort study: e-TAC study protocol

    OpenAIRE

    Kinouani, Sh?razade; Cast?ra, Philippe; Laporte, Catherine; P?tr?gne, Fran?ois; Gay, Bernard

    2016-01-01

    Introduction While the relationship between electronic cigarette use and smoking has often been studied, the association between electronic cigarette use and socioeconomic factors has received less attention. This is a study protocol aiming to describe the relationship between the consumption of psychoactive products (in particular: smoking) or some socioeconomic factors and the evolution of the use of electronic cigarette in primary healthcare over 1?year. Methods and analysis Electronic cig...

  5. The "Interdisciplinary Orofacial Examination Protocol for Children and Adolescents": a resource for the interdisciplinary assessment of the stomatognatic system.

    Science.gov (United States)

    Grandi, Diana

    2012-11-01

    The Interdisciplinary Orofacial Examination Protocol for Children and Adolescents (Protocolo de exploración interdisciplinaria orofacial para niños y adolescents, Barcelona, 2008) is very useful in providing a fast, initial, expedient detection of possible morphological and functional disorders, and to guide the patient toward the appropriate professionals. With this tool it is possible to detect the risk factors which can negatively affect morphological and functional harmony and guide patients toward the necessary treatment as early as possible. This Protocol, developed by 4 orthodontists, 1 ENT and 3 speech language therapists, also contributes to the unification of concepts and nomenclature used by distinct specialists, thus making professional understanding easier and more dynamic.

  6. The Frustrated Nerds Project--Resources for Systems Administrators in Higher Education: A Resource Webliography

    Science.gov (United States)

    Henninger, Jessamyn; Aber, Susan Ward

    2010-01-01

    Systems Architects and Information Technology administrators working in higher education help faculty, staff, and student computer users. Yet, who helps them? What resources do these professionals value? A case study was conducted using purposeful sampling and data collection through electronic interview to gather the preferred information-seeking…

  7. Secure Handshake in Wi-Fi Connection (A Secure and Enhanced Communication Protocol)

    OpenAIRE

    Ranbir Sinha; Nishant Behar; Devendra Singh

    2012-01-01

    This paper presents a concept of enhancing the security in wireless communication. A Computer Network is an interconnected group of autonomous computing nodes, which use a well-defined, mutually agreed set of rules and conventions known as protocols, interact with one-another meaningfully and allow resource sharing preferably in a predictable and controllable manner. Communication has a major impact on today’s business. It is desired to communicate data with high security. These days wireless...

  8. Human Resource Development in Hybrid Libraries

    OpenAIRE

    Prakasan, E. R.; Swarna, T.; Vijai Kumar, *

    2000-01-01

    This paper explores the human resources and development implications in hybrid libraries. Due to technological changes in libraries, which is a result of the proliferation of electronic resources, there has been a shift in workloads and workflow, requiring staff with different skills and educational backgrounds. Training of staff at all levels in information technology is the key to manage change, alleviate anxiety in the workplace and assure quality service in the libraries. Staff developmen...

  9. An open repositories network development for medical teaching resources.

    Science.gov (United States)

    Soula, Gérard; Darmoni, Stefan; Le Beux, Pierre; Renard, Jean-Marie; Dahamna, Badisse; Fieschi, Marius

    2010-01-01

    The lack of interoperability between repositories of heterogeneous and geographically widespread data is an obstacle to the diffusion, sharing and reutilization of those data. We present the development of an open repositories network taking into account both the syntactic and semantic interoperability of the different repositories and based on international standards in this field. The network is used by the medical community in France for the diffusion and sharing of digital teaching resources. The syntactic interoperability of the repositories is managed using the OAI-PMH protocol for the exchange of metadata describing the resources. Semantic interoperability is based, on one hand, on the LOM standard for the description of resources and on MESH for the indexing of the latter and, on the other hand, on semantic interoperability management designed to optimize compliance with standards and the quality of the metadata.

  10. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  11. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  12. A reliable, delay bounded and less complex communication protocol for multicluster FANETs

    Directory of Open Access Journals (Sweden)

    Wajiya Zafar

    2017-02-01

    Full Text Available Recently, Flying Ad-hoc Networks (FANETs, enabling ad-hoc networking between Unmanned Aerial Vehicles (UAVs is gaining importance in several military and civilian applications. The sensitivity of the applications requires adaptive; efficient; delay bounded and scalable communication network among UAVs for data transmission. Due to communication protocol complexity; rigidity; cost of commercial-off-the-shelf (COT components; limited radio bandwidth; high mobility and computational resources; maintaining the desired level of Quality of Service (QoS becomes a daunting task. For the first time in this research we propose multicluster FANETs for efficient network management; the proposed scheme considerably reduces communication cost and optimizes network performance as well as exploit low power; less complex and low cost IEEE 802.15.4 (MAC protocol for intercluster and intracluster communication. In this research both beacon enabled mode and beaconless modes have been investigated with Guaranteed Time Slots (GTS and virtual Time Division Multiple Access (TDMA respectively. The methodology plays a key role towards reserving bandwidth for latency critical applications; eliminate collisions and medium access delays. Moreover analysis ad-hoc routing protocols including two proactive (OLSR, DSDV and one reactive (AODV is also presented. The results shows that the proposed scheme guarantees high packet delivery ratios while maintaining acceptable levels of latency requirements comparable with more complex and dedicatedly designed protocols in literature.

  13. [The intervention mapping protocol: A structured process to develop, implement and evaluate health promotion programs].

    Science.gov (United States)

    Fassier, J-B; Lamort-Bouché, M; Sarnin, P; Durif-Bruckert, C; Péron, J; Letrilliart, L; Durand, M-J

    2016-02-01

    Health promotion programs are expected to improve population health and reduce social inequalities in health. However, their theoretical foundations are frequently ill-defined, and their implementation faces many obstacles. The aim of this article is to describe the intervention mapping protocol in health promotion programs planning, used recently in several countries. The challenges of planning health promotion programs are presented, and the six steps of the intervention mapping protocol are described with an example. Based on a literature review, the use of this protocol, its requirements and potential limitations are discussed. The intervention mapping protocol has four essential characteristics: an ecological perspective (person-environment), a participative approach, the use of theoretical models in human and social sciences and the use of scientific evidence. It comprises six steps: conduct a health needs assessment, define change objectives, select theory-based change techniques and practical applications, organize techniques and applications into an intervention program (logic model), plan for program adoption, implementation, and sustainability, and generate an evaluation plan. This protocol was used in different countries and domains such as obesity, tobacco, physical activity, cancer and occupational health. Although its utilization requires resources and a critical stance, this protocol was used to develop interventions which efficacy was demonstrated. The intervention mapping protocol is an integrated process that fits the scientific and practical challenges of health promotion. It could be tested in France as it was used in other countries, in particular to reduce social inequalities in health. Copyright © 2016. Published by Elsevier Masson SAS.

  14. Preservation of and Permanent Access to Electronic Information Resources

    National Research Council Canada - National Science Library

    Hodge, Gail

    2004-01-01

    The rapid growth in the creation and dissemination of electronic information has emphasized the digital environment's speed and ease of dissemination with little regard for its long-term preservation and access...

  15. Implementating Information Technology in E-Human Resource Management

    Directory of Open Access Journals (Sweden)

    Cristina-Dana Popescu (Mitu

    2016-01-01

    More and more organizations have been replacing face-to-face human resource managementactivities with electronic human resource management, which is considered as one of the keyfactors that every organization needs to focus. Considering that human resource management isone of the necessary needs of today’s business, the goal of this article is to establish the importanceof human resource management (HRM, to examine recent research in e-HRM in order to evaluatethe cumulated evidence on the relationship between HRM and e-HRM and to outline the impact ofe-HRM on human resource. Many specialists underlined the fact that human resource requiresmore attention and careful management than any other resource of an organization. This paperalso deals with the influence of Internet and information technology on work and human resourcemanagement.

  16. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  17. Household of care in electronic health information exchange systems

    CSIR Research Space (South Africa)

    Sibiya, Mhlupheki G

    2017-09-01

    Full Text Available by the organisation have presented the protocols and message profiles that can be used for communication among the systems within Electronic Health Information Exchange (HIE)[17, 6]. HIE “allows doctors, nurses, pharmacists, other healthcare providers and patients...

  18. A protocol improves GP recording of long-term sickness absence risk factors.

    Science.gov (United States)

    van Dijk, Paul; Hogervorst, Wouter; ter Riet, Gerben; van Dijk, Frank

    2008-06-01

    If general practitioners (GPs) were better informed about patients' risks of long-term sickness absence (LTSA), they could incorporate these risk assessments into their patient management plans and cooperate more with occupational physicians to prevent LTSA. To evaluate the effectiveness of a protocol helping GPs in recording risks of LTSA and in co-operating with occupational physicians (OPs). Twenty-six GPs (co-operating in four groups) in Amsterdam, The Netherlands, participated in a controlled intervention study. Fourteen GPs were the protocol-supported intervention group and twelve GPs were the reference group. Outcome measures were consultations containing work-related information, information about two risk factors for LTSA, referrals to OPs and contacts of OPs with GPs and patients. Outcomes were identified through an electronic search in the GPs' information systems. Entries containing information were independently scored by two investigators. The proportions of patients with consultations documenting LTSA-pertinent items were compared between the groups, accounting for differences at baseline. There was no increase in consultations containing work-related information. Recording of risk factor information increased in the intervention group; the difference was 4.5% [95% CI 1.5-7.6] and 1.8% (95% CI -0.8 to 4.4) for the two risk factors. The referral rate to the OP increased by 2.9% (95% CI 1.2-4.5). There was no effect on contacts of OPs with GPs or with patients. Protocol-supported consultations may lead to a modest increase in information regarding two risk factors for LTSA in GPs' electronic records and to more referrals to OPs.

  19. Design and implementation of an affordable, public sector electronic medical record in rural Nepal.

    Science.gov (United States)

    Raut, Anant; Yarbrough, Chase; Singh, Vivek; Gauchan, Bikash; Citrin, David; Verma, Varun; Hawley, Jessica; Schwarz, Dan; Harsha Bangura, Alex; Shrestha, Biplav; Schwarz, Ryan; Adhikari, Mukesh; Maru, Duncan

    2017-06-23

    Globally, electronic medical records are central to the infrastructure of modern healthcare systems. Yet the vast majority of electronic medical records have been designed for resource-rich environments and are not feasible in settings of poverty. Here we describe the design and implementation of an electronic medical record at a public sector district hospital in rural Nepal, and its subsequent expansion to an additional public sector facility.DevelopmentThe electronic medical record was designed to solve for the following elements of public sector healthcare delivery: 1) integration of the systems across inpatient, surgical, outpatient, emergency, laboratory, radiology, and pharmacy sites of care; 2) effective data extraction for impact evaluation and government regulation; 3) optimization for longitudinal care provision and patient tracking; and 4) effectiveness for quality improvement initiatives. For these purposes, we adapted Bahmni, a product built with open-source components for patient tracking, clinical protocols, pharmacy, laboratory, imaging, financial management, and supply logistics. In close partnership with government officials, we deployed the system in February of 2015, added on additional functionality, and iteratively improved the system over the following year. This experience enabled us then to deploy the system at an additional district-level hospital in a different part of the country in under four weeks. We discuss the implementation challenges and the strategies we pursued to build an electronic medical record for the public sector in rural Nepal.DiscussionOver the course of 18 months, we were able to develop, deploy and iterate upon the electronic medical record, and then deploy the refined product at an additional facility within only four weeks. Our experience suggests the feasibility of an integrated electronic medical record for public sector care delivery even in settings of rural poverty.

  20. Separable states improve protocols with finite randomness

    International Nuclear Information System (INIS)

    Bobby, Tan Kok Chuan; Paterek, Tomasz

    2014-01-01

    It is known from Bell's theorem that quantum predictions for some entangled states cannot be mimicked using local hidden variable (LHV) models. From a computer science perspective, LHV models may be interpreted as classical computers operating on a potentially infinite number of correlated bits originating from a common source. As such, Bell inequality violations achieved through entangled states are able to characterize the quantum advantage of certain tasks, so long as the task itself imposes no restriction on the availability of correlated bits. However, if the number of shared bits is limited, additional constraints are placed on the possible LHV models, and separable, i.e. disentangled states may become a useful resource. Bell violations are therefore no longer necessary to achieve a quantum advantage. Here we show that, in particular, separable states improve the so-called random access codes, which is a class of communication problem wherein one party tries to read a portion of the data held by another distant party in the presence of finite shared randomness and limited classical communication. We also show how the bias of classical bits can be used to avoid wrong answers in order to achieve the optimal classical protocol and how the advantage of quantum protocols is linked to quantum discord. (paper)

  1. Cross-Layer Protocol as a Better Option in Wireless Mesh Network with Respect to Layered-Protocol

    OpenAIRE

    Ahmed Abdulwahab Al-Ahdal; Dr. V. P. Pawar; G. N. Shinde

    2014-01-01

    The Optimal way to improve Wireless Mesh Networks (WMNs) performance is to use a better network protocol, but whether layered-protocol design or cross-layer design is a better option to optimize protocol performance in WMNs is still an on-going research topic. In this paper, we focus on cross-layer protocol as a better option with respect to layered-protocol. The layered protocol architecture (OSI) model divides networking tasks into layers and defines a pocket of services for each layer to b...

  2. Sustainable development and energy resources

    International Nuclear Information System (INIS)

    Steeg, H.

    2000-01-01

    (a) The paper describes the substance and content of sustainability as well as the elements, which determine the objective. Sustainability is high on national and international political agendas. The objective is of a long term nature. The focus of the paper is on hydrocarbon emissions (CO 2 ); (b) International approaches and policies are addressed such as the Climate change convention and the Kyoto protocol. The burden for change on the energy sector to achieve sustainability is very large in particular for OECD countries and those of central and Eastern Europe. Scepticism is expresses whether the goals of the protocol and be reached within the foreseen timeframe although governments and industry are active in improving sustainability; (c) Future Trends of demand and supply examines briefly the growth in primary energy demand as well as the reserve situation for oil, gas and coal. Renewable energy resources are also assessed in regard to their future potential, which is not sufficient to replace hydrocarbons soon. Nuclear power although not emitting CO 2 is faced with grave acceptability reactions. Nevertheless sustainability is not threatened by lack of resources; (d) Energy efficiency and new technologies are examined vis-a-vis their contribution to sustainability as well as a warning to overestimate soon results for market penetration; (e) The impact of liberalization of energy sectors play an important role. The message is not to revert back to command and control economies but rather use the driving force of competition. It does not mean to renounce government energy policies but to change their radius to more market oriented approaches; (f) Conclusions centre on the plea that all options should be available without emotional and politicized prejudices. (author)

  3. Sustainable development and energy resources

    International Nuclear Information System (INIS)

    Steeg, H

    2002-01-01

    (a) The paper describes the substance and content of sustainability as well as the elements, which determine the objective. Sustainability is high on national and international political agendas. The objective is of a long term nature. The focus of the paper is on hydrocarbon emissions (CO 2 ); (b) International approaches and policies are addressed such as the climate change convention and the Kyoto protocol. The burden for change on the energy sector to achieve sustainability is very large in particular for OECD countries and those of central and Eastern Europe. Scepticism is expresses whether the goals of the protocol and be reached within the foreseen timeframe although governments and industry are active in improving sustainability; (c) Future trends of demand and supply examines briefly the growth in primary energy demand as well as the reserve situation for oil, gas and coal. Renewable energy resources are also assessed in regard to their future potential, which is not sufficient to replace hydrocarbons soon. Nuclear power although not emitting CO 2 is faced with grave acceptability reactions. Nevertheless sustainability is not threatened by lack of resources; (d) Energy efficiency and new technologies are examined vis-a-vis their contribution to sustainability as well as a warning to overestimate soon results for market penetration; (e) The impact of liberalization of energy sectors play an important role. The message is not to revert back to command and control economies but rather use the driving force of competition. It does not mean to renounce government energy policies but to change their radius to more market oriented approaches; (f) Conclusions centre on the plea that all options should be available without emotional and politicized prejudices. (author)

  4. Wheat Rust Information Resources - Integrated tools and data for improved decision making

    DEFF Research Database (Denmark)

    Hodson, David; Hansen, Jens Grønbech; Lassen, Poul

    giving access to an unprecedented set of data for rust surveys, alternate hosts (barberry), rust pathotypes, trap nurseries and resistant cultivars. Standardized protocols for data collection have permitted the development of a comprehensive data management system, named the Wheat Rust Toolbox....... Integration of the CIMMYT Wheat Atlas and the Genetic Resources Information System (GRIS) databases provides a rich resource on wheat cultivars and their resistance to important rust races. Data access is facilitated via dedicated web portals such as Rust Tracker (www.rusttracker.org) and the Global Rust...

  5. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2016-06-01

    Full Text Available Substantial changes have occurred in the Information Technology (IT sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  6. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols.

    Science.gov (United States)

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-06-14

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  7. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    Science.gov (United States)

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-01-01

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. PMID:27314351

  8. A novel quantum information hiding protocol based on entanglement swapping of high-level Bell states

    International Nuclear Information System (INIS)

    Xu Shu-Jiang; Wang Lian-Hai; Chen Xiu-Bo; Niu Xin-Xin; Yang Yi-Xian

    2015-01-01

    Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security. (paper)

  9. Teleportation with an Arbitrary Mixed Resource as a Trace-Preserving Quantum Channel

    Institute of Scientific and Technical Information of China (English)

    Sergio Albeverio; FEI Shao-Ming; YANG Wen-Li

    2002-01-01

    General conditions are given in order to perform a perfect teleportation process in the case where theHilbert spaces involved have different dimensions. An explicit expression is obtained for the quantum channel associatedwith the standard teleportation protocol To with an arbitrary mixed state resource. The transmission fidelity of thecorresponding quantum channel is given.

  10. Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Paramasivan

    2014-01-01

    Full Text Available Mobile ad hoc networks (MANETs are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  11. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.

    Science.gov (United States)

    Paramasivan, B; Kaliappan, M

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  12. [Multidisciplinary protocol for computed tomography imaging and angiographic embolization of splenic injury due to trauma: assessment of pre-protocol and post-protocol outcomes].

    Science.gov (United States)

    Koo, M; Sabaté, A; Magalló, P; García, M A; Domínguez, J; de Lama, M E; López, S

    2011-11-01

    To assess conservative treatment of splenic injury due to trauma, following a protocol for computed tomography (CT) and angiographic embolization. To quantify the predictive value of CT for detecting bleeding and need for embolization. The care protocol developed by the multidisciplinary team consisted of angiography with embolization of lesions revealed by contrast extravasation under CT as well as embolization of grade III-V injuries observed, or grade I-II injuries causing hemodynamic instability and/or need for blood transfusion. We collected data on demographic variables, injury severity score (ISS), angiographic findings, and injuries revealed by CT. Pre-protocol and post-protocol outcomes were compared. The sensitivity and specificity of CT findings were calculated for all patients who required angiographic embolization. Forty-four and 30 angiographies were performed in the pre- and post-protocol periods, respectively. The mean (SD) ISSs in the two periods were 25 (11) and 26 (12), respectively. A total of 24 (54%) embolizations were performed in the pre-protocol period and 28 (98%) after implementation of the protocol. Two and 7 embolizations involved the spleen in the 2 periods, respectively; abdominal laparotomies numbered 32 and 25, respectively, and 10 (31%) vs 4 (16%) splenectomies were performed. The specificity and sensitivity values for contrast extravasation found on CT and followed by embolization were 77.7% and 79.5%. The implementation of this multidisciplinary protocol using CT imaging and angiographic embolization led to a decrease in the number of splenectomies. The protocol allows us to take a more conservative treatment approach.

  13. Authentication of Radio Frequency Identification Devices Using Electronic Characteristics

    Science.gov (United States)

    Chinnappa Gounder Periaswamy, Senthilkumar

    2010-01-01

    Radio frequency identification (RFID) tags are low-cost devices that are used to uniquely identify the objects to which they are attached. Due to the low cost and size that is driving the technology, a tag has limited computational capabilities and resources. This limitation makes the implementation of conventional security protocols to prevent…

  14. A market-based optimization approach to sensor and resource management

    Science.gov (United States)

    Schrage, Dan; Farnham, Christopher; Gonsalves, Paul G.

    2006-05-01

    Dynamic resource allocation for sensor management is a problem that demands solutions beyond traditional approaches to optimization. Market-based optimization applies solutions from economic theory, particularly game theory, to the resource allocation problem by creating an artificial market for sensor information and computational resources. Intelligent agents are the buyers and sellers in this market, and they represent all the elements of the sensor network, from sensors to sensor platforms to computational resources. These agents interact based on a negotiation mechanism that determines their bidding strategies. This negotiation mechanism and the agents' bidding strategies are based on game theory, and they are designed so that the aggregate result of the multi-agent negotiation process is a market in competitive equilibrium, which guarantees an optimal allocation of resources throughout the sensor network. This paper makes two contributions to the field of market-based optimization: First, we develop a market protocol to handle heterogeneous goods in a dynamic setting. Second, we develop arbitrage agents to improve the efficiency in the market in light of its dynamic nature.

  15. The Growing Awareness Inventory: Building Capacity for Culturally Responsive Science and Mathematics with a Structured Observation Protocol

    Science.gov (United States)

    Brown, Julie C.; Crippen, Kent J.

    2016-01-01

    This study represents a first iteration in the design process of the Growing Awareness Inventory (GAIn), a structured observation protocol for building the awareness of preservice teachers (PSTs) for resources in mathematics and science classrooms that can be used for culturally responsive pedagogy (CRP). The GAIn is designed to develop awareness…

  16. Development of Virtual Resource Based IoT Proxy for Bridging Heterogeneous Web Services in IoT Networks

    Directory of Open Access Journals (Sweden)

    Wenquan Jin

    2018-05-01

    Full Text Available The Internet of Things is comprised of heterogeneous devices, applications, and platforms using multiple communication technologies to connect the Internet for providing seamless services ubiquitously. With the requirement of developing Internet of Things products, many protocols, program libraries, frameworks, and standard specifications have been proposed. Therefore, providing a consistent interface to access services from those environments is difficult. Moreover, bridging the existing web services to sensor and actuator networks is also important for providing Internet of Things services in various industry domains. In this paper, an Internet of Things proxy is proposed that is based on virtual resources to bridge heterogeneous web services from the Internet to the Internet of Things network. The proxy enables clients to have transparent access to Internet of Things devices and web services in the network. The proxy is comprised of server and client to forward messages for different communication environments using the virtual resources which include the server for the message sender and the client for the message receiver. We design the proxy for the Open Connectivity Foundation network where the virtual resources are discovered by the clients as Open Connectivity Foundation resources. The virtual resources represent the resources which expose services in the Internet by web service providers. Although the services are provided by web service providers from the Internet, the client can access services using the consistent communication protocol in the Open Connectivity Foundation network. For discovering the resources to access services, the client also uses the consistent discovery interface to discover the Open Connectivity Foundation devices and virtual resources.

  17. Development of Virtual Resource Based IoT Proxy for Bridging Heterogeneous Web Services in IoT Networks.

    Science.gov (United States)

    Jin, Wenquan; Kim, DoHyeun

    2018-05-26

    The Internet of Things is comprised of heterogeneous devices, applications, and platforms using multiple communication technologies to connect the Internet for providing seamless services ubiquitously. With the requirement of developing Internet of Things products, many protocols, program libraries, frameworks, and standard specifications have been proposed. Therefore, providing a consistent interface to access services from those environments is difficult. Moreover, bridging the existing web services to sensor and actuator networks is also important for providing Internet of Things services in various industry domains. In this paper, an Internet of Things proxy is proposed that is based on virtual resources to bridge heterogeneous web services from the Internet to the Internet of Things network. The proxy enables clients to have transparent access to Internet of Things devices and web services in the network. The proxy is comprised of server and client to forward messages for different communication environments using the virtual resources which include the server for the message sender and the client for the message receiver. We design the proxy for the Open Connectivity Foundation network where the virtual resources are discovered by the clients as Open Connectivity Foundation resources. The virtual resources represent the resources which expose services in the Internet by web service providers. Although the services are provided by web service providers from the Internet, the client can access services using the consistent communication protocol in the Open Connectivity Foundation network. For discovering the resources to access services, the client also uses the consistent discovery interface to discover the Open Connectivity Foundation devices and virtual resources.

  18. Self-Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks

    KAUST Repository

    Elwhishi, Ahmed; Ho, Pin-Han; Naik, K.; Shihada, Basem

    2013-01-01

    This paper introduces a novel multicopy routing protocol, called Self-Adaptive Utility-based Routing Protocol (SAURP), for Delay Tolerant Networks (DTNs) that are possibly composed of a vast number of devices in miniature such as smart phones of heterogeneous capacities in terms of energy resources and buffer spaces. SAURP is characterized by the ability of identifying potential opportunities for forwarding messages to their destinations via a novel utility function-based mechanism, in which a suite of environment parameters, such as wireless channel condition, nodal buffer occupancy, and encounter statistics, are jointly considered. Thus, SAURP can reroute messages around nodes experiencing high-buffer occupancy, wireless interference, and/or congestion, while taking a considerably small number of transmissions. The developed utility function in SAURP is proved to be able to achieve optimal performance, which is further analyzed via a stochastic modeling approach. Extensive simulations are conducted to verify the developed analytical model and compare the proposed SAURP with a number of recently reported encounter-based routing approaches in terms of delivery ratio, delivery delay, and the number of transmissions required for each message delivery. The simulation results show that SAURP outperforms all the counterpart multicopy encounter-based routing protocols considered in the study.

  19. Self-Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks

    KAUST Repository

    Elwhishi, Ahmed

    2013-07-01

    This paper introduces a novel multicopy routing protocol, called Self-Adaptive Utility-based Routing Protocol (SAURP), for Delay Tolerant Networks (DTNs) that are possibly composed of a vast number of devices in miniature such as smart phones of heterogeneous capacities in terms of energy resources and buffer spaces. SAURP is characterized by the ability of identifying potential opportunities for forwarding messages to their destinations via a novel utility function-based mechanism, in which a suite of environment parameters, such as wireless channel condition, nodal buffer occupancy, and encounter statistics, are jointly considered. Thus, SAURP can reroute messages around nodes experiencing high-buffer occupancy, wireless interference, and/or congestion, while taking a considerably small number of transmissions. The developed utility function in SAURP is proved to be able to achieve optimal performance, which is further analyzed via a stochastic modeling approach. Extensive simulations are conducted to verify the developed analytical model and compare the proposed SAURP with a number of recently reported encounter-based routing approaches in terms of delivery ratio, delivery delay, and the number of transmissions required for each message delivery. The simulation results show that SAURP outperforms all the counterpart multicopy encounter-based routing protocols considered in the study.

  20. Looking for Guidelines for the Production of Electronic Textbooks.

    Science.gov (United States)

    Landoni, M.; Wilson, R.; Gibb, F.

    2001-01-01

    Reports the results of two studies of electronic book production, including production on the World Wide Web, and explains EBONI (Electronic Books On-screen Interface) that focuses on the evaluation of electronic resources and compiling guidelines for publishing electronic materials on the Internet for the United Kingdom higher education…

  1. Design And Implementation Of Radio Resources Controller Of WCDMA

    International Nuclear Information System (INIS)

    Hafez, A.M.A.

    2012-01-01

    Recently, wireless communications and especially the mobile networks are employed in nuclear applications including, but not limited to, Nuclear Material Integrity [1], Radiation Monitoring Networks [2, 3] and Nuclear Power Plants [4]. The thesis introduces an overview about one of the third generation (3G) mobile networks, known as Universal Mobile Telecommunications System (UMTS) networks, which consists of Universal Terrestrial Radio Access Network (UTRAN) and the Core Network (CN). The UTRAN has many interfaces, but the thesis focuses on the Uu interface which is between the User Equipment (UE) and the UTRAN. That interface is based on Wideband Code Division Multiple Accessing (WCDMA) system. The protocol architecture of UMTS is composed of two planes; the control plane and the user plane. Again, the thesis is concerned on the control plane which has the Radio Resources Control (RRC) protocol to manage the control signal at the Uu interface between the UE and the Radio Network Controller. The main goal of the thesis is to design, implement and test the building blocks of Radio Resources Controller of the WCDMA system. Also, the thesis presents one of nuclear applications that is based on WCDMA. This application includes design, implementation and simulation of Radiation Monitoring network as a pilot prototype model.

  2. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  3. impact of the use of electronic resources on research output

    African Journals Online (AJOL)

    manda

    ... Julita Nawe. University of Dar Es Salaam Library, P.O. Box 35092, Dar Es Salaam, Tanzania .... significantly, while 28.3% observed that quality of service to the community had improved .... resources and evaluate them is an important area.

  4. Social Studies Online Resources. Media Corner.

    Science.gov (United States)

    Wilson, Jeri, Ed.

    1995-01-01

    Maintains that three types of social studies activities are found on the information highway: (1) electronic mail; (2) information; and (3) conferencing. Describes examples of each. Discusses commercial services and resource materials and provides references to online services. (CFR)

  5. Green Supply Chain Collaboration for Fashionable Consumer Electronics Products under Third-Party Power Intervention—A Resource Dependence Perspective

    Directory of Open Access Journals (Sweden)

    Jiuh-Biing Sheu

    2014-05-01

    Full Text Available Under third-party power intervention (TPPI, which increases uncertainty in task environments, complex channel power interplays and restructuring are indispensable among green supply chain members as they move toward sustainable collaborative relationships for increased viability and competitive advantage. From the resource dependence perspective, this work presents a novel conceptual model to investigate the influence of political and social power on channel power restructuring and induced green supply chain collaboration in brander-retailer bidirectional green supply chains of fashionable consumer electronics products (FCEPs. An FCEP refers to the consumer electronics product (e.g., personal computers, mobile phones, computer notebooks, and game consoles with the features of a well-known brand associated, a short product lifecycle, timely and fashionable design fit for market trends, and quick responsiveness to the variations of market demands. The proposed model is tested empirically using questionnaire data obtained from retailers in the FCEP brander-retailer distribution channels. Analytical results reveal that as an extension of political and social power, TPPI positively affects the reciprocal interdependence of dyadic members and reduces power asymmetry, thereby enhancing the collaborative relationship of dyadic members and leading to improved green supply chain performance. Therein, reciprocal interdependence underlying collaborative relationship is the key to reducing the external environmental uncertainties in the TPPI context.

  6. Efficient network resource management for multimedia-on-demand services

    Science.gov (United States)

    Kuo, Chinhwa; Chiu, Jui-Hwa; Wu, Jong-Jyh; Chen, Dxo-Shin

    1998-08-01

    A Multimedia Instruction on Demand (MID) serves the purpose of providing an environment for lecture design, lecture annotation, and lecture review over networks. In order to support real-time multimedia interactive playback for such an application, the underlying networks are required to provide network resource management mechanism to enforce the reservation policy. In our design, the MID server and MID gateway consist of the following mechanisms, namely, resource management agent, admission control agent, packet classifier, and packet scheduler. We make use of the framework of the ReSerVation Protocol to devise and implement a network resource management mechanism, which control end-to-end packet delays and bandwidth allocation for the designed MID system. In the present paper, our contributions are as follows: (1) a network resource management scheme is designed to support real-time multimedia over the Internet and (2) an experimental test bed is established to measure the system performance. The developed scheme is currently being implemented in the Multimedia Information Networking laboratory at Tamkang University.

  7. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  8. Electron beam pasteurised oil palm waste: a potential feed resource

    International Nuclear Information System (INIS)

    Mat Rasol Awang; Hassan Hamdani Mutaat; Tamikazu Kume; Tachibana, H.

    2002-01-01

    Pasteurization of oil palm empty fruit bunch (EFB) was performed using electron beam single sided irradiation. The dose profiles of oil palm EFB samples for different thickness in both directions X and Y were established. The results showed the usual characteristics dose uniformity as sample thickness decreased. The mean average absorbed dose on both sides at the surface and bottom of the samples for different thickness samples lead to establishing depth dose curve. Based on depth dose curve and operation conditions of electron beam machine, the process throughput for pasteurized oil palm EFB were estimated. (Author)

  9. Measurement tools of resource use and quality of life in clinical trials for dementia or cognitive impairment interventions: protocol for a scoping review.

    Science.gov (United States)

    Yang, Fan; Dawes, Piers; Leroi, Iracema; Gannon, Brenda

    2017-01-26

    Dementia and cognitive impairment could severely impact patients' life and bring heavy burden to patients, caregivers and societies. Some interventions are suggested for the older patients with these conditions to help them live well, but economic evaluation is needed to assess the cost-effectiveness of these interventions. Trial-based economic evaluation is an ideal method; however, little is known about the tools used to collect data of resource use and quality of life alongside the trials. Therefore, the aim of this review is to identify and describe the resource use and quality of life instruments in clinical trials of interventions for older patients with dementia or cognitive impairment. We will perform a search in main electronic databases (Ovid MEDLINE, PsycINFO, EMBASE, CINAHL, Cochrane Databases of Systematic Reviews, Web of Science and Scopus) using the key terms or their synonyms: older, dementia, cognitive impairment, cost, quality of life, intervention and tools. After removing duplicates, two independent reviewers will screen each entry for eligibility, initially by title and abstract, then by full-text. A hand search of the references of included articles and general search, e.g. Google Scholar, will also be conducted to identify potential relevant studies. All disagreements will be resolved by discussion or consultation with a third reviewer if necessary. Data analysis will be completed and reported in a narrative review. This review will identify the instruments used in clinical trials to collect resource use and quality of life data for dementia or cognitive impairment interventions. This will help to guide the study design of future trial-based economic evaluation of these interventions. PROSPERO CRD42016038495.

  10. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  11. The Use of Electronic Resources by Academic Staff at the University of Ilorin, Nigeria

    Science.gov (United States)

    Tella, Adeyinka; Orim, Faith; Ibrahim, Dauda Morenikeji; Memudu, Suleiman Ajala

    2018-01-01

    The use of e-resources is now commonplace among academics in tertiary educational institutions the world over. Many academics including those in the universities are exploring the opportunities of e-resources to facilitate teaching and research. As the use of e-resources is increasing particularly among academics at the University of Ilorin,…

  12. Building the electronic industry's roadmaps

    Science.gov (United States)

    Boulton, William R.

    1995-02-01

    JTEC panelists found a strong consistency among the electronics firms they visited: all the firms had clear visions or roadmaps for their research and development activities and had committed resources to ensure that they achieve targeted results. The overarching vision driving Japan's electronics industry is that of achieving market success through developing appealing, high-quality, low-cost consumer goods - ahead of the competition. Specifics of the vision include improving performance, quality, and portability of consumer electronics products. Such visions help Japanese companies define in detail the roadmaps they will follow to develop new and improved electronic packaging technologies.

  13. Integration study of high quality teaching resources in universities

    Directory of Open Access Journals (Sweden)

    Honglu Liu

    2012-12-01

    Full Text Available Purpose: The development level and quality of education depend on the merits and efficiency in the use of teaching resources, especially in the case of obvious contradiction between the demand and supply of teaching resources. So to integrate teaching resources, improve the efficiency in the use of high quality teaching resources, and take the road of content development to enhance the competitiveness of education has become very important and urgent.Design/methodology/approach: On the basis of analysis on the teaching resources of universities and the problems they faced, this paper introduced the basic concepts of cloud storage, and built the integration architecture of high quality teaching resources in universities based on the cloud storage.Findings and Originality/value: The HDFS-based cloud storage proposed in this paper is a dynamically adjustable and Internet-based storage solution, and the users can access storage targets using the network through a common and easy-to-use protocol and application programming interfaces. This new technology is useful for end users benefits. With the continuous development and improvement of cloud storage, it will necessarily result in more and more applications in the institutions of higher learning and education network.Originality/value: This paper introduced the cloud storage into the integration of high quality teaching resources in universities first and as a new form of service, it can be a good solution.

  14. Electron microscopy using the genetically encoded APEX2 tag in cultured mammalian cells

    Science.gov (United States)

    Martell, Jeffrey D; Deerinck, Thomas J; Lam, Stephanie S; Ellisman, Mark H; Ting, Alice Y

    2018-01-01

    Electron microscopy (EM) is the premiere technique for high-resolution imaging of cellular ultrastructure. Unambiguous identification of specific proteins or cellular compartments in electron micrographs, however, remains challenging because of difficulties in delivering electron-dense contrast agents to specific subcellular targets within intact cells. We recently reported enhanced ascorbate peroxidase 2 (APEX2) as a broadly applicable genetic tag that generates EM contrast on a specific protein or subcellular compartment of interest. This protocol provides guidelines for designing and validating APEX2 fusion constructs, along with detailed instructions for cell culture, transfection, fixation, heavy-metal staining, embedding in resin, and EM imaging. Although this protocol focuses on EM in cultured mammalian cells, APEX2 is applicable to many cell types and contexts, including intact tissues and organisms, and is useful for numerous applications beyond EM, including live-cell proteomic mapping. This protocol, which describes procedures for sample preparation from cell monolayers and cell pellets, can be completed in 10 d, including time for APEX2 fusion construct validation, cell growth, and solidification of embedding resins. Notably, the only additional steps required relative to a standard EM sample preparation are cell transfection and a 2- to 45-min staining period with 3,3′-diaminobenzidine (DAB) and hydrogen peroxide (H2O2). PMID:28796234

  15. Epistemic Protocols for Distributed Gossiping

    Directory of Open Access Journals (Sweden)

    Krzysztof R. Apt

    2016-06-01

    Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.

  16. Concurrent negotiation and coordination for grid resource coallocation.

    Science.gov (United States)

    Sim, Kwang Mong; Shi, Benyun

    2010-06-01

    Bolstering resource coallocation is essential for realizing the Grid vision, because computationally intensive applications often require multiple computing resources from different administrative domains. Given that resource providers and consumers may have different requirements, successfully obtaining commitments through concurrent negotiations with multiple resource providers to simultaneously access several resources is a very challenging task for consumers. The impetus of this paper is that it is one of the earliest works that consider a concurrent negotiation mechanism for Grid resource coallocation. The concurrent negotiation mechanism is designed for 1) managing (de)commitment of contracts through one-to-many negotiations and 2) coordination of multiple concurrent one-to-many negotiations between a consumer and multiple resource providers. The novel contributions of this paper are devising 1) a utility-oriented coordination (UOC) strategy, 2) three classes of commitment management strategies (CMSs) for concurrent negotiation, and 3) the negotiation protocols of consumers and providers. Implementing these ideas in a testbed, three series of experiments were carried out in a variety of settings to compare the following: 1) the CMSs in this paper with the work of others in a single one-to-many negotiation environment for one resource where decommitment is allowed for both provider and consumer agents; 2) the performance of the three classes of CMSs in different resource market types; and 3) the UOC strategy with the work of others [e.g., the patient coordination strategy (PCS )] for coordinating multiple concurrent negotiations. Empirical results show the following: 1) the UOC strategy achieved higher utility, faster negotiation speed, and higher success rates than PCS for different resource market types; and 2) the CMS in this paper achieved higher final utility than the CMS in other works. Additionally, the properties of the three classes of CMSs in

  17. Literature overview highlights lack of paediatric donation protocols but identifies common themes that could guide their development.

    Science.gov (United States)

    Vileito, A; Siebelink, M J; Verhagen, Aae

    2018-05-01

    Paediatric donation is a unique and extremely sensitive process that requires specific knowledge and competencies. Most countries use protocols for organ and tissue donation to ensure optimal care for the donor and family, but these mainly focus on adults. However, the donation process for children differs from adults in many ways. An overview of the literature was performed to identify protocols for the paediatric population. PubMed, Web of Science, EMBASE and the Internet were searched up to March 2016 for papers or other sources in English related to specific organ and tissue donation protocols for children and neonates. This comprised title, abstract and then full-text screening of relevant data. We included 12 papers and two electronic sources that were mainly from North America and Europe. Most discussed donations after cardiac death. The recurring themes included identifying potential donors, approaching parents, palliative care and collaboration with organ procurement organisations. Most papers called for paediatric donation policies to be standardised. Scientific publications in English on paediatric donation protocols are very scarce. No comprehensive paediatric donation protocol was found. We identified several recurring themes in the literature that could be used to develop such protocols. ©2018 The Authors. Acta Paediatrica published by John Wiley & Sons Ltd on behalf of Foundation Acta Paediatrica.

  18. TU-D-201-03: Results of a Survey On the Implementation of the TG-51 Protocol and Associated Addendum On Reference Dosimetry of External Beams

    Energy Technology Data Exchange (ETDEWEB)

    Kim, G [University of California, San Diego, La Jolla, CA (United States); Muir, B [National Research Council, Ottawa, AB (Canada); Culberson, W [University of Wisconsin Madison, Madison, WI (United States); Davis, S [McGill University Health Center, Montreal, QC (Canada); Huang, Y [Henry Ford Health System, West Bloomfield, MI (United States); Lee, S [University of Maryland School of Medicine, Columbia, MD (United States); Lowenstein, J [UT MD Anderson Cancer Center, Houston, TX (United States); Sarfehnia, A [Sunnybrook Health Science Center, Toronto, ON (Canada); Tolani, N [Michael E. DeBakey VA Medical Center, Sugarland (United States); Siebers, J [University of Virginia Health System, Charlottesville, VA (United States)

    2016-06-15

    Purpose: The working group on the review and extension of the TG-51 protocol (WGTG51) collected data from American Association of Physicists in Medicine (AAPM) members with respect to their current TG-51 and associated addendum usage in the interest of considering future protocol addenda and guidance on reference dosimetry best practices. This study reports an overview of this survey on dosimetry of external beams. Methods: Fourteen survey questions were developed by WGTG51 and released in November 2015. The questions collected information on reference dosimetry, beam quality specification, and ancillary calibration equipment. Results: Of the 190 submissions completed worldwide (U.S. 70%), 83% were AAPM members. Of the respondents, 33.5% implemented the TG-51 addendum, with the maximum calibration difference for any photon beam, with respect to the original TG-51 protocol, being <1% for 97.4% of responses. One major finding is that 81.8% of respondents used the same cylindrical ionization chamber for photon and electron dosimetry, implying that many clinics are foregoing the use of parallel-plate chambers. Other evidence suggests equivalent dosimetric results can be obtained with both cylindrical and parallel-plate chambers in electron beams. This, combined with users comfort with cylindrical chambers for electrons will likely impact recommendations put forward in an upcoming electron beam addendum to the TG-51 protocol. Data collected on ancillary equipment showed 58.2% (45.0%) of the thermometers (barometers) in use for beam calibration had NIST traceable calibration certificates, but 48.4% (42.7%) were never recalibrated. Conclusion: This survey provides a snapshot of TG-51 external beam reference dosimetry practice in radiotherapy centers. Findings demonstrate the rapid take-up of the TG-51 photon beam addendum and raise issues for the WGTG51 to focus on going forward, including guidelines on ancillary equipment and the choice of chamber for electron beam

  19. Using semantics for representing experimental protocols.

    Science.gov (United States)

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  20. Quantitative biological measurement in Transmission Electron Tomography

    International Nuclear Information System (INIS)

    Mantell, Judith M; Verkade, Paul; Arkill, Kenton P

    2012-01-01

    It has been known for some time that biological sections shrink in the transmission electron microscope from exposure to the electron beam. This phenomenon is especially important in Electron Tomography (ET). The effect on shrinkage of parameters such as embedding medium or sample type is less well understood. In addition anisotropic area shrinkage has largely been ignored. The intention of this study is to explore the shrinkage on a number of samples ranging in thickness from 200 nm to 500 nm. A protocol was developed to determine the shrinkage in area and thickness using the gold fiducials used in electron tomography. In brief: Using low dose philosophy on the section, a focus area was used prior to a separate virgin study area for a series of known exposures on a tilted sample. The shrinkage was determined by measurements on the gold beads from both sides of the section as determined by a confirmatory tomogram. It was found that the shrinkage in area (approximately to 90-95% of the original) and the thickness (approximately 65% of the original at most) agreed with pervious authors, but that a lmost all the shrinkage was in the first minute and that although the direction of the in-plane shrinkage (in x and y) was sometimes uneven the end result was consistent. It was observed, in general, that thinner samples showed more percentage shrinkage than thicker ones. In conclusion, if direct quantitative measurements are required then the protocol described should be used for all areas studied.